2. The EBook contains 100 + project ideas with titles and abstracts on networking
and security for students. The abstract contains details on the project title. The
project titles are developed based on areas in networking like network security,
network testing, network design and configuration, networking tool development,
protocol analysis and CCNA concepts.
3. Title: Study on Rip v1 and Rip v2 protocol
Abstract:
The project does a study on Rip v1 and Rip v2 protocol. The configuration methods of
the protocols on Cisco routers are analyzed. The insecurity of Rip v1 and how it is
improved by Rip v2 is documented. The configuration required on Cisco routers to block
RIP updates on specific interfaces is documented.
Title: Study on access control lists
Abstract:
The project does a study on different types of access control lists like standard and
extended access control lists and understands the configuration required on Cisco routers.
The differences and similarities in the configuration and design is understood. The
project also performs a detailed analysis of the differences in inbound and outbound
access control lists and how packets are handled when they are configured.
Title: Layer 2 loop prevention with Spanning Tree protocol
Abstract:
The project understands the anatomy of a layer 2 loops and why ethernet frame design is
vulnerable to looping. The internal design of the spanning tree protocol is researched and
how it is used for preventing layer 2 loops is understood.
Title: Access restriction between vlans
Abstract:
The project understands how access control lists can be used to restrict access between
computers connected to different vlans. Intervlan communication is setup on a router
using router on a stick configuration. The computers are configured with IP addresses
belonging to different network addresses and mapped with the corresponding vlans.
4. Title: VLAN design for organization
Abstract:
The project understands how vlans can be used to create different departments. Every
department is mapped with a unique vlan. The computers belonging to the vlans
(departments) are configured with IP addresses belong to different network addresses.
Intervlan routing configuration is identified for access between departments.
Title: Protecting Web servers from spoofed static source IP.
Abstract:
An organization has setup a Web server behind a Cisco router. It is been observed that
the web server is being attacked from a private ip address of 192.168.2.3 from the
internet. The appropriate configuration on the router with ACL which would block access
from the specific IP address to the web server is identified.
Title: Access restriction to FTP server
Abstract:
In an organization, there are two networks, 192.168.1.0/24 and 192.168.2.0/24.
Appropriate configuration on the router is setup for communication between the
networks. A FTP server is setup on the 192.168.1.0/24 network. It is required that
computers on the 192.168.2.0/24 network should be able to access only the FTP service
on the FTP server and all other traffic should be blocked. The project aims to identify the
necessary ACL configuration required to be setup on the router is identified.
Title: Internet access restriction for a network
Abstract:
A perimeter router of an organization has three interfaces. One of the interfaces is
connected to the internet. The other two interfaces are connected to the networks
192.168.1.0/24 and 192.168.2.0/24. It is required that computers on the 192.168.1.0/24
network should not have access to the internet, but have access to the 192.168.2.0/24
network. The project understands the necessary ACL configuration which needs to be
configured on the router for achieving the solution.
5. Title: Controlling broadcasts with VLAN
Abstract:
The project aims to understands how broadcasting causes traffic congestion in a switched
network. The fundamental concepts of VLAN are understood and how VLANS can be
used on a switch to create different broadcast domains to control broadcast traffic is
understood.
Title: RFC 1918 compliance for perimeter routers
Abstract:
RFC 1918 states the IP addresses which are allowed for use on private networks. These
IP addresses are not allowed to be used on the internet. Perimeter routers should not
allow incoming packets from the internet with the IP addresses mentioned in the RFC.
The project understands the appropriate ACL rules which need to be configured for
achieving the solution. (http://www.rfc-editor.org/rfc/rfc1918.txt )
Title: STP Vulnerabilities, attacks and mitigation
Abstract:
The projects understand the internal architecture of STP packets and the fields inside it.
The mechanism which attackers use to exploit the vulnerabilities in the STP packets is
understood. The project understand the different features available on Cisco switches like
BPDU-Root guard, Root guard , Loop guard along with appropriate configurations.
Title: Internet sharing for LAN computers
Abstract:
An organization is using a Cisco router as the internet router. The WAN interface of the
router is connected to the internet and the LAN interface is connected to a switch to
which the LAN computers are connected. There are 30 computers on the LAN which
belong to the network address of 192.168.1.0/24. The project is to design the strategy and
configuration which is required on the router to share the internet with the 30 users
Features like default route, port address translation is explored for the purpose.
6. Buy the Ebook , which has 100 + project titles and abstracts .
No of Pages - 32
Price : $9.99
Click on the link below to buy and download with PayPal.
http://www.e-junkie.com/211191/product/485057.php