Casestudy Report Final-2
Casestudy Report Final-2
Submitted by
G.N.S.S.Aditya – RA2211028010192
BACHELOR OF TECHNOLOGY
NOVEMBER 2024
BONAFIDE CERTIFICATE
Certified that this case study report for the course 21CSC302J – Computer Networks entitled in
“SIMPLE OFFICE NETWORKING USING DHCP” is the Bonafide work of Thaniya
Sunkesula [RA2211028010169], K. Bharath Reddy [RA2211028010188], K. Sri Vyshnavi
[RA2211028010189], G.N.S.S.Aditya[RA2211028010192] who carried out the case study under
my supervision. Certified further, that to the best of my knowledge, the work reported here in
does not form any other project report or dissertation on the basis of which a degree or award was
conferred on an earlier occasion on this or any other candidate.
This case study details the design and implementation of a network for an Enterprise, focused on
operating independently from headquarters while meeting essential communication and security
needs. Using Cisco Packet Tracer, the network integrates a router, switch, and wireless access
points, creating a structured, scalable environment. The network is segmented into VLANs for three
departments— Admin/IT, Finance/HR, and Customer Service/Reception—enabling secure data
separation and optimized management. DHCP is configured for automatic IPv4 address allocation,
and inter-VLAN routing allows for secure inter-departmental communication. Wireless connectivity
within each department enhances flexibility, while VLAN configuration strengthens security. The
network was tested and validated using Cisco Packet Tracer, ensuring that the design meets
performance and security standards. This implementation demonstrates a practical, scalable
approach for small business networking, addressing the branch's current operational needs and
providing a foundation for future growth.
3
Table of Contents
Abstract ----------------------------------------------------------------------------- 3
1. Introduction------------------------------------------------------------------ 5
2. Network Design------------------------------------------------------------- 6
3. Setting Access Points in each Department------------------------------- 8
4. Switching Configuration--------------------------------------------------- 11
5. Routing Configuration------------------------------------------------------ 13
6. Dynamic Host Configuration Protocol (DHCP)------------------------- 17
7. Results and Evaluation------------------------------------------------------ 20
8. Conclusion ------------------------------------------------------------------- 21
9. References--------------------------------------------------------------------- 22
10. Appendices--------------------------------------------------------------------- 22
Table of Figure: -
4
1. Introduction
1.1 Background
In today’s rapidly evolving network landscape, the "Branch Network Deployment" project
addresses the essential need for a dedicated and secure network infrastructure for an
Enterprise’s office, focused on buying and selling goods. The office is designed to operate
independently from the headquarters, ensuring uninterrupted local operations and secure data
management. This network aims to support key business functions for three departments—
Admin/IT, Finance/HR, and Customer Service/Reception—each with distinct requirements for
connectivity and data security. Leveraging Cisco technology for routers and switches, this
project prioritizes an organized, resilient, and future-ready network to meet the demands of this
growing branch office.
1.2 Objectives
The primary objectives of the "Branch Network Deployment" project are to design efficient,
scalable network infrastructure tailored to the specific needs of a small branch office. The
project focuses on implementing VLANs to isolate each department, ensuring data
segmentation and security, while establishing wireless access for user mobility. Key goals
include configuring DHCP for automatic IP allocation, enabling seamless inter-department
communication via inter-VLAN routing, and applying necessary security protocols. This
network design aims to provide a reliable, secure, and adaptable infrastructure that supports
current operations while preparing for potential expansions and technological advancements
as the branch grows.
5
2. Network Design
2.1 Topology
The network configuration designed for the "Branch Network Deployment" project adopts a
simplified hierarchical topology to achieve efficiency, manageability, and security for a small
branch office. This design includes two primary layers: the core and access layers. At the core
layer, a single router facilitates centralized routing, inter-VLAN communication, and manages
internet access for the branch. A switch operates at the access layer, connecting different
departments and organizing them into distinct Virtual Local Area Networks (VLANs) for
Admin/IT, Finance/HR, and Customer Service/Reception. Each VLAN provides logical
segmentation to ensure data privacy and network efficiency.
The access layer supports end-user devices, including PCs and wireless access points for each
department, connecting to the central switch to ensure seamless connectivity and mobility.
DHCP configuration on the router allows automatic IP assignment across all VLANs, reducing
manual configuration. This topology provides a structured, scalable layout, suitable for the
branch's needs, and facilitates smooth communication between departments while maintaining
data segregation and security.
6
COMPONENTS
The network design for the "Branch Network Deployment" project incorporates the following essential
devices:
1. Router (1):
• A single 2911 Router is deployed at the core layer to manage inter-VLAN
communication,DHCP services, and internet connectivity.
• Positioned at the access layer, the 2960-24TT Switch connects all wired devices and
provides VLAN segmentation for the three departments: Admin/IT, Finance/HR,
and Customer Service/Reception.
• Configured to support VLANs for data separation and security
3.Printers (3):
• Each department has a dedicated printer connected to the network, configured to
operate within its respective VLAN to maintain data privacy.
4.Access Points (Aps):
• Three wireless access points, one for each department, are deployed to provide
wireless connectivity for mobile devices.
• Configured with separate SSIDs to align with departmental VLANs, ensuring
secure and isolatedaccess for wireless devices.
5.End -User Devices (PCs):
• Three PCs, one assigned to each department, are deployed for essential departmental
operationsand communication.
7
2.2 IP Addressing Scheme
Broadcast
Department Network ID Subnet Mask Host Address Range
Address
Admin/IT 192.168.1.0 255.255.255.192 192.168.1.1 - 192.168.1.62 192.168.1.63
Finance/HR 192.168.1.64 255.255.255.192 192.168.1.65 - 192.168.1.126 192.168.1.127
Customer
192.168.1.128 255.255.255.192 192.168.1.129 -192.168.1.190 192.168.1.191
Service
TABLE 2.3.1
This IP addressing scheme provides dedicated network segments for each department, ensuringsecure
data separation and efficient management within the branch network.
To enable wireless communication for each department, set up dedicated wireless access points
configured with unique SSIDs and secure passphrases. Here’s how each department's wireless setup
was implemented:
o Admin/IT Department:
• SSID: Admin-WIFI
• Security Protocol: WPA2-PSK (Wi-Fi Protected Access 2 with Pre-Shared Key)
• Passphrase: Admin@123
This SSID and security configuration ensure that only authorized Admin/IT users with the
passphrase can connect to the network.
8
o Finance/HR Department:
• SSID: Finance-WIFI
• Security Protocol: WPA2-PSK
• Passphrase: Finance@123
• Similarly, this secure setup allows only Finance/HR users to connect, ensuring
department- specific access and protecting sensitive financial data.
• SSID: CS-WIFI
• Security Protocol: WPA2-PSK
• Passphrase: CustomerService@123
• The Customer Service/Reception team has its own SSID and passphrase, ensuring that
guests and employees in this department can connect without accessing the internal
networks of other departments
9
These configurations meet the company’s requirement for secure, department-specific wireless networks,
allowing each department to operate independently yet securely within the overall network. By using
WPA2-PSK, you’ve ensured strong encryption, which protects against unauthorized access and data
breaches.
10
Figure 3.3- WIFI
4.1Switch Configuration
To configure VLANs on the switch, VLAN 10 is created for Admin/IT, VLAN 20 for Finance/HR,
and VLAN 30 for Customer Service, with specific access ports assigned to each VLAN.
Commands:
11
Switch (config-if-range) #int range
fa0/5-7 Switch (config-if-range)
#switchport mode access
Switch (contig-11-range) #switchport access VLAN 20
Access VLAN does not exist. Creating
VLAN20
Switch (config-if-range) #
Switch (config-if-range) #
Switch (config-if-range) $int range fa0/8-
10 Switch (config-if-range) #switchport
mode access
Switch (config-if-range) #switchport access VLAN 30
* Access VLAN does not exist. Creating
VLAN 30 Switch (contig-11-range) #do
wr
Building
configuration... (OK]
Switch (config-if-range)
#exit Switch (config) do
show start Using 1539
bytes
version 15.0
no service timestamps log datetime msec no service timestamps debug datetime me no service
password-encryption hostname Switch
spanning-tree mode spanning-tree extend
system-id interface FastEthernet0/1
interface FastEchernet0/2
12
5. Router Configuration
Sub-interfaces have been configured on the main GigabitEthernet0 interface (e.g., gig0/0.10, gig0/0.20,
and gig0/0.30) to represent VLANs for each department. This setup isolates each department within its
own VLAN while enabling inter-VLAN communication through the router. Each sub-interface is
tagged with VLAN encapsulation using dot1Q, followed by a VLAN ID (e.g., dot1Q 10 for Admin,
dot1Q 20 for Finance, and dot1Q 30 for Customer Service), allowing the router to identify and manage
traffic foreach VLAN across the network.
Each sub-interface is assigned an IP address within its own subnet to serve as the default gateway for
devices in each VLAN. For example, VLAN 10 uses 192.168.1.1, VLAN 20 uses 192.168.1.65, and
VLAN 30 uses 192.168.1.129, all with a subnet mask of 255.255.255.192.
13
This configuration enables devices in each VLAN to receive IP addresses and settings like gateway andDNS
automatically via DHCP, simplifying network management
Commands:
Router (config-if) #
Router (config-if) #exit
Router (config) f
Router (config) #
Router (config) fint gig0/0.10
Router (Conf1g-gub1f) #
SLINK-5-CHANGED: Interface GigabitEtherneto/0.10, changed state to up
SLINEPROTO-S-UPDOWN: Line protocol on Interface GigabitEcherneco/0.10, changed state to up
Router (config-subif) #
Router (contig-subif) fencapaulation dot 1Q
* Incomplete command.
Router (config-subif) #encapsulation dot10 10
Router (config-subif) #ip address 192.168.1.1 255.255.255.192
Router (conf1g-sub1f) $
Router (config-subif) exit
Router (config) #
Router (config) #int g1g0/0.20
Router (contig-subif) +
&LINK-S-CHANGED: Interface GigabitEthernet0/0.20, changed state to up
ALINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEcherneto/0.20, changed state to up
Router (contig-aubif) #encapaulation dot10 20
Router (config-subif) $
Router (config-subif) #ip address 192.168.1.65 255.255.255.192
Router (config-subif) fdo wr
Building configuration...
[OK]
Router (config-subif) #
Router (config-sub1f) $ex
14
Router (config) #
Router (config) Fint 0100/0.30
Router (contig-sub2f)
interface GigabitEthernet0/0
no ip address duplex auto speed auto
intertace GigabitEthernet0/0.10
encapsulation dotiQ 10
ip address 192.168.1.1 255.255.255.192
Interface GigabitEtherneto/0.20
encapsulation dot10 20
ip address 192.168.1.65 255.255.255.192
interface GigabitEthernet0/0.30
encapsulation dot10 30
1p address 192.168.1.129 255.255.255.192
interface GigabitEthernet0/1
no 1p address duplex auto speed auto
shutdown
interface GagabatEtherneto/2
no ip address duplex auto speed auto
shutdown
interface VLAN no id
addressshutdown
15
Commands for router:
Router (config) #
Router (config) #
Router (config) #ip dhep pool Admin-Pool
Router (dhcp-config) #
Router (dhcp-config) #network 192.168.1.0 255.255.255.192
Router (dhcp-config) #default-router 192.168.1.1
Router (dhcp-conf1g) #dng-sexver 192.168.1.2
Router (dhcp-config) #domain-name Admin.com
Router (dhcp-config) #exit
Router (config) f
Router (config) #
Router (dhcp-config) ex
Router (config) #
Router (contig) #ip dhcp pool CS-pool
Router (dhcp-config) #network 192.168.1.128 255.255.255.192
Route (dhcp-config) default 192. 162.15021-
129Router (dhcp-contig) fdomain-name cs.com
Router (dhcp-config) #
Router (dhcp-config) #
16
6. DHCP (Dynamic Host Configuration Protocol):
17
Figure 6.2- printer config
18
Figure 6.3- smartphone
19
7. Results and Evaluation
7.1Performance Metrics
Performance metrics, including network latency, throughput, redundancy testing, DHCP response time,
inter-VLAN routing performance were measured during testing to ensure optimal network operation.
20
8. Conclusion
8.1 Summary
In summary, the network design and implementation for the company’s network have been
successfully executed. Key accomplishments include a well-structured network that meets the
organization’s requirements for departmental segmentation, wireless connectivity, secure IP
addressing through DHCP, and VLAN-based isolation for different departments. The setup allows
for seamless inter-VLAN communication, robust security through WPA2-PSK for wireless
networks, and automatic IP distribution to host devices. Testing in Cisco Packet Tracer confirmed
the functionality of each configuration, ensuring the network meets project specifications. The
resulting network is secure, efficient, and scalable, aligned with the needs of the company’s
operations.
21
9. References
[1] Cisco Networking Academy, Routing and Switching Essentials v6 Companion Guide, Cisco
Press,2016.
[2] Cisco Systems, Cisco Packet Tracer User Guide, Cisco Press, 2020.
[3] IEEE Standards Association, IEEE Standards for Local and Metropolitan Area Networks,
IEEE,2018.
10.Appendices
Abbreviations:
22