SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1203
Secured LAN Network Topology of a Small Office with Redundancy
Uzmasaman Aejaz Chanderki
Trainee Engineer, Prasar Bharti, All India Radio, Mumbai.
--------------------------------------------------------------------------***----------------------------------------------------------------------------
Abstract - In today’s time whether the office size is large or
small security is must. Most of the offices compromise their
security for some reason. Security as well as backup goes
hand in hand. The proposed system is combination of a LAN
network topology which will have security of the data flow
using MD5 which strong yet pocket friendly cryptography
method. The LAN network will also have a backup router
which will act as standby when the active router goes down
using Hot Standby Routing Protocol. This will provide
interruption free work.
Keywords- LAN network topology, Router, switch, MD5,
backup protocol, HSRP.
1. INTRODUCTION
Small commercial offices also has their own confidential
files that needs to protected but the data flow is in original
which can be hacked and manipulated by anyone.
Fig: 1.1 Typical Topology of small office
With security backup is needed to assure that when the
active router goes down by any reason it has a backup to
have an interruption free work without any data loss. The
proposed system is designed with a view of providing
backup as well as security for a LAN network Topology
The proposed system of small office network will have 4
departments for demonstration and ease purpose. The
figure above shows the Network design without backup
and security. The data flow is in its own format and Router
3 is backbone of the network which joins ISP and
departments. It needs a standby Router when it turns
down.
The security can be provided by doing encryption and
decryption of end to end data using Message Digest 5
which is one of the strongest Cryptography methods. The
hacker needs to spend & years to decode it which is not
feasible for anyone. Implementation of MD5 is quite
simple.
The redundancy is provided by a backup routing protocol
known as HSPR which will run in background and check
router status. If this Protocol didn’t exist gateways needs
to be added to each and every system which is again not
possible in any way. The further section will discuss MD5,
HSPR and its use in new system in great detail.
2. METHODOLOGY
Hot standby routing protocol is a Cisco proprietary. In this
we have active and standby concept.
Fig: 2.1 HSRP
Whichever router is run first with HSRP command will be
active other will be its standby. A virtual IP address is used
as Gateway for all end users. The standby router comes to
know that active router is alive by a constant ‘hello’ sent
every 3 seconds. If these 3 seconds are missed it will wait
for another 10 seconds and turns itself into active router.
The highest priority is checked in order to get the crown of
‘active’ router. The priority can be manipulated using few
commands.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1204
Fig: 2.2 Message Digest 5
The MD5 message-digest algorithm is a widely used hash
function provides a 128-bit hash value. MD5 has been
deprecated for uses other than as a non-
cryptographic checksum to verify data integrity and detect
unintentional data corruption.
3. PROPOSED SYSTEM
The designed topology is prototype with limited end
devices for demo purpose. IP addresses taken are simple.
The routers used are c3725 and switch is Ethernet switch.
After basic IP addressing the routing protocol used is RIP
version 2. Rip is run on all the protocols. In order to check
if the routing protocol works fine we have pinged a
loopback interface 1.1.1.1 created on ISP for testing
purpose.
Fig: 3.1 The proposed network design
The data flow will be in form of MD5 format which will be
decrypted at end user. There are two routers connected in
between ISP and end user. They both will not be active but
only 1 will be in force and other will be backup. HSRP
protocol will be run on the interface facing end user on
each of these routers.
4. RESULTS
A. HSPR
After doing basic IP addressing and setting up routing
protocol ‘ping’ from PC1 to ISP Loopback interface is
given to check data flow or path.
Fig: 4.1 Testing from PC1 to Loopback
When the path is set all over topology HSPR needs to be
set on router 1 and 2 interfaces.
Fig: 4.2 Logs
As soon as HSRP commands are given to the first router it
consider himself as active one but as soon as router 2
comes in race highest priority wins. Here router 1 has
lesser priority than router 2 so it is a standby router.
Fig: 4.3 Logs
In order to check the status of the routers there is a
verification command ‘show standby’.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1205
Fig 4.4 Router 2 verification
Fig: 4.5 Router 1 verification.
This will show every detail likes priority, hell timer, MAC
address so on.
Fig: 4.6 Data Flow Path
B. MD5 python
Implementing MD5 using Python 3.
Fig: 4.7 Encrypting data using MD5
Fig: 4.8 Encrypted data in MD5
5. CONCLUSION
This network topology can further be modified by using
advance cryptography and using biometric and AI
authentication. VRRP protocol can also be used whose
timer is less and faster than HSRP. Active and standby
Method can be avoided using Active-Active method which
is provided by IGP Protocol to give even faster result.
Authentication can be setup in individual routers and ports
so that no one manipulates the commands in global mode.
REFERENCES
[1] R. Rivest. The MD5 Message-Digest Algorithm
[rfc1321]
[2] Tao Xie and Dengguo Feng (30 May 2009). How to
Find Weak Input Differences for MD5 Collision Attack.
[3] Rivest R L. The MD5 message digest algorithm
[EB/OL].
[4] Xiaoyun Wang, Dengguo, k., m., m, H A V A L- 1 2 8 a n
d R IP E M D ] , Cryptology ePrint Archive Report
2004/199, 16 August 2004,
[5] J. Black, M. Cochran, T. Highland: A Study of the MD5
Attacks: Insights and Improvement, March 3, 2006
[6] Gray, Paul, Guide to IFPS (Interactive Financial
Planning System), Second Edition, McGraw-Hill Book
Company, New York, 1987.
[7] Welford, A. T., Reaction Times, University of Adelaide,
Adelaide, Australia, 1980.
[8] Miller, L. H., "A Study In Man Machine Interaction",
National Computer Conference, 1977.
[9] Barry H. and Sorkin, Robert D., Human Factors:
Understanding People-System Relationships, John
Wiley and Sons, 1983.
[10] Miller, Robert B., "Response Time in Man-
Computer Conversational Transitions", AFIPS
Conference Proceedings, Volume 33, Part 1, AFIPS
Press, Montvale, New Jersey, 1968.
[11] Handbook of Perception and Human Performance,
Volume 1, "Reaction Times and Speed-Accuracy
Trade-off", John Wiley and Son's, 1986.
[12] Garrison, Ray H., Managerial Accounting, Fifth
Edition, Business Publications, Inc., Plano, Texas.

More Related Content

What's hot

ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructurePrince Gautam
 
E-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management SystemE-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management SystemIRJET Journal
 
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA  Routing Fundamentals -  EIGRP, OSPF and RIPCCNA  Routing Fundamentals -  EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIPsushmil123
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5friv4schoolgames
 
Chapter 7 exam
Chapter 7 examChapter 7 exam
Chapter 7 examreiryuzaki
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol AnalyzerSourav Roy
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examĐồng Quốc Vương
 
Top103gradiooptimisationactions 100927074613-phpapp02
Top103gradiooptimisationactions 100927074613-phpapp02Top103gradiooptimisationactions 100927074613-phpapp02
Top103gradiooptimisationactions 100927074613-phpapp02akram shakeri
 
Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answersccna4discovery
 
FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES Amira Dolce Farhana
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018Download Mipdfcom
 
Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher
Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream CipherCompact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher
Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipheriosrjce
 
Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...
Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...
Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...rameraja
 
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe Langlois
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe LangloisAttacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe Langlois
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe LangloisP1Security
 

What's hot (20)

ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructure
 
E-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management SystemE-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management System
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA  Routing Fundamentals -  EIGRP, OSPF and RIPCCNA  Routing Fundamentals -  EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
 
Chapter 7 exam
Chapter 7 examChapter 7 exam
Chapter 7 exam
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
sigtran
sigtransigtran
sigtran
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
 
Top103gradiooptimisationactions 100927074613-phpapp02
Top103gradiooptimisationactions 100927074613-phpapp02Top103gradiooptimisationactions 100927074613-phpapp02
Top103gradiooptimisationactions 100927074613-phpapp02
 
Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answers
 
acl configuration
acl configurationacl configuration
acl configuration
 
FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018
 
Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher
Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream CipherCompact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher
Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher
 
Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...
Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...
Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...
 
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe Langlois
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe LangloisAttacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe Langlois
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe Langlois
 
Chapter2 ppp
Chapter2   pppChapter2   ppp
Chapter2 ppp
 
Chapter 2 point-to-point protocol (ppp)
Chapter 2   point-to-point protocol (ppp)Chapter 2   point-to-point protocol (ppp)
Chapter 2 point-to-point protocol (ppp)
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 

Similar to IRJET- Secured LAN Network Topology of a Small Office with Redundancy

IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS CloudIRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS CloudIRJET Journal
 
Performance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRPPerformance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRPIRJET Journal
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET Journal
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET Journal
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principleDrAlneami
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewIRJET Journal
 
Network Level Redundancy for Campus LAN
Network Level Redundancy for Campus LANNetwork Level Redundancy for Campus LAN
Network Level Redundancy for Campus LANijtsrd
 
NETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGNETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGramya marichamy
 
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...theijes
 
IRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRaIRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRaIRJET Journal
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIRJET Journal
 
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...Eswar Publications
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...IRJET Journal
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...IRJET Journal
 
IRJET- Design and Implementation 4G Scenario on Qualnet 5.0.2
IRJET-  	  Design and Implementation 4G Scenario on Qualnet 5.0.2IRJET-  	  Design and Implementation 4G Scenario on Qualnet 5.0.2
IRJET- Design and Implementation 4G Scenario on Qualnet 5.0.2IRJET Journal
 
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...IRJET Journal
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMIRJET Journal
 

Similar to IRJET- Secured LAN Network Topology of a Small Office with Redundancy (20)

IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS CloudIRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
 
Performance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRPPerformance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRP
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 
C0343015019
C0343015019C0343015019
C0343015019
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principle
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A Review
 
Network Level Redundancy for Campus LAN
Network Level Redundancy for Campus LANNetwork Level Redundancy for Campus LAN
Network Level Redundancy for Campus LAN
 
NETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGNETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENING
 
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
 
IRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRaIRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRa
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
 
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
 
IRJET- Design and Implementation 4G Scenario on Qualnet 5.0.2
IRJET-  	  Design and Implementation 4G Scenario on Qualnet 5.0.2IRJET-  	  Design and Implementation 4G Scenario on Qualnet 5.0.2
IRJET- Design and Implementation 4G Scenario on Qualnet 5.0.2
 
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEM
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 

Recently uploaded (20)

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 

IRJET- Secured LAN Network Topology of a Small Office with Redundancy

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1203 Secured LAN Network Topology of a Small Office with Redundancy Uzmasaman Aejaz Chanderki Trainee Engineer, Prasar Bharti, All India Radio, Mumbai. --------------------------------------------------------------------------***---------------------------------------------------------------------------- Abstract - In today’s time whether the office size is large or small security is must. Most of the offices compromise their security for some reason. Security as well as backup goes hand in hand. The proposed system is combination of a LAN network topology which will have security of the data flow using MD5 which strong yet pocket friendly cryptography method. The LAN network will also have a backup router which will act as standby when the active router goes down using Hot Standby Routing Protocol. This will provide interruption free work. Keywords- LAN network topology, Router, switch, MD5, backup protocol, HSRP. 1. INTRODUCTION Small commercial offices also has their own confidential files that needs to protected but the data flow is in original which can be hacked and manipulated by anyone. Fig: 1.1 Typical Topology of small office With security backup is needed to assure that when the active router goes down by any reason it has a backup to have an interruption free work without any data loss. The proposed system is designed with a view of providing backup as well as security for a LAN network Topology The proposed system of small office network will have 4 departments for demonstration and ease purpose. The figure above shows the Network design without backup and security. The data flow is in its own format and Router 3 is backbone of the network which joins ISP and departments. It needs a standby Router when it turns down. The security can be provided by doing encryption and decryption of end to end data using Message Digest 5 which is one of the strongest Cryptography methods. The hacker needs to spend & years to decode it which is not feasible for anyone. Implementation of MD5 is quite simple. The redundancy is provided by a backup routing protocol known as HSPR which will run in background and check router status. If this Protocol didn’t exist gateways needs to be added to each and every system which is again not possible in any way. The further section will discuss MD5, HSPR and its use in new system in great detail. 2. METHODOLOGY Hot standby routing protocol is a Cisco proprietary. In this we have active and standby concept. Fig: 2.1 HSRP Whichever router is run first with HSRP command will be active other will be its standby. A virtual IP address is used as Gateway for all end users. The standby router comes to know that active router is alive by a constant ‘hello’ sent every 3 seconds. If these 3 seconds are missed it will wait for another 10 seconds and turns itself into active router. The highest priority is checked in order to get the crown of ‘active’ router. The priority can be manipulated using few commands.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1204 Fig: 2.2 Message Digest 5 The MD5 message-digest algorithm is a widely used hash function provides a 128-bit hash value. MD5 has been deprecated for uses other than as a non- cryptographic checksum to verify data integrity and detect unintentional data corruption. 3. PROPOSED SYSTEM The designed topology is prototype with limited end devices for demo purpose. IP addresses taken are simple. The routers used are c3725 and switch is Ethernet switch. After basic IP addressing the routing protocol used is RIP version 2. Rip is run on all the protocols. In order to check if the routing protocol works fine we have pinged a loopback interface 1.1.1.1 created on ISP for testing purpose. Fig: 3.1 The proposed network design The data flow will be in form of MD5 format which will be decrypted at end user. There are two routers connected in between ISP and end user. They both will not be active but only 1 will be in force and other will be backup. HSRP protocol will be run on the interface facing end user on each of these routers. 4. RESULTS A. HSPR After doing basic IP addressing and setting up routing protocol ‘ping’ from PC1 to ISP Loopback interface is given to check data flow or path. Fig: 4.1 Testing from PC1 to Loopback When the path is set all over topology HSPR needs to be set on router 1 and 2 interfaces. Fig: 4.2 Logs As soon as HSRP commands are given to the first router it consider himself as active one but as soon as router 2 comes in race highest priority wins. Here router 1 has lesser priority than router 2 so it is a standby router. Fig: 4.3 Logs In order to check the status of the routers there is a verification command ‘show standby’.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1205 Fig 4.4 Router 2 verification Fig: 4.5 Router 1 verification. This will show every detail likes priority, hell timer, MAC address so on. Fig: 4.6 Data Flow Path B. MD5 python Implementing MD5 using Python 3. Fig: 4.7 Encrypting data using MD5 Fig: 4.8 Encrypted data in MD5 5. CONCLUSION This network topology can further be modified by using advance cryptography and using biometric and AI authentication. VRRP protocol can also be used whose timer is less and faster than HSRP. Active and standby Method can be avoided using Active-Active method which is provided by IGP Protocol to give even faster result. Authentication can be setup in individual routers and ports so that no one manipulates the commands in global mode. REFERENCES [1] R. Rivest. The MD5 Message-Digest Algorithm [rfc1321] [2] Tao Xie and Dengguo Feng (30 May 2009). How to Find Weak Input Differences for MD5 Collision Attack. [3] Rivest R L. The MD5 message digest algorithm [EB/OL]. [4] Xiaoyun Wang, Dengguo, k., m., m, H A V A L- 1 2 8 a n d R IP E M D ] , Cryptology ePrint Archive Report 2004/199, 16 August 2004, [5] J. Black, M. Cochran, T. Highland: A Study of the MD5 Attacks: Insights and Improvement, March 3, 2006 [6] Gray, Paul, Guide to IFPS (Interactive Financial Planning System), Second Edition, McGraw-Hill Book Company, New York, 1987. [7] Welford, A. T., Reaction Times, University of Adelaide, Adelaide, Australia, 1980. [8] Miller, L. H., "A Study In Man Machine Interaction", National Computer Conference, 1977. [9] Barry H. and Sorkin, Robert D., Human Factors: Understanding People-System Relationships, John Wiley and Sons, 1983. [10] Miller, Robert B., "Response Time in Man- Computer Conversational Transitions", AFIPS Conference Proceedings, Volume 33, Part 1, AFIPS Press, Montvale, New Jersey, 1968. [11] Handbook of Perception and Human Performance, Volume 1, "Reaction Times and Speed-Accuracy Trade-off", John Wiley and Son's, 1986. [12] Garrison, Ray H., Managerial Accounting, Fifth Edition, Business Publications, Inc., Plano, Texas.