MN503 - Network Design: Primary School with Guest Network (LAN)
VerifiedAdded on  2023/06/11
|9
|1422
|474
Report
AI Summary
This report provides a detailed network solution for a primary school, focusing on segmenting the network into three subnets: server, guest, and primary users, each with its own VLAN. The design incorporates a primary FTP server for data storage and implements security measures to restrict guest access to the primary user network. The report outlines the hardware and configurations required, including DHCP setup on the router to automate IP address allocation, and emphasizes the importance of VLAN Trunking Protocol (VTP) for efficient VLAN management across switches. The security configuration ensures that unauthorized users cannot access the guest network. The document concludes by highlighting the importance of identifying network requirements and proper IP addressing for efficient and secure network operation.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: OVERVIEW OF INTERNETWORKING
Overview of Internetworking
Name of the Student
Name of the University
Author’s Note
Overview of Internetworking
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
OVERVIEW OF INTERNETWORKING
Table of Contents
1. Project Scope:..........................................................................................................................................2
2. Project requirements:..............................................................................................................................2
3. Network Design.......................................................................................................................................3
4. IP Addresses Table...................................................................................................................................3
5. Network Topology Diagram.....................................................................................................................4
5.1. Switch Configuration........................................................................................................................4
5.2. Router Configuration........................................................................................................................5
5.3. DHCP Configuration..........................................................................................................................6
5.4. Access Point......................................................................................................................................6
5.5. Security Configuration......................................................................................................................6
6. Conclusion...............................................................................................................................................6
Bibliography................................................................................................................................................8
OVERVIEW OF INTERNETWORKING
Table of Contents
1. Project Scope:..........................................................................................................................................2
2. Project requirements:..............................................................................................................................2
3. Network Design.......................................................................................................................................3
4. IP Addresses Table...................................................................................................................................3
5. Network Topology Diagram.....................................................................................................................4
5.1. Switch Configuration........................................................................................................................4
5.2. Router Configuration........................................................................................................................5
5.3. DHCP Configuration..........................................................................................................................6
5.4. Access Point......................................................................................................................................6
5.5. Security Configuration......................................................................................................................6
6. Conclusion...............................................................................................................................................6
Bibliography................................................................................................................................................8

2
OVERVIEW OF INTERNETWORKING
1. Project Scope:
The network solution is prepared for the primary school and the main scope identified for the
development of the local area network solution is that the guest and the primary user network should
be divided into two different subnet and for increasing the security of the server it is also kept in
another subnet. The guest should be restricted to access the primary user network consisting of 50 PCs
connected in the subnet. The FTP server is deployed in a different subnet and it is allowed to be
accessed by the guests. The hardware and the configuration that should be applied for the development
of the network solution should be identified for the development of the network solution. The number
of daily users using the network should be identified for dividing the network into different subnet and
reducing the congestion in the network. The selection of the ISP is also important for the improvement
of the performance of the network and the ISP should offer high speed internet service. The type of
network cables used for connecting the network device should be identified for reducing the clogs and
increase the efficiency of the network. The configuration of the DHCP address in the router interface
helps in reducing the effort of the network administrator to manually assign the IP address to the PC
connected in the different vlan and increase the scalability of the network.
2. Project requirements:
The network solution off the primary school should be developed following the below requirements
such as:
ď‚· The network should be consisted of a primary FTP server that would store the files and the data
generated form the different sources of the school network.
ď‚· The network should be divided into three subnets i.e., server, guest and the primary users and
three vlan should be created for connecting the network devices for each of the vlan.
ď‚· The needs of the user connected in the primary school should be identified for the development
of the network solution.
ď‚· The guest should be blocked from connecting with the primary users according to the business
rules of the primary school
ď‚· The routers and the switches installed in the network must be configured according to the
requirement and it should be secured from external agents.
OVERVIEW OF INTERNETWORKING
1. Project Scope:
The network solution is prepared for the primary school and the main scope identified for the
development of the local area network solution is that the guest and the primary user network should
be divided into two different subnet and for increasing the security of the server it is also kept in
another subnet. The guest should be restricted to access the primary user network consisting of 50 PCs
connected in the subnet. The FTP server is deployed in a different subnet and it is allowed to be
accessed by the guests. The hardware and the configuration that should be applied for the development
of the network solution should be identified for the development of the network solution. The number
of daily users using the network should be identified for dividing the network into different subnet and
reducing the congestion in the network. The selection of the ISP is also important for the improvement
of the performance of the network and the ISP should offer high speed internet service. The type of
network cables used for connecting the network device should be identified for reducing the clogs and
increase the efficiency of the network. The configuration of the DHCP address in the router interface
helps in reducing the effort of the network administrator to manually assign the IP address to the PC
connected in the different vlan and increase the scalability of the network.
2. Project requirements:
The network solution off the primary school should be developed following the below requirements
such as:
ď‚· The network should be consisted of a primary FTP server that would store the files and the data
generated form the different sources of the school network.
ď‚· The network should be divided into three subnets i.e., server, guest and the primary users and
three vlan should be created for connecting the network devices for each of the vlan.
ď‚· The needs of the user connected in the primary school should be identified for the development
of the network solution.
ď‚· The guest should be blocked from connecting with the primary users according to the business
rules of the primary school
ď‚· The routers and the switches installed in the network must be configured according to the
requirement and it should be secured from external agents.

3
OVERVIEW OF INTERNETWORKING
ď‚· The vlan should be created in the core switch and the switch should be configured with VTP
protocol such that the vlan can be accessed from the distribution level switch configured as a
client.
ď‚· Proper name should be used for the vlan such that the network can be troubleshoot if any error
occurs in the configuration of the network.
ď‚· The router should be configured with DHCP configuration and the interface should be broken
down for automatically allocating the IP address to the PC connected in different vlan
For the development of the network solution the following things are assumed that are listed below:
3. Network Design
4. IP Addresses Table
Subnet
Name
Address Mask Dec Mask Assignable Range Broadcast
user 192.22.2.0 /24 255.255.255.0 192.22.2.1 -
192.22.2.254
192.22.2.255
Guest 192.22.3.0 /24 255.255.255.0 192.22.3.1 -
192.22.3.254
192.2.3.255
Server 192.22.1.0 /24 255.255.255.0 192.22.1.1 -
179.22.1.254
192.22.1.255
OVERVIEW OF INTERNETWORKING
ď‚· The vlan should be created in the core switch and the switch should be configured with VTP
protocol such that the vlan can be accessed from the distribution level switch configured as a
client.
ď‚· Proper name should be used for the vlan such that the network can be troubleshoot if any error
occurs in the configuration of the network.
ď‚· The router should be configured with DHCP configuration and the interface should be broken
down for automatically allocating the IP address to the PC connected in different vlan
For the development of the network solution the following things are assumed that are listed below:
3. Network Design
4. IP Addresses Table
Subnet
Name
Address Mask Dec Mask Assignable Range Broadcast
user 192.22.2.0 /24 255.255.255.0 192.22.2.1 -
192.22.2.254
192.22.2.255
Guest 192.22.3.0 /24 255.255.255.0 192.22.3.1 -
192.22.3.254
192.2.3.255
Server 192.22.1.0 /24 255.255.255.0 192.22.1.1 -
179.22.1.254
192.22.1.255
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
OVERVIEW OF INTERNETWORKING
5. Network Topology Diagram
5.1. Switch Configuration
OVERVIEW OF INTERNETWORKING
5. Network Topology Diagram
5.1. Switch Configuration

5
OVERVIEW OF INTERNETWORKING
5.2. Router Configuration
OVERVIEW OF INTERNETWORKING
5.2. Router Configuration

6
OVERVIEW OF INTERNETWORKING
5.3. DHCP Configuration
5.4. Access Point
For the configuration of the access point the location of the access point should be identified and it
should be configured for connecting the wireless devices with the network. Different assumption should
be made for the development of the network solution. The number of average user using the guest
network should be identified for the installation of the access point in the network. The areas of the
installation should be clear and it should be secured with the application of encryption algorithm such
that the unauthorized users does not have the access of the guest network.
5.5. Security Configuration
6. Conclusion
From the above report it can be finish up the investigation of the extension and the necessity of the task
is basic for the design of the primary school. The recognizable proof of the prerequisite aides in
distinguishing the system equipment needs and the conventions required for the setup of the system.
OVERVIEW OF INTERNETWORKING
5.3. DHCP Configuration
5.4. Access Point
For the configuration of the access point the location of the access point should be identified and it
should be configured for connecting the wireless devices with the network. Different assumption should
be made for the development of the network solution. The number of average user using the guest
network should be identified for the installation of the access point in the network. The areas of the
installation should be clear and it should be secured with the application of encryption algorithm such
that the unauthorized users does not have the access of the guest network.
5.5. Security Configuration
6. Conclusion
From the above report it can be finish up the investigation of the extension and the necessity of the task
is basic for the design of the primary school. The recognizable proof of the prerequisite aides in
distinguishing the system equipment needs and the conventions required for the setup of the system.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
OVERVIEW OF INTERNETWORKING
The IP tends to that are required for the arrangement of the interfaces of the VLAN and the Ethernet
cards ought to be recorded. The switch ought to be arranged with DHCP design to such an extent that
the PC associated with every one of the interface ought to be naturally doled out with the IP address.
The between vlan directing ought to likewise be done with the end goal that the diverse clients
associated in the system ought to have the capacity to send and get information bundles in the system.
The setup of the entrance control rundown ought to be utilized for meeting the business tenets of the
school and confining the visitor to speak with the essential client vlan.
OVERVIEW OF INTERNETWORKING
The IP tends to that are required for the arrangement of the interfaces of the VLAN and the Ethernet
cards ought to be recorded. The switch ought to be arranged with DHCP design to such an extent that
the PC associated with every one of the interface ought to be naturally doled out with the IP address.
The between vlan directing ought to likewise be done with the end goal that the diverse clients
associated in the system ought to have the capacity to send and get information bundles in the system.
The setup of the entrance control rundown ought to be utilized for meeting the business tenets of the
school and confining the visitor to speak with the essential client vlan.

8
OVERVIEW OF INTERNETWORKING
Bibliography
[1]. Atwater, E., Bocovich, C., Hengartner, U. and Goldberg, I. Live Lesson: Netsim: Network
simulation and hacking for high schoolers. In 2017 {USENIX} Workshop on Advances in Security
Education ({ASE} 17). USENIX} Association}., 2017 August.
[2]. Benton, A., Arora, R. and Dredze, M. Learning multiview embeddings of twitter users.
In Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics
(Volume 2: Short Papers) (Vol. 2, pp. 14-19)., 2016.
[3]. Cuppens, F. WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks
Simulator. In Security of Industrial Control Systems and Cyber Physical Systems: First Workshop,
CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015
Revised Selected Papers (Vol. 9588, p. 63). Springer., 2016, June.
[4]. Nayak, P. and Sinha, P. Analysis of Random Way Point and Random Walk Mobility Model for
Reactive Routing Protocols for MANET Using NetSim Simulator. In Artificial Intelligence,
Modelling and Simulation (AIMS), 2015 3rd International Conference on (pp. 427-432). IEEE.,
2015 December.
[5]. Peng, J., Li, H., Wang, Y. and Chen, J. A web tool for measuring gene semantic similarities by
combining Gene Ontology and gene co-function networks. In Proceedings of the 6th ACM
Conference on Bioinformatics, Computational Biology and Health Informatics (pp. 678-679).
ACM., 2015 September.
[6]. Saifuddin, K.M., Ahmed, A.S., Reza, K.F., Alam, S.S. and Rahman, S. Performance analysis of
cognitive radio: Netsim viewpoint. In Electrical Information and Communication Technology
(EICT), 2017 3rd International Conference on (pp. 1-6). IEEE., 2017 December.
[7]. Singh, G. and Singh, H. Performance Evaluation of MANET Routing Protocols using NETSIM. i-
Manager's Journal on Information Technology, 6(1), p.8., 2016.
[8]. Singh, G., Cheema, A.K. and Kapoor, N. Performance Evaluation of Routing Protocol in Internet
of Things using Netsim. International Journal, 8(3)., 2017.
OVERVIEW OF INTERNETWORKING
Bibliography
[1]. Atwater, E., Bocovich, C., Hengartner, U. and Goldberg, I. Live Lesson: Netsim: Network
simulation and hacking for high schoolers. In 2017 {USENIX} Workshop on Advances in Security
Education ({ASE} 17). USENIX} Association}., 2017 August.
[2]. Benton, A., Arora, R. and Dredze, M. Learning multiview embeddings of twitter users.
In Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics
(Volume 2: Short Papers) (Vol. 2, pp. 14-19)., 2016.
[3]. Cuppens, F. WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks
Simulator. In Security of Industrial Control Systems and Cyber Physical Systems: First Workshop,
CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015
Revised Selected Papers (Vol. 9588, p. 63). Springer., 2016, June.
[4]. Nayak, P. and Sinha, P. Analysis of Random Way Point and Random Walk Mobility Model for
Reactive Routing Protocols for MANET Using NetSim Simulator. In Artificial Intelligence,
Modelling and Simulation (AIMS), 2015 3rd International Conference on (pp. 427-432). IEEE.,
2015 December.
[5]. Peng, J., Li, H., Wang, Y. and Chen, J. A web tool for measuring gene semantic similarities by
combining Gene Ontology and gene co-function networks. In Proceedings of the 6th ACM
Conference on Bioinformatics, Computational Biology and Health Informatics (pp. 678-679).
ACM., 2015 September.
[6]. Saifuddin, K.M., Ahmed, A.S., Reza, K.F., Alam, S.S. and Rahman, S. Performance analysis of
cognitive radio: Netsim viewpoint. In Electrical Information and Communication Technology
(EICT), 2017 3rd International Conference on (pp. 1-6). IEEE., 2017 December.
[7]. Singh, G. and Singh, H. Performance Evaluation of MANET Routing Protocols using NETSIM. i-
Manager's Journal on Information Technology, 6(1), p.8., 2016.
[8]. Singh, G., Cheema, A.K. and Kapoor, N. Performance Evaluation of Routing Protocol in Internet
of Things using Netsim. International Journal, 8(3)., 2017.
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.