SlideShare a Scribd company logo
IDENTIFYING PERSISTENTFAULTS IN
NETWORK ACCESS CONTROL SYSTEM
PROJECT SYNOPSIS
OF MAJOR PROJECT
BACHELOR OF TECHNOLOGY
Branch- C.S.E
SUBMITTED BY-
ASHISH KUMAR VERMA
&
ANUP SHARMA
BABU BANARASI DAS ENGINEERING COLLEGE,
LUCKNOW
ABSTRACT
The task of configuring and managing security policies in enterprise networks is becoming
harder due to complex policy constraints of the organizations and rapid changes in the network
topologies. Typically, the organizational security policies are defined as a collection of rules for
allowing/denying service accesses among various network zones. Implementation of the policy
can be realized in a distributed fashion via implementation of appropriate sets of access control
rules (ACL) within the interface switches (Layer-3 routers) of the network. Due to organizational
complex security needs the verification of the ACL implementations with respect to the security
policy is a major technical challenge to the network administrators. The problem’s complexity
increases with changes in network topologies. In any point of time, the failure within the network
infrastructure may occur, causing invalidation and performance degradation of the network
parameters. Hence, the existing security implementation (distribution of ACL rules) may not
conform to the policy.
Here we address the problem by analyzing Network Access Control model with ACL
implementation in a static fault environment considering static and persistent faults in network
access control. We have considered various network topologies for our study and the simulation
has been run for networks comprising of number of nodes from 8 to 256. Then we have induced
faults to these networks and tried to determine the average and maximum fault latency in these
networks in a simulation based approach.
Objectives:
Network Access Control has been extensively employed in large scale organizations to define
and implement policies that describe how to regulate access to network nodes by the end users
when they are initially attempting to access the network. Motivated by the need of fault detection
in the network access control and its analysis, the following objective was undertaken in this
project.
At the time of operation, network infrastructure may encounter a failure, thereby invalidating the
control policies and resulting in performance degradation of the network parameters. Here we
address the problem by analyzing Network Access Control model with ACL implementation in a
static fault environment. In order to validate the proposed schemes, we followed CISCO packet
tracer.
Tools:
 Packet tracer v6.1
 CISCO IP Communicator Software installer
 IP Phones (at least 2 7950 series)
 Routers (IOS image: enterprise)
 Switches
 Laptop or PCs
 Cables
Cisco Packet Tracer
Cisco Packet Tracer is a powerful network simulation program that allows the implementers
to experiment with network behavior. As an integral part of the Networking Academy
comprehensive learning experience, Packet Tracer provides simulation, visualization,
authoring, assessment, and collaboration capabilities of complex technology concepts.
The simulation-based environment helps users develop modern networking models. Packet
Tracer allows users to easily learn and demonstrate complex technical concepts and
networking systems design.
CONCLUSION AND FUTURE WORK-
The Packet Tracer propagates status information as quickly and through the best path possible to
allow it to be effectively handled and monitored under static faulty network scenarios. The results
obtained for an Access-Control implemented network were in accordance with the standard network
fault analysis model.
The work presented here can be further expanded in several areas particularly as a dynamic fault
based network access control analysis. It can also incorporate intermittent fault analysis with a focus
towards fault tolerance in the network provided.

More Related Content

Similar to Project title

En35793797
En35793797En35793797
En35793797
IJERA Editor
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
IRJET Journal
 
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxRunning head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
toltonkendal
 
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
IRJET Journal
 
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...Anand Raj
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
IRJET Journal
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
Shakib Ansaar
 
CLARK ROBERT FINAL
CLARK ROBERT FINALCLARK ROBERT FINAL
CLARK ROBERT FINALBob Clark
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420Steve Goeringer
 
Robert clarkresumefd
Robert clarkresumefdRobert clarkresumefd
Robert clarkresumefd
Bob Clark
 
A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...
A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...
A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...
IJNSA Journal
 
Designing network topology.pptx
Designing network topology.pptxDesigning network topology.pptx
Designing network topology.pptx
KISHOYIANKISH
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
JIEMS Akkalkuwa
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall techniqueIAEME Publication
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall techniqueIAEME Publication
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall techniqueIAEME Publication
 
Results of simulation modeling of technical parameters of a multiservice network
Results of simulation modeling of technical parameters of a multiservice networkResults of simulation modeling of technical parameters of a multiservice network
Results of simulation modeling of technical parameters of a multiservice network
TELKOMNIKA JOURNAL
 
Security sdn
Security sdnSecurity sdn
Security sdn
Priya Singh
 

Similar to Project title (20)

En35793797
En35793797En35793797
En35793797
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxRunning head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
 
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
 
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
 
Sufian Nasir CV
Sufian Nasir CVSufian Nasir CV
Sufian Nasir CV
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
CLARK ROBERT FINAL
CLARK ROBERT FINALCLARK ROBERT FINAL
CLARK ROBERT FINAL
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
 
Robert clarkresumefd
Robert clarkresumefdRobert clarkresumefd
Robert clarkresumefd
 
A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...
A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...
A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...
 
Designing network topology.pptx
Designing network topology.pptxDesigning network topology.pptx
Designing network topology.pptx
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
Results of simulation modeling of technical parameters of a multiservice network
Results of simulation modeling of technical parameters of a multiservice networkResults of simulation modeling of technical parameters of a multiservice network
Results of simulation modeling of technical parameters of a multiservice network
 
Security sdn
Security sdnSecurity sdn
Security sdn
 

Recently uploaded

Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 

Recently uploaded (20)

Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 

Project title

  • 1. IDENTIFYING PERSISTENTFAULTS IN NETWORK ACCESS CONTROL SYSTEM PROJECT SYNOPSIS OF MAJOR PROJECT BACHELOR OF TECHNOLOGY Branch- C.S.E SUBMITTED BY- ASHISH KUMAR VERMA & ANUP SHARMA BABU BANARASI DAS ENGINEERING COLLEGE, LUCKNOW
  • 2. ABSTRACT The task of configuring and managing security policies in enterprise networks is becoming harder due to complex policy constraints of the organizations and rapid changes in the network topologies. Typically, the organizational security policies are defined as a collection of rules for allowing/denying service accesses among various network zones. Implementation of the policy can be realized in a distributed fashion via implementation of appropriate sets of access control rules (ACL) within the interface switches (Layer-3 routers) of the network. Due to organizational complex security needs the verification of the ACL implementations with respect to the security policy is a major technical challenge to the network administrators. The problem’s complexity increases with changes in network topologies. In any point of time, the failure within the network infrastructure may occur, causing invalidation and performance degradation of the network parameters. Hence, the existing security implementation (distribution of ACL rules) may not conform to the policy. Here we address the problem by analyzing Network Access Control model with ACL implementation in a static fault environment considering static and persistent faults in network access control. We have considered various network topologies for our study and the simulation has been run for networks comprising of number of nodes from 8 to 256. Then we have induced faults to these networks and tried to determine the average and maximum fault latency in these networks in a simulation based approach.
  • 3. Objectives: Network Access Control has been extensively employed in large scale organizations to define and implement policies that describe how to regulate access to network nodes by the end users when they are initially attempting to access the network. Motivated by the need of fault detection in the network access control and its analysis, the following objective was undertaken in this project. At the time of operation, network infrastructure may encounter a failure, thereby invalidating the control policies and resulting in performance degradation of the network parameters. Here we address the problem by analyzing Network Access Control model with ACL implementation in a static fault environment. In order to validate the proposed schemes, we followed CISCO packet tracer. Tools:  Packet tracer v6.1  CISCO IP Communicator Software installer  IP Phones (at least 2 7950 series)  Routers (IOS image: enterprise)  Switches  Laptop or PCs  Cables Cisco Packet Tracer Cisco Packet Tracer is a powerful network simulation program that allows the implementers to experiment with network behavior. As an integral part of the Networking Academy comprehensive learning experience, Packet Tracer provides simulation, visualization, authoring, assessment, and collaboration capabilities of complex technology concepts. The simulation-based environment helps users develop modern networking models. Packet Tracer allows users to easily learn and demonstrate complex technical concepts and networking systems design.
  • 4. CONCLUSION AND FUTURE WORK- The Packet Tracer propagates status information as quickly and through the best path possible to allow it to be effectively handled and monitored under static faulty network scenarios. The results obtained for an Access-Control implemented network were in accordance with the standard network fault analysis model. The work presented here can be further expanded in several areas particularly as a dynamic fault based network access control analysis. It can also incorporate intermittent fault analysis with a focus towards fault tolerance in the network provided.