193-25-846 to the Department of Computer Science and Engineering, Daffodil International University, has been accepted as satisfactory for partial fulfillment of the requirements for the degree of M.Sc. Sheak Rashed Haider Noori, Associate Professor and Associate Head, Department of CSE Daffodil International University. Sheak Rashed Haider Noori, Associate Professor and Associate Head, Department of CSE Daffodil International University, Dhaka.
Syed Akhter Hossain, Head of CSE Department, for his kind assistance in completing my dissertation, and also to other faculty members and staff of CSE Department of Daffodil International University.
INTRODUCTION
- Introduction
- Statement of the Problem
- Goals and The Objectives of The Study
- Specific Objectives
- Scope of The Study
- Significances of The Study
- Methodology and The Tools Required
- Physically
- Virtually
- Research Analysis and Results (Questionnaire)
The fundamental objectives of this study are to defeat the difficult coaxial cable and hub-based twisted pair cable network for network traffic and collisions and to improve the Quality of Service QoS of network performance, delays of the data during the journey from the transmitter to the destination and the following are some tips that are the most accurate solutions for this way. To set up a switch-based ethernet peer-to-peer network for the solutions of the existing problem of the above scenario. Eliminate the conflict method of access initiated in the first CSMA/CD procedure that resulted in data collision and traffic crowding, and improve the Quality of Services QoS of the network data/frame transmission delays using VLAN technology.
In the later chapters of this research questionnaire, we will focus on the actual analysis and performance results of the network delay to improve the QoS quality of the entire network, and at this point we will also step out of the box while implementing quality improvement in this network. the CSMA/CD problem we mentioned in our problem statement during the introduction of the VLAN concept automatically.
VLAN BACKGROUND AND CONCEPTION
- Introduction
- Concept Inception
- Vlan Set Requirements
- Vlan Features and Significances
- Vlan Security Best Practices (For These Entire Four Networks Best Security)
University campus network regions and academic department diagram using in cisco packet tracer. At the beginning of this concept, we will discuss about the four networks created for VLAN and how they support each other with their main objective and adjacent to the different network classes of the entire network and how they understand each other. - the other. The following diagram shows how the four networks are connected and the switching equipment that supports this network to be stable and scalable.
Before implementing the VLANs, the best approach is to plan the entire physical and logical setup of the network (which means planning the network topology) carefully. VLAN configuration errors can cause serious connectivity and security issues on our network, and with that being said, we will consider our network topology to be a mesh network topology as we need all our computers to understand and communicate with each other throughout the network even though they have been assigned to have different network classes and routing protocols. Most of the switches have ways to define a list of configured VLANs and they should be added before they can be configured on any ports.
VLANs allow common partnerships or common connections of endpoints that are topographically distant in the network. VLANs reduce/negate the need to deploy switches in this network by containing communication/portable traffic/congestion.
VLAN SECURITY
- Why Information Division is Significant
- Vlan Fundamentals
- Address Resolution Protocol
- Content Address Memory
- Medica Access Control Mac - Address
- Vlan Tagging
- Setting - Up Vlans
- Port Assignment
- Vlan Cable Trunking
With sufficient opportunity and the right capabilities, it is only a short time before any system/network is breached. Until an appropriately commanded time, the VLAN department cautiously allows access to system/network attack surfaces. System/network designers may restrict certain protocols to specific departments of an organization or company.
At the point when a PC needs to move information/data with another system/network added desktop, it broadcasts an Address Resolution Protocol (ARP) transfer. This expects, for example, the IP address of both devices to have a similar system/network identifier. The transport packet goes to all devices on the comparable system/network partition, which requires a reaction from the device with the destination IP address.
Using the source MAC address in the transmission bundle, it broadcasts a response to the reference device that connects to the destination MAC address. For example, when a device associated with switch port 10 sends its first packet, the switch refreshes the CAM table with the port and the MAC address. From the hour of the update through the entry's creation/aging period, the switch forwards all packets with the device's MAC address as the goal/target through port 10.
Precisely when the bundle appears, it is parsed to recover the source MAC address and named into the most ideal VLAN. It is basic for an attacker/software engineer to spoof a genuine MAC address to gain access to a VLAN if MAC addresses are not fully respected and trusted by system/network administrators.
VLAN CONFIGURATION
- Introduction
- Overview of Vlans
- Current Vlan Configuration
- Configuring Vlans
- Required Physical Components and Cables
- General Objects
- Cables
Assigning a specific switch port to vlan10 and also clarifying the modes/status of the switch port if it will be access or trunk. Assigning a specific switch port to vlan20 and also clarifying the modes/status of the switch port if it will be access or trunk. Assigning a specific switch port to vlan30 and also clarifying the modes/status of the switch port if it will be access or trunk.
Assigning a specific switch port to vlan40 and also clarifying the modes/status of the switch port if it will be access or trunk. All vlans can communicate if we put a router at the top, but for our concept a router is excluded according to the scope and specifications of our study, therefore every desktop vlan can communicate and thus provides a high network security. When you delete a VLAN, any LAN interfaces configured as forwarded access ports on that VLAN become idle.
They remain associated with the VLAN (and then dormant) until you assign them to another VLAN. Since Layer 3 ports and some item features require intra-VLANs assigned from 1006 and higher configuration, extended VLANs start with 4094 and work downward. In the event that the VLAN you are trying to create or change is used by a Layer 3 port or an item function, the switch displays a message and does not change the VLAN configuration.
Daffodil International University Switch(config-vlan) # end Switch# show vlan ID 10 VLAN Name Status Ports. When planning the implementation of vlans, many essential elements are needed, which are technological devices (desktops, switches and cables for this implementation), each of which has its own function and role.
METHODOLOGY AND RESEARCH
- Introduction
- Procedures and Methodologies
- Comparative Analysis
- Experimental Analysis
The construction and investigation of the concept idea will be applied using OPNET test system to show how a good route is selected in planning system/network to reduce the delay of value for the improvement of the QOS. The fundamental thought in the concept relates to the design of system/network with application of vlan innovation. To consider the exhibit, the system/network VLAN framework will be used to test numerous parameters that indicate the outcome to compare at performance between any chosen scenarios.
Basically, the system/network will be structured in two scenarios; the primary situation is enthusiastic about using the vlan innovation and the second situation is not using the vlan innovation. There are some specialized ones in the table which are inspired to improve the QOS in the system/network with many techniques and specializations. VLAN is a basic and successfully specialized that gives security to the system/network and deals with it in many sections to improve it by reducing the delay in it.
Ideal approach to overcome delay and frame crash as a rule for the system/network and improve QoS with low expenses. The possibility of the concept was applied through plan, simple system/network in two situations consisting of two system university campuses: Campus A and Campus C. The system/network using VLAN innovation produces better results than the system/network without to use VLAN innovation. , for example the delay rate in the first situation without the use of VLAN practically equivalent from .0031 to .0036 second however in the second situation with the use of VLAN practically equivalent from .0026 to .0032 second, the details in fig 7. This demonstrates the role of use VLAN innovation in reducing delays and improving the exhibition for the system/network to improve network quality of service QoS.
An average of 1500 bits are acquired/received in about 8 hours in a system/network where VLAN is not configured, while an average of 500 bits are acquired/received simultaneously in a system/network where VLAN is used or configured. This result matches the results of Block_A (Switch 1) which further helps to prove that the system/network with VLAN is better than the network without VLAN by reducing the traffic. [19].
CONCLUSSION AND RECOMMENDATIONS
Summary
Challenges
Conclusion
1] Misumi M, Yamaoka K., "Ethernet Bypass Nodes as Suspended Link Enablers in Tag-VLAN-Disabled Ethernet Switches", Ethernet Bypass Nodes, vol. 2] Fuchs Stefan, Schmidt Hans-Peter, "Real-Time Ethernet and Synchronization", Real-Time Ethernet and Synchronization with Inhomogeneous Physical Layers: CAT5 and Single Unshielded Twisted Cable, Vol. Information technology - LAN/MAN - Specific requirements - Part 3: Carrier sense multiple access with collision detection (CSMA/CD) Access method and physical layer specifications, Vol.
Supplement to Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications, Vol. 7] "Application of Dynamic Port VLAN Membership," Application of Dynamic Port VLAN Membership with Auxiliary VLAN in Campus Area Network, vol. 10] Watson R.W., "Modes of Access the Network Information Center," An Interactive Network Experiment to Study Modes of Access the Network Information Center, vol.
14] Shimizu Hiroshi, "IEEJ Transactions on Electronics, Information and Systems," Ring Ring with VLAN Tag, vol. 16] Walaa Amayreh, Norah Alqahtani, "Vlan Network Latency Analysis", Vlan Network Latency Performance Analysis to Improve Quality of Services, Vol. 20] HomChaudhuri S.Foschiano M., "Scalable Security in a Multi-Client Environment", Cisco Systems Private VLANs: Scalable Security in a Multi-Client Environment, Vol.