Objective: The goal of this activity is to give participants a hands-on experience in planning, designing, configuring, and securing a computer network for a small office. This activity combines both technical network configuration and a simulated role-play to allow participants to better understand the decision-making process and the importance of each step in the network design and implementation.
Physical Setup:
Computers or laptops (to be used as workstations, servers, or network devices)
A network switch, router, or wireless access point
Ethernet cables
Network simulation software (e.g., Cisco Packet Tracer, GNS3, or similar)
A projector or whiteboard (for role-play and group discussion)
Sticky notes, pens, and paper for planning and role-playing
Router (for hands-on configuration) or router simulation software
Network Configuration Setup:
Static IP addressing scheme
A secure wireless network (with WPA3 or WPA2 encryption)
DHCP (Dynamic Host Configuration Protocol) setup for automatic IP addressing
Firewall settings
Step 1: Scenario Introduction and Role Play (Planning Phase)
Scenario Overview:
Imagine you’ve been hired as a network administrator for a small office with 15 employees. The office needs a secure and efficient network for daily work activities such as file sharing, internet access, and printer sharing. The office also requires a Wi-Fi network for laptops and mobile devices.
Role Play:
Divide the group into teams, with each team taking on the following roles:
Team 1: IT Network Designers
Team 2: IT Security Specialists
Team 3: System Administrators
Each team will be responsible for the following tasks:
Network Designers: Determine the network topology, the number of devices, and the hardware needed (routers, switches, wireless access points).
Security Specialists: Identify security protocols, configure firewalls, and select secure wireless encryption methods.
System Administrators: Manage the configuration of IP addresses, file sharing, and network printer setup.
Planning:
As a team, discuss and design a suitable network for the office, considering:
The types of devices needed (desktops, printers, laptops, etc.).
Wired vs. wireless network setup.
The number of users and IP addressing scheme.
Security measures (e.g., firewalls, VPNs, strong Wi-Fi encryption).
Prepare a network diagram on paper or using network diagram software, and ensure that all devices are properly connected.
Deliverable:
Each team must submit their planning document, including network design diagrams and a list of hardware and software components.
Step 2: Network Configuration (Hands-on Configuration)
Router and Switch Setup:
Using physical devices or a network simulation tool, each team will set up their network based on the design.
Configure the Router: Set up the router for internet access and internal network communication.
Switch Configuration: Connect the switch to allow communication between wired devices.
Wireless Setup: Configure a wireless access point with WPA3 security and set up a unique SSID for the office.
IP Addressing:
Teams will configure the IP addresses for each device, either statically or dynamically using DHCP.
Static IP: Assign specific IP addresses for critical devices (e.g., printers, servers).
Dynamic IP (DHCP): Set up DHCP for employee computers and mobile devices to automatically receive an IP address.
Security Configuration:
Firewall Configuration: Set up a firewall to block unauthorized access.
Wi-Fi Encryption: Apply WPA3 or WPA2 encryption to the wireless network.
User Permissions: Set up secure file-sharing permissions and access control for network resources.
Deliverable:
A fully configured and secure network, with each device connected and communicating properly.
Step 3: Testing and Troubleshooting (Hands-on Testing)
Network Connectivity Testing:
Test the connectivity between devices on the network:
Use the ping command to check the connection between devices.
Test file sharing and printer access.
Verify internet access from multiple devices.
Security Testing:
Perform basic security testing:
Check if unauthorized devices can access the network.
Attempt to connect to the Wi-Fi using an incorrect password.
Verify that firewall rules are preventing unwanted access.
Troubleshooting:
If any issues arise (e.g., device not connecting, slow network speeds), troubleshoot the problems by checking the cables, settings, IP configuration, or security settings.
Deliverable:
A troubleshooting log, documenting any problems encountered and how they were resolved.
Step 4: Reflection and Reporting (Role Play Conclusion)
Team Presentations:
Each team presents their configuration process, decisions made, and security measures implemented.
Discuss how the network can be scaled in the future as the company grows (additional devices, more complex security, etc.).
Reflection Discussion:
Reflect on the importance of planning and the configuration process. Discuss challenges faced during the network setup, configuration, and security implementation.
Deliverable:
A final report summarizing the planning, configuration, security measures, and troubleshooting steps, along with a reflection on the entire process.