A modular, fully equipped training workbench combining server-based networking, routing & switching, wireless LAN setup, and cybersecurity practice. It includes DHCP/FTP/DNS configuration, VLAN and CLI training, protocol analysis, and protection mechanisms—providing a complete solution to teach network infrastructure and internet security skills in one integrated system.
Modular Workbench
Compute Server for DHCP, FTP and DNS
Router & Layer 2 Switch
Wireless Access Point
LAN Training System with Protocol Analyser and Simulation Software
Network and Internet Security Training Software
LAN Tool Kit
STAR, BUS and RING Topology
Network Protection and Troubleshooting
CLI and Web Managed Configuration of a Switch & Router
Configuring a WAP and Wireless LAN
VLAN Set-up
Protocols selection
i) Stop and Wait
ii) Go back to n
iii) Selective repeat
iv) Sliding window
v) Token ring
vi) Token Bus
vii) CSMA / CD
viii) CSMA / CA
Workbench:
The Training System and Network Devices are aesthetically embedded on the Network Rack and Workbench. It has a power indicator & ON/OFF Control and Circuit Breaker of rating 3Amp with ON/OFF Control along with over load protection. Access door provided for equipment removal and maintenance.
The Workbench is supplied with a 1KVA UPS/Inverter to cater for all equipment on board the workbench.
Computer Server - 1 No
Serverprovides is designed to run on-premises and hybrid cloud solutions, deliveringenterprise-class performance, security, reliability, and expandability
Processor: Intel Xeon E-2224 (4-Core, 3.4 GHz, 71W)
Number of Processors: One
Memory: 8 GB UDIMM DDR4 (1x 8 GB) or better
Network Controller Embedded: 1GB 2-Port 361i Ethernet Adapter
Storage Controller Embedded: S100: SW RAID with 4 SATA ports
Internal Storage: 4 LFF HDD Bays — 1TB SATA
PCI-Express Slots: 1 PCle 3.0 slots
Power Supply (1) External Power Supply
Industry Standard Compliance:
AdvancedEncryption Standard (AES),
Active Directory v1.0
WindowsServer Essential- 25 User License
Monitor, Keyboard, Mouse supplied with the Server.
Client Workstation — 3 Nos (OPTIONAL)
Router - 1 No
Aggregate Throughput: 35 Mbps or better
Total onboard WAN or LAN 10/100/1000 ports: 2 Nos
RJ-45-based ports: 2 Nos
Default memory double-data-rate 3 (DDR3) error -
Correction-code (ECC) DRAM: 4 GB
Default flash memory 8 GB
Serial console port - RJ45 (up to 115.2 kbps): 1
Protocols: IPv4, IPv6, static routes, Routing Information
Protocol Versions 1 and 2 (RIP and RIPv2), Open Shortest
Path First (OSPF), Enhanced Interior Gateway Routing
Protocol (EIGRP), Border Gateway Protocol (BGP), BGP
Router Reflector, Intermediate System-to Intermediate
System (IS-IS), Multicast Internet Group
Management Protocol Version 3 (IGMPv3), Protocol
Independent
Multicast sparse mode (PIM SM), PIM Source-Specific
Multicast (SSM), Resource Reservation Protocol (RSVP) etc
Managed Layers 2 SWITCH - 2 No.
Processor and Memory:
Processor: 800 MHz, 512 MB SDRAM, 256 MB flash; packet
Buffer: 1.5 MB
IEEE 802.1Q VLAN support
Support for up to 256 VLANs with a VLAN ID range of 2-4093
IEEE 802.1X access control
Authentication of network users on a per port basis prior to permitting network access.
Port authentication includes assigned VLAN, Spanning Tree
Protocol (STP)
Supports standard IEEE 802.1D STP, IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) for faster convergence, and IEEE 802.1s Multiple Spanning Tree Protocol (MSTP on local web).
IGMP snooping v1/v2
Improves network performance through multicast filtering, instead of flooding traffic onall ports.
Address Resolution Protocol (ARP)
The ARP table displays all of the IP addresses that have been resolved to MAC addresses, either dynamically or through static entry configuration.
Wireless Access Point - 1 No
5GHz 802.1 1ac and 2.4 GHz 802.11n 300 Mbps max rate)
Radios, dual-band antennas, 10/100/1000BASE-T Ethernet network interfaces (RJ-45)- 4 LAN port and 1 WAN Port
Trainer Boards consisting of
LAN Training System - 01
Hardware Topology
i) Star
ii) Bus
iii) Ring
Nodes : 4 Nodes
Data Rate : 10/100 Mbps
Interconnection :RJ45 connection cable to connect hardware to computer LAN card
Software Topology selection
i) Star
ii) Bus
iii) Ring
Protocols selection
(i) Stop and Wait
(ii) Go back to n
(iii) Selective repeat
(iv)Sliding window
(v) Token Ring
(vi) Token Bus
(vii) CSMA/ CD
(viii) CSMA/CA
Packet Size: 128, 256, 512, 1024, 2048, 4096, 8192,16384
Inter packet delay: 1000, 2000, 3000, 4000, 5000ms
Error generation: Bad packet, acknowledgment lost and auto error generation
Encryption and decryption of data
Network details: Indication of computer name, IP address, Port number, status of network, MAC address and operating system on computer.
Graphical representation: Graphic representation of Data on software screen with differentiation of packet to be transmitted, packet being transmitted, packet transmitted with acknowledgment, packet with acknowledgment lost error, packet with bad packet error and packet which is discarded or resend.
Measurement and plotting: Error rate calculation, Throughput calculation Protocol analysis: Indication of packet serial number file name, file size, file number, receiver name, workgroup, receiver IP address, current packet, total packets, packet length, delay, protocol, topology, receiver MAC address, port number, packet send time, acknowledgment receive time, inter packet delay, data rate (Mbps), number of resend packets, acknowledgment value.
Network analysis: Indication of packet serial number, file name, file size, file number, receiver name, work group, receiver IP address, total packets, packet length, time out, protocol, topology, receiver MAC address, port number, file send start time, file sent completion time, transmission time, data rate (MBPS),error.
Data Communication Training System
128 X 64 Graphics LCD display.
Memory-Flash 2MX16 Parallel,
Micro SD Card, Ethernet Port: 10/100 Ethernet RMIl
Interface, Interface Port - USB.
On- Board |2C, SPI and CAN Bus.
Facility for programming of Drivers for USB and Ethernet Port in Bare Metal level.
i) Real Time Network Protocol Analyser Software -1 User
The Protocol Analyser Software should be able to Capture live packet data from a network interface.
Facility to Open files containing packet data captured with many other packet capture programs.
Facility to Import packets from text files containing hex dumps of packet data.
Facility to Display packets with very detailed protocol information.
Facility to Save packet data captured.
Facility to Export some or all packets in a number of capture file formats.
Facility to Filter packets before and after capture of data using Capture Filter and Display Filter like Ethernet broadcast, No ARP,|pv4 ,TCP only, UDP only, HTTP, non HTTP etc.
Facility to create various statistics like Captured File
Properties, Protocol Hierarchy, Packet Length,
I/O Graphs etc.
NOTE: Due to constant upgradation in the networking products the specification mentioned are subjectedto change to meet our curriculum needs.
Computer Network and Internet Security Training System is a Modular Workbench and supplied as a Set with all the following Hardware and Software components.
The Objective of the System is to teach the following Curriculum:
a) Data Communication Components: Initialization, Configuration and Data Transferusing Serial, USB and Ethernet Ports
b) Typesof Networks: Network Media-UTP Cables and wiring scheme, Topologies- Star,Bus & Ring Topology,
c) Server: Client and Server Roles, Peer to Peer Network, Install and Configure WindowsServer, Install and configure Active Directory, Implementing AD Services,Configuring a Server as a Web and FTP Server, Mail Box , DHCP and DNS Services
d) NetworkDevices: Command line Interface & Web Managed Configuration of Switch,Configuring a WAP & Wireless LAN, Out of band and In band Management.
e) NetworkSwitching and Routing: Study of OSI Layer (Physical, Data Link, Network& Transport Layer), Address Routing Protocol (ARP), IP Addressing technique(IP4/IP6) and Subnetting, Installation and Configuration of TCP/IP ProtocolUtilities: PING, IPCONFIG, HOSTNAME, ROUTE, TRACERT etc. Packet Switching,Setup and configure a Virtual LAN , Spanning Tree Protocol, Command LineInterface and IP Routing, Network Protocols, Network Simulation Tools.
f) Protocols: i) Stop and Wait ii) Go back to n iii) Selectiverepeat iv) Sliding window v) Token Ring vi) Token Busvii) CSMA / CD viii) CSMA / CA, Real Time Protocol Analysis – TCP/IPand UDP
COMPUTER HARDWARE
To study different parts of Computer Hardware.
To introduce the switch faults in differentsections of Computer Hardware and study its effect.
SERVER
Computer Server with Windows Server Operating System
Install and Configure Windows Server
Install and configure Active Directory, Implementing AD Services
Configuring a Server as a Web and FTP Server
Configuring a Server as Mailbox
Configuring a Server for DHCP
Installation and Configuring DNS Services
LOCAL AREA NETWORK AND PROTOCOLS
Study of Ethernet LAN and Wireless LAN
Study of data encryption and decryption
Implementation and study of stop and wait protocol
Implementation and study of go back to n protocol
Implementation and study of selective repeat protocol
Studyof token ring and token bus protocol
Studyof sliding window protocol
Studyof CSMA / CA protocol
Studyof CSMA / CD protocol
Measure of throughput and the effect of bit errors on various protocols
Socket programming
NETWORK SWITCHING AND ROUTING
Study of OSI Layer ( Physical , Data Link ,Network &Transport Layer )
IP Addressing technique (IP4/IP6) and Subnetting
Installation and Configuration of TCP/IP Protocol Utilities : PING, IPCONFIG, HOSTNAME,ROUTE, TRACERT etc.
Setup and configure a Virtual LAN
Spanning Tree Protocolo Command Line Interface and IP Routing process
Windows Networking commands
Basic Concepts of Routing
Remote configuration and management enabling configuration and management through a secure Web browser or a CLI located on a remote device
Command authorization :Leverages HWTACACS to link a custom list of CLI commands to an individual network administrator’s login; also provides an audit trail
Address Resolution Protocol (ARP): Determining the MAC address of another IP host inthe same subnet; support static ARPs; gratuitous ARP allows detection of duplicate IP addresses; proxy ARP allows normal ARP operation between subnets or when subnets are separated by a Layer 2 network.
Configurethe Switch Management Interface.
Establish an out of band connection and In band connection.
INTERNET SECURITY
Simulation techniques
HTTP technique
Brute force algorithm
View/add/edit/update contents
Login history
FTP technique
Brute force algorithm
Upload/download files
Phishing technique
Compose mail/inbox
Spyware technique
Bruteforce algorithm
Upload/download spyware
Virus technique
Upload/download e-mail virus
