Open Access   Article Go Back

A Simulation based study on Network Architecture Using Inter-VLAN Routing and Secure Campus Area Network (CAN)

S. Somasundaram1 , M. Chandran2

  1. Department of Computer Applications, SRMV College of Arts and Science , Coimbatore, Tamilnadu ,India.
  2. Department of Computer Applications, SRMV College of Arts and Science , Coimbatore, Tamilnadu ,India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-3 , Page no. 111-121, Mar-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.111121

Online published on Mar 30, 2018

Copyright © S. Somasundaram, M. Chandran . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Somasundaram, M. Chandran, “A Simulation based study on Network Architecture Using Inter-VLAN Routing and Secure Campus Area Network (CAN),” International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.111-121, 2018.

MLA Style Citation: S. Somasundaram, M. Chandran "A Simulation based study on Network Architecture Using Inter-VLAN Routing and Secure Campus Area Network (CAN)." International Journal of Computer Sciences and Engineering 6.3 (2018): 111-121.

APA Style Citation: S. Somasundaram, M. Chandran, (2018). A Simulation based study on Network Architecture Using Inter-VLAN Routing and Secure Campus Area Network (CAN). International Journal of Computer Sciences and Engineering, 6(3), 111-121.

BibTex Style Citation:
@article{Somasundaram_2018,
author = {S. Somasundaram, M. Chandran},
title = {A Simulation based study on Network Architecture Using Inter-VLAN Routing and Secure Campus Area Network (CAN)},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {6},
Issue = {3},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {111-121},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1769},
doi = {https://doi.org/10.26438/ijcse/v6i3.111121}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.111121}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1769
TI - A Simulation based study on Network Architecture Using Inter-VLAN Routing and Secure Campus Area Network (CAN)
T2 - International Journal of Computer Sciences and Engineering
AU - S. Somasundaram, M. Chandran
PY - 2018
DA - 2018/03/30
PB - IJCSE, Indore, INDIA
SP - 111-121
IS - 3
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
801 447 downloads 247 downloads
  
  
           

Abstract

Today development of computer and information technology, computer and network have been very popular. At the same time, security is important to secure the data, especially in campus environment. A campus network faces, many challenges such as IP address allocation, network failure, detecting rogue system user and determining slowing network etc., This research is mainly targeted towards campus networks which deliver the required security and best performance. To reduce the maximum wastage of IP address space using VLSM technique. A network is divided into different subnets. This technique will improve the security and traffic isolation. To improve the network speed on campus area network using etherchannel technique. This technique increases the network speed and redundant path between two devices. To multiple smaller broadcast domain using VLAN. To Communicate different VLAN using Inter-VLAN technique. This technique is implemented using multilayer switch. To secure and control a network traffic using VLAN Access Control List (VACL). Secured network protects an institution from security attacks associated with network. A campus network has a number of uses, such as education, research, learning, supervision, e-library, result publishing and association with the external users. Network security prevents the campus network from different types of threats and attack. The system can efficiently control and handle the reliable operation of the campus network.

Key-Words / Index Term

Etherchannel, VLSM, VLAN , Inter-VLAN, VACL

References

[1] Cisco Networking Academy “CCNA 3 and 4 Companion Guide”, Pearson Education,2003
[2] W. A. Arbaugh, J. R. Davin, “Security for virtual private intranets,” Computer, vol. 31 (9), pp. 48-55, 1998.
[3] P. Vicrt-Blanc-Primet, J. Zeng, “Traffic isolation and network resource sharing for performance control in grids,” utonomic and Autonomous Systems and International Conference on Networking and Services, 2005.
[4] L. S. Putledge, L. J. Hoffman, “A survey of issues in computer network security,” Computers and Security, vol. 5 (4), pp. 296-308, 1986.
[5] G. Rapp, “Survey of the computer and network security issues from evalutation criteria to open systems,” Proceedings of the Conference on the Challenge of Networking: Connecting Equipment, Humans, Instituitions, 1993.
[6] R. Venkatesmaran, “Virtual private networks,” IEEE Potetials, vol. 20, pp. 11-15, 2001.
[7] M. A. Ruiz-Sanchez, E. W. Biersack, W. Dabbous, “Survey and taxonomy of IP address lookup algorithms,” IEEE Network, vol 15 (2), pp. 8-23, 2001
[8] V. Grout, “Towards an optimal routing strategy,” Proceedings of IADIS WWW/Internet, 2003.
[9] C. L. Hedrick, “RFC1058: Routing information protocol,” Internet RFCs,1988.
[10] “InterVLAN Routing – Routing between VLAN Networks” Available:http://www.firewall.cx/networking- topics/vlan-networks/222-intervlan-routing.html.
[11] Milan Yu and Jennifer Rexford, Princeton University,Xin Sun and Sanjay Rao, Purdue University, Nick Feamster, Georgia institute of Technology. “A survey of Virtual LAN Usage in Campus Networks” IEEE Paper in IEEE Communications Magazine July, Volume: 49, Issue: 7 pp. 98-103
[12] K. Okayama , “A Method of Dynamic Interconnection of VLANs for Large Scale VLAN Environment”, IEEE, ISBN: 4-88552-216-1, page.427 - 432
[13] Cisco Press,”CCNA Exploration Course Booklet: LAN Switching and Wireless, Version 4.0” Cisco networking Academy.
[14] Allan Johnson, “LAN Switching and Wireless: CCNA Exploration Labs and Study Guide” Cisco Press,ISBN: 1587132028,2008.
[15] Somasundaram.S , Chandran.M. "Discovery of Geo-Locations by Tracing IP Address Using VLSM Technique". International Journal of P2P Network Trends and Technology (IJPTT)”.V11:1-4 Sep 2014. ISSN: 2249-2615. www.ijpttjournal.org. Published by Seventh Sense Research Group.
[16] Somasundaram.S, Chandran.M. "A Simulation Based Study on Inter-VLAN Routing" International Journal of Computer Sciences and Engineering (JCSE)”. Volume 4 Issue 7, Page 24 -29, July 2016. ISSN: 2347-2693
[17] Cisco, “Configure InterVLAN Routing on Layer 3 Switches”, 2016, [Online]. Available:http://www.cisco.com /c/en/us/support/docs/lan-switching/inter-vlan-routing/ 41860 -howto-L3-intervlanrouting.pdf
[18] Cisco,” Configuring InterVLAN Routing with Catalyst 3750/3560/3550 Series Switches“, 2014 [Online]. Available: http://www.cisco.com/c/en/us/ support/docs/lan-switching/inter-vlan-routing/41260-189.pdf
[19] Rajiv O. Verma, S.S. Shriramwar “Effective VTP Model for Enterprise VLAN Security” 2013 International Conference on Communication Systems and Network Technologies
[20] Cisco, “Understanding vlan trunk protocol (vtp),” 2007. [Online].Available:http://www.cisco.com/application/pdf /paws /10558/21.pdf
[21] Cisco, “Troubleshooting vlan trunk protocol (vtp),” 2007.[Online].Available:http://www.cisco.com/application/pdf/paws/98155/tshoot-vlan.pdf
[22] Sharada Ramani and R. M. Goudar,”Improved Bandwidth Aggregation using Available Lower Bandwidth Links”, International Journal of Computer Sciences and Engineering, Volume-4, Issue-6, ISSN: 2347-2693, 2016
[23] Rajiv O. Verma, "Effective Remote Management for Inter-VLAN Routing Networks" International Journal of Application or Innovation in Engineering & Management (IJAIEM), ISSN 2319 - 4847,2013.
[24] LI Xingyu, Jiang Tingting, "Design and implementation of the Campus Network Monitoring System" IEEE Workshop on Electronics, Computer and Applications, 2014.
[25] M.R. Sabir , M.S. Mian , K. Sattar and M.A. Fahiem, "IP Address Space Management using Aggregated Fixed Length Subnet Masking", IEEE Network.
[26] “Cisco Packet Tracer 6.0.1 Tool” Cisco Networking Academy