e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:03/March-2023 Impact Factor- 7.868 www.irjmets.com
COLLEGE CAMPUS NETWORK SCENARIO DESIGN &
IMPLEMENTATION BY USING CISCO PACKET TRACER
Chetan Gaurkar*1, Kiran Thul*2, Prof. P. Jaipurkar*3
*1,2Department Of Computer Engineering, SRPCE College Of Engineering, Nagpur, Maharashtra, India.
*3Prof., Dept. Of Computer Engineering, SRPCE College Of Engineering, Nagpur, Maharashtra, India.
DOI : https://www.doi.org/10.56726/IRJMETS34445
ABSTRACT
It is quite challenging to set up a network in a real-time context when conducting network research. A single
testbed takes a lot of effort and resources. As a result, it is difficult and expensive to construct a whole network
in the actual world. The network developer uses the simulator to test whether the network can function in real
time. By doing this, the implementation is made simpler while cutting down on both the time and cost of
evaluating the network's functionality. Network security is crucial for a campus since a campus network is a
significant component of campus life. The difficulty for a campus network is to solve significant security
challenges that are influenced by the network architecture. An institution is shielded from network security
attacks via a secure network. Teaching, learning, research, administration, electronic libraries, publishing
findings, and communicating with outside users are just a few of the uses for a college network. The goal of
network security is to safeguard the college network from numerous dangers and intrusions. The campus
network's hierarchical architecture is set up with various security features to guarantee the quality of services.
It is suggested that Cisco Packet Tracer be used to construct the network.
Keywords: IP Addresses, Cisco Packet Tracer, CCNA, Network Module, Smart Campus, Computer Networks.
I. INTRODUCTION
This scenario for a college network involves creating a topology for a LAN (Local Area Network) where multiple
machines from various departments are set up so they may interact and communicate with one another by
exchanging data. It promotes communication between multiple departments in order to establish a networking
environment for a college that connects different departments to one another. In order to create a topology that
meets all of the requirements of the college, CNS is employed (i.e., client). CNS developed a network that
performs well.
Computer networks became necessary as a result of the necessity to use personal computers inside an
organization to communicate information in the form of messages, shared files, databases, etc. Whether an
organization is spread out over a small campus or one huge building, the significance of computer networks
cannot be overstated. As the name indicates, a local area network (LAN) connects computers within a certain
geographic region. It enables the use of low-cost transmission materials for high-bandwidth transmission.
The corporate network LAN has evolved from a passive, unseen business component to a central hub that is
very active, visible, and relied upon by organizations to support the continuing activities that are crucial to their
ability to compete. Today's network is a strategic tool that must always be available since it can deliver swift,
secure, and reliable services at scale and from everywhere.
The main objective of a network is to decrease solitary users and workgroups. All systems should be able to
communicate with each other and transmit the necessary data. In addition, the hardware must provide
acceptable performance, dependability, and security. When a LAN serves as a conduit for access to the Internet
or an intranet, resource sharing is even more essential. System administrators need specialized tools to
construct and manage LANs because of this. You can predict how a new application, hardware upgrade,
topology change, or increase in traffic volume would affect the network by using a simulation tool. In this
research, we built a LAN network using Cisco Packet Tracer.
Cisco Packet Tracer (CPT), a multitasking network simulation programmed, can be used to perform and
analyses a number of network tasks, including implementing different topologies, selecting the best route
based on different routing algorithms, setting up suitable servers, subnetting, and examining various network
configuration and troubleshooting commands. In order to start communication between end devices and
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[1364]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:03/March-2023 Impact Factor- 7.868 www.irjmets.com
construct a network, we must select suitable network components, such as routers, switches, and hubs, and
establish physical connectivity by connecting cables to serial and Fast Ethernet ports on the Packet Tracer
component list. Given the high cost of networking hardware, it is best to use Packet Tracer to first understand
the concept and operation of the network.
In this work, we outline the process of creating a simulation model of the LAN for our institution using the
programmed CPT. It offers understanding of a number of topics, including topology design, IP address setting,
transmitting data as packets over a single network, and using virtual local area networks (VLANs) to divide
traffic produced by distinct departments. A brand-new LAN design called VLANs makes it possible to use fast,
intelligent switches and routers. The outcomes of the simulation and the performance analysis demonstrated
the effectiveness of the design.
Figure 1: Network Basic Architecture
II. LITERATURE SURVEY
The biggest problem we face on a daily basis is the computer network. For purposes such as education,
administration, communication, e-libraries, automation, etc., networking firms rely on the proper operation and
analysis of their networks. One or more other users' requests to share some data with them primarily trigger
network interaction.
The network's capacity refers to its endurance under heavy use [1]. According to, the majority of the time, the
networks are overloaded with users, causing them to become congested. It is crucial to build a network in a way
that it can support numerous users without experiencing any downtime. 5075 users are the target audience for
this network. The network will be able to scale as more users access it[2].
The ability of the hardware and software components of the computer network to continuously execute in
accordance with their specifications is referred to as reliability [3]. Because Cisco Corporation, a significant and
reputable manufacturer, will provide the majority of its components for this research, the network's
performance will be quite trustworthy. The network's security has excellent levels of dependability. This is so
that data may be protected by a variety of strong tools, such as the firewall device that filters data entering a
network. There is a technique to restore the data from backup servers if there is ever a problem with the data.
The network's computers all have antivirus software to safeguard user data. Moreover, passwords and
encryptions are used to secure every router and switch [4].
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[1365]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:03/March-2023 Impact Factor- 7.868 www.irjmets.com
The first difficulties this network architecture will encounter are economic and financial ones, claims. There is a
cap on the cost of designing the network system that cannot be surpassed. The answer to constructing a
network at a lower cost will be this network architecture. This is so that this design may be implemented as an
integrated network system with high levels of security and affordable device quality. To finish installing every
component of the network, equipment must be available. They lack the full set of tools needed for a local area
network, including firewall, server, and backup technology [5]. Another difficulty in developing this network
will be the availability of devices.
III. PROBLEM STATEMENT
When network device communicates with many other devices, the workload required of the CPUs on the device
can be burdensome. For example, in a large flat (switched) network, broadcast packets are burdensome. As
such the modular nature of the hierarchical design model is to enable accurate capacity planning within each
layer of the hierarchy, thus reducing wasted bandwidth. Network management responsibility and network
management system should be distributed to the different layers of a modular network architecture to control
management costs.
IV. METHODOLOGY
Network Design Methodologies
Large network design projects are normally divided into three distinct steps:
Step 1. Identify the network requirements.
Step 2. Characterize the existing network.
Step 3. Design the network topology and solutions.
Step 1: Identifying Network Requirements
The network designer works closely with the customer to document the goals of the project. Figure 1-1 depicts
a meeting between the designer and the business owner. Goals are usually separated into two categories:
Business goals: Focus on how the network can make the business more successful
Technical requirements: Focus on how the technology is implemented within the network
Step 2: Characterizing the Existing Network
Information about the current network and services is gathered and analyzed. It is necessary to compare the
functionality of the existing network with the defined goals of the new project. The designer determines
whether any existing equipment, infrastructure, and protocols can be reused, and what new equipment and
protocols are needed to complete the design.
Step 3: Designing the Network Topology
A common strategy for network design is to take a top-down approach. In this approach, the network
applications and service requirements are identified, and then the network is designed to support them. When
the design is complete, a prototype or proof-of-concept test is performed. This approach ensures that the new
design functions as expected before it is implemented.
V. TECHNOLOGY TO BE USED
CCNA: Cisco Certified Network Associate (CCNA) is a popular computer networking certification developed by
Cisco Systems. CCNA was developed by Cisco to demonstrate basic skills in installing and maintaining medium-
sized networks. The technology is used to interconnect various devices such as routers, switches, and other
endpoints and exchange data. It enables the construction of a methodical and reliable network that is also
scalable. Portability is one of the features of this working application of the CCN (College Campus Network).
VI. BENEFITS OF NETWORK DESIGN
To meet the four fundamental design goals, a network must be built on an architecture that allows for both
flexibility and growth.
Hierarchical Network Design
In networking, a hierarchical design is used to group devices into multiple networks. The networks are
organized in a layered approach. The hierarchical design model has three basic layers:
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[1366]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:03/March-2023 Impact Factor- 7.868 www.irjmets.com
Core layer: Connects distribution layer devices
Distribution layer: Interconnects the smaller local networks
Access layer: Provides connectivity for network hosts and end devices
Hierarchical networks have advantages over flat network designs. The benefit of dividing a flat network into
smaller, more manageable hierarchical blocks is that local traffic remains local. Only traffic destined for other
networks is moved to a higher layer.
Layer 2 devices in a flat network provide little opportunity to control broadcasts or to filter undesirable traffic.
As more devices and applications are added to a flat network, response times degrade until the network
becomes unusable. Figures 2 and 3 show the advantages of a hierarchical network design versus a flat network
design.
Figure 2: Flat Network
Figure 3: Hierarchical Network
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[1367]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:03/March-2023 Impact Factor- 7.868 www.irjmets.com
VII. CONCLUSION
This work has shown that a typical network system can be built for less money. Even though we built the
network with the least expensive equipment possible, its security has shown to be of the highest caliber. Every
network needs numerous servers to function. Due to the expense, we did not use all the servers for this
research, but we did use key crucial servers like DHCP. These servers support the network's efficient operation
of its functions. This study demonstrates that despite a number of obstacles brought on by budgetary
limitations, we ultimately succeeded in achieving our goal by developing a network for university development
at the lowest possible cost.
VIII. REFERENCES
[1] Md. Anwar Hossain & Mahabuba Zannat. “Simulation and Design of University Area Network Scenario
(UANS) using Cisco Packet Tracer”. Global Journal of Computer Science And Technology: G
Interdisciplinary, Volume 19 Issue 3 Version 1.0 Year 2019.
[2] Khaing Khaing Wai 1 , Thuzar Khin 2 , Khin Thet Mar 3, “Design and Simulation of Campus Area
Network Using Cisco Packet Tracer”, International Journal of New Technologies in Science and
Engineering Vol. 6, Issue. 5, 2019, ISSN 2349-0780.
[3] K Sita, P Saleem Akram, Krishna Hemanth Javvaji and Teja Pavan Attota, “Design and implementation of
Smart Campus Network”, November 8, 2019.
[4] Mugdha Sharma, Chirag Pupreja, “Akash Arora, Design and Implementation of University Network”,
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8, Issue-
2S6, July 2019.
[5] Paulami Pathak1 , Sayanti Majumder2 , Chandra Mondal3 , Prof. Manikandan K4, “College Network
Scenario Implementation by using Cisco Packet Tracer”, International Journal of Advanced Research in
Computer and Communication Engineering ISO 3297:2007 Certified Vol. 7, Issue 1, January 2018.
[6] Prof. Pallavi.G1, Prof Daina K.K 2, Jagadish K.P 3, Pavan Kumar 4, “Enhancing the College Network”,
International Journal of Innovative Research in Science, Engineering and Technology An ISO 3297:
2007 Certified Organization Volume 7, Special Issue 6, May 2018.
[7] Isa Shemsi, “Boosting Campus Network Design Using Cisco Packet Tracer”, Volume 2, Issue 11,
November– 2017 International Journal of Innovative Science and Research Technology ISSN No:-2456
–2165.
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[1368]