403PROJECT

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

UNIVERSITY OF COMPUTER STUDIES (MEIKTILA)

Faculty of Computer System and Technology

Efficient Network Management System for a Three-Floor Building


(CT-403,project)

Presented ny
Fourth Year(CT)

Second Semester,2022-2023

1
Group Members

Name Roll No

1. Mg Htet Wai Yan 4CT-18

2. Mg Htein Lin Aung 4CT-11

3. Mg Aung Kyaw Moe 4CT-17

4. Mg Chan Pyae Aung 4CT-22

2
Contents Page No

1. Abstract 1

2. Objective 2

3. Devices used in this project 3

4. Frame Design and Implementations 5

5. Functions of Devices 8

6. Controlling and Port Security 11

7. Conclusions 13
Abstract

We’ve built a pratical network management system using Cisco


Packet Tracer. It’s like a digital toolbox for crafting efficient networks.
Our project shows how easily we can manage networks with this handy
tool, making network management straightforward and effective.

1
Objectives

 To get internet access from all wired and wireless end devices

 To make the connections fast and secure

 To control the internet access of the student’s PCs in the Lab


rooms (only give Internet access when it needed)

 To prevent accessing to our network form unknown unauthorized


devices

2
DEVICES USED IN THIS PROJECT

Cisco Router
A powerful networking device designed to connect different
networks together and facilitate data communication.

Layer 2 Switch
A network device designed to connect multiple devices within a
local area network (LAN).

Multilayer Switch
A versatile multilayer switch designed to provide advanced
switching, routing, and security features for modern networks.

Wireless Router
It provides wireless connections, allowing devices to connect
without needing physical cables.

3
Serial DCE Cable
A serial DCE (Data Communications Equipment) cable is used to
establish communication between two devices, typically in a serial
connection setup.

Ethernet Cable
Ethernet cables are a fundamental component of wired computer
networks, allowing devices to communicate and share data within a local
area network (LAN)

4
FRAME DESIGN AND IMPLEMENTATIONS

Overall Frame Design and Implementation

5
First Floor Frame Design And Implementation

 There are four departments in the first floor(Pre rector, Finance,


Admin and Student affair) and each department will have at least 6
PCs and two laptops

 All the PCs in all these departments will be connected to the two
switches which will be placed in the first floor

6
Second Floor Frame Design and Implementation

 There are three departments and two student lab rooms in the
second floor.
 Two switches will be placed in the second floor.

 The three departments (Math and Software, IS and Application


Hardware) will be connected to one of the switch in the second
floor.
 The two student lab rooms will be connected to the rest one.

Third Floor Frame Design and Implementations

 There is only one department in the third floor


 A switch is placed in the third floor and is used for that department

7
FUNCTION OF DEVICES

VLAN 10(192.168.1.0/24)

First Floor Switches


All the PCs in the first floor departments are connected to the
switch 1 and switch 2 respectively with ethernet cables and all
switchports are grouped into VLAN10(192.168.1.0/24).

VLAN 10(192.168.1.0/24)

VLAN 20(192.168.2.0/24)

VLAN 10(192.168.1.0/24)

Second Floor Switches


All the PCs from the three departments are connected to switch 3
and all the switch ports are grouped into VLAN10(192.168.1.0/24).

In student lab rooms,all the PCs are connected to switch 4 and all
the switchports which are connected with student PCs are grouped into
VLAN20(192.168.2.0/24) but the two switchports of teacher PCs will
be in VLAN10(192.168.1.0/24).

8
VLAN 10(192.168.1.0/24)

Third Floor Switch


There’s only one department in third floor and is connected to switch 5.

Multilayer Swich Functions

• In our network project, the multilayer switch may not perform a


wide range of functions, its specialized tasks contribute
significantly to the overall network architecture.
• The primary responsibility of the multilayer switch is to manage
VLANs and establish trunk links between routers and switches.
• As our network expands or new departments are added, the
multilayer switch can accommodate new VLANs without major
modifications. This flexibility allows for a dynamic and adaptable
network architecture that can grow with the organization's needs.

switch 1 switch 2

switch 3 switch 4

switch 5

9
Router Functions

Encapsulation Dot1Q (VLAN Tagging)

EncapsulationDot1Q(IEEE802.1Q) is to know the IP addresses of


theVLans from different departments and Lab rooms.This way, the
network knows where to deliver the data, making sure it reaches the right
place.Department IP addresses(192.168.1.0/24) and student lab IP
addresses(192.168.2.0/24) are encapsulated in the router port interface.

vlan10(192.168.1.0/24)

vlan20(192.168.2.0/24)

Dynamic Host Configuration Protocol (DHCP): Giving Out Network


Addresses

The protocol acts as a DHCP server, assigning IP addresses


automatically to devices as they join the network.It simplifies the
network addressing and reduces the risk of address conflicts.In our
project, all the end devices connected to our network will be assigned
ther IP addresses automatically by this protocol.

Open Shortest Path First (OSPF)

• Determines the quickest paths for data to travel within the network.
• Optimizes data routing, avoiding congestion and delays.

10
CONTROLLING AND PORT SECURITY

ACLs(Access Control Lists)

For student lab rooms(VLAN 20),ACLs act like a doorman to


the online contents. They decide what websites or types of content are
allowed and which ones are denied.Our aim is to control the internet
access,web-link for students and we ensure students engage with
educational content without distractions.

Rulebook - When data wants to go somewhere, ACLs check their


"rulebook".This rulebook has a list of things that are allowed and things
that are not.

Easy Updates -We can change the rulebook as needed, like updating a
checklist.This flexibility lets us adapt to new situations or needs.

11
Port Security For Switches and Routers

Port Security as a digital bouncer for our network devices.It


makes sure only trusted devices can connect to our network.

How It Works

When a device connects, Port Security Sticky MAC notes its


MAC address.If it disconnects and tries to reconnect, the network knows
it's a trusted guest.We've set a limit: only two MAC addresses can access
each port.This prevents multiple devices from accessing on a single port.

Benefits of Port Security

Security: Only known devices with sticky MACs can access our network.
Control: Violation restrict prevents unauthorized devices from joining.

SSH(Secure Shell or Secure Socket Shell)

We've fortified our network with SSH which means the user
has to enter password to enter the configure terminal.Sessions will exit on
their own after 120 seconds of no activity.So that no more sessions leave
open accidentally.

12
Conclusions

Our project has successfully linked departments across three floors,


encouraging effective teamwork. With careful planning like using
VLANs and routing protocols, data movement has become more efficient.
Security improvements such as Access Control Lists and Port Security
Sticky have made our network safer, preventing unauthorized entry. By
focusing on these aspects of connecting, controlling, and security, we've
built a strong network to support our organization in the digital age.

13
14
15

You might also like