3rd Year Networking Hackthon
3rd Year Networking Hackthon
6. Guest WiFi with Captive Portal: Design a guest WiFi network with a captive
portal for authentication and limited access. Use Packet Tracer to configure a
router, firewall, and landing page for guest users.
7. VPN Tunnel for Remote Access: Enable secure remote access for employees
working from home. Design a VPN tunnel using Packet Tracer, considering
encryption protocols, user authentication, and split tunneling options.
9. IPv6 Migration Plan: Develop a plan for migrating an existing network from
IPv4 to IPv6. Use Packet Tracer to design a dualstack network and test IPv6
functionality while ensuring seamless transition.
Bonus: Design a secure network for a specific scenario based on your interests (e.g.,
smart home, gaming cafe, online store).
Objective:
Design a network for a small business expanding to two new locations, emphasizing security,
scalability, and efficient intersite communication.
Requirements:
VLANs for departmental segmentation.
Secure intersite connectivity using OSPF.
Guest network with captive portal.
Scalable architecture for future growth.
Devices Used:
Routers for intersite connectivity.
Switches for VLAN segmentation.
Access Points for wireless connectivity.
Firewalls for security.
Protocols Used:
OSPF for dynamic routing.
VLANs for network segmentation.
WPA3 for wireless security.
Captive portal for guest authentication.
Testing:
Intersite communication.
VLAN functionality.
Guest network access.
Scalability of the network.
Requirements:
VLANs for different hospital departments.
Access controls using ACLs.
Port security on switches.
Firewalls for network security.
Encryption for sensitive data.
Devices Used:
Switches for VLANs and port security.
Routers for interdepartmental communication.
Firewalls for security measures.
Protocols Used:
ACLs for access control.
Encryption protocols for data protection.
Testing:
Departmental segregation.
Access control functionality.
Port security effectiveness.
Firewall and encryption testing.
Objective:
Design a wireless network for a college campus with seamless roaming, high bandwidth, and
secure access.
Requirements:
Wireless access points for coverage.
802.11k for seamless roaming.
WPA3 for secure wireless access.
Quality of Service (QoS) for bandwidth optimization.
Devices Used:
Wireless Access Points.
Switches for wired connectivity.
Routers for interbuilding communication.
Protocols Used:
802.11k for roaming.
WPA3 for wireless security.
QoS for bandwidth optimization.
Testing:
Seamless roaming between access points.
Wireless security.
Bandwidth optimization through QoS.
4. SDWAN Implementation:
Objective:
Implement a softwaredefined WAN (SDWAN) for a company with multiple branches,
focusing on cloud connectivity, failover, and traffic optimization.
Requirements:
SDWAN solution for branch connectivity.
Failover mechanisms for network reliability.
Quality of Service (QoS) for traffic optimization.
Devices Used:
SDWAN appliances.
Edge routers.
Switches for internal connectivity.
Protocols Used:
DMVPN for SDWAN.
BGP for dynamic routing.
QoS for traffic prioritization.
Testing:
Cloud connectivity.
Failover testing.
Traffic optimization using QoS.
Outcomes and Learning:
Improved network performance with reliable cloud connectivity.
Understanding of SDWAN, DMVPN, and BGP.
Objective:
Integrate IoT devices into an existing network, focusing on efficient communication, security,
and segmentation.
Requirements:
Network architecture for IoT devices.
Security protocols (e.g., TLS/SSL) for communication.
VLANs for device segmentation.
Devices Used:
IoT gateways.
Routers for interVLAN communication.
Switches for device connectivity.
Protocols Used:
MQTT or CoAP for IoT communication.
TLS/SSL for secure communication.
Testing:
IoT device communication.
Security measures.
VLAN segmentation for IoT devices.
Certainly! Let's continue with the explanations for the remaining problem statements:
Objective:
Design a guest WiFi network with a captive portal for secure and controlled access.
Requirements:
Guest WiFi with a captive portal.
Authentication mechanisms for guest access.
Limited access for guests to specific resources.
Devices Used:
Wireless Access Points.
Routers for routing traffic.
Firewalls for access control.
Protocols Used:
Captive portal for guest authentication.
Firewall rules for access control.
Testing:
Guest WiFi connectivity.
Captive portal authentication.
Access restrictions for guest users.
Objective:
Enable secure remote access for employees working from home through a VPN tunnel.
Requirements:
VPN tunnel for remote access.
Encryption protocols for secure communication.
Multifactor authentication for additional security.
Devices Used:
VPN concentrator.
Routers for VPN configuration.
Firewalls for security.
Protocols Used:
VPN protocols (e.g., IPsec) for secure communication.
Multifactor authentication protocols.
Testing:
Remote access through the VPN tunnel.
Security of VPN communication.
Multifactor authentication effectiveness.
8. Network Troubleshooting:
Objective:
Simulate and troubleshoot common network issues, including connectivity problems,
routing errors, and security vulnerabilities.
Requirements:
Simulation of network issues.
Use of diagnostic tools for troubleshooting.
Identification and resolution of problems.
Devices Used:
Routers, switches, and firewalls for network components.
Diagnostic tools (e.g., ping, traceroute, Wireshark).
Protocols Used:
ICMP for testing connectivity.
Routing protocols for identifying routing errors.
Security protocols for detecting vulnerabilities.
Testing:
Simulated network issues.
Use of diagnostic tools for troubleshooting.
Resolution of connectivity problems.
Objective:
Develop a plan for migrating an existing network from IPv4 to IPv6.
Requirements:
Dualstack configuration for coexistence of IPv4 and IPv6.
Testing of IPv6 functionality.
Seamless transition from IPv4 to IPv6.
Devices Used:
Routers for dualstack configuration.
Devices compatible with both IPv4 and IPv6.
Protocols Used:
IPv4 and IPv6 protocols for coexistence.
Testing protocols for functionality verification.
Testing:
IPv6 functionality testing.
Dualstack transition simulation.
Verification of coexistence.
Objective:
Analyze and optimize network performance for a specific application (e.g., video
conferencing, VoIP calls).
Requirements:
Measurement of performance metrics (latency, bandwidth, jitter).
Implementation of changes to improve performance.
Devices Used:
Routers, switches, and other network components.
QoS configurations for traffic prioritization.
Protocols Used:
QoS protocols for traffic prioritization.
Bandwidth monitoring protocols.
Testing:
Baseline performance measurement.
Implementation of changes for optimization.
Verification of improved performance.