CN Financial Project
CN Financial Project
Submitted By
1
Page
CERTIFICATE OF APPROVAL
For
Mini Project Report
On
Computer Network Lab
Kirtana Singh
Riya Kharade
Shivani Choudhari
Information Technology
Examiner 1 Examiner 2
2
Page
ACKNOWLEGEMENT
We would like to express our deepest appreciation to all those who provided us the possibility
to complete this report. We express our profound gratitude we give to our Prof. Kanchan
Dhuri Ma’am, our respectable project guide, for her gigantic support and guidance. Without
her counseling our project would not have seen the light of the day.
We extend our sincere thanks to Dr. Vidya Chire, Head of the Department of Information
Technology for offering valuable advice at every stage of this undertaking. We would like
to thank all the staff members who willingly helped us. We are grateful to
VIDYALANKAR INSTITUTE OF TECHNOLOGY for giving us this opportunity.
The days we have spent in the institute will always be remembered and also be
reckoned as guiding in our career.
1. Kirtana Singh
2. Riya Kharade
3. Shivani Choudhari
3
Page
Table of Contents
Sr. No. Topic Page No.
1 Case Study and Requirements 6
2 Technologies 8
Implemented
Network Diagram (Network architecture
3 9
design)
4 Result & Discussion (screenshots of output) 11
5 Conclusion (What you have designed & learnt) 15
7 References 16
4
Page
List of Figures
Sr. No Figure Page No
1 4.1 Blockdiagram 10
2 4.2 Overall Output 11
3 4.3 ISP Area 11
4 4.4 JFSL HQ network 12
5 4.5 7th,8th floor JFSL network 12
6 4.6 Server Side JFSL network 13
7 4.7 Calling HR from MS telephone 13
5
Page
Case Study and Requirements
Organization Overview
Jubilee Financial Services Ltd (JFSL) is a prominent financial service provider headquartered in Nairobi,
Kenya. With a reputation for offering a wide range of banking and financial services, the company caters to both
individual clients and corporate institutions. In order to maintain efficient internal operations and high service
standards, JFSL has centralized its core departmental operations within its multi-storey head office building.
JFSL operates its business functions across the 7th and 8th floors of the building, with a clear division of
departments:
7th Floor:
o Human Resource (HR): Handles recruitment, employee records, training, payroll, and
organizational development.
o Customer Service (CS): Manages client interactions, queries, feedback, and support services.
o Marketing (MS): Focuses on brand promotion, customer outreach, and financial product
marketing strategies.
8th Floor:
o Legal Management (LM): Ensures regulatory compliance, manages contracts, and addresses
legal issues.
Each department on the 7th floor is equipped with approximately 40 end-user devices (PCs, laptops, etc.) and 40
IP phones, indicating a workforce that depends heavily on both data and voice communication. On the 8th floor,
departments operate with around 20 end-user devices and 20 IP phones each. Additionally, each department is
supported by a dedicated wireless access point (Wi-Fi AP) to ensure seamless mobility and wireless
connectivity for employees using laptops, tablets, and mobile devices.
To meet operational demands and support future scalability, JFSL aims to establish a highly secure, efficient,
and reliable IT network infrastructure. The key goals and technical requirements for this network are as follows:
o JFSL intends to manage its Local Area Network (LAN) and Wide Area Network (WAN)
internally without relying on third-party network providers. This enhances control, security,
and flexibility in managing the enterprise network.
o Each department will be assigned unique Virtual Local Area Networks (VLANs) to separate
Page
4. VoIP Integration:
o Voice over IP (VoIP) solutions will be deployed using Cisco IP Phones and a voice-enabled
router, allowing seamless voice communication over the same IP network.
o Access Control Lists (ACLs): Will be used to control and restrict unauthorized access to
sensitive areas of the network.
o Port Security: Enabled on switches to prevent unauthorized devices from connecting
network.
o Site-to-Site Virtual Private Network (VPN): Will ensure secure communication between
remote branches and the head office by encrypting traffic over the public internet.
7
Page
Technologies
1. Hierarchical Network Design:
A structured approach to networking that divides the network into core, distribution, and access layers
for better scalability and management.
1. Core Devices
Access Switches:
Located on each floor and department, these connect all end-user devices and IP phones and enforce
port security policies like Sticky MAC and shutdown on violation.
2. Server-Side Devices
DHCP Server:
Automatically assigns IP addresses to clients in data and voice networks within their respective
VLANs.
DNS Server:
Resolves hostnames to IP addresses for internal and external websites and applications, improving ease
of access and performance.
Email Server:
Hosts the company’s internal and external email communication system.
Web Server:
Hosts internal web applications or the company’s public website, depending on the role.
3. Voice Gateway
4. ISPs
5. Security Components
Access Control Lists (ACLs):
Enforced at the router and switch levels to restrict unauthorized access, especially to VTY lines
(remote access), VoIP traffic, and server subnets.
6. End Devices
Smartphones:
Access the network wirelessly through the departmental Wi-Fi access points.
IP Phones:
Used for internal and external voice communication, connected to the Voice VLAN.
10
Page
RESULTS
4.1 BLOCK DIAGRAM
11
Page
4.2 Overall Output :
12
Page
4.4 JFSL HQ NETWORK
13
Page
4.6 JFSL SERVER-SIDE NETWORK
14
Page
Conclusion
This project successfully demonstrates the design and implementation of a secure, scalable,
and redundant network infrastructure for Jubilee Financial Services Ltd using Cisco Packet
Tracer.
What We Designed:
A complete end-to-end enterprise-grade hierarchical network with redundancy
What We Learnt:
Use of secure communication protocols like SSH, IPsec VPN, and ACLs
This project not only enhances practical networking skills but also provides a comprehensive
understanding of designing and implementing enterprise network architectures that
emphasize Confidentiality, Integrity, and Availability (CIA) of data. 15
Page
Reference
https://www.youtube.com/watch?v=p1MlbN1Wh8w&list=PL
vUOx2WG6R7PMM8UhMWevH75QzGyXOv4g&index=14
16
Page