MN503 Internetworking: Network Design for Primary School Project
VerifiedAdded on 2023/06/11
|9
|1413
|337
Report
AI Summary
This report outlines the design of a new network for a primary school, accommodating both daily users and guests with restricted access. The project scope includes providing full network access to daily users and limited access to guests, specifically to an FTP server, through separate LANs. The design incorporates essential network components such as switches, routers, and DHCP for dynamic IP addressing, along with security measures to protect sensitive information. The network is divided into two subnets: one for guest access and another for daily users with full privileges. The implementation involves Cisco 2811 switches configured with VLANs and access control lists to manage network traffic and enhance security. The report also includes IP addressing tables, network topology diagrams, and configurations for switches, routers, DHCP, and access points, all simulated using Boson Netsim.

Running head: OVERVIEW OF INTERNETWORKING
Overview of Internetworking
Name of the Student
Name of the University
Author’s Note
Overview of Internetworking
Name of the Student
Name of the University
Author’s Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
OVERVIEW OF INTERNETWORKING
Table of Contents
Project Scope:..............................................................................................................................................2
Project requirements:..................................................................................................................................2
Network Design...........................................................................................................................................3
IP addresses table....................................................................................................................................3
Network Topology Diagram.....................................................................................................................4
Switch Configuration...............................................................................................................................4
Router Configuration...............................................................................................................................5
DHCP Configuration.................................................................................................................................6
Access Point.............................................................................................................................................6
Security Configuration.............................................................................................................................7
Conclusion...................................................................................................................................................7
Bibliography................................................................................................................................................8
OVERVIEW OF INTERNETWORKING
Table of Contents
Project Scope:..............................................................................................................................................2
Project requirements:..................................................................................................................................2
Network Design...........................................................................................................................................3
IP addresses table....................................................................................................................................3
Network Topology Diagram.....................................................................................................................4
Switch Configuration...............................................................................................................................4
Router Configuration...............................................................................................................................5
DHCP Configuration.................................................................................................................................6
Access Point.............................................................................................................................................6
Security Configuration.............................................................................................................................7
Conclusion...................................................................................................................................................7
Bibliography................................................................................................................................................8

2
OVERVIEW OF INTERNETWORKING
Project Scope:
The fundamental extent of the venture is related with the degenerating another system for a grade
school that would use by the schools claim clients alongside the visitors who might visit the school
periodically. The day by day clients is around 50 though the visitor who might visit the school would be
not more than 10. The principle point of crating this system is to provide a restricted access to the visitor
clients and to give a full access of the system to the every day clients. The visitor's clients would be
confined to the utilization of the FTP Server as it were.
Project requirements:
The accompanying recorded things are the real necessities of the new system that will be created:
The new system that would be produced would comprise of a FTP server and this server would
be gotten to by the visitor clients though alternate parts of the system would stay hindered for
them and for that a different LAN would be utilized that would be used by the visitor clients.
Along with the utilization of a LAN for the visitor clients, another LAN should be incorporated
into the new system which would be utilized by the every day clients all together have a full
access of the system. This system would stay hindered for the visitor clients.
In the new system there is additionally a need of including other sort of servers that would help
every one of the clients in doing their day by day works.
This Blocking of the visitor clients is for the most part done with a specific end goal to securing
the various kind sort of touchy information that are available inside the system.
General Network segments which masculine incorporates the switches and switches are to be
actualized in the new system which are to be arranged with a specific end goal to control the
entrance to the system. The FTP server is additionally to be arranged.
The new system would have two subnets for two sort of clients. One of the subnet would be
utilized by the visitor organize just while the other subnet is to be utilized by the day by day
clients. The subnet utilized by the visitor would have a limited access though another subnet
would be for the client which would give a full access to the system.
OVERVIEW OF INTERNETWORKING
Project Scope:
The fundamental extent of the venture is related with the degenerating another system for a grade
school that would use by the schools claim clients alongside the visitors who might visit the school
periodically. The day by day clients is around 50 though the visitor who might visit the school would be
not more than 10. The principle point of crating this system is to provide a restricted access to the visitor
clients and to give a full access of the system to the every day clients. The visitor's clients would be
confined to the utilization of the FTP Server as it were.
Project requirements:
The accompanying recorded things are the real necessities of the new system that will be created:
The new system that would be produced would comprise of a FTP server and this server would
be gotten to by the visitor clients though alternate parts of the system would stay hindered for
them and for that a different LAN would be utilized that would be used by the visitor clients.
Along with the utilization of a LAN for the visitor clients, another LAN should be incorporated
into the new system which would be utilized by the every day clients all together have a full
access of the system. This system would stay hindered for the visitor clients.
In the new system there is additionally a need of including other sort of servers that would help
every one of the clients in doing their day by day works.
This Blocking of the visitor clients is for the most part done with a specific end goal to securing
the various kind sort of touchy information that are available inside the system.
General Network segments which masculine incorporates the switches and switches are to be
actualized in the new system which are to be arranged with a specific end goal to control the
entrance to the system. The FTP server is additionally to be arranged.
The new system would have two subnets for two sort of clients. One of the subnet would be
utilized by the visitor organize just while the other subnet is to be utilized by the day by day
clients. The subnet utilized by the visitor would have a limited access though another subnet
would be for the client which would give a full access to the system.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
OVERVIEW OF INTERNETWORKING
Network Design
IP addresses table
Subnet
Name
Address Mask Dec Mask Assignable Range Broadcast
user 192.18.20.0 /24 255.255.255.0 192.18.20.1 -
192.18.20.254
192.18.20.255
Guest 192.18.30.0 /24 255.255.255.0 192.18.30.1 -
192.18.30.254
192.18.30.255
Server 192.18.10.0 /24 255.255.255.0 192.18.10.1 -
179.18.10.254
192.18.10.255
OVERVIEW OF INTERNETWORKING
Network Design
IP addresses table
Subnet
Name
Address Mask Dec Mask Assignable Range Broadcast
user 192.18.20.0 /24 255.255.255.0 192.18.20.1 -
192.18.20.254
192.18.20.255
Guest 192.18.30.0 /24 255.255.255.0 192.18.30.1 -
192.18.30.254
192.18.30.255
Server 192.18.10.0 /24 255.255.255.0 192.18.10.1 -
179.18.10.254
192.18.10.255
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
OVERVIEW OF INTERNETWORKING
Network Topology Diagram
Switch Configuration
OVERVIEW OF INTERNETWORKING
Network Topology Diagram
Switch Configuration

5
OVERVIEW OF INTERNETWORKING
Router Configuration
OVERVIEW OF INTERNETWORKING
Router Configuration
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
OVERVIEW OF INTERNETWORKING
DHCP Configuration
Access Point
Certain supposition have been made while considering making the new system. This presumptions
principally incorporates the accompanying:
The first thing that is accepted is that all the everyday clients who might utilize the new system
should be available in a similar building. The day by day clients' should be available in various
areas of the building yet the building ought to be the same.
The second presumption can be thought to be like the main supposition yet the main distinction
that lies between this two suspicions is that, the visitor clients are considered will be considered
for this situation and also the visitors should be available in a similar building.
Thirdly it is expected that there exists the accessibility of a top of the line web speed for the
system and consequently the specialist co-op should be picked in like manner.
The last supposition that is made is that the new system which is to be produced is related with
the utilization of the Dynamic IP tending to and by this it for the most part implies that there
should exists an intermediary server or a DHCP in the system, for the web association that will
be utilized. Also the new system would comprise of different servers that are to be set in various
segments of the building.
OVERVIEW OF INTERNETWORKING
DHCP Configuration
Access Point
Certain supposition have been made while considering making the new system. This presumptions
principally incorporates the accompanying:
The first thing that is accepted is that all the everyday clients who might utilize the new system
should be available in a similar building. The day by day clients' should be available in various
areas of the building yet the building ought to be the same.
The second presumption can be thought to be like the main supposition yet the main distinction
that lies between this two suspicions is that, the visitor clients are considered will be considered
for this situation and also the visitors should be available in a similar building.
Thirdly it is expected that there exists the accessibility of a top of the line web speed for the
system and consequently the specialist co-op should be picked in like manner.
The last supposition that is made is that the new system which is to be produced is related with
the utilization of the Dynamic IP tending to and by this it for the most part implies that there
should exists an intermediary server or a DHCP in the system, for the web association that will
be utilized. Also the new system would comprise of different servers that are to be set in various
segments of the building.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
OVERVIEW OF INTERNETWORKING
Security Configuration
Conclusion
The plan of the system is made in Boson Netsim and for the arrangement of the system a cisco 2811
switch is utilized and it is designed by making three separate vlan on the quick Ethernet 0/0 interface. It
is likewise arranged with DHCP address to such an extent that when the vlan are made in the switch the
gadget are distributed with the IP address naturally. The layer three switch is utilized and designed as a
server to such an extent that it can be utilized for administration of the vlan from a solitary point. The
layer two switch that are utilized for the dispersion and it is designed as customer for consequently
getting the subtle elements of the vlan arranged in the upper level switch. For expanding the security of
the system the entrance control list design is utilized as a part of the center switch and connected in the
vlan 30 for confining one of the vlan to interface with the other vlan.
OVERVIEW OF INTERNETWORKING
Security Configuration
Conclusion
The plan of the system is made in Boson Netsim and for the arrangement of the system a cisco 2811
switch is utilized and it is designed by making three separate vlan on the quick Ethernet 0/0 interface. It
is likewise arranged with DHCP address to such an extent that when the vlan are made in the switch the
gadget are distributed with the IP address naturally. The layer three switch is utilized and designed as a
server to such an extent that it can be utilized for administration of the vlan from a solitary point. The
layer two switch that are utilized for the dispersion and it is designed as customer for consequently
getting the subtle elements of the vlan arranged in the upper level switch. For expanding the security of
the system the entrance control list design is utilized as a part of the center switch and connected in the
vlan 30 for confining one of the vlan to interface with the other vlan.

8
OVERVIEW OF INTERNETWORKING
Bibliography
[1]. Atwater, E., Bocovich, C., Hengartner, U. and Goldberg, I. Live Lesson: Netsim: Network
simulation and hacking for high schoolers. In 2017 {USENIX} Workshop on Advances in Security
Education ({ASE} 17). USENIX} Association}., 2017 August.
[2]. Benton, A., Arora, R. and Dredze, M. Learning multiview embeddings of twitter users.
In Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics
(Volume 2: Short Papers) (Vol. 2, pp. 14-19)., 2016.
[3]. Cuppens, F. WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks
Simulator. In Security of Industrial Control Systems and Cyber Physical Systems: First Workshop,
CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015
Revised Selected Papers (Vol. 9588, p. 63). Springer., 2016, June.
[4]. Nayak, P. and Sinha, P. Analysis of Random Way Point and Random Walk Mobility Model for
Reactive Routing Protocols for MANET Using NetSim Simulator. In Artificial Intelligence,
Modelling and Simulation (AIMS), 2015 3rd International Conference on (pp. 427-432). IEEE.,
2015 December.
[5]. Peng, J., Li, H., Wang, Y. and Chen, J. A web tool for measuring gene semantic similarities by
combining Gene Ontology and gene co-function networks. In Proceedings of the 6th ACM
Conference on Bioinformatics, Computational Biology and Health Informatics (pp. 678-679).
ACM., 2015 September.
[6]. Saifuddin, K.M., Ahmed, A.S., Reza, K.F., Alam, S.S. and Rahman, S. Performance analysis of
cognitive radio: Netsim viewpoint. In Electrical Information and Communication Technology
(EICT), 2017 3rd International Conference on (pp. 1-6). IEEE., 2017 December.
[7]. Singh, G. and Singh, H. Performance Evaluation of MANET Routing Protocols using NETSIM. i-
Manager's Journal on Information Technology, 6(1), p.8., 2016.
[8]. Singh, G., Cheema, A.K. and Kapoor, N. Performance Evaluation of Routing Protocol in Internet
of Things using Netsim. International Journal, 8(3)., 2017.
OVERVIEW OF INTERNETWORKING
Bibliography
[1]. Atwater, E., Bocovich, C., Hengartner, U. and Goldberg, I. Live Lesson: Netsim: Network
simulation and hacking for high schoolers. In 2017 {USENIX} Workshop on Advances in Security
Education ({ASE} 17). USENIX} Association}., 2017 August.
[2]. Benton, A., Arora, R. and Dredze, M. Learning multiview embeddings of twitter users.
In Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics
(Volume 2: Short Papers) (Vol. 2, pp. 14-19)., 2016.
[3]. Cuppens, F. WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks
Simulator. In Security of Industrial Control Systems and Cyber Physical Systems: First Workshop,
CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015
Revised Selected Papers (Vol. 9588, p. 63). Springer., 2016, June.
[4]. Nayak, P. and Sinha, P. Analysis of Random Way Point and Random Walk Mobility Model for
Reactive Routing Protocols for MANET Using NetSim Simulator. In Artificial Intelligence,
Modelling and Simulation (AIMS), 2015 3rd International Conference on (pp. 427-432). IEEE.,
2015 December.
[5]. Peng, J., Li, H., Wang, Y. and Chen, J. A web tool for measuring gene semantic similarities by
combining Gene Ontology and gene co-function networks. In Proceedings of the 6th ACM
Conference on Bioinformatics, Computational Biology and Health Informatics (pp. 678-679).
ACM., 2015 September.
[6]. Saifuddin, K.M., Ahmed, A.S., Reza, K.F., Alam, S.S. and Rahman, S. Performance analysis of
cognitive radio: Netsim viewpoint. In Electrical Information and Communication Technology
(EICT), 2017 3rd International Conference on (pp. 1-6). IEEE., 2017 December.
[7]. Singh, G. and Singh, H. Performance Evaluation of MANET Routing Protocols using NETSIM. i-
Manager's Journal on Information Technology, 6(1), p.8., 2016.
[8]. Singh, G., Cheema, A.K. and Kapoor, N. Performance Evaluation of Routing Protocol in Internet
of Things using Netsim. International Journal, 8(3)., 2017.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.