Beruflich Dokumente
Kultur Dokumente
PROJECT FILE
ON
BACHELOR OF ENGINEERING
IN
COMPUTER SCIENCE & ENGINEERING
1
IMPLEMENTATION OF VLAN ON PACKET TRACER
ACKNOWLEDGEMENT
We would like to express our special thanks of gratitude to our teacher who gave me the
golden opportunity to do this wonderful project on the topic on vlan implementation of
packet tracer , which also helped us in doing a lot of research and we came to know
about so many new things .we are really thankful to them.
Again we would also like to thank friends who helped us a lot in finalizing this project
within the limited time frame.
This project really helped us to learn skills of networking and its functionality. I gained a
lot of knowledge while completing this project.
At last we are thankful to each and every person who helped us in completing this
project.
2
IMPLEMENTATION OF VLAN ON PACKET TRACER
ABSTRACT
3
IMPLEMENTATION OF VLAN ON PACKET TRACER
List of Figures
3 ER diagram xiv
4 Working diagram xv
Table(1)
4
IMPLEMENTATION OF VLAN ON PACKET TRACER
Table of Contents
Acknowledgement
ii ii
iii Abstract iii
iv List of figures iv
v Table of contents v
Table(2)
CHAPTER 1- INTRODUCTION
5
IMPLEMENTATION OF VLAN ON PACKET TRACER
1.1 Introduction:
The need for computer networking was borne out of the need to use personal computers
for sharing information within an organization in form of messages, sharing files and data
bases and so forth. Whether the organization is located in one building or spread over a
large campus, the need for networking the computers cannot be over emphasized. As the
name implies, a Local Area Network (LAN) interconnects computers in a limited
geographic area. It provides high-bandwidth communication over inexpensive
transmission media .The corporate LAN has evolved from a passive background business
component to a highly active, visible core asset that enterprises rely on to support day-to-
day operations critical to their market success. Today’s network is a strategic instrument
that must be accessible anytime from anywhere-simultaneously offering fast, secure,
reliable services at scale regardless of location [2]. The main purpose of a network is to
reduce isolated users and workgroups. All systems should be capable of communicating
with others and should provide desired information. Additionally, physical systems and
devices should be able to maintain and provide satisfactory performance, reliability and
security. Resource sharing is probably equally of immense importance where a LAN
serves as the access vehicle for an intranet or the Internet . In view of this, system
managers need professional tools to help them with the design and maintenance of
LANs . A simulation tool offers a way to predict the
impact on the network of a hardware upgrade, a change in topology, an increase in traffic
load or the use of a new application. So in this paper, a LAN network is designed using
Cisco Packet Tracer. Cisco Packet Tracer (CPT) is a multi-tasking network simulation
software that can be used to perform and analyze various network activities such as
implementation of different topologies, selection of optimum path based on various
routing algorithms, creation of appropriate servers, subnetting, and analysis of various
network configuration and troubleshooting commands. In order to start communication
between end user devices and to design a network, we need to select appropriate
networking devices like routers, switches, hubs and make physical connection by
6
IMPLEMENTATION OF VLAN ON PACKET TRACER
connecting cables to serial and fast Ethernet ports from the component list of packet
tracer. Networking devices are costly so it is better to perform first on packet tracer to
understand the concept and behavior of the network. The paper describes how the CPT
tool can be used to develop a simulation model of the LAN. The study provides an insight
into Design and Simulation of Local Area Network Using Cisco Packet Tracer various
concepts such as topology design, IP address configuration and how to send information
in form of packet in a single network and the use of Virtual Local Area Networks
(VLANs) to separate the traffic generated by the different departments. VLANs are a new
type of LAN architecture using intelligent, high-speed switches. The simulation results
and performance analyses showed that the design was successful. The rest of the paper is
organized as follows: Section 2 discusses the different LAN topologies. This is followed
by a discussion in section 3 on the different types of transmission media. The concept of
IPv4 addressing and subnetting is presented in the development of the LAN simulation
model is presented; while section 7 presents the model’s simulation and results analyses.
.
1.2 Field Of Project:
VLANs are a new type of LAN architecture using intelligent, high-speed switches.
Unlike other LAN types, which physically connect computers to LAN segments, VLANs
assign computers to LAN segments by software. VLANs have been standardized as
IEEE802.1q and IEEE802.1p. There are two basic designs of VLANS. They are: Single-
switch VLANs and Multiswitch VLANs
7
IMPLEMENTATION OF VLAN ON PACKET TRACER
With single switch VLANs, computers are assigned to VLANs using special software,
but physically connected together using a large physical switch. Computers can be
assigned to VLANs in four ways:
Port-based VLANs assign computers according to the VLAN switch port to which they
are attached
MAC-based VLANs assign computers according to each computer’s data link layer
address
Multiswitch
VLANs send packets between multiple switches, making VLANs with segments in
separate locations possible. When a frame is sent between switches it is modified and
includes a tag field carrying VLAN information field. When the frame reaches the final
switch, the tag field is removed prior to the frame being sent to its destination computer.
Multiswitch VLANs can also prioritize traffic .1p standard in the hardware layers and the
RSVP standard in the internetwork layers. IEEE802.1p works with the IEEE802.11ac
frame definition which includes a special priority field.
Because of the problems described above that are inherent in deploying large, flat
networks, ATN made an implementation of virtual networking a requirement for vendors'
bids when preparing the new design in 1995 (Gogan, 1997). While the product lines of
8
IMPLEMENTATION OF VLAN ON PACKET TRACER
several vendors were examined and evaluated, the University selected Cabletron
Systems, Inc. and their SecureFast technology as being the best solution for ATN's
purposes (Gogan, 1997). While several reasons for the selection were listed, Cabletron's
VLAN implementation set it apart from competing vendors. SecureFast allowed port,
MAC layer, protocol, and multicast grouping in its VLANs, while other vendors
implemented port-based VLANs only, based on IEEE 802.1Q or similar, proprietary
systems. While VLANs of that type would be generally useful, they would not address
the mobile-computing needs of University affiliates. However, the ATN employee
admitted that having multiple membership mechanisms created its own set of policy
issues. For example, if a user who is a member of a MAC-based VLAN connects her or
his machine to a port that is a member of a separate, port-based VLAN, which takes
precedence.
1.4 Purpose:
Though private vlans could be used as a solution, that may be beyond the scope of this
CCNA based discussion. Lets go back in time to the old days. A LAN was defined as a
local area network,a broadcast domain. All devices would be able to broadcast to each
other and receive broadcasts from each other. In the old days, if you wanted to separate
devices from hearing these broadcasts, you got a 2nd hub, a 2nd cable and literally made
a 2nd LAN. Heck, the military still does this in some deployments. With the advance of
technology, a way was devised to give the same result of separating certain devices from
hearing broadcasts, but use one cable and one switch. Thus the Virtual LAN was born. It
started out as being used to split up large broadcast domains, which then facilitated the
need to route in between the 2 LANs. Broadcast traffic was then kept out of the
unwanted LAN. However, routed traffic could still cross.I realize that in the technology
world that this is ancient history, but it is the beginning of the purpose of a vlan. Today,
with the requirements of businesses, vlans are the norm. Layer3 switches route in
between their vlans and will probably have ACLs to limit the routed traffic that may be
permitted to cross between vlans. Remember that security doesn't just reside in he
9
IMPLEMENTATION OF VLAN ON PACKET TRACER
network with ACLs and firewalls. It spans to the servers, GPOs, file system rights and
the like. Security needs to be a layered approach that vlans and ACLs are only a small
part.
1.5 Functionality:
1.6 Milestones:
1. Facade Application showing screen and with temporary transitions and text :
10thapril 2019
10
IMPLEMENTATION OF VLAN ON PACKET TRACER
CHAPTER 2- SRS
Hardware requirements:
Core i5(Processor)
4 GB RAM
3 MB Cache memory
Hard Disk 10GB
Software requirements
Operating System: Windows xp
Windows 10
Packet tracer
11
IMPLEMENTATION OF VLAN ON PACKET TRACER
Front-End:
As we know that such computer language can be use in software development, which
must have the following criteria
Easy To Learn
Convenient in coding
Easy To use control structure
Lesser input provides larger output
Highly efficient and productive
Compatibility with other language and other tools
Support latest technologies
Provides flexibility etc.
User Interface:
Functionality represented.
Networking
12
IMPLEMENTATION OF VLAN ON PACKET TRACER
CHAPTER-3
3.1 Structured diagram for project:
Fig(1)
Fig(2)
13
IMPLEMENTATION OF VLAN ON PACKET TRACER
Fig(3)
3.4Working diagram:
So far you’ve been using the console to run code. That’s a great place to start, but
you’ll find it gets cramped pretty quickly as you create more complex ggplot2 graphics
and dplyr pipes. To give yourself more room to work, it’s a great idea to use the script
editor. Open it up either by clicking the File menu, and selecting New File, or using
the keyboard shortcut Cmd/Ctrl + Shift + N. Now you’ll see four panes:
14
IMPLEMENTATION OF VLAN ON PACKET TRACER
Fig(4)
The script editor is a great place to put code you care about. Keep experimenting in the
console, but once you have written code that works and does what you want, put it in
the script editor. RStudio will automatically save the contents of the editor when you
quit RStudio, and will automatically load it when you re-open. Nevertheless, it’s a
good idea to save your scripts regularly and to back them up.
15
IMPLEMENTATION OF VLAN ON PACKET TRACER
CHAPTER-4
Methodology
This project is a combination of a descriptive and a case study. As such, the research
methodology concentrated primarily on fact gathering and interpretation rather than
experimentation and data analysis. Background information was taken from the literature.
This information including theory on the design and implementation of local area and
wide area networks (WANs), concentrating on large, flat switched networks, common
problems in the implementation of such networks, and a description of VLAN solutions
in general and the Cabletron Systems, Inc. VLAN technologies in particular. This
information formed the basis for the first portion of the paper. Information for the second
portion, dealing with the UNC-CH experience with VLANs, came from two sources:
ATN documentation and interviews with ATN personnel who were involved in the design
and implementation of VLAN technology at UNC-CH.
Networking Issues
While the Ethernet-based LAN has proven to be a robust and scalable network
architecture, it does have limitations. As the number of users grows, the number of
protocols in use on the network increases, and/or users become more geographically
dispersed, a simple Ethernet LAN cannot be counted on to perform adequately. To
illustrate, let us start with a small LAN and then observe what happens as it grows. The
initial LAN configuration is five users and a central file server. These machines are all in
a small office, and can be connected using a simple Ethernet LAN as shown. For the sake
of argument, let us assume they all use the same protocols for layer 3 and4.
All is well until another group of users wants to be connected to the same LAN. They are
relatively far away from the original workgroup. Lengthening the LAN cable may or may
16
IMPLEMENTATION OF VLAN ON PACKET TRACER
not work, as it can only be a certain length. If they are too far away, a solution is to
connect the two sets of users through a repeater, which regenerates the signals on the
cable and allows a greater distance between groups.
Adding a repeater solves the distance problem, but the increased number of users on the
network increases the potential for collisions. The network could become unusable at
times because of the high collision rate. One solution: install a bridge to divide the
network into two separate collision domains. Collisions on one side do not affect users on
the other side.
This solution still leaves the problem of broadcasts. Broadcasts in and of themselves are
not a problem; as discussed above they are necessary for the operation of most protocols
(Martin et al., 1994). However, broadcasts used by one protocol are a waste of bandwidth
and processing time for stations using other protocols. Each station must process
broadcast packets to determine whether or not they should take action. Bridges and
switches always pass broadcast packets to all attached stations. As an example, suppose
we have the two workgroups as before, separated by a bridge with a port for each
workgroup. Let us further suppose that two protocols are in use: TCP/IP and IPX/SPX
(which is a much "chattier" or broadcast dependent protocol). If one group uses TCP/IP
exclusively (the workgroup with the server) and the other group uses both TCP/IP and
IPX/SPX, then the bridge can be programmed to only allow TCP/IP traffic to cross.
However, if the second group uses IPX/SPX exclusively, then they will be unable to
communicate with the server, even if it is configured to speak both IPX/SPX and TCP/IP.
17
IMPLEMENTATION OF VLAN ON PACKET TRACER
If both groups have a mixture of Switch 24 TCP/IP and IPX/SPX machines, the NetWare
machines would be unable to communicate across the bridge. If a switch were in use, the
situation would be even worse. If the switch filters IPX/SPX traffic, then none of the
machines using IPX/SPX would be able to communicate, even with each other, since all
traffic would go through the switch. In such a case, the only solution may be to separate
the networks using a router instead of a switch. This solution will stop the general
broadcasts from going through, but can still enable broadcast-dependent protocols like
IPX/SPX to operate across the router boundary, given the proper configuration. However,
routers are much more expensive than switches, and are slower in their processing. Also,
some protocols such as NetBEUI are not routable, so devices using these protocols
cannot communicate across many routers.
The examples thus far have examined a relatively small network. The problems discussed
are compounded greatly when the network in question encompasses dozens, hundreds, or
even thousands of devices, as is more and more common in business and on college
campuses. For maximum flexibility a network should be "flat," with all stations ideally
on a single LAN, or at least separated only by bridges/switches (Roese, 1998). However,
as the examples above demonstrate, such a network would most likely operate poorly,
unless large amounts of resources, both money and time, are spent on its design and
configuration. Large, flat networks have their own set of problems, as well; the
algorithms used by switches to prevent "loops" in the network, such as Spanning Tree,
can lead to inefficiencies in packet transmission. Spanning Tree requires that the switches
on a flat network determine the one best loop-free route for packets to travel, rather than
taking advantage of the multiple possible routes available. Without Spanning Tree,
however, loops in the network can lead to "broadcast storms," where a single broadcast is
repeated over and over, wasting bandwidth at best and causing network failures at worst.
Ambiguous traffic on looped topologies can also cause individual switches to
"misunderstand" the actual layout of the network (Roese, 1998). The solution in today's
networks of separating groups of users by bridges, switches, and routers solves one set of
problems but introduces another: users who for logical reasons, such as organizational
18
IMPLEMENTATION OF VLAN ON PACKET TRACER
affiliation, protocol use, or resource needs, should be on a single LAN, are instead
separated into different networks. Roese (1998) identifies making "moves, adds, and
changes" as the single biggest problem in such networks, since such operations are often
quite costly in terms of the networking authority's resources, to say nothing of the lost
productivity while the end user waits for the time-consuming process to be completed.
Virtual Local Area Networks provide the capability to deploy a flat, switched network
that allows users to be grouped together logically, while preventing the broadcast,
collision, security, and other problems associated with large, flat networks.
Need of VLAN
1. To create more flexible designs that group users by department, or by groups that work
together instead of by physical location.
3. To reduce the workload for the Spanning Tree Protocol (STP) by limiting a VLAN to a
single access switch.
4. To ensure better security by keeping hosts that work with sensitive data on a separate
VLAN.
5. To separate traffic sent by a IP phone from traffic sent by PCs connected to the phones.
6. A proper VLAN design can ensure that only devices that have that VLAN defined on it
will receive and forward packets intended as source or destination of the network flow.
7. VLAN's can be used to create broadcast domains which eliminate the need for
expensive routers.
8. We can break apart our network as needed without having to go and move cables
around; if we used different switches for each group then we would have many more
19
IMPLEMENTATION OF VLAN ON PACKET TRACER
switches and much more cabling in place to support them. 9. VLANs allow QoS
measures to be taken on devices normally fighting for shared bandwidth.
Advantages of VLAN
Performance
Simplified Administration
70% network costs are a result of adds, moves, and changes of users in the network.
Every time a user is moved in a LAN, new station addressing, and reconfiguration of
hubs and routers becomes necessary. Some of these tasks can be simplified with the use
of VLAN's. If a user is moved within a VLAN, reconfiguration of routers is unnecessary.
In addition, depending on the type of VLAN, other administrative work can be reduced or
eliminated. VLAN's is a tool that created which can allow network managers to drag and
drop users into different VLAN's or to set up aliases.
VLANs can reduce the migration cost of stations going from one group to another.
Physical reconfiguration takes time and is costly. Instead of physically moving one
20
IMPLEMENTATION OF VLAN ON PACKET TRACER
station to another segment or even to another switch, it is much easier and quicker to
move it by using software. 20 Broadcast Control Broadcasts are required for the normal
function of a network. Many protocols and applications depend on broadcast
communication to function properly. A layer 2 switched network is in a single broadcast
domain and the broadcasts can reach the network segments which are so far where a
particular broadcast has no scope and consume available network bandwidth. A layer 3
device (typically a Router) is used to segment a broadcast domain.
VLANs can be used to create virtual work groups. For example, in a campus
environment, professors working on the same project can send broadcast messages to one
another without the necessity of belonging to the same department. This can reduce
traffic if the multicasting capability of IP was previously used.
Security
VLANs provide an extra measure of security. People belonging to the same group can
send broadcast messages with the guaranteed assurance that users in other groups will not
receive these messages.
VLANs are transparent on the physical topology and medium over which the the network
is connected.
21
IMPLEMENTATION OF VLAN ON PACKET TRACER
CHAPTER-5
1.1 Screenshots:
22
IMPLEMENTATION OF VLAN ON PACKET TRACER
23
IMPLEMENTATION OF VLAN ON PACKET TRACER
24
IMPLEMENTATION OF VLAN ON PACKET TRACER
CHAPTER-6
Conclusion
Network design has been and will be a process based on compromise. No one design
offers a complete, perfect solution. While the deployment of flat, switched networks has
definite advantages, such networks have problems not found in other architectures. The
use of VLAN technology in a switched network can minimize or even eliminate these
problems, allowing enterprises to make use of this topology without losing as much or
more than they gain. The University of North Carolina at Chapel Hill has made a
commitment to using VLAN technology over a flat network fabric. While this decision
has caused problems, and requires a much closer relationship with a single vendor than
has traditionally been required in an academic IT environment, overall the system has
done everything the University has wanted it to do. It has also increased performance,
improved network security and reduced the resources needed to manage the network.
25
IMPLEMENTATION OF VLAN ON PACKET TRACER
It is difficult to project the future of VLANs, o say the least. While the technology does
have great potential, the fractured nature of the current landscape in terms of multiple
implementations with limited or no interoperability severely limits the growth rate of
VLAN implementation. The single proposed standard currently available only partially
addresses this problem. However, should the standard be improved or, as with other
technologies, a single vendor or consortium of vendors develops an implementation
which becomes the de facto standard, VLAN technology should find its way into most if
not all enterprise networks. With their capability to resolve the problems that hamper the
otherwise excellent flat network topology, VLANs can enhance network performance and
security while reducing management overhead.
26
IMPLEMENTATION OF VLAN ON PACKET TRACER
CHAPTER-7
References
Baker, R. H. (1995). Network security: How to plan for it and achieve it. New York:
McGraw-Hill, Inc.
Chappell, L. A. and Hakes, D. E. (1994). Novell’s guide to NetWare LAN analysis. 2nd
ed. Alameda, CA: SYBEX Inc.
Derfler, F. J. and Freed, L. (1996). How Networks Work. 2nd ed. Emeryville, CA: Ziff-
Davis Press, Inc.
Designing with Smart Networking Services: A Smart Network VLAN design guide from
Systems Engineering. (1998). Rochester, NH: Cabletron Systems, Inc.
27
IMPLEMENTATION OF VLAN ON PACKET TRACER
Architectures and implementations. 2nd ed. New Jersey: P T R Prentice Hall, Inc.
Metcalfe, R. M. & Boggs, D. R. (1976) Ethernet: Distributed packet switching for local
computer networks. Communications of the ACM 19, 395 – 404 Passmore, D. and
Freeman, J. (1998). The virtual LAN technology report. [online].
28