Thesis Book (L.A.N)
Thesis Book (L.A.N)
FACULTY OF ( ICT )
BACHELOR DEGREE OF INFORMATION & COMMUNICATION
TECHNOLOGY
LOCAL AREA NETWORK ( LAN )
PREPARED STUDENTS :
USAAME HUSSIEN HASSAN
HAMSE YUUSUF HASSAN
MOHAMED ALI HAYBE
NAJMA C/LAAHI MAXAMUUD
SAYNAB MAXAMED YUUSUF
FARXIYA C/RISAAQ NUUR
PROJECT DOCUMENTATION
Supervisor: MAXAMED CABDI CILMI
©JUNE 2025
0
DECLARATION
We hereby declare that this thesis book is group work . It’s our original work and has been
developed whith clarify , accuracy and integrity in the field Information and Communication
Technology ( I.C.T).All sources of information , referances and contributions from other
researchers have been duly acknowledged and cited in accordance whith academic standards.
Supervisor :
Maxamed Cabdi Cilmi : ______________________
Date: ______/_______/_________
1
Approval
We hereby proclaim this project “Local Area Network” has been undertaken
independently by the undersigned researchers under our guidance and supervision. And
that it has not previously formed that project.
2
ACKNOWLEDGEMENT
This acknowledgement expresses deep gratitude to all who contributed to the successful
completion of the undergraduate project on [ LAN ].
The team begins by praising Allah (SWT) for providing strength and guidance throughout the
journey.
Heartfelt thanks are extended to the parents for their unwavering support and sacrifices.
Special appreciation is reserved for the project supervisor
Mr. MOHAMED ABDI ELMI , whose expertise and mentorship were pivotal in shaping the
project.
The team also acknowledges the lecturers at the University of Burao for their knowledge and
guidance, as well as the university itself for offering a rigorous curriculum and the opportunity to
undertake this enriching project.
The acknowledgement concludes by recognizing that this achievement was made possible
through collective support and ends with a prayer for divine rewards for all contributors.
3
Dediction
Every hard work requires honesty, effort and be patient, my hard work and efforts are dedicated
to our honorable lecturers and we also can’t forget our dean Mohamed Abdi Elmi, as well as
any who help us to accomplish this book. They all helped us to achieve our goals day and night.
And encouraged us to achieve our goal.
4
Abstract
This project develops a secure LAN to protect organizational data from cyber threats like
malware, hacking, and DDoS attacks.
Key security measures include traffic filtering to permit only trusted communications and switch
port security to block unauthorized device connections.
If a violation occurs, the affected port is disabled, and administrators are notified, ensuring a
robust and controlled network environment.
5
Table of Contents
Decleration ........................................................................................................................1
Approval ............................................................................................................................2
Acknowledgement..............................................................................................................3
Dediction ...........................................................................................................................4
Abstract ..............................................................................................................................5
1.1 Introduction................................................................................................................9
1.2 Types of networks......................................................................................................9
1.3 Local Area Network...................................................................................................9
1.3.1 Baseband , Broadband and Bandwidth......................................................................10
1.4 Wide Area Network…………………………………………………..…………….11
1.5 Basic Hardware Components………………………………………………………11
1.5.1 Network Cables…………………………………………………………...………..11
1.5.2 Routers…………………………………………………………………...…………12
1.5.3 Repeaters ,Hubs and Switches…………………………………………...…………12
1.5.4 Bridges…………………………………………………………………...…………12
1.5.5 Network Interface Card (NIC)…………………………………………...…………13
1.6 Configuration of LAN network settingon SPA3102...………….……….……….....13
1.7 Configuration of WAN network setting on RV215W.…………….…………….…13
1.7.1 Automatic Configuration-DHCP IPV4...………………….………………………..13
1.7.2 Static IPV4………………………………………….…………………………….....13
1.7.3 Automatic Configuration –DHCPV6……………..………………………………....14
1.7.4 Static IPV6……………………………………..………………………………….....14
1.8 Advantage and Dis-advantage of LAN………………………………………………14
1.8.1 Advantages……………………………………..………………………………….....14
1.8.2 Dis-advantages ………………………………..……………………………………...14
1.9 Advantage and Dis-advantage of WAN……………………………………………….15
1.9.1 Advantages……………………………………..……………………………………...15
1.9.2 Dis-advantages ………………………………..………………………………………15
CHAPTER TWO : LITERATURE REVIEW………………………………………………16
2.1 Background ………………………………………………………………………….....16
2.2 History Of Local Area Networks ……………………………………………………....16
2.3 History Of Local Area Networks ………………………………………………………16
2.4 What is the Intranet …………………………………………………………………….17
2.4.1 How the Intranet works ………………………………………………………………..18
2.4.2 Uses of the Intranet …………………………………………………………………….19
2.4.3 Benefits and challenges of the Intranet ………………………………………………….20
2.5 Difference b/w Internet and Intranet …………………………………………………….22
2.6 Reliability and Availability Design issues for LAN …………………………………….23
2.6.1 Reliability ………………………………………………………………………………..25
2.6.2 Availability ……………………………………………………………………………...26
2.7 Reliability and Availability Design issues for WAN …………………………………….26
2.8 Purpose of LAN ……………………………………………………………………..…….27
2.8 Purpose of WAN ………………………………………………………………………….27
2.9 Internet …………………………………………………………………………………….28
6
2.10 OSI referance model ………………………………………………………………………29
7
8
CHAPTER ONE: INTRODUCTION TO STUDY
1.1 Introduction
Networks form the backbone of modern communication, enabling data exchange between
devices across different geographical locations. A network consists of interconnected
devices that share resources, such as files, applications, and internet access. This chapter
introduces fundamental networking concepts, including different types of networks,
essential hardware components, and configuration settings for Local Area Networks
(LANs) and Wide Area Networks (WANs).
The increasing reliance on digital communication has made networking a critical aspect
of business, education, and personal use. Understanding how networks function, their
advantages, and their limitations is essential for efficient network design and
management. This chapter provides a foundation for further exploration of networking
technologies and their applications.
9
Key Characteristics of LAN:
High data transfer speeds (up to 10 Gbps or more with modern Ethernet).
Low latency due to short distances between devices.
Private ownership, allowing for better security and control.
Common topologies include star, bus, and ring configurations.
Baseband:
Uses a single channel for communication.
Transmits digital signals.
Example: Ethernet networks.
Broadband:
Uses multiple channels for simultaneous transmission.
Supports analog signals (e.g., cable internet).
Enables higher data rates over long distances.
Bandwidth:
Refers to the maximum data transfer rate of a network.
Measured in bits per second (bps).
Higher bandwidth allows faster data transmission.
10
1.4 Wide Area Network (WAN)
A Wide Area Network (WAN)connects multiple LANs across large geographical
distances, often using leased telecommunication lines or satellite links. The internet is
the largest example of a WAN.
11
Coaxial Cable:
Used in broadband internet (cable TV networks).
Higher bandwidth than twisted pair but less flexible.
1.5.2 Routers
Function: Directs data packets between different networks (e.g., LAN to WAN).
Key Features:
Supports NAT (Network Address Translation).
Provides firewall and security features.
- Used in homes and enterprises for internet access.
1.5.4 Bridges
Connects two LAN segments, filtering traffic to reduce congestion.
Less common today, replaced by switches.
12
1.5.5 Network Interface Card (NIC)
Hardware component that connects a device to a network.
Can be wired (Ethernet) or wireless (Wi-Fi).
13
3. Enter IP Address, Subnet Mask, Default Gateway, and DNS provided by ISP.
4. Save and reboot.
1.8.1 Advantages
High-speed data transfer.
Cost-effective for small areas.
Enhanced security and control.
Easy resource sharing (printers, files).
1.8.2 Disadvantages
Limited coverage area.
High setup cost for large installations.
Requires maintenance.
14
1.9 Advantages and Disadvantages of Wide Area
Network
1.9.1 Advantages
Global connectivity.
Centralized data management.
Supports remote work and cloud services.
1.9.2 Disadvantages
Higher costs (leased lines, ISP fees).
Slower speeds compared to LAN.
Security vulnerabilities (requires VPNs/firewalls).
15
CHAPTER TWO : LITERATURE REVIEW
2.1 Background
Local Area Networks (LANs) and Wide Area Networks (WANs) are fundamental components of
modern communication infrastructure, each serving distinct purposes based on their geographic
scope and technological implementations. LANs facilitate high-speed, localized connectivity
within confined areas such as buildings or campuses, enabling efficient resource sharing and
communication among devices. In contrast, WANs interconnect multiple LANs over extensive
geographic regions, including cities, countries, or even continents, supporting the transmission of
data across vast distances. The evolution of both LANs and WANs has been pivotal in shaping
the digital landscape, influencing how information is exchanged globally.
Early Developments:
16
Late 1950s: The U.S. Air Force developed the first known WAN to interconnect sites within the
Semi-Automatic Ground Environment (SAGE) radar defense system. This network utilized an
extensive array of dedicated telephone lines, modems, and telephones to link various sites.
1960s: The Advanced Research Projects Agency Network (ARPANET) was established as the
first wide-area packet-switching network with distributed control and the first to implement the
TCP/IP protocol suite, laying the groundwork for the modern Internet.
Technological Progressions:
Pre-1990s: Initial WANs connected offices with terminals to mainframe and minicomputer
systems using point-to-point connections. Protocols like X.25 and T1/E1 circuits, operating at 1.5
Mbps, were standard during this era.
1990s: Frame Relay technology emerged, simplifying X.25 protocols and offering higher speeds,
becoming a popular choice for telecommunications companies.
2000s: Multiprotocol Label Switching (MPLS) replaced Frame Relay, enhancing support for
voice, video, and data traffic with improved Quality of Service (QoS) features.
2014: The term SD-WAN gained traction, describing networks that combined multiple
technologies to create comprehensive private networks with dynamic bandwidth sharing, central
controllers, zero-touch provisioning, integrated analytics, and on-demand circuit provisioning.
Modern Developments:
2020s: The rapid shift to remote work during the COVID-19 pandemic accelerated the adoption
of SD-WAN, facilitating secure and efficient connections for remote workers.
The evolution of WANs reflects a continuous adaptation to the growing demands for faster, more secure,
and flexible communication networks, underpinning the interconnected nature of today's digital world.
17
Centralized Resources: Hosts internal tools like:
Purpose:
Facilitates internal communication (e.g., announcements, updates).
1. Network Infrastructure
Servers: Host intranet content (on-premises or cloud-based).
Clients: User devices (computers, smartphones) access the intranet via browsers or apps.
3. Hosting Platforms
CMS: Tools like WordPress or SharePoint organize and update content.
4. Workflow Example:
1. User logs in via credentials/SSO.
18
3. Server authenticates the user and retrieves the file from the database.
Security Measures:
Encryption: SSL/TLS for data in transit.
Maintenance:
Managed by the organization’s IT team.
2. Collaboration
o Project Management: Tools like Asana or Trello integrated for task tracking.
4. Knowledge Management
5. Operational Efficiency
19
2.4.3 Benefits and Challenges of the Intranet
Benefits
1. Enhanced Communication
o Example: A company uses an intranet blog for leadership updates, ensuring consistent
messaging across departments.
2. Improved Collaboration
o Centralized platforms for shared documents (e.g., Wikis, SharePoint) enable teams to co-
edit and track changes.
o Single source of truth for policies, SOPs, and training materials, minimizing version
control issues.
o Example: HR departments host onboarding resources, ensuring new hires access up-to-
date guides.
4. Cost Efficiency
6. Workflow Automation
o Digital forms and approval processes (e.g., leave requests, purchase orders) reduce
administrative bottlenecks.
7. Employee Engagement
o Recognition platforms, surveys, and feedback tools foster a connected workplace culture.
20
Challenges
1. User Adoption and Training
2. Maintenance Costs
o Cloud-based solutions (e.g., SaaS intranets) may offset infrastructure costs but require
subscription fees.
3. Security Risks
o Internal threats (e.g., accidental data leaks) or cyberattacks targeting weak authentication
protocols.
4. Content Management
o Risk of "content bloat" with outdated or redundant files, leading to user frustration.
5. Integration Complexity
o Compatibility issues with legacy systems (e.g., outdated CRM tools) may require costly
middleware or APIs.
6. Performance Issues
7. Scalability Limitations
Here’s a clear, structured explanation of the difference between the Internet and an
Intranet.
21
2.5 Differences Between Internet and Intranet
The terms "Internet" and "Intranet" refer to two distinct types of networks that, while sharing certain
technologies, serve different purposes and audiences. Understanding their differences is crucial for
organizations and individuals alike.
1. Accessibility
Internet: A global network accessible to anyone with an internet connection, allowing users
worldwide to access information and services.
2. Security
Internet: Publicly accessible, necessitating robust security measures such as firewalls, encryption,
and secure protocols to protect data from unauthorized access and cyber threats.
Intranet: Designed with a focus on security, intranets are protected by firewalls and require user
authentication, limiting access to sensitive internal information.
3. Purpose
Internet: Facilitates global communication, information sharing, and access to a vast array of
services and resources across various sectors.
Intranet: Serves as a centralized platform for internal communication, collaboration, and resource
sharing within an organization, enhancing productivity and information dissemination among
employees.
4. Content
Internet: Hosts a wide range of content, including websites, social media, news, and
entertainment, catering to diverse interests and industries.
Intranet: Contains content relevant to the organization's operations, such as internal news,
employee directories, and proprietary documents, ensuring that information is pertinent and
accessible to authorized personnel.
22
Intranet: Managed internally by an organization's IT department, allowing customization of
features and access controls to align with the organization's specific needs and policies.
6. Scalability
Internet: Designed to support an extensive number of users and devices, continually expanding to
accommodate global growth.
7. Examples of Use
Internet: Accessing websites, streaming media, participating in online forums, and engaging in e-
commerce.
Intranet: Collaborating on internal projects, accessing company policies, and utilizing internal
communication tools among employees.
In summary, while both the Internet and intranets utilize similar networking technologies, they differ
significantly in terms of accessibility, security, purpose, content, management, scalability, and usage. The
Internet offers broad, public access to information and services, whereas intranets provide secure,
controlled environments for internal organizational communication and resource sharing.
1. Reliability:
- The ability of a LAN to perform consistently without failures over time.
- Focuses on minimizing downtime caused by hardware/software errors.
2. Availability:
- The percentage of time a LAN is operational and accessible to users.
- Measured as uptime (e.g., "five nines" = 99.999% availability).
23
- Example: Dual power supplies in switches.
2. Error Detection/Correction:
- Use protocols like CRC (Cyclic Redundancy Check) to detect data errors.
- Implement retransmission mechanisms (e.g., TCP) to recover lost packets.
3. High-Quality Hardware:
- Invest in enterprise-grade equipment (e.g., Cisco switches) with longer lifespans.
4. Preventive Maintenance:
- Regularly update firmware, replace aging cables, and monitor performance.
5. Fault Tolerance:
- Design networks with self-healing capabilities (e.g., Spanning Tree Protocol for loop prevention).
24
Relationship Between Reliability and Availability
- Reliability reduces the frequency of failures.
- Availability ensures quick recovery when failures occur.
- Example:
- A reliable LAN avoids crashes due to redundant components.
- A highly available LAN restores connectivity within seconds using failover systems.
Aim for 99.9% (three nines) or higher availability for critical networks.
Test redundancy and disaster recovery plans regularly.
Document network topology and update it as the LAN evolves.
Summary
Reliability = Preventing failures.
Availability = Minimizing downtime.
Both require redundancy, quality components, and proactive maintenance to ensure a robust
LAN.
2.6.1 Reliability
Reliability in networking refers to the ability of a system or network to function correctly and consistently
over time, even in the presence of faults or failures. It ensures that data is transmitted accurately without
loss or corruption.
Key factors affecting network reliability include:
Redundancy – Having backup devices and connections to prevent failures.
Fault tolerance – The ability to continue operating despite hardware or software malfunctions.
25
Error detection and correction – Mechanisms such as checksums and parity checks that ensure
accurate data transmission.
Load balancing – Distributing traffic evenly across network devices to prevent congestion.
A reliable network minimizes downtime, ensuring continuous communication for businesses, education,
and daily activities.
2.6.2 Availability
Availability refers to the percentage of time a network or system remains operational and accessible to
users. High availability is crucial for organizations that rely on uninterrupted access to data and services.
Factors influencing network availability include:
Uptime vs. Downtime – Availability is often measured as a percentage of uptime, e.g., "99.99%
uptime."
Redundant power supplies and backup systems – Protects against power failures.
Failover systems – Automatically switches to a backup system if the primary one fails.
High availability is critical in banking, healthcare, and e-commerce, where network downtime can result
in significant losses.
Network Congestion – Excessive traffic can slow down or disrupt network performance.
Security Threats – WANs are vulnerable to cyberattacks such as Distributed Denial of Service
(DDoS) attacks.
Hardware Failures – Routers, switches, and cables can fail, causing disruptions.
ISP Dependency – WANs rely on Internet Service Providers (ISPs) for connectivity, making
them susceptible to external failures.
To enhance WAN reliability and availability, organizations use technologies such as Multiprotocol Label
Switching (MPLS), Software-Defined WAN (SD-WAN), and cloud-based networking solutions.
26
2.8 The Purpose of Local Area Network (LAN)
A Local Area Network (LAN) is a network that connects computers and devices within a limited
geographical area, such as a home, office, or school. LANs are designed for high-speed data exchange
and efficient communication.
Purposes and benefits of LANs include:
Resource Sharing – Users can share files, printers, and internet connections.
Centralized Data Management – Businesses can store and manage files on centralized servers.
Common LAN technologies include Ethernet, Wi-Fi, and Fiber Optic networks.
Disaster Recovery – Backup data can be stored remotely to prevent data loss.
Common WAN technologies include leased lines, Virtual Private Networks (VPNs), and satellite
communications.
2.10 Internet
The Internet is a global network of interconnected computers and devices, enabling communication,
information sharing, and online services. It functions through protocols like the Transmission Control
Protocol/Internet Protocol (TCP/IP).
Key services provided by the Internet include:
Web Browsing – Accessing websites and information.
27
Email Communication – Sending and receiving messages.
The Internet plays a crucial role in education, business, and entertainment, making it an essential part of
modern life.
2. Data Link Layer – Manages data frames and error detection (e.g., Ethernet, MAC addresses).
The OSI model helps developers and engineers design efficient and interoperable networks.
28
Chapter 3 : Project desIGn and implementation
3.1 Introduction
This section showcases how the project was actually designed and configured by the researchers
using the Cisco Packet Tracer simulation software. Some of the configured devices included
switches, computers and printers.
3.2.1console password
This password is when you connect your pc whith the console port of your switch/router
Switch> enable
Switch# conf t
Switch (config )# line console 0
Switch (config-line )# password orbit
Switch (config-line )# login
29
3.2.3 Virtual Teletype (VTY) Password
Switch> enable
Switch# conf t
Switch (config )# line vty 0 15
Switch (config-line )#transport input ssh #Disable Telnet for SSH-only access
Switch (config-line )# login local
Switch (config-line )# exit
3.3 VLANs
Virtual LANs (VLANs) are employed to logically segment the network into distinct
broadcast domains. In this project, VLANs are used to isolate departments, such as a
Registration (VLAN 10) and Finance (VLAN 20). Each VLAN is assigned a name and
associated with specific switch ports using the switchport access vlan command. This
segmentation enhances network security, reduces broadcast traffic, and facilitates more
efficient network management. The configuration for VLANs is done on each switch,
ensuring a well-organized and secure network infrastructure.
30
Switch (config )# vlan 60
Switch (config-vlan )# name Server-Room
Switch (config-vlan )# exit
Switch (config )# do wr
3.5 EtherChannel
EtherChannel is a Cisco technology that allows you to bundle multiple physical Ethernet links
into a single logical link. This logical link behaves like a single interface, which increases
bandwidth and provides redundancy.
Key Benefits of EtherChannel
31
3.5.1 EtherChannel Configuration
Switch> enable
Switch# conf t
Switch (config )# int range fa0/1-2
Switch (config-if-range )# channel group 1 mode activity
CORE-R1(config)# ip domain name cisco.net # Configures the domain name for DNS
resolution
CORE-R1(config)# username admin password cisco # Creates a local user 'Admin' with
password 'orbit'
CORE-R1(config)# crypto key generate rsa # Generates an RSA key pair for SSH
1024 # Specifies the key size as 1024 bits
CORE-R1(config-line)# line vty 0 15 # Enters VTY line configuration mode
CORE-R1(config-line)# login local # Enables local authentication for
VTY lines
CORE-R1(config-line)# transport input ssh # Allows SSH for remote access
CORE-R1(config-line)# ip ssh version 2 # Specifies the use of SSH version 2
CORE-R1(config-line)# exit # Exits global configuration mode
CORE-R1(config)# do wr # Writes the configuration to
Memory
32
Mlt-sw1(config-if)# ip address 10.10.10.8 255.255.255.252
Mlt-sw1(config-if)# no shutdown
Mlt-sw1(config-if)# exit
Mlt-sw1(config)# do wr
33
Example Scenario:
VLAN 10 = Registration (192.168.10.1)
VLAN 20 = Finance (192.168.20.1)
3.9.1 Advantages:
Saves ports: only one interface is needed for multiple VLANs.
Simple and cost-effective for small to medium networks.
Easy to implement and understand.
Mlt-sw1> enable
Mlt-sw1# configure terminal
Mlt-sw1(config)#interface vlan 10
Mlt-sw1(config-if)# ip address 192.168.10.1 255.255.255.0
Mlt-sw1(config-if)# ip helper-address 192.168.60.2
Mlt-sw1(config-if)# no shutdown
Mlt-sw1(config-if)# exit
Mlt-sw1(config)# do write
Mlt-sw1(config)#interface vlan 20
Mlt-sw1(config-if)# ip address 192.168.20.1 255.255.255.0
Mlt-sw1(config-if)# ip helper-address 192.168.60.2
Mlt-sw1(config-if)# no shutdown
Mlt-sw1(config-if)# exit
Mlt-sw1(config)# do write
Mlt-sw1(config)#interface vlan 30
Mlt-sw1(config-if)# ip address 192.168.30.1 255.255.255.0
34
Mlt-sw1(config-if)# ip helper-address 192.168.60.2
Mlt-sw1(config-if)# no shutdown
Mlt-sw1(config-if)# exit
Mlt-sw1(config)# do write
Mlt-sw1(config)#interface vlan 40
Mlt-sw1(config-if)# ip address 192.168.40.1 255.255.255.0
Mlt-sw1(config-if)# ip helper-address 192.168.60.2
Mlt-sw1(config-if)# no shutdown
Mlt-sw1(config-if)# exit
Mlt-sw1(config)# do write
Mlt-sw1(config)#interface vlan 50
Mlt-sw1(config-if)# ip address 192.168.50.1 255.255.255.0
Mlt-sw1(config-if)# ip helper-address 192.168.60.2
Mlt-sw1(config-if)# no shutdown
Mlt-sw1(config-if)# exit
Mlt-sw1(config)# do write
Mlt-sw1(config)#interface vlan 60
Mlt-sw1(config-if)# ip address 192.168.60.1 255.255.255.0
Mlt-sw1(config-if)# no shutdown
Mlt-sw1(config-if)# exit
Mlt-sw1(config)# do write
3.11 What is Telephone Service Configuration
Telephone service configuration refers to the process of setting up and managing phone
services, especially in a network that uses VoIP (Voice over IP) technology. This configuration
allows phones to work over a computer network instead of traditional phone lines.
It includes settings that control how phone calls are made, received, and handled within the network.
These settings may include assigning extension numbers to phones, setting up voicemail, call
forwarding, call waiting, caller ID, and enabling communication between phones inside and outside the
organization.
In business networks using IP phones and routers or switches, the configuration is usually done
by a network administrator. It helps ensure that all phones are properly connected, can
communicate clearly, and meet the needs of the organization.
Configuration can be done using network devices like routers (e.g., using Cisco’s Call Manager
Express), or through software and web interfaces provided by the service or equipment provider.
The exact configuration options and steps may vary depending on the type of network, devices used,
and the services required
35
3.12 What is Dynamic Host Configuration Protocol
(DHCP)?
DHCP stands for Dynamic Host Configuration Protocol. It is a network service that
automatically gives IP addresses and other network settings to devices (like computers,
phones, printers, etc.) when they connect to a network.
Without DHCP, all of this would have to be entered manually on each device,
That takes time and leads to errors.
DHCP makes this easy by automatically assigning all of these settings to
devices.
36
Some common features of switch port security may include:
MAC address filtering: Allowing only specific MAC addresses to connect to a switch port.
MAC address limitation: Limiting the number of MAC addresses that can connect to a switch port.
Port lockdown: Locking down a switch port to a specific MAC address, preventing any
other devices from connecting.
Violation actions: Configuring actions to be taken when a violation occurs, such as shutting
down the port, sending an alert, or logging the event
3.13.1 port security for Finance department
Finance> enable
Finance# conf t
Finance(config)# interface range fastEthernet 0/3 – 24
Finance(config-if-range)# switchport port-security
Finance(config-if-range)# switchport port-security maximum 1
Switch(config-if-range)# switchport port-security mac-address sticky
Switch(config-if-range)# switchport port-security violation shutdown
Switch(config-if-range)# exit
Switch(config)# do wr
In this configuration:
37
OSPF uses a math method called Dijkstra’s algorithm to calculate the shortest
path from one router to another. It chooses the path based on something called cost,
which usually depends on the speed or reliability of the link — lower cost = better
path.
OSPF works at Layer 3 (Internet Layer) of the OSI model, which is the same
layer where IP addresses are used.
Routers using OSPF exchange information by sending special messages called OSPF
advertisements. These messages include:
With all this information, each OSPF router creates a network map and figures out the best
path to reach every other device in the network.
Mlt-sw1(config-router)# end
Mlt-sw1# wr
38
Core router
CORE-R1# conf t
CORE-R1(config-router)# end
CORE-R1# exit
ISP
ISP-1# conf t
ISP-1(config)# router ospf 10
ISP-1(config-router)# router-id 5.5.5.5
ISP-1(config-router)# network 103.133.254.0 0.0.0.3 area 0
ISP-1(config-router)# network 103.133.254.4 0.0.0.3 area 0
ISP-1(config-router)# end
ISP-1# write memory
ISP-1# exit
39
3.15.1 Standard ACLs
These ACLs filter traffic based only on the source IP address of the packet. They are numbered
from 1 to 99 and use the "access-list" command followed by the ACL number
Feature Description
Purpose Ensures all devices in a network share the same accurate time.
Port Uses UDP port 123.
Hierarchical system of time accuracy. Lower stratum = closer to
Stratum Levels
accurate source.
Source Often synchronizes time with internet time servers or GPS clocks.
Security Can be secured with authentication to prevent spoofed time sources.
3.17 NTP Router Configuration in Cisco IOS
To configure Network Time Protocol (NTP) on a Cisco router, you need to:
Specify an NTP server
(Optionally) configure authentication
Verify synchronization status
3.18 Firewall
A firewall is a security system that monitors and controls incoming and outgoing network traffic
based on predetermined security rules. It acts as a barrier between a trusted internal network
and untrusted external networks, such as the internet.
Functions:
40
o Packet filtering
o Stateful inspection
o Proxy services
Firewalls are configured to allow more open access to/from trusted networks.
For Routers
CORE-R1# conf t
CORE-R1(config)# do wr
41
For multi-layer switch
Mlt-sw1# conf t
Mlt-sw1(config)# ip route 0.0.0.0 0.0.0.0 gig1/0/1
Mlt-sw1(config)# ip route 0.0.0.0 0.0.0.0 gig1/0/2 70
CORE-R1(config)# do wr
# Enable SNMP
IP ADDRESSING SCHEMA
Provide details about the IP addressing scheme applied to the network
Departments N.Address Subnet-musk Host Address range Broadcast ddress Puplic Ip b/w
CORE and ISP
Registration 192.168.10.0 255.255.255.0/24 192.168.10.1 to 192.168.10.254 192.168.10.255
103.133.254.0/30
Finance 192.168.20.0 255.255.255.0/24 192.168.20.1 to 192.168.20.254 192.168.20.255
103.133.254.4/30
Office-Dep 192.168.30.0 255.255.255.0/24 192.168.30.1 to 192.168.30.254 192.168.30.255
103.133.254.8/30
Ict-Dep 192.168.40.0 255.255.255.0/24 192.168.40.1 to 192.168.40.254 192.168.40.255
103.133.254.12/3
0
Advanced- 192.168.50.0 255.255.255.0/24 192.168.50.1 to 192.168.50.254 192.168.50.255
Server-Room 192.168.60.0 255.255.255.0/24 192.168.60.1 to 192.168.60.254 192.168.60.255
42
CHAPTER FOUR: IMPLEMENTATION AND TESTING
4.1 Introduction
This chapter describes the implementation and testing phases of the network project. The
implementation was carried out using Cisco Packet Tracer, where the full design was built,
configured, and evaluated for proper functionality. The objective was to ensure the designed
network met all predefined requirements, including scalability, redundancy, performance, and
security. The chapter includes screenshots from the simulation as well as detailed testing
results.
4.2.1 Components
The network design for the project incorporates the following devices:
4.2.1.2 Routers (4):
o 2 ISP router for upstream connectivity.
o Positioned at the core layer for redundancy.
o Connect to both ISPs for internet connectivity.
o Configured with static, public IP addresses from ISPs.
4.2.1.3 Multilayer Switches (2):
o Deployed at the core layer to provide redundancy and efficient routing.
o Configured for both switching and routing functionalities.
43
o Assigned IP addresses to enable inter-VLAN routing
44
4.3.1 Network Topology Design:
The network topology, including routers, switches, PCs, servers, and other
devices, was designed within Packet Tracer based on the specified
requirements.
45
CHAPTER FIVE: CONCLUSION AND FUTURE ENHENCEMENT
5.1 Introduction
In summary, the network design and implementation for the Company network design have
been successfully executed. Key achievements include a hierarchical network model with
redundancy at multiple layers, departmental segmentation through VLANs, inter-VLAN
routing, robust security measures, effective NAT and PAT configurations, and Quality of
Service (QoS) prioritization. Thorough testing using Cisco Packet Tracer ensured proper
functionality and alignment with project requirements. The resulting network provides
scalability, security, and efficiency, meeting the specified needs of the organization.
46
troubleshooting and future modifications.
47