0% found this document useful (0 votes)
139 views17 pages

CN Mini Project Report

This document summarizes a mini project report for designing a small business network with a guest network. The network needs to support 70 total users including occasional guest users. It also requires implementing an FTP server for file transfers and using 3, 24 port switches.

Uploaded by

shahlanhassan123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
139 views17 pages

CN Mini Project Report

This document summarizes a mini project report for designing a small business network with a guest network. The network needs to support 70 total users including occasional guest users. It also requires implementing an FTP server for file transfers and using 3, 24 port switches.

Uploaded by

shahlanhassan123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

lOMoARcPSD|25311154

CN Mini Project Report

Computer Networks (SRM Institute of Science and Technology)

Studocu is not sponsored or endorsed by any college or university


Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)
lOMoARcPSD|25311154

Small Business Network Design With Guest Network


A COURSE PROJECT REPORT

By

HAARISH T (RA2011003010632)
SHASHWAT MISHRA (RA2011003010633)
P NARASIMHA SAI NIVAS (RA2011003010634)
RHEA JACOB (RA2011003010635)

Under the guidance of

Mrs. Ida Seraphim

(Assistant Professor, Department of Computing Technologies)

In partial fulfillment for the Course

of

18CSC302J - COMPUTER NETWORKS

in C-TECH

FACULTY OF ENGINEERING AND TECHNOLOGY

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY

Kattankulathur, Chengalpattu District

NOVEMBER 2022

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)


lOMoARcPSD|25311154

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY

(Under Section 3 of UGC Act, 1956)

BONAFIDE CERTIFICATE

Certified that this mini project report "Small Business Network Design With Guest
Network" is the bonafide work of Haarish T (RA2011003010632), Shashwat Mishra
(RA2011003010633), P Narasimha Sai Nivas (RA2011003010634), Rhea Jacob
(RA2011003010635), who carried out the project work under my supervision.

SIGNATURE

Ida Seraphim
Assistant Professor
Department of Computing Technologies
SRM Institute of Science and Technology

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)


lOMoARcPSD|25311154

ACKNOWLEDGEMENT

We express our heartfelt thanks to our honorable Vice Chancellor Dr. C.


MUTHAMIZHCHELVAN, for being the beacon in all our endeavors.

We would like to express our warmth of gratitude to our Registrar Dr. S.


Ponnusamy, for his encouragement

We express our profound gratitude to our Dean (College of Engineering and


Technology) Dr. T. V.Gopal, for bringing out novelty in all executions.

We would like to express our heartfelt thanks to Chairperson, School of


Computing Dr. Revathi Venkataraman, for imparting confidence to complete
our course project

We wish to express our sincere thanks to Course Audit Professor


Dr.Annapurani Panaiyappan, Professor and Head, Department of
Networking and Communications and Course Coordinators for their constant
encouragement and support.

We are highly thankful to our Course project Faculty Ida Seraphim, Assistant
Professor, CTECH, for her assistance, timely suggestion and guidance
throughout the duration of this course project.

We extend my gratitude to our HoD Dr. B. Amutha, Department of Computing


Technologies and my Departmental colleagues for their Support.

Finally, we thank our parents and friends near and dear ones who directly and
indirectly contributed to the successful completion of our project. Above all, I
thank the almighty for showering his blessings on me to complete my Course
project.

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)


lOMoARcPSD|25311154

TABLE OF CONTENTS

CHAPTERS CONTENTS PAGE NO.

1. PROJECT SCOPE
2. OBJECTIVES
3. LITERATURE SURVEY
4. REQUIREMENTS
5. NETWORK PLANNING
6. IP NETWORK DESIGN TABLE
7. NETWORK TOPOLOGY DIAGRAM WITH IP ADDRESSES
8. NETWORK INTEGRATION PLAN
9. NETWORK CONFIGURATION
10. NETWORK TESTING AND VERIFICATION
11. REFERENCES

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)


lOMoARcPSD|25311154

1. PROJECT SCOPE

A small business network has to be designed for an organization. The organization


has occasional guest users (Max 10) visiting the office. There are a total of 70 users
in the organization. A FTP server has to be implemented for file transfer across the
network.

3. LITERATURE SURVEY

S. No. Title of Paper Author’s Names Publication Year


1 Clustering objectives in Amin Shahraki, 2020
wireless sensor networks: A Amir Taherkordi,
survey and research direction Øystein Haugen,
analysis Frank Eliassen
2 End-to-end congestion Habtegebreil Haile, 2021
control approaches for high Karl-Johan Grinnemo,
throughput and low delay in Simone Ferlin,
4G/5G cellular networks Per Hurtig
3 A survey on deep learning Mayra Macas, 2022
for cybersecurity: Progress, Chunming Wu,
challenges, and opportunities Walter Fuertes
4 User authentication on Chen Wang, 2020
mobile devices: Approaches, Yan Wang,
threats and trends Yingying Chen,
Hongbo Liu,
Jian Liu

1. ‘Clustering objectives in wireless sensor networks: A survey and research direction analysis’, by
Amin Shahraki, Amir Taherkordi, Øystein Haugen and Frank Eliassen, reviews comprehensively
existing WSN clustering techniques, their objectives and the network properties supported by
those techniques. After refining more than 500 clustering techniques, they extracted about 215 of
them as the most important ones, which they further review, catergorize and classify based on
clustering objectives and also the network properties such as mobility and heterogeneity. In
addition, statistics are provided based on the chosen metrics, providing highly useful insights into
the design of clustering techniques in WSNs.

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)


lOMoARcPSD|25311154

2. ‘End-to-end congestion control approaches for high throughput and low delay in 4G/5G cellular
networks’, by Habtegebreil Haile, Karl-Johan Grinnemo, Simone Ferlin, Per Hurtig and
AnnaBrunstrom, present end-to-end CCAs that target a high throughput and a low latency over
highly variable network links, and classify them according to the way they address the congestion
control. The work also discusses the deployability of the algorithms. In addition, they provide
insights into possible future research directions, such as coping with a higher degree of variability,
interaction of CCAs in a shared bottleneck, and avenues for synergized research, such as CCAs
assisted by software defined networking and network function virtualization.

3. ‘A survey on deep learning for cybersecurity: Progress, challenges, and opportunities’, by Mayra
Macas, Chunming Wu and Walter Fuertes, comprehensively presents the promising applications
of deep learning, a subfield of AI based on multiple layers of artificial neural networks, in a wide
variety of security tasks. Before critically and comparatively surveying state-of-the-art solutions
from the literature, they discuss the key characteristics of representative deep learning
architectures employed in cybersecurity applications, introduce the emerging trends in deep
learning, and provide an overview of necessary resources like a generic framework and suitable
datasets. They identify the limitations of the reviewed works, and bring forth a vision of the
current challenges of the area, providing valuable insights and good practices for researchers and
developers working on related problems. Finally, they uncover current pain points and outline
directions for future research to address them.

4. ‘User authentication on mobile devices: Approaches, threats and trends’, by Chen Wang, Yan
Wang, Yingying Chen, Hongbo Liu and Jian Liu, surveys the existing authentication methods on
mobile devices. In particular, based on the basic authentication metrics (i.e., knowledge,
ownership and biometrics) used in existing mobile authentication methods, we categorize them
into four categories, including the knowledge-based authentication, physiological biometric-based
authentication, behavioral biometrics-based authentication, and two/multi-factor authentication.
They compare the usability and security level of the existing authentication approaches among
these categories. They also review the existing attacks to these authentication approaches to reveal
their vulnerabilities.

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)


lOMoARcPSD|25311154

4. REQUIREMENTS

Networking Requirement

From the given scenario, we draw the following requirements:


1. Total 70 Users, including guest and LAN network.
2. Server Available
3. 3, 24 port switches
4. Network, 192.168.1.0/24 is proposed for LAN
5. Network, 192.168.2.0/24 is proposed for Guest Network
6. Access control lists are used for restricting access between the guest
and
LAN network.
7. Routers with two Ethernet network cards are proposed for the guest and
LAN network.

Hardware and Software Requirement

1. Modem(Asus BRT-AC828 router)


2. WAN router (DHCP enabled)
3. Switches
4. Personal Computer
5. Network Printer
6. Firewall
7. Vlan
8. VPN
9. Web Hosting
10.Cisco packet tracer

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)


lOMoARcPSD|25311154

5. NETWORK PLANNING

1. The Network is divided into two:


 Admin Network
 Guest Network
2. A FTP server is setup for file transfer across the organization
3. Both LAN and WiFi connection have been provided to users

Admin Network:
 Maximum of 70 users
 All types of access to files in server

Guest Network:
 Maximum of 10 users
 Restricted access to files in server i.e Guest user is only allowed to Read and List
the files in Server

6. IP NETWORK DESIGN TABLE

Network Network Beginning Ending Subnet Mask


Address Address Address
Admin 10.0.0.1 10.0.0.100 10.0.0.170 255.255.255.0
Guest 192.168.0.1 192.168.0.100 192.168.0.110 255.255.255.0

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)


lOMoARcPSD|25311154

7. NETWORK TOPOLOGY DIAGRAM WITH IP ADDRESSES

Main Router: 192.168.10.1


Admin Router: 10.0.0.1
Guest Router: 192.168.0.1
FTP Server (Admin): 10.0.0.100 FTP
Server (Guest): 192.168.0.100

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)


lOMoARcPSD|25311154

8. NETWORK INTEGRATION PLAN

FTP Server:

A File Transfer Protocol (FTP) is used to transfer Computer Files between the
Client and Server in a Network. Here the FTP server is connected to both the
Admin as well as the Guest Router so that both admin and guest can access the
files. However, only restricted access is granted for Guest (i.e List, Read)

Admin Router:

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)


lOMoARcPSD|25311154

Guest Router:

9. NETWORK CONFIGURATION

Main Router
IP Address: 192.168.10.1
Subnet Mask: 255.255.255.0

Switch
FastEthernet 0/1 VLAN 1 default (Connected to Main Router)
FastEthernet 0/2 VLAN 1 default (Connected to Admin Router)
FastEthernet 0/3 VLAN 3 guest (Connected to Guest Router)

Admin Router
DefaultGateway: 192.168.10.1
DNS_Server: 192.168.10.1
IP: 10.0.0.1
Subnet Mask: 255.255.255.0
IP Range: 10.0.0.100 – 10.0.0.170
SSID: Admin WIFI
Password: nimda321

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)


lOMoARcPSD|25311154

Guest Router
DefaultGateway: 192.168.10.1
DNS_Server: 192.168.10.1
IP: 192.168.0.1
Subnet Mask: 255.255.255.0
IP Range: 192.168.0.100 – 192.168.0.110
SSID: Guest WIFI
Password: wifi4321

FTP Server (Admin):


FastEthernet0
DefaultGateway: 10.0.0.1
DNS_Server: 192.168.10.1
IP (Static): 10.0.0.100
Subnet Mask: 255.255.255.0
Username: admin
Password: nimda321
Permissions: RWDNL

FTP Server (Guest):


FastEthernet1
DefaultGateway: 192.168.0.1
DNS_Server: 192.168.10.1
IP (Static): 192.168.0.100
Subnet Mask: 255.255.255.0
Username: guest
Password: 4321
Permissions: RL

Admin Network Devices:


DefaultGateway: 10.0.0.1
DNS_Server: 192.168.10.1
IP: Dynamic

Guest Network Devices:


DefaultGateway: 192.168.0.1
DNS_Server: 192.168.10.1
IP: Dynamic

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)


lOMoARcPSD|25311154

10. NETWORK TESTING AND VERIFICATION

Admin Device:
1. Login

2. Perform any operation on files in sevrer. Here we will se how the delete
operation works

We are going to delete a file named ‘newFile1.txt’

The Admin network has all types of access on the files in the server,
hence the message ‘Deleted file newFile1.txt successfully’ is displayed
and the specified file has been deleted.

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)


lOMoARcPSD|25311154

Guest Device:
1. Login

2. Perform delete operation

We are going to delete a file named ‘newFile1.txt’

Here the guest does not have the access to delete the files in the
server,it only has Read and List, hence the ‘Permission denied’ is
displayed.The guest cannot upload Write,Delete or Rename the files in
the server.

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)


lOMoARcPSD|25311154

3. Perform Read operation

The guest can Read the files in the server and hence this message ‘Transfer
Complete’ is displayed.

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)


lOMoARcPSD|25311154

11. REFERENCES

1. https://www.journals.elsevier.com/computer-networks/most-downloaded-
articles
2. https://www.itjones.com/blogs/2020/3/15/how-to-build-a-computer-network-
for-your-small-business-part-1-the-basics
3. https://www.n-able.com/features/small-network-design
4. https://www.cisco.com/c/en/us/solutions/small-business/resource-
center/networking/how-to-set-up-a-network.html

Downloaded by SHAHLAN M (RA2111003011544) (sm0725@srmist.edu.in)

You might also like