0% found this document useful (0 votes)
1 views

3rd Year Networking Hackthon

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

3rd Year Networking Hackthon

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

3rd Year Networking Hackthon

10 Network Design Problem Statements using Cisco Packet Tracer:


1. Expanding Network: A small business with 20 employees is expanding to two
new locations. Design a secure and scalable network using Packet Tracer,
considering VLANs, intersite connectivity, and guest access.

2. Secure Hospital Network: Implement a secure network for a hospital with


different departments (administration, patient care, research) requiring varying
levels of access control and data protection. Utilize Packet Tracer to
demonstrate network segmentation and security protocols.

3. Wireless Campus Network: Design a wireless network for a college campus


with multiple buildings, ensuring seamless roaming, high bandwidth, and
secure access for students, faculty, and staff. Use Packet Tracer to configure
access points and optimize coverage.

4. SDWAN Implementation: A company with multiple branches desires improved


network performance and reliability. Design a softwaredefined WAN
(SDWAN) solution using Packet Tracer, considering cloud connectivity,
failover mechanisms, and traffic optimization.

5. IoT Network Integration: Integrate various IoT devices (sensors, cameras,


smart locks) into an existing network. Utilize Packet Tracer to design a secure
and manageable infrastructure, addressing device communication, data flow,
and potential security concerns.

6. Guest WiFi with Captive Portal: Design a guest WiFi network with a captive
portal for authentication and limited access. Use Packet Tracer to configure a
router, firewall, and landing page for guest users.
7. VPN Tunnel for Remote Access: Enable secure remote access for employees
working from home. Design a VPN tunnel using Packet Tracer, considering
encryption protocols, user authentication, and split tunneling options.

8. Network Troubleshooting: Simulate and troubleshoot common network issues


like connectivity problems, routing errors, and security vulnerabilities. Use
Packet Tracer to identify and resolve these issues using diagnostic tools and
configuration analysis.

9. IPv6 Migration Plan: Develop a plan for migrating an existing network from
IPv4 to IPv6. Use Packet Tracer to design a dualstack network and test IPv6
functionality while ensuring seamless transition.

10. Network Performance Optimization: Analyze and optimize network


performance for a specific application (e.g., video conferencing, VoIP calls).
Use Packet Tracer to measure metrics like latency, bandwidth utilization, and
jitter, and implement changes to improve performance.

Bonus: Design a secure network for a specific scenario based on your interests (e.g.,
smart home, gaming cafe, online store).

Explanation of each Problem Statement


1. Expanding Network:

Objective:
Design a network for a small business expanding to two new locations, emphasizing security,
scalability, and efficient intersite communication.

Requirements:
VLANs for departmental segmentation.
Secure intersite connectivity using OSPF.
Guest network with captive portal.
Scalable architecture for future growth.

Devices Used:
Routers for intersite connectivity.
Switches for VLAN segmentation.
Access Points for wireless connectivity.
Firewalls for security.

Protocols Used:
OSPF for dynamic routing.
VLANs for network segmentation.
WPA3 for wireless security.
Captive portal for guest authentication.

Testing:
Intersite communication.
VLAN functionality.
Guest network access.
Scalability of the network.

Outcomes and Learning:


A scalable and secure network that accommodates growth.
Enhanced understanding of VLANs, OSPF, and wireless security.

2. Secure Hospital Network:


Objective:
Implement a secure network for a hospital with departmental segmentation, access
controls, and encryption to protect sensitive data.

Requirements:
VLANs for different hospital departments.
Access controls using ACLs.
Port security on switches.
Firewalls for network security.
Encryption for sensitive data.

Devices Used:
Switches for VLANs and port security.
Routers for interdepartmental communication.
Firewalls for security measures.

Protocols Used:
ACLs for access control.
Encryption protocols for data protection.

Testing:
Departmental segregation.
Access control functionality.
Port security effectiveness.
Firewall and encryption testing.

Outcomes and Learning:


A secure hospital network with controlled access and data protection.
Improved understanding of ACLs, port security, and network encryption.
3. Wireless Campus Network:

Objective:
Design a wireless network for a college campus with seamless roaming, high bandwidth, and
secure access.

Requirements:
Wireless access points for coverage.
802.11k for seamless roaming.
WPA3 for secure wireless access.
Quality of Service (QoS) for bandwidth optimization.

Devices Used:
Wireless Access Points.
Switches for wired connectivity.
Routers for interbuilding communication.

Protocols Used:
802.11k for roaming.
WPA3 for wireless security.
QoS for bandwidth optimization.

Testing:
Seamless roaming between access points.
Wireless security.
Bandwidth optimization through QoS.

Outcomes and Learning:


A robust wireless network with seamless roaming and secure access.
Understanding of wireless protocols and QoS.

4. SDWAN Implementation:

Objective:
Implement a softwaredefined WAN (SDWAN) for a company with multiple branches,
focusing on cloud connectivity, failover, and traffic optimization.

Requirements:
SDWAN solution for branch connectivity.
Failover mechanisms for network reliability.
Quality of Service (QoS) for traffic optimization.

Devices Used:
SDWAN appliances.
Edge routers.
Switches for internal connectivity.

Protocols Used:
DMVPN for SDWAN.
BGP for dynamic routing.
QoS for traffic prioritization.

Testing:
Cloud connectivity.
Failover testing.
Traffic optimization using QoS.
Outcomes and Learning:
Improved network performance with reliable cloud connectivity.
Understanding of SDWAN, DMVPN, and BGP.

5. IoT Network Integration:

Objective:
Integrate IoT devices into an existing network, focusing on efficient communication, security,
and segmentation.

Requirements:
Network architecture for IoT devices.
Security protocols (e.g., TLS/SSL) for communication.
VLANs for device segmentation.

Devices Used:
IoT gateways.
Routers for interVLAN communication.
Switches for device connectivity.

Protocols Used:
MQTT or CoAP for IoT communication.
TLS/SSL for secure communication.

Testing:
IoT device communication.
Security measures.
VLAN segmentation for IoT devices.

Outcomes and Learning:


A secure and efficient network for IoT device integration.
Understanding of IoT communication protocols and security.

Certainly! Let's continue with the explanations for the remaining problem statements:

6. Guest WiFi with Captive Portal:

Objective:
Design a guest WiFi network with a captive portal for secure and controlled access.

Requirements:
Guest WiFi with a captive portal.
Authentication mechanisms for guest access.
Limited access for guests to specific resources.

Devices Used:
Wireless Access Points.
Routers for routing traffic.
Firewalls for access control.

Protocols Used:
Captive portal for guest authentication.
Firewall rules for access control.

Testing:
Guest WiFi connectivity.
Captive portal authentication.
Access restrictions for guest users.

Outcomes and Learning:


A secure guest WiFi network with controlled access.
Understanding of captive portal functionality and access control.

7. VPN Tunnel for Remote Access:

Objective:
Enable secure remote access for employees working from home through a VPN tunnel.

Requirements:
VPN tunnel for remote access.
Encryption protocols for secure communication.
Multifactor authentication for additional security.

Devices Used:
VPN concentrator.
Routers for VPN configuration.
Firewalls for security.

Protocols Used:
VPN protocols (e.g., IPsec) for secure communication.
Multifactor authentication protocols.

Testing:
Remote access through the VPN tunnel.
Security of VPN communication.
Multifactor authentication effectiveness.

Outcomes and Learning:


Secure remote access for employees.
Understanding of VPN configuration and multifactor authentication.

8. Network Troubleshooting:

Objective:
Simulate and troubleshoot common network issues, including connectivity problems,
routing errors, and security vulnerabilities.

Requirements:
Simulation of network issues.
Use of diagnostic tools for troubleshooting.
Identification and resolution of problems.

Devices Used:
Routers, switches, and firewalls for network components.
Diagnostic tools (e.g., ping, traceroute, Wireshark).

Protocols Used:
ICMP for testing connectivity.
Routing protocols for identifying routing errors.
Security protocols for detecting vulnerabilities.
Testing:
Simulated network issues.
Use of diagnostic tools for troubleshooting.
Resolution of connectivity problems.

Outcomes and Learning:


Improved troubleshooting skills.
Understanding of diagnostic tools and problem resolution.

9. IPv6 Migration Plan:

Objective:
Develop a plan for migrating an existing network from IPv4 to IPv6.

Requirements:
Dualstack configuration for coexistence of IPv4 and IPv6.
Testing of IPv6 functionality.
Seamless transition from IPv4 to IPv6.

Devices Used:
Routers for dualstack configuration.
Devices compatible with both IPv4 and IPv6.

Protocols Used:
IPv4 and IPv6 protocols for coexistence.
Testing protocols for functionality verification.
Testing:
IPv6 functionality testing.
Dualstack transition simulation.
Verification of coexistence.

Outcomes and Learning:


Successful migration plan from IPv4 to IPv6.
Understanding of dualstack configuration and IPv6 functionality.

10. Network Performance Optimization:

Objective:
Analyze and optimize network performance for a specific application (e.g., video
conferencing, VoIP calls).

Requirements:
Measurement of performance metrics (latency, bandwidth, jitter).
Implementation of changes to improve performance.

Devices Used:
Routers, switches, and other network components.
QoS configurations for traffic prioritization.

Protocols Used:
QoS protocols for traffic prioritization.
Bandwidth monitoring protocols.

Testing:
Baseline performance measurement.
Implementation of changes for optimization.
Verification of improved performance.

Outcomes and Learning:


Optimized network performance for a specific application.
Understanding of QoS and bandwidth optimization.

You might also like