Design and Simulation VLAN Using Cisco Packet Tracer: A Case Study
Design and Simulation VLAN Using Cisco Packet Tracer: A Case Study
Design and Simulation VLAN Using Cisco Packet Tracer: A Case Study
net/publication/324311605
Design and Simulation VLAN Using Cisco Packet Tracer: A Case Study
CITATION READS
1 23,656
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Johanes Andry on 31 August 2018.
Abstract.This
This paper relates the part of a cisco packet tracer for a case study to design and simulation virtual local area
network. In this case study was carried out aimed at implemen
implementing the method LAN-Switching
Switching using VLAN to break up
broadcast domains into segments, so as to improve network performance. It additionally makes educating simpler,
understudies and instructor can make their own particular situation based labs also, gives genuine reproduced and
representation environment cisco packet tracer has part of components to make different situation based labs. The
discoveries of this study reason that there are different advantages and focal points of utilizing a cisco packet tracer
trace as a
part of learning fundamental and critical ideas of configuration and reproduction virtual local area network. It is a simple
and easy to use device to comprehend different ideas of computer networks.
Keywords.Design,
Design, simulation, virtual local area network, VLAN, LAN-Switching,
Switching, cisco packet tracer, a case study,
computer networks.
INTRODUCTION
Network designs, encompasses all areas of human enterprise. We find networks in the home, marketplace,
offices and schools making it possible for resources to be shared in a consolidated platform. Networking plays a
critical role in business performance of any organization. Efficiency and communication is guaranteed in a well-
well
designed network (Kelechi et al., 2014). The network based on TCP/IP protocol permits the efficient routing of data
packets based on their IP address. Routers are used in the network to control and forward data (Nazumudeen and
Mahendran, 2014).
Most of the Organizations such as public and private sectors have started deploying computers to their
employees to perform their daily work and access resources from their network. This technology has enabled to
operate their businesses much faster and more conveniently and also make easy for the organization; there are some
problems still faced by thehe organization such as poor network design (Kelechi et al., 2014). CISCO’s VLAN
trunking protocol reduces administration in a switched network (Verna, 2013). VLAN is one of the security
mechanisms that can solve the authentication problem. VLANs also offer offe r network operators flexibility for
specifying management and security policies within an enterprise and allow operators to implement some level of
isolation by separating hosts into different broadcast domains (Ameen and Nourildean, 2013). VLANs can help
reduce network traffic by forming multiple broadcast domains, to break up a large network into smaller independent
segments with fewer broadcasts being sent to every device on the overall network (Tambe, 2015). 2015) This paper
indicates to redesign Local Area Network
etwork by using VLAN and ACL solution (Shaffi and AlAl-Obaidy, 2012).
TEORITICAL BACKGROUND
Vlan Networking
What happens if we need a virtual connection between two stations belonging to two different physical LANs? A
virtual local area network (VLAN) is de
defined
fined as a local area network configured by software, not by physical wiring.
66
Proceeding
Virtual LANs (VLANs) have recently developed into an integral feature of switched LAN solutions from every
major LAN equipment vendor (Pal and Pal, 2013).2013) In networking, a LAN hass a single broadcast domain and the
traffic from a workstation reaches other workstations on the LAN through the broadcast. This is not desirable as
certain classified information can be received by unauthorized parties. Also, if the broadcast is not well contained, it
can lead to collision in the network (Alimi and Mufutau, 2015).
Virtual LAN technology is used in the design of internal networks of universities, organizations and enterprise
networks. VLAN is a data link layer technology for building multiple
multip le logical networks on the top of physical
network. The LAN network is divided into different logical segments called broadcast domains. The workstation
division is based on the functions, platforms and teams (Suji and Sekar, 2015).. Virtual LAN is nothing but a group
of devices that are connected virtually but may or may not physically connected (Thivikram, 2016).Virtual
2016) LAN or
VLAN allows network engineers and network administrators to make logical network from physical network. This
technology is used to segment a complex network into smaller networks for better manageability, improved
performance and security (Shaffi and Al-Obaidy,
Al 2012).
Routing
The term routing is used for taking a packet from one device and sending it through the network to another
device on a different network. Routers don’t really care about hosts they
the y only care about networks and the best path
to each network (Sharma and Padda, 2012).2012). Routing on IPv6 can be done through the use of static routes and
dynamic routing protocols. Static routes are manually defined by the administrator so the router learns about a
remote network, are usually used when the routing is from a network to a single connection network; a single
connection network is a network accessible by only one route (Rosado et al., 2012).
A Routing Protocol is a protocol that specifies how routers communicate with each other, disseminating
information that enables them to select routes between any two nodes on a computer network. Routing algorithms
are responsible for selecting the best path for the communication a border way we can say that A routing protocol is
the language a router speaks with other routers in order to share information about the reach ability and status of
network. Routing is often contrasted with bridging (Archana, 2015).
RESEARCH METHOD
Starting of this research is to conduct
conduct data collection, using observation techniques, to inventories existing
network equipment and computer hardware devices and software tools are used. The next step is to interview
relevant parties, in this case is a computer lab coordinator who is dir
directly
ectly responsible for the conditions that exist in
the computer lab. After getting all the information about the devices used and the activities running on a research,
further research from the literature to study the problems faced in order to identify th thee problem as a whole. The
proposed development method will design into a new network topology that uses an application Cisco Packet Tracer
network simulation. The design of this new network solution that emphasizes efficiency, because the devices will
stilll be used, without having to replace the whole. The next step is a simulation of the new network to test if the
method proposed development has been solving the problems that exist in the computer lab. Evaluation of the
67
Proceeding
Implementation VLAN
The “FIGURE 1.” Existing Design of Network Topology indicates the existing organization infrastructure and
“TABLE 1.”” List Devices and Allocate IP Address.
68
Proceeding
Server = 192.168.1.1
Router0 = 192.168.2.1(0/0) - 192.168.1.20 (0/1)
Router1 = Router2 = 192.168.3.1(0/0) - 192.168.1.1 (0/1)
PC0 = 192.168.1.2, PC1 = 192.168.1.3
PC2 = 192.168.1.4, PC3 = 192.168.1.5
PC4 = 192.168.1.6, PC5 = 192.168.1.7
PC6 = 192.168.1.8, PC7 = 192.168.1.9
PC8 = 192.168.1.10, PC9 = 192.168.1.11
Many experiment on all PCs, servers and routers, it was found that the results of all PCs, servers and routers are
Request Time Out (RTO), this indicates that the existing network topology in the organization as in show in
“FIGURE 1.” Design Network Topology already setting IP address, cannot be connected. Already done the
experiment several times, by changing the IP address, but tthe
he result is the RTO which means it can be connected on
the network topology. Therefore, the author planned the topology to replace those that are running.
69
Proceeding
Switch>enable
Switch#vlan database
Switch(vlan)#vlan 20 name staff
Switch(vlan)#vlan 30 name management
Switch(vlan)#exit
Switch#sh vlan
After setting dan write sh vlan, and show windows like this:
70
Proceeding
Testing Functionality
Network simulation proposed recommendation of Topology will be made using Cisco Packet Tracer application
and process simulation represents all components of the existing. Process simulations to be carried on are: Test the
broadcast packets that will be sent to prove the performance of the network and o test the security of servers from
outsiders (un trust zone) to prove the level of network security.
71
View publication stats
Proceeding
CONCLUSIONS
Based on the currently of the network as show in Figure 5, VLAN cannot and fulfilled connected because it does
not run at layer 3 (router) but runs on layer 2 (switch).
This paper is more helpful to the organization for the effective implements of VLAN and an to enhance network
security by keeping devices that operates with sensitive information on a separate VLAN. Implementation of VLAN
that brings the features of Inter-VLAN
VLAN and Access Control List (ACL), the level of network security in the Lab
increased. Inter-VLAN
VLAN can connected different network segments or VLAN to meet the demand for access to
VLAN Server. It is expected that this new network topology can be implemented to optimize network resources that
have applied the method but the LAN LAN-Switching network rk devices that use the device still manageable. The key
element to the InterVLAN routing service is that you must have at least one VLAN interface configured with an IP
Address on the InterVLAN capable switch.
REFERENCES
24. E. Kelechi, N. Stanley and N. Uchenna, “Evaluation of Network Architecture and Its Implication on
Connectivity and Data Security,” International Journal on Recent and Innovation Trends in Computing and
Communication, vol. 2, Issue. 12, pp. 3945
3945-3950, 2014.
25. N. Nazumudeen and C. Mahendran, “Performance Analysis of Dynamic Routing Protocols Using Packet
Tracer,” International Journal of Innovative Research in Science, Engineering and Technology, vol. 3, Special
Issue 1, pp. 570-574, 2014.
26. A. S. Shaffi and M. Al-Obaidy,
Obaidy, “Effective Implementation of VLAN and ACL in Local Area Network,”
International Journal of Information Technology and Business Management, vol. 4, no. 1, pp. 46 46-52, 2012.
27. R. O. Verma, “Effective Remote Management for Inter Inter-VLAN
VLAN Routing Networks,”
Networks International Journal of
Application or Innovation in Engineering & Management, Special Issue for National Conference On Recent
Advances in Technology and Management for Integrated Growth, 2013.
28. S. Y. Ameen and S.W. Nourildean, “Wireless Local Area Netw Network
ork VLAN Investigation and Enhancement
Using Routing Algorithms,” International Journal of Engineering and Advanced Technology, vol. 3, Issue 2,
pp. 260-263, 2013.
29. S. S. Tambe, “Understanding Virtual Local Area Networks,” International Journal of Engineering
Engineeri Trends and
Technology, vol. 25, no. 4, pp. 174
174-176, 2015.
30. G. P. Pal and S. Pal, “Virtual Local Area Network (VLAN),” International Journal of Scientific Research
Engineering & Technology,” vol. 1, Issue10, pp. 006006-010, 2013.
31. I. A. Alimi and A. O. Mufuta
Mufutau,
u, “Enhancement of Network Performance of an Enterprises Network with
VLAN, “American Journal of Mobile Systems, Applications and Services, vol. 1, no. 2, pp. 82 82-93, 2015.
32. S.V. Suji and G.Sekar, “Design and Implementation of Secured HSRP Protocol using VLAN,” VLA International
Journal of Digital Communication and Networks, vol. 2, Issue 1, pp. 9-11,
9 2015.
33. G. Thrivikram, “Implementation of Virtual LAN (VLAN) using Layer3 Switches,” International Journal of
Advance Research in Computer Science and Management Studies, vol. 4, Issue 3, pp. 114-120,
114 2016.
34. S. R. Javid, “Role of Packet Tracer in learning Computer Networks,” International Journal of Advanced
Research in Computer and Communication Engineering,” vol. 3, Issue 5, pp. 6508 6508- 6511, 2014.
35. K.Dangwal and V.. Kumar, “Comparative Study of EIGRP and RIP Using Cisco Packet Tracer,” International
Journal of Engineering Sciences & Emerging Technologies, vol. 6, Issue 6, pp. 475-475 480, 2014.
36. E. A. Sharma and E. S. Padda, “Configuring an EIGRP based Routing Model,” International In Journal of
Scientific and Research Publications, vol. 2, Issue 2, pp. 11-4, 2012.
37. L.V. Rosado, L. N. Díaz, C. G. Segura and V. C. Pech, “Design and Simulation of an IPv6 Network Using
Two Transition Mechanisms,” International Journal of Computer
Compute r Science Issues, vol. 9, Issue 6, no. 1, pp. 60-
60
65, 2012.
38. C. Archana, “Analysis of RIPv2, OSPF, EIGRP Configuration on router Using CISCO Packet tracer,”
International Journal of Engineering Science and Innovative Technology, vol. 4, Issue 2, pp. 215-222,
215 2015.
39. “InterVLAN Routing–Routing
Routing between VLAN Networks” Available:http://www.firewall.cx/networking-
Available:http://www.firewall.cx/networking
topics/vlan-networks/222-intervlan
intervlan-routing.html.
72