SlideShare a Scribd company logo
1 of 7
Download to read offline
IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org
ISSN (e): 2250-3021, ISSN (p): 2278-8719
Vol. 04, Issue 07 (July. 2014), ||V3|| PP 44-50
International organization of Scientific Research 44 | P a g e
Modeling Network Router, Switches and Security Using Cisco
and OPNET Simulation Software
Edward E. Ogheneovo1
and Ibiba S. Kio1
Department of Computer Science, University of Port Harcourt, Nigeria.
Abstract: - Since the introduction of computer networks and Internet technology, the issue of security in
computer network and the Internet has been a major challenge. Hackers and unauthorized users have been
compromising user’s information by a way of getting access to such information. It is a well-known fact that
information is very vital to individuals and organization these days; hence the need to protect our data and
information from unauthorized users. In this paper, we design a Cisco network with routing and security using
Cisco network simulation software (packet tracer), which ordinarily will not work without some set of
configurations. We then show the configurations necessary for the routing and security. The model is validated
through extensive simulation results. Our results show that routing, switching, and security were fully
implemented in the model. The model is therefore recommended for any organization or computer networking
firms that needs a standard, efficient, robust, and secure network.
Keywords: - Computer network, Cisco, Ethernet, Network security, Simulator software
I. INTRODUCTION
When we look into the series of developments that have occurred in the field of computers in the last
three decades or so, we find that the most important milestone achieved after the invention of Personal
Computers (PCs), is the development of Computer Network [1] [2]. In present times, be it ‘Internet’ or
‘Intranet’, they are the result of ‘Networking’. In earlier times, Ethernet Cards and ordinary cables were used for
Networking; on the path of technological development, it has reached up to the level of ‘Wireless Networking’.
Networks and networking have grown exponentially over the last 15years. They have had to evolve at the speed
of light just to keep with huge increases in basic mission critical user needs such as sharing data and printer as
well as more advance demands such as video conferencing. Unless everyone who needs to share network
resources is located in the same office area (an increasingly uncommon situation), the challenge is to connect
the sometimes many relevant networks together so that all users can share the networks resources [10].
Since the introduction of computer networks and Internet technology, the issue of security in computer
network and the Internet has been a major challenge. Hackers and unauthorized users have been compromising
user’s information by way of getting access to such information [4]. It is a well-known fact that information is
very vital to individuals and organization these days; hence the need to protect our data and information from
unauthorized users.
In this paper, we modelled network routing and security using Cisco network simulation software
(packet tracer), which ordinarily will not work without some set of configurations. We then show the
configurations necessary for the routing and security. We employed the Cisco simulator software in modelling
the router and to provide a robust security. The simulator software in which the network design was made is
Packet Tracer. Packet Tracer was used because it has all the tools that can be used to design a Cisco network
and accept configurations by a network administrator if they are correct and acceptable by the Cisco equipment.
The model is validated through extensive simulation results.
II. BACKGROUND OF THE STUDY
Cisco is an organization that makes high level security networking equipments. So Cisco networking is
an internetworking that has a very high level security which is based on advanced configurations being made on
certain equipments which work in different OSI (open system interconnection) models. Open system
interconnection model was created by the international organization for standardization (ISO) [5]. It is meant to
help vendors create interoperable network devices and software in the form of protocols so that different vendor
networks could work with each other. Like world peace, it will probably never happen completely, but it will
still be a great goal.
In the world of computers today, networking is the practice of linking two or more computing devices
together for the purpose of sharing data [6]. Networks are built with a mix of computer hardware and computer
software. Data networks developed as a result of business applications that were written for microcomputers. At
that time microcomputers were not connected as mainframe computer terminals were, so there was no efficient
Modeling Network Router, Switches and Security Using Cisco and OPNET Simulation Software
International organization of Scientific Research 45 | P a g e
way of sharing data. The use of floppy disks was not an efficient or cost effective manner in which to operate
businesses. Sneaker created multiple copies of the data. Each time a file was modified it would have to be
shared again with all other people who needed that file. If two people modified the file and then tried to share it,
one of the sets of changes would be lost. Businesses needed a solution that would successfully address the
following three problems:
 How to avoid duplication of equipment and resources
 How to communicate efficiently
 How to set up and manage a network
Businesses realized that networking technology could increase productivity while saving money.
Networks were added and expanded almost as rapidly as new network technologies and products were
introduced [7]. In the early 1980s networking saw as tremendous expansion, even though the early development
of networking was disorganized. In the mid 1980s, the network technologies that had emerged had been created
with a variety of different hardware and software implementations. Each company that created network
hardware and software used its own company standard. These individual standards were developed because of
competition with other companies. Consequently, many of the new network technologies were incompatible
with each other. It became increasingly difficult for networks that used different specifications to communicate
with each other. This often required the old network equipment to be removed to implement the new equipment
[8] [9].
One early solution was the creation of local-area network (LAN) standards. Because LAN standards
provided an open set of guidelines for creating network hardware and software, the equipment from different
companies could then become compatible [10]. This allowed for stability in LAN implementation. In a LAN
system, each department of the company is a kind of electronic island. As the use of computers in business
grew, it soon became obvious that even LANs were not sufficient.
What was needed as a way for information to move efficiently and quickly, not only within a company,
but also from one business to another. The solution was the creation of metropolitan area networks (MANs) and
wide-area networks (WANs), which could connect user network over large geographic areas; it was possible for
businesses to communicate with each other across great distances. Starting in the 1960s and continuing through
the 70s, 80s and 90s, the Department of Defence (DoD), developed large, reliable wide area networks (WANs)
for military and scientific reasons [11] [12], . This technology was different from the point to point
communication used in bulletin boards. It allowed multiple computers to be connected together using many
different paths. The network itself would determine how to move data from one computer to another. Instead of
only being able to communicate with one computer at a time, many computers could be reached using the same
connection. The DoDs WAN eventually became the internet.
III. METHODOLOGY
The Cisco network design in the simulation cannot work without knowing which equipment to connect
to other equipment, without knowing the cables to use and connect any set of devices together that is, whether to
use straight through cable, crossover or a rolled cable, worst still, the devices are not being configured by not
just a network administrator but a Cisco network administrator. Three network designs are made in this paper
and the equipments used in the simulation include routers, switches, hosts (PCs) and cables.
Fig. 1: A router is connected to a host
Modeling Network Router, Switches and Security Using Cisco and OPNET Simulation Software
International organization of Scientific Research 46 | P a g e
In figure 1, the router is connected directly with a rolled cable to a host at the right-hand side and with
straight-through cable to a switch below it. The host connected to the router is used for the configurations. The
switch is also connected with a straight-through cable to a host at the right-hand side for configurations and with
straight-through cable to different hosts (PCs) below it.
3.1 Security Effect and Network
The security devices in figure 2 are the router and the switches. All the terminals and the interfaces (ports) are
administratively shut down by default until they are configured.
Fig. 2: Routers and switches
The switches in the figure 3 have multi-ports which give room for expansion of the network. In fact,
the network design in figure 3 is the expansion of network design in figure 2. The interfaces and ports in the
switches in the network design 3 are configured which also adds more security to the network.
Fig. 3: Router in the network design
3.2 Switching and Network Design
The switches in the network design in figure 4 have multi-ports and breaks-up collision domain into separate
and smaller collision domains. Collision domain is an internet term that describes a network collection of
devices where a host transmits or sends a packet forcing every other host on that segment to pay attention to it.
Fig. 4: Switching in the network design
Modeling Network Router, Switches and Security Using Cisco and OPNET Simulation Software
International organization of Scientific Research 47 | P a g e
IV. RESULTS AND DISCUSSIONS
We carry out an analysis of the performance of Cisco networks at saturation points of error-prone
networks. The analysis was carried out using Packet Tracer Simulator to design network and OPNET Simulator
to model the graph. These are industry's leading network development software. The results gotten will enable
an enterprise network engineer to implement very high security networks free of inherent delays and capable of
maximizing throughput. The proposed solution to the problems identified is implemented using OSPF routing
protocol configurations.
Figure 5 shows the simulation sequence at 7 seconds real time and 39 seconds simulated time.
Fig. 5: Simulation sequence 1 at 7 seconds real time.
The network was duplicated using a router to form two (2) separate broadcast domains – each domain
having three stations, as shown in figure 5. Four statistics were chosen – delay, traffic received (packets/sec),
traffic sent (packet/sec) and collision. Figure 5 shows the simulation runs captured at 39secs simulated time and
7 seconds real time. From the foregoing, it is seen that the maximum throughput gotten was 900,000 bits/sec and
the minimum throughput gotten was about 420,000 bits/sec. This difference accounts for the effects of channel
errors, collisions, path loss, thermal noise, interference.
Figure 6 shows the simulation sequence at 30 seconds real time.
Fig. 6: Simulation sequence 1 at 30 seconds real time
From figure 6, it is seen that as data transmission continued, the load on the network increases. More
stations are involved in either sending packets or receiving packets which in turn also involved sending or
receiving RTS and/or CTS signals, plus sending and receiving acknowledgments, carrier sensing to check if the
Throughput(bits/sec)
Time (minutes)
Throughput(bits/sec)
Time (minutes)
Modeling Network Router, Switches and Security Using Cisco and OPNET Simulation Software
International organization of Scientific Research 48 | P a g e
channel is idle or not, and backoff time. As seen in figure 6, the minimum throughput dropped below 400,000
bits/sec as against 420,000 bits/sec seen at the 39th
sec of the simulation run. The graph in Figure 6 was captured
at the 158th
sec of simulation run (2 min, 38s). Observe also that the max throughput remains the same. Figure 7
shows simulation sequence at 60 seconds real time and 305 seconds simulated time.
Fig. 7: Simulation sequence 1 at 1 minute
At 305th
sec of the transmission, the congestion status of the network is seen to be very high. The throughput at
this saturation point is seen to be reduced more. Figure 8 shows the second half of the simulation runs at 5
seconds real time and 31 seconds simulated time.
Fig. 8: Simulation sequence 2 at 5 seconds
The figure 8 shows the beginning of the second half of the simulation runs. However, during the design
phase, number of simulation runs was set at 2. At this phase, it is assumed that data transmission have started
again after all stations backed off likely because the over-saturation of the network has caused slight link failure.
Hence, at 31st
sec, the max throughput is seen at around 700,000 bits per sec as against the original 900,000
bit/sec. This is true because the channel is still recovering from the failure.
Throughput(bits/sec)
Time (minutes)
Throughput(bits/sec)
Time (minutes)
Modeling Network Router, Switches and Security Using Cisco and OPNET Simulation Software
International organization of Scientific Research 49 | P a g e
Figure 8 shows that as transmission continued to increase again, the minimum throughput declined more. Figure
9 shows simulation sequence two at 45 seconds real time.
Fig. 9: Simulation sequence 2 at 45 minutes
The results obtained show that under ideal conditions, throughput is maximized with large frames of
data transmissions. However, IEEE 802.11 wireless networks are error-prone, and these errors reduce the
saturation throughput performance at congestion points. From the foregoing, it can comfortably be stated that
maintaining a reasonable amount of load on a collision domain can help a long way to maximize the throughput
performance of networks.
V. CONCLUSION AND FUTURE WORKS
The convergence of multiple services into the data centre offers many operational benefits to the
enterprise business. By converging computational, storage, application, and networking services, into one
operational centre. This place stringent demands on the data centre design and the capabilities of the devices
these services needed. In this paper, a detail analysis and design of Cisco network implementing routing,
security, and switching was presented as an approach to congestion management. We design a Cisco network
with routing and security using Cisco network simulator software (packet tracer), which ordinarily will not work
without some set of configurations. We then show the configurations necessary for the routing and security. The
model is validated through extensive simulation results. Our results show that routing, switching, and security
were fully implemented in the model. The model is therefore recommended for any organization or computer
networking firms that needs a standard, efficient, robust, and secure network.
In the future, we will expand the scope of this research work. This will involve the design and configuration of
network that will always match the security standard that would be needed by any organization or computer
networking firms at any time. Also, the future work should not only be to design and configure a Cisco network,
but also to observe and point out where this Cisco network will not meet the networking standard again in
security and efficiency.
REFERENCES
[1] D. Bertsekas and R. Gallager, Computer Networking with Internet Protocols and Technology, (Pearson
Education, 1987).
[2] H. S. Chhaya and S. Gupta (1997). Performance Modeling of Asynchronous Data Transfer Methods of
IEEE 802.11 MAC Protocol for Wireless Networks.
[3] H. Nguyen and G. Bianchi, Performance Analysis of the IEEE 802.11 DCF, Proc. of IEEE PIMRC, 1996,
pp. 234-245.
[4] N. M. Rabadi and M. M. Syed, Performance Evaluation of IEEE 802.11a MAC Protocol for Vehicular
Intersection Collision Avoidance System, 2002.
[5] IEEE 802.11 WG. International Standard for Information Technology – Local and Metropolitan Area
Networks, Part 11: Wireless LAN MAC and PHY Specifications, 1999.
Throughput(bits/sec)
Time (minutes)
Modeling Network Router, Switches and Security Using Cisco and OPNET Simulation Software
International organization of Scientific Research 50 | P a g e
[6] B. Davide and P. Rong, Backward Congestion Notification version 2.1, IEEE 802.11 Meeting, 2005.
[7] L. M. Feeney, B. Cetin and D. Hollos, Multirate Relay for Performance Improvement in IEEE 802.11
WLANs. Conf. Proc. of Universitat Paderborn, 2004, pp. 149-157.
[8] G. Bianchi. Performance Analysis of the IEEE 802.11 Distributed Coordination Function. IEEE Journal
on Selected Areas in Communications, 2000.
[9] T. T. Blahut and E. Richard (2004). Algebraic Codes for Data Transmission (Cambridge University
Press, 2004).
[10] P. Chatzimisios, A. C. Boucouvalas and V. Vitsas, IEEE Wireless LANs: Performance Analysis and
Protocol Refinement, 2005.
[11] M. H. Manshaei, T. Turletti, Simulation Based Performance Analysis of 802.11a WLAN. Proceedings of
IEEE, 2004, pp. 2-6.
[12] N. Qiang, Performance Analysis and Enhancements of IEEE 802.11e Wireless Networks, 2000.

More Related Content

What's hot

509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
Li-Fi Security Issues and its Measures
Li-Fi Security Issues and its MeasuresLi-Fi Security Issues and its Measures
Li-Fi Security Issues and its Measuresijtsrd
 
Introducing networks
Introducing networksIntroducing networks
Introducing networksMansoor Shar
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine TechnologySamip jain
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachKarthic C M
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
 
Internet of Things- Research Directions
Internet of Things- Research DirectionsInternet of Things- Research Directions
Internet of Things- Research DirectionsRavindra Dastikop
 
Roberto minerva 20181130
Roberto minerva 20181130  Roberto minerva 20181130
Roberto minerva 20181130 Roberto Minerva
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationIRJET Journal
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded SystemsIRJET Journal
 
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Tyrone Systems
 
IRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of ThingsIRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of ThingsIRJET Journal
 

What's hot (20)

509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
Li-Fi Security Issues and its Measures
Li-Fi Security Issues and its MeasuresLi-Fi Security Issues and its Measures
Li-Fi Security Issues and its Measures
 
Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 
Introducing networks
Introducing networksIntroducing networks
Introducing networks
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approach
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
76 s201918
76 s20191876 s201918
76 s201918
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
Synopsis
SynopsisSynopsis
Synopsis
 
Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
 
Internet of Things- Research Directions
Internet of Things- Research DirectionsInternet of Things- Research Directions
Internet of Things- Research Directions
 
Roberto minerva 20181130
Roberto minerva 20181130  Roberto minerva 20181130
Roberto minerva 20181130
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
 
IRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of ThingsIRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of Things
 

Similar to G04734450

Evolution Of The Internet And Network Protocols
Evolution Of The Internet And Network ProtocolsEvolution Of The Internet And Network Protocols
Evolution Of The Internet And Network ProtocolsHeidi Perry
 
Present Day Internet Design, Architecture, Performance and an Improved Design
Present Day Internet Design, Architecture, Performance and an Improved DesignPresent Day Internet Design, Architecture, Performance and an Improved Design
Present Day Internet Design, Architecture, Performance and an Improved DesignEvaObinna
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectAnneilynLeal
 
Local Area Networks (LANs) Essay
Local Area Networks (LANs) EssayLocal Area Networks (LANs) Essay
Local Area Networks (LANs) EssayMichelle Anderson
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1paolo374233
 
Designing A Computer Network -Such
Designing A Computer Network -SuchDesigning A Computer Network -Such
Designing A Computer Network -SuchJessica Simms
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital SecurityLindsey Jones
 
The Concept Of Virtual Private Network
The Concept Of Virtual Private NetworkThe Concept Of Virtual Private Network
The Concept Of Virtual Private NetworkBeth Hall
 
Perceived Susceptibility Of Being Attacked By Malicious...
Perceived Susceptibility Of Being Attacked By Malicious...Perceived Susceptibility Of Being Attacked By Malicious...
Perceived Susceptibility Of Being Attacked By Malicious...Hannah Carpenter
 
An Introduction To Computer Networking A Survey
An Introduction To Computer Networking  A SurveyAn Introduction To Computer Networking  A Survey
An Introduction To Computer Networking A SurveyCheryl Brown
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialRodel Morales
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkammulu99
 
Network Technology Case Study
Network Technology Case StudyNetwork Technology Case Study
Network Technology Case StudyJennifer Wood
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTMuhammad Ahad
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of ThingsIRJET Journal
 

Similar to G04734450 (20)

Evolution Of The Internet And Network Protocols
Evolution Of The Internet And Network ProtocolsEvolution Of The Internet And Network Protocols
Evolution Of The Internet And Network Protocols
 
Present Day Internet Design, Architecture, Performance and an Improved Design
Present Day Internet Design, Architecture, Performance and an Improved DesignPresent Day Internet Design, Architecture, Performance and an Improved Design
Present Day Internet Design, Architecture, Performance and an Improved Design
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
 
Local Area Networks (LANs) Essay
Local Area Networks (LANs) EssayLocal Area Networks (LANs) Essay
Local Area Networks (LANs) Essay
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
 
Designing A Computer Network -Such
Designing A Computer Network -SuchDesigning A Computer Network -Such
Designing A Computer Network -Such
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
The Concept Of Virtual Private Network
The Concept Of Virtual Private NetworkThe Concept Of Virtual Private Network
The Concept Of Virtual Private Network
 
Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
 
Perceived Susceptibility Of Being Attacked By Malicious...
Perceived Susceptibility Of Being Attacked By Malicious...Perceived Susceptibility Of Being Attacked By Malicious...
Perceived Susceptibility Of Being Attacked By Malicious...
 
An Introduction To Computer Networking A Survey
An Introduction To Computer Networking  A SurveyAn Introduction To Computer Networking  A Survey
An Introduction To Computer Networking A Survey
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Network Technology Case Study
Network Technology Case StudyNetwork Technology Case Study
Network Technology Case Study
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
 

More from IOSR-JEN

More from IOSR-JEN (20)

C05921721
C05921721C05921721
C05921721
 
B05921016
B05921016B05921016
B05921016
 
A05920109
A05920109A05920109
A05920109
 
J05915457
J05915457J05915457
J05915457
 
I05914153
I05914153I05914153
I05914153
 
H05913540
H05913540H05913540
H05913540
 
G05913234
G05913234G05913234
G05913234
 
F05912731
F05912731F05912731
F05912731
 
E05912226
E05912226E05912226
E05912226
 
D05911621
D05911621D05911621
D05911621
 
C05911315
C05911315C05911315
C05911315
 
B05910712
B05910712B05910712
B05910712
 
A05910106
A05910106A05910106
A05910106
 
B05840510
B05840510B05840510
B05840510
 
I05844759
I05844759I05844759
I05844759
 
H05844346
H05844346H05844346
H05844346
 
G05843942
G05843942G05843942
G05843942
 
F05843238
F05843238F05843238
F05843238
 
E05842831
E05842831E05842831
E05842831
 
D05842227
D05842227D05842227
D05842227
 

Recently uploaded

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 

Recently uploaded (20)

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 

G04734450

  • 1. IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 07 (July. 2014), ||V3|| PP 44-50 International organization of Scientific Research 44 | P a g e Modeling Network Router, Switches and Security Using Cisco and OPNET Simulation Software Edward E. Ogheneovo1 and Ibiba S. Kio1 Department of Computer Science, University of Port Harcourt, Nigeria. Abstract: - Since the introduction of computer networks and Internet technology, the issue of security in computer network and the Internet has been a major challenge. Hackers and unauthorized users have been compromising user’s information by a way of getting access to such information. It is a well-known fact that information is very vital to individuals and organization these days; hence the need to protect our data and information from unauthorized users. In this paper, we design a Cisco network with routing and security using Cisco network simulation software (packet tracer), which ordinarily will not work without some set of configurations. We then show the configurations necessary for the routing and security. The model is validated through extensive simulation results. Our results show that routing, switching, and security were fully implemented in the model. The model is therefore recommended for any organization or computer networking firms that needs a standard, efficient, robust, and secure network. Keywords: - Computer network, Cisco, Ethernet, Network security, Simulator software I. INTRODUCTION When we look into the series of developments that have occurred in the field of computers in the last three decades or so, we find that the most important milestone achieved after the invention of Personal Computers (PCs), is the development of Computer Network [1] [2]. In present times, be it ‘Internet’ or ‘Intranet’, they are the result of ‘Networking’. In earlier times, Ethernet Cards and ordinary cables were used for Networking; on the path of technological development, it has reached up to the level of ‘Wireless Networking’. Networks and networking have grown exponentially over the last 15years. They have had to evolve at the speed of light just to keep with huge increases in basic mission critical user needs such as sharing data and printer as well as more advance demands such as video conferencing. Unless everyone who needs to share network resources is located in the same office area (an increasingly uncommon situation), the challenge is to connect the sometimes many relevant networks together so that all users can share the networks resources [10]. Since the introduction of computer networks and Internet technology, the issue of security in computer network and the Internet has been a major challenge. Hackers and unauthorized users have been compromising user’s information by way of getting access to such information [4]. It is a well-known fact that information is very vital to individuals and organization these days; hence the need to protect our data and information from unauthorized users. In this paper, we modelled network routing and security using Cisco network simulation software (packet tracer), which ordinarily will not work without some set of configurations. We then show the configurations necessary for the routing and security. We employed the Cisco simulator software in modelling the router and to provide a robust security. The simulator software in which the network design was made is Packet Tracer. Packet Tracer was used because it has all the tools that can be used to design a Cisco network and accept configurations by a network administrator if they are correct and acceptable by the Cisco equipment. The model is validated through extensive simulation results. II. BACKGROUND OF THE STUDY Cisco is an organization that makes high level security networking equipments. So Cisco networking is an internetworking that has a very high level security which is based on advanced configurations being made on certain equipments which work in different OSI (open system interconnection) models. Open system interconnection model was created by the international organization for standardization (ISO) [5]. It is meant to help vendors create interoperable network devices and software in the form of protocols so that different vendor networks could work with each other. Like world peace, it will probably never happen completely, but it will still be a great goal. In the world of computers today, networking is the practice of linking two or more computing devices together for the purpose of sharing data [6]. Networks are built with a mix of computer hardware and computer software. Data networks developed as a result of business applications that were written for microcomputers. At that time microcomputers were not connected as mainframe computer terminals were, so there was no efficient
  • 2. Modeling Network Router, Switches and Security Using Cisco and OPNET Simulation Software International organization of Scientific Research 45 | P a g e way of sharing data. The use of floppy disks was not an efficient or cost effective manner in which to operate businesses. Sneaker created multiple copies of the data. Each time a file was modified it would have to be shared again with all other people who needed that file. If two people modified the file and then tried to share it, one of the sets of changes would be lost. Businesses needed a solution that would successfully address the following three problems:  How to avoid duplication of equipment and resources  How to communicate efficiently  How to set up and manage a network Businesses realized that networking technology could increase productivity while saving money. Networks were added and expanded almost as rapidly as new network technologies and products were introduced [7]. In the early 1980s networking saw as tremendous expansion, even though the early development of networking was disorganized. In the mid 1980s, the network technologies that had emerged had been created with a variety of different hardware and software implementations. Each company that created network hardware and software used its own company standard. These individual standards were developed because of competition with other companies. Consequently, many of the new network technologies were incompatible with each other. It became increasingly difficult for networks that used different specifications to communicate with each other. This often required the old network equipment to be removed to implement the new equipment [8] [9]. One early solution was the creation of local-area network (LAN) standards. Because LAN standards provided an open set of guidelines for creating network hardware and software, the equipment from different companies could then become compatible [10]. This allowed for stability in LAN implementation. In a LAN system, each department of the company is a kind of electronic island. As the use of computers in business grew, it soon became obvious that even LANs were not sufficient. What was needed as a way for information to move efficiently and quickly, not only within a company, but also from one business to another. The solution was the creation of metropolitan area networks (MANs) and wide-area networks (WANs), which could connect user network over large geographic areas; it was possible for businesses to communicate with each other across great distances. Starting in the 1960s and continuing through the 70s, 80s and 90s, the Department of Defence (DoD), developed large, reliable wide area networks (WANs) for military and scientific reasons [11] [12], . This technology was different from the point to point communication used in bulletin boards. It allowed multiple computers to be connected together using many different paths. The network itself would determine how to move data from one computer to another. Instead of only being able to communicate with one computer at a time, many computers could be reached using the same connection. The DoDs WAN eventually became the internet. III. METHODOLOGY The Cisco network design in the simulation cannot work without knowing which equipment to connect to other equipment, without knowing the cables to use and connect any set of devices together that is, whether to use straight through cable, crossover or a rolled cable, worst still, the devices are not being configured by not just a network administrator but a Cisco network administrator. Three network designs are made in this paper and the equipments used in the simulation include routers, switches, hosts (PCs) and cables. Fig. 1: A router is connected to a host
  • 3. Modeling Network Router, Switches and Security Using Cisco and OPNET Simulation Software International organization of Scientific Research 46 | P a g e In figure 1, the router is connected directly with a rolled cable to a host at the right-hand side and with straight-through cable to a switch below it. The host connected to the router is used for the configurations. The switch is also connected with a straight-through cable to a host at the right-hand side for configurations and with straight-through cable to different hosts (PCs) below it. 3.1 Security Effect and Network The security devices in figure 2 are the router and the switches. All the terminals and the interfaces (ports) are administratively shut down by default until they are configured. Fig. 2: Routers and switches The switches in the figure 3 have multi-ports which give room for expansion of the network. In fact, the network design in figure 3 is the expansion of network design in figure 2. The interfaces and ports in the switches in the network design 3 are configured which also adds more security to the network. Fig. 3: Router in the network design 3.2 Switching and Network Design The switches in the network design in figure 4 have multi-ports and breaks-up collision domain into separate and smaller collision domains. Collision domain is an internet term that describes a network collection of devices where a host transmits or sends a packet forcing every other host on that segment to pay attention to it. Fig. 4: Switching in the network design
  • 4. Modeling Network Router, Switches and Security Using Cisco and OPNET Simulation Software International organization of Scientific Research 47 | P a g e IV. RESULTS AND DISCUSSIONS We carry out an analysis of the performance of Cisco networks at saturation points of error-prone networks. The analysis was carried out using Packet Tracer Simulator to design network and OPNET Simulator to model the graph. These are industry's leading network development software. The results gotten will enable an enterprise network engineer to implement very high security networks free of inherent delays and capable of maximizing throughput. The proposed solution to the problems identified is implemented using OSPF routing protocol configurations. Figure 5 shows the simulation sequence at 7 seconds real time and 39 seconds simulated time. Fig. 5: Simulation sequence 1 at 7 seconds real time. The network was duplicated using a router to form two (2) separate broadcast domains – each domain having three stations, as shown in figure 5. Four statistics were chosen – delay, traffic received (packets/sec), traffic sent (packet/sec) and collision. Figure 5 shows the simulation runs captured at 39secs simulated time and 7 seconds real time. From the foregoing, it is seen that the maximum throughput gotten was 900,000 bits/sec and the minimum throughput gotten was about 420,000 bits/sec. This difference accounts for the effects of channel errors, collisions, path loss, thermal noise, interference. Figure 6 shows the simulation sequence at 30 seconds real time. Fig. 6: Simulation sequence 1 at 30 seconds real time From figure 6, it is seen that as data transmission continued, the load on the network increases. More stations are involved in either sending packets or receiving packets which in turn also involved sending or receiving RTS and/or CTS signals, plus sending and receiving acknowledgments, carrier sensing to check if the Throughput(bits/sec) Time (minutes) Throughput(bits/sec) Time (minutes)
  • 5. Modeling Network Router, Switches and Security Using Cisco and OPNET Simulation Software International organization of Scientific Research 48 | P a g e channel is idle or not, and backoff time. As seen in figure 6, the minimum throughput dropped below 400,000 bits/sec as against 420,000 bits/sec seen at the 39th sec of the simulation run. The graph in Figure 6 was captured at the 158th sec of simulation run (2 min, 38s). Observe also that the max throughput remains the same. Figure 7 shows simulation sequence at 60 seconds real time and 305 seconds simulated time. Fig. 7: Simulation sequence 1 at 1 minute At 305th sec of the transmission, the congestion status of the network is seen to be very high. The throughput at this saturation point is seen to be reduced more. Figure 8 shows the second half of the simulation runs at 5 seconds real time and 31 seconds simulated time. Fig. 8: Simulation sequence 2 at 5 seconds The figure 8 shows the beginning of the second half of the simulation runs. However, during the design phase, number of simulation runs was set at 2. At this phase, it is assumed that data transmission have started again after all stations backed off likely because the over-saturation of the network has caused slight link failure. Hence, at 31st sec, the max throughput is seen at around 700,000 bits per sec as against the original 900,000 bit/sec. This is true because the channel is still recovering from the failure. Throughput(bits/sec) Time (minutes) Throughput(bits/sec) Time (minutes)
  • 6. Modeling Network Router, Switches and Security Using Cisco and OPNET Simulation Software International organization of Scientific Research 49 | P a g e Figure 8 shows that as transmission continued to increase again, the minimum throughput declined more. Figure 9 shows simulation sequence two at 45 seconds real time. Fig. 9: Simulation sequence 2 at 45 minutes The results obtained show that under ideal conditions, throughput is maximized with large frames of data transmissions. However, IEEE 802.11 wireless networks are error-prone, and these errors reduce the saturation throughput performance at congestion points. From the foregoing, it can comfortably be stated that maintaining a reasonable amount of load on a collision domain can help a long way to maximize the throughput performance of networks. V. CONCLUSION AND FUTURE WORKS The convergence of multiple services into the data centre offers many operational benefits to the enterprise business. By converging computational, storage, application, and networking services, into one operational centre. This place stringent demands on the data centre design and the capabilities of the devices these services needed. In this paper, a detail analysis and design of Cisco network implementing routing, security, and switching was presented as an approach to congestion management. We design a Cisco network with routing and security using Cisco network simulator software (packet tracer), which ordinarily will not work without some set of configurations. We then show the configurations necessary for the routing and security. The model is validated through extensive simulation results. Our results show that routing, switching, and security were fully implemented in the model. The model is therefore recommended for any organization or computer networking firms that needs a standard, efficient, robust, and secure network. In the future, we will expand the scope of this research work. This will involve the design and configuration of network that will always match the security standard that would be needed by any organization or computer networking firms at any time. Also, the future work should not only be to design and configure a Cisco network, but also to observe and point out where this Cisco network will not meet the networking standard again in security and efficiency. REFERENCES [1] D. Bertsekas and R. Gallager, Computer Networking with Internet Protocols and Technology, (Pearson Education, 1987). [2] H. S. Chhaya and S. Gupta (1997). Performance Modeling of Asynchronous Data Transfer Methods of IEEE 802.11 MAC Protocol for Wireless Networks. [3] H. Nguyen and G. Bianchi, Performance Analysis of the IEEE 802.11 DCF, Proc. of IEEE PIMRC, 1996, pp. 234-245. [4] N. M. Rabadi and M. M. Syed, Performance Evaluation of IEEE 802.11a MAC Protocol for Vehicular Intersection Collision Avoidance System, 2002. [5] IEEE 802.11 WG. International Standard for Information Technology – Local and Metropolitan Area Networks, Part 11: Wireless LAN MAC and PHY Specifications, 1999. Throughput(bits/sec) Time (minutes)
  • 7. Modeling Network Router, Switches and Security Using Cisco and OPNET Simulation Software International organization of Scientific Research 50 | P a g e [6] B. Davide and P. Rong, Backward Congestion Notification version 2.1, IEEE 802.11 Meeting, 2005. [7] L. M. Feeney, B. Cetin and D. Hollos, Multirate Relay for Performance Improvement in IEEE 802.11 WLANs. Conf. Proc. of Universitat Paderborn, 2004, pp. 149-157. [8] G. Bianchi. Performance Analysis of the IEEE 802.11 Distributed Coordination Function. IEEE Journal on Selected Areas in Communications, 2000. [9] T. T. Blahut and E. Richard (2004). Algebraic Codes for Data Transmission (Cambridge University Press, 2004). [10] P. Chatzimisios, A. C. Boucouvalas and V. Vitsas, IEEE Wireless LANs: Performance Analysis and Protocol Refinement, 2005. [11] M. H. Manshaei, T. Turletti, Simulation Based Performance Analysis of 802.11a WLAN. Proceedings of IEEE, 2004, pp. 2-6. [12] N. Qiang, Performance Analysis and Enhancements of IEEE 802.11e Wireless Networks, 2000.