MN503 - Internetworking: Designing a School Network with Guest Access

Verified

Added on  2023/06/11

|9
|1396
|428
Report
AI Summary
This report details the design and implementation of a network for a primary school, incorporating a separate guest network with restricted access to an FTP server. The network utilizes VLANs, a Cisco 2811 router configured with DHCP for automatic IP address allocation, and a layer-3 switch for centralized VLAN management. Security is enhanced through access control lists (ACLs) to prevent guest network access to the internal network. The design assumes a single building for all users, high-speed internet availability, and dynamic IP addressing. The report includes network topology diagrams, IP addressing schemes, and configurations for switches and routers, all created and simulated using Boson Netsim.
Document Page
Running head: OVERVIEW OF INTERNETWORKING
Overview of Internetworking
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
OVERVIEW OF INTERNETWORKING
Table of Contents
Project Scope:..............................................................................................................................................2
Project requirements:..................................................................................................................................2
Network Design...........................................................................................................................................3
IP addresses table....................................................................................................................................3
Network Topology Diagram.....................................................................................................................4
Switch Configuration...............................................................................................................................4
Router Configuration...............................................................................................................................5
DHCP Configuration.................................................................................................................................5
Access Point.............................................................................................................................................6
Security Configuration.............................................................................................................................6
Conclusion...................................................................................................................................................6
Bibliography................................................................................................................................................8
Document Page
2
OVERVIEW OF INTERNETWORKING
Project Scope:
The main scope of the project is associated with the devolving a new network for a primary school that
would use by the schools own users along with the guests who would be visiting the school occasionally.
The daily users is around 50 whereas the guest who would be visiting the school would be not more
than 10. The main aim of crating this network is for the purpose of providing a limited access to the
guest users and to provide a full access of the network to the daily users. The guest’s users would be
restricted to the usage of the FTP Server only.
Project requirements:
The following listed items are the major requirements of the new network that is to be developed:
The new network that would be developed would be consisting of a FTP server and this server
would be accessed by the guest users whereas the other portions of the network would remain
blocked for them and for that a separate LAN would be used that would be utilized by the guest
users.
Along with the usage of a LAN for the guest users, another LAN needs to be included in the new
network which would be used by the daily users in order have a full access of the network. This
network would remain blocked for the guest users.
In the new network there is also a need of including other kind of servers that would be helping
all the users in doing their daily works.
This Blocking of the guest users is generally done in order to securing the varios kind kind of
sensitive data that are present inside the network.
General Network components which manly includes the switches and routers are to be
implemented in the new network which are to be configured in order to control the access to
the network. The FTP server is also to be configured.
The new network would have two subnets for two kind of users. One of the subnet would be
used by the guest network only whereas the other subnet is to be used by the daily users. The
subnet used by the guest would be having a restricted access whereas the another subnet
would be for the user which would be providing a full access to the network.
Document Page
3
OVERVIEW OF INTERNETWORKING
Network Design
IP addresses table
Subnet
Name
Address Mask Dec Mask Assignable Range Broadcast
user 192.18.2.0 /24 255.255.255.0 192.18.2.1 -
192.18.2.254
192.18.2.255
Guest 192.18.3.0 /24 255.255.255.0 192.18.3.1 -
192.18.3.254
192.18.3.255
Server 192.18.1.0 /24 255.255.255.0 192.18.1.1 -
179.18.1.254
192.18.1.255
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
OVERVIEW OF INTERNETWORKING
Network Topology Diagram
Switch Configuration
Document Page
5
OVERVIEW OF INTERNETWORKING
Router Configuration
DHCP Configuration
Document Page
6
OVERVIEW OF INTERNETWORKING
Access Point
Certain assumption have been made while thinking about creating the new network. This assumptions
mainly includes the following:
The first thing that is assumed is that all the daily users who would be using the new network
need to be present in the same building. The daily users’ needs to be present in different
sections of the building but the building should be the same.
The second assumption can be considered to be similar to the first assumption but the only
difference that lies between this two assumptions is that, the guest users are considered are
considered in this case and similarly the guests needs to be present in the same building.
Thirdly it is assumed that there exists the availability of a high end internet speed for the
network and for this reason the service provider needs to be chosen accordingly.
The last assumption that is made is that the new network which is to be developed is associated
with the usage of the Dynamic IP addressing and by this it generally means that there should
exists a proxy server or a DHCP in the network, for the internet connection that is to be used.
Additionally the new network would be consisting of other servers that are to be placed in
different sections of the building.
Security Configuration
Conclusion
The design of the network is created in Boson Netsim and for the configuration of the network a cisco
2811 router is used and it is configured by creating three separate vlan on the fast Ethernet 0/0
interface. It is also configured with DHCP address such that when the vlan are created in the switch the
device are allocated with the IP address automatically. The layer three switch is used and configured as a
server such that it can be used for management of the vlan from a single point. The layer two switch
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
OVERVIEW OF INTERNETWORKING
that are used for the distribution and it is configured as client for automatically fetching the details of
the vlan configured in the upper level switch. For increasing the security of the network the access
control list configuration is used in the core switch and applied in the vlan 30 for restricting one of the
vlan to connect with the other vlan.
Document Page
8
OVERVIEW OF INTERNETWORKING
Bibliography
[1]. Atwater, E., Bocovich, C., Hengartner, U. and Goldberg, I. Live Lesson: Netsim: Network
simulation and hacking for high schoolers. In 2017 {USENIX} Workshop on Advances in Security
Education ({ASE} 17). USENIX} Association}., 2017 August.
[2]. Benton, A., Arora, R. and Dredze, M. Learning multiview embeddings of twitter users.
In Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics
(Volume 2: Short Papers) (Vol. 2, pp. 14-19)., 2016.
[3]. Cuppens, F. WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks
Simulator. In Security of Industrial Control Systems and Cyber Physical Systems: First Workshop,
CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015
Revised Selected Papers (Vol. 9588, p. 63). Springer., 2016, June.
[4]. Nayak, P. and Sinha, P. Analysis of Random Way Point and Random Walk Mobility Model for
Reactive Routing Protocols for MANET Using NetSim Simulator. In Artificial Intelligence,
Modelling and Simulation (AIMS), 2015 3rd International Conference on (pp. 427-432). IEEE.,
2015 December.
[5]. Peng, J., Li, H., Wang, Y. and Chen, J. A web tool for measuring gene semantic similarities by
combining Gene Ontology and gene co-function networks. In Proceedings of the 6th ACM
Conference on Bioinformatics, Computational Biology and Health Informatics (pp. 678-679).
ACM., 2015 September.
[6]. Saifuddin, K.M., Ahmed, A.S., Reza, K.F., Alam, S.S. and Rahman, S. Performance analysis of
cognitive radio: Netsim viewpoint. In Electrical Information and Communication Technology
(EICT), 2017 3rd International Conference on (pp. 1-6). IEEE., 2017 December.
[7]. Singh, G. and Singh, H. Performance Evaluation of MANET Routing Protocols using NETSIM. i-
Manager's Journal on Information Technology, 6(1), p.8., 2016.
[8]. Singh, G., Cheema, A.K. and Kapoor, N. Performance Evaluation of Routing Protocol in Internet
of Things using Netsim. International Journal, 8(3)., 2017.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]