lOMoARcPSD|25311154
CN Mini Project Report
Computer Networks (SRM Institute of Science and Technology)
Studocu is not sponsored or endorsed by any college or university
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
Small Business Network Design With Guest Network
A COURSE PROJECT REPORT
By
HAARISH T (RA2011003010632)
SHASHWAT MISHRA (RA2011003010633)
P NARASIMHA SAI NIVAS (RA2011003010634)
RHEA JACOB (RA2011003010635)
Under the guidance of
Mrs. Ida Seraphim
(Assistant Professor, Department of Computing Technologies)
In partial fulfillment for the Course
of
18CSC302J - COMPUTER NETWORKS
in C-TECH
FACULTY OF ENGINEERING AND TECHNOLOGY
SRM INSTITUTE OF SCIENCE AND TECHNOLOGY
Kattankulathur, Chengalpattu District
NOVEMBER 2022
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
SRM INSTITUTE OF SCIENCE AND TECHNOLOGY
(Under Section 3 of UGC Act, 1956)
BONAFIDE CERTIFICATE
Certified that this mini project report "Small Business Network Design With Guest
Network" is the bonafide work of Haarish T (RA2011003010632), Shashwat Mishra
(RA2011003010633), P Narasimha Sai Nivas (RA2011003010634), Rhea Jacob
(RA2011003010635), who carried out the project work under my supervision.
SIGNATURE
Ida Seraphim
Assistant Professor
Department of Computing Technologies
SRM Institute of Science and Technology
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
ACKNOWLEDGEMENT
We express our heartfelt thanks to our honorable Vice Chancellor Dr. C.
MUTHAMIZHCHELVAN, for being the beacon in all our endeavors.
We would like to express our warmth of gratitude to our Registrar Dr. S.
Ponnusamy, for his encouragement
We express our profound gratitude to our Dean (College of Engineering and
Technology) Dr. T. V.Gopal, for bringing out novelty in all executions.
We would like to express our heartfelt thanks to Chairperson, School of
Computing Dr. Revathi Venkataraman, for imparting confidence to complete
our course project
We wish to express our sincere thanks to Course Audit Professor
Dr.Annapurani Panaiyappan, Professor and Head, Department of
Networking and Communications and Course Coordinators for their constant
encouragement and support.
We are highly thankful to our Course project Faculty Ida Seraphim, Assistant
Professor, CTECH, for her assistance, timely suggestion and guidance
throughout the duration of this course project.
We extend my gratitude to our HoD Dr. B. Amutha, Department of Computing
Technologies and my Departmental colleagues for their Support.
Finally, we thank our parents and friends near and dear ones who directly and
indirectly contributed to the successful completion of our project. Above all, I
thank the almighty for showering his blessings on me to complete my Course
project.
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
TABLE OF CONTENTS
CHAPTERS CONTENTS PAGE NO.
1. PROJECT SCOPE
2. OBJECTIVES
3. LITERATURE SURVEY
4. REQUIREMENTS
5. NETWORK PLANNING
6. IP NETWORK DESIGN TABLE
7. NETWORK TOPOLOGY DIAGRAM WITH IP ADDRESSES
8. NETWORK INTEGRATION PLAN
9. NETWORK CONFIGURATION
10. NETWORK TESTING AND VERIFICATION
11. REFERENCES
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
1. PROJECT SCOPE
A small business network has to be designed for an organization. The organization
has occasional guest users (Max 10) visiting the office. There are a total of 70 users
in the organization. A FTP server has to be implemented for file transfer across the
network.
3. LITERATURE SURVEY
S. No. Title of Paper Author’s Names Publication Year
1 Clustering objectives in Amin Shahraki, 2020
wireless sensor networks: A Amir Taherkordi,
survey and research direction Øystein Haugen,
analysis Frank Eliassen
2 End-to-end congestion Habtegebreil Haile, 2021
control approaches for high Karl-Johan Grinnemo,
throughput and low delay in Simone Ferlin,
4G/5G cellular networks Per Hurtig
3 A survey on deep learning Mayra Macas, 2022
for cybersecurity: Progress, Chunming Wu,
challenges, and opportunities Walter Fuertes
4 User authentication on Chen Wang, 2020
mobile devices: Approaches, Yan Wang,
threats and trends Yingying Chen,
Hongbo Liu,
Jian Liu
1. ‘Clustering objectives in wireless sensor networks: A survey and research direction analysis’, by
Amin Shahraki, Amir Taherkordi, Øystein Haugen and Frank Eliassen, reviews comprehensively
existing WSN clustering techniques, their objectives and the network properties supported by
those techniques. After refining more than 500 clustering techniques, they extracted about 215 of
them as the most important ones, which they further review, catergorize and classify based on
clustering objectives and also the network properties such as mobility and heterogeneity. In
addition, statistics are provided based on the chosen metrics, providing highly useful insights into
the design of clustering techniques in WSNs.
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
2. ‘End-to-end congestion control approaches for high throughput and low delay in 4G/5G cellular
networks’, by Habtegebreil Haile, Karl-Johan Grinnemo, Simone Ferlin, Per Hurtig and
AnnaBrunstrom, present end-to-end CCAs that target a high throughput and a low latency over
highly variable network links, and classify them according to the way they address the congestion
control. The work also discusses the deployability of the algorithms. In addition, they provide
insights into possible future research directions, such as coping with a higher degree of variability,
interaction of CCAs in a shared bottleneck, and avenues for synergized research, such as CCAs
assisted by software defined networking and network function virtualization.
3. ‘A survey on deep learning for cybersecurity: Progress, challenges, and opportunities’, by Mayra
Macas, Chunming Wu and Walter Fuertes, comprehensively presents the promising applications
of deep learning, a subfield of AI based on multiple layers of artificial neural networks, in a wide
variety of security tasks. Before critically and comparatively surveying state-of-the-art solutions
from the literature, they discuss the key characteristics of representative deep learning
architectures employed in cybersecurity applications, introduce the emerging trends in deep
learning, and provide an overview of necessary resources like a generic framework and suitable
datasets. They identify the limitations of the reviewed works, and bring forth a vision of the
current challenges of the area, providing valuable insights and good practices for researchers and
developers working on related problems. Finally, they uncover current pain points and outline
directions for future research to address them.
4. ‘User authentication on mobile devices: Approaches, threats and trends’, by Chen Wang, Yan
Wang, Yingying Chen, Hongbo Liu and Jian Liu, surveys the existing authentication methods on
mobile devices. In particular, based on the basic authentication metrics (i.e., knowledge,
ownership and biometrics) used in existing mobile authentication methods, we categorize them
into four categories, including the knowledge-based authentication, physiological biometric-based
authentication, behavioral biometrics-based authentication, and two/multi-factor authentication.
They compare the usability and security level of the existing authentication approaches among
these categories. They also review the existing attacks to these authentication approaches to reveal
their vulnerabilities.
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
4. REQUIREMENTS
Networking Requirement
From the given scenario, we draw the following requirements:
1. Total 70 Users, including guest and LAN network.
2. Server Available
3. 3, 24 port switches
4. Network, 192.168.1.0/24 is proposed for LAN
5. Network, 192.168.2.0/24 is proposed for Guest Network
6. Access control lists are used for restricting access between the guest
and
LAN network.
7. Routers with two Ethernet network cards are proposed for the guest and
LAN network.
Hardware and Software Requirement
1. Modem(Asus BRT-AC828 router)
2. WAN router (DHCP enabled)
3. Switches
4. Personal Computer
5. Network Printer
6. Firewall
7. Vlan
8. VPN
9. Web Hosting
10.Cisco packet tracer
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
5. NETWORK PLANNING
1. The Network is divided into two:
Admin Network
Guest Network
2. A FTP server is setup for file transfer across the organization
3. Both LAN and WiFi connection have been provided to users
Admin Network:
Maximum of 70 users
All types of access to files in server
Guest Network:
Maximum of 10 users
Restricted access to files in server i.e Guest user is only allowed to Read and List
the files in Server
6. IP NETWORK DESIGN TABLE
Network Network Beginning Ending Subnet Mask
Address Address Address
Admin 10.0.0.1 10.0.0.100 10.0.0.170 255.255.255.0
Guest 192.168.0.1 192.168.0.100 192.168.0.110 255.255.255.0
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
7. NETWORK TOPOLOGY DIAGRAM WITH IP ADDRESSES
Main Router: 192.168.10.1
Admin Router: 10.0.0.1
Guest Router: 192.168.0.1
FTP Server (Admin): 10.0.0.100 FTP
Server (Guest): 192.168.0.100
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
8. NETWORK INTEGRATION PLAN
FTP Server:
A File Transfer Protocol (FTP) is used to transfer Computer Files between the
Client and Server in a Network. Here the FTP server is connected to both the
Admin as well as the Guest Router so that both admin and guest can access the
files. However, only restricted access is granted for Guest (i.e List, Read)
Admin Router:
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
Guest Router:
9. NETWORK CONFIGURATION
Main Router
IP Address: 192.168.10.1
Subnet Mask: 255.255.255.0
Switch
FastEthernet 0/1 VLAN 1 default (Connected to Main Router)
FastEthernet 0/2 VLAN 1 default (Connected to Admin Router)
FastEthernet 0/3 VLAN 3 guest (Connected to Guest Router)
Admin Router
DefaultGateway: 192.168.10.1
DNS_Server: 192.168.10.1
IP: 10.0.0.1
Subnet Mask: 255.255.255.0
IP Range: 10.0.0.100 – 10.0.0.170
SSID: Admin WIFI
Password: nimda321
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
Guest Router
DefaultGateway: 192.168.10.1
DNS_Server: 192.168.10.1
IP: 192.168.0.1
Subnet Mask: 255.255.255.0
IP Range: 192.168.0.100 – 192.168.0.110
SSID: Guest WIFI
Password: wifi4321
FTP Server (Admin):
FastEthernet0
DefaultGateway: 10.0.0.1
DNS_Server: 192.168.10.1
IP (Static): 10.0.0.100
Subnet Mask: 255.255.255.0
Username: admin
Password: nimda321
Permissions: RWDNL
FTP Server (Guest):
FastEthernet1
DefaultGateway: 192.168.0.1
DNS_Server: 192.168.10.1
IP (Static): 192.168.0.100
Subnet Mask: 255.255.255.0
Username: guest
Password: 4321
Permissions: RL
Admin Network Devices:
DefaultGateway: 10.0.0.1
DNS_Server: 192.168.10.1
IP: Dynamic
Guest Network Devices:
DefaultGateway: 192.168.0.1
DNS_Server: 192.168.10.1
IP: Dynamic
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
10. NETWORK TESTING AND VERIFICATION
Admin Device:
1. Login
2. Perform any operation on files in sevrer. Here we will se how the delete
operation works
We are going to delete a file named ‘newFile1.txt’
The Admin network has all types of access on the files in the server,
hence the message ‘Deleted file newFile1.txt successfully’ is displayed
and the specified file has been deleted.
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
Guest Device:
1. Login
2. Perform delete operation
We are going to delete a file named ‘newFile1.txt’
Here the guest does not have the access to delete the files in the
server,it only has Read and List, hence the ‘Permission denied’ is
displayed.The guest cannot upload Write,Delete or Rename the files in
the server.
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
3. Perform Read operation
The guest can Read the files in the server and hence this message ‘Transfer
Complete’ is displayed.
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154
11. REFERENCES
1. https://www.journals.elsevier.com/computer-networks/most-downloaded-
articles
2. https://www.itjones.com/blogs/2020/3/15/how-to-build-a-computer-network-
for-your-small-business-part-1-the-basics
3. https://www.n-able.com/features/small-network-design
4. https://www.cisco.com/c/en/us/solutions/small-business/resource-
center/networking/how-to-set-up-a-network.html
Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)