Figure 2 - uploaded by Nagendram Sanam
Content may be subject to copyright.
Implemented WAN architecture in Cisco Packet Tracer.

Implemented WAN architecture in Cisco Packet Tracer.

Similar publications

Article
Full-text available
The development of computer network technology has significantly impacted global connectivity and technological innovation. Computer networks, which enable the seamless integration and expansion of network capabilities, have revolutionized communication, information access, and business operations. SMA Labschool Unesa 1, a digital-based school, req...
Article
Full-text available
span>Data access on a company is a very important part of an institution or a college. Especially in the present time, the internet has become an important thing in human life. With the existence of certain means there is a problem that will arise, needed solution or way out on a network that can be called protocol. Because an institution needs to...
Article
Full-text available
_________________________________________________________________________________________ Abstract The development of design of Safe and Energy Effective Methods for IoT Devices initiative is a great effort to solve the crucial challenges of Safety and Energy Effective for IoT Devices by using Cisco Packet Tracer. The rise of IoT devices has made i...
Thesis
Full-text available
This project demonstrates a system that can be applied in many areas including home security, lighting control, flame detection, smart heating, motion sensor and door control, etc... to provide its homeowner's comfort, security, energy efficiency (low operating costs) and convenience at all times. And turn on or off any appliances whenever needed t...
Article
Full-text available
Routers in a computer network are responsible for managing much of the data flow. Therefore, it is important to properly configure routers, as this will help to resist attacks and maintain the security and confidentiality of network traffic. Using Telnet for accessing a router remotely is not secure enough. The aim of this paper is to demonstrate t...

Citations

... Nagendramet. al [5] utilized cisco packet tracer to evaluate the performance of wide area network. Aksu et. ...
Article
Over the past few years, the advancement of technology in universities have led to rise in the number of vulnerabilities in University computer Network (UCN). To ensure robustness and hardness of UCN, an efficient Vulnerability Management System is required. The focus of current work is on the importance of vulnerability management in a UCN. A plethora of tools are used for vulnerability scanning and assessment. This paper also focuses on the implementation of vulnerability scanning tools on UCN. Assessment of scan results is done to identify vulnerabilities in the network that need to be resolved on priority basis. Based on the scan results obtained after scanning the network using scanning tools, the decision can be taken to mitigate the vulnerabilities on priority basis. Vulnerability Management in a UCN is a stepwise procedure that needs to be implemented to keep the network secure. An effective VM framework is important and inevitable to prevent cyber security breaches in a UCN as it regularly checks for new vulnerabilities on and also provide solutions to remediate or resolve the vulnerabilities. The scanning tools used for the current work were Nmap and Nexpose. Nmap was used for information gathering of network and Nexpose was used for scanning the network for vulnerability detection.
... CPT is a visual simulation tool that has been created and designed by cisco system. CPT has been used as an effective tool to teach and learn network communication in realistic way [7], [8]. It offers a realistic visualization and simulation tool for learning [9], [10]. ...
Article
Full-text available
The network is a massive part of life today. It participates not only on one side of life but in nearly every station, especially in educational organizations. The key aim of education is to share data and knowledge, making the network important for education. In particular, it is essential to ensure the exchange of information; thus, no one can corrupt it. To safe and trustworthy transfers between users, integrity and reliability are crucial questions in all data transfer problems. Therefore, we have developed a secure campus network (SCN) for sending and receiving information among high-security end-users. We created a topology for a campus of multi networks and virtual local area networks (VLANs') using cisco packet tracer. We also introduced the most critical security configurations, the networking used in our architecture. We used a large number of protocols to protect and accommodate the users of the SCN scheme.
... If its ISSN: 2005-4297 IJCA Copyright ⓒ 2020 SERSC higher performance than the previous network thinks about the sting 'Ei' otherwise don't think about it. Finally, show the output for in progressive order [8]- [12]. In the following Figure-1 and Figure-2 displays a connected graph network of both SpiceJet and Vistara airlines with respective edges and nodes. ...
Article
Full-text available
In the recent era, analytics plays a vital role in understanding and improving profits of many businesses. Now a day’s different analytic models available in the market. Some of them are descriptive analytics, predictive analytics, prescriptive analytics, big data analytics, and mathematical analyticsetc. The powerful and simple Graph theory based analytic models was used in this paper. Two different airline systems are selected and applied Graph analytics. In the initial process, spice Jet and Vistara datasets are converted into graphs Spice Jet and Vistara. Graph analytics were applied to the above graphs and found that one i.e., Vistara is weakly connected over spice Jet. An incremental model was proposed to increase the connectivity of Vistara so that the performance will be increased. So that Vistara can increase the business by adding trips in an incremental order from one trip to 15 trips. Finally, we compared the above airline companies with the proposed model generated results and it was observed that the proposed model is giving a feasible solution to Vistara airlines by adding trips in incremental order.
... If it has better performance than previous network, consider the edge Eiotherwise donot consider it. Finally show the output for in incremental order [13], [14], [15]. ...
... If it has better performance than previous network, consider the edge Eiotherwise donot consider it. Finally show the output for in incremental order [13], [14], [15]. ...
Article
Full-text available
In the design of social media platforms, the functionalities to be delivered are given due consideration as part of the requirement analysis. However, with the existence of many social media platforms, research effort has not focused on the area of critically examining these platforms to analyze their features and functionalities delivered. We propose a feature-oriented analysis of the performance of social media. The proposed evaluation method combines feature analysis with user experience analysis which is evaluated with proposed feature equation and user experience equation. We apply the proposed analysis method to a number of selected social media platforms. The results gave 77%, 66%, 53%, 70% and 62% performance ratings for the social media platform measured.
Chapter
In today world, wide area network is the most necessary computer network for communication and administration in most of the companies and organization. In today’s epidemic situation all home-based IT professionals need to go in from a distance to access their company’s network. In this paper, designing a secure wide area network to connect multiple offices using the CISCO package tracker simulation tool. The paper is divided into two parts, one for the network design and the other for the protection provided by that network. The paper Provides detailed information about routers and servers such as domain name server, telnet server, network time protocol and system logging protocol. The main purpose of the organization is to share information through network and specially, it is far essential to make sure the change of data; as a result, no person can spoil or harm it. For comfy and dependable transfers among customers, integrity and trustworthiness are vital questions for all statistics transfer troubles. Therefore, created a complete secure wide area network (SWAN) for sending and receiving facts among exceedingly comfortable quit customers and also added the maximum crucial protection settings to the community used in our construction. We used huge variety of protocols to shield and host users of the SWAN machine.KeywordsRouterSwitchHTTPDNSDHCPTelnetSMTP