403PROJECT
403PROJECT
403PROJECT
Presented ny
Fourth Year(CT)
Second Semester,2022-2023
1
Group Members
Name Roll No
2
Contents Page No
1. Abstract 1
2. Objective 2
5. Functions of Devices 8
7. Conclusions 13
Abstract
1
Objectives
To get internet access from all wired and wireless end devices
2
DEVICES USED IN THIS PROJECT
Cisco Router
A powerful networking device designed to connect different
networks together and facilitate data communication.
Layer 2 Switch
A network device designed to connect multiple devices within a
local area network (LAN).
Multilayer Switch
A versatile multilayer switch designed to provide advanced
switching, routing, and security features for modern networks.
Wireless Router
It provides wireless connections, allowing devices to connect
without needing physical cables.
3
Serial DCE Cable
A serial DCE (Data Communications Equipment) cable is used to
establish communication between two devices, typically in a serial
connection setup.
Ethernet Cable
Ethernet cables are a fundamental component of wired computer
networks, allowing devices to communicate and share data within a local
area network (LAN)
4
FRAME DESIGN AND IMPLEMENTATIONS
5
First Floor Frame Design And Implementation
All the PCs in all these departments will be connected to the two
switches which will be placed in the first floor
6
Second Floor Frame Design and Implementation
There are three departments and two student lab rooms in the
second floor.
Two switches will be placed in the second floor.
7
FUNCTION OF DEVICES
VLAN 10(192.168.1.0/24)
VLAN 10(192.168.1.0/24)
VLAN 20(192.168.2.0/24)
VLAN 10(192.168.1.0/24)
In student lab rooms,all the PCs are connected to switch 4 and all
the switchports which are connected with student PCs are grouped into
VLAN20(192.168.2.0/24) but the two switchports of teacher PCs will
be in VLAN10(192.168.1.0/24).
8
VLAN 10(192.168.1.0/24)
switch 1 switch 2
switch 3 switch 4
switch 5
9
Router Functions
vlan10(192.168.1.0/24)
vlan20(192.168.2.0/24)
• Determines the quickest paths for data to travel within the network.
• Optimizes data routing, avoiding congestion and delays.
10
CONTROLLING AND PORT SECURITY
Easy Updates -We can change the rulebook as needed, like updating a
checklist.This flexibility lets us adapt to new situations or needs.
11
Port Security For Switches and Routers
How It Works
Security: Only known devices with sticky MACs can access our network.
Control: Violation restrict prevents unauthorized devices from joining.
We've fortified our network with SSH which means the user
has to enter password to enter the configure terminal.Sessions will exit on
their own after 120 seconds of no activity.So that no more sessions leave
open accidentally.
12
Conclusions
13
14
15