Projects

Network Projects

Enterprise Network Design using IP Subnetting

Project Scope

An enterprise has a main branch which is located in United States and 4 branches located at different locations across the World. Each location has 80 users each. The main location has a server which has is required to be accessed by all users in the other locations. The network 172.16.0.0/16 is to be subnetted for the required number of networks and used in the network design.

Network requirements

1. Network Design strategy
2. TCP/IP Subnetted networks for each location
3. TCP/IP addresses table for main and branch location with details of IP addresses, subnet masks and default gateway for PC’s, Routers.
4. TCP/IP addresses for router interfaces.
5. Hardware (Routers, Switches ) with quantity (Cisco)
6. Topology Diagram with IP address.

Buy the report for the solution

Report Contents

1. Project Scope
2. Network requirements
3. Network Design strategy
4. Hardware quantity analysis (Main and branch locations)
5. TCP/IP Subnet Design
6. TCP/IP Design and Table for Main Location (LAN, WAN)
7. TCP/IP Design and Table for all branch locations (LAN, WAN)
8. Topology diagram with IP addressing.

Report format – PDF

Pages – 9

Price – $25

Buy and Download with PayPal or credit card on PayPal website using the Add to Cart button

Add to Cart

The report would be downloaded automatically and you would also receive the download link in the email used for payment.

—————————————————————————————————————–

Best Sellers and Latest Reports – Click here

—————————————————————————————————————–

Custom Report – Click here


Flooding attack detection using anomaly techniques with wireshark

Project Scope

Flooding is a type of attack, in which the attacker sends numerous floods of packets to the victim or associated service in an attempt to bring down the system. There are different types of flooding attacks like ping flood, Syn floods, UDP floods etc. The project simulates a ping flood scenario, by using the ping command on the operating system and wireshark is installed and setup on the victim, which would be used to analyse the number of ping packets received during a specified duration with reference to a threshold, based on which a flooding attack is detected.

Hardware & Software

Operating Systems (2 nos, Windows or Linux, (Windows 7, XP used in lab)
Switch (1 nos)
Wireshark (Free Download)

Report Contents

1. Project Scope
2. Hardware & Software
3. Understanding Flooding attacks
4. Ping flood simulation
5. Anomaly detection
6. Anomaly detection with wireshark
7. Lab Setup and Topology
8. Normal ping traffic generation
9. Ping flood generation
10.Conclusion

Report format – PDF

Pages – 11

Price – $20

Buy and Download with PayPal or credit card on PayPal website using the Add to Cart button

Add to Cart

The report would be downloaded automatically and you would also receive the download link in the email used for payment.

—————————————————————————————————————–

Best Sellers and Latest Reports – Click here

—————————————————————————————————————–

Custom Report – Click here


Brute force attack detection using wireshark

Project Scope

Brute force attacks are used for detecting login credentials using random combinations of username and passwords. The project demonstrates a technique by which brute force attacks on FTP servers can be detected using Wireshark Analysis.

Hardware and Software

1. Ubuntu or Windows (2 nos)
2. Switch
3. Wireshark.

Report Contents

1. Project Scope
2. Lab components
3. Lab setup
4. FTP Analysis after incorrect password
5. Wireshark Analysis of FTP with incorrect password
6. Brute force detection technique
7. Using wireshark filter for brute force detection

Report Format – PPT

No of Slides – 12

Price – $16

Buy and Download with PayPal or credit card on PayPal website using the Add to Cart button

Add to Cart

The report would be downloaded automatically and you would also receive the download link in the email used for payment.

—————————————————————————————————————–

Best Sellers and Latest Reports – Click Here

—————————————————————————————————————–


WAN Optimization design for enterprise

Project Scope

A WAN network has to be designed for an organization which has a main branch and remote branch. There are 100 users in the main branch and 50 users in the remote branch. The main branch has an application server which should be accessible by the users in the remote branch. The WAN link has to be optimized such that only the traffic to the application server should be allowed on it.

Network requirements

1.TCP/IP Design for the LAN networks at both the locations.
2.TCP/IP table with IP address details.
3.Network topology diagram with IP address.
4.WAN Network design for both the locations.
5.Allow only traffic to the application server over the WAN link. All other traffic should be denied for performance.
6.Hardware with quantity list.
7.Testing and verification of the design

Buy the report for the solution

Report Contents (What is included in the report)

1. Project Scope
2. Network requirements
3. Network requirement analysis
4. TCP/IP Network design
5. TCP/IP address table
6. Network Topology diagram
7. Router configuration (Main and branch office, access control lists, Static route)
8. Verification and Testing (Ping between systems and servers on different locations)

Report format – PDF

Pages – 8

Price – $25

Buy and Download with PayPal or credit card on PayPal website using the Add to Cart button

Add to Cart

The report would be downloaded automatically and you would also receive the download link in the email used for payment.

—————————————————————————————————————–

Best Sellers and Latest Reports – Click Here

—————————————————————————————————————–