Sunteți pe pagina 1din 28

WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

Chapter 1. Introduction
A computer network, often simply referred to as a Network, is a collection of computers and
devices connected by communications channels that facilitates communications among users
and allows users to share resources with other users. A computer network allows sharing of
resources and information among devices connected to the network. Networks may be
classified according to a wide variety of characteristics
Basic of Networking
A computer network consists of a collection of computers, printers and other equipment that
is connected together so that they can communicate with each other.

Representation of Network in a college

Broadly speaking, there are two types of network configuration, peer-to-peer networks and
client/server networks.

Peer-to-peer networks are more commonly implemented where less than ten computers are
involved and where strict security is not necessary. All computers have the same status, hence
the term 'peer', and they communicate with each other on an equal footing. Files, such as
word processing or spreadsheet documents, can be shared across the network and all the
computers on the network can share devices, such as printers or scanners, which are
connected to any one computer.

Client/server networks are more suitable for larger networks. A central computer, or 'server',
acts as the storage location for files and applications shared on the network. Usually the

1
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

server is a higher than average performance computer. The server also controls the network
access of the other computers which are referred to as the 'client' computers. Typically,
teachers and students in a school will use the client computers for their work and only the
network administrator (usually a designated staff member) will have access rights to the
server.

Types of computer networks:-



LAN (LOCAL AREA NETWORK)

WAN (WIDE AREA NETWORK)

MAN (METROPOLITAN AREA NETWORK)


A local area network (LAN) is a computer network that interconnects computers within a
limited area such as a residence, school, laboratory, university campus or office building [1]
and has its network equipment and interconnects locally managed.

WAN (WIDE AREA NETWORK)

A wide area network is a telecommunication network that extends over a large
geographical distance. Wide area networks are often established with least
telecommunication circuits.

MAN (METROPOLITAN AREA NETWORK)

A metropolitan area network (MAN) is a computer network that interconnects users
with computer resources in a geographic area or region larger than that covered by even a
large local area network (LAN) but smaller than the area covered by a wide area network
(WAN).

Components of a Network

A Computer network comprises the following components:


• A minimum of at least 2 computers
• Cables that connect the computers to each other, although wireless communication is
becoming more common (see Advice Sheet 20 for more information)
• A network interface device on each computer (this is called a network interface card or
NIC)
• A ‘Switch’ used to switch the data from one point to another. Hubs are outdated and are

2
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

little used for new installations.


• Network operating system software

Hub and Switch

A hub is a device used to connect a PC to the network. The function of a hub is to direct
information around the network, facilitating communication between all connected devices.
However in new installations switches should be used instead of hubs as they are more effective
and provide better performance. A switch, which is often termed a 'smart hub'.

Wireless Networks

The term 'wireless network' refers to two or more computers communicating using standard
network rules or protocols, but without the use of cabling to connect the computers together.
Instead, the computers use wireless radio signals to send information from one to the other. A
wireless local area network (WLAN) consists of two key components: an access point (also called a
base station) and a wireless card. Information can be transmitted between these two components as
long as they are fairly close together (up to 100 meters indoors or 350 meters outdoors).

Advantages of Networking
Speed.
Networks provide a very rapid method for sharing and transferring files. Without a network, files
are shared by copying them to floppy disks, then carrying or sending the disks from one computer

3
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

to another. This method of transferring files in this manner is very time-consuming.

Cost.
The network version of most software programs are available at considerable savings when
compared to buying individually licensed copies. Besides monetary savings, sharing a program on a
network allows for easier upgrading of the program. The changes have to be done only once, on the
file server, instead of on all the individual workstations.

Centralized Software Management.


One of the greatest benefits of installing a network at a school is the fact that all of the software can
be loaded on one computer (the file server). This eliminates that need to spend time and energy
installing updates and tracking files on independent computers throughout the building.

Resource Sharing.
Sharing resources is another area in which a network exceeds stand-alone computers. Most schools
cannot afford enough laser printers, fax machines, modems, scanners, and CD-ROM players for
each computer.

Flexible Access.
School networks allow students to access their files from computers throughout the school.
Students can begin an assignment in their classroom, save part of it on a public access area of the
network, then go to the media center after school to finish their work. Students can also work
cooperatively through the network.

Security.
Files and programs on a network can be designated as "copy inhibit," so that you do not have to
worry about illegal copying of programs. Also, passwords can be established for specific directories
to restrict access to authorized users.

OSI Reference Model


One of best gifts the OSI specifications gives us is paving the way for the data transfer between
disparate hosts running different operating systems, like Unix hosts, Windows machines, Macs,

4
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

smartphones, and so on.

The OSI has seven different layers, divided into two groups. The top three layers define how the
applications within the end stations will communicate with each other as well as with users. The
bottom four layers define how data is transmitted end to end.

The OSI model consists of seven layers, each corresponding to a specific network function:

IP Addressing: - One of the most important topics in any discussion of TCP/IP is IP addressing.
An IP address is a numeric identifier assigned to each machine on an IP network. It designates the
specific location of a device on the network.
An IP address is a software address, not a hardware address—the latter is hard-coded on a network
interface card (NIC) and used for finding hosts on a local network. IP addressing was designed to
allow hosts on one network to communicate with a host on a different network regardless of the
type of LANs the hosts are participating in.

Network Addressing

The network address (which can also be called the network number) uniquely identifies each
network. Every machine on the same network shares that network address as part of its IP address.
For example, in the IP address 172.16.30.56, 172.16 is the network address.

5
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

The node address is assigned to, and uniquely identifies, each machine on a network. This part of
the address must be unique because it identifies a particular machine—an individual— as opposed
to a network, which is a group. This number can also be referred to as a host address. In the sample
IP address 172.16.30.56, the 30.56 specifies the node address.

Network Address Range: Class A

The designers of the IP address scheme decided that the first bit of the first byte in a Class A
network address must always be off, or 0. This means a Class A address must be between 0 and 127
in the first byte, inclusive.

Network Address Range: Class B

In a Class B network, the RFCs state that the first bit of the first byte must always be turned on but
the second bit must always be turned off. If you turn the other 6 bits all off and then all on, you will
find the range for a Class B network:
10000000 = 128
10111111 = 191

Network Address Range: Class C

6
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

For Class C networks, the RFCs define the first 2 bits of the first octet as always turned on, but the
third bit can never be on. Following the same process as the previous classes, convert from binary
to decimal to find the range. Here’s the range for a Class C network:
11000000 = 192
11011111 = 223
So, if you see an IP address that starts at 192 and goes to 223, you’ll know it is a Class C
IP address.

Subnet Masks

For the subnet address scheme to work, every machine on the network must know which part of the
host address will be used as the subnet address. This condition is met by assigning a subnet mask to
each machine. A subnet mask is a 32-bit value that allows the device that’s receiving IP packets to
distinguish the network ID portion of the IP address from the host ID portion of the IP address. This
32-bit subnet mask is composed of 1s and 0s, where the 1s represent the positions that refer to the
network subnet addresses.

Not all networks ned subnets, and if not, it really means that they’re using the default subnet mask,
which is basically the same as saying that a network doesn’t have a subnet address. The default
subnet masks for Classes A, B, and C.
Class Format Default Subnet Mask

A -255.0.0.0
B- 255.255.0.0
C -255.255.255.0

Classless Inter-Domain Routing (CIDR)


Another term you need to familiarize yourself with is Classless Inter-Domain Routing (CIDR). It’s
basically the method that Internet service providers (ISPs) use to allocate a number of addresses to
a company, a home—their customers. They provide addresses in a certain block size, something

I’ll talk about in greater detail soon. When you receive a block of addresses from an ISP, what you
get will look something like this: 192.168.10.32/28.

7
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

Subnetting Class C Addresses

There are many different ways to subnet a network. The right way is the way that works best for
you. Remember that subnet bits start at the left and move to the right, without skipping bits. This
means that the only Class C subnet masks can be the following:
Binary Decimal CIDR 00000000
= 255.255.255.0 /24

Subnetting Class B Addresses

Before we dive into this, let’s look at all the possible Class B subnet masks first. Notice that we
have a lot more possible subnet masks than we do with a Class C network address:
255.255.0.0 (/16)

255.255.128.0 (/17) 255.255.255.0 (/24)


255.255.192.0 (/18) 255.255.255.128 (/25)
255.255.224.0 (/19) 255.255.255.192 (/26)
255.255.240.0 (/20) 255.255.255.224 (/27)
255.255.248.0 (/21) 255.255.255.240 (/28)
255.255.252.0 (/22) 255.255.255.248 (/29)
255.255.254.0 (/23) 255.255.255.252 (/30)

Subnetting Class A Addresses

Let’s start by listing all the Class A masks:


255.0.0.0 (/8)
255.128.0.0 (/9) 255.255.240.0 (/20)
255.192.0.0 (/10) 255.255.248.0 (/21)
255.224.0.0 (/11) 255.255.252.0 (/22)
255.240.0.0 (/12) 255.255.254.0 (/23)
255.248.0.0 (/13) 255.255.255.0 (/24)
IPv4

8
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

IP addresses are displayed in dotted decimal notation and appear as four numbers separated by
dots. Each number of an IP address is made from eight individual bits known as octet. Each
octet can create number value from 0 to 255. An IP address would be 32 bits long in binary
divided into the two components, network component and host component. Network component
is used to identify the network that the packet is intend for, and host component is used to
identify the individual host on network.

IP addresses are broken into the two components:


Network component: - Defines network segment of device.
Host component: - Defines the specific device on a particular network segment
IP Classes in decimal notation

Class A addresses range from 1-126

Class B addresses range from 128-191

Class C addresses range from 192-223

Class D addresses range from 224-239

Class E addresses range from 240-254

• 0 [Zero] is reserved and represents all IP addresses.


• 127 is a reserved address and is used for testing, like a loop back on an interf ace.
• 255 is a reserved address and is used for broadcasting purposes.

In decimal notation subnet mask value 1 to 255 represent network address and value 0 [Zero]
represent host address.
• In binary notation subnet mask ON bit [1] represent network address while OFF bit
[0] represent host address.

Network ID: First address of subnet is called network ID. This address is used to identify one

9
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

segment or broadcast domain from all the other segments in the network.

Block Size: Block size is the size of subnet including network address, hosts addresses and
broadcast address.

Broadcast ID: There are two types of broadcast, direct broadcast and full broadcast.

Direct broadcast or local broadcast is the last address of subnet and can be hear by all hosts in
subnet.

Full broadcast is the last address of IP classes and can be hear by all IP hosts in network. Full
broadcast address is 255.255.255.255

The main difference between direct broadcast and full broadcast is that routers will not propagate
local broadcasts between segments, but they will propagate directed broadcasts.

Open Shortest Path First (OSPF) Basics


Open Shortest Path First is an open standard routing protocol that’s been implemented by a wide
variety of network vendors, including Cisco. And it’s that open standard characteristic that’s the
key to OSPF’s flexibility and popularity.
Most people opt for OSPF, which works by using the Dijkstra algorithm to initially
construct a shortest path tree and follows that by populating the routing table with the resulting
best paths. EIGRP’s convergence time may be blindingly fast, but OSPF isn’t that far behind, and
its quick convergence is another reason it’s a favorite. Another two great advantages OSPF offers
are that it supports multiple, equal-cost routes to the same destination, and like EIGRP, it also
supports both IP and IPv6 routed protocols.

SYNTAX:

#Router ospf <process id (1-65535)>


#net (direct network) (wildcard mask) area 0

10
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

DHCP (DYNAMIC HOST CONFIGURATION PROTOCOL)

In our networks, all end user devices need an IP address to access the network. Static IP addresses
are usually assigned to routers, management interfaces on switches, servers and other devices in the
network which do not change location either physically or logically. Static IP addresses are also
used to access and manage these devices remotely.

On the other hand, user devices such as computers, smartphones, IP phones and others are likely to
change their locations either physically or logically. This means that assigning them static IP
addresses would be an unviable solution.

DHCP is a protocol that was invented to address these problems. With DHCP, we can assign IP
address information to user nodes automatically which saves on the administrative overhead that
would be involved in assigning IP addressing information to clients statically.

IPv6
IPv6 is the newest version of the IP protocol. IPv6 was developed to overcome many deficiencies
of IPv4, most notably the problem of IPv4 address exhaustion. Unlike IPv4, which has only about
4.3 billion (2 raised to power 32) available addresses, IPv6 allows for 3.4 × 10 raised to power 38
addresses.

IPv6 features
Here is a list of the most important features of IPv6:
Large address space: IPv6 uses 128-bit addresses, which means that for each person on the
Earth there are 48,000,000,000,000,000,000,000,000,000 addresses!
Enhanced security: IPSec (Internet Protocol Security) is built into IPv6 as part of the protocol.
This means that two devices can dynamically create a secure tunnel without user intervention.
Header improvements: the packed header used in IPv6 is simpler than the one used in IPv4. The
IPv6 header is not protected by a checksum so routers do not need to calculate a checksum for
every packet.
No need for NAT: since every device has a globally unique IPv6 address, there is no need for

NAT.

11
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

Stateless address auto configuration: IPv6 devices can automatically configure themselves
with an IPv6 address.

IPv6 Address format


Unlike IPv4, which uses a dotted-decimal format with each byte ranges from 0 to 255, IPv6 uses
eight groups of four hexadecimal digits separated by colons. For example, this is a valid IPv6
address:

2340:0023: AABA:0A01:0055:5054:9ABC:ABB0
If you don’t know how to convert hexadecimal number to binary here is a table that will help
you:

IPv6 address shortening


The IPv6 address given above looks daunting, right? Well, there are two conventions that can
help you shorten what must be typed for an IP address:

1. a leading zero can be omitted


For example, the address mentioned above (2340:0023:AABA:0A01:0055:5054:9ABC:ABB0)
could be shorten to2340:23:AABA:A01:55:5054:9ABC:ABB0
2. successive fields of zeroes can be represented as two colons (::)
For example, 2340:0000:0000:0000:0455:0000:AAAB:1121 can be written
as2340::0455:0000:AAAB:1121

12
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

The project is about “WAN DESIGN FOR VARIOUS OFFICE CONNECTIVITY”.

Businesses with multiple branch office locations often suffer connecting and sharing
network resources over the WAN. They tend to think that the WAN technologies are
very expensive and more for large enterprises with substantial capital. They didn’t
realize that regardless your network size, small or large, the underlying design
principles are mostly the same. More often, small businesses leverage cost efficient
DSL, 4G LTE, and Internet over Coax cable to provide secondary or backup WAN
connections. In this session, we will cover the basic WAN design for multiple office
connectivity.

When we do WAN design, there’s a lot of similarities to how we do campus design.


If we have a limited number of remote locations, let’s just say we have 500 to a
thousand remote sites. We can do just a simple hub and spoke type topology where
our main data centre is the hub and all of our spokes simply connect directly to that.
This can be scaled down all the way to just one HQ and one remote branch.

This project mainly contains the design of the various branches of an organization.
The design will contain various PC’s, routers, Severs and each of the components
will have their own IP addresses etc.

13
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

Network Security Management Configuration-

Network Security Configuration Management (NSCM) is the process of organizing and


maintaining information about all the components of a computer network. When a network needs
repair, modification, expansion or upgrading, the administrator refers to the network configuration
management database to determine the best course of action. This database contains the locations
and network addresses of all hardware devices, as well as information about the programs, versions
and updates installed in network computers.

Network Security Configuration Management. Tripwire helps organizations of all sizes


successfully automate the hardening of their servers, databases and network devices. Our
patented, award-winning suite of Network Security Configuration Management (NSCM)
products and services continuously monitor the integrity of those systems.

14
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

Chapter 2. SRS (SOFTWARE REQUIREMENT SPECIFICATION)


1. Introduction
1.1 Purpose

Businesses with multiple branch office locations often suffer connecting and sharing network
resources over the WAN. They tend to think that the WAN technologies are very expensive and
more for large ent. with substantial capital. They didn’t realize that regardless your network size,
small or large, the underlying design principles are mostly the same.

1.2 Intended Audience and Reading Suggestions

This project is for the WAN Design for multiple connection area and it is restricted within the
college premises. This has been implemented under the guidance of college professors. This
project is useful for the different offices and as well as to the employees and company.

1.3 Product Scope

WAN DESIGN FOR MULTIPLE LOCATIONS WITH SECURITY provides a better functionality in current
scenario. Almost in every IT department network has become a backbone of IT industry. Different
organization has different connection and configuration with new technology. Network security is
an important field that is increasingly gaining attention as the internet expands. Security
technology is mostly software based, but many common hardware devices are used.

1.4 References

• www.networkessential.com
• www.ipcisco.com
• www.9tut.com
• www.cisco.com
• www.networkessential.com

15
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

2. Overall Description
2.1 Product Perspective

This project on WAN design for multiple office connectivity mainly contains the communication
between two offices in different locations, means if employees of one branch of an Organization
want to access the data of the other branch of same Organization/Office. This project will contain
the design of the connectivity between two branches.

2.2 Product Functions

2.3 User Classes and Characteristics

We are going to use different PC’s and router and switches and other components to make the
WAN Design For Multiple Office Connectivity.

16
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

2.4 Operating Environment

Operating env. for the WAN Design for multiple office connectivity is as listed below.

 Database
 Client/Server System
 Operating System: Windows.
 Platform: Cisco Packet Tracer

2.5 Design and Implementation Constraints

 Multiple PC’s must be connected in Cisco Packet Tracer of 2 branches


 Implement the database at least using a centralized database management system.

2.6 User Documentation

A Single User manual will be delivered with the product to help the user with the design and use
of the project. It will contain the design of the networks and its connections.

2.7 Assumptions and Dependencies

Let us assume that this is a distributed WAN Design For Multiple Office Connectivity and it is used
in the following application:

 The connection between 2 branches of the same organization


 To Access the data of any student or employee of a branch from any other branch
of the same organization.

3. External Interface Requirements


3.1 User Interfaces

 Front-end software: Cisco Packet Tracer.


 Back-end software: Database.

17
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

3.2 Hardware Interfaces

 Windows.
 Cisco Packet Tracer to run the design.

3.3 Software Interfaces

Following are the software used for the flight management online application.

Software Used Description

 Operating System  We have chosen


Windows operating
system for its best
support and user-
friendliness.
 Database  To save the
employee and
student or any other
records.

 To implement the
 Cisco Packet Tracer project, we have
chosen CISCO
Packet Tracer. It is
used for practicing
most of the
networking
configurations.

18
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

3.4 Communications Interfaces

CISCO PACKET TRACER:-

A cisco packet tracer is a network simulator software. It is used for practicing most of the
networking configurations. It helps to understand about how to configure the networks.

4. System Features

4.1 System Feature

4.1.1 Description and Priority

Benefit – 9/10

Risk – 7/10

Cost – 8/10

4.1.2 Stimulus/Response Sequences

The user will create the design of WAN Design For Multiple Office
Connectivity In Cisco Packet Tracer, it will contain various PC’s, Routers, Hubs,
Servers etc. The user will be able to see the connections between all the
branches and the main office of organization.

4.1.3 Functional Requirements

The Design of the project will tell us about the connections between different
branches of any organization. The whole design of the project will be made on Cisco
Packet Tracer

19
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

5. Other Non-functional Requirements


5.1 Performance Requirements

Network managers measure WAN performance using diff. parameters, such as per-port metrics
(traffic volume on port 80 between clients and servers and the elapsed time) or end-user metrics
(speeds of key functions)

5.2 Safety Requirements

If there is extensive damage to a wide portion of the database due to catastrophic failure, such as
a disk crash, the recovery method restores a past copy of the database that was backed up to
archival storage (typically tape) and reconstructs a more current state by reapplying or redoing the
operations of committed transactions from the backed up log, up to the time of failure and the
CISCO Packet Tracer should work finely so that the design can be used and implemented.

5.3 Security Requirements

Security systems need database storage just like many other applications. However, the special
req. of the security market mean that vendors must choose their database partner carefully and
the design maker of the network connections too.

5.4 Software Quality Attributes

 AVAILABILITY: The connection between all the branches and computers


should be available.

 CORRECTNESS: The Data should be connected to the other branches at correct


time so that it can be accessed easily, and the connection should be well performing.

 MAINTAINABILITY: The Employees should maintain the connection


between the branches and the design of the project.

 USABILITY: The Connection between the branches and employees should


satisfy a maximum number of user needs.

20
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

6. Other Requirements
The design methodology for the remote site everything starts from this common basic building
block of the single connected remote site- single router, single link. Everything builds based on this
foundation. Everyone needs at least one router and one link for a remote site. If I need to add
resiliency, one of way of doing that is take the single router and just add another link to it. So, we’ll
start with the basic router and then we’ll give you a procedure to add the second link and adjust
the routing.

Appendix A: Glossary
 Req - Requirements.
 Diff – Different.
 Ent – Enterprises.
 Env – Environment.

21
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

Chapter 3. ARCHITECTURE DIAGRAM

22
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY
Chapter 4. PROJECT METHODOLOGY

Businesses with multiple branch office locations often suffer connecting and sharing network resources over
the WAN. They tend to think that the WAN technologies are very expensive and more for large enterprises
with substantial capital. They didn’t realize that regardless your network size, small or large, the underlying
design principles are mostly the same. More often, small businesses leverage cost efficient DSL, 4G LTE,
and Internet over Coax cable to provide secondary or backup WAN connections. In this session, we will
cover the basic WAN design for multiple office connectivity.

When we do WAN design, there’s a lot of similarities to how we do campus design. If we have a limited
number of remote locations, let’s just say we have 500 to a thousand remote sites. We can do just a simple
hub and spoke type topology where our main data centre is the hub and all of our spokes simply connect
directly to that. This can be scaled down all the way to just one HQ and one remote branch.

If we’ve got extremely large networks or they are geographically located, I’ve got maybe a US network, I
have a European hub network, and maybe something Asia-Pacific, what I start to do is that I add distribution
layers for the WAN in terms of regional aggregation sites per geography. We recommend using a datacentre
as the hub site because you’ll need Uninterruptible Power Supply (UPS), cooling and high capacity internet
pipes. Tier one and two Internet carriers tend to have presence at major datacentre and colocation facilities.
The cost of a high bandwidth circuit is cheaper than what you can get at any office buildings.

If I want additional resiliency in terms of hardware, now I add a second router, add a second WAN link on
that router. On the LAN-facing side, I can do either HSRP or the routing on the LAN side to interconnect the
devices. So, we always follow this design principle. I do the basic, I add a link or I add a router with another
link. And these can be any different combinations. If you take a look at all the different ways we can do it,
the non-redundant single link sites, we can add these single-router dual link sites, we can do dual links with
dual routers and all the different transport combinations. Now, we’ve got eight different options here, and
then we start adding layer2 links like VPLS or metro services, and 3G/4G. We treat 3G/4G the same way as
any traditional physical Internet circuit. We build VPN transport on top of it.

23
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY
Technology used
CISCO PACKET TRACER:

A cisco packet tracer is a network simulator software. It is used for practicing most of the networking
configurations. It helps to understand about how to configure the networks. Packet tracer is a cross-platform
visual simulation tool designed by a cisco systems that allows user to create network topologies and imitate
modern computer network.

24
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

Chapter 5. SCREENSHOT

25
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

Chapter 6. CONCLUSION

WAN DESIGN FOR MULTIPLE LOCATIONS WITH SECURITY is all about setting up a network

through which we can share the data among different network. We have also implemented that only

authorized user can access the data and Admin can change the configuration of the network. Here Data are

smoothly shared among different network and also applied some restriction of the network so that

unauthorized user can’t access the resources of the network.

All protocols and security related implementation are running with well manner in this project. Wireless

network is also working fine in this project and sharing the data among users.

26
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

FUTURE SCOPE

WAN DESIGN FOR MULTIPLE LOCATIONS WITH SECURITY provides a better functionality in
current scenario. Almost in every IT department network has become a backbone of IT industry. Different
organization has different connection and configuration with new technology. Network security is an
important field that is increasingly gaining attention as the internet expands. Security technology is mostly
software based, but many common hardware devices are used.

It was surprise to see most of the development taking place in the same technology being used. The
embedded security of the new internet protocol IPv6 may provide many benefits to internet users. Although
some security issues were observed, the ipv6 internet protocols seem to evade many of the current popular
attacks. Combined use of ipv6 and security tools such as firewalls, Intrusion Detection, and authentication
mechanism will prove effective in guarding intellectual property for the new future.

27
WAN DESIGN FOR MULTIPLE OFFICE CONNECTIVITY

REFERENCE

• All about Computer Network by Manohar Lodia

• Data communication By Ferozon

• http://www.chicagocomputerfix.com/it-consulting.html

• http://www.networkessential.com

• http://ipcisco.com

• http://9tut.com

• http://www.cisco.com

• http://www.networkessential.com

28

S-ar putea să vă placă și