Student Projects 2018 2019
Student Projects 2018 2019
Student Projects 2018 2019
Student Projects
1. Description
The experience of setting up a small network teaches a person a lot about basic networking
technologies. Beginner level projects include bringing together different types of equipment and
evaluating the configuration settings each one offers and how easy or difficult it is to get
particular types of connections working. Student projects may involve the planning for large
computer networks such as those used by schools, businesses, ISP and data centers. Network
capacity planning includes estimation of equipment costs, layout decisions and consideration of
the software and services the network can support. A project can also involve studying the design
of existing networks and identifying ways to improve them. The objective of the computer and
data communication networks projects is to fully prepare students to be able to set up or maintain
networks using current and emerging networking technologies.
Note: Each group has to work on one project and will submit a report of 10 maximum
number of pages. In addition, you will prepare a presentation for 15 minutes (10 minutes
presentation and 5 minutes for questions). Deadline: 22 January 2019.
a) Project scope
The project aims to design and implement security on a data center. The data center has three
servers, each of which host different services. The services on each of the servers are DNS, FTP,
HTTPs. Each of the servers has unique IP address. There are also two network administrators
who manage and troubleshoot any issues on the server.
b) Requirements
3) the servers should also have private IP address by which the admins access through
remote site
4) only the required services should be available on the servers for external access. All other
services should be blocked
5) the private IP address of the servers should not be accessible from the outside network all
communication to the outside network from the server network should be through the
respective public IP address
6) external users should be unable to access the LAN network the implementation can be
performed using Cisco IOS firewall router and switches
c) Report Contents
6) Router configuration (Interface , NAT, ACL-ACL rule to allow only respective services,
ACL rule to deny access to private IP address of servers and LAN network.)
a)Project Scope
An enterprise has a main branch which is located in Rwanda and 4 branches located at different
locations across the World. Each location has 80 users each. The main location has a server
which has is required to be accessed by all users in the other locations. The network
172.16.0.0/16 is to be subnetted for the required number of networks and used in the network
design.
b) Requirements
3) TCP/IP addresses table for main and branch location with details of IP addresses, subnet
masks and default gateway for PC’s, Routers.
c) Report Contents
6) TCP/IP Design and Table for all branch locations (LAN, WAN)
8) Expected budget
a) Project Scope
A WAN network has to be designed for an organization which has a main branch and remote
branch. There are 100 users in the main branch and 50 users in the remote branch. The main
branch has an application server which should be accessible by the users in the remote branch.
The WAN link has to be optimized such that only the traffic to the application server should be
allowed on it.
b) Requirements
5) Allow only traffic to the application server over the WAN link. All other traffic should be
denied for performance.
c) Report Contents
1) Project Scope
6) Router configuration (Main and branch office, access control lists, Static route)
7) Verification and Testing (Ping between systems and servers on different locations)
8) Expected budget
a) Description:
Assume that you are a network administrator for a certain business company, e.g., a bank. The
main branch of the company is located in Kigali with five sub-branches: Huye, Rubavu,
Musanze, Rusizi, and Nyagatare. The management of the company wishes to expand the existing
network to Kampala and Nairobi. Your line manager requests to design this expansion by using
VPN technology (A VPN network design proposal for an organization with different branches).
The main office has an Email server and File server. Your design proposal will describe why
VLANs are used, how to design a VLAN infrastructure for an organization with necessary
switches and routers, security attacks based on VLANs and features on the platforms which
would mitigate these attacks.
b) Requirement
1) All the three offices should be interconnected with each other using VPN technology
2) The users at all the location should be able to access the email and file servers
3) Users at all the locations should have access to internet, and should not be routed through
the VPN network.
7) Identify the methodology to route internet traffic separately and not through the tunnel.
c) Report contents
1) Project scope
2) Description
3) Network requirement
6) System integration plan and TCP/IP network design for LAN users
8) VLAN based attacks. different types of attacks, how it is performed and mitigation
techniques
9) Estimated budget
Project V: A VoIP Network Design Proposal with security requirements
a) Description:
Rwanda National Police (RNP) wishes to interconnect the head office and all district police
stations. As a team, you are asked to design such a network. The management of RNP
recommends to use a VoIP communication system. The purpose is to describe the architecture
and implementation of Internet telephony systems over an existing data network infrastructure. It
works with the traditional telephone networks via a PSTN/IP gateway. Also, it will be
implemented as a corporate or campus infrastructure for existing and future services like web,
email, video and streaming media. You will also discuss common inter-operability problems
between the PBX and the gateway.
b) Requirement
2) The users at all the location should be able to access the email and file servers
3) Users at all the locations should have access to internet, and access security should be
guaranteed
7) Identify the methodology to route internet traffic using VoIP technology and its protocols
stack over IP network
c) Report contents
2) Network requirement
5) System integration plan and TCP/IP network design for LAN users
6) End-to-end connection
a) Description
An enterprise network has to be integrated with IP CCTV’s. The network has 4 floors. Each of
the floors has approx 40 users. There are a total of 4 number of 48 port switches at each floor.
The computers of the users receive IP address through a DHCP server, which is setup on the
broadband ADSL router from the 192.168.1.0/24 network. After requirement analysis, it has been
analyzed that 3 CCTV’s has to be setup at each of the floors.
c) Report contents
1) Project scope
2) Network requirement and infrastructure analysis
3) Network infrastructure diagram
4) IP address identification procedure
5) IP address design for CCTV
6) Procedure for CCTV Remote access from central PC procedure
7) Procedure for Remote access of CCTV’s from the internet
8) Network Topology diagram of remote access from internet
9) IP address to name mapping table.
10) Mechanism to access CCTV’s using names.
11) Recommended CCTV Models
12) System performance: KPI
13) Estimated budget
The project is to design a proposal for setting up a network in an airport. The airport has three
departments:
1. Airport authority
2. Flight service providers
3. Guests.
The airport authority maintains a server which handles the flight management controls. The
flight service providers should have access only to the specific server in the airport authority
network and not to any other systems. The guest users should have wireless access to a high
speed internet connection, which should be shared among all the users in all the departments.
The wireless access should be using a common password. The guest users should not have access
to the other two departments. The users should obtain IP addresses automatically. The airport
authority has 20 users, the flight service providers have 40 users and the maximum numbers of
guests are estimated to be 100.
b) Network requirement
1) The active networking components (Routers, switches, wireless access points etc) with
quantity.
2) The IP network design for each department
3) Creating and mapping IP networks with VLANs.
4) Analysis, identification and explanation of methodologies to use for access restriction and
internet sharing
5) Dynamic IP addressing design for all the networks
6) Identify the configuration and features, wherever appropriate, which is required on the
active components to setup the network
7) Network topology diagram.
c) Report contents
1) Project scope
2) Networking Requirement
3) Network Design strategy
4) VLAN and IP Network Design
5) Requirement analysis of active networking components (Routers, switches, access points,
DHCP Server)
6) Network implementation plan
7) Network Topology Diagram
8) Network Configuration and guidelines
9) Switch configuration (VLAN, Trunking)
10) Router configuration (VLAN sub interface, Access lists)
11) DHCP configuration (Scope creation with screen shot)
12) Access point, server configuration guidelines
13) Hardware inventory list.
14) System performance: KPI
15) Estimated budget
a) Description
A wireless network has to be designed at home with remote access from office. There are 5 users
at home. Three users have a desktop and the two users have a laptop each. A high speed cable
internet connection is available at home. A serial port printer is available for printing.
b) Network requirement
c) Report contents
1) Project Scope
2) Network requirement
3) Hardware requirement analysis
4) Network topology diagram
5) Network Implementation plan (Features and services, IP Network Design, TCP/IP
Configuration on clients)
6) Requirement analysis and solutions (All 6 requirements stated above)
7) Recommended products.
8) System performance: KPI
9) Estimated budget
a) Description
A campus network design for a college. There are 100 users in the college: 30 users in the main
building, 30 users in building1, and 40 users in building 2. Every building has a lobby which is
18.56 square meter open space, where wireless access to the network is required. Only
authorized personal should have access to the wireless network. The distance between building1
and the main building is 300 meters. The distance between building 2 and the main building is 90
meters. The distance between building 1 and building 2 is 70 meters. A high speed cable internet
connection is available in the main building which needs to be shared among the users.
The necessary equipments and appropriate topology required for the campus network design
along with the IP address schema, IP address management, secure wireless access, internet
sharing, features and services should be worked out. A bill of material should be included with
products from Microsoft, Cisco, D-LINK or Netgear with appropriate quantity which can be
used for setting up of the campus infrastructure.
b) Report contnents
1) Project scope
2) Campus diagram
3) Network requirement analysis (Understanding the hardware and quantity required to
setup the network)
4) Network diagram with appropriate components (Includes the make and model number of
required hardware)
5) Network and system integration methodology
6) IP network design guidelines (Guidelines for IP address management and usage on the
network)
7) Features and Services ( The services and features required to be setup and configured on
the identified hardware for the solution to work)
8) Bill of material (Includes equipment, model and quantity)
a) Description
A small business network has to be designed for an organization. The organization has
occasional guest users (Max 10) visiting the office. There are a total of 50 users in the
organization. A file transfer protocol (FTP) server is also available for sharing files.
b) Requirements
c) Report contents
1) Project Scope
2) Network requirement
3) Network planning
4) IP Network design table
5) Network Topology diagram with IP addresses
6) Network Integration plan
7) Network configuration (Router interface and ACL configuration with explanation)
8) Network Testing and verification procedure
9) List of Hardware and Software
10) Estimated budget