Sunteți pe pagina 1din 5

access resources from their network.

This technology
Design and Simulation has enabled to operate their businesses much faster
VLAN Using Packet and more conveniently and also make easy for the
organization; there are some problems still faced by
Tracer: A Case Study
the organization such as poor network design
(Kelechi et al., 2014). CISCO’s VLAN trunking
protocol reduces administration in a switched network
Abstract.This paper relates the part of a cisco
(Verna, 2013). VLAN is one of the security
packet tracer for a case study to design and
mechanisms that can solve the authentication
simulation virtual local area network. In this case
problem. VLANs also offer network operators
study was carried out aimed at implementing the
flexibility for specifying management and security
method LAN-Switching using VLAN to break up
policies within an enterprise and allow operators to
broadcast domains into segments, so as to
implement some level of isolation by separating hosts
improve network performance. It additionally
into different broadcast domains (Ameen and
makes educating simpler, understudies and
Nourildean, 2013). VLANs can help reduce network
instructor can make their own particular situation
traffic by forming multiple broadcast domains, to
based labs also, gives genuine reproduced and
break up a large network into smaller independent
representation environment cisco packet tracer has
segments with fewer broadcasts being sent to every
part of components to make different situation
device on the overall network (Tambe, 2015). This
based labs. The discoveries of this study reason
paper indicates to redesign Local Area Network by
that there are different advantages and focal points
using VLAN and ACL solution (Shaffi and Al-
of utilizing a cisco packet tracer as a part of
Obaidy, 2012).
learning fundamental and critical ideas of
configuration and reproduction virtual local area
network. It is a simple and easy to use device to TEORITICAL BACKGROUND Vlan
comprehend different ideas of computer networks. Networking
INTRODUCTION What happens if we need a virtual connection
between two stations belonging to two different
Network designs, encompasses all areas of human physical LANs? A virtual local area network (VLAN)
enterprise. We find networks in the home, is defined as a local area network configured by
marketplace, offices and schools making it possible software, nVirtual LANs (VLANs) have recently
for resources to be shared in a consolidated platform. developed into an integral feature of switched LAN
Networking plays a critical role in business solutions from every major LAN equipment vendor
performance of any organization. Efficiency and (Pal and Pal, 2013). In networking, a LAN has a
communication is guaranteed in a well- designed single broadcast domain and the traffic from a
network (Kelechi et al., 2014). The network based on workstation reaches other workstations on the LAN
TCP/IP protocol permits the efficient routing of data through the broadcast. This is not desirable as certain
packets based on their IP address. Routers are used in classified information can be received by
the network to control and forward data (Nazumudeen unauthorized parties. Also, if the broadcast is not well
and Mahendran, 2014). contained, it can lead to collision in the network
Most of the Organizations such as public and (Alimi and Mufutau, 2015).
private sectors have started deploying computers to Virtual LAN technology is used in the design of
their employees to perform their daily work and internal networks of universities, organizations and
enterprise networks. VLAN is a data link layer Routing
technology for building multiple logical networks on
The term routing is used for taking a packet from
the top of physical network. The LAN network is
one device and sending it through the network to
divided into different logical segments called
another device on a different network. Routers don’t
broadcast domains. The workstation division is based
really care about hosts they only care about networks
on the functions, platforms and teams (Suji and Sekar,
and the best path to each network (Sharma and
2015). Virtual LAN is nothing but a group of
Padda, 2012). Routing on IPv6 can be done through
devices that are connected virtually but may or may
the use of static routes and dynamic routing
not physically connected (Thivikram, 2016).Virtual
protocols. Static routes are manually defined by the
LAN or VLAN allows network engineers and
administrator so the router learns about a remote
network administrators to make logical network from
network, are usually used when the routing is from a
physical network. This technology is used to segment
network to a single connection network; a single
a complex network into smaller networks for better
connection network is a network accessible by only
manageability, improved performance and security
one route (Rosado et al., 2012).
(Shaffi and Al-Obaidy, 2012).
A Routing Protocol is a protocol that specifies how
Cisco Packet Tracer routers communicate with each other, disseminating
information that enables them to select routes
Packet Tracer is virtual networking simulation between any two nodes on a computer network.
software developed by Cisco, to learn and understand Routing algorithms are responsible for selecting the
various concepts in computer networks (Javid, 2014). best path for the communication a border way we can
Cisco Packet Tracer is a powerful network simulation say that A routing protocol is the language a router
program that allows students to experiment with speaks with other routers in order to share
network behavior and ask “what if” questions. As information about the reach ability and status of
an integral part of the
network. Routing is often contrasted with bridging
Networking Academy comprehensive learning
experience, Packet Tracer provides simulation, (Archana, 2015).
visualization,
authoring, assessment, and collaboration capabilities RESULT AND DISCUSSION
and facilitates the teaching and learning of complex One of such key performance indicator is how
technology
flexible a network can be without a compromise on its
concepts (Dangwal and Kumar, 2014). Like any
simulation, Packet Tracer relies on a simplified objective. It combines hardware, software, cables,
model of operating systems, switches, routers, hubs for
networking devices and protocols. It provides a communication to take place (Verma, 2013).
simulated environment where processes between Hierarchical model is employed in LAN designs. In a
various networking devices, such as routers, switches, hierarchical model designs are done in layers.
wireless access points, computers, links and
applications are visible with animations and easy
IMPLEMENTATION
explanatory descriptions (Nazumudeen and
Implementation VLAN
Mahendran, 2014).
Virtual Trunking Protocol (VTP) has some issues
but not much research has been done for complexities The “FIGURE 1.” Existing Design of Network
arise in VTP based configuration. In this paper, we Topology indicates the existing organization
focus strongly on various security aspects of VLAN infrastructure and “TABLE 1.” List Devices and.
design using with VTP to reduce the much administrative
work apart from optimal Inter-VLAN routing design (Verna, 2013).
with the design of the new topology, can be seen in
“FIGURE 2.”. Proposed Recommendation of
Network Topology, of course, by maximizing
existing devices.

FIGURE 1. Existing Design of Network Topology


Allocate IP Address

FIGURE 2. Proposed Recommendation of Network


Topology

The case, author must initiation 2 vlan:


1. Vlan 20 for staff
TABLE 1. List Devices and Allocate IP Address 2. Vlan 30 for management Command in Switch:
Switch>enable
Many experiment on all PCs, servers and routers, it Switch#vlan database
was found that the results of all PCs, servers and Switch(vlan)#vlan 20 name staff
routers are Request Time Out (RTO), this indicates Switch(vlan)#vlan 30 name management
that the existing network topology in the organization Switch(vlan)#exit
as in show in “FIGURE 1.” Design Network Switch#sh vlan After setting dan write sh vlan, and
Topology already setting IP address, cannot be show windows like this
connected. Already done the experiment several
times, by changing the IP address, but the result is the
RTO which means it can be connected on the network
topology. Therefore, the author planned the topology
to replace those that are running.

Proposed Recommendation of Network


Topology

Due to the design topology that is running cannot


connect, it will be changed the design of the above
1

S-ar putea să vă placă și