Final Project Report Individual
Design and Implementation Medium Level Network for Rural Bank
Name: muhammadh faisaan
ID Number: E122788
Date: Monday, 02 May 2022
First Supervisor: Mr. Dimuthu Thammitage
Second Supervisor: Mr. Dimuthu Thammitage
London Metropolitan University
Final Project Report Individual
i
Declaration
Module: FC6P01 Deadline: Monday 2nd
May 2022 at 11:59pm
Module Leader: Dimuthu Thammitage Student ID: 21038284/1
PLAGIARISM
You are reminded that there exist regulations concerning plagiarism. Extracts from these regulations
are printed below. Please sign below to say that you have read and understand these extracts:
(Signature :) Date: 02/05/22
This header sheet should be attached to the work you submit. No work will be accepted without it.
Extracts from University Regulations on Cheating, Plagiarism and Collusion
Section 2.3: "The following broad types of offence can be identified and are provided as indicative examples…
(i) Cheating: including taking unauthorised material into an examination; consulting unauthorised
material outside the examination hall during the examination; obtaining an unseen examination
paper in advance of the examination; copying from another examinee; using an unauthorised
calculator during the examination or storing unauthorised material in the memory of a programmable
calculator which is taken into the examination; copying coursework.
(ii) Falsifying data in experimental results.
(iii) Personation, where a substitute takes an examination or test on behalf of the candidate. Both
candidate and substitute may be guilty of an offence under these Regulations.
(iv) Bribery or attempted bribery of a person thought to have some influence on the candidate's
assessment.
(v) Collusion to present joint work as the work solely of one individual.
(vi) Plagiarism, where the work or ideas of another are presented as the candidate's own.
(vii) Other conduct calculated to secure an advantage on assessment.
(viii) Assisting in any of the above.
Some notes on what this means for students:
1. Copying another student's work is an offence, whether from a copy on paper or from a computer
file, and in whatever form the intellectual property being copied takes, including text, mathematical
notation and computer programs.
2. Taking extracts from published sources without attribution is an offence. To quote ideas,
sometimes using extracts, is generally to be encouraged. Quoting ideas is achieved by stating an
author's argument and attributing it, perhaps by quoting, immediately in the text, his or her name
and year of publication, e.g. "e = mc
2
(Einstein 1905)". A references section at the end of your
work should then list all such references in alphabetical order of authors' surnames. (There are
variations on this referencing system which your tutors may prefer you to use.) If you wish to
quote a paragraph or so from published work then indent the quotation on both left and right
margins, using an italic font where practicable, and introduce the quotation with an attribution.
Final Project Report Individual
ii
Dedication
I dedicate this project to the Almighty God and to the “E-Soft” (Mr. Dimuthu Thammitage, Mr.
Ishuru Udara, Mr. Sudesh Bandara and Mr. Geeth Jayasinghe) without whom it would not have
been able to accomplish. Also dedicated to my parents and my friends who have always loved me
unconditionally and whose good examples have taught me to work hard for the things that I aspire
to achieve.
Final Project Report Individual
iii
Acknowledgements
First and foremost, I would like to express my gratitude to our lecturer, Mr. Dimuthu Thammitage,
for assisting and guiding us throughout the duration of this project's work period by devoting all
of his time and effort to ensure that we achieved the best possible results. I would also like to
express my gratitude to my friends for their invaluable assistance; finally, I would like to express
my gratitude to the E-soft Kandy campus for allowing us to use the internet and computer facilities
to gather information in order to successfully complete the project on time.
Final Project Report Individual
iv
Abstract
The main goal of this project is to copy a banking system that is both safe and easy to use. Before,
rural banks were used, but the system was slow, manual, and not very safe. This made it hard to
do business. It's a good idea to look at what this solution could do to fix the problems with the
manual method. It may take some time for customers to get up-to-date information from Rural
Bank branches in their districts because they have to send reports to the central branch by hand.
To make sure that each transaction is recorded, this system will be used. People who are allowed
to see the information can get it from any branch via a Wide Area Network (WAN) and Virtual
Local Area Network (VLAN) (VLAN). We used the OSI model to make our project happen. This
system uses Packet Tracer 5.3 to make sure that web applications for banking are safe, and it's a
good way to do this.
Most modern banks place a lot of value on having a well-functioning and customized network that
is based on their customers' needs and wants. Network technicians who build these networks have
a lot of responsibility because many people rely on the solutions they choose to help them with
many of their daily tasks.
This study looked at the things to think about when you're designing a network for a customer.
References from the real world were used to make and model the simulations of financial
institutions. A network proposal was made based on their priorities and needs, and it was
customized for each rural bank. Different ways to figure out what is best for each rural bank are
talked about, and it is hoped that these ideas will come in handy when designing rural banking
networks in the future.
We talk about how we're going to deal with the problem and what we're going to do about it as
part of our overall plan for the company. Communication networks that use the internet are
becoming more important in our daily lives. There is a chance that these networks will fail and we
will lose a lot of money and other things in our lives. Because of this, communication networks
need to be planned and designed properly in order to work well. An important tool in this study is
the Network Development Life Cycle (NDLC). It helps with the critical evaluation of a few key
network analysis and logical design features that are being studied. There will be a discussion
about things like who the people are, how to get information from them, what business and
technical needs and constraints there are, and how to figure out how things flow. As part of the
Final Project Report Individual
v
logical design of networks, things like the hierarchical structure of networks and how to address
IP issues are taken into account. Following a thorough look at these problems, it is likely that more
network analysis and design research will be done as a result.
Final Project Report Individual
vi
Table of Contents
Contents
1 Chapter 1 Introduction.......................................................................................................................1
1.1 Goals.............................................................................................................................................1
1.2 Motivation....................................................................................................................................1
1.3 Method .........................................................................................................................................2
1.4 Overview......................................................................................................................................2
2 Chapter 2 Background and Problem Statement..............................................................................4
2.1 Introduction.................................................................................................................................4
2.2 Literature Review .......................................................................................................................5
2.3 Problem Statement......................................................................................................................5
3 Chapter 3 project management .........................................................................................................7
3.1 Approach .....................................................................................................................................7
3.2 Initial Project Plan......................................................................................................................9
3.2.1 Gant chart............................................................................................................................9
3.2.2 Network Diagram..............................................................................................................11
3.2.3 Tracking Gantt..................................................................................................................14
3.3 Problems and Changes to the Plan..........................................................................................15
3.4 Final Project Record.................................................................................................................16
4 Chapter 4 feasibility study ...............................................................................................................17
4.1 Time feasibility..........................................................................................................................17
4.2 Cost feasibility...........................................................................................................................18
4.3 Scope feasibility.........................................................................................................................20
4.4 Technical feasibility ..................................................................................................................21
4.5 Economic feasibility..................................................................................................................23
5 Chapter 5 design ...............................................................................................................................24
5.1 Introduction your choice of proposed network system .........................................................24
5.2 Hardware and software requirements ....................................................................................25
5.3 Evaluating of solutions .............................................................................................................26
6 Chapter 6 implementation................................................................................................................27
6.1.1 Design.................................................................................................................................28
6.1.2 Experiment 1 .....................................................................................................................29
6.1.3 Experiment 2 .....................................................................................................................31
Final Project Report Individual
vii
6.1.4 Experiment 3 .....................................................................................................................42
6.1.5 Experiment 3 .....................................................................................................................48
7 Chapter 7 testing and verification...................................................................................................63
8 Chapter 8 EVALUATION and CONCLUSION............................................................................66
9 References...........................................................................................................................................68
10 Appendices......................................................................................................................................70
Final Project Report Individual
viii
Table of figures
Figure 1 Gantt chart 1 ..................................................................................................................... 9
Figure 2 Gantt chart 2 ................................................................................................................... 10
Figure 3 Network Diagram 1........................................................................................................ 11
Figure 4 Network Diagram 2........................................................................................................ 12
Figure 5 Network Diagram 3........................................................................................................ 13
Figure 6 Tracking Gantt................................................................................................................ 14
Figure 7 Plan of Project Completed.............................................................................................. 16
Figure 8 Overall Design................................................................................................................ 28
Figure 9 Main Router.................................................................................................................... 31
Figure 10 Main Router.................................................................................................................. 32
Figure 11 Protocols....................................................................................................................... 33
Figure 12 ACL.............................................................................................................................. 33
Figure 13 IP Route........................................................................................................................ 34
Figure 14 1st
Floor Router............................................................................................................. 35
Figure 15 1st Floor Router............................................................................................................ 36
Figure 16 Protocols....................................................................................................................... 37
Figure 17 IP Route........................................................................................................................ 37
Figure 18 ephone status ................................................................................................................ 38
Figure 19 2nd Floor Router........................................................................................................... 38
Figure 20 2nd Floor Router........................................................................................................... 39
Figure 21 2nd Floor Router........................................................................................................... 40
Figure 22 Protocols....................................................................................................................... 41
Figure 23 IP Route........................................................................................................................ 41
Figure 24 ACL.............................................................................................................................. 42
Figure 25 ephone status ................................................................................................................ 42
Figure 26 VPN Tunnel.................................................................................................................. 42
Figure 27 Crypto IPsec ................................................................................................................. 43
Figure 28 Crypto IPsec ................................................................................................................. 44
Figure 29 second floor Router Crypto IPsec................................................................................. 44
Figure 30 second floor Router Crypto IPsec................................................................................. 45
Final Project Report Individual
ix
Figure 31 IoT and smart devices.................................................................................................. 46
Figure 32 IoT Monitor .................................................................................................................. 46
Figure 33 IoT Monitor .................................................................................................................. 47
Figure 34 IoT Monitor .................................................................................................................. 47
Figure 35 PC2 Configure Mail ..................................................................................................... 48
Figure 36 PC3 Mail Configure ..................................................................................................... 49
Figure 37 Mail server.................................................................................................................... 50
Figure 38 DNS Server................................................................................................................... 51
Figure 39 Send mail to PC 3......................................................................................................... 52
Figure 40 PC3 Received mail ....................................................................................................... 52
Figure 41 FTP server .................................................................................................................... 53
Figure 42 FTP prompt................................................................................................................... 54
Figure 43 IoT server...................................................................................................................... 55
Figure 44 Enabled IoT device....................................................................................................... 56
Figure 45 Syslog Server................................................................................................................ 57
Figure 46 DNS server ................................................................................................................... 58
Figure 47 NTP server.................................................................................................................... 59
Figure 48 AAA server................................................................................................................... 60
Figure 49 Web server.................................................................................................................... 61
Figure 50 Interface of Website ..................................................................................................... 62
Final Project Report Individual
x
Table of tables
Table 1 Time Feasibility 1............................................................................................................ 17
Table 2 Time Feasibility 2............................................................................................................ 18
Table 3 Cost Feasibility ................................................................................................................ 20
Table 4 Design Implementation Plan Summary........................................................................... 28
Table 5 Common Simulation Model Validation Methods............................................................ 64
Final Project Report Individual
1
1 Chapter 1 Introduction
Some way, any rural banking system will be able to control their networking system. Because the
banking system is network-based and easy to use, it will be able to do this in some way. People at
the head office, the branch office, and other places keep track of LAN, MAN, WAN, PAN, VLAN,
VLAN, VLSM, VPS, VPN, and controlled switches. LAN is used in systems that have one office
and one building. The wide area networks use WAN, while the metropolitan area networks, like
small towns, use MAN. Cloud computing is used in three departments. People who work for a
bank can use this networking technology to move data quickly and easily. So, users can learn about
the network structure and security of the banking system quickly no matter where they are and
how long it takes.
Today, a well-functioning network is an important part of any modern rural bank. There are a lot
of different network systems used by rural banks, from the smallest local bank to the world's largest
rural bank. The use of web pages, email, IP telephony, and wireless communications for customers
who live far away is becoming more important for rural banks. This project is based on the fact
that a computer network and a solution for the bank are important. This is what I want to do: I
want to make sure each rural bank gets the best deal possible.
1.1 Goals
This is my goal to develop a secure network infrastructure and solution for small-town financial
institutions. There are a lot of people who find it very useful when they're dealing with financial
institutions. Our long-term goal is for this to be used in every rural bank in Ceylon.
1.2 Motivation
The banking industry has been under attack for hundreds of years now, and it's still going on. As
soon as they stole money, they did it by taking it in the form of cash. When that was done, it was
computer fraud, as well when it comes to fraud today; it's not just cyber crime. Hackers break into
servers to get a customer's personal information (PII). Cyber security in banking is very important,
so that is why. As more and more people and businesses do their business online, the risk of a data
Final Project Report Individual
2
breach grows every day. As a result, there is a lot more attention paid to cybersecurity in banking
sector processes.
A computer can easily handle problems with a lot of activities, but be aware that if you have
resource smoothing or resource constrained problems to solve, the computational load can be very
high.
The most important things to look for in a package, besides how much it costs, are how easy it is
to use, how good it is at solving resource problems, and how well it looks. Each package will give
the same minimum project completion time. But not all packages will be equally good at solving
resource problems, so the solutions to these problems will be different from one package to
another.
1.3 Method
In this project, "Design and Simulation of a Rural Banking System," we talk about the whole
banking network structure and some security features. We are going to different banks to look for
data or information. The International Organization for Standardization (ISO) came up with the
OSI layer in 1984 to make sure that products made by different companies could work together in
networks. There's a name for this: OSI stands for Open Systems Interconnection. Data sent
between software programs goes through all 7 layers. App, Presentation, and Session layers are
also known as "upper layers." The Data Link and Physical layers are often used together to make
sure that LAN and WAN specifications are met.
1.4 Overview
This research project is a look at the information system of a bank, so it can be called a survey. It
was important to use the research method that was used in this study: the survey method. A survey
is a type of research that gathers information about people's feelings, opinions, beliefs, attitudes,
and actions. This study is trying to figure out what people think and feel about the information
system at RCbank. So, the survey method is a good way to do research.
Studies conducted to obtain objective and systematic evidence of the success and failure of any
system is categorized as evaluation research. When a project is evaluated, its relative effectiveness
in terms of standard goals and objectives is determined and described. Evaluation research usually
Final Project Report Individual
3
tries to figure out how well things work in terms of the goals of a system. Evaluation studies aren't
so different from other types of research because of how they're done, but because of what they're
used for. Many different types of research can be used to effectively evaluate information systems
and projects. In some cases, interviews and questionnaires are used to get people to think or say
what they think.
Final Project Report Individual
4
2 Chapter 2 Background and Problem Statement
The reason I'm going to study this subject is because I think it will be a good addition to my studies,
An important part of having a good computer network is knowing what one is. I want to know the
answer to the question "What does a well-built computer network look like in the future." A well-
built network can make a lot of difference for people who use it. I've done some of this and seen
for myself how much of a difference it can make.
The project's goal is to find out what rural banks need and then build a network strategy that fits
each one. When this project is done, it will show how different types of banks (like Sri Lanka CO-
Operative Rural Bank, rubank, Rabobank, Commercial Bank, and BOC) and their criteria should
be chosen. You need to ask the right questions to get the information you need to build a strong
computer network, so you must do that (Alleyne, Last update 2021).
2.1 Introduction
During the survey, respondents were asked if they had encountered any difficulties while using
the CIS. According to the responses, thirty-seven (37) respondents, or 67.3 percent, answered yes;
12 (21.8 percent) responded no; and five (10.9 percent) responses were deemed invalid. When the
respondents who answered yes to the question were asked to indicate or demonstrate the types of
problems they encounter, the vast majority of them stated that they experience periodic network
slowdowns as a result of the increase in the number of clients and staff information that they
process. They asserted that this (increase in the number of clients and employees) has not been
accompanied by a corresponding improvement and upgrading of the CIS to accommodate the
corresponding increase in the volume of information and records they process. Others have stated
that information transfer is slowed as a result of a large number of commands being executed at
the same time (Anon., 2014).
Final Project Report Individual
5
2.2 Literature Review
A theoretical literature review to the study, an examination of the development of the networks as
markets theory, and a discussion of the various approaches and findings of researchers attempting
to measure the performance outcomes of networking relationships and activities are all included
in this comprehensive review of the literature. The chapter concludes with a summary of the
findings, a discussion of the literature's shortcomings, and research recommendations (Anon., Last
Update 2018).
Broad networks, local area networks (LANs), and metropolitan area networks (MANs) are various
sorts of networks that are characterized by their spatial distance (WANs) (WANs). A network can
also be identified by the type of data transmission technology it uses (for example, a TCP/IP or
Systems Networks Architecture network); whether it carries voice, data, or both types of signals;
who can use it (public or private); the typical nature of its connections (dial-up or swathed,
dedicated or no switched, or virtual connections); and the types of physical links it uses (for
example, optical fiber, Multi-Mode Fiber, Single Mode Fiber, coaxial cable, and Unshielded
twisted Pair) (for example, optical fiber, Multi-Mode Fiber, Single Mode Fiber, coaxial cable, and
Unshielded twisted Pair) (Hart, 2012), (Athanas, 2020), (Fabio Caccioli, 2017), (Sarel., 2021).
2.3 Problem Statement
Rural banks are currently performing manual internal audits. Audit data is stored as a file in the
main warehouse in the basement of the RC Bank headquarters. Workers who need the files must
first go to the warehouse to get the files. Data older than one year is moved to another warehouse
outside of the headquarters for storage. It takes much longer for employees to get the data they
need to do their job. Also, there are many files in the vault, some of which are infrequently used.
These documents take up a lot of space and are difficult to work with.
Users can only view one file at a time. If the file has already been taken, the employee must wait
for the file to be returned. Files may be lost or corrupted while retrieving them, but sometimes this
can happen. So, make a second copy of the file to make a backup. Because changes are not tracked,
Final Project Report Individual
6
backups are useless if files are maliciously modified. It may be too late to find the problem before
it's too late.
It is frequently difficult to place confidence in the information provided for decision-making
purposes because the data processing and the output presented to management are diametrically
opposed. Personnel working at the bank's operational level appear to be unable to comprehend the
data that is being processed by them.
It is essential that banking institutions, as well as their information systems, undergo significant
improvements as part of the transition to a market-based economy. The financial deregulation,
increased competition, and diversification that have occurred in recent years have put banks at risk
of going bankrupt. If new methods of managing corporate resources, particularly information, are
not developed, banks may find themselves in financial trouble. Information systems integration
will continue to pose a challenge for organizations in their global business environments, which
will cause them concern (McCombes, 2019).
Because of this, RC Bank wants a new computerized system to solve these problems. Goal of the
new system: The
system is easy to use in all RC Bank buildings, but cannot be used outside the building.
System software is installed over a network to allow accountants to easily access and modify
information about employees, customers and accounts.
All changes to all documents are logged and a different version is maintained for each.
Multiple people can view the same document at the same time, but only one can make changes.
A new document can be created and then shared.
Final Project Report Individual
7
3 Chapter 3 project management
It's about setting goals, how to achieve them, and the resources you need to reach your overall
goals. Project management is everything. The act of handling everything that goes into a project,
from the team to the tasks and tools. It can also be a one-time project or long-term activity, and
managed resources include people, money, technology, and intellectual property (Simplilearn,
2022).
Project management has 4 stages.
At this stage, the goals of the project and requirements for what needs to be developed are
established. This helps project managers and team members better understand the project. Team
members will also talk about the work and how the project will be carried out.
After the project plan is complete, the team begins working on the project in a variety of ways,
such as a waterfall or agile model. The team then collaborates, validates, revises, and achieves the
outcomes agreed upon during the course of the project.
After development is complete, the test team begins testing the project in a variety of ways. Report
bugs, perform usability tests, and more. Their technical team no longer needs to fix bugs, so the
product can be fully run on the customer's site.
After the testing process is completed and the project is started, it is monitored and improved
according to the client's requirements.
3.1 Approach
The most important part of planning a project is to figure out the scope of the project, refine the
goals, and figure out how to reach the goals that the project was set out to achieve. I need to write
a Project Plan as our first step in the Network project. Many times, project planning isn't given
enough attention before the work starts. A project plan can save time, money, and avoid problems
and issues that might come up. Many people didn't know this.
Final Project Report Individual
8
Project Planning
Project planning is very important for any project to go well. I need to come up with a detailed
project plan before I can move on.
Follow Good Practices: People who work on a project should always sign the project plan.
 To keep track of and provide the detailed Resource needs.
 Make a realistic assessment of the time frame for the project.
 Allows you to figure out how much a project will cost so that you can check it out more if
you need to.
 As soon as possible, he looks for problems like tasks taking too long, the team not meeting
their deadlines, and the productivity of each member.
Always talk to your team members, not just your boss. People on the consulting team will help
you make changes to the plan over a few weeks so they can put their own experiences into the
plan, too. Take what you learned from your last projects.
Avoid commons mistakes : People who don't have a project plan or have a bad project plan.
Wrong project plans are even worse without a project plan. Not just show the project plan to the
Steering Committee to make them feel warm and comfortable.
You don't want to lose sight of what the project is trying to do. Traditional project management
methods can lead to over planning and a lot of focus on small tasks at the expense of bigger goals.
Asserting that a project should be done faster with people who are in a hurry is not based on facts
from previous projects. Committing too early, or setting up project plans too soon. A project that
lasts five days doesn't need to have a detailed project plan.
Final Project Report Individual
9
3.2 Initial Project Plan
It is in the Project Plan that we will determine the beginning and ending points of the project. All
Rollout Progress Reports will make a comparison between the current situation and the Project
Plan that was established at the beginning of the project.
The Project Plan will be developed in accordance with the Lead Times that have been agreed upon.
When you look at Lead Times, you'll see how long each (or the main) task has taken.
Tables outline how the project will be reported on as well as how long each task should take to
complete. Using the Gantt diagram, the Network diagram, and the Tracking Gantt for the Project
report template allows you to create an individual Project Plan for each project that is unique to
that project.
3.2.1 Gant chart
Figure 1 Gantt chart 1
Final Project Report Individual
10
Figure 2 Gantt chart 2
Final Project Report Individual
11
3.2.2 Network Diagram
Figure 3 Network Diagram 1
Final Project Report Individual
12
Figure 4 Network Diagram 2
Final Project Report Individual
13
Figure 5 Network Diagram 3
Final Project Report Individual
14
3.2.3 Tracking Gantt
Figure 6 Tracking Gantt
Final Project Report Individual
15
3.3 Problems and Changes to the Plan
There is one problem that network managers face that is the hardest of all: how to get as much out
of their network as possible while not increasing the cost of owning it too much. In addition, there
are costs for support staff who will help you learn how to set up, run, and keep the network running
and safe. The total cost of owning a network also includes the cost of capital equipment and the
cost of annual maintenance, but not the cost of the people who work to help you. Many tools and
solutions can help you keep up with the needs of your business as they change. Another is HP
Open View (Hales, 2008).
A few of the programmers that work with these programmers are CA Unicenter and IBM Tivoli.
Novell ZENwork also works with these programmers. It is the same for everyone. They all use the
same architecture and the same protocol to run the network. A wide range of networks, protocols,
and equipment are used in a complex communication environment that includes voice, video, and
data. Network management tools have grown to be able to work across all of these different things.
By being ready to use right out of the box with little or no changes.
There is a popular NMS framework called HP OpenView (openview.hp.com) that is used in large,
mixed IT environments. Many people use it. NNM map takes a lot of time to set up because both
the NNM map and message browser are very old. A lot of the OVO agents are hard to work with,
and they die a lot, so the system has to be restarted a lot. OVO agents are hard to set up. Getting
the whole thing set up is hard, and the price makes it not good for small businesses.
If you have a mostly Cisco network that needs to be managed with the least amount of work, you
should use CW. A lot of non-Cisco devices don't work with it, and it takes a long time to respond
to a question. Because CDP (Cisco Discovery Protocol) isn't well-known, it's hard to figure out
how to fix and run the product. Because it's unique, it has a protocol called CDP that makes it
work.
A lot of people have trouble setting up and maintaining commercial products because they can be
pricey. This also costs a lot of money. Network management products and solutions have been
Final Project Report Individual
16
around for a long time, but it has been found that many people don't want to use them because they
are too expensive and complicated.
3.4 Final Project Record
Figure 7 Plan of Project Completed
Final Project Report Individual
17
4 Chapter 4 feasibility study
An organization's operations should be considered when conducting a feasibility study. The study
should determine what resources are required for the project and provide a rough estimate of the
costs, timeframes, and impact of the project on the organization's operations. Aside from that, it
should try to figure out how the new network will help people become more productive while also
saving them money. All of the factors that will need to be considered include the number of people
who will need to be hired, the amount of training they will require, and the amount of support
infrastructure that will be required for the network and its users. Depending on the findings of the
study, the report will assist management in deciding whether or not to proceed with the project in
question (Drury, 2021).
4.1 Time feasibility
Table 1 Time Feasibility 1
Final Project Report Individual
18
4.2 Cost feasibility
It is important for management to look at the costs and benefits of a project in order to see if it is
worth it to work on. Think about how much money a project will cost before you decide whether
or not to do it, Guesswork: It is used to figure out how much it will cost to make a big investment
in the future. During the beginning stages of a project, it may seem impossible to figure out the
exact costs and benefits. One should spend enough time figuring out how much it will cost and
how much it will be worth so they can compare it to other projects (name, Last update 2022).
You might think of things that are easy to figure out and estimate, like the cost of hardware and
software or labor, when someone talks about how much an IT/IS project costs. Also, there are
some costs that are not tangible, like a loss of goodwill or a lack of efficiency.
When you buy and keep up with information technology, you can figure out the total cost of
ownership, which is how much it costs to put in and keep up with all of it (TCO). In order to figure
out how much it costs to buy and run a business, financial estimates are used. VP and Research
Director of Gartner Bill Kirwin said that "TCO is a complete look at IT costs over time." This is
what he said. This is called a "holistic assessment." It means that all the costs of IT investments,
Table 2 Time Feasibility 2
Final Project Report Individual
19
including capital investment, license fees, leasing costs, and service fees, are taken into account.
This includes both direct and indirect labor costs. Garter, Inc., a consulting firm, has found and
said how much money it costs to use information technology through its whole life cycle.
 The cost of purchasing end-user computer equipment.
 The cost of purchasing software licenses.
 Hardware and software distribution costs.
 Equipment warranty and maintenance costs.
 Software license tracking costs.
 Operational infrastructure costs.
 The cost of a breach (in terms of reputation loss and recovery costs).
 Electricity and cooling costs.
 Cost of network equipment and software.
 Server hardware and software costs.
 Insurance Costs.
 Cost of testing.
 Upgrade or scalability costs.
 IT staff expenses.
 Time spent administering level “C”.
 Backup and restore process costs.
 Failure or costs associated with failure.
 Performance degradation incidents (eg user has to wait).
Cost Analysis
Product Price Quantity Total
Cisco UCS C240 M6
Rack Server
$4000 10 $40000
cisco catalyst 8300
series edge router
$3500 6 $21000
Final Project Report Individual
20
XPS Desktop $400 94 $37600
ASA 5585-X
Firewall
$8498.00 1 $8498.00
WS-C2960X-24PS-L
Catalyst 2960-X 24
GigE PoE 370W
$1540.00 9 $13860
AIR-CAP702I-A-K9 $495.00 9 $4455
cisco 8845 VoIP
phone
$441.00 7 $3087
Canon Pixma G2012
All-in One Ink Tank
Color Printer
$179.99 23 $4139.77
Xerox duplex combo
scanner
$269.99 22 $5939.78
EtherFast 8-Port
10/100 Desktop Hub
$79.99 1 $79.99
PatchSee Cat6 RJ45
Ethernet Cable
(2000feet)
$1699 10 $16990
Ultimate Tool Kit $220 1 $220
Table 3 Cost Feasibility
4.3 Scope feasibility
Users from departments such as Economic Research, Human Resources, the Advances and lending
department (SME Loans, project loans) V3, the Department of Administration and Personnel,
Deposits, Account (Checking and Cards also), Cash Management, the Department of Statistical
Analysis and Computer Services, the Back Office (IT, CRM, Accounting & Finance, Product and
Planning, and so on), and the Regional Development Department will be the primary users of the
netwok.com website. Those who will receive information produced on the network but will not
actively participate in its operation are referred to as secondary users of the network. They include
clients, employees, and members of the general public. Because they will receive information but
Final Project Report Individual
21
will not actively participate in its operation, clients, employees, and members of the general public
are referred to as "secondary users."
Every activity taking place on the network should be visible to the users of the system. If
everything goes according to plan, remote-controlled programmers, file transfers, and other similar
operations should appear to be running as quickly, if not faster, than those carried out on an end-
station. According to the findings of user interviews conducted to determine their requirements
and expectations, an average throughput of 20 Mbps per user within each LAN and 10 Mbps per
user across LANs will more than support the required performance in the vast majority of scenarios
in the vast majority of scenarios (teleconferencing being the possible exception).
Storage space must be available in sufficient quantities in order to accommodate the storage of all
transaction, account, and state data in a single, centrally located repository. User interviews,
observations of current and anticipated storage requirements, and other data have been used to
estimate that each user will require on average 1 GB of server space (in addition to secondary
storage on local computers), with a maximum estimated server-side storage requirement per user
of approximately 10 GB. The manufacturer also claims that the network operating system will take
up approximately 1.5GB of space on each LAN server on which it is installed in addition to the
above. Specifically, each PC will have a minimum storage capacity of 100 GB, and each local area
network server will have a minimum storage capacity of 200 GB, in order to strike a balance
between price and performance concerns. There will be a main data server with a storage capacity
of 400 GB, which will be located on the premises of the State Office of the Attorney General
(name, no date).
4.4 Technical feasibility
Assessing technical feasibility is looking at whether the new system will work well and whether
an organization can build a proposed system or not. As part of the technical assessment, we look
into questions such as whether or not there is enough technology available, how difficult it will be
Final Project Report Individual
22
to build, and if the company has enough experience with that technology. One example of how
technology can be used is the way credit unions are run.
 “A lot of people were happy with how it worked and thought the platform did what they
needed it to do. But, obviously, that platform needed an upgrade to keep up with new
technology in the industry. As chief strategy officer for Fiserv's credit union division, Sara
L. Brooks says: "It was no longer going to be able to support itself long-term." (Swedberg
2005)
 Even though a certain operating system can run on different types of computers, the
software written for that operating system may not work on all of the computers that the
operating system can run on. Because of this, OpenOffice.org didn't run on computers with
64-bit processors in 2006 because it didn't work right away. Because the company had 64-
bit computer architectures at the time, it wouldn't be possible to use OpenOffice at that
time (name, Last update 2022).
In the process of making a new system, one has to look into and compare technology providers,
figure out how reliable and competitive that system is, and figure out what limitations or
constraints technology has. Also, one has to think about how big the system is, how complicated
it is, and how much experience the group has with similar systems.
Project Structure: As long as the project's requirements are well thought out and structured, it
will be less risky than if someone else decides what they want.
Familiarity with Technology or Application area: A project will be less risky if both the people
who make and use it know what they're doing. If the development team used the same tools and
hardware, it would be less risky. It's also important for users to know how systems work, because
this can help them understand why it's important for them to be a part of the process. There is a
good chance that this involvement will help the project go well!
Final Project Report Individual
23
A project with a lot of risk can still be done, though. Almost every company would have a good
mix of high, medium-risk, and low-risk projects. Without the high-risk project, the organization
couldn't make the big changes in how systems were used.
4.5 Economic feasibility
Due to the fact that it deals with things that can be measured, quantified, and compared in monetary
terms, economic evaluation is an important component of investment evaluation. It is necessary to
consider the results of an economic evaluation when deciding whether or not to invest in a
particular project. This is due to the fact that the proper investment appraisal contributes to
ensuring that the appropriate project is completed in a manner that maximizes its chances of
success (name, Last Update 2022).
Money and other resources are spent now in order to make money, save money, or do good for the
community in the future, which is referred to as project investments. The future benefit of an
investment must outweigh the resources that were expended to get there in order for it to be deemed
worthwhile.
Final Project Report Individual
24
5 Chapter 5 design
It is a group of computers and other hardware that can talk to each other through communication
channels. This lets a wide range of people share resources and talk to each other. Setting up a
business network is all done through the internet. This is how it works: People who work for big
businesses and other groups use IT to make sure that their data, information, and other things don't
get stolen or leaked. IT is a type of network. Computer networks are made up of specialized
equipment like hosts, routers, switches, and access points. These are the parts that make them
work. As many of these devices connect to each other and use the same protocol, they form a
network.
Networks that connect computers near each other are called "local area networks" or "LANs." This
type of network is called a "local area network." People can use it in a small area and connect their
computers with it, At home, there could be just two or three people, or there could be a lot of
people at the bank's main office. By setting up LANs this way, home owners and IT managers can
set up LANs so that network nodes can share services like printers or network storage.
To make sure your network is safe, you need to think about things like how the network is set up,
what kind of hardware and software you use, and where each host is in the network. There must
be a list of everything that needs to be done before any design can start. Then, the project can start.
To design and put in place a computer network, it takes a long time and many people to get it done
right. Many parts of a company are involved. At this point, things like where the website is and
how people use it are usually taken into account.
5.1 Introduction your choice of proposed network system
There are many security issues and more costs for both banking users and the banks because of
the rise in banking. In his paper, Classers said that security is all about the risks and costs that
come with it. The most important thing to do when it comes to banking security is to keep
important information safe from people who want to get their hands on it. As a result, the banks
must always improve their security. At the same time, the banks have to keep costs down to make
money. People who want to break into a system will have to pay a lot more to do so, as well as get
Final Project Report Individual
25
a lot more punishment if they do, by increasing security. Thus, the Internet
criminals/attackers/crackers may not want to hack a high security online banking system.
5.2 Hardware and software requirements
Software Requirement
This following software we have used to implement our project-
 Windows 7 or.
 Windows 8 platform.
 Windows 10 platform.
 Cisco Packet Tracer 8.1.0
 Switch.
 Router.
 Firewall.
 Server.
Hardware requirement
It is important to have a computer with a processor that is compatible with IBM (such as an Intel
Pentium 4, an Intel Core-i3, or an AMD Athlon 64-X2). Besides having 1 GB of RAM, the PC
should also have a hard drive with at least 80GB of free space. IBM-compatible monitors must
also be used.
Cables and connectors are used in many different ways. These connect all of the computers,
printers, servers, and other things on your network to each other in one place. They do this by
connecting them all together.
A router is a piece of hardware that helps people move around. Besides managing network traffic
and making sure devices can communicate with each other through both wired and wireless
connections, this function also makes sure they can connect to the internet.
It is a place where people can connect to WiFi networks (optional). If the router doesn't cover
certain parts of the building, this will let you extend your wireless network.
Final Project Report Individual
26
An internet connection is needed to do this. For example, this could be a fiber connection that is
faster or a leased line that is only for this one person.
A firewall that comes with the hardware. In this way, your network and the internet are kept safe
from security threats by putting a secure barrier between them. A network server may be built into
some networks. It runs central applications, serves as an email server, and is a place to store files.
5.3 Evaluating of solutions
When it comes to information provided for decision-making purposes, it is frequently difficult to
place confidence in the information because the data processing and the output presented to
management are diametrically opposed.
Personnel working at the operational level of the bank appear to be unable to comprehend the
information that they are responsible for processing.
As part of the transition to a market-based economy, it is essential that banking institutions, as well
as their information systems, undergo significant improvements. Financial deregulation, increased
competition, and diversification, all of which have occurred in recent years, have increased the
likelihood of banks going out of business. Banks may find themselves in financial trouble if they
do not develop new methods of managing corporate resources, particularly information, and
information technology.
For organisations operating in global business environments, information systems integration will
continue to be a source of concern because it presents a significant challenge.
Final Project Report Individual
27
6 Chapter 6 implementation
If a design includes a large number of complex implementation steps, plan to complete each step
individually rather than all at once. Incorporating incremental implementation reduces the amount
of time spent troubleshooting and the amount of time spent returning to a previous state. The
process of putting a network design into action involves a number of stages (install hardware,
configure systems, launch into production, and so forth). A number of steps are involved in each
phase, and the documentation for each step should include the following:
Date Description Implementation Details Complete
Phase 3
21/10/2021
Install Bank
hardware & software
Section 1 ✓
Step 1
Connect switches
and PC’s
Section 2 ✓
Step 2 Install routers Section 3 ✓
Step 3 Complete cabling Section 4 ✓
Step 4
Verify data link
layer
Section 5 ✓
Phase 4
26/12/2021
Configure Bank
hardware & software
Section 1 ✓
Step 1 Configure VLANs Section 2 ✓
Step 2
Configure IP
addressing
Section 3 ✓
Step 3 Configure routing Section 4 ✓
Step 4 Verify connectivity Section 5 ✓
Phase 5 14/03/2022
Launch bank
updates into
production
Section 1 ✓
Final Project Report Individual
28
Step 1
Complete
connections to
existing network
Section 2 ✓
Step 2 Verify connectivity Section 3 ✓
Table 4 Design Implementation Plan Summary
6.1.1 Design
Figure 8 Overall Design
Final Project Report Individual
29
6.1.2 Experiment 1
Detailed study of the following network devices:
 Repeater
 Hub
 Switch
 Bridge
 Router
 Gate Way
 Repeater: At the physical level, you can do things. It sends the signal out again, either at
a higher level or with more power, or on the other side of a block. This way, the signal can
go a long way. In this case, they only have two ports, so they can't be used to connect more
than two things at a time (name, 2021).
 Hub: used to connect several Ethernet devices with twisted pairs or fiber optics. It is called
a "hub or concentrator." Making them act as if they were part of the same network. A hub
works at this level. In this picture, you can see how the OSI model looks like. As many
different things as possible can be done with the same device at the same time. Repeater
hubs also get into fights. Detection, jamming all ports if it thinks there is a collision in the
area.
 Switch: Known as a network switch or switching hub, this piece of computer hardware is
responsible for connecting different network components. They are referred to as "bridges"
because they operate at the "data link layer" of the OSI model, where they process and
route data. Layer 3 switches are network switches that are capable of supporting more than
one layer. The data can be processed at the network layer by using this type of switch, as
well (layer 3 and above).
Final Project Report Individual
30
 Bridge: At the data link layer of the OSI model (Layer 2), a network bridge connects two
or more network segments. This layer is what connects them together. If you're talking
about Ethernet networks, the term "bridge" refers to a device that acts in a way that meets
the IEEE 802.1D standard. They look very much the same. There are many ports on a
switch, which is like having a bridge with many bridges. Bridge: A switch, also called a
Layer 2 switch, is often used to connect two things together. This is how bridges can figure
out whether they can send data packets from one place to another.
 Router: a router is a piece of hardware that connects two or more computer networks
together. In this case, it can choose which data packets to send between them. In each data
packet, there is information about the source and destination that a router can use to figure
out if they're on the same network, or if the data packet must move from one network to
another to get there. As a lot of networks are connected together, many routers must be
used in order for them to work. Using this information, each router can build a table that
shows which routes are the best between any two systems on the network. The routers
share information about which systems they want to connect to.
 Gate Way: This is a type of node that can connect to another network that has different
protocols. This is how it works: A gateway may have devices like protocol translators,
impedance matching devices, rate converters, fault isolators, signal translators, rate
converters, or other things to make the whole system work. It also needs both networks to
set up administrative procedures that work well together, so that they can all work together.
The gateway helps two networks connect when they use different network protocols. It
does this by making the necessary protocol changes.
Final Project Report Individual
31
6.1.3 Experiment 2
The configuration of the three routers was shown in this Experiment 2:
6.1.3.1 Main Router
Figure 9 Main Router
Final Project Report Individual
32
Figure 10 Main Router
Final Project Report Individual
33
6.1.3.1.1 Active network routing protocols
Figure 11 Protocols
6.1.3.1.2 Access-lists
Figure 12 ACL
Final Project Report Individual
34
6.1.3.1.3 IP routing table
Figure 13 IP Route
Final Project Report Individual
35
6.1.3.2 First Floor Router
Figure 14 1st Floor Router
Final Project Report Individual
36
Figure 15 1st Floor Router
Final Project Report Individual
37
6.1.3.2.1 Active network routing protocols
6.1.3.2.2 IP routing table
Figure 16 Protocols
Figure 17 IP Route
Final Project Report Individual
38
6.1.3.2.3 Show ephone Status
6.1.3.3 Second Floor Router
Figure 18 ephone status
Figure 19 2nd Floor Router
Final Project Report Individual
39
Figure 20 2nd Floor Router
Final Project Report Individual
40
Figure 21 2nd Floor Router
Final Project Report Individual
41
6.1.3.3.1 Active network routing protocols
Figure 22 Protocols
6.1.3.3.2 IP routing table
Figure 23 IP Route
Final Project Report Individual
42
6.1.3.3.3 Access-lists
6.1.3.3.4 Show ephone Status
6.1.4 Experiment 3
6.1.4.1 VPN Configuration
VPN access is available from the IP addresses 192.168.1.0 to 145.240.2.14 and 150.112.1.1. The
IPsec VPN traffic will be routed through the Second Floor Router and the Main Router, including
both.
Figure 24 ACL
Figure 25 ephone status
Figure 26 VPN Tunnel
Final Project Report Individual
43
Figure 27 Crypto IPsec
Final Project Report Individual
44
Figure 28 Crypto IPsec
Figure 29 second floor Router Crypto IPsec
Final Project Report Individual
45
6.1.4.2 IoT devices configuration
The Iot Things can be registered directly on an Every Departments Switch or on a Server device
that has been configured with the IoE service, All IoT Device can monitor in Server it’s called IoT
Server.
There are 24 Ethernet ports available on the switch, as well as a wireless access point configured
with the "Access Point" ssid on channel 6 and powered by the switch. Secure wireless connections
can be established using WEP, WPA-PSK, or WPA2 enterprise encryption. The IOE Things are
shown attached in the image below.
Figure 30 second floor Router Crypto IPsec
Final Project Report Individual
46
Figure 31 IoT and smart devices
Figure 32 IoT Monitor
Final Project Report Individual
47
Figure 33 IoT Monitor
Figure 34 IoT Monitor
Final Project Report Individual
48
6.1.5 Experiment 3
6.1.5.1 Configuration of Servers
In this experiment, the configuration of servers such as a mail server, an FTP server, an Internet of
Things server, a Syslog server, a DNS server, an NTP server, a AAA server, and a Web server is
demonstrated.
6.1.5.1.1 Mail server
1. Configure IP addresses on the PCs, DNS Server and the Mail Server
Mail Server IP address: 145.240.2.2/24
PC2 (Local Network) IP address: 150.112.1.5 /24
PC3 (Local Network) IP address: 150.112.1.6 /24
DNS server IP address: 145.240.2.9/24
2. Now configure mail clients on the PCs and mail service on the generic server.
PC2 (Local Network):
Figure 35 PC2 Configure Mail
Final Project Report Individual
49
PC3 (Local Network):
Next, we’ll configure the email server.
To do this, click on the server, then click Services tab, pick email server from the menu.
Provide the Domain name of the server then click on Set to set it. In this example I’ve used the
name ‘mail.com’.
Proceed, add users, and provide their passwords. I have two email clients (users) with usernames
‘localnetworkpc2 ‘and ‘localnetworkpc3 ‘with a common password ‘12345‘
After entering a username and password, click on Add (+) to add the user to the server. You can
optionally remove a user by clicking on Remove (-). You can change a user’s password by clicking
on change password.
Figure 36 PC3 Mail Configure
Final Project Report Individual
50
Try to relate this process to what happens when you register an email account with a mail service
provider(mail server) like Gmail. The processes appear to agree, isn’t it?
Now, notice that we set a domain name for the email server. For that reason, we should have a
DNS server that will resolve this domain name (plus other domain names if there were) to an IP
address.
So let’s configure a DNS server.
Figure 37 Mail server
Final Project Report Individual
51
Click DNS server, click Services tab, then pick DNS. Turn the service ON. Set name-address pairs
and add them to the server. You can view the DNS entry below:
3. Lastly test the email service. Go to PC2 email client, compose an email and send it to PC3
email address (localnetworkpc2@mail.com).
Figure 38 DNS Server
Final Project Report Individual
52
Try to see whether the email from PC2 is received on PC3. On the email client of PC3, click
on Receive.
Figure 39 Send mail to PC 3
Figure 40 PC3 Received mail
Final Project Report Individual
53
6.1.5.1.2 FTP server
Figure 41 FTP server
Final Project Report Individual
54
Now try using an FTP client built in the Laptop to send files to an FTP server configured in the
Server.
From the Laptop’s command prompt, FTP the server using the server IP address by typing:
Ftp 145.240.2.3
Provide the username (mybank) and password (2355) [which are the defaults] for ftp login.
Figure 42 FTP prompt.
Final Project Report Individual
55
6.1.5.1.3 IoT Server
Figure 43 IoT server
Final Project Report Individual
56
Figure 44 Enabled IoT device
Final Project Report Individual
57
6.1.5.1.4 Syslog Server
Figure 45 Syslog Server
Final Project Report Individual
58
6.1.5.1.5 DNS Server
Figure 46 DNS server
Final Project Report Individual
59
6.1.5.1.6 NTP Server
Figure 47 NTP server
Final Project Report Individual
60
6.1.5.1.7 AAA server
Figure 48 AAA server
Final Project Report Individual
61
6.1.5.1.8 Web server
Figure 49 Web server
Final Project Report Individual
62
Figure 50 Interface of Website
Final Project Report Individual
63
7 Chapter 7 testing and verification
Our company was able to develop grid concepts for rural bank networks using the results from the
simulation test, which was then used to develop grid concepts for the simulation test, which was
then used to develop grid concepts for the simulation test. In the following section, we will go over
the components of the simulation test grid as well as its architecture, application model, and
implementation principle in more depth. The simulation test grid is an important method for the
simulation of SOS, which has been demonstrated through the use of a case study (system of
systems). Several hours or days will elapse after the final network simulation is completed before
all of the different types of test cases are added (name, 2022).
Tests will happen all the time during the process of getting things set up. Network cabling,
equipment, software, and services will all be checked out. It's usually done by a company that does
this kind of work. They will put in and test the cables, and they will show that the installation
meets the standards. Major network equipment like switches and routers will need to be checked
for correct operation and configuration when they're put in place. This will make sure they work
the way they should. An expensive core switch may be installed and tested by the equipment
vendor on the client's behalf. This is called a "test run." The vendor will also give the customer all
the paperwork they need to get the job done, too. Tests can be done to make sure the network is
working and that users have access to their data and applications by logging into the network at
random and using a generic user account to get on the network (on a large network, it may not be
practical to check every single user account individually). Other services like email and the Internet
will also be tested in this way. It's important to make sure that the backup procedures work after
the organization moves its data from the old system to the new one.
Technical specifications for each piece of network hardware will be included in the manual. There
will also be floor plans and cabling diagrams, as well as floor plans that show where network
equipment is placed. It's also important to keep track of the software that each computer on the
network has, as well as the number of software licenses each computer has at the same time. Also,
each device on the network should have its MAC and IP address written down and linked to a real-
Final Project Report Individual
64
world location. A lot easier to do if there is detailed and accurate network documentation out there
to look at. This makes it easier to run the network, fix problems, and make sure it's in good shape.
In order for people to get help quickly and effectively, the help desk needs to know what software,
hardware, network address, and physical location a user's workstation has.
Model Validation Method Result
Transmission Control Protocol successful
Internet Protocol (IP) Successful (IP v4)
User Datagram Protocol (UDP) successful
Post office Protocol (POP) successful
Simple mail transport Protocol (SMTP) successful
File Transfer Protocol (FTP) successful
Hyper Text Transfer Protocol (HTTP) successful
Telnet successful
DNS successful
ICMP (Internet Control Message Protocol) successful
Routing Protocols Successful (Static routing and rip routing)
IoT Configuration Successful
NTP Successful
Syslog Successful
AAA radius Successful
VPN IPsec Successful
Extended ACL Successful
DHCP Successful (First Floor Router and Second
Floor Router)
Table 5 Common Simulation Model Validation Methods
Final Project Report Individual
65
 Test ID: The test case ID must be unique and can also be linked to the test logs and other
data that was collected during the tests.
 Node List: The list of the hardware that will be used in this test case.
 Test Description: The description of the test case should be very short, but not too long.
 Test Phase: Feature, Negative, Scalability, or a Baseline.
 Test Suite: If this test case will be used to check a feature or service, make sure to include
it. A few examples might be OSPF, QoS, High Availability, or VoIP.
 Test Setup: The test setup is very clear about the topology, hardware, logical
configurations, test tools, applications, or other things that need to be in place before the
test can be run. For very complicated tests, it can be very useful to show how the test should
be set up with a diagram.
 Test Steps: They are the steps that show how to do the test. These should be very detailed
so that even people with little experience can do the tests.
 Expected Results: Expected results are those that say what the system should do or what
the system should do based on the steps in the test. These results are called "expected
results."
Final Project Report Individual
66
 Observed Results: It is important to know what happens when you do something and what
happens when you give it a certain set of things.
 Pass/Fail: As long as the test result is Pass or Fail, it means that the test went well or bad.
8 Chapter 8 EVALUATION and CONCLUSION
Small rural banks in desperate need of a network-based system were the driving force behind the
development of this system. Until recently, the bank relied solely on paper and books to conduct
transactions, and it did not have a network system in place to facilitate transactions. The
advancement of technology and the development of automated systems have become increasingly
important and urgent in the context of the expansion of banking services. In addition, when it
comes to banking, many customers are concerned about their personal information being
compromised. Data will be routed through the system in the most efficient manner possible
because of this system, which will make network administration easier and data routing more
efficient. It is our goal, as time progresses, to put it into practice in the real world and to ensure
that banks can benefit from and take advantage of its implementation in the years to come.
System development is even more critical and urgently required for the expansion of banking
services due to the fact that they will require fewer employees if they use an automated system. In
addition, security is a major concern when it comes to banking transactions. The network will be
easier to manage as a result of this system, and the data will be routed in the shortest path possible
in a large distributed system.
The use of tools such as flow analysis and hierarchical network design can be beneficial in network
analysis and design; we demonstrated how these tools can be used in network analysis and design
in the previous section. The National Defense Letter Complex (NDLC), which will allow
communication networks to keep up with the more complex challenges that the present and next
Final Project Report Individual
67
generations will face in the future, is also expected to receive additional research attention in the
future.
Future work
 In the future, everything is stored in a cloud-based system.
 Ethernet switches become transparent
 Time-based transmission should be included.
 The security system is going to be upgraded.
 Improve the user-friendliness of the project.
 Implementation in the real world.
 Implement a High Level Security in future.
 This design is implemented for a local area network (LAN). The SD-WAN concept will
be developed in the future.
Final Project Report Individual
68
9 References
Alleyne, S., Last update 2021. /stepbystep-background-study-thesis-1626.html. [Online]
Available at: https://education.seattlepi.com/stepbystep-background-study-thesis-1626.html
[Accessed 16 april 2022].
Anon., 2014. /?ProblemDomain. [Online]
Available at: https://wiki.c2.com/?ProblemDomain
[Accessed 16 April 2022].
Anon., Last Update 2018. /en/About_the_Financial_System. [Online]
Available at: https://www.cbsl.gov.lk/en/About_the_Financial_System
[Accessed 16 april 2022].
Athanas, R., 2020. CHAPTER TWO LITERATURE REVIEW 2.1 Introductio. IMPACT OF
MOBILE BANKING OF SMEs IN TANZANIA, No date March, p. 50.
Drury, A., 2021. /terms/f/feasibility-study.asp. [Online]
Available at: https://www.investopedia.com/terms/f/feasibility-study.asp
[Accessed 26 april 2022].
Fabio Caccioli, P. B. a. T. K., 2017. Network models of financial systemic risk: a review. Survey
Article, No volume(2018), p. 114.
Hales, C. N. a. L., 2008. /articles/148-six-steps-to-effective-network-planning. [Online]
Available at: https://www.supplychainquarterly.com/articles/148-six-steps-to-effective-network-
planning
[Accessed 26 april 2022].
Hart, C., 2012. Hart (1998). In: Oxford, ed. doing a literature review. London: SAGE
Publication, p. 243.
McCombes, S., 2019. How to write a problem statement. When should you write a problem
statement?, 19 april, pp. -.
Final Project Report Individual
69
name, n., 2021. /network-devices-hub-repeater-bridge-switch-router-gateways/. [Online]
Available at: https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-
router-gateways/
[Accessed 28 april 2022].
name, n., 2022. /network-simulation-software-tools/. [Online]
Available at: https://www.networkstraining.com/network-simulation-software-tools/
[Accessed 1 may 2022].
name, N., Last update 2022. /agdm/wholefarm/html/c5-64.html. [Online]
Available at: https://www.extension.iastate.edu/agdm/wholefarm/html/c5-64.html
[Accessed 26 april 2022].
name, N., Last Update 2022. /nebraska-business-development-center/technology-
commercialization/goldsmith-technology/step-6.php. [Online]
Available at: https://www.unomaha.edu/nebraska-business-development-center/technology-
commercialization/goldsmith-technology/step-6.php
[Accessed 26 april 2022].
name, n., Last update 2022. /wiki/Cross-platform_software. [Online]
Available at: https://en.wikipedia.org/wiki/Cross-platform_software
[Accessed 26 april 2022].
name, N., no date. PROJECT CONCEPTION AND PROJECT FEASIBILITY:Feasibility
Analysis. In: Project Management. s.l.:s.n., p. 78.
Sarel., C. L. G. a. D., 2021. Literature Review of E-Banking, UK: Information Systems.
Simplilearn, 2022. What is a Project Management Plan and How to Create One. [Online]
Available at: https://www.simplilearn.com/what-is-a-project-management-plan-article
[Accessed 25 april 2022].
Final Project Report Individual
70
10 Appendices
BEng. (Hons) Computer Networking
Final Report Approval Form
Name in Full :
Registration No: LMU No:
Batch No :
Course :
Project Topic :
Supervisor
Comments :
Approved by the Supervisor: Student’s Signature:
Date Collected: Supervisor’s Signature:
MUHAMMADHU PAIDHIK MUHAMMADH FAISAAN
76943 21038284/1
KAN/LMU-T-BENG-CN-SEP/2021
BEng (Hons) Computer Networking –Top-up
Design and Implementation Medium Level Network for Rural Bank
2022/05/02
Final Project Report Individual
71

More Related Content

PPTX
3.2 storia di internet
PDF
GSM BSS dimensioning Alcatel
PPTX
Networks classification
PPTX
Network components
PPTX
Chapitre 2 - Réseaux locaux
PPTX
Router Full Concept pdf
PPT
firewall.ppt
3.2 storia di internet
GSM BSS dimensioning Alcatel
Networks classification
Network components
Chapitre 2 - Réseaux locaux
Router Full Concept pdf
firewall.ppt

What's hot (20)

PDF
Data communication and network Chapter - 2
PPTX
OSI Reference Model-Lecture-2.pptx
PDF
WiFi 7 Training, Improved Latency, Introduction to 802.11be
PPT
Gsm overview
PPT
Mpls by vidhu
 
PPT
Osi model
PPTX
Wide area network (wan)
PPTX
PPTX
4G Mobile communication Technology
PPT
Chapter 1: Introduction to Data Communication and Networks
PDF
Throughput calculation for LTE TDD and FDD systems
PPTX
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
PDF
Hub, switch, router, bridge & and repeater
PPTX
Top 10 rf engineer interview questions and answers
PPTX
4G technology
DOCX
Data communications Class notes
PDF
4G.pdf
PDF
Introduction to 5G
PPTX
Network proposal ppt
Data communication and network Chapter - 2
OSI Reference Model-Lecture-2.pptx
WiFi 7 Training, Improved Latency, Introduction to 802.11be
Gsm overview
Mpls by vidhu
 
Osi model
Wide area network (wan)
4G Mobile communication Technology
Chapter 1: Introduction to Data Communication and Networks
Throughput calculation for LTE TDD and FDD systems
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
Hub, switch, router, bridge & and repeater
Top 10 rf engineer interview questions and answers
4G technology
Data communications Class notes
4G.pdf
Introduction to 5G
Network proposal ppt
Ad

Similar to Design and Implementation High Level Network System for Rural Bank (20)

DOCX
MoneySafe-FinalReport
PPT
IT skills Important for CA
PDF
A Survey of Building Robust Business Models in Pervasive Computing
PDF
Management And Business
DOCX
Mini-Case Study Closing Projects at Global Green Books Pu.docx
PPTX
LBSNov2.pptx
PPTX
1. Professional Practices CLASS LECTURES-2.pptx
PPTX
1. Professional Practices CLASS LECTURES-2.pptx
PPTX
1. Professional Practices CLASS LECTURES.pptx
PPTX
1. Professional Practices CLASS LECTURES-1.pptx
PDF
IRJET- Helping Hand
PDF
The Smart Internet Current Research And Future Applications 1st Edition Joann...
PDF
online news portal system
PDF
Students Club
PDF
PDF
Quantum Computing – A Tech Story
PDF
Discovering Computers Essentials 2016 1st Edition Vermaat Solutions Manual
PDF
Documentary Essay Definition
PPTX
Review 2 _PPT_Template_majorproject.pptx
DOC
Internet banking-of-sbi
MoneySafe-FinalReport
IT skills Important for CA
A Survey of Building Robust Business Models in Pervasive Computing
Management And Business
Mini-Case Study Closing Projects at Global Green Books Pu.docx
LBSNov2.pptx
1. Professional Practices CLASS LECTURES-2.pptx
1. Professional Practices CLASS LECTURES-2.pptx
1. Professional Practices CLASS LECTURES.pptx
1. Professional Practices CLASS LECTURES-1.pptx
IRJET- Helping Hand
The Smart Internet Current Research And Future Applications 1st Edition Joann...
online news portal system
Students Club
Quantum Computing – A Tech Story
Discovering Computers Essentials 2016 1st Edition Vermaat Solutions Manual
Documentary Essay Definition
Review 2 _PPT_Template_majorproject.pptx
Internet banking-of-sbi
Ad

Recently uploaded (20)

PPTX
Tartificialntelligence_presentation.pptx
PPTX
Modernising the Digital Integration Hub
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Hybrid model detection and classification of lung cancer
PDF
Unlock new opportunities with location data.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
STKI Israel Market Study 2025 version august
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
Five Habits of High-Impact Board Members
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
Tartificialntelligence_presentation.pptx
Modernising the Digital Integration Hub
O2C Customer Invoices to Receipt V15A.pptx
A comparative study of natural language inference in Swahili using monolingua...
Taming the Chaos: How to Turn Unstructured Data into Decisions
sustainability-14-14877-v2.pddhzftheheeeee
Hybrid model detection and classification of lung cancer
Unlock new opportunities with location data.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
NewMind AI Weekly Chronicles – August ’25 Week III
Developing a website for English-speaking practice to English as a foreign la...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Hindi spoken digit analysis for native and non-native speakers
STKI Israel Market Study 2025 version august
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
1 - Historical Antecedents, Social Consideration.pdf
search engine optimization ppt fir known well about this
Five Habits of High-Impact Board Members
Web Crawler for Trend Tracking Gen Z Insights.pptx

Design and Implementation High Level Network System for Rural Bank

  • 1. Final Project Report Individual Design and Implementation Medium Level Network for Rural Bank Name: muhammadh faisaan ID Number: E122788 Date: Monday, 02 May 2022 First Supervisor: Mr. Dimuthu Thammitage Second Supervisor: Mr. Dimuthu Thammitage London Metropolitan University
  • 2. Final Project Report Individual i Declaration Module: FC6P01 Deadline: Monday 2nd May 2022 at 11:59pm Module Leader: Dimuthu Thammitage Student ID: 21038284/1 PLAGIARISM You are reminded that there exist regulations concerning plagiarism. Extracts from these regulations are printed below. Please sign below to say that you have read and understand these extracts: (Signature :) Date: 02/05/22 This header sheet should be attached to the work you submit. No work will be accepted without it. Extracts from University Regulations on Cheating, Plagiarism and Collusion Section 2.3: "The following broad types of offence can be identified and are provided as indicative examples… (i) Cheating: including taking unauthorised material into an examination; consulting unauthorised material outside the examination hall during the examination; obtaining an unseen examination paper in advance of the examination; copying from another examinee; using an unauthorised calculator during the examination or storing unauthorised material in the memory of a programmable calculator which is taken into the examination; copying coursework. (ii) Falsifying data in experimental results. (iii) Personation, where a substitute takes an examination or test on behalf of the candidate. Both candidate and substitute may be guilty of an offence under these Regulations. (iv) Bribery or attempted bribery of a person thought to have some influence on the candidate's assessment. (v) Collusion to present joint work as the work solely of one individual. (vi) Plagiarism, where the work or ideas of another are presented as the candidate's own. (vii) Other conduct calculated to secure an advantage on assessment. (viii) Assisting in any of the above. Some notes on what this means for students: 1. Copying another student's work is an offence, whether from a copy on paper or from a computer file, and in whatever form the intellectual property being copied takes, including text, mathematical notation and computer programs. 2. Taking extracts from published sources without attribution is an offence. To quote ideas, sometimes using extracts, is generally to be encouraged. Quoting ideas is achieved by stating an author's argument and attributing it, perhaps by quoting, immediately in the text, his or her name and year of publication, e.g. "e = mc 2 (Einstein 1905)". A references section at the end of your work should then list all such references in alphabetical order of authors' surnames. (There are variations on this referencing system which your tutors may prefer you to use.) If you wish to quote a paragraph or so from published work then indent the quotation on both left and right margins, using an italic font where practicable, and introduce the quotation with an attribution.
  • 3. Final Project Report Individual ii Dedication I dedicate this project to the Almighty God and to the “E-Soft” (Mr. Dimuthu Thammitage, Mr. Ishuru Udara, Mr. Sudesh Bandara and Mr. Geeth Jayasinghe) without whom it would not have been able to accomplish. Also dedicated to my parents and my friends who have always loved me unconditionally and whose good examples have taught me to work hard for the things that I aspire to achieve.
  • 4. Final Project Report Individual iii Acknowledgements First and foremost, I would like to express my gratitude to our lecturer, Mr. Dimuthu Thammitage, for assisting and guiding us throughout the duration of this project's work period by devoting all of his time and effort to ensure that we achieved the best possible results. I would also like to express my gratitude to my friends for their invaluable assistance; finally, I would like to express my gratitude to the E-soft Kandy campus for allowing us to use the internet and computer facilities to gather information in order to successfully complete the project on time.
  • 5. Final Project Report Individual iv Abstract The main goal of this project is to copy a banking system that is both safe and easy to use. Before, rural banks were used, but the system was slow, manual, and not very safe. This made it hard to do business. It's a good idea to look at what this solution could do to fix the problems with the manual method. It may take some time for customers to get up-to-date information from Rural Bank branches in their districts because they have to send reports to the central branch by hand. To make sure that each transaction is recorded, this system will be used. People who are allowed to see the information can get it from any branch via a Wide Area Network (WAN) and Virtual Local Area Network (VLAN) (VLAN). We used the OSI model to make our project happen. This system uses Packet Tracer 5.3 to make sure that web applications for banking are safe, and it's a good way to do this. Most modern banks place a lot of value on having a well-functioning and customized network that is based on their customers' needs and wants. Network technicians who build these networks have a lot of responsibility because many people rely on the solutions they choose to help them with many of their daily tasks. This study looked at the things to think about when you're designing a network for a customer. References from the real world were used to make and model the simulations of financial institutions. A network proposal was made based on their priorities and needs, and it was customized for each rural bank. Different ways to figure out what is best for each rural bank are talked about, and it is hoped that these ideas will come in handy when designing rural banking networks in the future. We talk about how we're going to deal with the problem and what we're going to do about it as part of our overall plan for the company. Communication networks that use the internet are becoming more important in our daily lives. There is a chance that these networks will fail and we will lose a lot of money and other things in our lives. Because of this, communication networks need to be planned and designed properly in order to work well. An important tool in this study is the Network Development Life Cycle (NDLC). It helps with the critical evaluation of a few key network analysis and logical design features that are being studied. There will be a discussion about things like who the people are, how to get information from them, what business and technical needs and constraints there are, and how to figure out how things flow. As part of the
  • 6. Final Project Report Individual v logical design of networks, things like the hierarchical structure of networks and how to address IP issues are taken into account. Following a thorough look at these problems, it is likely that more network analysis and design research will be done as a result.
  • 7. Final Project Report Individual vi Table of Contents Contents 1 Chapter 1 Introduction.......................................................................................................................1 1.1 Goals.............................................................................................................................................1 1.2 Motivation....................................................................................................................................1 1.3 Method .........................................................................................................................................2 1.4 Overview......................................................................................................................................2 2 Chapter 2 Background and Problem Statement..............................................................................4 2.1 Introduction.................................................................................................................................4 2.2 Literature Review .......................................................................................................................5 2.3 Problem Statement......................................................................................................................5 3 Chapter 3 project management .........................................................................................................7 3.1 Approach .....................................................................................................................................7 3.2 Initial Project Plan......................................................................................................................9 3.2.1 Gant chart............................................................................................................................9 3.2.2 Network Diagram..............................................................................................................11 3.2.3 Tracking Gantt..................................................................................................................14 3.3 Problems and Changes to the Plan..........................................................................................15 3.4 Final Project Record.................................................................................................................16 4 Chapter 4 feasibility study ...............................................................................................................17 4.1 Time feasibility..........................................................................................................................17 4.2 Cost feasibility...........................................................................................................................18 4.3 Scope feasibility.........................................................................................................................20 4.4 Technical feasibility ..................................................................................................................21 4.5 Economic feasibility..................................................................................................................23 5 Chapter 5 design ...............................................................................................................................24 5.1 Introduction your choice of proposed network system .........................................................24 5.2 Hardware and software requirements ....................................................................................25 5.3 Evaluating of solutions .............................................................................................................26 6 Chapter 6 implementation................................................................................................................27 6.1.1 Design.................................................................................................................................28 6.1.2 Experiment 1 .....................................................................................................................29 6.1.3 Experiment 2 .....................................................................................................................31
  • 8. Final Project Report Individual vii 6.1.4 Experiment 3 .....................................................................................................................42 6.1.5 Experiment 3 .....................................................................................................................48 7 Chapter 7 testing and verification...................................................................................................63 8 Chapter 8 EVALUATION and CONCLUSION............................................................................66 9 References...........................................................................................................................................68 10 Appendices......................................................................................................................................70
  • 9. Final Project Report Individual viii Table of figures Figure 1 Gantt chart 1 ..................................................................................................................... 9 Figure 2 Gantt chart 2 ................................................................................................................... 10 Figure 3 Network Diagram 1........................................................................................................ 11 Figure 4 Network Diagram 2........................................................................................................ 12 Figure 5 Network Diagram 3........................................................................................................ 13 Figure 6 Tracking Gantt................................................................................................................ 14 Figure 7 Plan of Project Completed.............................................................................................. 16 Figure 8 Overall Design................................................................................................................ 28 Figure 9 Main Router.................................................................................................................... 31 Figure 10 Main Router.................................................................................................................. 32 Figure 11 Protocols....................................................................................................................... 33 Figure 12 ACL.............................................................................................................................. 33 Figure 13 IP Route........................................................................................................................ 34 Figure 14 1st Floor Router............................................................................................................. 35 Figure 15 1st Floor Router............................................................................................................ 36 Figure 16 Protocols....................................................................................................................... 37 Figure 17 IP Route........................................................................................................................ 37 Figure 18 ephone status ................................................................................................................ 38 Figure 19 2nd Floor Router........................................................................................................... 38 Figure 20 2nd Floor Router........................................................................................................... 39 Figure 21 2nd Floor Router........................................................................................................... 40 Figure 22 Protocols....................................................................................................................... 41 Figure 23 IP Route........................................................................................................................ 41 Figure 24 ACL.............................................................................................................................. 42 Figure 25 ephone status ................................................................................................................ 42 Figure 26 VPN Tunnel.................................................................................................................. 42 Figure 27 Crypto IPsec ................................................................................................................. 43 Figure 28 Crypto IPsec ................................................................................................................. 44 Figure 29 second floor Router Crypto IPsec................................................................................. 44 Figure 30 second floor Router Crypto IPsec................................................................................. 45
  • 10. Final Project Report Individual ix Figure 31 IoT and smart devices.................................................................................................. 46 Figure 32 IoT Monitor .................................................................................................................. 46 Figure 33 IoT Monitor .................................................................................................................. 47 Figure 34 IoT Monitor .................................................................................................................. 47 Figure 35 PC2 Configure Mail ..................................................................................................... 48 Figure 36 PC3 Mail Configure ..................................................................................................... 49 Figure 37 Mail server.................................................................................................................... 50 Figure 38 DNS Server................................................................................................................... 51 Figure 39 Send mail to PC 3......................................................................................................... 52 Figure 40 PC3 Received mail ....................................................................................................... 52 Figure 41 FTP server .................................................................................................................... 53 Figure 42 FTP prompt................................................................................................................... 54 Figure 43 IoT server...................................................................................................................... 55 Figure 44 Enabled IoT device....................................................................................................... 56 Figure 45 Syslog Server................................................................................................................ 57 Figure 46 DNS server ................................................................................................................... 58 Figure 47 NTP server.................................................................................................................... 59 Figure 48 AAA server................................................................................................................... 60 Figure 49 Web server.................................................................................................................... 61 Figure 50 Interface of Website ..................................................................................................... 62
  • 11. Final Project Report Individual x Table of tables Table 1 Time Feasibility 1............................................................................................................ 17 Table 2 Time Feasibility 2............................................................................................................ 18 Table 3 Cost Feasibility ................................................................................................................ 20 Table 4 Design Implementation Plan Summary........................................................................... 28 Table 5 Common Simulation Model Validation Methods............................................................ 64
  • 12. Final Project Report Individual 1 1 Chapter 1 Introduction Some way, any rural banking system will be able to control their networking system. Because the banking system is network-based and easy to use, it will be able to do this in some way. People at the head office, the branch office, and other places keep track of LAN, MAN, WAN, PAN, VLAN, VLAN, VLSM, VPS, VPN, and controlled switches. LAN is used in systems that have one office and one building. The wide area networks use WAN, while the metropolitan area networks, like small towns, use MAN. Cloud computing is used in three departments. People who work for a bank can use this networking technology to move data quickly and easily. So, users can learn about the network structure and security of the banking system quickly no matter where they are and how long it takes. Today, a well-functioning network is an important part of any modern rural bank. There are a lot of different network systems used by rural banks, from the smallest local bank to the world's largest rural bank. The use of web pages, email, IP telephony, and wireless communications for customers who live far away is becoming more important for rural banks. This project is based on the fact that a computer network and a solution for the bank are important. This is what I want to do: I want to make sure each rural bank gets the best deal possible. 1.1 Goals This is my goal to develop a secure network infrastructure and solution for small-town financial institutions. There are a lot of people who find it very useful when they're dealing with financial institutions. Our long-term goal is for this to be used in every rural bank in Ceylon. 1.2 Motivation The banking industry has been under attack for hundreds of years now, and it's still going on. As soon as they stole money, they did it by taking it in the form of cash. When that was done, it was computer fraud, as well when it comes to fraud today; it's not just cyber crime. Hackers break into servers to get a customer's personal information (PII). Cyber security in banking is very important, so that is why. As more and more people and businesses do their business online, the risk of a data
  • 13. Final Project Report Individual 2 breach grows every day. As a result, there is a lot more attention paid to cybersecurity in banking sector processes. A computer can easily handle problems with a lot of activities, but be aware that if you have resource smoothing or resource constrained problems to solve, the computational load can be very high. The most important things to look for in a package, besides how much it costs, are how easy it is to use, how good it is at solving resource problems, and how well it looks. Each package will give the same minimum project completion time. But not all packages will be equally good at solving resource problems, so the solutions to these problems will be different from one package to another. 1.3 Method In this project, "Design and Simulation of a Rural Banking System," we talk about the whole banking network structure and some security features. We are going to different banks to look for data or information. The International Organization for Standardization (ISO) came up with the OSI layer in 1984 to make sure that products made by different companies could work together in networks. There's a name for this: OSI stands for Open Systems Interconnection. Data sent between software programs goes through all 7 layers. App, Presentation, and Session layers are also known as "upper layers." The Data Link and Physical layers are often used together to make sure that LAN and WAN specifications are met. 1.4 Overview This research project is a look at the information system of a bank, so it can be called a survey. It was important to use the research method that was used in this study: the survey method. A survey is a type of research that gathers information about people's feelings, opinions, beliefs, attitudes, and actions. This study is trying to figure out what people think and feel about the information system at RCbank. So, the survey method is a good way to do research. Studies conducted to obtain objective and systematic evidence of the success and failure of any system is categorized as evaluation research. When a project is evaluated, its relative effectiveness in terms of standard goals and objectives is determined and described. Evaluation research usually
  • 14. Final Project Report Individual 3 tries to figure out how well things work in terms of the goals of a system. Evaluation studies aren't so different from other types of research because of how they're done, but because of what they're used for. Many different types of research can be used to effectively evaluate information systems and projects. In some cases, interviews and questionnaires are used to get people to think or say what they think.
  • 15. Final Project Report Individual 4 2 Chapter 2 Background and Problem Statement The reason I'm going to study this subject is because I think it will be a good addition to my studies, An important part of having a good computer network is knowing what one is. I want to know the answer to the question "What does a well-built computer network look like in the future." A well- built network can make a lot of difference for people who use it. I've done some of this and seen for myself how much of a difference it can make. The project's goal is to find out what rural banks need and then build a network strategy that fits each one. When this project is done, it will show how different types of banks (like Sri Lanka CO- Operative Rural Bank, rubank, Rabobank, Commercial Bank, and BOC) and their criteria should be chosen. You need to ask the right questions to get the information you need to build a strong computer network, so you must do that (Alleyne, Last update 2021). 2.1 Introduction During the survey, respondents were asked if they had encountered any difficulties while using the CIS. According to the responses, thirty-seven (37) respondents, or 67.3 percent, answered yes; 12 (21.8 percent) responded no; and five (10.9 percent) responses were deemed invalid. When the respondents who answered yes to the question were asked to indicate or demonstrate the types of problems they encounter, the vast majority of them stated that they experience periodic network slowdowns as a result of the increase in the number of clients and staff information that they process. They asserted that this (increase in the number of clients and employees) has not been accompanied by a corresponding improvement and upgrading of the CIS to accommodate the corresponding increase in the volume of information and records they process. Others have stated that information transfer is slowed as a result of a large number of commands being executed at the same time (Anon., 2014).
  • 16. Final Project Report Individual 5 2.2 Literature Review A theoretical literature review to the study, an examination of the development of the networks as markets theory, and a discussion of the various approaches and findings of researchers attempting to measure the performance outcomes of networking relationships and activities are all included in this comprehensive review of the literature. The chapter concludes with a summary of the findings, a discussion of the literature's shortcomings, and research recommendations (Anon., Last Update 2018). Broad networks, local area networks (LANs), and metropolitan area networks (MANs) are various sorts of networks that are characterized by their spatial distance (WANs) (WANs). A network can also be identified by the type of data transmission technology it uses (for example, a TCP/IP or Systems Networks Architecture network); whether it carries voice, data, or both types of signals; who can use it (public or private); the typical nature of its connections (dial-up or swathed, dedicated or no switched, or virtual connections); and the types of physical links it uses (for example, optical fiber, Multi-Mode Fiber, Single Mode Fiber, coaxial cable, and Unshielded twisted Pair) (for example, optical fiber, Multi-Mode Fiber, Single Mode Fiber, coaxial cable, and Unshielded twisted Pair) (Hart, 2012), (Athanas, 2020), (Fabio Caccioli, 2017), (Sarel., 2021). 2.3 Problem Statement Rural banks are currently performing manual internal audits. Audit data is stored as a file in the main warehouse in the basement of the RC Bank headquarters. Workers who need the files must first go to the warehouse to get the files. Data older than one year is moved to another warehouse outside of the headquarters for storage. It takes much longer for employees to get the data they need to do their job. Also, there are many files in the vault, some of which are infrequently used. These documents take up a lot of space and are difficult to work with. Users can only view one file at a time. If the file has already been taken, the employee must wait for the file to be returned. Files may be lost or corrupted while retrieving them, but sometimes this can happen. So, make a second copy of the file to make a backup. Because changes are not tracked,
  • 17. Final Project Report Individual 6 backups are useless if files are maliciously modified. It may be too late to find the problem before it's too late. It is frequently difficult to place confidence in the information provided for decision-making purposes because the data processing and the output presented to management are diametrically opposed. Personnel working at the bank's operational level appear to be unable to comprehend the data that is being processed by them. It is essential that banking institutions, as well as their information systems, undergo significant improvements as part of the transition to a market-based economy. The financial deregulation, increased competition, and diversification that have occurred in recent years have put banks at risk of going bankrupt. If new methods of managing corporate resources, particularly information, are not developed, banks may find themselves in financial trouble. Information systems integration will continue to pose a challenge for organizations in their global business environments, which will cause them concern (McCombes, 2019). Because of this, RC Bank wants a new computerized system to solve these problems. Goal of the new system: The system is easy to use in all RC Bank buildings, but cannot be used outside the building. System software is installed over a network to allow accountants to easily access and modify information about employees, customers and accounts. All changes to all documents are logged and a different version is maintained for each. Multiple people can view the same document at the same time, but only one can make changes. A new document can be created and then shared.
  • 18. Final Project Report Individual 7 3 Chapter 3 project management It's about setting goals, how to achieve them, and the resources you need to reach your overall goals. Project management is everything. The act of handling everything that goes into a project, from the team to the tasks and tools. It can also be a one-time project or long-term activity, and managed resources include people, money, technology, and intellectual property (Simplilearn, 2022). Project management has 4 stages. At this stage, the goals of the project and requirements for what needs to be developed are established. This helps project managers and team members better understand the project. Team members will also talk about the work and how the project will be carried out. After the project plan is complete, the team begins working on the project in a variety of ways, such as a waterfall or agile model. The team then collaborates, validates, revises, and achieves the outcomes agreed upon during the course of the project. After development is complete, the test team begins testing the project in a variety of ways. Report bugs, perform usability tests, and more. Their technical team no longer needs to fix bugs, so the product can be fully run on the customer's site. After the testing process is completed and the project is started, it is monitored and improved according to the client's requirements. 3.1 Approach The most important part of planning a project is to figure out the scope of the project, refine the goals, and figure out how to reach the goals that the project was set out to achieve. I need to write a Project Plan as our first step in the Network project. Many times, project planning isn't given enough attention before the work starts. A project plan can save time, money, and avoid problems and issues that might come up. Many people didn't know this.
  • 19. Final Project Report Individual 8 Project Planning Project planning is very important for any project to go well. I need to come up with a detailed project plan before I can move on. Follow Good Practices: People who work on a project should always sign the project plan.  To keep track of and provide the detailed Resource needs.  Make a realistic assessment of the time frame for the project.  Allows you to figure out how much a project will cost so that you can check it out more if you need to.  As soon as possible, he looks for problems like tasks taking too long, the team not meeting their deadlines, and the productivity of each member. Always talk to your team members, not just your boss. People on the consulting team will help you make changes to the plan over a few weeks so they can put their own experiences into the plan, too. Take what you learned from your last projects. Avoid commons mistakes : People who don't have a project plan or have a bad project plan. Wrong project plans are even worse without a project plan. Not just show the project plan to the Steering Committee to make them feel warm and comfortable. You don't want to lose sight of what the project is trying to do. Traditional project management methods can lead to over planning and a lot of focus on small tasks at the expense of bigger goals. Asserting that a project should be done faster with people who are in a hurry is not based on facts from previous projects. Committing too early, or setting up project plans too soon. A project that lasts five days doesn't need to have a detailed project plan.
  • 20. Final Project Report Individual 9 3.2 Initial Project Plan It is in the Project Plan that we will determine the beginning and ending points of the project. All Rollout Progress Reports will make a comparison between the current situation and the Project Plan that was established at the beginning of the project. The Project Plan will be developed in accordance with the Lead Times that have been agreed upon. When you look at Lead Times, you'll see how long each (or the main) task has taken. Tables outline how the project will be reported on as well as how long each task should take to complete. Using the Gantt diagram, the Network diagram, and the Tracking Gantt for the Project report template allows you to create an individual Project Plan for each project that is unique to that project. 3.2.1 Gant chart Figure 1 Gantt chart 1
  • 21. Final Project Report Individual 10 Figure 2 Gantt chart 2
  • 22. Final Project Report Individual 11 3.2.2 Network Diagram Figure 3 Network Diagram 1
  • 23. Final Project Report Individual 12 Figure 4 Network Diagram 2
  • 24. Final Project Report Individual 13 Figure 5 Network Diagram 3
  • 25. Final Project Report Individual 14 3.2.3 Tracking Gantt Figure 6 Tracking Gantt
  • 26. Final Project Report Individual 15 3.3 Problems and Changes to the Plan There is one problem that network managers face that is the hardest of all: how to get as much out of their network as possible while not increasing the cost of owning it too much. In addition, there are costs for support staff who will help you learn how to set up, run, and keep the network running and safe. The total cost of owning a network also includes the cost of capital equipment and the cost of annual maintenance, but not the cost of the people who work to help you. Many tools and solutions can help you keep up with the needs of your business as they change. Another is HP Open View (Hales, 2008). A few of the programmers that work with these programmers are CA Unicenter and IBM Tivoli. Novell ZENwork also works with these programmers. It is the same for everyone. They all use the same architecture and the same protocol to run the network. A wide range of networks, protocols, and equipment are used in a complex communication environment that includes voice, video, and data. Network management tools have grown to be able to work across all of these different things. By being ready to use right out of the box with little or no changes. There is a popular NMS framework called HP OpenView (openview.hp.com) that is used in large, mixed IT environments. Many people use it. NNM map takes a lot of time to set up because both the NNM map and message browser are very old. A lot of the OVO agents are hard to work with, and they die a lot, so the system has to be restarted a lot. OVO agents are hard to set up. Getting the whole thing set up is hard, and the price makes it not good for small businesses. If you have a mostly Cisco network that needs to be managed with the least amount of work, you should use CW. A lot of non-Cisco devices don't work with it, and it takes a long time to respond to a question. Because CDP (Cisco Discovery Protocol) isn't well-known, it's hard to figure out how to fix and run the product. Because it's unique, it has a protocol called CDP that makes it work. A lot of people have trouble setting up and maintaining commercial products because they can be pricey. This also costs a lot of money. Network management products and solutions have been
  • 27. Final Project Report Individual 16 around for a long time, but it has been found that many people don't want to use them because they are too expensive and complicated. 3.4 Final Project Record Figure 7 Plan of Project Completed
  • 28. Final Project Report Individual 17 4 Chapter 4 feasibility study An organization's operations should be considered when conducting a feasibility study. The study should determine what resources are required for the project and provide a rough estimate of the costs, timeframes, and impact of the project on the organization's operations. Aside from that, it should try to figure out how the new network will help people become more productive while also saving them money. All of the factors that will need to be considered include the number of people who will need to be hired, the amount of training they will require, and the amount of support infrastructure that will be required for the network and its users. Depending on the findings of the study, the report will assist management in deciding whether or not to proceed with the project in question (Drury, 2021). 4.1 Time feasibility Table 1 Time Feasibility 1
  • 29. Final Project Report Individual 18 4.2 Cost feasibility It is important for management to look at the costs and benefits of a project in order to see if it is worth it to work on. Think about how much money a project will cost before you decide whether or not to do it, Guesswork: It is used to figure out how much it will cost to make a big investment in the future. During the beginning stages of a project, it may seem impossible to figure out the exact costs and benefits. One should spend enough time figuring out how much it will cost and how much it will be worth so they can compare it to other projects (name, Last update 2022). You might think of things that are easy to figure out and estimate, like the cost of hardware and software or labor, when someone talks about how much an IT/IS project costs. Also, there are some costs that are not tangible, like a loss of goodwill or a lack of efficiency. When you buy and keep up with information technology, you can figure out the total cost of ownership, which is how much it costs to put in and keep up with all of it (TCO). In order to figure out how much it costs to buy and run a business, financial estimates are used. VP and Research Director of Gartner Bill Kirwin said that "TCO is a complete look at IT costs over time." This is what he said. This is called a "holistic assessment." It means that all the costs of IT investments, Table 2 Time Feasibility 2
  • 30. Final Project Report Individual 19 including capital investment, license fees, leasing costs, and service fees, are taken into account. This includes both direct and indirect labor costs. Garter, Inc., a consulting firm, has found and said how much money it costs to use information technology through its whole life cycle.  The cost of purchasing end-user computer equipment.  The cost of purchasing software licenses.  Hardware and software distribution costs.  Equipment warranty and maintenance costs.  Software license tracking costs.  Operational infrastructure costs.  The cost of a breach (in terms of reputation loss and recovery costs).  Electricity and cooling costs.  Cost of network equipment and software.  Server hardware and software costs.  Insurance Costs.  Cost of testing.  Upgrade or scalability costs.  IT staff expenses.  Time spent administering level “C”.  Backup and restore process costs.  Failure or costs associated with failure.  Performance degradation incidents (eg user has to wait). Cost Analysis Product Price Quantity Total Cisco UCS C240 M6 Rack Server $4000 10 $40000 cisco catalyst 8300 series edge router $3500 6 $21000
  • 31. Final Project Report Individual 20 XPS Desktop $400 94 $37600 ASA 5585-X Firewall $8498.00 1 $8498.00 WS-C2960X-24PS-L Catalyst 2960-X 24 GigE PoE 370W $1540.00 9 $13860 AIR-CAP702I-A-K9 $495.00 9 $4455 cisco 8845 VoIP phone $441.00 7 $3087 Canon Pixma G2012 All-in One Ink Tank Color Printer $179.99 23 $4139.77 Xerox duplex combo scanner $269.99 22 $5939.78 EtherFast 8-Port 10/100 Desktop Hub $79.99 1 $79.99 PatchSee Cat6 RJ45 Ethernet Cable (2000feet) $1699 10 $16990 Ultimate Tool Kit $220 1 $220 Table 3 Cost Feasibility 4.3 Scope feasibility Users from departments such as Economic Research, Human Resources, the Advances and lending department (SME Loans, project loans) V3, the Department of Administration and Personnel, Deposits, Account (Checking and Cards also), Cash Management, the Department of Statistical Analysis and Computer Services, the Back Office (IT, CRM, Accounting & Finance, Product and Planning, and so on), and the Regional Development Department will be the primary users of the netwok.com website. Those who will receive information produced on the network but will not actively participate in its operation are referred to as secondary users of the network. They include clients, employees, and members of the general public. Because they will receive information but
  • 32. Final Project Report Individual 21 will not actively participate in its operation, clients, employees, and members of the general public are referred to as "secondary users." Every activity taking place on the network should be visible to the users of the system. If everything goes according to plan, remote-controlled programmers, file transfers, and other similar operations should appear to be running as quickly, if not faster, than those carried out on an end- station. According to the findings of user interviews conducted to determine their requirements and expectations, an average throughput of 20 Mbps per user within each LAN and 10 Mbps per user across LANs will more than support the required performance in the vast majority of scenarios in the vast majority of scenarios (teleconferencing being the possible exception). Storage space must be available in sufficient quantities in order to accommodate the storage of all transaction, account, and state data in a single, centrally located repository. User interviews, observations of current and anticipated storage requirements, and other data have been used to estimate that each user will require on average 1 GB of server space (in addition to secondary storage on local computers), with a maximum estimated server-side storage requirement per user of approximately 10 GB. The manufacturer also claims that the network operating system will take up approximately 1.5GB of space on each LAN server on which it is installed in addition to the above. Specifically, each PC will have a minimum storage capacity of 100 GB, and each local area network server will have a minimum storage capacity of 200 GB, in order to strike a balance between price and performance concerns. There will be a main data server with a storage capacity of 400 GB, which will be located on the premises of the State Office of the Attorney General (name, no date). 4.4 Technical feasibility Assessing technical feasibility is looking at whether the new system will work well and whether an organization can build a proposed system or not. As part of the technical assessment, we look into questions such as whether or not there is enough technology available, how difficult it will be
  • 33. Final Project Report Individual 22 to build, and if the company has enough experience with that technology. One example of how technology can be used is the way credit unions are run.  “A lot of people were happy with how it worked and thought the platform did what they needed it to do. But, obviously, that platform needed an upgrade to keep up with new technology in the industry. As chief strategy officer for Fiserv's credit union division, Sara L. Brooks says: "It was no longer going to be able to support itself long-term." (Swedberg 2005)  Even though a certain operating system can run on different types of computers, the software written for that operating system may not work on all of the computers that the operating system can run on. Because of this, OpenOffice.org didn't run on computers with 64-bit processors in 2006 because it didn't work right away. Because the company had 64- bit computer architectures at the time, it wouldn't be possible to use OpenOffice at that time (name, Last update 2022). In the process of making a new system, one has to look into and compare technology providers, figure out how reliable and competitive that system is, and figure out what limitations or constraints technology has. Also, one has to think about how big the system is, how complicated it is, and how much experience the group has with similar systems. Project Structure: As long as the project's requirements are well thought out and structured, it will be less risky than if someone else decides what they want. Familiarity with Technology or Application area: A project will be less risky if both the people who make and use it know what they're doing. If the development team used the same tools and hardware, it would be less risky. It's also important for users to know how systems work, because this can help them understand why it's important for them to be a part of the process. There is a good chance that this involvement will help the project go well!
  • 34. Final Project Report Individual 23 A project with a lot of risk can still be done, though. Almost every company would have a good mix of high, medium-risk, and low-risk projects. Without the high-risk project, the organization couldn't make the big changes in how systems were used. 4.5 Economic feasibility Due to the fact that it deals with things that can be measured, quantified, and compared in monetary terms, economic evaluation is an important component of investment evaluation. It is necessary to consider the results of an economic evaluation when deciding whether or not to invest in a particular project. This is due to the fact that the proper investment appraisal contributes to ensuring that the appropriate project is completed in a manner that maximizes its chances of success (name, Last Update 2022). Money and other resources are spent now in order to make money, save money, or do good for the community in the future, which is referred to as project investments. The future benefit of an investment must outweigh the resources that were expended to get there in order for it to be deemed worthwhile.
  • 35. Final Project Report Individual 24 5 Chapter 5 design It is a group of computers and other hardware that can talk to each other through communication channels. This lets a wide range of people share resources and talk to each other. Setting up a business network is all done through the internet. This is how it works: People who work for big businesses and other groups use IT to make sure that their data, information, and other things don't get stolen or leaked. IT is a type of network. Computer networks are made up of specialized equipment like hosts, routers, switches, and access points. These are the parts that make them work. As many of these devices connect to each other and use the same protocol, they form a network. Networks that connect computers near each other are called "local area networks" or "LANs." This type of network is called a "local area network." People can use it in a small area and connect their computers with it, At home, there could be just two or three people, or there could be a lot of people at the bank's main office. By setting up LANs this way, home owners and IT managers can set up LANs so that network nodes can share services like printers or network storage. To make sure your network is safe, you need to think about things like how the network is set up, what kind of hardware and software you use, and where each host is in the network. There must be a list of everything that needs to be done before any design can start. Then, the project can start. To design and put in place a computer network, it takes a long time and many people to get it done right. Many parts of a company are involved. At this point, things like where the website is and how people use it are usually taken into account. 5.1 Introduction your choice of proposed network system There are many security issues and more costs for both banking users and the banks because of the rise in banking. In his paper, Classers said that security is all about the risks and costs that come with it. The most important thing to do when it comes to banking security is to keep important information safe from people who want to get their hands on it. As a result, the banks must always improve their security. At the same time, the banks have to keep costs down to make money. People who want to break into a system will have to pay a lot more to do so, as well as get
  • 36. Final Project Report Individual 25 a lot more punishment if they do, by increasing security. Thus, the Internet criminals/attackers/crackers may not want to hack a high security online banking system. 5.2 Hardware and software requirements Software Requirement This following software we have used to implement our project-  Windows 7 or.  Windows 8 platform.  Windows 10 platform.  Cisco Packet Tracer 8.1.0  Switch.  Router.  Firewall.  Server. Hardware requirement It is important to have a computer with a processor that is compatible with IBM (such as an Intel Pentium 4, an Intel Core-i3, or an AMD Athlon 64-X2). Besides having 1 GB of RAM, the PC should also have a hard drive with at least 80GB of free space. IBM-compatible monitors must also be used. Cables and connectors are used in many different ways. These connect all of the computers, printers, servers, and other things on your network to each other in one place. They do this by connecting them all together. A router is a piece of hardware that helps people move around. Besides managing network traffic and making sure devices can communicate with each other through both wired and wireless connections, this function also makes sure they can connect to the internet. It is a place where people can connect to WiFi networks (optional). If the router doesn't cover certain parts of the building, this will let you extend your wireless network.
  • 37. Final Project Report Individual 26 An internet connection is needed to do this. For example, this could be a fiber connection that is faster or a leased line that is only for this one person. A firewall that comes with the hardware. In this way, your network and the internet are kept safe from security threats by putting a secure barrier between them. A network server may be built into some networks. It runs central applications, serves as an email server, and is a place to store files. 5.3 Evaluating of solutions When it comes to information provided for decision-making purposes, it is frequently difficult to place confidence in the information because the data processing and the output presented to management are diametrically opposed. Personnel working at the operational level of the bank appear to be unable to comprehend the information that they are responsible for processing. As part of the transition to a market-based economy, it is essential that banking institutions, as well as their information systems, undergo significant improvements. Financial deregulation, increased competition, and diversification, all of which have occurred in recent years, have increased the likelihood of banks going out of business. Banks may find themselves in financial trouble if they do not develop new methods of managing corporate resources, particularly information, and information technology. For organisations operating in global business environments, information systems integration will continue to be a source of concern because it presents a significant challenge.
  • 38. Final Project Report Individual 27 6 Chapter 6 implementation If a design includes a large number of complex implementation steps, plan to complete each step individually rather than all at once. Incorporating incremental implementation reduces the amount of time spent troubleshooting and the amount of time spent returning to a previous state. The process of putting a network design into action involves a number of stages (install hardware, configure systems, launch into production, and so forth). A number of steps are involved in each phase, and the documentation for each step should include the following: Date Description Implementation Details Complete Phase 3 21/10/2021 Install Bank hardware & software Section 1 ✓ Step 1 Connect switches and PC’s Section 2 ✓ Step 2 Install routers Section 3 ✓ Step 3 Complete cabling Section 4 ✓ Step 4 Verify data link layer Section 5 ✓ Phase 4 26/12/2021 Configure Bank hardware & software Section 1 ✓ Step 1 Configure VLANs Section 2 ✓ Step 2 Configure IP addressing Section 3 ✓ Step 3 Configure routing Section 4 ✓ Step 4 Verify connectivity Section 5 ✓ Phase 5 14/03/2022 Launch bank updates into production Section 1 ✓
  • 39. Final Project Report Individual 28 Step 1 Complete connections to existing network Section 2 ✓ Step 2 Verify connectivity Section 3 ✓ Table 4 Design Implementation Plan Summary 6.1.1 Design Figure 8 Overall Design
  • 40. Final Project Report Individual 29 6.1.2 Experiment 1 Detailed study of the following network devices:  Repeater  Hub  Switch  Bridge  Router  Gate Way  Repeater: At the physical level, you can do things. It sends the signal out again, either at a higher level or with more power, or on the other side of a block. This way, the signal can go a long way. In this case, they only have two ports, so they can't be used to connect more than two things at a time (name, 2021).  Hub: used to connect several Ethernet devices with twisted pairs or fiber optics. It is called a "hub or concentrator." Making them act as if they were part of the same network. A hub works at this level. In this picture, you can see how the OSI model looks like. As many different things as possible can be done with the same device at the same time. Repeater hubs also get into fights. Detection, jamming all ports if it thinks there is a collision in the area.  Switch: Known as a network switch or switching hub, this piece of computer hardware is responsible for connecting different network components. They are referred to as "bridges" because they operate at the "data link layer" of the OSI model, where they process and route data. Layer 3 switches are network switches that are capable of supporting more than one layer. The data can be processed at the network layer by using this type of switch, as well (layer 3 and above).
  • 41. Final Project Report Individual 30  Bridge: At the data link layer of the OSI model (Layer 2), a network bridge connects two or more network segments. This layer is what connects them together. If you're talking about Ethernet networks, the term "bridge" refers to a device that acts in a way that meets the IEEE 802.1D standard. They look very much the same. There are many ports on a switch, which is like having a bridge with many bridges. Bridge: A switch, also called a Layer 2 switch, is often used to connect two things together. This is how bridges can figure out whether they can send data packets from one place to another.  Router: a router is a piece of hardware that connects two or more computer networks together. In this case, it can choose which data packets to send between them. In each data packet, there is information about the source and destination that a router can use to figure out if they're on the same network, or if the data packet must move from one network to another to get there. As a lot of networks are connected together, many routers must be used in order for them to work. Using this information, each router can build a table that shows which routes are the best between any two systems on the network. The routers share information about which systems they want to connect to.  Gate Way: This is a type of node that can connect to another network that has different protocols. This is how it works: A gateway may have devices like protocol translators, impedance matching devices, rate converters, fault isolators, signal translators, rate converters, or other things to make the whole system work. It also needs both networks to set up administrative procedures that work well together, so that they can all work together. The gateway helps two networks connect when they use different network protocols. It does this by making the necessary protocol changes.
  • 42. Final Project Report Individual 31 6.1.3 Experiment 2 The configuration of the three routers was shown in this Experiment 2: 6.1.3.1 Main Router Figure 9 Main Router
  • 43. Final Project Report Individual 32 Figure 10 Main Router
  • 44. Final Project Report Individual 33 6.1.3.1.1 Active network routing protocols Figure 11 Protocols 6.1.3.1.2 Access-lists Figure 12 ACL
  • 45. Final Project Report Individual 34 6.1.3.1.3 IP routing table Figure 13 IP Route
  • 46. Final Project Report Individual 35 6.1.3.2 First Floor Router Figure 14 1st Floor Router
  • 47. Final Project Report Individual 36 Figure 15 1st Floor Router
  • 48. Final Project Report Individual 37 6.1.3.2.1 Active network routing protocols 6.1.3.2.2 IP routing table Figure 16 Protocols Figure 17 IP Route
  • 49. Final Project Report Individual 38 6.1.3.2.3 Show ephone Status 6.1.3.3 Second Floor Router Figure 18 ephone status Figure 19 2nd Floor Router
  • 50. Final Project Report Individual 39 Figure 20 2nd Floor Router
  • 51. Final Project Report Individual 40 Figure 21 2nd Floor Router
  • 52. Final Project Report Individual 41 6.1.3.3.1 Active network routing protocols Figure 22 Protocols 6.1.3.3.2 IP routing table Figure 23 IP Route
  • 53. Final Project Report Individual 42 6.1.3.3.3 Access-lists 6.1.3.3.4 Show ephone Status 6.1.4 Experiment 3 6.1.4.1 VPN Configuration VPN access is available from the IP addresses 192.168.1.0 to 145.240.2.14 and 150.112.1.1. The IPsec VPN traffic will be routed through the Second Floor Router and the Main Router, including both. Figure 24 ACL Figure 25 ephone status Figure 26 VPN Tunnel
  • 54. Final Project Report Individual 43 Figure 27 Crypto IPsec
  • 55. Final Project Report Individual 44 Figure 28 Crypto IPsec Figure 29 second floor Router Crypto IPsec
  • 56. Final Project Report Individual 45 6.1.4.2 IoT devices configuration The Iot Things can be registered directly on an Every Departments Switch or on a Server device that has been configured with the IoE service, All IoT Device can monitor in Server it’s called IoT Server. There are 24 Ethernet ports available on the switch, as well as a wireless access point configured with the "Access Point" ssid on channel 6 and powered by the switch. Secure wireless connections can be established using WEP, WPA-PSK, or WPA2 enterprise encryption. The IOE Things are shown attached in the image below. Figure 30 second floor Router Crypto IPsec
  • 57. Final Project Report Individual 46 Figure 31 IoT and smart devices Figure 32 IoT Monitor
  • 58. Final Project Report Individual 47 Figure 33 IoT Monitor Figure 34 IoT Monitor
  • 59. Final Project Report Individual 48 6.1.5 Experiment 3 6.1.5.1 Configuration of Servers In this experiment, the configuration of servers such as a mail server, an FTP server, an Internet of Things server, a Syslog server, a DNS server, an NTP server, a AAA server, and a Web server is demonstrated. 6.1.5.1.1 Mail server 1. Configure IP addresses on the PCs, DNS Server and the Mail Server Mail Server IP address: 145.240.2.2/24 PC2 (Local Network) IP address: 150.112.1.5 /24 PC3 (Local Network) IP address: 150.112.1.6 /24 DNS server IP address: 145.240.2.9/24 2. Now configure mail clients on the PCs and mail service on the generic server. PC2 (Local Network): Figure 35 PC2 Configure Mail
  • 60. Final Project Report Individual 49 PC3 (Local Network): Next, we’ll configure the email server. To do this, click on the server, then click Services tab, pick email server from the menu. Provide the Domain name of the server then click on Set to set it. In this example I’ve used the name ‘mail.com’. Proceed, add users, and provide their passwords. I have two email clients (users) with usernames ‘localnetworkpc2 ‘and ‘localnetworkpc3 ‘with a common password ‘12345‘ After entering a username and password, click on Add (+) to add the user to the server. You can optionally remove a user by clicking on Remove (-). You can change a user’s password by clicking on change password. Figure 36 PC3 Mail Configure
  • 61. Final Project Report Individual 50 Try to relate this process to what happens when you register an email account with a mail service provider(mail server) like Gmail. The processes appear to agree, isn’t it? Now, notice that we set a domain name for the email server. For that reason, we should have a DNS server that will resolve this domain name (plus other domain names if there were) to an IP address. So let’s configure a DNS server. Figure 37 Mail server
  • 62. Final Project Report Individual 51 Click DNS server, click Services tab, then pick DNS. Turn the service ON. Set name-address pairs and add them to the server. You can view the DNS entry below: 3. Lastly test the email service. Go to PC2 email client, compose an email and send it to PC3 email address (localnetworkpc2@mail.com). Figure 38 DNS Server
  • 63. Final Project Report Individual 52 Try to see whether the email from PC2 is received on PC3. On the email client of PC3, click on Receive. Figure 39 Send mail to PC 3 Figure 40 PC3 Received mail
  • 64. Final Project Report Individual 53 6.1.5.1.2 FTP server Figure 41 FTP server
  • 65. Final Project Report Individual 54 Now try using an FTP client built in the Laptop to send files to an FTP server configured in the Server. From the Laptop’s command prompt, FTP the server using the server IP address by typing: Ftp 145.240.2.3 Provide the username (mybank) and password (2355) [which are the defaults] for ftp login. Figure 42 FTP prompt.
  • 66. Final Project Report Individual 55 6.1.5.1.3 IoT Server Figure 43 IoT server
  • 67. Final Project Report Individual 56 Figure 44 Enabled IoT device
  • 68. Final Project Report Individual 57 6.1.5.1.4 Syslog Server Figure 45 Syslog Server
  • 69. Final Project Report Individual 58 6.1.5.1.5 DNS Server Figure 46 DNS server
  • 70. Final Project Report Individual 59 6.1.5.1.6 NTP Server Figure 47 NTP server
  • 71. Final Project Report Individual 60 6.1.5.1.7 AAA server Figure 48 AAA server
  • 72. Final Project Report Individual 61 6.1.5.1.8 Web server Figure 49 Web server
  • 73. Final Project Report Individual 62 Figure 50 Interface of Website
  • 74. Final Project Report Individual 63 7 Chapter 7 testing and verification Our company was able to develop grid concepts for rural bank networks using the results from the simulation test, which was then used to develop grid concepts for the simulation test, which was then used to develop grid concepts for the simulation test. In the following section, we will go over the components of the simulation test grid as well as its architecture, application model, and implementation principle in more depth. The simulation test grid is an important method for the simulation of SOS, which has been demonstrated through the use of a case study (system of systems). Several hours or days will elapse after the final network simulation is completed before all of the different types of test cases are added (name, 2022). Tests will happen all the time during the process of getting things set up. Network cabling, equipment, software, and services will all be checked out. It's usually done by a company that does this kind of work. They will put in and test the cables, and they will show that the installation meets the standards. Major network equipment like switches and routers will need to be checked for correct operation and configuration when they're put in place. This will make sure they work the way they should. An expensive core switch may be installed and tested by the equipment vendor on the client's behalf. This is called a "test run." The vendor will also give the customer all the paperwork they need to get the job done, too. Tests can be done to make sure the network is working and that users have access to their data and applications by logging into the network at random and using a generic user account to get on the network (on a large network, it may not be practical to check every single user account individually). Other services like email and the Internet will also be tested in this way. It's important to make sure that the backup procedures work after the organization moves its data from the old system to the new one. Technical specifications for each piece of network hardware will be included in the manual. There will also be floor plans and cabling diagrams, as well as floor plans that show where network equipment is placed. It's also important to keep track of the software that each computer on the network has, as well as the number of software licenses each computer has at the same time. Also, each device on the network should have its MAC and IP address written down and linked to a real-
  • 75. Final Project Report Individual 64 world location. A lot easier to do if there is detailed and accurate network documentation out there to look at. This makes it easier to run the network, fix problems, and make sure it's in good shape. In order for people to get help quickly and effectively, the help desk needs to know what software, hardware, network address, and physical location a user's workstation has. Model Validation Method Result Transmission Control Protocol successful Internet Protocol (IP) Successful (IP v4) User Datagram Protocol (UDP) successful Post office Protocol (POP) successful Simple mail transport Protocol (SMTP) successful File Transfer Protocol (FTP) successful Hyper Text Transfer Protocol (HTTP) successful Telnet successful DNS successful ICMP (Internet Control Message Protocol) successful Routing Protocols Successful (Static routing and rip routing) IoT Configuration Successful NTP Successful Syslog Successful AAA radius Successful VPN IPsec Successful Extended ACL Successful DHCP Successful (First Floor Router and Second Floor Router) Table 5 Common Simulation Model Validation Methods
  • 76. Final Project Report Individual 65  Test ID: The test case ID must be unique and can also be linked to the test logs and other data that was collected during the tests.  Node List: The list of the hardware that will be used in this test case.  Test Description: The description of the test case should be very short, but not too long.  Test Phase: Feature, Negative, Scalability, or a Baseline.  Test Suite: If this test case will be used to check a feature or service, make sure to include it. A few examples might be OSPF, QoS, High Availability, or VoIP.  Test Setup: The test setup is very clear about the topology, hardware, logical configurations, test tools, applications, or other things that need to be in place before the test can be run. For very complicated tests, it can be very useful to show how the test should be set up with a diagram.  Test Steps: They are the steps that show how to do the test. These should be very detailed so that even people with little experience can do the tests.  Expected Results: Expected results are those that say what the system should do or what the system should do based on the steps in the test. These results are called "expected results."
  • 77. Final Project Report Individual 66  Observed Results: It is important to know what happens when you do something and what happens when you give it a certain set of things.  Pass/Fail: As long as the test result is Pass or Fail, it means that the test went well or bad. 8 Chapter 8 EVALUATION and CONCLUSION Small rural banks in desperate need of a network-based system were the driving force behind the development of this system. Until recently, the bank relied solely on paper and books to conduct transactions, and it did not have a network system in place to facilitate transactions. The advancement of technology and the development of automated systems have become increasingly important and urgent in the context of the expansion of banking services. In addition, when it comes to banking, many customers are concerned about their personal information being compromised. Data will be routed through the system in the most efficient manner possible because of this system, which will make network administration easier and data routing more efficient. It is our goal, as time progresses, to put it into practice in the real world and to ensure that banks can benefit from and take advantage of its implementation in the years to come. System development is even more critical and urgently required for the expansion of banking services due to the fact that they will require fewer employees if they use an automated system. In addition, security is a major concern when it comes to banking transactions. The network will be easier to manage as a result of this system, and the data will be routed in the shortest path possible in a large distributed system. The use of tools such as flow analysis and hierarchical network design can be beneficial in network analysis and design; we demonstrated how these tools can be used in network analysis and design in the previous section. The National Defense Letter Complex (NDLC), which will allow communication networks to keep up with the more complex challenges that the present and next
  • 78. Final Project Report Individual 67 generations will face in the future, is also expected to receive additional research attention in the future. Future work  In the future, everything is stored in a cloud-based system.  Ethernet switches become transparent  Time-based transmission should be included.  The security system is going to be upgraded.  Improve the user-friendliness of the project.  Implementation in the real world.  Implement a High Level Security in future.  This design is implemented for a local area network (LAN). The SD-WAN concept will be developed in the future.
  • 79. Final Project Report Individual 68 9 References Alleyne, S., Last update 2021. /stepbystep-background-study-thesis-1626.html. [Online] Available at: https://education.seattlepi.com/stepbystep-background-study-thesis-1626.html [Accessed 16 april 2022]. Anon., 2014. /?ProblemDomain. [Online] Available at: https://wiki.c2.com/?ProblemDomain [Accessed 16 April 2022]. Anon., Last Update 2018. /en/About_the_Financial_System. [Online] Available at: https://www.cbsl.gov.lk/en/About_the_Financial_System [Accessed 16 april 2022]. Athanas, R., 2020. CHAPTER TWO LITERATURE REVIEW 2.1 Introductio. IMPACT OF MOBILE BANKING OF SMEs IN TANZANIA, No date March, p. 50. Drury, A., 2021. /terms/f/feasibility-study.asp. [Online] Available at: https://www.investopedia.com/terms/f/feasibility-study.asp [Accessed 26 april 2022]. Fabio Caccioli, P. B. a. T. K., 2017. Network models of financial systemic risk: a review. Survey Article, No volume(2018), p. 114. Hales, C. N. a. L., 2008. /articles/148-six-steps-to-effective-network-planning. [Online] Available at: https://www.supplychainquarterly.com/articles/148-six-steps-to-effective-network- planning [Accessed 26 april 2022]. Hart, C., 2012. Hart (1998). In: Oxford, ed. doing a literature review. London: SAGE Publication, p. 243. McCombes, S., 2019. How to write a problem statement. When should you write a problem statement?, 19 april, pp. -.
  • 80. Final Project Report Individual 69 name, n., 2021. /network-devices-hub-repeater-bridge-switch-router-gateways/. [Online] Available at: https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch- router-gateways/ [Accessed 28 april 2022]. name, n., 2022. /network-simulation-software-tools/. [Online] Available at: https://www.networkstraining.com/network-simulation-software-tools/ [Accessed 1 may 2022]. name, N., Last update 2022. /agdm/wholefarm/html/c5-64.html. [Online] Available at: https://www.extension.iastate.edu/agdm/wholefarm/html/c5-64.html [Accessed 26 april 2022]. name, N., Last Update 2022. /nebraska-business-development-center/technology- commercialization/goldsmith-technology/step-6.php. [Online] Available at: https://www.unomaha.edu/nebraska-business-development-center/technology- commercialization/goldsmith-technology/step-6.php [Accessed 26 april 2022]. name, n., Last update 2022. /wiki/Cross-platform_software. [Online] Available at: https://en.wikipedia.org/wiki/Cross-platform_software [Accessed 26 april 2022]. name, N., no date. PROJECT CONCEPTION AND PROJECT FEASIBILITY:Feasibility Analysis. In: Project Management. s.l.:s.n., p. 78. Sarel., C. L. G. a. D., 2021. Literature Review of E-Banking, UK: Information Systems. Simplilearn, 2022. What is a Project Management Plan and How to Create One. [Online] Available at: https://www.simplilearn.com/what-is-a-project-management-plan-article [Accessed 25 april 2022].
  • 81. Final Project Report Individual 70 10 Appendices BEng. (Hons) Computer Networking Final Report Approval Form Name in Full : Registration No: LMU No: Batch No : Course : Project Topic : Supervisor Comments : Approved by the Supervisor: Student’s Signature: Date Collected: Supervisor’s Signature: MUHAMMADHU PAIDHIK MUHAMMADH FAISAAN 76943 21038284/1 KAN/LMU-T-BENG-CN-SEP/2021 BEng (Hons) Computer Networking –Top-up Design and Implementation Medium Level Network for Rural Bank 2022/05/02
  • 82. Final Project Report Individual 71