0% found this document useful (0 votes)
24 views11 pages

Projects

The document outlines ten network simulation projects, each with specific objectives, theoretical concepts, practical setups, and expected outcomes. Projects include designing secure networks for smart offices, universities, e-commerce, and small businesses, utilizing various security protocols and routing configurations. Each project emphasizes the importance of VLANs, firewalls, and authentication methods to ensure secure and efficient network operations.

Uploaded by

M Mahtab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views11 pages

Projects

The document outlines ten network simulation projects, each with specific objectives, theoretical concepts, practical setups, and expected outcomes. Projects include designing secure networks for smart offices, universities, e-commerce, and small businesses, utilizing various security protocols and routing configurations. Each project emphasizes the importance of VLANs, firewalls, and authentication methods to ensure secure and efficient network operations.

Uploaded by

M Mahtab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

1.

Smart Office Network Simulation


2. Campus Network Infrastructure Design
3. E-commerce Data Center Simulation
4. Multi-Branch Network with Centralized Services
5. ISP-Style Residential Network Setup
6. Secure Research Lab Infrastructure
7. Enterprise IT Department Network
8. University Lab Simulation
9. Small Business Network with Centralized Management
10. Simulated Hosting Provider Infrastructure

Project 1: Smart Office Network Simulation


Objective:
Design and configure a secure smart office network with isolated
departments, central services, and wireless access. This project simulates a
real-world organizational structure where internal resources must be
segmented and protected. Different routers within the network may operate
using distinct routing protocols (e.g., RIP, OSPF) to simulate a heterogeneous
routing environment.
Theoretical Concepts:
 VLANs for traffic isolation
 Subnetting for structured IP management
 802.1X for LAN authentication
 Port security and MAC filtering for endpoint control
 NAT for secure outbound communication
 Stateful firewall with ACLs for service protection
 WPA2 encryption for wireless integrity
Practical Setup:
Bloc
Description Devices
k
A Admin Dept (802.1X-secured) 3 PCs
B HR Dept (VLAN 20, Port Security) 3 PCs
R&D Dept (VLAN 30, MAC
C 3 PCs
Filtering)
Server Room (DNS, Web, Mail, 3
D
Firewall) Servers
2
E Wi-Fi Zone (WPA2-Secured)
Laptops
Total Devices: 9 PCs, 2 Laptops, 2 Switches, 1 Router, 1 Wireless Router, 3
Servers, 1 ISP
Security Protocol Summary:
Sectio
Protocol Applied
n
802.1X
Admin
Authentication
HR Port Security
MAC Address
R&D
Filtering
Server Stateful Firewall +
s ACLs
Wi-Fi WPA2 with AES
Expected Outcomes:
 Secure wired and wireless connectivity
 Proper VLAN-based communication restriction
 Validated authentication for internal devices

Project 2: Campus Network Infrastructure Design


Objective:
Design a layered, multi-floor university building network. It must
accommodate department-wise VLANs, centralized data services, and secure
wireless access for students and staff. The routing configuration includes
different protocols at different router levels (e.g., OSPF on core router, RIP at
edge), demonstrating inter-protocol communication.
Theoretical Concepts:
 Multi-floor hierarchical network design
 Subnetting for efficient address distribution
 OSPF and RIP for dynamic inter-VLAN routing
 RADIUS for enterprise-grade wireless authentication
 Zone-Based Firewall (ZBF) for service protection
Practical Setup:
Bloc
Description Devices
k
Ground Floor (Static Port
A 5 PCs
Binding)
IT Dept (802.1X, VLAN
B 5 PCs
Trunking)
C Student Labs (MAC Filtering) 10 PCs
3
D Data Center (ZBF Protected)
Servers
Library Wi-Fi (WPA2 + 3
E
RADIUS) Laptops
Total Devices: 20 PCs, 3 Laptops, 3 Switches, 1 Router, 1 Wireless Router, 3
Servers, 1 ISP
Security Protocol Summary:
Section Protocol Applied
Admin
Static Port Binding
Floor
IT Dept 802.1X + VLAN Isolation
MAC Filtering + DHCP
Students
Snooping
Data
Zone-Based Firewall
Center
Wi-Fi WPA2 with RADIUS
Expected Outcomes:
 Floor-level VLANs with role-based access
 Dynamic routing for inter-VLAN communication
 Wireless access restricted to registered devices

Project 3: E-commerce Data Center Simulation


Objective:
Simulate a scalable e-commerce backend with secure departmental
operations and server protection.
Theoretical Concepts:
 VLANs for operational separation
 NAT/PAT for internal/external communication
 ACLs for user-based access control
 IDS/IPS for intrusion prevention
 WPA2-Enterprise for wireless security
Practical Setup:
Bloc
Description Devices
k
A Web Team (ARP Inspection) 3 PCs
B Admin Team (VLAN ACLs) 2 PCs
Support (DHCP Snooping + IP
C 3 PCs, 2 Laptops
Guard)
D Data Center (Firewall + IDS) DNS, Web, Mail
Servers
E Wi-Fi Zone (WPA2-Enterprise) 2 Laptops
Total Devices: 8 PCs, 4 Laptops, 2 Switches, 1 Router, 1 Wireless Router, 3
Servers, 1 ISP
Security Protocol Summary:
Sectio
Protocol Applied
n
Dynamic ARP
Web
Inspection
VLAN Access Control
Admin
Lists
Suppor DHCP Snooping + IP
t Guard
Server
IDS-integrated Firewall
s
Wi-Fi WPA2-Enterprise
Expected Outcomes:
 Operational isolation for web, admin, and support
 Secure server access with intrusion detection
 Role-based access and communication policies

Project 4: Multi-Branch Network with Centralized Services


Objective:
Connect multiple geographically distributed branches (e.g., Lahore,
Islamabad, Karachi) to a central headquarters using secure routing and
centralized IT services. Different routing protocols are employed between HQ
and each branch (e.g., RIP between Lahore and HQ, OSPF between Karachi
and HQ), demonstrating protocol compatibility.
Theoretical Concepts:
 RIP and OSPF for WAN routing
 VLAN segmentation per branch
 Static DHCP and MAC binding
 Centralized application firewall
 WPA2-PSK for site Wi-Fi
Practical Setup:
Bloc
Description Devices
k
A Lahore Branch (Private VLAN) 5 PCs
B Islamabad Branch (MAC 5 PCs
Binding)
C Karachi Branch (VLAN ACLs) 5 PCs
HQ Data Center (Firewall + 3
D
Servers) Servers
3
E Wi-Fi Zone (WPA2 PSK)
Laptops
Total Devices: 15 PCs, 3 Laptops, 3 Switches, 3 Routers, 1 Wireless Router,
3 Servers, 1 ISP
Security Protocol Summary:
Section Protocol Applied
Private VLAN + Port
Lahore
Security
Islamaba MAC Binding + Static
d DHCP
Karachi VLAN ACLs
HQ Application Layer Firewall
Servers (L7)
Wi-Fi WPA2 Pre-Shared Key
Expected Outcomes:
 Independent branch traffic via isolated VLANs
 Secure branch-to-HQ data access via RIP/OSPF
 HQ server zone protected by advanced firewall filtering
 Secure Wi-Fi access for mobile employees only
Project 5: ISP-Style Residential Network Setup
Objective:
Simulate a real-world ISP architecture serving residential users, providing
secure, isolated access to the internet. Routers in this network employ a mix
of protocols—static routes at the client edge, dynamic routing at the core
(e.g., BGP or OSPF).
Theoretical Concepts:
 VLANs for individual customers
 Static and BGP routing
 NAT and port translation
 IPsec VPN tunnels for monitoring
 MAC filtering + WPA2 for support devices
Practical Setup:
Bloc
Description Devices
k
A–F Customer VLANs (Isolated 12 PCs
Homes)
ISP Core (Firewall + VPN 2 Servers, 1
G
Router) Router
H Support Staff (WPA2 + ACL) 2 Laptops
Total Devices: 12 PCs, 2 Laptops, 1 Switch, 1 Router, 1 Wireless Router, 2
Servers, 1 ISP
Security Protocol Summary:
Section Protocol Applied
Customer
VLAN Isolation
s
Firewall + IPsec
ISP Core
Tunneling
WPA2 + MAC
Support
Whitelisting
Expected Outcomes:
 Clients cannot access each other’s networks
 ISP maintains centralized service control
 Remote support teams can only access specific blocks

Project 6: Secure Research Lab Infrastructure
Objective:
Build a secure, segmented research network ensuring strict access control
for researchers, students, and administrators. Research zones may use RIP,
while the admin zone router operates with OSPF, showcasing multi-protocol
coexistence.
Theoretical Concepts:
 VLAN segmentation and rate limiting
 MAC binding and SSH access control
 Firewall-based DMZ for server protection
 WPA2-AES for wireless protection
Practical Setup:
Bloc
Description Devices
k
Researchers (IP-MAC
A 5 PCs
Binding)
Students (Rate Limiting
B 5 PCs
VLAN)
C Admin (SSH Access Only) 2 PCs
D Server Room (DMZ 3
Firewall) Servers
Wi-Fi Zone (AES 2
E
Encryption) Laptops
Total Devices: 12 PCs, 2 Laptops, 2 Switches, 1 Router, 1 Wireless Router, 3
Servers, 1 ISP
Security Protocol Summary:
Section Protocol Applied
Researche
IP-MAC Binding
rs
VLAN + Rate
Students
Limiting
Admin SSH-Only Login
Servers DMZ + Firewall
Wi-Fi WPA2 with AES
Expected Outcomes:
 Students cannot access researcher data
 Admin tasks require secure login
 Wi-Fi access is strictly authenticated

Project 7: Enterprise IT Department Network


Objective:
Design a corporate-grade IT network supporting Helpdesk, Developers,
Admin, and Servers with strict monitoring and control. Multiple routing
protocols (e.g., OSPF and static) are configured across different router roles
to mimic enterprise-grade setups.
Theoretical Concepts:
 VLAN design per IT function
 ACLs on routed interfaces
 Host-based and edge firewalls
 DHCP snooping for endpoint validation
 WPA2-Enterprise for secure mobile access
Practical Setup:
Bloc
Description Devices
k
Helpdesk (DHCP Snooping +
A 4 PCs
Ports)
Developers (ACL-protected
B 5 PCs
VLAN)
C Admin (802.1X Authentication) 2 PCs
Server Room (Syslog + Host 3
D
Firewall) Servers
2
E Wi-Fi Zone (WPA2-Enterprise)
Laptops
Total Devices: 11 PCs, 2 Laptops, 2 Switches, 1 Router, 1 Wireless Router, 3
Servers, 1 ISP
Security Protocol Summary:
Section Protocol Applied
DHCP Snooping + Port
Helpdesk
Security
Develope
ACLs + VLAN Isolation
rs
Admin 802.1X Authentication
Host Firewall + Syslog
Servers
Logging
Wi-Fi WPA2-Enterprise
Expected Outcomes:
 Network enforcement of department policies
 Secure and isolated development/test areas
 Centralized monitoring and logging of access

Project 8: University Lab Simulation
Objective:
Simulate a full academic infrastructure across Networking Lab, AI Lab, and
Admin with secure student-access networks. The core router may run OSPF
while lab zones operate with RIP or static routing for teaching purposes.
Theoretical Concepts:
 VLANs and MAC filters for lab isolation
 Time-restricted access control
 Firewall ACLs for service usage
 WPA2 hidden SSID Wi-Fi configuration
Practical Setup:
Bloc
Description Devices
k
Networking Lab (VLAN + Port
A 5 PCs
Security)
5 PCs, 2
B AI Lab (Static IP + MAC Filtering)
Laptops
C Admin (SSH Access Control) 2 PCs
D Server Room (Time ACLs) 3 Servers
E Wi-Fi Zone (Hidden SSID WPA2) 2 Laptops
Total Devices: 12 PCs, 4 Laptops, 2 Switches, 1 Router, 1 Wireless Router, 3
Servers, 1 ISP
Security Protocol Summary:
Section Protocol Applied
Networkin
VLAN + Port Security
g
MAC Filtering + Static
AI Lab
IP
Admin SSH Restriction
Time-based Access
Servers
Control
Wi-Fi WPA2 + Hidden SSID
Expected Outcomes:
 Hands-on training for lab-specific routing setups
 Security through segmentation and limited access windows
 Secure Wi-Fi only accessible to authenticated clients

Project 9: Small Business Network with Centralized Management
Objective:
Build a secure network for a retail business involving Sales, Inventory, and
Finance with centralized service control. This network includes branch
routers using RIP, while the central office uses static or OSPF routing.
Theoretical Concepts:
 VLAN-based departmental segmentation
 VPN tunnel for sensitive finance traffic
 ACL-controlled access to shared servers
 Client isolation in Wi-Fi
Practical Setup:
Bloc
Description Devices
k
A Sales (Port Security + DHCP) 4 PCs
Inventory (VLAN + MAC
B 3 PCs
Filtering)
C Finance (VPN to Servers) 3 PCs
Server Room (App Whitelist + 3
D
ACLs) Servers
E Wi-Fi (Client Isolated WPA2) 2
Tablets
Total Devices: 10 PCs, 2 Tablets, 2 Switches, 1 Router, 1 Wireless Router, 3
Servers, 1 ISP
Security Protocol Summary:
Section Protocol Applied
DHCP Snooping + Port
Sales
Security
Invento MAC Filtering + VLAN
ry Isolation
Finance VPN Tunnel
ACLs + Whitelisted
Servers
Services
Wi-Fi WPA2 + Client Isolation
Expected Outcomes:
 Finance is shielded from rest of network
 Guest users have no access to business resources
 Inventory data is isolated from sales operations

Project 10: Simulated Hosting Provider Infrastructure


Objective:
Deploy a secure network for a web-hosting company offering DNS, mail, and
web services to multiple clients. Different routers handling client access and
core infrastructure run mixed protocols (e.g., EIGRP, static, or BGP), enabling
advanced routing demonstrations.
Theoretical Concepts:
 Private VLANs for multi-tenancy
 IDS/IPS + firewall integration
 Dynamic and static mixed routing
 Enterprise wireless configuration for IT staff
Practical Setup:
Bloc
Description Devices
k
A Client A (Private VLAN + ACLs) 2 PCs
Client B (MAC Binding + DHCP
B 2 PCs
Guard)
2
C Support Staff (Enterprise Wi-Fi)
Laptops
3
D Hosting Servers (Firewall + IDS)
Servers
Total Devices: 4 PCs, 2 Laptops, 2 Switches, 1 Router, 1 Wireless Router, 3
Servers, 1 ISP
Security Protocol Summary:
Sectio
Protocol Applied
n
Client
VLAN + ACLs
A
Client IP-MAC Binding + DHCP
B Guard
Suppor
WPA2-Enterprise
t
Server
IDS/IPS + L7 Firewall
s
Expected Outcomes:
 Each client accesses only their assigned service
 IDS detects service abuse or injection attempts
 Enterprise-grade wireless ensures only authorized IT staff connect

You might also like