This document describes a project to design and simulate a local area network (LAN) for a college using Cisco Packet Tracer. The project aims to study network topologies, design a topology for the college, configure IP addresses and subnets, and simulate packet transmission between departments. It will examine concepts like topology design, IP addressing, and using virtual LANs to separate departmental traffic. The results will provide insights into network simulation and performance analysis.
Web & Social Media Analytics Previous Year Question Paper.pdf
Design and Simulation of Local Area Network Using Cisco Packet Tracer
1. Design and Simulation of Local Area Network Using Cisco Packet
Tracer
Implant Training report submitted in partial fulfillment of the requirement
for the award of
Diploma in Engineering
In
Computer Science & Engineering
Submitted by Under the guidance of
Abhishek kumar Mr. Md. Imran Alam
Board Roll No-511121818011 Lecturer, CSE
2. GOVERNMENT POLYTECHNIC, Barari, Bhagalpur
Affiliated to S.B.T.E, Bihar, Patna, Approved by AICTE New Delhi,
Recognized by DST, Govt. of Bihar 812003
Nov-2020
GOVERNMENT POLYTECHNIC, Barari, Bhagalpur
Affiliated to S.B.T.E, Bihar, Patna, Approved by AICTE New Delhi,
Recognized by DST, Govt. of Bihar 812003
Declaration
I, Abhishek kumar bearing Board Roll No 511121818011, hereby certify that the
Training/Project entitled “DESIGN AND SIMULATION OF LOCAL AREA NETWORK
USING CISCO PACKET TRACER”, carried out under the guidance of Mr. Md. Imran
Alam, Lecturer is submitted to State Board of Technical Education, Bihar, Patna in partial
fulfillment of the requirements for the award of Diploma in Engineering in Computer Science
& Engineering. This is a record of bonafide work carried out by me and the results embodied
in this report have not been reproduced or copied from any source. The results embodied in this
report have not been submitted to any other University or Institute for the award of any other
degree.
Date:27 November 2020 Abhishek Kumar
Roll No: 511121818011
Department of CSE, GP
Bhagalpur
I
3. GOVERNMENT POLYTECHNIC, Barari, Bhagalpur
Affiliated to S.B.T.E, Bihar, Patna, Approved by AICTE New Delhi,
Recognized by DST, Govt. of Bihar 812003
Department of Computer Science & Engineering
Bonafide Certificate
This is to certify that the Project entitled “DESIGN AND SIMULATION OF LOCAL
AREA NETWORK USING CISCO PACKET TRACER”, being submitted by Abhishek
Kumar, bearing Roll No: 511121818011, to State Board of Technical Education, Bihar,
Patna in partial fulfillment of the requirements for the award of Diploma in Engineering in
Computer Science & Engineering, is a record of bonafide work carried out by him. The results
of investigations enclosed in this report have been verified and found satisfactory. The results
embodied in this report have not been submitted to any other University or Institute for the
award of any other degree or diploma.
PROJECT GUIDE HEAD OFTHE DEPARTMENT
II
4. ACKNOWLEDGEMENT
With great pleasure I take this opportunity to express my heartfelt gratitude to all the
persons who helped me in making this project work a success.
First of all, I am highly indebted to Principal, Dr. Aseem Kumar Thakur for giving
me the permission to carry out this project.
I would like to thank Mr. Kundan Kumar, Lecturer & Head of the Department (CSE),
for giving support throughout the period of my study at GP Bhagalpur. I am grateful for his
valuable suggestions and guidance during the execution of this project work.
My sincere thanks to project guide Mr. Md. Imran Alam for potentially explaining the
entire system and clarifying the queries at every stage of the project.
I would also thank to IT DESK INDIA PVT LTD who provided immense support as
well as answers to our queries that I kept firing on them during the development of this
application. My whole hearted thanks to the staff of GP Bhagalpur who co-operated us for the
completion of project in time.
I also thank my parents and friends who aided me in completion of the project/training.
III
6. Table of Contents
Declarationt..................................................................................................................................I
Bonafide certificate....................................................................................................................II
Acknowledgement.................................................................................................................. III
1.Introduction 1
1.1 Motivation 1
1.2 Problem statement 1
1.3 Objective 2
1.4 Limitation of project 3
1.5 Organization 4
2.Literature survey 5
2.1 Introduction 5
2.2 Existing system 5
2.3 Proposed system 6
3.Theoretical background 7
3.1Introduction of network topology 7
3.1.1 Bus topology 7
3.1.2 Star topology 8
3.1.3 Ring topology 8
3.1.4 Mesh topology 9
3.1.5 Hybrid topology 9
3.2 Communication media 10
3.2.1 Coaxial cable 10
3.2.2 Twisted pair cable 10
3.2.3 Optic fiber cable 10
3.2.4 Wireless 11
3.3 Networking device 11
3.3.1 Router 11
3.3.2 Switch 13
3.4 IP address 13
3.5 Subnetting 15
3.5.1Introduction 15
3.5.2Subnet mask 15
4. Experimental investigation 16
4.1Research method 16
4.2Design 17
4.2.1First network 17
4.2.1.1Assigning IP 18
IV
7. 4.2.1.2Assigning IP address to PC 19
4.2.2 Second network 22
4.2.3Third network 22
4.2.4Fourth network 23
5.Testing and result 25
5.1Ping test 25
6.Conclusion & Future scope 27
6.1Conclusion 27
6.2Future scope 27
Table of Figures
1. Figure 2.1 – Interface of CPT
2. Figure 3.1- Bus topology
3. Figure 3.2- Star topology
4. Figure 3.3- Ringtopology
5. Figure 3.4- meshtopology
6. Figure 3.5 - Router
7. Figure 3.6 - Switch
8. Figure 3.7 – usable host
9. Figure 4.1- Firstnetwork
10. Figure 4.2-Desktopof PC
11. Figure 4.3- Interface of IPconfiguration
12. Figure 4.4- Interface of IPaddressandsubnetmask
13. Figure 4.5- Interface of router
14. Figure 4.6 – Firstnetwork
15. Figure 4.7- Secondnetwork
16. Figure 4.8- Thirdnetwork
17. Figure 4.9-Fourthnetwork
18. Figure 5- Complete diagramof mynetwork
19. Figure 5.1- ReplyfromHOD’sPC
20. Figure 5.2- ReplyfromExaminationDepartment
21. Figure 5.3- ReplyfromLibraryDepartment
22. Figure 5.4- ReplyfromLab Department
V
8. Table of Tables
1. Table 3.1-Classesof IPaddress
2. Table 3.2 -Classesof IPwithHOSTaddress
3. Table 4.1-IP forfirstnetwork
4. Table 4.2- IP addressof router1 at all interfaces
5. Table 4.3- IP addressof Router0, Router2, Router3 at all interfaces
VI
9. CHAPTER 1
Introduction
1.1 MOTIVATION
Computer networks have become extremely important in our present-day
society. A majority of companies depend on the proper functioning of their networks for
communications, administration, automation, e-business solutions, etc. The Local Area
Network (LAN) is the most basic and important computer network owned by individual
companies and could be used for interconnection with wide area networks. A LAN permits
effective cost sharing of high-value data processing equipment such as mass storage media,
mainframe computers or minicomputers, and high-speed printers. Resource sharing is
probably equally as important where a LAN serves as the access vehicle for an intranet or the
Internet. In view of this, system managers need professional tools to help them with the design
and maintenance of LANs.
1.2 Problemdefinition
A simulation tool offers a way to predict the impact on the network of a hardware
upgrade, a change in topology, an increase in traffic load or the use of a new application. So,
in this paper, a LAN network is designed using “Cisco Packet Tracer”. The paper describes
how the tool can be used to develop a simulation model of the LAN for the College of diploma
in Engineering Government polytechnic, Barari, Bhagalpur. The study provides an insight into
various concepts such as topology design, IP address configuration and how to send
information in form of packets in a single network and the use of Virtual Local Area Networks
(VLANs) to separate the traffic generated by different departments.
10. 1.3 Objective
Cisco Packet Tracer is also used by professional network administrators for testing
network changes. Before changing a network, the user can try out new topology changes to
see if everything works correctly. If there aren’t any hiccups then the changes can be deployed
in a live network.
The objective of this “Design and Simulation of Local Area Network Using Cisco Packet
Tracer” project is: -
To study of topology
To design topology of college department system
To study of network IP, IP address, subnetting
To study of routers, switches pc IOT
To connecting switch
To connecting routers
To configuring routers
To configuring pcs
To connecting routers, switch, pc
To simulate how to send information in form of packets in a single network and the use
of Virtual Local Area Networks (VLANs) to separate the traffic generated by different
departments.
11. 1.4. Limitations of project
o The first major limitation of this program is the more in depth you get with
programming and making your own networks the harder it can become. With
options such as blank routers and PCs dragging one of the incorrect entities into the
program can leads to errors which can be annoying and hard to find and fix and
overcome. This can be really frustrating and lead to a lot of beginners becoming
confused and impact their learning.
o Another major limitation is the fact that some of the entities in the program have to
be manually turned on to function. This includes routers and switches which if not
turned on will not work and this can also lead to networks not working properly
and again errors in running your networks.
o Another limitation is to do with the startup of the program. When installing it I had
a good few problem setting it up with file locations and temporary file storage. A
quick you tube search helped to resolve this problem but again this is annoying
again for the user and the user side of things.
o Last limitation of the program is the different versions of the program. It might not
seem like a big issue but with the last update of the program they gave the whole
home screen and navigation bars a makeover which when learning it all on the old
version has made it difficult to get used to and some of my lecture notes were done
in the old version and I found this hard to get used to.
12. 1.5 Organizationof project
The paper describes how the CPT tool can be used to develop a simulation model of
the LAN for the College of diploma in Engineering Government polytechnic, Barari,
Bhagalpur. The study provides an insight into various concepts such as topology design,
IP address configuration and how to send information in form of packet in a single
network and the use of Virtual Local Area Networks (VLANs) to separate the traffic
generated by the different departments. VLANs are a new type of LAN architecture using
intelligent, high-speed switches. The simulation results and performance analyses showed
that the design was successful.
The rest of the paper is organized as follows: Chapter 2
discusses literature review. This is followed by a discussion in Chapter3, in this chapter
we discuss all the theory part. The concept of IPv4 addressing and subnetting is presented
in Chapter 4. The development of the LAN simulation model is presented in chapter 4;
while Chapter 5presents testing and their results. Lastly in Chapter 6 is the conclusion and
future scope.
13. CHAPTER 2
Literature Survey
2.1 Introduction
The need for computer networking was borne out of the need to use personal
computers for sharing information within an organization in form of messages, sharing files
and data bases and so forth. Whether the organization is located in one building or spread over
a large campus, the need for networking the computers cannot be over emphasized. As the
name implies, a Local Area Network (LAN) interconnects computer in a limited geographic
area. It provides high-bandwidth communication over inexpensive transmission media. The
corporate LAN has evolved from a passive background business component to a highly active,
visible core asset that enterprises rely on to support day-to-day operations critical to their
market success. Today’s network is a strategic instrument that must be accessible anytime
from anywhere-simultaneously offering fast, secure, reliable services at scale regardless of
location. The main purpose of a network is to reduce isolated users and workgroups. All
systems should be capable of communicating with others and should provide desired
information. Additionally, physical systems and devices should be able to maintain and
provide satisfactory performance, reliability and security. Resource sharing is probably
equally of immense importance where a LAN serves as the access vehicle for an intranet or
the Internet.
2.2 Existing system
Network design is a crucial aspect of any enterprise- grade network. The way a
network is designed impacts our network monitoring capabilities and our overall system
performance, making it as important a factor as the infrastructure itself. There are many tools
for making design of LAN such as CADE, Día Diagram Editor, Microsoft Visio.
Visio is best known diagram mapping tools available and been for many years. But we
use this for making only layout of LANs. it does not provide environment for real- simulation
for testing.
14. 2.3 Proposedsystem
Cisco packet tracer provides real-time environment simulation. CPT offers a way to
predict the impact on the network of a hardware upgrade, a change in topology, an increase in
traffic load or the use of a new application. So, in this paper, a LAN network is designed using
Cisco Packet Tracer.
Cisco Packet Tracer (CPT) is a multi-tasking network simulation
software that can be used to perform and analyze various network activities such as
implementation of different topologies, selection of optimum path based on various routing
algorithms, creation of appropriate servers, subnetting, and analysis of various network
configuration and troubleshooting commands. In order to start communication between end
user devices and to design a network, we need to select appropriate networking devices like
routers, switches, hubs and make physical connection by connecting cables to serial and fast
Ethernet ports from the component list of packet tracer. Networking devices are costly so it is
better to perform first on packet tracer to understand the concept and behavior of the network.
Interface of CPTFigure 2.1:
15. CHAPTER 3
Theoretical background
In this chapter we discuss all theory part of devices are used in our project, design of our
project and implementation.
3.1 Introduction of network topology
For interconnectivity of components, network topology describes the physical and
logical appearance and interconnection between arrangement of computers, cables and other
components in a data communication network and how it can be used for taking a packet from
one device and sending it through the network to another device on a different network. A
network topology is the physical layout of computers, cables, and other components on a
network. There are a number of different network topologies, and a network may be built
using multiple topologies. The different types of network topologies are: Bus topology, Star
topology, Mesh topology, Ring topology, Hybrid topology.
3.1.1 Bus topology-
A bus topology uses a single backbone cable that is terminated at both ends.
All the hosts connect directly to this backbone.
Figure 3.1: Bus Topology
16. 3.1.2 Star topology
In star topology each device in network is connected to a central device called hub -In
this type of topology devices communicate through hub. If any devices want to send data to
other device, it has to first send data to hub and then hub transmit that data to the designated
devices.
3.1.3 Ring topology
In ring topology each device is connected with the two devices on either side of it.
There are two dedicated point to point links a device has with the devices on the either side of
it. This structure forms a ring thus it is known as ring topology. If a device wants to send data
to another device then it sends the data in one direction, each device in ring topology has a
repeater, if the received data is intended for other device then repeater forwards this data until
the intended device receives it.
Figure 3.2: Star Topology
Figure 3.3: Ring Topology
17. 3.1.4 Meshtopology
In mesh topology each device is connected to every other device on the network
through a dedicated point-to-point link. When we say dedicated it means that the link
only carries data for the two connected devices only. Let’s say we have n devices in the
network then each device must be connected with (n-1) devices of the network.
Number of links in a mesh topology of n devices would be n(n-1)/2.
3.1.5 Hybrid topology
A combination of two or more topology is known as hybrid topology. For
example, a combination of star and mesh topology is known as hybrid
topology.
Figure3.4: Mesh Topology
18. 3.2 COMMUNICATION MEDIA
Network devices are connected together using a medium, the medium can be cables
which can either be coaxial cable or twisted pair cable or it can be by optic fiber cables or the
medium can be free space (air) by the use of radio waves. A discussion of the media is as
outlined below.
3.2.1 Coaxial Cable
This cable is composed of two conductors. One of the conductors is an inner insulated
conductor and this inner insulated conductor is surrounded by another conductor. This second
conductor is sometimes made of a metallic foil or woven wire. Because the inner conductor is
shielded by the metallic outer conductor, coaxial cable is resistant to electromagnetic
interference (EMI). Coaxial cables have an associated characteristic impedance, which needs to
be balanced with the device (or terminator) with which the cable connects. There are two types
of coaxial cables: Thicket (10Base5), and Thinnet (10Base2). The two differ in thickness (1/4-
inch for thicket and ½-inch for thin net) and in maximum cable distance that the signal can travel
(500 meters for thicket and 185 meters for thin net). A transceiver is often connected directly to
the Thicket cable using a connector known as vampire tap.
3.2.2 Twisted Pair Cable
This is the most popular LAN media type in use today. Individual insulated copper
strands are intertwined into a twisted pair cable. Two categories/types of twisted pair cable
include Shielded Twisted Pair (STP) and Unshielded Twisted Pair (UTP).
3.2.3 Optic Fiber Cable
An alternative to copper cabling is fiber–optic cabling, which sends light through an optic fiber.
Using light instead of electricity makes fiber optics immune to EMI. Also depending on the
layer 1 technology being used, fiber-optic cables typically have greater maximum distance
between networked devices and greater data carrying capacity.
19. 3.2.4Wireless
Not all media is physical, as is the case with wireless technologies. Wireless clients gain access
to a wired network by communicating via radio waves with a wireless access point (AP). The
access point is then hardwired to a LAN. All wireless devices connecting to the same AP are
considered to be on the same shared network segment, which means that only one device can
send data to and receive data from an AP at any one time (half duplex communication).
3.3 Networking devices
Equipment that connects directly to a network segment is referred to as a device.
These devices are broken up into two classifications.
o end-user devices
o network devices
End-user devices include computers, printers, scanners, and other devices that provide services
directly to the user.
Network devices include all the devices that connect the end-user devices together to allow them
to communicate.
There are many networking devices;
• Repeaters
• Hub
• Switch
• Bridge
• Router
• Pc
3.3.1 Router
A router is a special type of computer. It has the same basic components as a standard desktop
PC. However, routers are designed to perform some very specific functions. Just as computers
need operating systems to run software applications, routers need the Internetwork Operating
System software (IOS) to run configuration files. These configuration files contain the
20. instructions and parameters that control the flow of traffic in and out of the routers. The many
parts of a router are shown below:
Routers have all capabilities of the previous devices. Routers can regenerate signals, concentrate
multiple connections, convert data transmission formats, and manage data transfers. They can
also connect to a WAN, which allows them to connect LANs that are separated by great
distances.
In this project we use Router 2911. Router 2911 has the property of auxiliary, console
and fast Ethernet. Most advantage of this router is it has three interface 0/0,0/1,0/2.
Auxiliary Port:
Auxiliary port is used for the connection which is being initiated soon. This port has a capability
to accept the data packet if it consists of any error. There is no Control Redundancy Check
(CRC) or Frame Checking System (FRS) in this port.
Console Port/Cable: Console is type of cable used for configuration purposes. The port
availability is used to connect console cable to the router. This port has CRC system and can
only accept from outer end devices.
Fast Ethernet 0/0,0/1 and 0/2:
The Ethernet connectivity is also available in router 2911. Ethernet describes which port and
cable to be used for internet connectivity. In this router three ports are available in every router.
They are “0/0”,”0/1” and “0/2”.
Figure 3.5: Router
21. 3.3.2 Switch
Switches can determine whether data should remain on a LAN or not, and they can transfer the
data to the connection that needs that data.
Switches are Data Link layer devices.
Each Switch port has a unique MAC address.
Connected host MAC addresses are learned and stored on a MAC address table.
Switch 2960-24TT is used in this project. It has 24 fast Ethernet interface and 2 gigabit Ethernet
interfaces.
3.4 IP ADDRESSING
Using the IP address of the destination network, a router can deliver a packet to the correct
network.
When the packet arrives at a router connected to the destination network, the router uses the IP
address to locate the particular computer connected to that network.
Accordingly, every IP address has two parts.
IP Addressing is a hierarchical structure. An IP address combines two identifiers into one
number. This number must be a unique number, because duplicate addresses would make
routing impossible. The first part identifies the system's network address. The second part, called
the host part, identifies which particular machine it is on the network.
Figure 3.6: Switch
22. IP addresses are divided into classes to define the large, medium, and small networks.
Class A addresses are assigned to larger networks.
Class B addresses are used for medium-sized networks, &
Class C for small networks.
Classes of Addresses
There are five classes of IP addresses and they are shown in the Table 3.1
TABLE-3.1
Address class Value in First Octet
A 1-126
B 128 – 191
C 192 – 223
D 224 – 239
Figure 3.7: usable IP
23. E 240 – 255
IP addresses can be dynamically configured using DHCP or they can be statically configured
by inputting it manually on the device.
3.5 SUBNETTING
Subnetting is the process of stealing bits from the host part of an IP address in order to divide
the larger network into smaller sub-networks called subnets [8]. After subnetting, network
subnet host fields are created. An IP address is always reserved to identify the subnet and another
one to identify the broadcast address within the subnet.
Subnetting a network means to use the subnet mask to divide the network and break a large
network up into smaller, more efficient and manageable segments, or subnets.
With subnetting, the network is not limited to the default Class A, B, or C network masks and
there is more flexibility in the network design.
Subnet addresses include the network portion, plus a subnet field and a host field. The ability to
decide how to divide the original host portion into the new subnet and host fields provides
addressing flexibility for the network administrator.
3.5.2 Subnet Mask
For the subnet scheme to work, every host (machine) on the network must know which part of
the host address will be used as the subnet address. This is accomplished by assigning subnet
mask to each machine. A subnet mask is a 32-bit value that allows the recipient of an IP packet
to distinguish the network ID portion of the IP address from the host ID portion of the IP address.
Table 3.2 shows the default subnet masks for all classes of network.
TABLE 3.2
CLASSES OF IP FORMAT DEFAULT SUBNET MASK
A Network.node.node.node 255.0.0.0
B Network.network.node.node 255.255.0.0
C Network.network.network.node 255.255.255.0
24. CHAPTER 4
Experimental Investigations
In this chapter we discuss the development of LAN simulation model
4.1 Researchmethod
Starting of this research is to conduct data collection, using observation techniques, to
inventories existing network equipment and computer hardware devices and software tools are
used. The next step is to interview relevant parties, in this case is a computer lab coordinator
who is directly responsible for the conditions that exist in the computer lab. After getting all
the information about the devices used and the activities running on a research, further
research from the literature to study the problems faced in order to identify the problem as a
whole. The proposed development method will design into a new network topology that uses
an application Cisco Packet Tracer network simulation. The design of this new network
solution that emphasizes efficiency, because the devices will still be used, without having to
replace the whole. The next step is a simulation of the new network to test if the method
proposed development has been solving the problems that exist in the computer lab.
Evaluation of the results of the simulation to be important in proving that the proposed method
possible to have an increase in accordance with the objectives of this research, namely to
increase the performance and security on the LAN.
One of such key performance indicators is how flexible a network can be without a
compromise on its objective. It combines hardware, software, cables, operating systems,
switches, routers, hubs for communication to take place). Hierarchical model is employed in
LAN designs. In a hierarchical model designs are done in layers.
4.2 DESIGN
we design network step by step for all four department.
4.2.1 First network for College department
Take one router, one switch, and four PCs and connect four PCs with the switch by
using copper straight-through wire. Then router connect with switch. Also take one IOT things
and one IOT alarm and connect them with switch.
25. 4.2.1.1 Assigning IP
If you want to computers communicate network in the network, they must have same IP
address.
The table of IP for first network.
Table 4.1
DEVICES(PC) IP ADDRESS SUBNET MASK
Principle 192.168.1.36 255.255.255.240
Hod 192.168.1.35 255.255.255.240
Exam controller 192.168.1.34 255.255.255.240
Director 192.168.1.37 255.255.255.240
IOT things 192.168.1.39 255.255.255.240
Alarm 192.168.1.38 255.255.255.240
Figure 4.1: First Network
26. 4.2.1.2 Assign IP address To PCs in first network
CLICK ON PC AND GO TO DESKTOP.
Again, click on IP configuration.
Figure 4.2: Desktop of pc
Figure 4.3: Interface of IP configuration
27. Insert IP address and subnet mask
Same as insert IP address for all pc od first network and also for IOT things and alarm as
shown in Table
Now Insert IP address on router1 at all interface.
INTERFACE IP ADDRESS SUBNET MASK
GigabitEthernet0/0 192.168.1.1 255.255.255.240
GigabitEthernet0/1 192.168.1.146 255.255.255.240
GigabitEthernet0/2 192.168.1.33 255.255.255.240
Figure 4.4: Interface of IP address and subnet mask
Table 4.2
28. THIS IS A FIRST COMPLETE NETWORK
Figure 4.5: Interface of Router
Figure 4.6: First Network
29. Same as pervious: These two networks are same as pervious which I have discussed.
4.2.2 SECOND NETWORK
4.2.3THIRD NETWORK
Figure 4.7
Figure 4.8
30. 4.2.4 Fourth network
4.3 Connectrouters
If you want to routers communicate in the network, they must be assigning IP address
Click on router and insert IP of router0, router2, router3 at all interface with the help of table
Router name GigabitEthernet0/0 GigabitEthernet0/1 GigabitEthernet0/2
Router0 192.168.1.2 192.168.1.61 192.168.1.81
Router2 192.168.1.62 192.168.1.113 192.168.1.129
Router3 192.168.1.145 192.168.1.114 192.168.1.177
Figure 4.9
Table 4.3
31. This is my complete network
Figure 5: Complete diagram of the college of engineering local area network as created in
packet tracer environment
32. CHAPTER 5
TESTING AND RESULTS
In this chapter we test all pc for checking they are work or not using Cisco
packet tracer and see the result.
5.1 Ping test
Network connectivity and communication can be tested using a ping command,
followed by the domain name or the IP address of the device (equipment) one wishes to test
connectivity to. Two VLANs have been added to the existing network and the ping test was
performed to test if the devices connected to those VLANs are communicating with the rest of
the devices on the network. The results obtained are as shown in Fig
Principle’s pc to HOD’s pc Principle’s pc to EC’ pc
Figure 5.1 Figure 5.2
33. Principle’s pc to Ex- depart. Principle’s pc to library department
Principle’s pc to lab department
Figure 5.3
Figure 5.4
Figure 5.5
34. CHAPTER 6
Conclusions & Future Scope
6.1 conclusions
In this paper, a Local Area Network (LAN) that uses both wired and wireless topology have
been implemented with some important concepts using cisco packet tracer. It is observed that
the network is performing well, this is because when we compared the ping test of the network
designed to the ping test on the existing network of College of diploma in Engineering,
polytechnic college, barari, the values were similar. Fig. 7 shows the ping test on the live
network in existence.
At last I want to conclude that, according to me I have a great experience while
working on this software cisco packet tracer.
6.2 Future Scope
By using this software (Packet Tracer) we can improve the quality of the IT Infrastructure,
Datacenter, Software simulation which we can’t get by hand drafting. By the help of this
software, drawing can be easily modified whenever wanted which reduces the human effort.
files can be transfer from one place to another very easily by using this software.
Reference
[1]. Tim Reardon, Planning, Designing and operating local area networks, DISAM Journal,
Summer, 1997.
[2]. www.wikipedia.org/wiki/computer_networks, Retrieved 10th October, 2016.
[3]. www.wikipedia.org/wiki/local_area_network, Retrieved 10th October, 2016.
[4]. Garima Jain, Nasreen Noor ani, Nisha Kiran, Sourabh Sharma, Designing & simulation
of topology network using Packet Tracer, International Research Journal of Engineering and
Technology (IRJET), 2(2), 2015.
[6]. Kenan Xu, Performance analysis of differentiated QoS MAC in wireless local area
networks (WLANs), Thesis Submitted to the Department of Electrical and Computer
Engineering, Queen’s University, Canada. September, 2003.
[7]. David D. C., Kenneth T.P., David P.R, An introduction to local area networks, Proc. of
the IEEE conf., Vol. 66, 1978. [8]. Todd Lammle, Cisco Certified network associate study
guide (Wiley Publishing Inc., 2007).
[8]. Cisco URL- https://www.netacad.com/
[9]. Cisco packet tracer- https://www.netacad.com/courses/packet-tracer
For any question contact me-abhiabhishek.1137@gmail.com