0% found this document useful (0 votes)
35 views17 pages

CN Case Study

Uploaded by

abhayadhakal456
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views17 pages

CN Case Study

Uploaded by

abhayadhakal456
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

KATHFORD INTERNATIONAL COLLEGE OF

ENGINEERING AND MANAGEMENT


Balkumari, Lalitpur

A
Major Project Proposal
On
“Future Price Prediction of Agricultural Product using LSTM algorithms”
[Subject Code: CT-654]

Project Members
Abhay Dhakal (KIC076BCT002)
Pujan Dhungana (KIC076BCT025)
Romeo Thapa Magar (KIC076BCT028)

DEPARTMENT OF COMPUTER AND ELECTRONICS &


COMMUNICATION ENGINEERING
LALITPUR, NEPAL
JULY, 2023
August, 2022

TITLE: Case Study on Network Topology of a hospital

OBJECTIVES:
• To understand the concept of VLAN, Access Control List, Static Routing,
Dynamic Routing, DHCP Server, DNS Server, HTTP Server, Mail Server.
• To learn the configuration of VLAN, ACL, OSPF, BGP, Port-security,
DNS Server, DHCP Server, HTTP Server, Mail Server, Router as DHCP
Server.

Theory:
Switch
• Multiport Bridge
• A switch is essentially a fast, multi-port bridge that can contain dozens of
ports.
• A switch dynamically builds and maintains a MAC table, which holds all of
the necessary MAC information for each port.
• The switch then forwards or discards frames based on the table entries
• Table entries called Content Addressable Memory.

Router
A router is a special type of computer. It has the same basic components as a
standard desktop PC. It has a CPU, memory, a system bus, and various input/output
interfaces.

HTTP (Hyper Text Transfer Protocol)


• Use TCP at Transport Layer
• Web server listen at port number 80
• Web's application-layer protocol, is at the heart of the Web.
HTTPS
• Use TCP at Transport layer
• Listen at port number 443
DNS (Domain Name System) Sever
Computer server that contains a database of public IP addresses and their
associated hostnames, and in most cases, serves to resolve, or translate, the
common names to IP addresses as requested. A hierarchical, distributed database
that contains mappings of DNS domain names to various types of data, such as IP
addresses. DNS enables the location of computers and services by user-friendly
names. It also enables the discovery of other information stored in the database.
DNS protocol runs over UDP and uses port 53.

Static Route
Static routing is not really a routing protocol. Static routing is simply the
process of manually entering routes into a device's routing table via a configuration
file that is Static routing is the simplest form of routing, but it is a manual process.

OSPF
OSPF stands for Open Shortest Path First. OSPF is a routing protocol used to
determine the best route for delivering the packets within an IP networks. It was
published by the IETF to serve as an Interior Gateway Protocol replacing RIP.
OSPF is a link-state routing protocol, whereas RIP and IGRP are distance vector
routing protocols. Routers running the distance-vector algorithm send all or a
portion.

BGP
BGP is a standardized exterior gateway protocol (EGP), as opposed to RIP,
OSPF, and EIGRP which are interior gateway protocols (IGP’s). BGP Version 4
(BGPv4) is the current standard deployment. BGP is considered a “Path Vector”
routing protocol. BGP was not built to route within an Autonomous System (AS),
but rather to route between AS’s. BGP maintains a separate routing table based on
shortest AS Path and various other attributes, as opposed to IGP metrics like
distance or cost.
VLAN
VLANs (Virtual LANs) are logical grouping of devices in the same
broadcast domain. VLANs are usually configured on switches by placing some
interfaces into one broadcast domain and some interfaces into another. VLANs can
be spread across multiple switches.

3
EtherChannel in Computer Network
EtherChannel is a port link aggregation technology in which multiple
physical port links are grouped into one logical link. It is used to provide high
speed links and redundancy. Maximum of 8 links can be aggregated to form a
single logical link.

Access-Lists (ACL)
Access-list (ACL) is a set of rules defined for controlling the network traffic
and reducing network attack. ACLs are used to filter traffic based on the set of
rules defined for the incoming or outgoing of the network.

ACL features:
1. The set of rules defined are matched serial wise i.e matching starts with
the first line, then 2nd, then 3rd and so on.
2. The packets are matched only until it matches the rule. Once a rule is
matched then no further comparison takes place and that rule will be
performed.
3. There is an implicit deny at the end of every ACL, i.e., if no condition or
rule matches then the packet will be discarded.

Port-Security
Attackers task is comparatively very easy when they can enter the network
they want to attack. Ethernet LANs are very much vulnerable to attack as the
switch ports are open to use by default. Various attacks such as Dos attack at layer
2, address spoofing can take place. If the administrator has control over the network
then obviously the network is safe. To take total control over the switch ports, user
can use feature called port-security. If somehow prevent an unauthorized user to
use these ports, then the security will increase up to a great extent at layer 2.
Network Topology

4
Fig1: Topology of a hospital

Description
There are 3 blocks of the hospital. We use 3 routers for that. We use 2
VLAN in this topology for the Technical Management and Account Management.
The following diagram shows the simplified topology of above:

Vlan10: Account Management Block©


Int eth 0/1/0.10
Gateway IP:192.168.1.1
IP for host:192.168.1.10-192.168.1.254

Vlan20: Technical Management Block©


Int eth 0/1/0.20
Gateway IP:192.168.8.1
IP for host:192.168.8.10-192.168.8.254

A DNS server is also connected to the R10 which has domain name of 2 web
that are hospital web server and Tic Toc web server. ACL is also configured in
R10. We use Slandered number ACL to block the tic toc web server inside hospital
network.
Routing Protocol
In this topology, the routing protocol used in all router is RIP. Since it is the
simplest form of dynamic routing not much work had to be done just the known
subnet of networks are added.

In router 10
172.20.1.0
192.168.6.0

5
192.168.5.0
192.168.4.0

In router 11
192.168.1.0
192.168.3.0
192.168.4.0

In router 12
192.168.3.0
192.168.5.0
192.168.2.0

The IP address used in different network of this topology are:


Vianet 172.20.1.0
Hospital web server 172.21.0.1
TicToc web server 172.23.0.1
DNS server 172.22.0.1

Configurations
Router configuration

All blocks are given class C ip address.

6
Vianet and web servers have class B ip address.

Routing configuration

Routers in hospital network use RIP protocol for routing.

DHCP configuration for PC

7
DHCP server is added in every block of hospital so that all PC gets ip address
automatically.
DHCP configuration

8
Default gateway and DNS server statically mentioned in DHCP server.

Start ip address, Subnet Mask, Default Gateway, DNS Server and Maximum users
are defined in DHCP services.

9
IP address for DHCP is statically configured.
DNS server configuration

10
DNS services is turned on.
Domain name of hospital website and tictoc website is added.

11
Static addressing for PC

In Block C IP address is statically configured.

WIC ENET port addition

Extra port is added in Router for more connection.


Web server configuration

12
HTTP server is turned on. index.html
is edited.

13
VLAN configuration on switch

Two VLAN is created for Technical Management and Account Management.


For VLAN 10, network of 192.168.1.0 is defined. For
VLAN 20, network of 192.168.8.0 is defined.
VLAN configuration on router

14
To transfer data from two virtually created network from one port of router, We
need to sub divide the port. We create eth0/1/0.10 and eth0/1/0.20. We specify IP
192.168.1.1 for eth0/1/0.10 and 192.168.8.1 for eth0/1/0.20. By this way we can
create different default gateway for two virtual network.

Access allowed website

15
Hospital web server can be accessed by every one.

Tic Toc web server before blocking

After Tic Toc blocked inside hospital network

Entire Tic Toc server has been blocked.

16
Conclusion:
Hence the desired network topology was constructed by the use of various
devices and protocols studied in lab. In this way, VLAN, access control list, static
routing, dynamic routing, ether channel, port security and working mechanism of
various server were studied.

17

You might also like