0% found this document useful (0 votes)
33 views25 pages

Chapter 1-3

This document discusses enhancing the network performance infrastructure and security of Northern Isabela Academy using Cisco Packet Tracer. It identifies weaknesses in the current network infrastructure that could be exploited by hackers. The objectives are to conduct an examination of the existing network, identify security threats and vulnerabilities, develop a holistic security strategy, integrate Cisco Packet Tracer for simulation, enhance network performance, and develop an implementation roadmap. The significance is that it will positively impact the school, researchers, teachers, students, and community by improving the reliability and security of the network infrastructure. The scope is limited to Northern Isabela Academy's network components and the use of Cisco Packet Tracer, within resource and time constraints.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views25 pages

Chapter 1-3

This document discusses enhancing the network performance infrastructure and security of Northern Isabela Academy using Cisco Packet Tracer. It identifies weaknesses in the current network infrastructure that could be exploited by hackers. The objectives are to conduct an examination of the existing network, identify security threats and vulnerabilities, develop a holistic security strategy, integrate Cisco Packet Tracer for simulation, enhance network performance, and develop an implementation roadmap. The significance is that it will positively impact the school, researchers, teachers, students, and community by improving the reliability and security of the network infrastructure. The scope is limited to Northern Isabela Academy's network components and the use of Cisco Packet Tracer, within resource and time constraints.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 25

Enhancing Northern Isabela Academy’s

Network Performance Infrastructure and

Security with Cisco Packet Tracer

Harold G. Hernandez

Kristine N. Cariaga

Kyla Mae A. Garcia


ACKNOWLEDGEMENT

Successful research can never be prepared by the single effort, but it also demands the

help the guardianship of some conversant persons who help the undersigned actively or

positively in the completion of the successful project.

We would like to express our gratitude to our networking 2 adviser, Mrs. Maribel S.

Abalos. The door to ma’am Abalos was always open whenever we had questions about research

or writing. She constantly allowed this paper to be our own work but steered us in the right

direction whenever she thought we needed it.

We would also like to give our family for their continuous support and understanding

when undertaking our research and writing our project. Your prayer for us was what sustained

us this far.

Finally, we would like to thank God, for letting us through all the difficulties. We have

experienced your guidance day by day. You are so one who let us finish this research. We will

keep trusting for you for our future.


CHAPTER I

BACKGROUND AND ITS PROBLEM

I. INTRODUCTION

Educational institutions are gradually becoming reliant on robust and reliable

network systems to make effective communication, cooperation and data sharing

possible at a time of unprecedented technological progress. The Northern Isabela

Academy understands that it is vital for the High-Performance Network to continue

providing excellent education and maintaining its operational excellence. To guarantee

smooth connectivity, dependability, and security, the institution must urgently improve

its network infrastructure while it works to adapt to the changing digital landscape.

Hackers, and malicious applications that attempt to interfere or gain control over

the route infrastructure are the most serious threat to network infrastructure security. The

components of network infrastructure include all the hardware required to communicate

between networks, such as routers, firewalls, switches, servers, and storage systems.

Each of those systems will give hackers an entry point to the target network, which they

can place malicious software on.

To ensure the continued protection of the infrastructure in question, network

infrastructure security must be ensured by a comprehensive approach to ongoing

processes and practices. In the framework of this study, a thorough analysis will be

made of the current Network infrastructure at Northern Isabel Academy to identify all

weaknesses, obstacles, and security issues. Cisco Packet Tracer's next deployment will

act as a virtual testing ground for suggested enhancements, providing a risk-free setting

for fine-tuning configurations and resolving possible problems. Network infrastructure,

security and performance at Northern Isabel Academy could have been greatly improved
with the deployment of Cisco Packet Tracer. The goal of this research is to offer a

thorough implementation roadmap so that the institution can fulfill its mission of

providing high-quality education in a world connected by digital means.


Statement of the Problem

The Northern Isabela Academy of Technology faces an urgent need to reinforce its

network infrastructure, which it recognizes as the crucial role played by a high-

performance network in maintaining operating excellence and delivering quality

education. The main concern is the potential risks to privacy, integrity, and availability

of critical information due to security vulnerabilities in existing networks which could

be exploited by hackers or malicious applications.

Network infrastructure components of Northern Isabel Academy, including routers,

firewalls, switches, servers, load balancing equipment, and storage systems all combine

to form an interconnected ecosystem which is vulnerable to cyber threats. This entry

point is being exploited by hackers who will be able to penetrate the Routing

Infrastructure, compromising data of Institutions and disrupting vital services.

The existing network must be thoroughly examined to identify flaws,

obstructions, and security issues that may compromise the institution's ability to deliver

uninterrupted and secure education services.

How to improve the network infrastructure of Northern Isabela Academy to

ensure optimal performance and security in the face of evolving cyber threats, while

seamlessly integrating Cisco Packet Tracer to strengthen the network and providing a

risk-free testing ground for proposed improvements, is the central issue addressed by

this research. To achieve the institution's mission of delivering highly quality education

in a digital world, it is also necessary to carry out an extensive assessment of current

network vulnerabilities, develop a coherent security strategy and draw up

implementation plans for Packet Tracer.


1.3 Statement of the Objectives

General Objective

The main objective of this research is to enhance Northern Isabela Academy's network

infrastructure, security, and performance to ensure optimal connectivity and support the

institution's mission of delivering high-quality education in a digitally interconnected

world.

Specific Objectives

Conduct a comprehensive examination of the existing network infrastructure at

Northern Isabela Academy, identifying strengths, weaknesses, and security

vulnerabilities.

Identify Security Threats and Vulnerabilities:

Analyze potential security threats and vulnerabilities in the current network

infrastructure, with a focus on risks posed by hackers and malicious applications.

Develop Holistic Network Security Strategy:

Formulate a comprehensive strategy for network infrastructure security that addresses

routers, firewalls, switches, servers, and other critical components.

Integrate Cisco Packet Tracer for Simulation:

Deploy Cisco Packet Tracer as a simulation tool to create a virtual testing environment

for proposed network enhancements.


Enhance Network Performance:

Propose and implement improvements to the network infrastructure with a focus on

enhancing overall performance, speed, and reliability.

Develop Implementation Roadmap for Cisco Packet Tracer:

Develop a detailed implementation roadmap for the integration of Cisco Packet Tracer

into Northern Isabela Academy's network infrastructure.


Significance of the Study

The scope of the study, "Optimizing Northern Isabel Academy Network Performance

Infrastructure and Security with Cisco Packet Tracer," includes various dimensions that

meet the needs of interested parties contributing to academic and practical progress on

information technology.

The school

The overall reputation of Northern Isabela Academy is positively enhanced through the

implementation of improvements in network performance infrastructure and security.

The research ensures that the school's network infrastructure is well managed, reliable,

and safe which directly affects its operation efficiency.

Researchers Themselves

To gain a deeper understanding, it shall be an instrument that guides them and navigates

them through the discovery of credible, reliable, and comparable factors referred to as

essential data. For future IT students who are new to the specific domain of network

performance infrastructure and security, this research is a crucial guide.

Teachers

Teachers particularly in information and communication technology will be benefited

from this research. The findings of this research are providing teachers with up to date

and appropriate information on the network performance infrastructure and security.

Educating professionals can continually improve their own knowledge and learning

methods, which will help them to progress professionally as they are updated with the

most recent developments in network performance and security.


Students

This research provides practical information and applications related to network

performance infrastructure and security for IT students.

Future Researchers

The results of the research will be used as a basis for researchers who wish to

understand network performance infrastructure and security better. The results of this

study serve as the starting point for future research.

The Community

The practical impact of this research has a major effect on the larger community. In

addition to the education institution, Northern Isabel Academy's enhanced network

capabilities and security measures are of great benefit to the community.

Scope and Limitation of the Study

Scope

Only the network infrastructure, performance and safety of the Northern Isabela

Academy are covered by this study. On the geographical front, this study focuses on

routers, firewalls, switches, servers, load balancing equipment and data storage systems

only at the Academy. The technical scope of this is to integrate and simulate Cisco

Packet Tracer as a tool for enhancing the network. Given the current state of network

infrastructure as it stands at the time of research, this study will be carried out over a

specified period. The implementation of this study is limited to the Northern Isabela

Academy, and it does not include any further education institutions or organization.
Limitations

Resource limitations such as time, budget and human resources which could affect the

depth and scale of data collection, analysis and implementation are limiting this study.

The applicability of these findings may be influenced by outside factors, e.g. changes in

technology or unforeseen events. The findings of that study are intended exclusively for

the Northern Isabel Academy and may not be universal in scope. The success of

implementation may be influenced by human factors such as the ability of teachers, staff

and students to adapt to changes. The rapid evolution of technologies poses an obstacle

as the study's been developed in a technology landscape. Although it provides a virtual

environment for testing, the Packet Tracer may not be able to fully replicate all real

Cisco world scenarios. To assess whether or not a research project will be successful,

such limitations are of paramount importance.


Chapter 2

Review of Related Literature

This chapter presents the related literature and studies that will provide reliable

sources about the topic of the enhanced network performance infrastructure and security

with Cisco Packet Tracer.

Impacts of using Cisco Packet Tracer

The utilization of Cisco Packet Tracer emerges as a cornerstone in the realm of

computer network education, primarily driven by its multifaceted roles and distinctive

advantages. Foremost among these is the provision of a robust platform for virtual

networking simulation, offering students an immersive experience that enhances their

practical knowledge of fundamental networking principles, Sheikh Raashid Javid

(2014).

Moreover, the article underscores the instrumental role of Packet Tracer in

facilitating practical knowledge enhancement. By enabling students to grasp the

application of diverse networking protocols in real-world scenarios, the tool empowers

them to undertake mini-projects, fostering innovation and creativity in problem-solving

within the networking domain Sheikh Raashid Javid (2014).

Smith (2018) emphasized that a robust network infrastructure is foundational for

the effective functioning of educational institutions in the digital age. It underpins

communication, collaboration, resource access, and the integration of technology,

ultimately contributing to an environment that fosters efficient learning and academic

excellence. As technology continues to evolve, maintaining and upgrading network

infrastructure will be crucial for staying at the forefront of educational innovation.


Sadan Cambazoglu and Arif Sari (2015) assessed the MACAW protocol's

performance in a mobile ad hoc network with ongoing jamming. It investigates how the

jamming attack affects statistics on network throughput, load, WLAN delay, and data

dropped. The research also contrasts the jamming attack's performance with the

network's performance under typical circumstances without security threats. They used

simulation to evaluate how well the MACAW protocol performed in a range of

conditions, including a persistent jamming attack. To assess the effect of the jamming

assault on the network, they simulated two scenarios and analyzed performance

indicators. The study makes use of both malicious and benign simulation scenarios as

well as metrics for network throughput, load, WLAN delay, and data dropped statistics.

Simulations help to improve learning settings. Virtual representations of the

complicated world enable instructors to provide students with hands-on experience that

should transfer straight to the real world. Simulation for Network Education,

Marquardson, and Gomillion (2019) discuss the benefits of using simulated

environments for teaching networking skills. They explore the potential for simulations

to enhance training in the field and the effectiveness of using simulations to teach

computer networking principles. It also discusses how virtual and augmented reality

technologies contribute to expanding training using simulations. This research provides

valuable insights into the use of simulated environments for education and the transfer

of skills to real-world settings. The implications of this research for the future of

network education and training are significant.

The study conducted by P Preetha, et al. (2015) delves into the realm of

Quantum Information Science, with a primary focus on network performance,

particularly Quantum Anonymous Collision Detection in Quantum Networks. The


researchers developed a theoretical model, proposing a protocol that ensures anonymity

for multiple senders, emphasizing the unique aspects of quantum anonymous collision

detection. The investigation primarily unfolded within the context of Quantum

Networks, employing theoretical modeling grounded in quantum information science

concepts and methods. The study's noteworthy findings include the successful

development of a protocol addressing anonymity concerns for multiple senders, with a

specific emphasis on quantum collision detection. Looking ahead, the researchers

recommend further exploration of fading channel models, scalability considerations in

large-scale networks, and potential applications in wireless communication systems such

as cellular networks and satellite communication systems. This work lays the

groundwork for future research endeavors that can extend and apply the proposed

protocol to diverse communication environments.

VLAN technology is one of the hottest areas of networking systems. A VLAN

allows network devices to be combined as virtual LANs in a logical rather than a

physical association. VLAN allows us to construct numerous networks with a single

class of IP address, and by blocking inter-VLAN connection, we may enable or refuse

users access to a certain network. The main requirement for establishing VLAN is

network breaking, and we have showed VLAN configuration on Cisco Packet Tracer to

better understand this. VLANs provide a number of advantages, but our research has

revealed that they are being used for a variety of purposes that they were not designed

for Saampatii Vakharkar and Nitin Sakhare (2022).

N Tarkaa, et al (2017) directed their attention to the design and simulation of

Local Area Networks (LANs) using Cisco Packet Tracer. Operating within the

quantitative research paradigm, the study employed a simulation model to analyze LAN

performance under varied scenarios. Set in the Department of Electrical and Electronics

Engineering at the Federal University of Agriculture, Makurdi, Nigeria, the research


utilized a sample comprising a simulated LAN network implemented through Cisco

Packet Tracer. The findings underscored the efficacy of Cisco Packet Tracer as a

predictive tool for assessing network impacts arising from hardware upgrades, changes

in topology, increased traffic load, or new applications. Noteworthy outcomes also

included the identification of influential factors such as LAN topologies, transmission

media, and IPv4 addressing and subnetting on network performance. The research

serves as a foundation for future inquiries, proposing further investigations into the

repercussions of factors like IPv6 addressing, diverse network protocols, and the

integration of wireless networks on LAN performance. This study contributes valuable

insights to the field, providing a basis for future research avenues in the domain of local

area network design and simulation.


Conceptual Framework

Input Process Output

In-depth analysis of
existing network Data Collection
Improved network
infrastructure Optimization of performance,
Identification of network upgraded
security vulnerabilities configurations infrastructure, and
Implementation of enhanced security
Understanding of in Northern Isabela
Cisco Packet Tracer Cisco Packet Tracer
simulations Academy
capabilities.

The IPO Model is a functional framework for conceptualizing ideas that can be

used to generate new ones. It provides methods for gaining a deeper understanding of

how ideas work and for making the most of their details. IPO is a functional graph that

identifies the inputs, outputs, and processing activities that are necessary to change

inputs into outputs. IPO is used to represent a process flow. In some cases, the model is

set to include any storage that may occur during the process as well as the actual

storage.

The input, as the initial step phase of this research, represents the In-depth

analysis of existing network infrastructure, identification of security vulnerabilities,

understanding of Cisco Packet Tracer capabilities. From the figure above, it can be

gleaned that the process will start from data collection, with the use of a validated

researcher-made questionnaire, then comes the statistical treatment of the results. This

step also includes the optimization of network configurations, implementation of Cisco

Packet Tracer simulations, for a better understanding of the results. Finally, the output
will be an Improved network performance, upgraded infrastructure, and enhanced

security in Northern Isabela Academy.

Synthesis

The study underscores the pivotal role of Cisco Packet Tracer in computer

network education, serving as an immersive simulation platform for practical knowledge

enhancement and innovative problem-solving. This multifaceted tool facilitates real-

world protocol application and fosters creativity, contributing to effective

communication and academic excellence in educational institutions. The studies reveal

the critical need for secure network protocols, the transformative potential of simulated

environments in learning, and innovative solutions for anonymity in quantum networks.

Additionally, there's insight into unconventional uses of VLAN technology and the

validation of Cisco Packet Tracer's efficacy in predicting LAN impacts. Collectively,

these findings portray Cisco Packet Tracer as a versatile and integral tool in network

education, addressing practical, security, and innovative aspects.


Chapter III – METHODOLOGY

3.1 Requirement Specification

Project Scope

Our project aims to enhance the network performance infrastructure and security

at Northern Isabela Academy, connecting 10 Personal Computers (PCs) in a computer

laboratory and 2 PCs in the principal's office to a central network infrastructure and

deploy Virtual Local Area Networks (VLANs) for resource management. The primary

objectives include optimizing connectivity, ensuring data security, and enhancing overall

network performance.

Tools and Technologies

Cisco Packet Tracer serves as the main tool for the project's development and

simulation. The underlying principle behind this decision arises from its proficiency in

emulating Cisco equipment and modeling complex networks, hence offering a realistic

testing environment. The assessment of alternative tools choice is Packet Tracer 7.3.

Nevertheless, Cisco Packet Tracer was chosen because of its adaptability and user-

friendly interface, which matched the project's specifications perfectly. The decision-

making process was aided by the tool's ability to accurately simulate Cisco equipment,

which guaranteed high accuracy throughout testing and validation.

Implementation Strategy
Cisco Packet Tracer - The project will utilize this development tool to design and

simulate network architecture for implementation.

Software - including firewall and intrusion prevention systems (IPS) software, is needed

for the project.

Hardware - The network interface cards for up to date, routers, and high-speed gigabit

switches.

Programming languages - Command-line interfaces and graphical user interfaces are

used instead of standard.

Time Schedule - The timeline is divided in to two weeks for the evaluation and analysis

phase and three weeks for the design and simulation phase. The procurement of

hardware and software and the implementation phase is on-going process. Throughout

the course, there will be continuous monitoring and assessment in addition to training

and documentation.

Testing tools - For preliminary testing, Cisco Packet Tracer will be one of the testing

tools used.

3.2 Project Design

In this section, we present a comprehensive overview of the architectural and

detailed design models employed in the implementation of the Northern Isabela

Academy network.

Architectural Design

The network architecture is based on a combination of router-switch

configurations, incorporating the following components:

End Devices: Twelve PCs designated as user workstations.

Router: A central router connecting two switches and facilitating inter-network

communication.
Switch0: Connecting PCs in the computer laboratory.

Switch1: Connecting PCs in the principal's office.

Detailed Design Model

PC Configuration: PCs are configured with unique IP addresses.

PCs in Computer Laboratory (PC0-PC9): 172.17.10.21 to 172.17.10.30

PCs in Principal's Office (PC10-PC11): 172.17.20.31 to 172.17.20.32

Router Configuration: Router0 is configured with IP addresses.

Interface to Switch0: 172.17.10.1

Interface to Switch1: 172.17.20.1

Switch0 Configuration: Switch0 is configured with IP address 172.17.99.11

Gig0/1: Connection to Router0

Fa0/11: Connection to PCs in the computer laboratory

Switch1 Configuration: Switch1 is configured with IP address 172.17.99.12

Gig0/0: Connection to Router0

Fa0/3: Connection to PCs in the principal's office

Rationale for Choices

Topology:

Reason: The router-switch configuration was selected to meet the project's objectives of

scalability, security, and improved performance.

Benefit: This choice aligns with the academy's requirements, providing an optimal

balance between functionality and resource utilization.

Alternatives Considered
Topology Alternatives:

Considered Alternatives: Bus and ring topologies.

Choice: Router-switch configuration was chosen for its scalability, security, and efficient

inter-network communication.

Rationale for Architectural Choices

Inter-Network Communication

Reason: The router facilitated communication between the computer laboratory and the

principal's office, allowing for efficient data transfer between the two sections of the

academy.

Benefit: Improved network performance and optimized data exchange between two

sections of the academy.

Scalability

Reason: The design allowed for future expansion, accommodating additional devices

without significant adjustments to the existing infrastructure.

Benefit: Scalability ensures the network can adapt to potential growth in the number of

devices or changes in the academy's infrastructure.

Security

Reason: The router provides a level of security by separating the two sections (computer

laboratory and principal's office) into distinct networks, enhancing data security and

confidentiality.

Benefit: Enhanced data security and isolation of network segments for improved

confidentiality.

Design Models

In addition to textual descriptions, the architectural and detailed design models are

presented visually in the attached diagrams, providing a more tangible representation of

the network configuration.


This design approach establishes a scalable, secure, and high-performance network

infrastructure, effectively addressing the needs of Northern Isabela Academy.

3.3 Project Development

Abstract Design Implementation

The development of the project involves a meticulous and strategic approach to address

the specific needs of the educational institution.

Connectivity Setup:

- PCs were linked to their respective switches within the computer laboratory and

the principal's office.

- The switches were connected to Router0 for inter-network communication.

Router-Switch Configuration:

- The router as central component of the network architecture which responsible

for facilitating inter-network communication between the computer laboratory and the

principal's office.
- Router0 was configured with specific IP addresses connected to Switch0

(172.17.10.1) and Switch1 (172.17.20.1).

Switch Configuration:

- Switch0 (172.17.99.11) and Switch1 (172.17.99.12) were configured with their

unique IP addresses.

- Switch0 was connected to Router0 through Gig0/1, facilitating communication

with PCs in the computer laboratory through Fa0/11.

- Switch1 was connected to Router0 through Gig0/0, allowing communication

with PCs in the principal's office through Fa0/3.

PC Configuration:

- PCs were configured with their assigned unique IP addresses based on their

location.

- PCs in the computer laboratory were assigned IP addresses ranging from

172.17.10.21 to 172.17.10.30.

- PCs in the principal's office were assigned IP addresses ranging from

172.17.20.31 to 172.17.20.32.

The abstract design implementation ensured a well-defined structure for the network,

promoting efficient communication, scalability, and security. The use of a router-switch

configuration allowed for explicit segmentation of network segments, enhancing the

overall network performance of Northern Isabela Academy.

3.4 Operating and Testing Procedure

Verification and Validation

In the process of enhancing Northern Isabela Academy's network performance and

security, a thorough verification and validation strategy was implemented. To ensure the

efficacy of the network design, we conducted several key tasks:


Network assessment: a meticulous review of the proposed network topology was

undertaken, ensuring its alignment with the academy's specific requirements. This

involved both logical and physical inspections within Cisco Packet Tracer to guarantee

seamless connectivity and functionality.

Network Topology Review: a series of configuration verification tests were performed.

This included validating IP addressing, subnetting, and routing configurations across all

Cisco devices involved in the network enhancement.

Test Plans and Procedures

The test plans were meticulously designed to cover critical functions, and each plan had

specific procedures outlined.

Network Setup - Verified physical connections and ensured all devices were powered

on.

IP Configuration - Confirmed that each PC had the correct IP address.

Inter-Network Communication - Tested data transfer and communication between PCs

in the computer laboratory and the principal's office.

Test Tools Used

Various testing tools were employed to ensure comprehensive evaluation:

Cisco Packet Tracer – Utilize as primary tool to ensure a comprehensive evaluation for

network simulation and configuration.

Wireshark - Utilized for detailed traffic analysis and vulnerability scanning,

respectively.

Involvement of Others

For Northern Isabela Academy's network enhancing need to be verified and tested

through collaboration from peers, classmates, and colleagues:


IT specialists/Security experts - Gave input on QoS and performance in accordance with

institution requirements and emphasized security issues.

Classmates - Provided valuable insights on how the system worked, pointed out possible

problems, and made suggestions for enhancement.

3.5 Evolution/Maintenance

Modifications and Updates

Post-delivery, the project has undergone several modifications and updates to ensure that

the network infrastructure remains resilient, efficient, and capable of addressing

emerging challenges. Some ongoing process involves the following:

Post-Implementation Assessment - This involved evaluating the performance of the

upgraded network infrastructure and identifying any unforeseen issues that required

further improvement and effectiveness of the implemented solutions to serve as a

foundation for subsequent modifications.

Hardware Upgrades – The hardware upgrades of network component are crucial to

maintain compatibility with the latest standards and to support the increasing demand

for high-speed data transfer within the network.

Security Enhancement - Regular security audits were conducted to identify and address

potential vulnerabilities. This proactive approach involved updating and patching

security protocols, ensuring that the network remained resilient against emerging threats.

Timely Issue Resolution - Address any emerging issues promptly by implementing

solutions based on continuous monitoring and thorough diagnostics.

The evolution and maintenance have been characterized by a proactive and adaptive

approach. The project has not only sustained its initial improvements but has also

positioned the institution to meet future challenges in the evolving landscape of

networking and cybersecurity. This ongoing commitment to excellence ensures that


Northern Isabela Academy's network remains a reliable and secure foundation for its

educational and administrative activities.

You might also like