NETWORK SECURITY This case study should provide the specific actions you can take to improve the security of your network. Before going into specifics, however, you should understand the following basic concepts that are essential to any security system: Know your enemy This case study refers to attackers or intruders. Consider who might want to circumvent your security measures and identify their motivations. Determine what they might want to do and the damage that they could cause to your network. Security measures can never make it impossible for a user…

Read More



DIAL ON DEMAND ROUTING This case study should describe the use of DDR to connect a worldwide network that consists of a central site located in Mumbai and remote sites located in Chennai, Bangalore, and Hyderabad. The following scenarios should be considered: Having the Central Site Dial Out Describe the central and remote site configurations for three setups: a central site with one interface per remote site, a single interface for multiple remote sites, and multiple interfaces for multiple remote sites. Include examples of the usage of rotary groups and…

Read More


RIP AND OSPF Redistribution

RIP AND OSPF Redistribution This case study addresses the issue of integrating Routing Information Protocol (RIP) networks with Open Shortest Path First (OSPF) networks. Most OSPF networks also use RIP to communicate with hosts or to communicate with portions of the inter-network that do not use OSPF. This case study should provide examples of how to complete the following phases in redistributing information between RIP and OSPF networks, including the following topics: Configuring a RIP Network Adding OSPF to the Center of a RIP Network Adding OSPF Areas Setting Up…

Read More

1.3 Analyzing the performance of various configurations and protocols


1.3 Analyzing the performance of various configurations and protocols Original TCP versus the above modified one: To compare the performance between the operation of TCP with congestion control and the operation of TCP as implemented. The main objective is for students to examine how TCP responds to a congested network. The concepts involved in the lab include network congestion and the host responsibilities for communicating over a network. This lab requires three PC’s connected to a switch. One PC is designated as the target host and the other two PC’s…

Read More

1.1. Establishing a Local Area Network (LAN)

1.1. Establishing a Local Area Network (LAN) The main objective is to set up a Local Area Network, concepts involved in this network are IP addressing and the Address Resolution Protocol (ARP). The required equipment’s are,,, Host A Host B Host C, Switch/HUB, three PC`s equipped with at least one NIC, one HUB or Switch and the necessary cables. Once the physical LAN is set up the hosts need to be configured using the ifconfig command. To verify communication among the machines the ping command is used.…

Read More

1.2. Connecting two LANs using multi-router topology with static routes

1.2. Connecting two LANs using multi-router topology with static routes The main objective is to extend routing connection by using multiple routers. The concepts include IP addressing and basic network routing principles. Connect two LANs topology. During router configuration attention is paid to the types of interfaces as additional issues are involved with set-up. For example, the serial interfaces require clocking mechanisms to be set correctly. Once the interfaces are working the ping command is used to check for communication between LANs. The failure of communication illustrates the need for…

Read More