A Simulation based study on Network Architecture Using Inter-VLAN Routing and Secure Campus Area Network (CAN)
DOI:
https://doi.org/10.26438/ijcse/v6i3.111121Keywords:
Etherchannel, VLSM, VLAN, Inter-VLAN, VACLAbstract
Today development of computer and information technology, computer and network have been very popular. At the same time, security is important to secure the data, especially in campus environment. A campus network faces, many challenges such as IP address allocation, network failure, detecting rogue system user and determining slowing network etc., This research is mainly targeted towards campus networks which deliver the required security and best performance. To reduce the maximum wastage of IP address space using VLSM technique. A network is divided into different subnets. This technique will improve the security and traffic isolation. To improve the network speed on campus area network using etherchannel technique. This technique increases the network speed and redundant path between two devices. To multiple smaller broadcast domain using VLAN. To Communicate different VLAN using Inter-VLAN technique. This technique is implemented using multilayer switch. To secure and control a network traffic using VLAN Access Control List (VACL). Secured network protects an institution from security attacks associated with network. A campus network has a number of uses, such as education, research, learning, supervision, e-library, result publishing and association with the external users. Network security prevents the campus network from different types of threats and attack. The system can efficiently control and handle the reliable operation of the campus network.
References
Cisco Networking Academy “CCNA 3 and 4 Companion Guide”, Pearson Education,2003
W. A. Arbaugh, J. R. Davin, “Security for virtual private intranets,” Computer, vol. 31 (9), pp. 48-55, 1998.
P. Vicrt-Blanc-Primet, J. Zeng, “Traffic isolation and network resource sharing for performance control in grids,” utonomic and Autonomous Systems and International Conference on Networking and Services, 2005.
L. S. Putledge, L. J. Hoffman, “A survey of issues in computer network security,” Computers and Security, vol. 5 (4), pp. 296-308, 1986.
G. Rapp, “Survey of the computer and network security issues from evalutation criteria to open systems,” Proceedings of the Conference on the Challenge of Networking: Connecting Equipment, Humans, Instituitions, 1993.
R. Venkatesmaran, “Virtual private networks,” IEEE Potetials, vol. 20, pp. 11-15, 2001.
M. A. Ruiz-Sanchez, E. W. Biersack, W. Dabbous, “Survey and taxonomy of IP address lookup algorithms,” IEEE Network, vol 15 (2), pp. 8-23, 2001
V. Grout, “Towards an optimal routing strategy,” Proceedings of IADIS WWW/Internet, 2003.
C. L. Hedrick, “RFC1058: Routing information protocol,” Internet RFCs,1988.
“InterVLAN Routing – Routing between VLAN Networks” Available:http://www.firewall.cx/networking- topics/vlan-networks/222-intervlan-routing.html.
Milan Yu and Jennifer Rexford, Princeton University,Xin Sun and Sanjay Rao, Purdue University, Nick Feamster, Georgia institute of Technology. “A survey of Virtual LAN Usage in Campus Networks” IEEE Paper in IEEE Communications Magazine July, Volume: 49, Issue: 7 pp. 98-103
K. Okayama , “A Method of Dynamic Interconnection of VLANs for Large Scale VLAN Environment”, IEEE, ISBN: 4-88552-216-1, page.427 - 432
Cisco Press,”CCNA Exploration Course Booklet: LAN Switching and Wireless, Version 4.0” Cisco networking Academy.
Allan Johnson, “LAN Switching and Wireless: CCNA Exploration Labs and Study Guide” Cisco Press,ISBN: 1587132028,2008.
Somasundaram.S , Chandran.M. "Discovery of Geo-Locations by Tracing IP Address Using VLSM Technique". International Journal of P2P Network Trends and Technology (IJPTT)”.V11:1-4 Sep 2014. ISSN: 2249-2615. www.ijpttjournal.org. Published by Seventh Sense Research Group.
Somasundaram.S, Chandran.M. "A Simulation Based Study on Inter-VLAN Routing" International Journal of Computer Sciences and Engineering (JCSE)”. Volume 4 Issue 7, Page 24 -29, July 2016. ISSN: 2347-2693
Cisco, “Configure InterVLAN Routing on Layer 3 Switches”, 2016, [Online]. Available:http://www.cisco.com /c/en/us/support/docs/lan-switching/inter-vlan-routing/ 41860 -howto-L3-intervlanrouting.pdf
Cisco,” Configuring InterVLAN Routing with Catalyst 3750/3560/3550 Series Switches“, 2014 [Online]. Available: http://www.cisco.com/c/en/us/ support/docs/lan-switching/inter-vlan-routing/41260-189.pdf
Rajiv O. Verma, S.S. Shriramwar “Effective VTP Model for Enterprise VLAN Security” 2013 International Conference on Communication Systems and Network Technologies
Cisco, “Understanding vlan trunk protocol (vtp),” 2007. [Online].Available:http://www.cisco.com/application/pdf /paws /10558/21.pdf
Cisco, “Troubleshooting vlan trunk protocol (vtp),” 2007.[Online].Available:http://www.cisco.com/application/pdf/paws/98155/tshoot-vlan.pdf
Sharada Ramani and R. M. Goudar,”Improved Bandwidth Aggregation using Available Lower Bandwidth Links”, International Journal of Computer Sciences and Engineering, Volume-4, Issue-6, ISSN: 2347-2693, 2016
Rajiv O. Verma, "Effective Remote Management for Inter-VLAN Routing Networks" International Journal of Application or Innovation in Engineering & Management (IJAIEM), ISSN 2319 - 4847,2013.
LI Xingyu, Jiang Tingting, "Design and implementation of the Campus Network Monitoring System" IEEE Workshop on Electronics, Computer and Applications, 2014.
M.R. Sabir , M.S. Mian , K. Sattar and M.A. Fahiem, "IP Address Space Management using Aggregated Fixed Length Subnet Masking", IEEE Network.
“Cisco Packet Tracer 6.0.1 Tool” Cisco Networking Academy
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
