Overview of Networking for Primary School | Desklib
VerifiedAdded on 2023/06/11
|11
|1227
|440
AI Summary
This report provides an overview of networking for a primary school, including project scope, requirements, network design, IP addresses table, network topology diagram, switch and router configuration, DHCP configuration, access point and server configuration guidelines, security configuration, and conclusion.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: OVERVIEW OF NETWORKING
Overview of Networking
Name of the Student
Name of the University
Author Note:
Overview of Networking
Name of the Student
Name of the University
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1OVERVIEW OF NETWORKING
Table of Contents
Project Scope...............................................................................................................................................2
Requirements of the project.......................................................................................................................2
Network Design...........................................................................................................................................3
IP Addresses Table including netmask.........................................................................................................3
Network Topology Diagram.........................................................................................................................4
Switch Configuration...............................................................................................................................4
Router Configuration...............................................................................................................................7
DHCP Configuration.................................................................................................................................8
Access Point, Server configuration Guidelines.........................................................................................8
Security Configuration.............................................................................................................................9
Conclusion...................................................................................................................................................9
References.................................................................................................................................................10
Table of Contents
Project Scope...............................................................................................................................................2
Requirements of the project.......................................................................................................................2
Network Design...........................................................................................................................................3
IP Addresses Table including netmask.........................................................................................................3
Network Topology Diagram.........................................................................................................................4
Switch Configuration...............................................................................................................................4
Router Configuration...............................................................................................................................7
DHCP Configuration.................................................................................................................................8
Access Point, Server configuration Guidelines.........................................................................................8
Security Configuration.............................................................................................................................9
Conclusion...................................................................................................................................................9
References.................................................................................................................................................10
2OVERVIEW OF NETWORKING
Project Scope
In the given case study, primary school needs a network that is mainly used by various kinds of
users of this school with the guest who are visiting the school on regular basis. Number of users who are
mainly using the network is around 50 and so the number of guest is around 10. The given network is
mainly used by 50 number of user on daily basis along with 10 users by making of guest on accessional
basis. The network comes up with feature that is FTP which means that network can be used or
accessed by the guest only. It also focuses on the fact they can be restricted from use in part of the
network. So a proper network is required which is used for creation of two parts of networks in which
one part will be used for daily use along with other kind of part that is mainly used by the guest.
Requirements of the project
For creating a network, it comes up with certain number of requirements which have discussed
below:
A network is needed to be created which manly comprises of basic kind of LAN that can
be easily used by the 50 available users.
The network should be configured in such a way that is separate subnet mask for both
the guest and LAN network.
The guest network comes up with limited access to FTP services on the server of FTP
service.
All the access to the Lan network should be blocked
A proper kind of IP network design should be done.
Various kinds of hardware components like routers and switches should be configured
in a proper as per the requirement.
All the configuration details of the hardware configuration should be provided as per
the need of the network.
FTP server is for the guest user and other kind of server is mainly used for providing help
to large number of users that is 50 on regular basis.
Project Scope
In the given case study, primary school needs a network that is mainly used by various kinds of
users of this school with the guest who are visiting the school on regular basis. Number of users who are
mainly using the network is around 50 and so the number of guest is around 10. The given network is
mainly used by 50 number of user on daily basis along with 10 users by making of guest on accessional
basis. The network comes up with feature that is FTP which means that network can be used or
accessed by the guest only. It also focuses on the fact they can be restricted from use in part of the
network. So a proper network is required which is used for creation of two parts of networks in which
one part will be used for daily use along with other kind of part that is mainly used by the guest.
Requirements of the project
For creating a network, it comes up with certain number of requirements which have discussed
below:
A network is needed to be created which manly comprises of basic kind of LAN that can
be easily used by the 50 available users.
The network should be configured in such a way that is separate subnet mask for both
the guest and LAN network.
The guest network comes up with limited access to FTP services on the server of FTP
service.
All the access to the Lan network should be blocked
A proper kind of IP network design should be done.
Various kinds of hardware components like routers and switches should be configured
in a proper as per the requirement.
All the configuration details of the hardware configuration should be provided as per
the need of the network.
FTP server is for the guest user and other kind of server is mainly used for providing help
to large number of users that is 50 on regular basis.
3OVERVIEW OF NETWORKING
Network Design
IP Addresses Table including netmask
Subnet
Name
Address Mask Dec Mask Assignable Range Broadcast
user 192.18.2.0 /24 255.255.255.0 192.18.2.1 -
192.18.2.254
192.18.2.255
Guest 192.18.3.0 /24 255.255.255.0 192.18.3.1 -
192.18.3.254
192.18.3.255
Server 192.18.1.0 /24 255.255.255.0 192.18.1.1 -
192.18.1.254
192.18.1.255
Network Design
IP Addresses Table including netmask
Subnet
Name
Address Mask Dec Mask Assignable Range Broadcast
user 192.18.2.0 /24 255.255.255.0 192.18.2.1 -
192.18.2.254
192.18.2.255
Guest 192.18.3.0 /24 255.255.255.0 192.18.3.1 -
192.18.3.254
192.18.3.255
Server 192.18.1.0 /24 255.255.255.0 192.18.1.1 -
192.18.1.254
192.18.1.255
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4OVERVIEW OF NETWORKING
Network Topology Diagram
Switch Configuration
Core Switch
Network Topology Diagram
Switch Configuration
Core Switch
5OVERVIEW OF NETWORKING
Switch 1
Switch 1
6OVERVIEW OF NETWORKING
Switch 2
Switch 2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7OVERVIEW OF NETWORKING
Router Configuration
Router Configuration
8OVERVIEW OF NETWORKING
DHCP Configuration
Access Point, Server configuration Guidelines
As per the given guideline the network mainly comprises of subnet that is mainly used providing support
to large number of guest user on the server. It is mainly used for accessing various kinds of files that is
mainly present in various kind of FTP server. It is mainly comprising of restricting the FTP server so that
one cannot get any kind of access to this files. A large number of assumption needs to be properly done
before proper creation of network and various assumption associated with it.
Various kinds of user that is inclusive of guest and user need that is mainly present on
the provided network of the same building. The fact should be taken into consideration
which comprises of various rooms and departments or various kinds of chambers.
Apart from the provided network there is need of high kind of internet connection that
is mainly provided by various kinds of service providers. It can be easily selected by
having the right kind of internet service providers.
It is also assumed that the provided network is mainly dynamic in nature for IP
addressing. It mainly refers to the fact there should be proper kind of proxy server or
DHCP (Dynamic Hybrid Configuration Protocol) can be easily used for by large number of
network that is mainly used for providing service to large number of users. Different
kind of server is mainly needed for selection of right kind of service providers.
The issue is that does not contain any kind of thing that is mainly related to usage of
large number of services. It mainly relates to wireless LAN by proper kind of
development. There is no kind of requirement of wireless LAN so the only thing that is
taken into account is wired LAN.
DHCP Configuration
Access Point, Server configuration Guidelines
As per the given guideline the network mainly comprises of subnet that is mainly used providing support
to large number of guest user on the server. It is mainly used for accessing various kinds of files that is
mainly present in various kind of FTP server. It is mainly comprising of restricting the FTP server so that
one cannot get any kind of access to this files. A large number of assumption needs to be properly done
before proper creation of network and various assumption associated with it.
Various kinds of user that is inclusive of guest and user need that is mainly present on
the provided network of the same building. The fact should be taken into consideration
which comprises of various rooms and departments or various kinds of chambers.
Apart from the provided network there is need of high kind of internet connection that
is mainly provided by various kinds of service providers. It can be easily selected by
having the right kind of internet service providers.
It is also assumed that the provided network is mainly dynamic in nature for IP
addressing. It mainly refers to the fact there should be proper kind of proxy server or
DHCP (Dynamic Hybrid Configuration Protocol) can be easily used for by large number of
network that is mainly used for providing service to large number of users. Different
kind of server is mainly needed for selection of right kind of service providers.
The issue is that does not contain any kind of thing that is mainly related to usage of
large number of services. It mainly relates to wireless LAN by proper kind of
development. There is no kind of requirement of wireless LAN so the only thing that is
taken into account is wired LAN.
9OVERVIEW OF NETWORKING
Security Configuration
Conclusion
From the above discussion it can be easily concluded that this report is all about primary school
in a network which has been designed in such a way by breaking the network in three different kind of
subnet. A proper kind of IP address plan has been created for providing IP address to large number of
available VLAN that is VLAN 10, 20, 30 which is used for server, guest and normal kind of user. The total
configuration of the network has been done by the help of netsim software. Adaptation of DHCP
configuration in the given router mainly helps design of IP address to the device which is connected with
the switch.
Security Configuration
Conclusion
From the above discussion it can be easily concluded that this report is all about primary school
in a network which has been designed in such a way by breaking the network in three different kind of
subnet. A proper kind of IP address plan has been created for providing IP address to large number of
available VLAN that is VLAN 10, 20, 30 which is used for server, guest and normal kind of user. The total
configuration of the network has been done by the help of netsim software. Adaptation of DHCP
configuration in the given router mainly helps design of IP address to the device which is connected with
the switch.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10OVERVIEW OF NETWORKING
References
[1]. Huh, J.H., Otgonchimeg, S. and Seo, K. Advanced metering infrastructure design and test bed
experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid
system. The Journal of Supercomputing, 72(5), pp.1862-1877., 2016.
[2]. Jurado, F. and Rodriguez, P. Sentiment Analysis in monitoring software development processes:
An exploratory case study on GitHub's project issues. Journal of Systems and Software, 104,
pp.82-89., 2015.
[3]. Marchetti, M., Pierazzi, F., Colajanni, M. and Guido, A. Analysis of high volumes of network
traffic for Advanced Persistent Threat detection. Computer Networks, 109, pp.127-141., 2016.
[4]. McCormack, K.P. and Johnson, W.C. Supply chain networks and business process orientation:
advanced strategies and best practices. CRC Press., 2016.
[5]. Pavon-Marino, P., & Izquierdo-Zaragoza, J. L. Net2plan: an open source network planning tool
for bridging the gap between academia and industry. IEEE Network, 29(5), 90-96, 2015).
[6]. Sandhu, R., Gill, H.K. and Sood, S.K. Smart monitoring and controlling of Pandemic Influenza A
(H1N1) using Social Network Analysis and cloud computing. Journal of Computational
Science, 12, pp.11-22., 2016.
References
[1]. Huh, J.H., Otgonchimeg, S. and Seo, K. Advanced metering infrastructure design and test bed
experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid
system. The Journal of Supercomputing, 72(5), pp.1862-1877., 2016.
[2]. Jurado, F. and Rodriguez, P. Sentiment Analysis in monitoring software development processes:
An exploratory case study on GitHub's project issues. Journal of Systems and Software, 104,
pp.82-89., 2015.
[3]. Marchetti, M., Pierazzi, F., Colajanni, M. and Guido, A. Analysis of high volumes of network
traffic for Advanced Persistent Threat detection. Computer Networks, 109, pp.127-141., 2016.
[4]. McCormack, K.P. and Johnson, W.C. Supply chain networks and business process orientation:
advanced strategies and best practices. CRC Press., 2016.
[5]. Pavon-Marino, P., & Izquierdo-Zaragoza, J. L. Net2plan: an open source network planning tool
for bridging the gap between academia and industry. IEEE Network, 29(5), 90-96, 2015).
[6]. Sandhu, R., Gill, H.K. and Sood, S.K. Smart monitoring and controlling of Pandemic Influenza A
(H1N1) using Social Network Analysis and cloud computing. Journal of Computational
Science, 12, pp.11-22., 2016.
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.