0% found this document useful (0 votes)
21 views54 pages

Assignment 1 EC4060: Jenarththan A. 2021/E/006 Group Cg1 Semester 4 14 DEC 2023

The document outlines the network design for a three-story building, detailing the allocation of PCs, printers, and WiFi access points for various departments. It includes IP address allocation tables for efficient network segmentation using VLANs, along with security measures and router configurations for inter-VLAN communication. The design aims to enhance workflow efficiency, collaboration, and security across departments while providing public WiFi access in common areas.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views54 pages

Assignment 1 EC4060: Jenarththan A. 2021/E/006 Group Cg1 Semester 4 14 DEC 2023

The document outlines the network design for a three-story building, detailing the allocation of PCs, printers, and WiFi access points for various departments. It includes IP address allocation tables for efficient network segmentation using VLANs, along with security measures and router configurations for inter-VLAN communication. The design aims to enhance workflow efficiency, collaboration, and security across departments while providing public WiFi access in common areas.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

ASSIGNMENT 1

EC4060

JENARTHTHAN A.
2021/E/006
GROUP CG1
SEMESTER 4
14 DEC 2023
These tables outline the components needed for each department, including the number of PCs,
printers, and WIFI access points in each room or place.

1. Management Office:

Room/Place Number of PCs Number of Printers Number of WiFi


CEO Office 1 0 1
Staff Office 1 0 1
Board Room 2 0 1
Lobby 0 0 1
Printing Room 0 2 0

2. Admin Department:

Room/Place Number of PCs Number of Printers Number of WiFi


Finance Section 15 0 0
Human Resource 25 0 0
Assistant Section 10 0 0
Printing Room 0 2 0

3. Technology Department:

Room/Place Number of PCs Number of Printers Number of WiFi


Meeting Room 2 0 1
R&D Section 25 0 0
Design Section 125 0 0
Test Section 20 0 0

4. Operations Department:

Room/Place Number of PCs Number of Printers Number of WiFi

Branding Section 8 0 0
Reporting Section 10 0 0
Sales Section 40 0 2

5. Marketing Department:

Room/Place Number of PCs Number of Printers Number of WiFi


Marketing Strategies 5 0 0
Public Relations (PR) 10 0 0
IP ADDRESS ALLOCATION TABLE FOR COMPANY DEPARTMENTS
Overview:
The table below illustrates the optimal IP address allocation for various departments within the organization,
ensuring efficient utilization of the provided IP address range (10.10.0.0/16). Each department is subdivided
into sections, each assigned a specific VLAN (Virtual Local Area Network) for network segmentation.

• Each department is assigned a unique VLAN for efficient network segmentation.


• Subnet masks are optimized to meet the required sizes for each section within a department.
• The default gateway is specified for each VLAN to ensure proper routing.
• The CIDR notation indicates the subnet size in slash notation.
• The "Usable IP Address Range" represents the range of IP addresses available for devices within
each section.
DETAILED ALLOCATION:

• Technology Department (VLAN 10):


o DESIGN Section:
▪ VLAN ID: 10
▪ IP Range: 10.10.0.0/25
▪ Usable IP Address Range: 10.10.0.1 - 10.10.0.126
▪ Subnet Mask: 255.255.255.128
▪ Default Gateway: 10.10.0.1

• Operations Department (VLAN 20):


o BRANDS, REPORT, SALES Sections:
▪ VLAN ID: 20
▪ IP Range: 10.10.0.128/26
▪ Usable IP Address Range: 10.10.0.129 - 10.10.0.190
▪ Subnet Mask: 255.255.255.192
▪ Default Gateway: 10.10.0.129

• Admin Department (VLAN 30):


o FINANCE, HR, ASSISTANT SECTION, PRINTING Sections:
▪ VLAN ID: 30
▪ IP Range: 10.10.0.192/26
▪ Usable IP Address Range: 10.10.0.193 - 10.10.0.254
▪ Subnet Mask: 255.255.255.192
▪ Default Gateway: 10.10.0.193

• Technology Department (VLAN 40):


o MEETING, R&D, TEST Sections:
▪ VLAN ID: 40
▪ IP Range: 10.10.1.0/26
▪ Usable IP Address Range: 10.10.1.1 - 10.10.1.62
▪ Subnet Mask: 255.255.255.192
▪ Default Gateway: 10.10.1.1

• Marketing Department (VLAN 50):


o PUBLIC RELATION Section:
▪ VLAN ID: 50
▪ IP Range: 10.10.1.64/28
▪ Usable IP Address Range: 10.10.1.65 - 10.10.1.78
▪ Subnet Mask: 255.255.255.240
▪ Default Gateway: 10.10.1.65
• Management Office (VLAN 60):
o CEO, STAFF, BOARD, PRINTING Sections:
▪ VLAN ID: 60
▪ IP Range: 10.10.1.80/28
▪ Usable IP Address Range: 10.10.1.81 - 10.10.1.94
▪ Subnet Mask: 255.255.255.240
▪ Default Gateway: 10.10.1.81

• Marketing Department (VLAN 70):


o MARKETING STRATEGIES Section:
▪ VLAN ID: 70
▪ IP Range: 10.10.1.96/29
▪ Usable IP Address Range: 10.10.1.97 - 10.10.1.102
▪ Subnet Mask: 255.255.255.248
▪ Default Gateway: 10.10.1.97

• Management Office (VLAN 80):


o LOBBY Section:
▪ VLAN ID: 80
▪ IP Range: 10.10.1.104/30
▪ Usable IP Address Range: 10.10.1.105 - 10.10.1.106
▪ Subnet Mask: 255.255.255.252
▪ Default Gateway: 10.10.1.105
BUILDING STRUCTURE AND DEPARTMENT ALLOCATION:
Building Overview:

• The newly constructed three-story building has the following dimensions:


o Length: 60 meters
o Width: 30 meters
o Height: Each floor is 4 meters.

Floor-wise Department Allocation:

1. Ground Floor:
o Management Office:
▪ CEO Office
▪ Staff Office
▪ Board Room
▪ Lobby (Public WiFi)
▪ Printing Room
o Admin Department:
▪ Finance Section
▪ Human Resource (HR)
▪ Assistant Section
▪ Printing Room
2. First Floor:
o Operations Department:
▪ Brands Section
▪ Reporting Section
▪ Sales Section
o Marketing Department:
▪ Marketing Strategies Section
▪ Public Relations (PR)
3. Second Floor:
o Technology Department:
▪ Design Section
▪ Meeting Room
▪ R&D Section
▪ Test Section

Department and Floor Relationship:

• Ground Floor: Management and administrative functions are centralized.


• First Floor: Operational and marketing activities are housed together.
• Second Floor: Technology-related departments, including design and research, are situated on this
floor.

Design Rationale:

• The floor-wise allocation is designed to enhance workflow efficiency and collaboration among
departments with similar functions.
• Each floor has its dedicated VLANs and IP address allocations, optimizing network segmentation
and security.
• Public WiFi is available in common areas like the lobby for guest access.
Full Design Overview:

Overview of the Entire Network Design


Floor-wise Screenshots:

• Floor 1:

Floor 1 Network Topology


• Floor 2:

Floor 2 Network Topology


• Floor 3:

Floor 3 Network Topology


• Department-wise Screenshots:

• Department 1:

Department 1 Network Configuration

• Department 2:

Department 2 Network Configuration


• Department 3:

Department 3 Network Configuration

• Department 4:

Department 4 Network Configuration


• Department 5:

Department 5 Network Configuration


• VLAN-wise Screenshots:

• VLAN 10:

VLAN 10 Configuration
• VLAN 20:

VLAN 20 Configuration
• VLAN 30:

VLAN 30 Configuration

• VLAN 40:

VLAN 40 Configuration
• VLAN 50:

VLAN 50 Configuration

• VLAN 60:

VLAN 60 Configuration
• VLAN 70:

VLAN 70 Configuration

• VLAN 80:

VLAN 80 Configuration
• Main router , server , multi-layer switch
NETWORK DESIGN CONSIDERATIONS AND SECURITY REQUIREMENTS:
1. Interconnectivity within Departments:

• Consideration:
o Each department is interconnected internally for seamless communication and collaboration.

2. Access to Printers:

• Consideration:
o Printers in the Admin Department can only be accessed by computers within the Admin
Department.
o Printers in the Management Office can only be accessed by computers within the
Management Office.

3. Lobby Area (VLAN 80) Restrictions:

• Consideration:
o VLAN 80 (Lobby Area) is separated to ensure that devices in this VLAN cannot access
printers in the Admin Department.

4. Minimizing IP Address Usage:

• Consideration:
o VLAN 50 and VLAN 70 are separated to minimize IP address usage while meeting the
connectivity requirements of these departments.

5. Interlinking VLANs with a Router:

• Requirement:
o VLAN 50 and VLAN 70 must be interlinked using a router to facilitate communication
between these two departments.
o VLAN 10 (Test and Design Section) and VLAN 40 (Technology) should be interconnected to
support collaboration within the Technology Department.

6. Security Measures:

• Requirement:
o Security measures should be implemented to restrict access between different VLANs and
ensure that each department's network is isolated for security reasons.
o Access control lists (ACLs) or firewall rules can be configured to enforce security policies
between VLANs.

7. Traffic Isolation and Optimization:

• Consideration:
o VLAN segmentation and IP address allocation are designed to optimize network traffic,
ensuring that each department has its dedicated network space.

8. Router Configuration for Inter-VLAN Routing:

• Requirement:
o Router configuration should include inter-VLAN routing to enable communication between
VLANs while enforcing security policies.
BRIEF NETWORK DESIGN OVERVIEW:

In our comprehensive network design for the IT center, we have established a structured and secure
infrastructure to meet the specific needs of the organization. Here are key highlights:

1. VLAN Segmentation:
o Implemented 8 VLANs (VLAN 10 to VLAN 80) to isolate network traffic and enhance
security.
2. Core Layer Server:
o Placed a central server at the core layer to streamline data sharing and collaboration across
departments.
3. Multilayer Switch and Access Switches:
o Connected a multilayer switch to the router at the distribution layer.
o Established dedicated access switches for each department at the access layer.
4. End Devices Configuration:
o Assigned specific IP addresses and gateway IDs to PCs, printers, and other devices within
each VLAN.
5. Inter-VLAN Connectivity:
o Configured the router for inter-VLAN routing, allowing seamless communication between
different departments.
6. WiFi Access Points:
o Set up WiFi access points for each section with password protection, ensuring secure wireless
connectivity.
7. Security Measures:
o Enforced security through VLAN segmentation, limiting access between departments for
enhanced network security.
ACCESS CONTROL LIST
INTER-VLAN ACCESS CONTROL LIST (ACL) MATRIX

Visual representation of VLAN communication permissions within the network. Green cells indicate
accessible VLANs, while red cells signify restricted access between VLANs.

NETWORK CONFIGURATION
1.ROUTER CONFIGURATION
A breakdown of the configuration for router interfaces, including VLAN assignments and IP addresses.

ROUTER VLAN CONFIGURATION TABLE

VLAN NO Default Gateway/ Subnet Mask for the Switch Port


Allocated IP Address VLAN
for the Router
10 10.10.0.1 255.255.255.128 GigabitEthernet1/0/4
20 10.10.0.129 255.255.255.192 GigabitEthernet1/0/8
30 10.10.0.193 255.255.255.192 GigabitEthernet1/0/1
40 10.10.1.1 255.255.255.192 GigabitEthernet1/0/5
50 10.10.1.65 255.255.255.240 GigabitEthernet1/0/6
60 10.10.1.81 255.255.255.240 GigabitEthernet1/0/2
70 10.10.1.97 255.255.255.248 GigabitEthernet1/0/7
80 10.10.1.105 255.255.255.252 GigabitEthernet1/0/3
Allocated IP address for the router is the first usable IP address, also known as the default gateway.

A summary of the router's interface status obtained from the show ip interface brief command, highlighting
the operational and protocol status of each interface.
2. CONFIGURING THE MULTILAYER SWITCH

Turning on the Multilayer Switch

VLAN assignments for the specified switch ports:


Switch Port VLAN

GigabitEthernet1/0/1 VLAN 30
GigabitEthernet1/0/2 VLAN 60
GigabitEthernet1/0/3 VLAN 80
GigabitEthernet1/0/4 VLAN 10
GigabitEthernet1/0/5 VLAN 40
GigabitEthernet1/0/6 VLAN 50
GigabitEthernet1/0/7 VLAN 70
GigabitEthernet1/0/8 VLAN 20
Final Configuration: VLAN Assignment on Multilayer Switch
3.CONFIGURING MULTILAYER SWITCH FOR INTERVLAN COMMUNICATION (ROUTER
ON A STICK)
configuring VLAN 10 and VLAN 40 to communicate with each other through a trunk port on the multilayer switch

Configuring Multilayer Switch for InterVLAN Communication (Same Department - VLAN 10 and VLAN
40)
Configure Multilayer Switch:

Configure Router:
Ping from a VLAN10 PC to VLAN 40 PC

EXPLANATION:

• The Multilayer Switch's interface (gigabitEthernet1/0/9) is configured as a trunk port, allowing


VLANs 10 and 40.
• The Router's subinterfaces (gigabitEthernet1/0/0.10 and gigabitEthernet1/0/0.40) are configured with
encapsulation for their respective VLANs.
• IP addresses are assigned to the subinterfaces, facilitating interVLAN routing.
• This configuration allows communication between VLAN 10 and VLAN 40, considering they belong
to the same department.
4. CONFIGURING THE VLAN SWITCH

Assigning All Ports to VLAN 60 on Switch


For Switch 2 (VLAN 20), Switch 3 (VLAN 30), ..., Switch 8 (VLAN 80), repeated the process with the
corresponding VLAN numbers.
5.CONFIGURING THE ROUTER FOR INTERVLAN CONNECTION FOR MARKETING
DEPARTMENT

For Switch Connected to VLAN 50:

For Switch Connected to VLAN 70:

Configuring Router for VLAN 50 and VLAN 70:


EXPLANATION:

• The Router's subinterfaces (gigabitEthernet0/0.50 and gigabitEthernet1/0.70) are configured with


encapsulation for their respective VLANs.
• IP addresses are assigned to the subinterfaces, facilitating interVLAN routing for VLAN 50 and
VLAN 70.
• FastEthernet0/3 ports of the switches connected to the Router's GigabitEthernet interface via trunk
links will carry both VLANs (50 and 70).
PING FROM VLAN 50 PC TO VLAN 70 (PACKET SENT SUCCESSFUL AFTER CONNECTING
ROUTER)
6.CONFIGURING PC(IP ADDRESS ,SUBNET MASK,DEFAULT GATEWAY)

Configuring PC settings involves setting up the IP address, subnet mask, and default gateway. Below are the
steps for configuring these settings on a PC

Likewise, Each PC in the network was configured with specific IP addresses, subnet masks, and default
gateways according to the department it belongs to.
7.CONFIGURING PRINTER ( IP ADDRESS ,SUBNET MASK,DEFAULT GATEWAY )

Likewise, all the printers in the network were configured according to their allocated IP address.
8.CONFIGURING HOME ROUTER

Configuring Home Router for Tech Meeting Room WiFi:

• Configured WiFi security with WPA2-PSK (Pre-Shared Key) for enhanced security.
• Assigned a unique Pre-Shared Key (PSK) passphrase for the Tech Meeting Room WiFi network.
• Assigned static IP addresses to devices connecting to the Tech Meeting Room WiFi network.
• Successfully connected a laptop to the WiFi network using the assigned passphrase.
Similar configurations were applied to other WiFi networks in different departments to ensure secure and
reliable wireless connectivity.
Wifi name Password
Lobby_WIFI Lobby_abcd_1234
Tech_meeting_WIFI Tech_WIFI
CEO_WIFI CEO_WIFI_1234
STAFF_WIFI STAFF_WIFI_1234
BOARD_WIFI BOARD_WIFI_1234
Each WiFi network is associated with a unique password to ensure secure access. Devices such as laptops
were connected to these networks using the provided passwords.
9.ADMIN BUILDING PRINTER ACCESS

Successful Ping from Same Department (VLAN 30) PC:

Successful Ping from VLAN 30 PC to Admin Department Printer


Explanation: The screenshot shows a successful ping from a PC in the Admin Department (VLAN 30) to
the Admin Department's printer. This verifies that devices within the same department can access the printer.
Unsuccessful Ping from Different Department (Marketing, VLAN 50) PC:

Unsuccessful Ping from VLAN 50 PC to Admin Department Printer

Explanation: The screenshot demonstrates an unsuccessful ping attempt from a PC in the Marketing
Department (VLAN 50) to the Admin Department's printer. This showcases the network's access control,
preventing cross-department communication.
The access control settings ensure that printers in the Admin Department can only be accessed by devices
within the same department (VLAN 30) for enhanced security.
10.MANAGEMENT BUILDING PRINTER ACCESS

Successful Ping from Same Department (VLAN 60) PCs:

Successful Ping from VLAN 60 PCs to Management Department Printers

Explanation: The screenshot demonstrates successful pings from PCs within the Management Department
(VLAN 60) to printers located in the same department. This confirms that devices within the same VLAN
and department can access the printers.
Unsuccessful Ping from Same Department (VLAN 80) PCs (Lobby Public WiFi):

Unsuccessful Ping from VLAN 80 PCs to Management Department Printers

Explanation: The screenshot showcases unsuccessful ping attempts from PCs in the Lobby area (VLAN 80)
to printers in the Management Department. This illustrates the access control, preventing cross-departmental
communication even within the same building.
Unsuccessful Ping from Another Department (VLAN 10) PCs:

Unsuccessful Ping from VLAN 10 PCs to Management Department Printers


The screenshot exhibits unsuccessful ping attempts from PCs in another department (VLAN 10) to printers
in the Management Department. This validates the strict network segmentation, ensuring isolation between
different departments

The access control settings are designed to restrict printer access based on both VLAN and department,
enforcing security measures and maintaining departmental isolation.
Printers available at the management department can only be accessed by the computer installed at the
admin department.
11.MANAGEMENT OFFICE PC ACCESS FROM DIFFERENT DEPARTMENTS

Management Office Pc Access From Admin Department(PING UNSUCCESSFUL)

Management Office Pc Access From Technology Department ( PING UNSUCCESSFUL)


Management Office Pc Access From Operation Department ( PING UNSUCCESSFUL)

Management Office Pc Access From Marketing Department ( PING UNSUCCESSFUL)


Computers available at management office cant be accessed from other departments such as admin, technology,
operations, marketing
12. ADMIN OFFICE PC ACCESS FROM DIFFERENT DEPARTMENTS

Admin Office Pc Access From technology Department (PING UNSUCCESSFUL)

Admin Office Pc Access From operation Department (PING UNSUCCESSFUL)


Admin Office Pc Access From marketing Department (PING UNSUCCESSFUL)

Computers available at the admin department can’t be accessed from the technology, operations and marketing
departments

Each network node can only be accessed by the administator, not others.

You might also like