Chapter 1-3
Chapter 1-3
Harold G. Hernandez
Kristine N. Cariaga
Successful research can never be prepared by the single effort, but it also demands the
help the guardianship of some conversant persons who help the undersigned actively or
We would like to express our gratitude to our networking 2 adviser, Mrs. Maribel S.
Abalos. The door to ma’am Abalos was always open whenever we had questions about research
or writing. She constantly allowed this paper to be our own work but steered us in the right
We would also like to give our family for their continuous support and understanding
when undertaking our research and writing our project. Your prayer for us was what sustained
us this far.
Finally, we would like to thank God, for letting us through all the difficulties. We have
experienced your guidance day by day. You are so one who let us finish this research. We will
I. INTRODUCTION
smooth connectivity, dependability, and security, the institution must urgently improve
its network infrastructure while it works to adapt to the changing digital landscape.
Hackers, and malicious applications that attempt to interfere or gain control over
the route infrastructure are the most serious threat to network infrastructure security. The
between networks, such as routers, firewalls, switches, servers, and storage systems.
Each of those systems will give hackers an entry point to the target network, which they
processes and practices. In the framework of this study, a thorough analysis will be
made of the current Network infrastructure at Northern Isabel Academy to identify all
weaknesses, obstacles, and security issues. Cisco Packet Tracer's next deployment will
act as a virtual testing ground for suggested enhancements, providing a risk-free setting
security and performance at Northern Isabel Academy could have been greatly improved
with the deployment of Cisco Packet Tracer. The goal of this research is to offer a
thorough implementation roadmap so that the institution can fulfill its mission of
The Northern Isabela Academy of Technology faces an urgent need to reinforce its
education. The main concern is the potential risks to privacy, integrity, and availability
firewalls, switches, servers, load balancing equipment, and storage systems all combine
point is being exploited by hackers who will be able to penetrate the Routing
obstructions, and security issues that may compromise the institution's ability to deliver
ensure optimal performance and security in the face of evolving cyber threats, while
seamlessly integrating Cisco Packet Tracer to strengthen the network and providing a
risk-free testing ground for proposed improvements, is the central issue addressed by
this research. To achieve the institution's mission of delivering highly quality education
General Objective
The main objective of this research is to enhance Northern Isabela Academy's network
infrastructure, security, and performance to ensure optimal connectivity and support the
world.
Specific Objectives
vulnerabilities.
Deploy Cisco Packet Tracer as a simulation tool to create a virtual testing environment
Develop a detailed implementation roadmap for the integration of Cisco Packet Tracer
The scope of the study, "Optimizing Northern Isabel Academy Network Performance
Infrastructure and Security with Cisco Packet Tracer," includes various dimensions that
meet the needs of interested parties contributing to academic and practical progress on
information technology.
The school
The overall reputation of Northern Isabela Academy is positively enhanced through the
The research ensures that the school's network infrastructure is well managed, reliable,
Researchers Themselves
To gain a deeper understanding, it shall be an instrument that guides them and navigates
them through the discovery of credible, reliable, and comparable factors referred to as
essential data. For future IT students who are new to the specific domain of network
Teachers
from this research. The findings of this research are providing teachers with up to date
Educating professionals can continually improve their own knowledge and learning
methods, which will help them to progress professionally as they are updated with the
Future Researchers
The results of the research will be used as a basis for researchers who wish to
understand network performance infrastructure and security better. The results of this
The Community
The practical impact of this research has a major effect on the larger community. In
Scope
Only the network infrastructure, performance and safety of the Northern Isabela
Academy are covered by this study. On the geographical front, this study focuses on
routers, firewalls, switches, servers, load balancing equipment and data storage systems
only at the Academy. The technical scope of this is to integrate and simulate Cisco
Packet Tracer as a tool for enhancing the network. Given the current state of network
infrastructure as it stands at the time of research, this study will be carried out over a
specified period. The implementation of this study is limited to the Northern Isabela
Academy, and it does not include any further education institutions or organization.
Limitations
Resource limitations such as time, budget and human resources which could affect the
depth and scale of data collection, analysis and implementation are limiting this study.
The applicability of these findings may be influenced by outside factors, e.g. changes in
technology or unforeseen events. The findings of that study are intended exclusively for
the Northern Isabel Academy and may not be universal in scope. The success of
implementation may be influenced by human factors such as the ability of teachers, staff
and students to adapt to changes. The rapid evolution of technologies poses an obstacle
environment for testing, the Packet Tracer may not be able to fully replicate all real
Cisco world scenarios. To assess whether or not a research project will be successful,
This chapter presents the related literature and studies that will provide reliable
sources about the topic of the enhanced network performance infrastructure and security
computer network education, primarily driven by its multifaceted roles and distinctive
advantages. Foremost among these is the provision of a robust platform for virtual
(2014).
performance in a mobile ad hoc network with ongoing jamming. It investigates how the
jamming attack affects statistics on network throughput, load, WLAN delay, and data
dropped. The research also contrasts the jamming attack's performance with the
network's performance under typical circumstances without security threats. They used
conditions, including a persistent jamming attack. To assess the effect of the jamming
assault on the network, they simulated two scenarios and analyzed performance
indicators. The study makes use of both malicious and benign simulation scenarios as
well as metrics for network throughput, load, WLAN delay, and data dropped statistics.
complicated world enable instructors to provide students with hands-on experience that
should transfer straight to the real world. Simulation for Network Education,
environments for teaching networking skills. They explore the potential for simulations
to enhance training in the field and the effectiveness of using simulations to teach
computer networking principles. It also discusses how virtual and augmented reality
valuable insights into the use of simulated environments for education and the transfer
of skills to real-world settings. The implications of this research for the future of
The study conducted by P Preetha, et al. (2015) delves into the realm of
for multiple senders, emphasizing the unique aspects of quantum anonymous collision
concepts and methods. The study's noteworthy findings include the successful
as cellular networks and satellite communication systems. This work lays the
groundwork for future research endeavors that can extend and apply the proposed
users access to a certain network. The main requirement for establishing VLAN is
network breaking, and we have showed VLAN configuration on Cisco Packet Tracer to
better understand this. VLANs provide a number of advantages, but our research has
revealed that they are being used for a variety of purposes that they were not designed
Local Area Networks (LANs) using Cisco Packet Tracer. Operating within the
quantitative research paradigm, the study employed a simulation model to analyze LAN
performance under varied scenarios. Set in the Department of Electrical and Electronics
Packet Tracer. The findings underscored the efficacy of Cisco Packet Tracer as a
predictive tool for assessing network impacts arising from hardware upgrades, changes
media, and IPv4 addressing and subnetting on network performance. The research
serves as a foundation for future inquiries, proposing further investigations into the
repercussions of factors like IPv6 addressing, diverse network protocols, and the
insights to the field, providing a basis for future research avenues in the domain of local
In-depth analysis of
existing network Data Collection
Improved network
infrastructure Optimization of performance,
Identification of network upgraded
security vulnerabilities configurations infrastructure, and
Implementation of enhanced security
Understanding of in Northern Isabela
Cisco Packet Tracer Cisco Packet Tracer
simulations Academy
capabilities.
The IPO Model is a functional framework for conceptualizing ideas that can be
used to generate new ones. It provides methods for gaining a deeper understanding of
how ideas work and for making the most of their details. IPO is a functional graph that
identifies the inputs, outputs, and processing activities that are necessary to change
inputs into outputs. IPO is used to represent a process flow. In some cases, the model is
set to include any storage that may occur during the process as well as the actual
storage.
The input, as the initial step phase of this research, represents the In-depth
understanding of Cisco Packet Tracer capabilities. From the figure above, it can be
gleaned that the process will start from data collection, with the use of a validated
researcher-made questionnaire, then comes the statistical treatment of the results. This
Packet Tracer simulations, for a better understanding of the results. Finally, the output
will be an Improved network performance, upgraded infrastructure, and enhanced
Synthesis
The study underscores the pivotal role of Cisco Packet Tracer in computer
the critical need for secure network protocols, the transformative potential of simulated
Additionally, there's insight into unconventional uses of VLAN technology and the
these findings portray Cisco Packet Tracer as a versatile and integral tool in network
Project Scope
Our project aims to enhance the network performance infrastructure and security
laboratory and 2 PCs in the principal's office to a central network infrastructure and
deploy Virtual Local Area Networks (VLANs) for resource management. The primary
objectives include optimizing connectivity, ensuring data security, and enhancing overall
network performance.
Cisco Packet Tracer serves as the main tool for the project's development and
simulation. The underlying principle behind this decision arises from its proficiency in
emulating Cisco equipment and modeling complex networks, hence offering a realistic
testing environment. The assessment of alternative tools choice is Packet Tracer 7.3.
Nevertheless, Cisco Packet Tracer was chosen because of its adaptability and user-
friendly interface, which matched the project's specifications perfectly. The decision-
making process was aided by the tool's ability to accurately simulate Cisco equipment,
Implementation Strategy
Cisco Packet Tracer - The project will utilize this development tool to design and
Software - including firewall and intrusion prevention systems (IPS) software, is needed
Hardware - The network interface cards for up to date, routers, and high-speed gigabit
switches.
Time Schedule - The timeline is divided in to two weeks for the evaluation and analysis
phase and three weeks for the design and simulation phase. The procurement of
hardware and software and the implementation phase is on-going process. Throughout
the course, there will be continuous monitoring and assessment in addition to training
and documentation.
Testing tools - For preliminary testing, Cisco Packet Tracer will be one of the testing
tools used.
Academy network.
Architectural Design
communication.
Switch0: Connecting PCs in the computer laboratory.
Topology:
Reason: The router-switch configuration was selected to meet the project's objectives of
Benefit: This choice aligns with the academy's requirements, providing an optimal
Alternatives Considered
Topology Alternatives:
Choice: Router-switch configuration was chosen for its scalability, security, and efficient
inter-network communication.
Inter-Network Communication
Reason: The router facilitated communication between the computer laboratory and the
principal's office, allowing for efficient data transfer between the two sections of the
academy.
Benefit: Improved network performance and optimized data exchange between two
Scalability
Reason: The design allowed for future expansion, accommodating additional devices
Benefit: Scalability ensures the network can adapt to potential growth in the number of
Security
Reason: The router provides a level of security by separating the two sections (computer
laboratory and principal's office) into distinct networks, enhancing data security and
confidentiality.
Benefit: Enhanced data security and isolation of network segments for improved
confidentiality.
Design Models
In addition to textual descriptions, the architectural and detailed design models are
The development of the project involves a meticulous and strategic approach to address
Connectivity Setup:
- PCs were linked to their respective switches within the computer laboratory and
Router-Switch Configuration:
for facilitating inter-network communication between the computer laboratory and the
principal's office.
- Router0 was configured with specific IP addresses connected to Switch0
Switch Configuration:
unique IP addresses.
PC Configuration:
- PCs were configured with their assigned unique IP addresses based on their
location.
172.17.10.21 to 172.17.10.30.
172.17.20.31 to 172.17.20.32.
The abstract design implementation ensured a well-defined structure for the network,
security, a thorough verification and validation strategy was implemented. To ensure the
undertaken, ensuring its alignment with the academy's specific requirements. This
involved both logical and physical inspections within Cisco Packet Tracer to guarantee
This included validating IP addressing, subnetting, and routing configurations across all
The test plans were meticulously designed to cover critical functions, and each plan had
Network Setup - Verified physical connections and ensured all devices were powered
on.
Cisco Packet Tracer – Utilize as primary tool to ensure a comprehensive evaluation for
respectively.
Involvement of Others
For Northern Isabela Academy's network enhancing need to be verified and tested
Classmates - Provided valuable insights on how the system worked, pointed out possible
3.5 Evolution/Maintenance
Post-delivery, the project has undergone several modifications and updates to ensure that
upgraded network infrastructure and identifying any unforeseen issues that required
maintain compatibility with the latest standards and to support the increasing demand
Security Enhancement - Regular security audits were conducted to identify and address
security protocols, ensuring that the network remained resilient against emerging threats.
The evolution and maintenance have been characterized by a proactive and adaptive
approach. The project has not only sustained its initial improvements but has also