Proceeding
Design and Simulation VLAN Using Cisco Packet Tracer: A Case Study Honnia) and Johanes Fernandes Andry b) 1, a)
Bunda Mulia University Faculty of Technology and Design Jl. Lodan Raya No. 2 Ancol Pademangan Jakarta Utara 14430 Jakarta Indonesia a)
Corresponding author:
[email protected] b)
[email protected]
Abstract.This This paper relates the part of a cisco packet tracer for a case study to design and simulation virtual local area network. In this case study was carried out aimed at implemen implementing the method LAN-Switching Switching using VLAN to break up broadcast domains into segments, so as to improve network performance. It additionally makes educating simpler, understudies and instructor can make their own particular situation based labs also, gives genuine reproduced and representation environment cisco packet tracer has part of components to make different situation based labs. The discoveries of this study reason that there are different advantages and focal points of utilizing a cisco packet tracer trace as a part of learning fundamental and critical ideas of configuration and reproduction virtual local area network. It is a simple and easy to use device to comprehend different ideas of computer networks. Keywords.Design, Design, simulation, virtual local area network, VLAN, LAN-Switching, Switching, cisco packet tracer, a case study, computer networks.
INTRODUCTION Network designs, encompasses all areas of human enterprise. We find networks in the home, marketplace, offices and schools making it possible for resources to be shared in a consolidated platform. Networking plays a critical role in business performance of any organization. Efficiency and communication is guaranteed in a wellwell designed network (Kelechi et al., 2014). The network based on TCP/IP protocol permits the efficient routing of data packets based on their IP address. Routers are used in the network to control and forward data (Nazumudeen and Mahendran, 2014). Most of the Organizations such as public and private sectors have started deploying computers to their employees to perform their daily work and access resources from their network. This technology has enabled to operate their businesses much faster and more conveniently and also make easy for the organization; there are some problems still faced by the he organization such as poor network design (Kelechi et al., 2014). CISCO’s VLAN trunking protocol reduces administration in a switched network (Verna, 2013). VLAN is one of the security mechanisms that can solve the authentication problem. VLANs also offer offe r network operators flexibility for specifying management and security policies within an enterprise and allow operators to implement some level of isolation by separating hosts into different broadcast domains (Ameen and Nourildean, 2013). VLANs can help reduce network traffic by forming multiple broadcast domains, to break up a large network into smaller independent segments with fewer broadcasts being sent to every device on the overall network (Tambe, 2015). 2015) This paper indicates to redesign Local Area Network etwork by using VLAN and ACL solution (Shaffi and Al Al-Obaidy, 2012).
TEORITICAL BACKGROUND Vlan Networking What happens if we need a virtual connection between two stations belonging to two different physical LANs? A virtual local area network (VLAN) is de defined fined as a local area network configured by software, not by physical wiring.
66
Proceeding
Virtual LANs (VLANs) have recently developed into an integral feature of switched LAN solutions from every major LAN equipment vendor (Pal and Pal, 2013). 2013) In networking, a LAN hass a single broadcast domain and the traffic from a workstation reaches other workstations on the LAN through the broadcast. This is not desirable as certain classified information can be received by unauthorized parties. Also, if the broadcast is not well contained, it can lead to collision in the network (Alimi and Mufutau, 2015). Virtual LAN technology is used in the design of internal networks of universities, organizations and enterprise networks. VLAN is a data link layer technology for building multiple multip le logical networks on the top of physical network. The LAN network is divided into different logical segments called broadcast domains. The workstation division is based on the functions, platforms and teams (Suji and Sekar, 2015).. Virtual LAN is nothing but a group of devices that are connected virtually but may or may not physically connected (Thivikram, 2016).Virtual 2016) LAN or VLAN allows network engineers and network administrators to make logical network from physical network. This technology is used to segment a complex network into smaller networks for better manageability, improved performance and security (Shaffi and Al-Obaidy, Al 2012).
Cisco Packet Tracer Packet Tracer is virtual networking simulation software developed by Cisco, to learn and understan understand various concepts in computer networks (Javid, 2014). 2014). Cisco Packet Tracer is a powerful network simulation program that allows students to experiment with network behavior and ask “what if” questions. As an integral part of the Networking Academy comprehensive nsive learning experience, Packet Tracer provides simulation, visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching and learning of complex technology concepts (Dangwal and Kumar, 2014). 2014) Like any simulation, Packet et Tracer relies on a simplified model of networking devices and protocols. It provides a simulated environment where processes between various networking devices, such as routers, switches, wireless access points, computers, links and applications are visible vis with animations and easy explanatory descriptions (Nazumudeen and Mahendran, 2014). Virtual Trunking Protocol (VTP) has some issues but not much research has been done for complexities arise in VTP based configuration. In this paper, we focus strongly on various security aspects of VLAN design using with VTP to reduce the much administrative administrat work apart from optimal Inter-VLAN VLAN routing design (Verna, 2013).
Routing The term routing is used for taking a packet from one device and sending it through the network to another device on a different network. Routers don’t really care about hosts they the y only care about networks and the best path to each network (Sharma and Padda, 2012). 2012). Routing on IPv6 can be done through the use of static routes and dynamic routing protocols. Static routes are manually defined by the administrator so the router learns about a remote network, are usually used when the routing is from a network to a single connection network; a single connection network is a network accessible by only one route (Rosado et al., 2012). A Routing Protocol is a protocol that specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network. Routing algorithms are responsible for selecting the best path for the communication a border way we can say that A routing protocol is the language a router speaks with other routers in order to share information about the reach ability and status of network. Routing is often contrasted with bridging (Archana, 2015).
RESEARCH METHOD Starting of this research is to conduct conduct data collection, using observation techniques, to inventories existing network equipment and computer hardware devices and software tools are used. The next step is to interview relevant parties, in this case is a computer lab coordinator who is dir directly ectly responsible for the conditions that exist in the computer lab. After getting all the information about the devices used and the activities running on a research, further research from the literature to study the problems faced in order to identify th thee problem as a whole. The proposed development method will design into a new network topology that uses an application Cisco Packet Tracer network simulation. The design of this new network solution that emphasizes efficiency, because the devices will stilll be used, without having to replace the whole. The next step is a simulation of the new network to test if the method proposed development has been solving the problems that exist in the computer lab. Evaluation of the
67
Proceeding
results of the simulation to be important important in proving that the proposed method possible to have an increase in accordance with the objectives of this research, namely to increase the performance and security on the LAN.
RESULT AND DISCUSSION One of such key performance indicator is how flexib flexible le a network can be without a compromise on its objective. It combines hardware, software, cables, operating systems, switches, routers, hubs for communication to take place (Verma, 2013). Hierarchical model is employed in LAN designs. In a hierarchical model mo del designs are done in layers.
Implementation VLAN The “FIGURE 1.” Existing Design of Network Topology indicates the existing organization infrastructure and “TABLE 1.”” List Devices and Allocate IP Address.
FIGURE 1. Existing Design of Network Topology
TABLE 1. List Devices and Allocate IP Address
68
Proceeding
Server = 192.168.1.1 Router0 = 192.168.2.1(0/0) - 192.168.1.20 (0/1) Router1 = Router2 = 192.168.3.1(0/0) - 192.168.1.1 (0/1) PC0 = 192.168.1.2, PC1 = 192.168.1.3 PC2 = 192.168.1.4, PC3 = 192.168.1.5 PC4 = 192.168.1.6, PC5 = 192.168.1.7 PC6 = 192.168.1.8, PC7 = 192.168.1.9 PC8 = 192.168.1.10, PC9 = 192.168.1.11
Many experiment on all PCs, servers and routers, it was found that the results of all PCs, servers and routers are Request Time Out (RTO), this indicates that the existing network topology in the organization as in show in “FIGURE 1.” Design Network Topology already setting IP address, cannot be connected. Already done the experiment several times, by changing the IP address, but tthe he result is the RTO which means it can be connected on the network topology. Therefore, the author planned the topology to replace those that are running.
Proposed Recommendation of Network Topology Due to the design topology that is running cannot connect, connect, it will be changed the design of the above with the design of the new topology, can be seen in ““FIGURE 2.”.. Proposed Recommendation of Network Topology, of course, by maximizing existing devices.
FIGURE 2. Proposed Recommendation of Network Topology
The case, author must initiation 2 vlan: 1. Vlan 20 for staff 2. Vlan 30 for management Command in Switch:
69
Proceeding
Switch>enable Switch#vlan database Switch(vlan)#vlan 20 name staff Switch(vlan)#vlan 30 name management Switch(vlan)#exit Switch#sh vlan After setting dan write sh vlan, and show windows like this:
FIGURE 3. Vlan Still Active
Now, put in CLI on Router, write no, For vlan 20, Router>enable Router#configure terminal Router(config)#interface fa 0/0.20 Router(config-subif)#encapsulation subif)#encapsulation dot1q 20 Router(config-subif)#ip subif)#ip address 192.168.10.254 255.255.0.0 Router(config-subif)#exit Then vlan 30, watch this, Router>enable Router#configure terminal Router(config)#interface fa 0/0.30 Router(config-subif)#encapsulation subif)#encapsulation dot1q 30 Router(config-subif)#ip address 192.168.1.254 255.255.255.0 Router(config-subif)#exit Router(config)#interface fa 0/0 Router(config)#no shutdown Last, author must setting port router, input mode trunk in switch Switch>enable Switch#configure terminal Switch(config)#interface fa 0/24 Switch(config)#switchport ch(config)#switchport mode trunk Switch(config)#exit
70
Proceeding
Testing Functionality Network simulation proposed recommendation of Topology will be made using Cisco Packet Tracer application and process simulation represents all components of the existing. Process simulations to be carried on are: Test the broadcast packets that will be sent to prove the performance of the network and o test the security of servers from outsiders (un trust zone) to prove the level of network security. TABLE 2. Testing Simulation by Cisco Packet Tracer
1.
2.
Host to Host Testing VLAN 20 Test Name Host to Host (VLAN 20) To ensure that there is communication between PC2 until PC9, in router01 LAN VLAN 20, Test Target because servers existing in this VLAN Source IP 192.168.1.3 Destination 192.168.1.4, 192.168.1.5, 192.168.1.6, 192.168.1.7, 192.168.1.8, 192.168.1.9 IP Technique By sending Packet from Packet Tracer or by using Ping Functionality. Expected
Successful
Actual Result
Successful, there is communication between PC2 until PC9 in range VLAN 20
Comment
To enable routing, we should maintain ip route command in router02.
Host to Host Testing VLAN 20 Test Name Test Target Source IP Destination IP Technique
3.
Host to Host (VLAN 30) To ensure that there is communication between PC1 and PC10, in router01 and router3 LAN VLAN 30, because servers existing in this VLAN 192.168.1.2 192.168.1.10 By sending Packet from Packet Tracer or by using Ping Functionality.
Expected
Successful
Actual Result
Successful, there is communication between PC2 until PC9 in range VLAN 30
Comment
To enable routing, we should maintain ip route command in router01 and route 03.
Routing Functionality Test Name Test Target Source IP Destination IP Technique
Routing Functionality To ensure that there is communication between router 01, router02 and router03, because server existing in this VLAN 192.168.1.1 192.168.2.1, 192.168.3.1 By sending Packet from Packet Tracer or by using Ping Functionality.
Expected
Successful
Actual Result
Successful, there is communication between router 01, router02 and router03
Comment
To enable routing, we should maintain ip route command in router01 and route 03.
71
Proceeding
CONCLUSIONS Based on the currently of the network as show in Figure 5, VLAN cannot and fulfilled connected because it does not run at layer 3 (router) but runs on layer 2 (switch). This paper is more helpful to the organization for the effective implements of VLAN and an to enhance network security by keeping devices that operates with sensitive information on a separate VLAN. Implementation of VLAN that brings the features of Inter-VLAN VLAN and Access Control List (ACL), the level of network security in the Lab increased. Inter-VLAN VLAN can connected different network segments or VLAN to meet the demand for access to VLAN Server. It is expected that this new network topology can be implemented to optimize network resources that have applied the method but the LAN LAN-Switching network rk devices that use the device still manageable. The key element to the InterVLAN routing service is that you must have at least one VLAN interface configured with an IP Address on the InterVLAN capable switch.
REFERENCES 24. E. Kelechi, N. Stanley and N. Uchenna, “Evaluation of Network Architecture and Its Implication on Connectivity and Data Security,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 2, Issue. 12, pp. 3945 3945-3950, 2014. 25. N. Nazumudeen and C. Mahendran, “Performance Analysis of Dynamic Routing Protocols Using Packet Tracer,” International Journal of Innovative Research in Science, Engineering and Technology, vol. 3, Special Issue 1, pp. 570-574, 2014. 26. A. S. Shaffi and M. Al-Obaidy, Obaidy, “Effective Implementation of VLAN and ACL in Local Area Network,” International Journal of Information Technology and Business Management, vol. 4, no. 1, pp. 46 46-52, 2012. 27. R. O. Verma, “Effective Remote Management for Inter Inter-VLAN VLAN Routing Networks,” Networks International Journal of Application or Innovation in Engineering & Management, Special Issue for National Conference On Recent Advances in Technology and Management for Integrated Growth, 2013. 28. S. Y. Ameen and S.W. Nourildean, “Wireless Local Area Netw Network ork VLAN Investigation and Enhancement Using Routing Algorithms,” International Journal of Engineering and Advanced Technology, vol. 3, Issue 2, pp. 260-263, 2013. 29. S. S. Tambe, “Understanding Virtual Local Area Networks,” International Journal of Engineering Engineeri Trends and Technology, vol. 25, no. 4, pp. 174 174-176, 2015. 30. G. P. Pal and S. Pal, “Virtual Local Area Network (VLAN),” International Journal of Scientific Research Engineering & Technology,” vol. 1, Issue10, pp. 006 006-010, 2013. 31. I. A. Alimi and A. O. Mufuta Mufutau, u, “Enhancement of Network Performance of an Enterprises Network with VLAN, “American Journal of Mobile Systems, Applications and Services, vol. 1, no. 2, pp. 82 82-93, 2015. 32. S.V. Suji and G.Sekar, “Design and Implementation of Secured HSRP Protocol using VLAN,” VLA International Journal of Digital Communication and Networks, vol. 2, Issue 1, pp. 9-11, 9 2015. 33. G. Thrivikram, “Implementation of Virtual LAN (VLAN) using Layer3 Switches,” International Journal of Advance Research in Computer Science and Management Studies, vol. 4, Issue 3, pp. 114-120, 114 2016. 34. S. R. Javid, “Role of Packet Tracer in learning Computer Networks,” International Journal of Advanced Research in Computer and Communication Engineering,” vol. 3, Issue 5, pp. 6508 6508- 6511, 2014. 35. K.Dangwal and V.. Kumar, “Comparative Study of EIGRP and RIP Using Cisco Packet Tracer,” International Journal of Engineering Sciences & Emerging Technologies, vol. 6, Issue 6, pp. 475475 480, 2014. 36. E. A. Sharma and E. S. Padda, “Configuring an EIGRP based Routing Model,” International In Journal of Scientific and Research Publications, vol. 2, Issue 2, pp. 11-4, 2012. 37. L.V. Rosado, L. N. Díaz, C. G. Segura and V. C. Pech, “Design and Simulation of an IPv6 Network Using Two Transition Mechanisms,” International Journal of Computer Compute r Science Issues, vol. 9, Issue 6, no. 1, pp. 6060 65, 2012. 38. C. Archana, “Analysis of RIPv2, OSPF, EIGRP Configuration on router Using CISCO Packet tracer,” International Journal of Engineering Science and Innovative Technology, vol. 4, Issue 2, pp. 215-222, 215 2015. 39. “InterVLAN Routing–Routing Routing between VLAN Networks” Available:http://www.firewall.cx/networkingAvailable:http://www.firewall.cx/networking topics/vlan-networks/222-intervlan intervlan-routing.html.
72