408 Project Report(LR, SRS, SDD, Installation Guide, User Manual)

User Manual:

Open the PDF directly: View PDF PDF.
Page Count: 45

Download408 Project Report(LR, SRS, SDD, Installation Guide, User Manual)
Open PDF In BrowserView PDF
ÇANKAYA UNIVERSITY
FACULTY OF ENGINEERING
COMPUTER ENGINEERING DEPARTMENT

Project Report
Version 2

CENG 408
Innovative System Design and Development 2

P2017-12
DESIGN AND IMPLEMENTATION OF A VIRTUAL LOCAL AREA NETWORK
WITH USING CISCO OPERATING SYSTEM
Özde ÖZAŞ
201311043
Buğra YILMAZ
201311061
Esra Nur YÜCEL
201311063

Advisor: Sibel TARIYAN ÖZYER

1

Table of Contents
Table of Contents..................................................................................................................................... 2
Abstract.................................................................................................................................................... 5
Özet: ........................................................................................................................................................ 5
1.

2.

3.

Introduction ...................................................................................................................................... 6
1.1

Motivation ........................................................................................................................................................ 6

1.2

Problem Statement ............................................................................................................................................ 6

1.3

Background or Related Work ........................................................................................................................... 6

1.4

Solution Statement ............................................................................................................................................ 7

1.5

Contribution ...................................................................................................................................................... 7

Literature Search .............................................................................................................................. 8
2.1

Library Research............................................................................................................................................... 8

2.2

Internet Research ............................................................................................................................................ 10

Summary ........................................................................................................................................ 11
3.1

4.

Technology Used ............................................................................................................................................ 11

Software Requirements Specification ............................................................................................ 11
4.1
4.1.1
4.1.2
4.1.3
4.1.4
4.1.5

4.2

Introduction .................................................................................................................................................... 11
Purpose ........................................................................................................................................................................11
Scope of Project ...........................................................................................................................................................12
Glossary .......................................................................................................................................................................14
References ...................................................................................................................................................................15
Overview of Document ................................................................................................................................................15

Overall Description......................................................................................................................................... 16

4.2.1 Product Perspective .....................................................................................................................................................16
Virtual Local Area Network Project is defined Networks for making easy to create and administration of logical groups
which can communicate among themselves. In our Virtual Local Area Newtwork Project, Figure 3 explains that there are 6
different types of VLANs. with a total of 8 VLANs created. ....................................................................................................16
Created virtual local networks; ..................................................................................................................................................16
•
VLAN-1: Default VLAN ................................................................................................................................................16
•
VLAN-2 & 3 Basic VLAN ..............................................................................................................................................16
•
VLAN-4: Wireless VLAN ...............................................................................................................................................16
•
VLAN-5: VOIP VLAN ....................................................................................................................................................16
•
VLAN-6: VOIP Data VLAN ...........................................................................................................................................16
•
VLAN-99: Management VLAN ......................................................................................................................................16
4.2.2 Development Methodology .........................................................................................................................................16
4.2.3 User Characteristics .....................................................................................................................................................17

2

4.3
4.3.1
4.3.2
4.3.3
4.3.4

4.4
5.

Requirements Specification ............................................................................................................................ 18
External Interface Requirements .................................................................................................................................18
Functional Requirements .............................................................................................................................................19
Performance Requirement ...........................................................................................................................................23
Software System attributes ..........................................................................................................................................23

Safety Requirement ........................................................................................................................................ 24

Software Design Description .......................................................................................................... 24
5.1
5.1.1
5.1.2
5.1.3
5.1.4
5.1.5
5.1.6

Introduction .................................................................................................................................................... 24
Purpose ........................................................................................................................................................................24
Scope ...........................................................................................................................................................................25
Glossary .......................................................................................................................................................................27
References: ..................................................................................................................................................................29
Overview of Document ................................................................................................................................................29
Motivation ...................................................................................................................................................................29

5.2

Deployment diagram ...................................................................................................................................... 30

5.3

ARCHITECTURE DESIGN .......................................................................................................................... 30

5.3.1
5.3.2
5.3.3

5.4

VLAN Design Approach .............................................................................................................................................31
Class Diagram..............................................................................................................................................................31
Architecture Design of Simulation ..............................................................................................................................33

PRODUCT OF VLAN PROJECT.................................................................................................................. 36

6.

Conclusions .................................................................................................................................... 39

7.

Acknowledgement .......................................................................................................................... 40

8.

Design and Implementation of a Virtual Local Area Network with using Cisco Operating System User Manual
40

9.

Designand Implementation ofa Virtual Local AreaNetworkwithusing CiscoOperating System Compilation / Installation

Guide ..................................................................................................................................................... 41
REFERENCES

3

List of Figures
Figure 1 : An example of VLAN as Logically Defined Networks
Figure 2 : Network Diagram
Figure 3: Prototype 1
Figure 4 : All Sprints of the Project on the Table
Figure 5 : Internet Management Use Case
Figure 6 : Configure Management Use Case
Figure 7 : VOIP Management Use Case
Figure 8 : An example of VLAN
Figure 9 : The Gantt Chart of Work Plan
Figure 10 : Class Diagram of Simulacrum Project
Figure 11: Architecture Design of Simulation
Figure 12: Prototype of VLAN Project with using Cisco Operating System
Figure 13: Trunk link between two VLAN aware bridges
Figure 14: Access link between a VLAN-aware bridge and a VLAN-unaware device

4

Abstract
The purpose of this document is describing the and implementation of a Virtual Local
Area Network with using Cisco Operating System. This design aims to design VLANs are
commonly incorporated into network design making it easier for a network to support the goals
of an organization. The project will cover how to code VLANs and VLAN trunks. It will also
examine security considerations and strategies relating to VLANs and trunks, and best practices
for VLAN implementation and design. This document includes detailed information about
requirements of the project. It reflects the identified constraints and proposed software
functionalities.
Key words:
Virtual Local Area Network (VLAN), Cisco Operating System.

Özet:
Son yıllarda bulut bilişim, sosyal ağ teknolojileri ve İnternet üzerinden iletişim
teknolojileri alanında hızlı bir büyüme yaşanmıştır. Bu nedenle, Ağ Mühendislerinin her geçen
gün ihtiyaçları artmaktadır. Ağ performansı, bir kuruluşun üretkenliğinde önemli bir faktördür.
Ağ performansını iyileştirmek için kullanılan teknolojilerden biri, büyük yayın alanlarının daha
küçük alanlara ayrılmasıdır. Ağ Mühendisleri pahalı yönlendiricilere olan ihtiyacı azaltmak
istiyorlar. Buna ek olarak, daha güvenli, trafiği en aza indiren veri iletimini istiyorlar. Vlan
tasarımı, bu bulut bilgi işleminin, sosyal ağ teknolojilerinin ve ağlar arası iletişim
teknolojilerinin eksikliği nedeniyle gelişmek için gerekli hale geldi. Yukarıdaki nedenlerden
dolayı, bu projede bir sanal yerel ağ (VLAN) araştırılacak ve uygulanacaktır. Bu çalışmada
Cisco İşletim Sistemi kullanarak bir Sanal Yerel Ağı oluşturulacaktır. Bu tasarım, VLAN'ların
bir ağın bir organizasyonun hedeflerini desteklemeyi kolaylaştıran ağ tasarımına dahil
edilmesini tasarlamayı amaçlar. Proje, VLAN'ların ve VLAN kanallarının nasıl kodlanacağını
kapsar. Ayrıca projede, VLAN'ların gövdelerine ilişkin güvenlik konuları ve stratejileri ile
VLAN tasarımı için en iyi uygulamalar yer alır. Tanımlanan kısıtlamaları ve önerilen yazılım
işlevlerini yansıtır.
Anahtar Kelimeler:
Sanal Yerel Ağı, Ağ performansı, Cisco İşletim Sistemi, Sosyal Ağ Teknolojileri

5

1. Introduction
Using VLAN technology, logical networks are created on the devices that support this
technology. Cisco IOS (Internetworking Operating Systems) and Packet Tracer Simulation
program will be used to coding the switches and network design in this project.

1.1 Motivation
We are a group of students in computer engineering department who are interested in social
networking technologies and internetworking technologies. As a group, we have taken the course
of internetworking, computer network and data communications for a better understanding in
Network management. We aimed to design VLAN that make easy to create and administration of
logical groups which can communicate among themselves in this project. We have used the Cisco
IOS (Internetworking Operating Systems) and Packet Tracer Simulation program were used to
coding the switches and network design in this project. So in order to increase our knowledge in
this field, we have researched cloud technologies and buffer overflow algorithms. For virtual local
area network technologies, firstly we have install Packet Tracer Simulation which we can design
vlan. We have read documents for how to design VLAN in Cisco Certified Network Associate
Study Guide.

1.2 Problem Statement
The organizations of the designs can change frequently and in this case we have to adapt the
changing organizations of these designs. Reconfiguring the devices, unplug the devices and carry
them is difficult. Redesigning or reconfiguring is vulnerable. Errors can lead to network
interruptions. We want to reduce CPU overhead on devices by reducing the number of devices
reduce security risks by reducing the copies of frames sent and receive unnecessarily. Due to
problems, the organization (design) must be flexible, efficient cost, more secure, minimize traffic
etc. We need to design that incorporated into network design making it easier for a network to
support the goals of an organization.

1.3 Background or Related Work
Hubs, switches and routers. They are most important devices for network designing. Hubs
were using in early 10BASE-T networks in 90’s. In the following years switches are using in
networks instead of hubs even today. Switches are connect end devices in same network and
using for frame switching in networks. Routers have been using in networks from the beginning.
They are routing packets between different networks. Also that two device is the name resource
of Cisco’s number one topic, Routing and Switching.
LAN technology was a main technology in networks; However, network engineers realized,
LAN technology with time. IEEE developed a new network technology can be used together
with LANs. That technologs' name is VLAN.
Association’s developed many standards, protocols and technologies used with routers and
switches during this time period. One of these technologies is Virtual LAN (VLAN) and its
protocols.
6

VLAN as Logically Defined Networks. Using VLAN technology, logical networks are
created on the devices that support this technology. [1] A VLAN is a switched network that is
logically segmented, by functions, project teams, or applications rather than on a physical or
geographical basis. Cisco IOS (Internetworking Operating Systems) and Packet Tracer
Simulation program will be used to coding the switches and network design in this project.

1.4 Solution Statement
In this section, we will share our solutions to the problems that are mentioned in section of
Problem Statement.
To solve this problem, we have come to conclusion that we need to use logical grouping of
network users and resources on a local area network (LAN). In other words, VLAN that make
easy to create and administration of logical groups which can communicate among themselves.
We aim to describing and implementation of a Virtual Local Area Network with using Cisco
Operating System. This design aims to design VLANs are commonly incorporated into network
design making it easier for a network to support the goals of an organization. It will also examine
security considerations and strategies relating to VLANs and trunks, and best practices for VLAN
implementation and design. Instead of all problems, we can use VLANs to reconfigure. This
technology(VLAN) allows the reduce CPU overhead on devices by reducing the number of
devices reduce security risks by reducing the copies of frames sent and receive unnecessarily. Also
another security advantage is VLANs keep important data inside VLAN, hosts who in other
VLANs can’t see any data from other VLANs even if in same campus LAN. Network engineers
are more flexible to design networks with VLANs.

1.5 Contribution
IEEE developed a new network technology can be used together with LANs. That technologs'
name is VLAN. Now we look at difference between LANs and VLANs. Difference can be
summarized as:
•
•

•
•

VLANs have better performance than LANs.
In VLANs, Network administration work is less when compared to LANs. LANs require
physical administration as the need for recabling, the location of the user changes,
reconfiguration of routers, addressing the new station and hubs arises.
VLANs reduce the need for expensive routers. Thus, the vlan reduces the cost.
Data transmission is more secure on VLANs.

VLANs reduce latency, switches are used instead of routers unlike in traditional LANs, VLAN
creates broadcast domains and VLANs can help to minimize traffic. For example, if the broadcast
traffic is meant for ten users, they can be placed on ten different VLANs which will in turn reduce
the traffic.

7

2. Literature Search
This Literature includes detailed information about requirements of the project. It reflects the
identified constraints and proposed software functionalities. While working on our project, we
have compiled a database of literature that supports our work. Literature sources can include the
following:

2.1 Library Research
Hubs, switches and routers. They are most important devices for network designing. Hubs
were using in early 10BASE-T networks in 90’s. In the following years switches are using in
networks instead of hubs even today. Switches are connect end devices in same network and using
for frame switching in networks. Routers have been using in networks from the beginning. They
are routing packets between different networks. Also that two device is the name resource of
Cisco’s number one topic, Routing and Switching.
LAN technology was a main technology in networks; However, network engineers realized,
LAN technology with time. IEEE developed a new network technology can be used together with
LANs. That technologs' name is VLAN. Now we look at difference between LANs and VLANs.
Difference can be summarized as:
•
•

•
•
•

VLANs have better performance than LANs.
In VLANs, Network administration work is less when compared to LANs. LANs require
physical administration as the need for recabling, the location of the user changes,
reconfiguration of routers, addressing the new station and hubs arises.
VLANs reduce the need for expensive routers. Thus, the vlan reduces the cost.
Data transmission is more secure on VLANs.
VLANs reduce latency, switches are used instead of routers unlike in traditional LANs,
VLAN creates broadcast domains and VLANs can help to minimize traffic. For example, if
the broadcast traffic is meant for ten users, they can be placed on ten different VLANs which
will in turn reduce the traffic.

Association’s developed many standards, protocols and technologies used with routers and
switches during this time period. One of these technologies is Virtual LAN (VLAN) and its
protocols.
[2]By default, switches break up collision domains and routers break up broadcast domains.
Nowadays, modern network design is characterized by a flatter architecture when compared to
earlier designs. Switches are key devices for that modern flatter architecture. Well, how do we
break up broadcast domains in network which builded only switches? By creating VLANs using
switches. Using VLAN technology, logical networks are created on the devices that support this
technology.[3] These logical networks are actually split broadcast domains.
[4] VLANs make easy to create and administration of logical groups which can communicate
among themselves. Of course they must be on the same LAN. VLANs also simplify
administration of moves, adds, removes and all other changes in hosts of these logical groups.
VLANs are often associated with IP subnetworks. [4] For example, all the end stations in a
particular IP the subnet belongs to the same VLAN.
8

[6] Use more VLANs which have a small number of devices improve campus LANs in many
ways.
•
•
•
•
•

VLANs reduce CPU overhead on devices by reducing the number of devices.
VLANs reduce security risks by reducing the copies of frames sent and receive
unnecessarily.
Also another security advantage is VLANs keep important data inside VLAN, hosts who
in other VLANs can’t see any data from other VLANs even if in same campus LAN.
Network engineers are more flexible to design networks with VLANs. Engineers can
create VLANs by campus LAN requirements.
Problems in one VLAN don’t effect all campus LAN and can solve quickly within
inoperative VLAN.

[7] Packets can’t pass directly to another VLAN in same switch or connected different
switches. If you want connect VLANs to another VLAN, you must add router to network design
or use Layer 3 switches (multilayer switch) instead of Layer 2 switches.
[8] Two types of ports are use in VLANs. Access ports and trunk ports. Administrators can
choose right type for configure VLAN. Switches’ access ports are used for connected to a host
and trunk ports are used for connected to other switches. An access port work in single VLAN.
Administrator can create an access port by statically configured or dynamically assigned. Also a
trunk ports works in multiple VLANs, and they can be created manually configured or run with a
protocol like VLAN Trunking Protocol (VTP).
[9] Number of links between switches increase quickly when adding new VLANs to
network. That situation forced associations and network engineers to find a new solution for
reduce cabling and efficient use of physical interfaces. End of that process, the solution was
VLAN Trunks. A trunk link can transport more than one VLAN through a single switch port.
Trunk links are most beneficial when switches are connected to other switches or routers. A
trunk link is available for all active VLANs. Active VLANs can transport frames between
switches using a single trunk link.
[10] To know to which VLAN a frame belongs, the sending switch, router, or PC adds a
header to the original frame, with that header having a field in which to place the VLAN ID of
the associated VLAN. In this way, one trunk link can be enough for all VLANs. Two main
trunking protocols available for adding VLAN ID to the header. Inter-Switch Link (ISL) defined
by Cisco and 802.1Q defined by IEEE. Nowadays, many network devices even Cisco’s recent
switches support only 802.1Q.
[11] Host mobility can be easier with VLANs. If administrators want to use wireless in
network, they allocate a single VLAN for wireless network. In this way, hosts can retain their
original IP addresses when they move from one access point to another. These hosts can be use
laptops, mobile phones, tablets etc. Hosts can stay connected to network uninterrupted even if
they move across the campus.

9

2.2 Internet Research
VLAN and Cloud Technology
Cloud technology is the simplest online storage service that provides operational convenience
with web-based applications that do not require any installation. All the applications, programs
and data stored on the internet in the cloud, we can easily provide access to programs and data.
Cloud-based services that provide convenience for users and their daily lives and save them from
hardware hitches have been around 3 years for my life.
[12] Network virtualization is the key to the current and future success of cloud
computing. The most important supporter for all virtualisations is the Internet and various
computer network technologies. It turns out that the computer network itself needs to be
virtualized. Several new standards and technologies have been developed for network
virtualization.
[13] VLAN is important technology of all network branches. Cloud computing is one of
them. Data centers are most important places for the cloud computing. In addition to virtual
machine is one of the most important atomic units of a modern data center.
Server virtualization is a key component in cloud computing, offering native agility,
standardization, mobility, and resilience to applications deployed in such environments. At
the same time server virtualization create simple but challenging problem: How to control
Virtual Machine traffic inside of a hypervisor.
VLAN is the best traffic isolation way for virtual networking solutions. Imagine two VM
connect same VLAN, they can exchange frames. If they connect from different VLANs, VMs
isolated to each other. If necessary, router as a layer 3 device is solution for connects them.
VMware created the concept of the virtual switch in the early 2000’s. Briefly, simplified
Layer 2 Ethernet switch software working on hypervisor for control VM traffic.
vSwitch is used the physical NICs as uplinks, conducting VM traffic beyond the access
switch. vSwitch can forward frames between VM and physical switch. All VMs emulates at least
one NIC. Real ethernet frames sending and receiving by that virtual technology. vSwitch decides
the road of frames, after analyzing the destination MAC address. vSwitch route the frame to
physical NIC or to VM which connected to the same VLAN.
vSwitch support more than one VLAN in these interfaces. Using VLAN tagging in its physical
NICs. Based on the 12-bit VLAN ID field defined in the IEEE 802.1Q standard.

Buffer overflow: is one of the Main problems on switches
[14] Cisco IOS can not handle a specially crafted Virtual Trunking Protocol(VTP) summary
advertisement with an overly long VLAN name. Buffer overflow vulnerability can allow a remote
or unauthenticated attacker to execute arbitrary code. Also this vulnerability can cause a denial-ofservice condition. Cisco's VLAN Trunking Protocol adds, deletes, and renames the Virtual Local
Area Network throughout the entire network. The Virtual Trunking Protocol is supported by IOS
10

and CentOS operating systems. There are a buffer overflow vulnerability in some versions of IOS
and CatOS when their handling of certain VTP summary advertisements.Depending on local
network configuration, reaching the target system on a trunk enabled port may limit the systems
from which the attacker can stage an attack. Following the workarounds can lead to a security
vulnerability. VTP domain password can applied. VTP domain password is standard suggested
practice.

Workarounds:
•
•
•
•

Administrators are advised to apply the appropriate update.
Administrators are advised to set passwords on VTP domains.
Administrators are advised to restrict access to affected devices.
Administrators are advised to monitor affected systems for signs of suspicious activities.

3. Summary
3.1 Technology Used
Using VLAN technology, logical networks are created on the devices that support this
technology. Cisco IOS (Internetworking Operating Systems) and Packet Tracer Simulation
program will be used to coding the switches and network design in this project. This
technology(VLAN) allows the reduce CPU overhead on devices by reducing the number of
devices reduce security risks by reducing the copies of frames sent and receive unnecessarily.

4. Software Requirements Specification
4.1 Introduction
4.1.1 Purpose
The purpose of this document is describing the and implementation of a Virtual Local Area
Network with using Cisco Operating System. This design aims to design VLANs are commonly
incorporated into network design making it easier for a network to support the goals of an
organization. The project will cover how to code VLANs and VLAN trunks. It will also examine
security considerations and strategies relating to VLANs and trunks, and best practices for VLAN
implementation and design. This document includes detailed information about requirements of
the project. It reflects the identified constraints and proposed software functionalities. Moreover,
the SRS document explains how participants interact with the simulation.

11

4.1.2 Scope of Project

In recent years there has been rapid growth in cloud computing, social networking
technologies and internetworking technologies. Therefore, the need is increasing with each
passing day that the Network Engineers all over the world. Network performance is an
important factor in the productivity of an organization. One of the technologies used to improve
network performance is the separation of large broadcast domains into smaller ones. Network
Engineers want to reduce the need for expensive routers. In addition to this,they want to data
transmission that is more secure,minimize traffic. The project has become necessary to develop
due to lack of these cloud computing, social networking technologies and internetworking
technologies. Because of the above reasons, A virtual local area network (VLAN) will be
investigated and applied in this project.
The purpose of this project is to design VLAN that make easy to create and
administration of logical groups which can communicate among themselves. VLAN as
Logically Defined Networks.

Figure 1: shows an example of VLAN as Logically Defined Networks. There are 3 separate
departments: engineering, marketing and accounting departments. Each department is assigned
to another VLAN.
Using VLAN technology, logical networks are created on the devices that support this
technology. Cisco IOS (Internetworking Operating Systems) and Packet Tracer Simulation
program will be used to coding the switches and network design in this project. This
technology(VLAN) allows the reduce CPU overhead on devices by reducing the number of
devices reduce security risks by reducing the copies of frames sent and receive unnecessarily.Also
another security advantage is VLANs keep important data inside VLAN, hosts who in other
VLANs can’t see any data from other VLANs even if in same campus LAN.Network engineers
are more flexible to design networks with VLANs. Engineers can create VLANs by campus LAN
requirements.Problems in one VLAN don’t effect all campus LAN and can solve quickly within
inoperative VLAN.This project creates opportunities such as flexible, efficient cost, more
secure,minimize traffic etc.

12

Figure 2: Network Diagram. This project is an example that uses the network setup
shown in the diagram above.
References:
[1] https://www.cisco.com/c/en/us/support/docs/switches/catalyst-3750-series-switches/45002-

intervlan3750-45002.html

In our project, we will design a total of 8 virtual local area networks. VLANs are named:
•
•
•
•
•
•
•

Vlan1 is default Vlan.
Vlan2 & Vlan3 are basic Vlan.
Vlan4 is a wireless Vlan.
Vlan5 is a VOIP Vlan.
Vlan6 is a VOIP data Vlan.
Vlan90 is a native Vlan.
Vlan99 is a management Vlan.

13

4.1.3

Glossary

Table 1 Glossary of SRS

Term

Cisco IOS

Router

Switch

Interface

Definition

Cisco network devices need an operating system like
PC. Cisco calls this OS the Internetworking Operating
Systems (IOS).
Network layer device that determine the best path in
forwarded network traffic. Routers forward packets
between networks. Routers known as gateway in
network topologies. Cisco 2911 that we used in our
network is a new and trend router of Cisco.
Data link layer device that forward framesaccording to
destination address of frames. Cisco 2960 that we used
in our network is a commonswitch of Cisco.
Connection between two devices. Also configure
ports with interface command in Cisco IOS.

Cisco Packet Tracer Cisco network simulation software.

Network Topology Arrangement of network devices and connections in a
networking structure.
VLAN Trunk

Trunk is a link (connection) type between devices.
Trunking add VLAN identification informations in
frame headers. In this way, many VLANs connected
together with one trunk link.
Broadcast Domain Device group that will receive broadcast frame
creating from any device in the same group.
Campus LAN

Access Point

DHCP

Campus LAN build by interconnected LANs.
All network eqiupments of Campus LAN owned
by campus user. (University, company etc.)
Network device that create wireless connection
for Wi-Fi devices to connect wired networks.
Dynamic Host Configuration Protocol. DHCP
configure host parameters for connect hosts to
network, such as IP address, Subnet Mask, Default
Gateway etc.

14

Media

Physical environments which transmitted data signals
between network devices.

Network media that use for connect to different type
Copper
of devices. Such as, PC – Switch connection.
StraightThrough
Copper Cross-Over Network media that use for connect to same type
of devices. Such as, Router - Router connection.
Subnet Mask

32 bit IP address mask. Subnet Masks divides the IP
addressesfor networks and hosts.

Default Gateway

Router thatstart forwarding packets to other networks.

VoIP

Voice over Internet Protocol. VoIP deliver voice
comminications over IP with VoIP Phones.

Participant

The user who interacts with the Virtual Local Area
Network environment.

Scrum

Scrum is a methodology which is an agile software
development process.

4.1.4 References
1. https://www.cisco.com/c/en/us/support/docs/switches/catalyst-3750-series-switches/45002intervlan3750-45002.html
2. S. Al-Zaghir, S. T. Özyer and M. Al-Dagdoog, "Recruitment of security features for securing VTP3
domain in campus environment" Computer Science and Engineering (UBMK), 2017 International
Conference on, Antalya, Turkey, October 5-8, 2017.
Available: http://ieeexplore.ieee.org/document/8093390/

4.1.5 Overview of Document
The second part of the document describes functionalities of a Virtual Local Area
Network: describing the and implementation of a Virtual Local Area Network with using
Cisco Operating System. This design aims to design VLANs are commonly incorporated into
network design making it easier for a network to support the goals of an organization.
Informal requirements are described and it is a context for technical requirement
specification in the Requirement Specification chapter.

15

4.2 Overall Description
4.2.1 Product Perspective
Virtual Local Area Network Project is defined Networks for making easy to
create and administration of logical groups which can communicate among themselves.
In our Virtual Local Area Newtwork Project, Figure 3 explains that there are 6
different types of VLANs. with a total of 8 VLANs created.

Created virtual local networks;
•
•
•
•
•
•

VLAN-1: Default VLAN
VLAN-2 & 3 Basic VLAN
VLAN-4: Wireless VLAN
VLAN-5: VOIP VLAN
VLAN-6: VOIP Data VLAN
VLAN-99: Management VLAN

Figure 3: Prototype 1

4.2.2 Development Methodology
For developing the project, we are using Scrum which is an agile software development
process. There are some advantages of Scrum. The essence of each Sprint is the same, but it
is divided into various sub-branches that differ in their process. It is aimed primarily at
16

developing important requirements for the project. Scrum provides an environment that
allows to build up a strong team. We define a 'goal' each time and every time, we do try to
reach it together. Scrum shows the overall scenery of our on-going project. After every
sprint, we have a new release which provides the chance to try newly implemented
components of the product (continuous integration). [4] Figure 4 represents four sprints of
the project on the table. We schedule meetings every week and we discuss about both the
implemented components and the future ones. Development team should have a daily
meeting every morning which should be maximum 15 minutes. With this daily meeting,
everybody knoweach other’s tasks. This meeting is an opportunity for the Scrum Team to
develop itself. We can reduce the risk of conflicts and this makes development faster.It is
better to show everything you’ve got and make the best of the feedback you get.Sometimes
we change our components because there can be misunderstandings, but if youare working
with Scrum, change is the norm and you have to tolerate changes which prevents future too
large changes. Scrum is the most suitable methodology for the project.

Figure 4: All Sprints of the Project on the Table
4.2.3 User Characteristics
Participants
•
•

Participant must be a client of any VLAN.
Participant must connect to Internet.
17

•
•

Participant must have knowledge of networking softwares in computer OS.
Participant must have knowledge of network equipments on computer hardware.

Admin
•
•
•
•
•
•

Admin must be administrator of network.
Admin must read and understand English language.
Admin must know how to use a computer.
Admin must know how to remoted or wired connect to Cisco Network devices.
Admin must have knowledge of configure Cisco Network devices
Admin must know VLAN creating techniques.

4.3 Requirements Specification
4.3.1 External Interface Requirements
4.3.1.1 User interfaces
The user interface will be worked any type of OS. Terminal which is most basic management
tool of all OS and main interface of Cisco Network devices.

4.3.1.2 Hardware interfaces
The configuration requires personel computer which have connection with Cisco
Network devices. That connection can be provided with wired media (console cable) or remote
connection (Telnet or SSH).

4.3.1.3 Software interfaces
There are no external software interface requirements.

4.3.1.4 Communications interfaces
There are no external communications interface requirements.

18

4.3.2 Functional Requirements
Internet Management Use Case
Use Case:
•

Connect

•

Configure as Admin

•

Exit
Diagram:

Figure 5: Internet Management Use Case
Brief Description:
In Internet Management diagram (Figure 5) explains the basic operations which is
related to entering system of participant and admin. Participant and admin are able to use the
following function: Exit. Apart from these, participant can also use the Connect function and
Admin can use the Configure as Admin functions.
Initial Step by Step Description:
19

1.
2.
3.
4.

Participant shall connect the Internet without configure.
Admin shall configure to the system using password.
If the password is invalid for the admin name, admin should re-login.
Admin and Participant can exit from the connection.

Configure Management Use Case
Use Case
•

Attendance VLAN

•

Create VLAN

•

VLAN name Change

•

Delete VLAN

•

Add Interface to VLAN

•

Delete Interface to VLAN

•

Create Bridges Between VLANs

•

Shutdown all Connections

•

Exit

Diagram:

Figure 6: Configure Management Use Case

20

Brief Description:
Figure 6 shows Configure Management use case diagram. When participant entered
network within the system, he/she must attend one of VLANs and Exit Internet. Admin can
configure functions of Create VLAN, VLAN Name Change, Delete VLAN, Add Interfaces
to VLAN, Delete Interfaces to VLAN, Create Bridges between VLANs, Shtdown All
Connections and Exit in Configure Management system.
Initial Step-By-Step Description:
1.
2.
3.
4.
5.

If participant connect the Internet, he/she attend the one of VLANs.
If participant shutdown own computer or connection, he/she exit the VLAN which connected.
If Admin open connection with device, he/she reach the Commond Line Interface of device.
If Admin want to configure functions of device, he/she login with password initially.
If Admin want to create new VLAN, he/she enter configuration interface with password and
must enter number of new VLAN.

6. If Admin want to change name of VLAN, he/she enter "name (chosen name)" command in
VLAN-configuration interface.
7. If Admin want to delete one of VLANs, he/she enter "no vlan (#vlan)" command in VLANconfiguration interface.
8. If Admin want to add new participants to one of VLANs, he/she enter "switchport access vlan
4" command in interface-configuration interface.
9. If Admin want to delete participants to one of VLANs, he/she enter "no interface vlan
(#vlan)" command in interface-configuration interface.
10. If Admin want to create bridges between VLANs, he/she build a trunk link between router
and switches which include selected VLANs.
11. If Admin want to shutdown all connections, he/she enter "shutdown" command for all
interfaces in interface-configuration interface.
12. If Admin shutdown own computer or connection, he/she exit the VLAN which connected.
VOIP Management Use Case
Use Case:

•
•
•
•

IP Phone Call
Regular Phone Call
Call Ending
User Settings
21

•
•
•
•
•

Device Settings
Assign IP Address
Assign Phone Number
Shutdown Connection
Exit

Diagram

Figure 7: VOIP Management Use Case
Brief Description:
Figure 7 shows VoIP Management use case diagram. Diagram explains basic operations
which are related to VoIP network of participant and admin. Participant and admin are able to
use the following functions: User Settings, Device Settings and Shutdown Connection. Apart
from these, participant can also use the IP Phone Call, Regular Phone Call, Call Ending and
Admin can use Assign IP Address, Assign Phone Number and exit functions.
Initial Step-By-Step Description:

1. If participant want to IP Phone Call, he/she call any IP Phone Number in VLAN.
2. If participant want to Regular Phone Call, he/she call any telephone number.
22

3. If participant want to Call Ending, he/she put handset to handset place or push the
handset button manually.
4. If participant want to reach user settings, he/she push settings button, next user
settings button in main menu.
5. If participant want to reach device settings, he/she push settings button, next device
settings button in main menu.
6. If participant want to shutdown connection, he/she disconnect network media on hub
which embedded back of IP Phone.
7. If Admin want to change user settings, he/she enter Router’s Telephony Service
Configuration and configure user settings of IP Phone.
8. If Admin want to change device settings, he/she enter Router’s Telephony Service
Configuration and configure device settings of IP Phone.
9. If Admin want to Assign IP Address to IP Phone, he/she enters Router’s Telephony
Service Configuration and assigns IP address to IP Phone.
10. If Admin want to Assign Phone Number to IP Phone, he/she enters Router’s
Telephony Service Configuration and assigns Phone Number to IP Phone.
11. If Admin want to shutdown connection, he/she enter "shutdown" command for IP
Phone interface in switch interface-configuration interface.
12. If Admin shutdown own computer or connection, he/she exit the all devices which
connected.

4.3.3 Performance Requirement
Minimum requirement for attend to VLAN is any device which have internet
connection.

4.3.4 Software System attributes
4.3.4.1 Portability
There is no portability requirement.
4.3.4.2 Performance
• VLANs increase the connection speed of all network.
• VLANs are provide more secure connections for networks
• VLANs are decrease CPU overhead of network devices.
4.3.4.3 Usability
There is no usability requirement.
23

4.3.4.4 Adaptability
•
•

VLANs created with very basic logic for Cisco Network devices in this project.
Commands can adaptable easily for non-Cisco Network devices.

4.3.4.5 Scalability
•
•
•

Networks have scability for VLANs. Admin can create 1-4096 VLANs in one
Network.
Also he/she can delete any VLAN except VLAN 1.
VLANs have scability. Admin add or delete interfaces as network allows.

4.4 Safety Requirement
•

Since only one participant uses the system at a time, there is no safetyrequirement.

5. Software Design Description
5.1 Introduction
5.1.1 Purpose
The purpose of this Software Design Document is providing the details of
project titled as “Design and Implementation of a Virtual Local Area Network
with using Cisco Operating System”.

The organizations of the designs can change frequently and in this case we
have to adapt the changing organizations of these designs. Redesigning or
reconfiguring is vulnerable. Errors can lead to network interruptions. [15]
Enterprise network operators must frequently change the design of their networks
to reflect new organizational needs, that may arise due to the addition of new
hosts, movement and reorganization of departments and personnel, revision of
security policies, and upgrading of router hardware. Networks have high-level
goals. These could be security and performance. These top-level targets are
embedded in low-level configurations. Restructuring corporate networks is
challenging in this sense. Regular changes are often necessary. It is necessary to
make changes to more than one device while changing a specific design. There are
dependencies between configurations in managing networks. This can cause
complexity. Thus, in reconfiguration and redesign, errors may occur. Errors in
24

changing configurations have been known to result in outages, business service
disruptions, violations of Service Level Agreements (SLA) and cyber-attacks [16],
[17], [18]. When a company is developing, it needs new departments and host
categories. Similarly, it can be in situations such as merging or closing
departments. That's why we need VLANs. In a network without VLANs, network
management is a challenge. In VLANs, Network administration work is less. [19]
VLANs make easy to create and administration of logical groups which can
communicate among themselves. Network engineers are more flexible to design
networks with VLANs. VLANs can help to minimize traffic. [20] Our results
show that our VLANs and algorithms can produce significantly better designs than
current practice, while avoiding errors and minimizing human work.

The purpose of this project is describing the implementation of a Virtual
Local Area Network with using Cisco Operating System. This design aims to
design VLANs are commonly incorporated into network design making it easier
for a network to support the goals of an organization. The project will cover how
to code VLANs and VLAN trunks. It will also examine security considerations
and strategies relating to VLANs and trunks, and best practices for VLAN
implementation and design. This document includes detailed information about
requirements of the project. It reflects the identified constraints and proposed
software functionalities. Moreover, In order to provide a better comprehension, this
SDD includes various diagrams such as UML diagram of the project, activity
diagram and block diagram.
5.1.2

Scope
This document contains a complete description of the design of VLAN: is
the logical grouping of network users and resources on a local area network (LAN)
and is assigned to ports on the switch.

The need is increasing with each passing day that the Network Engineers all
over the world. Network performance is an important factor in the productivity of
an organization. One of the technologies used to improve network performance is
the separation of large broadcast domains into smaller ones. Network Engineers
want to reduce the need for expensive routers. In addition to this,they want to data
transmission that is more secure,minimize traffic. The project has become necessary
to develop due to lack of these cloud computing, social networking technologies
and internetworking technologies. Because of the above reasons, A virtual local
area network (VLAN) will be investigated and applied in this project.

The purpose of this project is to design VLAN that make easy to create and
administration of logical groups which can communicate among themselves. VLAN
as Logically Defined Networks. Using VLAN technology, logical networks are
25

created on the devices that support this technology. [21] A VLAN is a switched
network that is logically segmented, by functions, project teams, or applications
rather than on a physical or geographical basis. Cisco IOS (Internetworking
Operating Systems) and Packet Tracer Simulation program will be used to coding
the switches and network design in this project. If you want to reconfigure the
devices, you do not need to unplug the devices and carry them. Instead of all this,
we can use VLANs to reconfigure. This technology(VLAN) allows the reduce CPU
overhead on devices by reducing the number of devices reduce security risks by
reducing the copies of frames sent and receive unnecessarily.Also another security
advantage is VLANs keep important data inside VLAN, hosts who in other VLANs
can’t see any data from other VLANs even if in same campus LAN.Network
engineers are more flexible to design networks with VLANs. Engineers can create
VLANs by campus LAN requirements.Problems in one VLAN don’t effect all
campus LAN and can solve quickly within inoperative VLAN.This project creates
opportunities such as flexible, efficient cost, more secure,minimize traffic etc.

Figure 8: An example of VLAN design

When a company is developing, it needs new departments and host categories.
Similarly, it can be in situations such as merging or closing departments. Making changes
to VLANs can cause complexity. The process of redesigning and reconfiguring VLANs
can be complex and error-prone as we discuss above. Sometimes this may be possible by
well-chosen design strategies. VLAN's offer a number of advantages over traditional
LAN's. These are:
26

•
•
•
•
•

Performance
Formation of Virtual Workgroups
Simplified Administration
Reduced Cost
Security

A VLAN consists of a number of end systems, either hosts or network equipment
(such as bridges and routers), connected by a single bridging domain. The bridging domain
is supported on various pieces of network equipment such as LAN switches that operate
bridging protocols between them with a separate group for each VLAN.[22]. Routers must
be only used to communicate between two VLANs.

There are a few things to consider when designing VLANs.
•
•

•

5.1.3

Correctness criterion: If a different machine belongs to a different
category, it should be placed in a different VLAN.
Feasibility criterion: [23] The maximum number of hosts a VLAN can
have is determined by the size of the IP block it is assigned. For
example, a VLAN with a /24 IP block can have no more than 256 hosts.
Performance and cost criteria: [24] Hosts in the same VLAN belong to
the same broadcast domain, and it is important to keep the cost of
broadcast traffic small.

Glossary

Table 2 Glossary of SDD

Term

Cisco IOS

Router

Switch

Definition

Cisco network devices need an operating system like
PC. Cisco calls this OS the Internetworking Operating
Systems (IOS).
Network layer device that determine the best path in
forwarded network traffic. Routers forward packets
between networks. Routers known as gateway in
network topologies. Cisco 2911 that we used in our
network is a new and trend router of Cisco.
Data link layer device that forward framesaccording to
destination address of frames. Cisco 2960 that we used
in our network is a commonswitch of Cisco.

27

Interface

Connection between two devices. Also configure
ports with interface command in Cisco IOS.

Cisco Packet Tracer Cisco network simulation software.

Network Topology Arrangement of network devices and connections in a
networking structure.
VLAN Trunk

Trunk is a link (connection) type between devices.
Trunking add VLAN identification informations in
frame headers. In this way, many VLANs connected
together with one trunk link.
Broadcast Domain Device group that will receive broadcast frame
creating from any device in the same group.
Campus LAN

Access Point

DHCP

Media

Campus LAN build by interconnected LANs.
All network eqiupments of Campus LAN owned
by campus user. (University, company etc.)
Network device that create wireless connection
for Wi-Fi devices to connect wired networks.
Dynamic Host Configuration Protocol. DHCP
configure host parameters for connect hosts to
network, such as IP address, Subnet Mask, Default
Gateway etc.
Physical environments which transmitted data signals
between network devices.

Network media that use for connect to different type
Copper
of devices. Such as, PC – Switch connection.
StraightThrough
Copper Cross-Over Network media that use for connect to same type
of devices. Such as, Router - Router connection.
Subnet Mask

32 bit IP address mask. Subnet Masks divides the IP
addressesfor networks and hosts.

Default Gateway

Router thatstart forwarding packets to other networks.

VoIP

Voice over Internet Protocol. VoIP deliver voice
comminications over IP with VoIP Phones.

Participant

The user who interacts with the Virtual Local Area
Network environment.
28

Scrum

Scrum is a methodology which is an agile software
development process.

UML Diagram

It is a modelling language which is used in Software
Engineering.

Block Diagram

The type of schema which the components in the
system are displayed in blocks.

SDD

Software Design Document

5.1.4

References:
[1] Reference: Xin Sun, Yu-Wei E. Sung, Sunil D. Krothapalli, and Sanjay G. Rao , “A
Systematic Approach for Evolving VLAN Designs”, IEEE INFOCOM, 2010

5.1.5

Overview of Document
The remaining chapters and their contents are listed below.
Section 2 is the Architectural Design which describes the project development
phase.
Also it contains class diagram of the system and architecture design of the project
which describes actors, exceptions, basic sequences, priorities, pre-conditions and post
conditions.
Section 3 is related to prototype. In this section, we have shown the sample of
VLANs in the prototype and have described simulation.

5.1.6

Motivation
We are a group of students in computer engineering department who are interested
in social networking technologies and internetworking technologies. As a group, we have
taken the course of internetworking, computer network and data communications for a
better understanding in Network management. We aimed to design VLAN that make easy
to create and administration of logical groups which can communicate among themselves
in this project. We have used the Cisco IOS (Internetworking Operating Systems) and
Packet Tracer Simulation program were used to coding the switches and network design in
this project. So in order to increase our knowledge in this field, we have researched cloud
technologies and buffer overflow algorithms. For virtual local area network technologies,
firstly we have install Packet Tracer Simulation which we can design Vlan. We have read
documents for how to design VLAN in Cisco Certified Network Associate Study Guide.

29

5.2 Deployment diagram
Gantt Chart in Figure 9 includes three parts which are research & documentation and
sprints part. A Gantt Chart in which a series of horizontal lines shows the amount of work
done or production completed in certain periods of time in relation to the amount planned for
those periods. This Gantt Chart explains tasks and subtasks in a chart with status and
chronological relationships. This gives a full picture of the progression of the project at a
single glance, and helps identify potential or existing delays. Once a task is created, it can still
be modified directly from the table or Gantt chart. Each activity is represented by a bar; the
position and length of the bar reflects the starts date, duration and end date of the activity.
First approximately 2 months are spent using waterfall for research and documentation which
include information regarding project. After documentation, there are 4 sprints. After
completing testing and release at the end of each sprints, if there are any tasks which are not
completed, extra working days have been reserved for the purpose of completing these tasks.
•

What the various activities are

•

When each activity begins and ends

•

How long each activity is scheduled to last

•

Where activities overlap with other activities, and by how much

•

The starts and end date of the whole project

Figure 9: Gantt Chart of Work Plan

5.3 ARCHITECTURE DESIGN
30

5.3.1

VLAN Design Approach
For developing the project, we are using Scrum which is an agile software
development process. There are some advantages of Scrum. The essence of each Sprint is the
same, but it is divided into various sub-branches that differ in their process. It is aimed
primarily at developing important requirements for the project. Scrum provides an
environment that allows to build up a strong team. We define a 'goal' each time and every
time, we do try to reach it together. Scrum shows the overall scenery of our on-going project.
After every sprint, we have a new release which provides the chance to try newly
implemented components of the product (continuous integration). Figure 3 represents four
sprints of the project on the table. We schedule meetings every week and we discuss about
both the implemented components and the future ones. Development team should have a
daily meeting every morning which should be maximum 15 minutes. With this daily
meeting, everybody know each other’s tasks. This meeting is an opportunity for the Scrum
Team to develop itself. We can reduce the risk of conflicts and this makes development
faster.It is better to show everything you’ve got and make the best of the feedback you get.
Sometimes we change our components because there can be misunderstandings, but if
youare working with Scrum, change is the norm and you have to tolerate changes which
prevents future too large changes.
Scrum is the most suitable methodology for the project.

5.3.2

Class Diagram

31

Figure 10: Class Diagram of Simulacrum Project

Figure 10 displays information about connections between the systems. Host Device
Class is the starting system. It is responsible for connections between actors and other two
32

main systems. Actor class represents all the users who use the system. Participant class is for
users who will use the host device for connection network by attending any VLAN. Admin
class is for actor which manages the system. Switch class is the switch device in network
design. Interface class represents physical Ethernet ports on switch device. Vlan class is show
Vlan information in upper interface class. Router class is router device in network design.
Telephony Service class represents VoIP information in router. DHCP IP Pool class manages
IP address pool in router’s telephonyservice.

5.3.3

Architecture Design of Simulation

Figure 11: Architecture Design of VLANs

33

5.3.3.1 Internet Management
Summary: This system is used by participant and admin. Participant can connect
and exit from the system. In addition to this, admin can configure network devicesand exit
from the system.
Actor: Participant, Admin
Precondition: Participant must starts the device which have internet connection.
Admin must connectnetwork device configuration interface.
Basic Sequence:
1. Participant must have device which have internet connection.
2. Participant can starts software which need internet connection.
3. Admin can connect the network device and configuredevice by Command Line
Interface.
4. Admin must enter passwords of device if passwords set before.
5. Participant and admin can exit from the system by shutdown software or device.
Exception: Password input can be failed.
Post Conditions: None
Priority: Medium

5.3.3.2 Configure Management
Summary: This system is used by participant and admin. Participant can attend to
VLANand exit from the system. Admin can attend to VLAN, create VLAN, change VLAN
name, delete VLAN, add interface to VLAN, delete interface to VLAN, create bridges between
VLANs, shutdown all connectionsand exit from the system.
Actor: Participant, Admin
Precondition: Participant must starts the device which have internet connection. Admin
must connect network device configuration interface.
Basic Sequence:
1. Participant must have device which have internet connection.
2. Participant can starts software which need internet connection.
3. Admin can connect the network device and configure device by Command Line
Interface.
4. Admin must enter passwords of device if passwords set before.
34

5. Admin must control all hosts and other devices in network before change VLAN
structures.
6. Admin can create VLAN in Command Line Interface of switch.
7. Admin can change VLAN name in Command Line Interface of switch.
8. Admin can add and delete interface to VLAN in Command Line Interface of switch.
9. Admin can create bridges between VLANs in Command Line Interface of router.
10. Admin can shutdown all connections in Command Line Interface of network devices.
11. Participant and admin can exit from the system by shutdown software or device.
Exception: Password input can be failed.
Post Conditions: None
Priority: Medium

5.3.3.3 VOIP Management
Summary: This system is used by participant and admin. Participant can IP phone call,
regular phone call, end call, change user settings, change device settings andshutdown phone
connection in the system. Admin can change user settings, change device settings, assign IP
address to IP phones, assign phone number to IP phones, shutdown connections and exit from
the system.
Actor: Participant, Admin
Precondition: Participant must have and start the IP Phone. Admin must connect
network device configuration interface.
Basic Sequence:
1. Participant must IP Phone which have internet connection.
2. Participant must starts IP Phone.
3. Participant can IP phone call by hold handset and enter contact person IP phone
number.
4. Participantcan regular phone call by hold handset and enter contact person regular
phone number.
5. Participant can end call by put handset in its place.
6. Participant can change user settings and device settings from IP Phone options menu
by using IP Phone screen.
7. Participant can shutdown phone connection by disconnect power or ethernet cable of
IP Phone.
35

8. Admin can connect the router and configure IP Phones by Command Line Interface of
Router’s Telephony Service configuration.
9. Admin must enters passwords of router if passwords set before.
10. Admin must controls all IP Phones in network before change VoIP structure.
11. Admin can change user settings and device settings in Command Line Interface of
Router’s Telephony Service configuration.
12. Admin can assign IP address and phone IP numbers to IP Phones in Command Line
Interface of Router’s Telephony Service configuration.
13. Admin can shutdown IP Phone connections in Command Line Interface of Router’s
Telephony Service configuration.
14. Admin can exit from the system by shutdown software or router
Exception: Password input can be failed.
Post Conditions: None
Priority: Medium

5.4 PRODUCT OF VLAN PROJECT
5.4.1 Modelling of VLANs

Figure 12: Prototype of VLAN Project with using Cisco Operating System
36

5.4.1.1 VLAN names and Functions
In our project, we designed a total of 8 virtual local area networks. VLANs are named:
•
•
•
•
•
•
•

Vlan1 is default Vlan.
Vlan2 & Vlan3 are basic Vlan.
Vlan4 is a wireless Vlan.
Vlan5 is a VOIP Vlan.
Vlan6 is a VOIP data Vlan.
Vlan90 is a native Vlan.
Vlan99 is a management Vlan.

VLAN-1 (Default Vlan)

The virtual switch supports the each it of these VLAN types. The purpose of each is to
assist in the management of VLAN assignments and traffic flow through the virtual switch.

Cisco switches always have Vlan1 that the default Vlan. We can't change or delete the
default VLAN, it is mandatory.

VLAN-90 ( Native Vlan)

The native VLAN is the only VLAN which is not tagged in a trunk. In other words,
native VLAN frames are transmitted unchanged. Native Vlan traffic traverse untagged. There is
no tagging.

VLAN-99 ( Management Vlan)

Management VLAN is used for managing the switch from a remote location by using
protocols such as telnet, SSH, SNMP, syslog etc. It is used to support remote connections
from network administrators. Normally the Management VLAN is VLAN 1. But you can use
any VLAN as a management VLAN.

37

VLAN-2 & VLAN-3 (Basic Vlan)

Basic VLANs is defined Networks for making easy to create and
administration of logical groups which can communicate among themselves.

VLAN-4 Wireless VLAN

The basic wireless components of a VLAN consist of an access point and a client
associated to it through wireless technology. The access point is physically connected through
a trunk port to the network VLAN switch on which the VLAN is configured. The physical
connection to the VLAN switch is through the access point Ethernet port. [25]

VLAN-5 VOIP VLAN

The voice VLAN feature enables access ports to carry IP voice traffic from an IP
phone.

VLAN-6 VOIP DATA VLAN

The VOIP Data VLANs use hubs between phones to connect cables. In other words, it
behaves like any other VLAN but can be connected to the phone.

5.4.1.2 Types of Connections for Project
1) Trunk Link
2) Access Link

38

Figure 13: Trunk link between two VLAN-aware bridges

Figure 14: Access link between a VLAN-aware bridge and a VLAN-unaware
device

6. Conclusions
This document includes wide information about our project that titled as “Design and
Implementation of a Virtual Local Area Network with using Cisco Operating System”. In this
project, we have aimed to design VLAN that make easy to create and administration of logical
groups which can communicate among themselves. VLAN as Logically Defined Networks. We
plan to use VLAN technology, logical networks are created on the devices that support this
technology. [26] A VLAN is a switched network that is logically segmented, by functions,
project teams, or applications rather than on a physical or geographical basis. Cisco IOS
(Internetworking Operating Systems) and Packet Tracer Simulation program will be used to
coding the switches and network design in this project. To develop project, first of all, we have
made a lot of research about VLAN Technology, its usage area and similar projects. We have
analyzed the similar projects, and tried to understand what features have made them effective.
We have gained a lot of information about VLAN Technology and how to develop a project
that includes VLAN Technology products. One of the most important advantage of that if you
want to reconfigure the devices, you do not need to unplug the devices and carry them. Instead
of all this, we can use VLANs to reconfigure. This technology(VLAN) allows the reduce CPU
overhead on devices by reducing the number of devices reduce security risks by reducing the
39

copies of frames sent and receive unnecessarily.Also another security advantage is VLANs
keep important data inside VLAN, hosts who in other VLANs can’t see any data from other
VLANs even if in same campus LAN.Network engineers are more flexible to design networks
with VLANs. Engineers can create VLANs by campus LAN requirements.Problems in one
VLAN don’t effect all campus LAN and can solve quickly within inoperative VLAN.This
project creates opportunities such as flexible, efficient cost, more secure,minimize traffic etc.
After research part, we have received requirements from a representative of Virtual Local Area
Network. Upon these requirements, a SRS document is prepared. After requirements are
specified, design of the developing product are prepared and this design is explained in a SDD
document. During this period, we have chosen our development methodology, designed the
architecture of the product and to present the product to the customer, we have developed a
basic prototype of the project.

7. Acknowledgement
At first we offer our thanks to Sibel Tarıyan ÖZYER, our consultant. We thank all our
teachers who helped us with the feedback. We give thanks to everyone who contributes to the
work. The help we received from them was a great asset to improve this project and ourselves.

8. Design and Implementation of a Virtual Local Area Network with using Cisco
Operating System User Manual
•

Open .pkt file on Cisco Packet Tracer simulation software.

•

Fast forward Time button is start and optimized devices very quick.

•

Every device has CLI (Command Line Interface). Click the device and click CLI button up of the
device window. Our final commands of project available in GitHub. All commands can be try
inputted again on CLI.

•

Cisco Packet Tracer have closed letter icon on right of the window. That is a package send button
and very important. All network working can be controlled with package sending. Also
simulation mode selectable in right bottom of the window. In simulation mode all network
working and all steps of the package easily observable with package sending.

•

IP Phones connected to each other. For starting a IP Phone call, clicked one of the phones and
input other ones IP Phone number. The other phone is ringing same time, open the other phone.
40

•

In management PC have special connection on network. That is a Telnet Remote Connection. In
command prompt of the management PC “telnet 192.168.99.2” command enter connected
switch’s management.

9. Design and Implementation of a Virtual Local Area Network with using Cisco Operating
System Compilation / Installation Guide
•

Install a Cisco Packet Tracer Simulation software.

•

We build our project in version 7.1.0.0222. Therefore, we recommend install software which version
7.1.0.0222 or higher.

•

Cisco Packet Tracer is a freeware software. Latest version always downloadable in Cisco Netacad System.

41

References
1. https://www.cisco.com/c/en/us/td/docs/ios/wlan/configuration/guide/15_1/wl_15_1_book/wi_cfg
_vlans.pdf

2. Lammle, T. (2013). CCNA Routing and Switching Complete Study Guide. Indianapolis, IN,
USA: John Wiley & Sons, pp. 460
3. How Virtual local area network Configuration, Works on Cisco Switches
http://www.ciscotr.com/vlan-konfigurasyonu-2.html
4. IEEE Computer Society, “IEEE Standard for Local and metropolitan area networks,” Virtual
Bridged Local Area Networks. 2006, pp. 2.
5. “VLANs are often associated with IP subnetworks”, Cisco Connected Grid Ethernet Switch
Module Software Interface Card Configuration Guide, pp.11-1
6. Odom, W. (2016). CCENT/CCNA ICND1 100-105 Official Cert Guide. Indianapolis, IN,
USA: Cisco Press, pp. 245.
7. Cisco, “Catalyst 4500 Series Switch Software Configuration Guide, IOS XE 3.10.0E,”
Understanding and Configuring VLANs. pp.1.
8. M. Yu, J. Rexford, X. Sun, S.Rao and N.Feamster, “A Survey of Virtual LAN Usage in
Campus Networks,” IEEE Communications Magazine, pp. 99, 2011.
9. Hucaby, D. (2015). CCNP Routing and Switching SWITCH 300-115 Official Cert Guide.
Indianapolis, IN, USA: Cisco Press, pp. 101-102.
10. Kocharians, N. and Palúch, P. (2015). CCIE Routing and Switching v5.0 Official Cert Guide,
Volume 1, Fifth Edition. Indianapolis, IN, USA: Cisco Press, pp. 69.
11. M. Yu, J. Rexford, X. Sun, S.Rao and N.Feamster, “A Survey of Virtual LAN Usage in
Campus Networks,” IEEE Communications Magazine, pp. 101, 2011.
12. Subharthi Paul and Raj Jain. (2013, 11 November). IEEE Communications Magazine.
http://ieeexplore.ieee.org/abstract/document/6658648/
13. Santana, G, A, A. (2016). CCNA Cloud CLDFND 210-451 Official Cert Guide. Indianapolis,
IN, USA: Cisco Press, pp. 152-154.
14. Cisco, (2006, 13 September). Security Advisories and Alerts
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/Cisco-SA-20060913CVE-2006-4776
15. Reference: Xin Sun, Yu-Wei E. Sung, Sunil D. Krothapalli, and Sanjay G. Rao , “A
Systematic Approach for Evolving VLAN Designs”, IEEE INFOCOM, 2010.
16. R. Mahajan, D. Wetherall, and T. Anderson, “Understanding BGP misconfiguration,” in Proc.
ACM SIGCOMM, Aug. 2002.
17. Z. Kerravala, “Configuration management delivers business resiliency,” The Yankee Group,
Nov. 2002.
18. S. Narain, “Network configuration management via model finding,” in Proc. Large
42

Installations Systems Administration (LISA) Conference, 2005.
19. IEEE Computer Society, “IEEE Standard for Local and metropolitan area networks,” Virtual
Bridged Local Area Networks. 2006, pp. 2.
20. Reference: Xin Sun, Yu-Wei E. Sung, Sunil D. Krothapalli, and Sanjay G. Rao , “A
Systematic Approach for Evolving VLAN Designs”, IEEE INFOCOM, 2010.
21. https://www.cisco.com/c/en/us/td/docs/ios/wlan/configuration/guide/15_1/wl_15_1_book/wi_
cfg_vlans.pdf
22. Reference: Xin Sun, Yu-Wei E. Sung, Sunil D. Krothapalli, and Sanjay G. Rao , “A
Systematic Approach for Evolving VLAN Designs”, IEEE INFOCOM, 2010.
23. Reference: Xin Sun, Yu-Wei E. Sung, Sunil D. Krothapalli, and Sanjay G. Rao , “A
Systematic Approach for Evolving VLAN Designs”, IEEE INFOCOM, 2010.
24. Reference: Xin Sun, Yu-Wei E. Sung, Sunil D. Krothapalli, and Sanjay G. Rao , “A
Systematic Approach for Evolving VLAN Designs”, IEEE INFOCOM, 2010.
25. https://www.cisco.com/c/en/us/td/docs/ios/wlan/configuration/guide/15_1/wl_15_1_book/wi_
cfg_vlans.pd
26. https://www.cisco.com/c/en/us/td/docs/ios/wlan/configuration/guide/15_1/wl_15_1_book/wi_
cfg_vlans.pdf

43

44

45



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.7
Linearized                      : No
Page Count                      : 45
Language                        : en-US
Tagged PDF                      : Yes
XMP Toolkit                     : 3.1-701
Producer                        : Microsoft® Word 2016
Creator Tool                    : Microsoft® Word 2016
Create Date                     : 2018:05:26 19:09:14+00:00
Modify Date                     : 2018:05:26 19:09:14+00:00
Document ID                     : uuid:9EFC876E-E330-44FD-80E3-B279A5262C9B
Instance ID                     : uuid:9EFC876E-E330-44FD-80E3-B279A5262C9B
Creator                         : Microsoft® Word 2016
EXIF Metadata provided by EXIF.tools

Navigation menu