Conference PaperPDF Available

Campus Network Configuration, Monitoring and Data Flow Simulation using Cisco Packet Tracer

Authors:
  • Jashore University of Science & Technology

Abstract and Figures

The key to communication is being digitalized every day, in order to keep up with technology everyone needs to update their skillset with it. A campus network is connected to us more because all are often a part of it. Everyone uses it most of the time for their daily activities on campus and also for educational purposes, depending on their needs. To ensure that data cannot be corrupted, it is crucial to make specific alterations to it. Integrity and reliability are key issues in all information switch difficulties in order to ensure safe and simple transfers among customers. As a result, this research has developed a secure campus network and a stable campus community for sending and getting data among end users with high levels of security. Using a Cisco packet tracer, this study proposed a topology for a campus of multiple networks and virtual local area networks (VLANs), as well as the most crucial security configurations for the networking used in this design. There used a massive variety of protocols to defend and accommodate the customers of the secure campus network scheme and also added switches, routers, firewalls, Wi-Fi routers, IP routers and printers to this network in order to make communication smoother and more efficient. Digital campus is the place where the next generation goes to gain education and knowledge about the world makes the campus network more secure and tech-focused. The students and other personnel can learn and even get familiar with them all and also help everyone.
Content may be subject to copyright.
Campus Network Configuration, Monitoring and
Data Flow Simulation using Cisco Packet Tracer
Shahadat Hoshen Moz
Dept. of Computer Science and
Engineering
Northern University of Business and
Technology Khulna
Khulna, Bangladesh
shahadat.cse.just@gmail.com
Md Apu Hosen
Dept. of Computer Science and
Engineering
Northern University of Business and
Technology Khulna
Khulna, Bangladesh
apu.cse.just@gmail.com
Nice Fatema Islam Tanny
Dept. of Computer Science and
Engineering
Northern University of Business and
Technology Khulna
Khulna, Bangladesh
ottohasi99@gmail.com
Abstract - The key to communication i s being digitalized
every day, in order to keep up with technology everyone needs
to update their skillset with it. A campus network is connected
to us more because all are often a part of it. Eve ryone uses it
most of the ti me for their daily activities on campus and also
for educational purposes, depending on their needs. To ensure
that data cannot be corrupted, it is crucial to make specific
alterations to it. Integrity and reliability are key i ssues in all
information switch difficulties in order to ensure safe and
simple transfers among customers. As a result, this research
has developed a secure campus ne twork an d a stable campus
community for sending and getting data among end users with
high le vels of security. Using a Cisco packet tracer, this study
proposed a topology for a campus of multi ple networks and
virtual local area networks (VLANs), as wel l as the most
crucial security configurations for the networking used in this
design. There used a massive varie ty of protocols to defend and
accommodate the custome rs of the secure campus network
scheme and also added switches, routers, firewalls, Wi-Fi
routers, IP routers and printers to this network in order to
make communication smoother and more e fficient. Digital
campus is the place where the next generation goes to gain
education and knowledge about the world makes the campus
network more se cure and tech-focused. The students and other
personnel can l earn and even get familiar wi th them all and
also help everyone.
Keywords VLAN (Virtual Local Area Network), Switch,
Router, Server, IP (Internet Protocol) Address.
I. INTRODUCT ION
In the world of digital evolution, people often rely on
technology, which makes their workflow better and more
reliable. When someone thinks about communicating
between a small network like Univers ity and a s mall office
they often think about a more efficient and reliable way to do
it. It's not always top-notch advanced technology that they
need but more cheap and more reliable ones . This research
accomplished an easy, reliable, redundant , and cheap
network diagram of a ca mpus. Also maintaining networking
standards and reliable technology which helps in user daily
workflow also in advanced networking. In order to
communicate between department computers this research
configured LAN connectivity between them and ass igned
different blocks for different departments so that it is easy to
maintain and identify any problem during troubleshooting
more effectively.
Nowadays, most people, particularly scientists, require
access to the internet. Many researchers and scientists rely
excessively on networks to obtain additional informat ion.
Students are also involved in network-dependent cases for a
variety of reas ons s uch as sharing informat ion and
knowledge among themselves as a res ult, each community
and organization places a high value on the network [1].
Currently, in Banglades h , most of the major Universities are
using their own LAN to co mmunicate in local networks and
other technology to commun icate via WAN. Mos t
universities use s ervers to store their confidential data and
use them for their needs . Also, the us e of a Firewall for data
protection and privacy.
Students need their information about activities and
study materials which are stored and maintained on the
Servers by Varsity authorities. Since the time of Covid-19 ,
mos t Va rsities used online platforms for continuing class es
and exams. For that purpos e, most of the Varsity beca me
dependent on connecting students online and co mpleting the
daily activ ities of students through the Web. To
communicate smoothly and securely inside departments on
campus, authorities use secured LAN connectivity. This
connectivity is mos tly between department tell desktop PC,
IP Phones , Printers, and many mo re devices. By using this
technology user can communicate in their own network
without using the internet. This technology is cost-effective
and easy to install and is also faster than wireless technology
or others. This helps to maintain data security and privacy
and is also easy to monitor and maintain.
This paper designed a working network d iagram in Cisco
packet tracer using Cisco routers, layer 2 and layer 3
switches, desktop computers, IP Phones, printers, servers,
wireless routers , and many mo re devices to simulate the
working environment of a campus network. This research
aims to create some working servers that can be accessed
from the LAN s ide and also fro m wan and will configure
different blocks of IP addresses and imp lement them in
different departments as per the networking plan and also
configure VLA Ns in switches to manage them as comfort
and configured rip for connecting other networks in routers.
Layer 3 switches have been used as the backbone of this
network. A ls o, layer 2 s witches work as distribution in
different departments.
This research implemented pr inters in every department
which can be accessed from other departments as well.
Wireless routers have been used to connect mobile devices.
A firewall is also us ed for security purposes. 2 s ervers are
configured as file transfer and student database for
convenience. Also, this network is flexible to any changes
as a network administrator wishes. For this purpose, need to
Proceedings of the International Conference on Inventive Computation Technologies (ICICT 2023)
IEEE Xplore Part Number: CFP23F70-ART; ISBN: 979-8-3503-9849-6
979-8-3503-9849-6/23/$31.00 ©2023 IEEE 793
2023 International Conference on Inventive Computation Technologies (ICICT) | 979-8-3503-9849-6/23/$31.00 ©2023 IEEE | DOI: 10.1109/ICICT57646.2023.10134506
Authorized licensed use limited to: CAMBRIDGE UNIV. Downloaded on October 11,2023 at 15:18:17 UTC from IEEE Xplore. Restrictions apply.
implement redundancy to every core device and connection
so that in times of outage nothing catastrophic happens in
the network and make sure there are redundant connections
for every core connectivity. If one connection goes down the
other will co me up automatically hence it's always on
standby. The a im is to lower the cos t of implementation and
configuration as lowest possible without decreasing the
quality of service and redundancy of this network.
The main focus of this research is to make a campus
network that is fast, reliable, and has redundancy. In order to
make co mmunication eas ier and faster this research need to
use Ethernet connectivity in a LAN networ k. This
connection makes data flow mu ch faster and easier to
control and monitor. A lso creating a server in LAN makes it
different departments to access files and data from the
server very easily and securely. Adding fire makes
communicat ion reliable and increases s ecurity a lot. Having
redundant connectivity is always a plus poin t. In case of
catastrophic failure, everyone can always rely on this
network because of cons isting redundant connectivity.
The thes is is organized into six chapters , Chapter 1
represents the introduction and motivation of the research.
Chapter 2 (Literature Review and Related Works) describes
the major topology of ca mpus network configuration, and
other s ecurity approaches are also described here In.
Chapter 3 (Methodology), gives a detailed description of
campus network des ign configuration and monitoring
approach. Chapter 4 represents the total implementation.
Chapter 5 (result and future wo rk), presents the res ults
generated by the proposed approach and other available
approaches and a detailed comparison between them.
Chapter 6 (conclusion), focus es on major contr ibutions and
future research s copes. Finally, all references take place in
the last section.
II. LITERATURE REVIEW
Huang et al. [2], Data leakage, des truction, and other
incidents are commonplace today as a result of the ongoing
innovation in network s ecurity incident approaches. The
campus network is currently quite extens ive in many
universities. Universities ensuring the regular and secure
operation of the campus network is a critical issue.
Research by Paguigan et al. [ 3], Packet filtering
firewalls , application proxy firewalls, and monitoring
modules are the key co mponents of traditional firewalls.
The data packet subject to packet filtering detection cons ists
mos tly of the data portion and at the end, the packet's
information content is disregard ed. A ddress, destination
address, encapsulation protocol, and output port interface
are a few of the details contained in the header infor mation.
According to the matching rules, the packet filtering firewall
will decide whether to accept or deny each packet. The
identity authentication module primar ily as s ists internal
network c lients . If authentication is success ful, users can
realize data transmission; otherwise, c lients mus t resend
their reques ts.
Covers campus network architecture des ign, Internet
Protocol (IP) address settings, packet flow used to divide
LAN traffic, and VLANs. Various network groupings or
class ifications. Exemplified both hardware and VLA N
communicat ion should be tes ted. Factors included in the
mode of experiential learning according to research four
departments on a university campus employ VLANs to gain
improved network performance, i.e., Policy on access
restriction. VLANs are also mentioned in the report [4] [ 5].
In order to connect to the new host easily used a DHCP
server in big networks. Because it's easy to connect new
devices and doesn't require configuring each and every
device individually [6].
Rahim et al. [7], Prototype file transfer protocol or FTP
is a s ystem where hosts can s hare different types of files
with other hosts in their network us ing internet bandwidth
capacity. It is mainly us ed for accessing files eas ily and at a
faster speed. It is also eas y to set up and use protocol.
Virtual local area network pre ferred as VLAN. In a
switch interface wire, different ports could work as a
network and other ports work as a different network that is
the procedure of VLAN. It is mostly used to manage a small
LAN or a b ig network a lso. It makes networking or flow
mass easier and more efficient [8] [14].
Research by Black [9], Routing is the diversity of a
network. In order to work with a router routing protocol is a
mus t. If anyone wants to shift traffic to a s pecific
destination, they need those specific routes to reach the
destination. Without any routes, traffic is able to understand
its required route and could be broadcasting to the whole
network which is catas trophic and bad for the network.
Gonen et a l. [10], When routers or devices try to
communicate with each other in a mu lti-connectivity
network they need to communicate to the s hortest path if
they want to commun icate with each other fastest and most
efficient way. In order to do that they need cost calculation
to measure distance or hopes to reach their des tination. This
protocol helps to do that and work in their desired way.
Shoch and Hupp [11], Ethernet is a technology that was
created to build s ystems that can communicate with
different vendor devices with one cable or such. It is mostly
used for networking purpos es or communicating with two
devices. Its data trans fer rate depends on its categories. This
makes data communication so much eas ier for every vendor.
Janitor et a l. [12], The cisco packet tracer is a simulation
software wire networ king device that can work as rea l
devices and also could be configured as s uch. In the
simulator, this research can create its own v irtual networks
with c isco devices like router switches that fire all cables
and many more. But becaus e it is a Cisco product it can only
contain Cisco devices.
Pattavina [13], Switches are a device that wo rks as a hub
to communicate with multiple devices. Sw itch and herbs are
similar devices but unlike a hub, S witch doesn't broadcast
every reques t to every device. The switch works with a Mac
address and it remembers its cam table so when any device
sends a request for the second time it re members that and
only sends the request to that specific device and not all the
devices that are connected to the switch.
III. PROPOSED METHODOLOGY
In this res earch, the goal is to design a working network
diagram in a Cisco packet tracer us ing Cisco routers, layer 2
and layer 3 switches, desktop computers, IP Phones,
printers, servers , wireless routers , and many more devices
to simulate the working environment of a ca mpus network.
Proceedings of the International Conference on Inventive Computation Technologies (ICICT 2023)
IEEE Xplore Part Number: CFP23F70-ART; ISBN: 979-8-3503-9849-6
979-8-3503-9849-6/23/$31.00 ©2023 IEEE 794
Authorized licensed use limited to: CAMBRIDGE UNIV. Downloaded on October 11,2023 at 15:18:17 UTC from IEEE Xplore. Restrictions apply.
This proposed system will create some wo rking servers that
can be accessed from the LAN side and also from wan and
configure different blocks of IP addresses and implement
them in different departments as per the networking plan.
This system will also configure VLANs in s witches to
manage them in co mfort and configured rip fo r connecting
other networks in routers. Layer 3 s witches have been used
as the backbone of this network. Also, layer 2 switches
work as distribution in different departments and
implemented printers in every department which can be
access ed from other departments as well. Wireless routers
have been used to connect mobile devices.
A firewall is a lso used for security purpos es . 2 servers
are configured as f ile transfer and s tudent database for
convenience. Also, this network is flexible to any changes
as a network ad ministrator wishes . This work has
implemented redundancy to every core device and
connection so that in times of outage nothing catastrophic
happens in the network and also makes s ure there a re
redundant connections for every core connectivity. If one
connection goes down the other will co me up automatically
hence it's always on standby. This res earch aims to lowe r
the cost of implementation and configuration as lowest
poss ible without decreasing the quality of service and
redundancy of this network.
IV. IMPLEMENTATION
A. IP Distribution
In order to create Campus Network, at first, need to plan IP
Block implementation of different Departments.
TABLE I: IP DISTRIBUT ION
SN
Device/Ne twork
IP Address
Gateway
01
Backbone Router(1)
30.0.0.1/8
30.0.0.1
02
Backbone Router(2)
40.0.0.2/8
10.0.0.1
03
Core Router
30.0.0.2/8
40.0.0.1
04
Civil
10.0.0.0/24
10.0.0.1
05
Bachelor of laws
20.0.0.0/24
20.0.0.1
06
EEE
20.0.0.0/24
20.0.0.1
07
Computer Science
10.0.0.0/24
10.0.0.1
08
FTP Server
10.0.0.100/24
10.0.0.1
09
DNS Server
20.0.0.100/24
20.0.0.1
10
Distribution Switch (1)
10.0.0.0/24
10.0.0.1
11
Distribution Switch (2)
20.0.0.0/24
20.0.0.1
12
Distribution Switch (3)
10.0.0.0/24
10.0.0.1
13
Distribution Switch (4)
20.0.0.0/24
20.0.0.1
In fig.2 there are different department has different blocks of
IP Address.
Fig.2. IP Assign
B. VLANs
In order to make connectivity more efficient and fle xible
this research configured VLAN for every department in
distribution Switches. In fig.3 every d istribution switch has
its different VLANs according to their departments.
TABLE II: VLAN IMPLEMENT ATION
Number of
VLAN
Name of
VLAN
Name of
Department
10
CSE 01
Computer s cience
12
CSE 02
Bachelor of Laws
11
CSE 03
Civil
13
CSE 04
EEE
Fig.3. VLAN in DR Switch
Fig.1. Block Diagram of propose met ho d
Proceedings of the International Conference on Inventive Computation Technologies (ICICT 2023)
IEEE Xplore Part Number: CFP23F70-ART; ISBN: 979-8-3503-9849-6
979-8-3503-9849-6/23/$31.00 ©2023 IEEE 795
Authorized licensed use limited to: CAMBRIDGE UNIV. Downloaded on October 11,2023 at 15:18:17 UTC from IEEE Xplore. Restrictions apply.
C. Routes
In order to make the configuration up-to-date and easy to
maintain I’ve chos en RIP Protocol for Routing this
Network. All the Routers are configured in RIP so that all
the connections from LAN or WAN can es tablish
connectivity smoothly throughout the Network and there
can make any changes easily of the us er will whenever the
user wants .
D. Core Switches
In this network, Core Switches are being used for
connecting all the LAN networks, Servers, Core Routers,
Distribution S witches , and many more. As well as it is also
the Heart of the Network. Fig.4, represents the use scenarios
of Core Switches.
E. Wireless Router
For connecting wireless devices all the Departments have
been given a wireless router, there consist wireless routers in
different departments in fig.4.
F. Firewall
A firewall is being used to filter traffic and maintain rules
created by Admin to avoid any security breach or potential
attacks. Also, it’s filtering outbound traffic for any data leaks
which can cause privacy errors [15] [16].
G. Printers Configuration
Printers have been configured to the same block of the IP
address of the department they are located. Also, they are
access ible f ro m other LA N networks in case of any
emergency or one device malfunctions . In fig.4, there
consist placements of printers and configurations. The
Printers are located in different departments but they are
acces s ible throughout the whole Campus Network.
H. Server
This research used 2 servers for Data Flow control and
convenience. Fig.4, represents the configurations and
placements of the Servers.
I. Routers
This research uses cisco 2911 series routers for
connecting LAN and WAN Net works and configured 1
Router for Backbone and the other for Redundant. Another
Router has been configured as a Core router which is
connecting to WAN via Firewall for security purpos es .
J. IP Phone
For voice co mmunication, via W EB this work
implemented IP Telephony in every Department. Bellow
figure represents the implementations.
Fig.4. IP Phone in Depart men t
V. RESULTS AND DISCUSSION
After completing the configurations and
troubleshooting now the connection is established and data
flow is normal. The devices are working as expected.
Every connection and configuration are functional as
per planning. Even the redundant connections are working
perfectly when any primary device or connectivity goes
down. All IP b locks are implemented to the devices as
planned, now they can reach their destinations as per
permiss ions and configurations. The Blocks are the only
way to identify the devices to their networks from LAN.
The reas on for implementing d ifferent blocks of IP is so that
the Troubleshooting and differentiat ing of Net works could
be easier. Different departments are connected as
configuration and they can connect to other departments as
per requirements.
Fig.5. Full Network Overview
The firewall device is blocking sites and filtering data
as this research planned and Server is accessible from LAN
and W AN. Wireless devices are connected to W iFi routers
as per different depart mental requirements. The WA N router
or Core router is connected to WAN which is the gateway or
main connection outside of this LAN Network. Every
device which is trying to reach the Internet has to go
through Core Router.
To reduce costs, it is ess ential to consider certain
factors beforehand. Firstly, it is important to determine
whether the current technologies will be future-proof and
whether the devices will be able to perform the neces sary
Proceedings of the International Conference on Inventive Computation Technologies (ICICT 2023)
IEEE Xplore Part Number: CFP23F70-ART; ISBN: 979-8-3503-9849-6
979-8-3503-9849-6/23/$31.00 ©2023 IEEE 796
Authorized licensed use limited to: CAMBRIDGE UNIV. Downloaded on October 11,2023 at 15:18:17 UTC from IEEE Xplore. Restrictions apply.
tas ks for the project. By ut ilizing the current diagra m and
devices, costs can be minimized through redundancy. For
instance, this operation does not require backbone s witches
to function, as it can be accomplished using only one switch.
Additionally, the backbone switch can serve as a
distribution switch. One server can be us ed to run multiple
services, which will reduce the need for different servers
and lower cos ts .
While a firewall is an extra s ecurity device, it may not
be necessary if the system requires low-level security for the
network. Instead, some rules can be implemented in core
routers or backbone routers to filter data and ma ke the
network somewhat secure. However, if extra s ecurity is
required, a f irewa ll should be used in the system. By ta king
these factors into account, costs can be reduced without
compromis ing the functionality and security of the sys tem.
This research is done on Cisco packet tracer s oftware
which is the industry standard for networking s imulations.
The network has been tested from LAN and fro m WA N fo r
reachability and data flow. The connectivity and reach
abilities are working p roperly as planned an implemented
but there are some shortcomings. Despite being s imulation
software, something can't be as accurate as in real life. Such
as WAN reachability could be different in a real -life
environment. Also accessing servers or any device in a LAN
network from another network could be different due to
routing and implementation of other networks.
Despite these limitations, the testing output of this
research has shown that the software is highly accurate and
functions perfectly within its parameters. It is confident ly
said that this work will meet the needs of clients and provide
them with a reliable and efficient network solution. The
connectivity between devices is mostly point -to-point in the
LAN network so its reachability can check by pinging 2
devices for the primary check. For s econdary checking, the
user can s end data or packets from one to another to check if
the host and destination device receiving and sending back
acknowledg ment or the data for co mmunication purpos es.
As you can see the desired commun ication is happening
between devices so it's working properly as you can see
from fig.5.
VI. CONCLUSION
In order to complete the task, the procedure of work such
as planning, implementation, configurations, and
troubleshooting has to be done. After doing all of thos e the
Network Diagra m should be run as the planning. As the
traffics are coming from WAN via the Core router, then it’s
being distributed to Network via Backbone/Core Switch es .
Then Core switch provides the desired IP through VLANs
which a re located in all switches. Then Distribution s witch
sends packets to the hosts that are connected to its network.
Also, for LAN communication D istribution s witches and
core switches are providing the routes to go to their desired
host within LA N. The FTP s erver is access ible fro m WA N
and LAN both so it’s taking desired routes from routers and
VLANs fro m switches for s ending packets to destinations.
The core router provides all the routes and handles all the
Traffic. Firewall filtering all the data and removing malware
or suspicious ones and keeping the Network Safe. It can
pos itively say that this could be reliab le and effective while
also maintaining standards as this research planned to do.
In future work, this research w ill configure the network
to update the networking environment and overall
connectivity. There are many ways to update or rearrange
the network, but this research plan for a reliable, cost-
effective, and eas y-to-maintain network need to come up
with this and it would hold the s tandard of a campus
network.
To improve the performance of the network and data
flow, the first step is to reduce the latency of different hops.
Most of the devices in this network are connected point t o
point by Ethernet cable. The ports of the devices are mostly
100M capable. As a way of managing the implementation of
1G capable devices that will improve the data flow of this
network. Also, the higher vers ion of W i-Fi technology can
be us ed to improve connectivity. Using Cisco Catalyst series
switches and routers will improve the performance of data
sharing. By using fiber optic connectivity, the data flow will
improve the network. Becaus e it is a LAN network there is
not much routing involved but in order to reduce the latency
of routing by making mos t of the LAN connectivity 'point to
point' without any configuration at all. It can be done by
setting all the devices on a single IP block which will be
access ible without any routing from LAN. By doing those
things, the sys tem can be improved.
REFERENCES
[1]. Chen, Lin, and Weiping Zhu. "Autonomous mobile learnin g
model of cloud education based on intelligent algorithm of
wireless network communication." Wireless Communications
and Mobile Computing 2021 (2021): 1-13.
[2]. Huang, Min, Wanbo Luo, and Xin g Wan. " Research on network
security of campus network." Journal of Physics: Conference
Series. Vol. 118 7. No. 4. IOP Publishing, 2019.
[3]. Paguigan, Jesus S., Michael G. Albino, and Jefferson A.
Costales. "An Assessment and Design of Campus Network Using
Collapsed-Core Architecture." 2022 IEEE 10th International
Conferen ce on Information, Communication and Networks
(ICICN). IEEE, 2022.
[4]. Ahmed, Alaa H., and M. N. Al-Hamadan i. "Design ing a secure
campus network and sim ulating it using Cisco p acket
tracer." Indonesian Journal of Electrical Engineering and
Computer Science 23.1 (2021): 4 79-489.
[5]. Sadiq, K., J. Ayeni, and F. Oyedepo. "An Optimized Kwara State
Polytechnic Campus Networks using VLAN." International
Journal of Computer Applications 1 75 ( 2020): 975-8887.
[6]. Chen, Xiaozhong, and Zhijian Mao. "Study o n Availabilit y and
Security of DHCP System In Camp us Network." 2015
International Conference on Electronic Science and Automation
Control. Atlantis Press, 2015.
[7]. Rahim, Robbi, et al. "Prototype file t ransfer protocol applicat ion
for LAN and W i-Fi communication." Int. J. Eng. Technol 7.2.13
(20 18): 3 45-347.
[8]. Al-Khraishi, Tareq, and Muhannad Quwaider. "Performance
evaluat ion and enhancement of VLAN via wireless networks
using OPNET modeler." arXiv preprint
arXiv:2007.06997 (2020).
[9]. Black, Uyless D. IP routing protocols: RIP, OSPF, BGP, PNNI,
and Cisco routing protocols. Prentice Hall Professional, 2000.
[10]. Gonen, Bilal, and Sushil J. Louis. "Genetic Algorithm finding the
shortest path in Netwo rks." Reno: University of Nevada (2006).
[11]. Shoch, John F., and Jon A. Hupp. "Measured performance of an
Ethernet local networ k." Communica tions of the ACM 23 .12
(19 80): 7 11-721.
[12]. Janitor, Jozef, Frant ek Jakab, and Karol Kniewald. "Visual
learning tools for teach ing/learning computer networks: Cisco
networking academy and packet t racer." 2010 Sixth international
conference on networking and services. IEEE, 2010.
Proceedings of the International Conference on Inventive Computation Technologies (ICICT 2023)
IEEE Xplore Part Number: CFP23F70-ART; ISBN: 979-8-3503-9849-6
979-8-3503-9849-6/23/$31.00 ©2023 IEEE 797
Authorized licensed use limited to: CAMBRIDGE UNIV. Downloaded on October 11,2023 at 15:18:17 UTC from IEEE Xplore. Restrictions apply.
[13]. Pattavina, Achille. Switching Theory. John Wiley Sons Limited,
1998.
[14]. Gentile, Antonio Francesco, Peppino Fazio, an d Giuseppe
Miceli. "A Survey on the Implement ation and Management of
Secure Virtual Private Networks (VP Ns) and Virtual LANs
(VLANs) in Static and Mobile Scen arios." Telecom. Vol. 2. No.
4. MDPI, 2021.
[15]. Naagas, M. A., et al. "Defense-through-deception n etwork
security model: Securing university campus network from
DOS/DDOS attack." Bulletin of Electrical Engineering and
Informatics 7 .4 (2018): 593-600.
[16]. Wang, Xing, and Tao Zhao. "Design and Research of Firewall
Syst em of Communication Department Based on Network
Informat ion Technology." Journal of Physics: Conference Series.
Vol. 2074. No. 1. IOP Publishing, 2021.
Proceedings of the International Conference on Inventive Computation Technologies (ICICT 2023)
IEEE Xplore Part Number: CFP23F70-ART; ISBN: 979-8-3503-9849-6
979-8-3503-9849-6/23/$31.00 ©2023 IEEE 798
Authorized licensed use limited to: CAMBRIDGE UNIV. Downloaded on October 11,2023 at 15:18:17 UTC from IEEE Xplore. Restrictions apply.
Conference Paper
Full-text available
The rapid digitalization of communication necessitates continuous skill updates to keep pace with evolving technology. Network management involves multiple functionalities that play a crucial role in optimizing network performance and ensuring continuous availability. It is very important to ensure a proper network management system for a university that has multiple branches to effectively manage and monitor their network infrastructure. A proper network management system provides centralized control and visibility over the entire network infrastructure, allowing administrators to efficiently manage and monitor network devices, configurations, and performance from a single interface. this research has developed a network management system that facilitates real-time network monitoring and troubleshooting, enabling proactive identification and resolution of issues to ensure smooth operations across all branches. It simplifies configuration management, ensuring consistency and compliance in network settings and updates. Resource optimization is achieved through insights into network utilization and performance metrics, allowing administrators to allocate resources efficiently and plan for future expansion. Security and compliance measures can be enforced, protecting sensitive data and ensuring adherence to regulatory requirements. This study utilized GNS3 to create a network layout for a university with multiple branches, along with essential security configurations for the network design. A diverse range of protocols was implemented to safeguard and cater to the users of the secure university network. Furthermore, Switches, Data Routers, firewalls, and BGP Routers were incorporated into the network to enhance communication efficiency and streamline operations.
Conference Paper
Full-text available
The use of technological tools in various activities in the teaching and learning process in all academic institutions has increased during the pandemic and under the "New Normal" education. President Ramon Magsaysay State University Castillejos Campus (PRMSU) has an existing network structure to cater to both the academic and administrative services of the campus. With the increasing number of users in the network, there is a need to upgrade the existing campus network design to a hybrid network to cater to the needs of the servicing offices. The proposed network design will guarantee the efficiency of quality services, and reliability of network connections and will support network expansion in the future. A collapsed-core architecture was used in the network design. An analysis of the current network design of the campus has been done that serves as the springboard of the proposed network design. The proposed network design consists of a core switch, firewall switch, and the access layer in the distribution of network connections in the whole administrative and academic buildings.
Article
Full-text available
In the past, the structure of traditional firewalls was similar to that of checkpoints, and the design structure was relatively simple. At the same time, it is also convenient for subsequent maintenance. As an isolation technology, it can be accessed by people with consistent identity information. But for some relatively high-level data information, using traditional firewalls, foreign intruders can easily obtain relevant information. This article chooses to use the working mechanism of network information technology, and then analyzes the hardware structure of the firewall based on the IPX2400 processor. Finally, a preliminary design of a firewall system for the communications department based on the IPX2400 processor is implemented, and its packet filtering function is realized.
Article
Full-text available
Nowadays, the demand for connection between the remote offices of a company, or between research locations, and constantly increasing work mobility (partly due to the current pandemic emergency) have grown hand in hand with the quality and speed of broadband connections. The logical consequence of this scenario is the increasingly widespread use of Virtual Private Network (VPN) connections. They allow one to securely connect the two ends of a connection via a dedicated network, typically using the Internet and reducing the costs of Content Delivery Network (CDN) lines (dedicated connections). At the same time, Virtual Local Area Networks (VLANs) are able to decrease the impact of some scalability issues of large networks. Given the background above, this paper is focused on overviewing and surveying the main progresses related to VPNs and VLANs in wireless networks, by collecting the most important contributions in this area and describing how they can be implemented. We state that security issues in VLANs can be effectively mitigated through the combination of good network-management practices, effective network design and the application of advanced security products. However, obviously, the implementation of VPNs and VLANs poses specific issues regarding information and network security; thus some good solutions are also surveyed.
Article
Full-text available
The rapid development of a new generation of information technology and its widespread application in colleges and universities have promoted profound changes in campus informatization. On the one hand, wireless campus networks as the main infrastructure of digital campuses are gradually popularized in domestic colleges and universities, expanding the campus information network coverage. This article is aimed at studying the addition of intelligent algorithms to wireless network communications to optimize and build autonomous mobile learning for cloud education. In order for children to communicate with teachers face to face, no matter where they are, this article proposes how to reduce the energy loss in wireless communication and find the best intelligent algorithm to realize the cloud education mobile learning platform. Experimental results show that the transmission delay of the wireless communication system of this method is significantly shorter than that of the other two methods, close to 5%, which speeds up the data transmission speed of the wireless communication system. It can be implemented under time-sensitive conditions and has high practical application value. The wireless network communication system of this method has a low packet loss rate and less wireless network data transmission errors, which is nearly 10% lower than the other two methods, thereby improving the data transmission power of the wireless communication network.
Article
Full-text available
The network is a massive part of life today. It participates not only on one side of life but in nearly every station, especially in educational organizations. The key aim of education is to share data and knowledge, making the network important for education. In particular, it is essential to ensure the exchange of information; thus, no one can corrupt it. To safe and trustworthy transfers between users, integrity and reliability are crucial questions in all data transfer problems. Therefore, we have developed a secure campus network (SCN) for sending and receiving information among high-security end-users. We created a topology for a campus of multi networks and virtual local area networks (VLANs') using cisco packet tracer. We also introduced the most critical security configurations, the networking used in our architecture. We used a large number of protocols to protect and accommodate the users of the SCN scheme.
Article
Full-text available
The goal of any network infrastructure is high Throughput with minimum delay; all these are achievable by avoiding network traffic congestion. Most network infrastructures use switches to break these bearers of network traffic congestion and collision domain to achieve better Throughput. However, the method is not efficient with an extensive scale network, i.e., wide area network WAN. This paper adopts a virtual local area network (VLAN) that helps to improve Ethernet scalability and segment the network into separate broadcast domains, thereby improving network performance, Throughput, bandwidth utilization, delay, and security by filtering unauthorized groups from accessing resources in another group. The performance of VLAN deployments in the administrative block of Kwara state polytechnic is simulated using Riverbed Modeler Academic Edition. In the investigation, performance metrics like; packet delay, bandwidth utilization, Throughput, traffic sent, and traffic received are compared with a conventional case of no VLAN deployment. The simulation results show that VLAN performs better in all the matrices tested.
Article
Full-text available
A VLAN is a logical connection that allows hosts to be grouped together in the same broadcast domain, so that packets are delivered only to ports that are combined to the same VLAN. We can improve wireless network performance and save bandwidth through the characteristic VLAN network. In addition, the implementation of VLAN greatly improves wireless network security by reducing the number of hosts receiving copies of frames broadcast by switches, thus keeping hosts holding critical data on a separate VLAN. In this paper we compare wireless network with VLAN via wireless network. The proposed network is evaluated within terms of delay and average throughput using web browsing applications and file transfer in heavy traffic. The simulation was carried out using OPNET 14.5 modeler and the results show that the use of VLAN via wireless network improved performance by reducing traffic resulting in a minimized delay time. Furthermore, VLAN implementation reduces network throughput because the traffic received and transmitted has a positive relationship with throughput. Eventually, we investigated the use of adhoc routing protocols such as AODV, DSR, OLSR, TORA and GPR to improve the performance of wireless VLAN networks.
Article
Full-text available
Nowadays, network security incidents often occur, such as network worms, denial of service attacks, network fraud and so on. Nowadays, the methods of network security incidents are constantly innovating, resulting in data leakage, destruction and other incidents. Campus network is the basis of daily teaching, scientific research and normal operation of schools. It is of great significance to strengthen the construction of campus network security. Based on this, this paper studies the campus network security.
Conference Paper
Full-text available
Denial of Service (DOS) and (DDOS) Distributed Denial of Service attacks have become a major security threat to university campus network security since most of the students and teachers prepare online services such as enrolment, grading system, library etc. Therefore, the issue of network security has become a priority to university campus network management. Using online services in university network can be easily compromised. However, traditional security mechanisms approach such as Defense-In-Depth (DID) model is outdated in today’s complex network and DID model has been used as a primary cybersecurity defense model in the university campus network today. However, university administration should realize that Defense-In-Depth (DID) are playing an increasingly limited role in DOS/DDoS protection and this paper brings this fact to light. This paper presents that the Defense-In-Depth (DID) is not capable of defending complex and volatile DOS/DDOS attacks effectively. The test results were presented in this study in order to support our claim. The researchers established a Defense-In-Depth (DID) Network model at the Central Luzon State University and penetrated the Network System using DOS/DDOS attack to simulate the real network scenario. This paper also presents the new approach Defense-through-deception network security model that improves the traditional passive protection by applying deception techniques to them that give insights into the limitations posed by the Defense-In-Depth (DID) model. Furthermore, this model is designed to prevent an attacker who has already entered the network from doing damage. © 2018 Institute of Advanced Engineering and Science. All rights reserved.
Article
Full-text available
FTP (File Transfer Protocol) is one of the earliest Internet protocols developed. An FTP server can be accessed by using a URI (Univer-sal Resource Identifier), using FTP file exchange between client and server is easier to do because the communication is done directly without going through an intermediary, for communication using FTP need to be designed an application that allows communication between the client and server directly without using the browser, for it is designed an FTP application using programming language in this case is Borland Delphi programming language, the ease of sending files between computers based on IP is a value added from the FTP application that is designed because most existing FTP applications can only send files between the server and the client in the in-ternet network means that online must not be local area network or wide area network.