SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Networking and Security Projects for Students



100 + Project ideas on Networking and Security
The EBook contains 100 + project ideas with titles and abstracts on networking
and security for students. The abstract contains details on the project title. The
project titles are developed based on areas in networking like network security,
network testing, network design and configuration, networking tool development,
protocol analysis and CCNA concepts.
Title: Study on Rip v1 and Rip v2 protocol

Abstract:

The project does a study on Rip v1 and Rip v2 protocol. The configuration methods of
the protocols on Cisco routers are analyzed. The insecurity of Rip v1 and how it is
improved by Rip v2 is documented. The configuration required on Cisco routers to block
RIP updates on specific interfaces is documented.

Title: Study on access control lists

Abstract:

The project does a study on different types of access control lists like standard and
extended access control lists and understands the configuration required on Cisco routers.
The differences and similarities in the configuration and design is understood. The
project also performs a detailed analysis of the differences in inbound and outbound
access control lists and how packets are handled when they are configured.

Title: Layer 2 loop prevention with Spanning Tree protocol

Abstract:

The project understands the anatomy of a layer 2 loops and why ethernet frame design is
vulnerable to looping. The internal design of the spanning tree protocol is researched and
how it is used for preventing layer 2 loops is understood.

Title: Access restriction between vlans

Abstract:

The project understands how access control lists can be used to restrict access between
computers connected to different vlans. Intervlan communication is setup on a router
using router on a stick configuration. The computers are configured with IP addresses
belonging to different network addresses and mapped with the corresponding vlans.
Title: VLAN design for organization

Abstract:

The project understands how vlans can be used to create different departments. Every
department is mapped with a unique vlan. The computers belonging to the vlans
(departments) are configured with IP addresses belong to different network addresses.
Intervlan routing configuration is identified for access between departments.

Title: Protecting Web servers from spoofed static source IP.

Abstract:

An organization has setup a Web server behind a Cisco router. It is been observed that
the web server is being attacked from a private ip address of 192.168.2.3 from the
internet. The appropriate configuration on the router with ACL which would block access
from the specific IP address to the web server is identified.

Title: Access restriction to FTP server

Abstract:

In an organization, there are two networks, 192.168.1.0/24 and 192.168.2.0/24.
Appropriate configuration on the router is setup for communication between the
networks. A FTP server is setup on the 192.168.1.0/24 network. It is required that
computers on the 192.168.2.0/24 network should be able to access only the FTP service
on the FTP server and all other traffic should be blocked. The project aims to identify the
necessary ACL configuration required to be setup on the router is identified.

Title: Internet access restriction for a network

Abstract:

A perimeter router of an organization has three interfaces. One of the interfaces is
connected to the internet. The other two interfaces are connected to the networks
192.168.1.0/24 and 192.168.2.0/24. It is required that computers on the 192.168.1.0/24
network should not have access to the internet, but have access to the 192.168.2.0/24
network. The project understands the necessary ACL configuration which needs to be
configured on the router for achieving the solution.
Title: Controlling broadcasts with VLAN

Abstract:

The project aims to understands how broadcasting causes traffic congestion in a switched
network. The fundamental concepts of VLAN are understood and how VLANS can be
used on a switch to create different broadcast domains to control broadcast traffic is
understood.

Title: RFC 1918 compliance for perimeter routers

Abstract:

RFC 1918 states the IP addresses which are allowed for use on private networks. These
IP addresses are not allowed to be used on the internet. Perimeter routers should not
allow incoming packets from the internet with the IP addresses mentioned in the RFC.
The project understands the appropriate ACL rules which need to be configured for
achieving the solution. (http://www.rfc-editor.org/rfc/rfc1918.txt )

Title: STP Vulnerabilities, attacks and mitigation

Abstract:

The projects understand the internal architecture of STP packets and the fields inside it.
The mechanism which attackers use to exploit the vulnerabilities in the STP packets is
understood. The project understand the different features available on Cisco switches like
BPDU-Root guard, Root guard , Loop guard along with appropriate configurations.

Title: Internet sharing for LAN computers

Abstract:

An organization is using a Cisco router as the internet router. The WAN interface of the
router is connected to the internet and the LAN interface is connected to a switch to
which the LAN computers are connected. There are 30 computers on the LAN which
belong to the network address of 192.168.1.0/24. The project is to design the strategy and
configuration which is required on the router to share the internet with the 30 users
Features like default route, port address translation is explored for the purpose.
Buy the Ebook , which has 100 + project titles and abstracts .

No of Pages - 32

Price : $9.99

Click on the link below to buy and download with PayPal.


http://www.e-junkie.com/211191/product/485057.php

Weitere ähnliche Inhalte

Mehr von tcpipguru

Python programming course
Python programming coursePython programming course
Python programming coursetcpipguru
 
Network testing course
Network testing courseNetwork testing course
Network testing coursetcpipguru
 
Ccna topology based projects
Ccna topology based projectsCcna topology based projects
Ccna topology based projectstcpipguru
 
Network security projects
Network security projectsNetwork security projects
Network security projectstcpipguru
 
How to configure Standard ACL for an ip address
How to configure Standard ACL for an ip addressHow to configure Standard ACL for an ip address
How to configure Standard ACL for an ip addresstcpipguru
 
How to configure Standard ACL for a network
How to configure Standard ACL  for a networkHow to configure Standard ACL  for a network
How to configure Standard ACL for a networktcpipguru
 
Cisco Router Terms
Cisco Router TermsCisco Router Terms
Cisco Router Termstcpipguru
 
How to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco routerHow to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco routertcpipguru
 
How to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcpHow to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcptcpipguru
 
How to configure Extended acl for an ip address
How to configure Extended acl for an ip addressHow to configure Extended acl for an ip address
How to configure Extended acl for an ip addresstcpipguru
 
How to configure Extended acl for a network
How to configure Extended acl for a networkHow to configure Extended acl for a network
How to configure Extended acl for a networktcpipguru
 
How to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco routerHow to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco routertcpipguru
 
How to configure Dynamic nat
How to configure Dynamic natHow to configure Dynamic nat
How to configure Dynamic nattcpipguru
 
How to configure DHCP Server
How to configure DHCP Server How to configure DHCP Server
How to configure DHCP Server tcpipguru
 
How to configure Default Routing
How to configure Default RoutingHow to configure Default Routing
How to configure Default Routingtcpipguru
 
How to configure SSH on Cisco switch
How to configure SSH on Cisco switchHow to configure SSH on Cisco switch
How to configure SSH on Cisco switchtcpipguru
 
Configuring ssh on switch
Configuring ssh on switchConfiguring ssh on switch
Configuring ssh on switchtcpipguru
 
How to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switchHow to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switchtcpipguru
 
How to Configure ip address for router interfaces
How to Configure ip address for router interfacesHow to Configure ip address for router interfaces
How to Configure ip address for router interfacestcpipguru
 
How to create Security on Cisco switch
How to create Security on Cisco switchHow to create Security on Cisco switch
How to create Security on Cisco switchtcpipguru
 

Mehr von tcpipguru (20)

Python programming course
Python programming coursePython programming course
Python programming course
 
Network testing course
Network testing courseNetwork testing course
Network testing course
 
Ccna topology based projects
Ccna topology based projectsCcna topology based projects
Ccna topology based projects
 
Network security projects
Network security projectsNetwork security projects
Network security projects
 
How to configure Standard ACL for an ip address
How to configure Standard ACL for an ip addressHow to configure Standard ACL for an ip address
How to configure Standard ACL for an ip address
 
How to configure Standard ACL for a network
How to configure Standard ACL  for a networkHow to configure Standard ACL  for a network
How to configure Standard ACL for a network
 
Cisco Router Terms
Cisco Router TermsCisco Router Terms
Cisco Router Terms
 
How to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco routerHow to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco router
 
How to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcpHow to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcp
 
How to configure Extended acl for an ip address
How to configure Extended acl for an ip addressHow to configure Extended acl for an ip address
How to configure Extended acl for an ip address
 
How to configure Extended acl for a network
How to configure Extended acl for a networkHow to configure Extended acl for a network
How to configure Extended acl for a network
 
How to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco routerHow to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco router
 
How to configure Dynamic nat
How to configure Dynamic natHow to configure Dynamic nat
How to configure Dynamic nat
 
How to configure DHCP Server
How to configure DHCP Server How to configure DHCP Server
How to configure DHCP Server
 
How to configure Default Routing
How to configure Default RoutingHow to configure Default Routing
How to configure Default Routing
 
How to configure SSH on Cisco switch
How to configure SSH on Cisco switchHow to configure SSH on Cisco switch
How to configure SSH on Cisco switch
 
Configuring ssh on switch
Configuring ssh on switchConfiguring ssh on switch
Configuring ssh on switch
 
How to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switchHow to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switch
 
How to Configure ip address for router interfaces
How to Configure ip address for router interfacesHow to Configure ip address for router interfaces
How to Configure ip address for router interfaces
 
How to create Security on Cisco switch
How to create Security on Cisco switchHow to create Security on Cisco switch
How to create Security on Cisco switch
 

Kürzlich hochgeladen

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 

Kürzlich hochgeladen (20)

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 

Networking and security projects for students preview

  • 1. Networking and Security Projects for Students 100 + Project ideas on Networking and Security
  • 2. The EBook contains 100 + project ideas with titles and abstracts on networking and security for students. The abstract contains details on the project title. The project titles are developed based on areas in networking like network security, network testing, network design and configuration, networking tool development, protocol analysis and CCNA concepts.
  • 3. Title: Study on Rip v1 and Rip v2 protocol Abstract: The project does a study on Rip v1 and Rip v2 protocol. The configuration methods of the protocols on Cisco routers are analyzed. The insecurity of Rip v1 and how it is improved by Rip v2 is documented. The configuration required on Cisco routers to block RIP updates on specific interfaces is documented. Title: Study on access control lists Abstract: The project does a study on different types of access control lists like standard and extended access control lists and understands the configuration required on Cisco routers. The differences and similarities in the configuration and design is understood. The project also performs a detailed analysis of the differences in inbound and outbound access control lists and how packets are handled when they are configured. Title: Layer 2 loop prevention with Spanning Tree protocol Abstract: The project understands the anatomy of a layer 2 loops and why ethernet frame design is vulnerable to looping. The internal design of the spanning tree protocol is researched and how it is used for preventing layer 2 loops is understood. Title: Access restriction between vlans Abstract: The project understands how access control lists can be used to restrict access between computers connected to different vlans. Intervlan communication is setup on a router using router on a stick configuration. The computers are configured with IP addresses belonging to different network addresses and mapped with the corresponding vlans.
  • 4. Title: VLAN design for organization Abstract: The project understands how vlans can be used to create different departments. Every department is mapped with a unique vlan. The computers belonging to the vlans (departments) are configured with IP addresses belong to different network addresses. Intervlan routing configuration is identified for access between departments. Title: Protecting Web servers from spoofed static source IP. Abstract: An organization has setup a Web server behind a Cisco router. It is been observed that the web server is being attacked from a private ip address of 192.168.2.3 from the internet. The appropriate configuration on the router with ACL which would block access from the specific IP address to the web server is identified. Title: Access restriction to FTP server Abstract: In an organization, there are two networks, 192.168.1.0/24 and 192.168.2.0/24. Appropriate configuration on the router is setup for communication between the networks. A FTP server is setup on the 192.168.1.0/24 network. It is required that computers on the 192.168.2.0/24 network should be able to access only the FTP service on the FTP server and all other traffic should be blocked. The project aims to identify the necessary ACL configuration required to be setup on the router is identified. Title: Internet access restriction for a network Abstract: A perimeter router of an organization has three interfaces. One of the interfaces is connected to the internet. The other two interfaces are connected to the networks 192.168.1.0/24 and 192.168.2.0/24. It is required that computers on the 192.168.1.0/24 network should not have access to the internet, but have access to the 192.168.2.0/24 network. The project understands the necessary ACL configuration which needs to be configured on the router for achieving the solution.
  • 5. Title: Controlling broadcasts with VLAN Abstract: The project aims to understands how broadcasting causes traffic congestion in a switched network. The fundamental concepts of VLAN are understood and how VLANS can be used on a switch to create different broadcast domains to control broadcast traffic is understood. Title: RFC 1918 compliance for perimeter routers Abstract: RFC 1918 states the IP addresses which are allowed for use on private networks. These IP addresses are not allowed to be used on the internet. Perimeter routers should not allow incoming packets from the internet with the IP addresses mentioned in the RFC. The project understands the appropriate ACL rules which need to be configured for achieving the solution. (http://www.rfc-editor.org/rfc/rfc1918.txt ) Title: STP Vulnerabilities, attacks and mitigation Abstract: The projects understand the internal architecture of STP packets and the fields inside it. The mechanism which attackers use to exploit the vulnerabilities in the STP packets is understood. The project understand the different features available on Cisco switches like BPDU-Root guard, Root guard , Loop guard along with appropriate configurations. Title: Internet sharing for LAN computers Abstract: An organization is using a Cisco router as the internet router. The WAN interface of the router is connected to the internet and the LAN interface is connected to a switch to which the LAN computers are connected. There are 30 computers on the LAN which belong to the network address of 192.168.1.0/24. The project is to design the strategy and configuration which is required on the router to share the internet with the 30 users Features like default route, port address translation is explored for the purpose.
  • 6. Buy the Ebook , which has 100 + project titles and abstracts . No of Pages - 32 Price : $9.99 Click on the link below to buy and download with PayPal. http://www.e-junkie.com/211191/product/485057.php