Sunteți pe pagina 1din 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/324311605

Design and Simulation VLAN Using Cisco Packet Tracer: A Case Study

Conference Paper · October 2016

CITATIONS READS
0 6,011

2 authors:

Honni Honni Johanes Andry


Universitas Bunda Mulia Universitas Bunda Mulia
3 PUBLICATIONS   2 CITATIONS    68 PUBLICATIONS   114 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Audit Aplikasi Zahir di PT Radisa Mahardi Rekatama Menggunakan Framework COBIT 5 View project

Journal View project

All content following this page was uploaded by Johanes Andry on 31 August 2018.

The user has requested enhancement of the downloaded file.


Proceeding

Design and Simulation VLAN Using Cisco Packet Tracer:


A Case Study
Honnia) and Johanes Fernandes Andry b)
1, a)
Bunda Mulia University Faculty of Technology and Design Jl. Lodan Raya No. 2 Ancol Pademangan Jakarta
Utara 14430 Jakarta Indonesia
a)
Corresponding author: honni@bundamulia.ac.id
b)
jandry@bundamulia.ac.id

Abstract.This
This paper relates the part of a cisco packet tracer for a case study to design and simulation virtual local area
network. In this case study was carried out aimed at implemen
implementing the method LAN-Switching
Switching using VLAN to break up
broadcast domains into segments, so as to improve network performance. It additionally makes educating simpler,
understudies and instructor can make their own particular situation based labs also, gives genuine reproduced and
representation environment cisco packet tracer has part of components to make different situation based labs. The
discoveries of this study reason that there are different advantages and focal points of utilizing a cisco packet tracer
trace as a
part of learning fundamental and critical ideas of configuration and reproduction virtual local area network. It is a simple
and easy to use device to comprehend different ideas of computer networks.

Keywords.Design,
Design, simulation, virtual local area network, VLAN, LAN-Switching,
Switching, cisco packet tracer, a case study,
computer networks.

INTRODUCTION

Network designs, encompasses all areas of human enterprise. We find networks in the home, marketplace,
offices and schools making it possible for resources to be shared in a consolidated platform. Networking plays a
critical role in business performance of any organization. Efficiency and communication is guaranteed in a well-
well
designed network (Kelechi et al., 2014). The network based on TCP/IP protocol permits the efficient routing of data
packets based on their IP address. Routers are used in the network to control and forward data (Nazumudeen and
Mahendran, 2014).
Most of the Organizations such as public and private sectors have started deploying computers to their
employees to perform their daily work and access resources from their network. This technology has enabled to
operate their businesses much faster and more conveniently and also make easy for the organization; there are some
problems still faced by thehe organization such as poor network design (Kelechi et al., 2014). CISCO’s VLAN
trunking protocol reduces administration in a switched network (Verna, 2013). VLAN is one of the security
mechanisms that can solve the authentication problem. VLANs also offer offe r network operators flexibility for
specifying management and security policies within an enterprise and allow operators to implement some level of
isolation by separating hosts into different broadcast domains (Ameen and Nourildean, 2013). VLANs can help
reduce network traffic by forming multiple broadcast domains, to break up a large network into smaller independent
segments with fewer broadcasts being sent to every device on the overall network (Tambe, 2015). 2015) This paper
indicates to redesign Local Area Network
etwork by using VLAN and ACL solution (Shaffi and AlAl-Obaidy, 2012).

TEORITICAL BACKGROUND
Vlan Networking
What happens if we need a virtual connection between two stations belonging to two different physical LANs? A
virtual local area network (VLAN) is de
defined
fined as a local area network configured by software, not by physical wiring.

66
Proceeding

Virtual LANs (VLANs) have recently developed into an integral feature of switched LAN solutions from every
major LAN equipment vendor (Pal and Pal, 2013).2013) In networking, a LAN hass a single broadcast domain and the
traffic from a workstation reaches other workstations on the LAN through the broadcast. This is not desirable as
certain classified information can be received by unauthorized parties. Also, if the broadcast is not well contained, it
can lead to collision in the network (Alimi and Mufutau, 2015).
Virtual LAN technology is used in the design of internal networks of universities, organizations and enterprise
networks. VLAN is a data link layer technology for building multiple
multip le logical networks on the top of physical
network. The LAN network is divided into different logical segments called broadcast domains. The workstation
division is based on the functions, platforms and teams (Suji and Sekar, 2015).. Virtual LAN is nothing but a group
of devices that are connected virtually but may or may not physically connected (Thivikram, 2016).Virtual
2016) LAN or
VLAN allows network engineers and network administrators to make logical network from physical network. This
technology is used to segment a complex network into smaller networks for better manageability, improved
performance and security (Shaffi and Al-Obaidy,
Al 2012).

Cisco Packet Tracer


Packet Tracer is virtual networking simulation software developed by Cisco, to learn and understan
understand various
concepts in computer networks (Javid, 2014).
2014). Cisco Packet Tracer is a powerful network simulation program that
allows students to experiment with network behavior and ask “what if” questions. As an integral part of the
Networking Academy comprehensive nsive learning experience, Packet Tracer provides simulation, visualization,
authoring, assessment, and collaboration capabilities and facilitates the teaching and learning of complex technology
concepts (Dangwal and Kumar, 2014).2014) Like any simulation, Packet et Tracer relies on a simplified model of
networking devices and protocols. It provides a simulated environment where processes between various networking
devices, such as routers, switches, wireless access points, computers, links and applications are visible vis with
animations and easy explanatory descriptions (Nazumudeen and Mahendran, 2014).
Virtual Trunking Protocol (VTP) has some issues but not much research has been done for complexities arise in
VTP based configuration. In this paper, we focus strongly on various security aspects of VLAN design using with
VTP to reduce the much administrative
administrat work apart from optimal Inter-VLAN
VLAN routing design (Verna, 2013).

Routing
The term routing is used for taking a packet from one device and sending it through the network to another
device on a different network. Routers don’t really care about hosts they
the y only care about networks and the best path
to each network (Sharma and Padda, 2012).2012). Routing on IPv6 can be done through the use of static routes and
dynamic routing protocols. Static routes are manually defined by the administrator so the router learns about a
remote network, are usually used when the routing is from a network to a single connection network; a single
connection network is a network accessible by only one route (Rosado et al., 2012).
A Routing Protocol is a protocol that specifies how routers communicate with each other, disseminating
information that enables them to select routes between any two nodes on a computer network. Routing algorithms
are responsible for selecting the best path for the communication a border way we can say that A routing protocol is
the language a router speaks with other routers in order to share information about the reach ability and status of
network. Routing is often contrasted with bridging (Archana, 2015).

RESEARCH METHOD
Starting of this research is to conduct
conduct data collection, using observation techniques, to inventories existing
network equipment and computer hardware devices and software tools are used. The next step is to interview
relevant parties, in this case is a computer lab coordinator who is dir
directly
ectly responsible for the conditions that exist in
the computer lab. After getting all the information about the devices used and the activities running on a research,
further research from the literature to study the problems faced in order to identify th thee problem as a whole. The
proposed development method will design into a new network topology that uses an application Cisco Packet Tracer
network simulation. The design of this new network solution that emphasizes efficiency, because the devices will
stilll be used, without having to replace the whole. The next step is a simulation of the new network to test if the
method proposed development has been solving the problems that exist in the computer lab. Evaluation of the

67
Proceeding

results of the simulation to be important


important in proving that the proposed method possible to have an increase in
accordance with the objectives of this research, namely to increase the performance and security on the LAN.

RESULT AND DISCUSSION


One of such key performance indicator is how flexib
flexible
le a network can be without a compromise on its objective.
It combines hardware, software, cables, operating systems, switches, routers, hubs for communication to take place
(Verma, 2013). Hierarchical model is employed in LAN designs. In a hierarchical model
mo del designs are done in layers.

Implementation VLAN
The “FIGURE 1.” Existing Design of Network Topology indicates the existing organization infrastructure and
“TABLE 1.”” List Devices and Allocate IP Address.

FIGURE 1. Existing Design of Network Topology

TABLE 1. List Devices and Allocate IP Address

68
Proceeding

Server = 192.168.1.1
Router0 = 192.168.2.1(0/0) - 192.168.1.20 (0/1)
Router1 = Router2 = 192.168.3.1(0/0) - 192.168.1.1 (0/1)
PC0 = 192.168.1.2, PC1 = 192.168.1.3
PC2 = 192.168.1.4, PC3 = 192.168.1.5
PC4 = 192.168.1.6, PC5 = 192.168.1.7
PC6 = 192.168.1.8, PC7 = 192.168.1.9
PC8 = 192.168.1.10, PC9 = 192.168.1.11

Many experiment on all PCs, servers and routers, it was found that the results of all PCs, servers and routers are
Request Time Out (RTO), this indicates that the existing network topology in the organization as in show in
“FIGURE 1.” Design Network Topology already setting IP address, cannot be connected. Already done the
experiment several times, by changing the IP address, but tthe
he result is the RTO which means it can be connected on
the network topology. Therefore, the author planned the topology to replace those that are running.

Proposed Recommendation of Network Topology


Due to the design topology that is running cannot connect,
connect, it will be changed the design of the above with the
design of the new topology, can be seen in ““FIGURE 2.”.. Proposed Recommendation of Network Topology, of
course, by maximizing existing devices.

FIGURE 2. Proposed Recommendation of Network Topology

The case, author must initiation 2 vlan:


1. Vlan 20 for staff
2. Vlan 30 for management
Command in Switch:

69
Proceeding

Switch>enable
Switch#vlan database
Switch(vlan)#vlan 20 name staff
Switch(vlan)#vlan 30 name management
Switch(vlan)#exit
Switch#sh vlan
After setting dan write sh vlan, and show windows like this:

FIGURE 3. Vlan Still Active

Now, put in CLI on Router, write no,


For vlan 20,
Router>enable
Router#configure terminal
Router(config)#interface fa 0/0.20
Router(config-subif)#encapsulation
subif)#encapsulation dot1q 20
Router(config-subif)#ip
subif)#ip address 192.168.10.254 255.255.0.0
Router(config-subif)#exit
Then vlan 30, watch this,
Router>enable
Router#configure terminal
Router(config)#interface fa 0/0.30
Router(config-subif)#encapsulation
subif)#encapsulation dot1q 30
Router(config-subif)#ip address 192.168.1.254 255.255.255.0
Router(config-subif)#exit
Router(config)#interface fa 0/0
Router(config)#no shutdown
Last, author must setting port router, input mode trunk in switch
Switch>enable
Switch#configure terminal
Switch(config)#interface fa 0/24
Switch(config)#switchport
ch(config)#switchport mode trunk
Switch(config)#exit

70
Proceeding

Testing Functionality

Network simulation proposed recommendation of Topology will be made using Cisco Packet Tracer application
and process simulation represents all components of the existing. Process simulations to be carried on are: Test the
broadcast packets that will be sent to prove the performance of the network and o test the security of servers from
outsiders (un trust zone) to prove the level of network security.

TABLE 2. Testing Simulation by Cisco Packet Tracer

1. Host to Host Testing VLAN 20


Test Name Host to Host (VLAN 20)
To ensure that there is communication between PC2 until PC9, in router01 LAN VLAN 20,
Test Target
because servers existing in this VLAN
Source IP 192.168.1.3
Destination
192.168.1.4, 192.168.1.5, 192.168.1.6, 192.168.1.7, 192.168.1.8, 192.168.1.9
IP
Technique By sending Packet from Packet Tracer or by using Ping Functionality.
Expected Successful
Actual Result Successful, there is communication between PC2 until PC9 in range VLAN 20
Comment To enable routing, we should maintain ip route command in router02.
2. Host to Host Testing VLAN 20
Test Name Host to Host (VLAN 30)
To ensure that there is communication between PC1 and PC10, in router01 and router3 LAN
Test Target
VLAN 30, because servers existing in this VLAN
Source IP 192.168.1.2
Destination
192.168.1.10
IP
Technique By sending Packet from Packet Tracer or by using Ping Functionality.
Expected Successful
Actual Result Successful, there is communication between PC2 until PC9 in range VLAN 30
Comment To enable routing, we should maintain ip route command in router01 and route 03.
3. Routing Functionality
Test Name Routing Functionality
To ensure that there is communication between router 01, router02 and router03, because server
Test Target
existing in this VLAN
Source IP 192.168.1.1
Destination
192.168.2.1, 192.168.3.1
IP
Technique By sending Packet from Packet Tracer or by using Ping Functionality.
Expected Successful
Actual Result Successful, there is communication between router 01, router02 and router03
Comment To enable routing, we should maintain ip route command in router01 and route 03.

71
View publication stats

Proceeding

CONCLUSIONS
Based on the currently of the network as show in Figure 5, VLAN cannot and fulfilled connected because it does
not run at layer 3 (router) but runs on layer 2 (switch).
This paper is more helpful to the organization for the effective implements of VLAN and an to enhance network
security by keeping devices that operates with sensitive information on a separate VLAN. Implementation of VLAN
that brings the features of Inter-VLAN
VLAN and Access Control List (ACL), the level of network security in the Lab
increased. Inter-VLAN
VLAN can connected different network segments or VLAN to meet the demand for access to
VLAN Server. It is expected that this new network topology can be implemented to optimize network resources that
have applied the method but the LAN LAN-Switching network rk devices that use the device still manageable. The key
element to the InterVLAN routing service is that you must have at least one VLAN interface configured with an IP
Address on the InterVLAN capable switch.

REFERENCES
24. E. Kelechi, N. Stanley and N. Uchenna, “Evaluation of Network Architecture and Its Implication on
Connectivity and Data Security,” International Journal on Recent and Innovation Trends in Computing and
Communication, vol. 2, Issue. 12, pp. 3945
3945-3950, 2014.
25. N. Nazumudeen and C. Mahendran, “Performance Analysis of Dynamic Routing Protocols Using Packet
Tracer,” International Journal of Innovative Research in Science, Engineering and Technology, vol. 3, Special
Issue 1, pp. 570-574, 2014.
26. A. S. Shaffi and M. Al-Obaidy,
Obaidy, “Effective Implementation of VLAN and ACL in Local Area Network,”
International Journal of Information Technology and Business Management, vol. 4, no. 1, pp. 46 46-52, 2012.
27. R. O. Verma, “Effective Remote Management for Inter Inter-VLAN
VLAN Routing Networks,”
Networks International Journal of
Application or Innovation in Engineering & Management, Special Issue for National Conference On Recent
Advances in Technology and Management for Integrated Growth, 2013.
28. S. Y. Ameen and S.W. Nourildean, “Wireless Local Area Netw Network
ork VLAN Investigation and Enhancement
Using Routing Algorithms,” International Journal of Engineering and Advanced Technology, vol. 3, Issue 2,
pp. 260-263, 2013.
29. S. S. Tambe, “Understanding Virtual Local Area Networks,” International Journal of Engineering
Engineeri Trends and
Technology, vol. 25, no. 4, pp. 174
174-176, 2015.
30. G. P. Pal and S. Pal, “Virtual Local Area Network (VLAN),” International Journal of Scientific Research
Engineering & Technology,” vol. 1, Issue10, pp. 006006-010, 2013.
31. I. A. Alimi and A. O. Mufuta
Mufutau,
u, “Enhancement of Network Performance of an Enterprises Network with
VLAN, “American Journal of Mobile Systems, Applications and Services, vol. 1, no. 2, pp. 82 82-93, 2015.
32. S.V. Suji and G.Sekar, “Design and Implementation of Secured HSRP Protocol using VLAN,” VLA International
Journal of Digital Communication and Networks, vol. 2, Issue 1, pp. 9-11,
9 2015.
33. G. Thrivikram, “Implementation of Virtual LAN (VLAN) using Layer3 Switches,” International Journal of
Advance Research in Computer Science and Management Studies, vol. 4, Issue 3, pp. 114-120,
114 2016.
34. S. R. Javid, “Role of Packet Tracer in learning Computer Networks,” International Journal of Advanced
Research in Computer and Communication Engineering,” vol. 3, Issue 5, pp. 6508 6508- 6511, 2014.
35. K.Dangwal and V.. Kumar, “Comparative Study of EIGRP and RIP Using Cisco Packet Tracer,” International
Journal of Engineering Sciences & Emerging Technologies, vol. 6, Issue 6, pp. 475-475 480, 2014.
36. E. A. Sharma and E. S. Padda, “Configuring an EIGRP based Routing Model,” International In Journal of
Scientific and Research Publications, vol. 2, Issue 2, pp. 11-4, 2012.
37. L.V. Rosado, L. N. Díaz, C. G. Segura and V. C. Pech, “Design and Simulation of an IPv6 Network Using
Two Transition Mechanisms,” International Journal of Computer
Compute r Science Issues, vol. 9, Issue 6, no. 1, pp. 60-
60
65, 2012.
38. C. Archana, “Analysis of RIPv2, OSPF, EIGRP Configuration on router Using CISCO Packet tracer,”
International Journal of Engineering Science and Innovative Technology, vol. 4, Issue 2, pp. 215-222,
215 2015.
39. “InterVLAN Routing–Routing
Routing between VLAN Networks” Available:http://www.firewall.cx/networking-
Available:http://www.firewall.cx/networking
topics/vlan-networks/222-intervlan
intervlan-routing.html.

72

S-ar putea să vă placă și