尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Project Report
Project Title: Sonali Bank Networking System
Course Code: CSE 318
Course Title: Computer Network Lab
Submitted To
Pranab Bandhu Nath
Senior Lecturer, Department of CSE
City University
Submitted By
Hasibul Islam Nirob
BSc in CSE (Day)
Batch: 49th
ID: 182482526
Date Of Submission: 13/07/2021
Introduction: ………………………………………………………………………………………………….…………… 3
Key Features: ………………………………………………………………………………………………….…………… 3
Physical Diagram: ….………………………………………………………………………. 4
1 Floor-1: …………………………………………………………………………4
2 Floor-2:……………………………………..…………………………………………………………………5
3 Floor-3: …………………………………………………………………………………………………………. 5
4 Floor-4: …………………………………………………………………………………………………………. 6
Logical Diagram: ……………………………………………………………………………………………………………. 7
Estimated Cost for this project: …………………………………………………………..…………………………. 9
NETWORK PROTOCOLS USED IN THIS NETWORK DESIGN ……………………………………………….10
Computer Assemble and Disassemble: …………………………………………………………………………. 13
Introduction:
A networking topic is important and popular in every sector, whether it is a company, organization, bank or any
other type of business. All CSE students must learn about networking concepts and logical design of real-life
scenarios. The problem is that there is a very popular software solution known as Cisco packet tracer that is
helping millions of people to design and simulate different networks and network devices. I also had to use
packet tracer for my project concerning Sonali bank's network design. During my work experience, I used and
configured various network devices like Router, Switches, etc., and I also had to understand IP classes, IP
configurations, topologies, and protocols, depending on the situation. In my Bank project, I worked with a variety
of servers, which include a Mail Server, Web Server, DNS, DHCP, and an IoT Server. There is a difference in
functionality between each of the networks individually. There are some that are intended to connect PCs,
others that are intended for IoT devices, and still others to maintain servers. The network is thus protected, yet it
can be easily troubleshooted.
Key Features:
• There is a different network for each floor.
• Our network can be extended up to 254 hosts.
• I will find troubleshooting much easier.
• Fixing will not be difficult.
• Even if any network loses connectivity, others will remain online.
• If necessary, we can secure the floor or block access to the network.
• We can remotely control our home devices with the use of smart devices.
• The purpose of some devices is to monitor and protect banks.
• Some of the devices can be programmed to automatically detect danger so that it alerts us when it comes.
• Depending on the purpose of the bank work, we use different types of servers.
• The network is designed for resource sharing so that money and resources can be saved.
• All hosts are automatically configured using DHCP.
Physical Diagram
Floor-1:
Floor-2:
Floor-3:
Floor-4:
Logical Diagram:
Estimated Cost for this project
NETWORK PROTOCOLS USED IN THIS NETWORK DESIGN:
Routing
1. Static Routing
– Static routes are configured on gateway/core routers of each branch
• In the main site, traffic is routed to another branch network from the inside network.
• each branch network's next hop address (IP) can be used. Since this is a small
• A static routed network is easy to use. It’s secure because no any routing
• advertising takes place between neighbors and computing resources are conserved
• there is no routing algorithm or update mechanism.
2. Default routing
– This is configured on core routers to route the traffic from inside
• network to ISP router for unknown traffic (towards internet)
3. Inter VLAN routing
– Core routers are configured to route the traffic between different
• Networks can be divided into VLANs. Core routers are reached by traffic
generated on core switches
• This is connected by a trunk link. Routes directly connected to all VLANs will be
shown
• A routing table (using sub-interfaces)
DNS (Domain Name System)
• On the top floor of the building is the server room that contains the DNS server.
The hosts of this show
• Assume that network and domain are connected. They are all present on every
host (workstation)
• Name of the domain. Then, you can connect to your host using its specific
domain name
• It can be done remotely. Computers, however, do not understand the name. To
convert it into numbers, you'll need to:
• The IP address. So, DNS servers maintain the mapping of domains of each host
to their IP addresses
• IP address of the corresponding computer. So, network complexity and
management are reduced.
FTP (File Transfer Protocol)
• The top floor server room has an FTP server installed. This is used to transfer
files between computers
• A network's insides. Uploading the files needed for sharing is done on the FTP
server. In other words,
• A special FTP client can be used to link clients to the shared files. This is the
main point
• The FTP server can be used to transfer data within a network for several
reasons, including the ability to access
• Transfers multiple files, including multiple formats, efficiently
• The ability to transfer files between multiple directories at once.
SMTP (Simple Mail Transfer Protocol)
• SMTP Mail server is placed in the ground floor server room. SMTP servers are more
reliable when sending mails to clients. They deliver mail to recipients quickly, they offer
reliability in
• sending email messages (SMTP server will always try to re-send the same email until the
Security Requirements
• A firewall will be used so unauthorized use will be restricted. Part of the security will be
user accounts and passwords that will give limited access. There will be different access
capabilities for network managers and users,
Computer Assemble and Disassemble
Sonali Bank Network Design Project Report
Sonali Bank Network Design Project Report

More Related Content

What's hot

CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
Vuz Dở Hơi
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
Zafar Ayub
 
Thread scheduling in Operating Systems
Thread scheduling in Operating SystemsThread scheduling in Operating Systems
Thread scheduling in Operating Systems
Nitish Gulati
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
Shakib Ansaar
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
Tapan Khilar
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
Mustafa Salam
 
A presentation on networking and ccna
A presentation on networking and ccnaA presentation on networking and ccna
A presentation on networking and ccna
vivek kumar
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
Wamuyu Murakaru
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
Anjan Mahanta
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
Touhidul Fahim
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
Kavya Barnadhya Hazarika
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
Sunita Sahu
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
Kishore Kumar
 
Packet tracer practical guide
Packet tracer practical guidePacket tracer practical guide
Packet tracer practical guide
Nishant Gandhi
 
IPv4
IPv4IPv4
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
Pallepati Vasavi
 
Ip address
Ip addressIp address
Ip address
MdAnikKhan
 
Router
RouterRouter
Router
osaz777
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
Fatbardh Hysa
 

What's hot (20)

CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
 
Thread scheduling in Operating Systems
Thread scheduling in Operating SystemsThread scheduling in Operating Systems
Thread scheduling in Operating Systems
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
A presentation on networking and ccna
A presentation on networking and ccnaA presentation on networking and ccna
A presentation on networking and ccna
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
 
Packet tracer practical guide
Packet tracer practical guidePacket tracer practical guide
Packet tracer practical guide
 
IPv4
IPv4IPv4
IPv4
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Ip address
Ip addressIp address
Ip address
 
Router
RouterRouter
Router
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
 

Similar to Sonali Bank Network Design Project Report

Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01
Gaurav Goyal
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
Sanat Maharjan
 
A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)
Tuan Yang
 
Networking basics
Networking basicsNetworking basics
Networking basics
Vadiraj Jahagirdar
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
Zakirul Islam
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
Kaythry P
 
4. system models
4. system models4. system models
4. system models
AbDul ThaYyal
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit i
JAIGANESH SEKAR
 
RODMAN Best way to test continuity between OSI.pptx
RODMAN Best way to test continuity between OSI.pptxRODMAN Best way to test continuity between OSI.pptx
RODMAN Best way to test continuity between OSI.pptx
bilisashobe430
 
Computer networks
Computer networksComputer networks
Computer networks
sonukumar142
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
ssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
ssuserf7cd2b
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
Osi model
Osi modelOsi model
Osi model
sayyed sabir
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure or
YogeshKumar187055
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
Sithu PM
 
Unit2.2
Unit2.2Unit2.2
lecture 2.pptx
lecture 2.pptxlecture 2.pptx
lecture 2.pptx
MelkamuEndale1
 
Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1
Vasanti Dutta
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
Samit Singh
 

Similar to Sonali Bank Network Design Project Report (20)

Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
 
4. system models
4. system models4. system models
4. system models
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit i
 
RODMAN Best way to test continuity between OSI.pptx
RODMAN Best way to test continuity between OSI.pptxRODMAN Best way to test continuity between OSI.pptx
RODMAN Best way to test continuity between OSI.pptx
 
Computer networks
Computer networksComputer networks
Computer networks
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
MVA slides lesson 1
 
Osi model
Osi modelOsi model
Osi model
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure or
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 
lecture 2.pptx
lecture 2.pptxlecture 2.pptx
lecture 2.pptx
 
Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 

Recently uploaded

Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
UiPathCommunity
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
dipikamodels1
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
DianaGray10
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
UmmeSalmaM1
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
Neeraj Kumar Singh
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
ScyllaDB
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
Knoldus Inc.
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
ScyllaDB
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
ScyllaDB
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 

Recently uploaded (20)

Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 

Sonali Bank Network Design Project Report

  • 1. Project Report Project Title: Sonali Bank Networking System Course Code: CSE 318 Course Title: Computer Network Lab Submitted To Pranab Bandhu Nath Senior Lecturer, Department of CSE City University Submitted By Hasibul Islam Nirob BSc in CSE (Day) Batch: 49th ID: 182482526 Date Of Submission: 13/07/2021
  • 2. Introduction: ………………………………………………………………………………………………….…………… 3 Key Features: ………………………………………………………………………………………………….…………… 3 Physical Diagram: ….………………………………………………………………………. 4 1 Floor-1: …………………………………………………………………………4 2 Floor-2:……………………………………..…………………………………………………………………5 3 Floor-3: …………………………………………………………………………………………………………. 5 4 Floor-4: …………………………………………………………………………………………………………. 6 Logical Diagram: ……………………………………………………………………………………………………………. 7 Estimated Cost for this project: …………………………………………………………..…………………………. 9 NETWORK PROTOCOLS USED IN THIS NETWORK DESIGN ……………………………………………….10 Computer Assemble and Disassemble: …………………………………………………………………………. 13
  • 3. Introduction: A networking topic is important and popular in every sector, whether it is a company, organization, bank or any other type of business. All CSE students must learn about networking concepts and logical design of real-life scenarios. The problem is that there is a very popular software solution known as Cisco packet tracer that is helping millions of people to design and simulate different networks and network devices. I also had to use packet tracer for my project concerning Sonali bank's network design. During my work experience, I used and configured various network devices like Router, Switches, etc., and I also had to understand IP classes, IP configurations, topologies, and protocols, depending on the situation. In my Bank project, I worked with a variety of servers, which include a Mail Server, Web Server, DNS, DHCP, and an IoT Server. There is a difference in functionality between each of the networks individually. There are some that are intended to connect PCs, others that are intended for IoT devices, and still others to maintain servers. The network is thus protected, yet it can be easily troubleshooted. Key Features: • There is a different network for each floor. • Our network can be extended up to 254 hosts. • I will find troubleshooting much easier. • Fixing will not be difficult. • Even if any network loses connectivity, others will remain online. • If necessary, we can secure the floor or block access to the network. • We can remotely control our home devices with the use of smart devices. • The purpose of some devices is to monitor and protect banks. • Some of the devices can be programmed to automatically detect danger so that it alerts us when it comes. • Depending on the purpose of the bank work, we use different types of servers. • The network is designed for resource sharing so that money and resources can be saved. • All hosts are automatically configured using DHCP. Physical Diagram
  • 6.
  • 8.
  • 9.
  • 10. Estimated Cost for this project NETWORK PROTOCOLS USED IN THIS NETWORK DESIGN: Routing 1. Static Routing – Static routes are configured on gateway/core routers of each branch • In the main site, traffic is routed to another branch network from the inside network. • each branch network's next hop address (IP) can be used. Since this is a small • A static routed network is easy to use. It’s secure because no any routing • advertising takes place between neighbors and computing resources are conserved • there is no routing algorithm or update mechanism. 2. Default routing – This is configured on core routers to route the traffic from inside • network to ISP router for unknown traffic (towards internet)
  • 11. 3. Inter VLAN routing – Core routers are configured to route the traffic between different • Networks can be divided into VLANs. Core routers are reached by traffic generated on core switches • This is connected by a trunk link. Routes directly connected to all VLANs will be shown • A routing table (using sub-interfaces) DNS (Domain Name System) • On the top floor of the building is the server room that contains the DNS server. The hosts of this show • Assume that network and domain are connected. They are all present on every host (workstation) • Name of the domain. Then, you can connect to your host using its specific domain name • It can be done remotely. Computers, however, do not understand the name. To convert it into numbers, you'll need to: • The IP address. So, DNS servers maintain the mapping of domains of each host to their IP addresses • IP address of the corresponding computer. So, network complexity and management are reduced. FTP (File Transfer Protocol) • The top floor server room has an FTP server installed. This is used to transfer files between computers • A network's insides. Uploading the files needed for sharing is done on the FTP server. In other words, • A special FTP client can be used to link clients to the shared files. This is the main point • The FTP server can be used to transfer data within a network for several reasons, including the ability to access • Transfers multiple files, including multiple formats, efficiently • The ability to transfer files between multiple directories at once.
  • 12. SMTP (Simple Mail Transfer Protocol) • SMTP Mail server is placed in the ground floor server room. SMTP servers are more reliable when sending mails to clients. They deliver mail to recipients quickly, they offer reliability in • sending email messages (SMTP server will always try to re-send the same email until the Security Requirements • A firewall will be used so unauthorized use will be restricted. Part of the security will be user accounts and passwords that will give limited access. There will be different access capabilities for network managers and users,
  • 13. Computer Assemble and Disassemble
  翻译: