Enhancing Northern Isabela Academy’s
Network Performance Infrastructure and
Security with Cisco Packet Tracer
Harold G. Hernandez
Kristine N. Cariaga
Kyla Mae A. Garcia
ACKNOWLEDGEMENT
Successful research can never be prepared by the single effort, but it also demands the
help the guardianship of some conversant persons who help the undersigned actively or
positively in the completion of the successful project.
We would like to express our gratitude to our networking 2 adviser, Mrs. Maribel S.
Abalos. The door to ma’am Abalos was always open whenever we had questions about research
or writing. She constantly allowed this paper to be our own work but steered us in the right
direction whenever she thought we needed it.
We would also like to give our family for their continuous support and understanding
when undertaking our research and writing our project. Your prayer for us was what sustained
us this far.
Finally, we would like to thank God, for letting us through all the difficulties. We have
experienced your guidance day by day. You are so one who let us finish this research. We will
keep trusting for you for our future.
CHAPTER I
BACKGROUND AND ITS PROBLEM
I. INTRODUCTION
Educational institutions are gradually becoming reliant on robust and reliable
network systems to make effective communication, cooperation and data sharing
possible at a time of unprecedented technological progress. The Northern Isabela
Academy understands that it is vital for the High-Performance Network to continue
providing excellent education and maintaining its operational excellence. To guarantee
smooth connectivity, dependability, and security, the institution must urgently improve
its network infrastructure while it works to adapt to the changing digital landscape.
Hackers, and malicious applications that attempt to interfere or gain control over
the route infrastructure are the most serious threat to network infrastructure security. The
components of network infrastructure include all the hardware required to communicate
between networks, such as routers, firewalls, switches, servers, and storage systems.
Each of those systems will give hackers an entry point to the target network, which they
can place malicious software on.
To ensure the continued protection of the infrastructure in question, network
infrastructure security must be ensured by a comprehensive approach to ongoing
processes and practices. In the framework of this study, a thorough analysis will be
made of the current Network infrastructure at Northern Isabel Academy to identify all
weaknesses, obstacles, and security issues. Cisco Packet Tracer's next deployment will
act as a virtual testing ground for suggested enhancements, providing a risk-free setting
for fine-tuning configurations and resolving possible problems. Network infrastructure,
security and performance at Northern Isabel Academy could have been greatly improved
with the deployment of Cisco Packet Tracer. The goal of this research is to offer a
thorough implementation roadmap so that the institution can fulfill its mission of
providing high-quality education in a world connected by digital means.
Statement of the Problem
The Northern Isabela Academy of Technology faces an urgent need to reinforce its
network infrastructure, which it recognizes as the crucial role played by a high-
performance network in maintaining operating excellence and delivering quality
education. The main concern is the potential risks to privacy, integrity, and availability
of critical information due to security vulnerabilities in existing networks which could
be exploited by hackers or malicious applications.
Network infrastructure components of Northern Isabel Academy, including routers,
firewalls, switches, servers, load balancing equipment, and storage systems all combine
to form an interconnected ecosystem which is vulnerable to cyber threats. This entry
point is being exploited by hackers who will be able to penetrate the Routing
Infrastructure, compromising data of Institutions and disrupting vital services.
The existing network must be thoroughly examined to identify flaws,
obstructions, and security issues that may compromise the institution's ability to deliver
uninterrupted and secure education services.
How to improve the network infrastructure of Northern Isabela Academy to
ensure optimal performance and security in the face of evolving cyber threats, while
seamlessly integrating Cisco Packet Tracer to strengthen the network and providing a
risk-free testing ground for proposed improvements, is the central issue addressed by
this research. To achieve the institution's mission of delivering highly quality education
in a digital world, it is also necessary to carry out an extensive assessment of current
network vulnerabilities, develop a coherent security strategy and draw up
implementation plans for Packet Tracer.
1.3 Statement of the Objectives
General Objective
The main objective of this research is to enhance Northern Isabela Academy's network
infrastructure, security, and performance to ensure optimal connectivity and support the
institution's mission of delivering high-quality education in a digitally interconnected
world.
Specific Objectives
Conduct a comprehensive examination of the existing network infrastructure at
Northern Isabela Academy, identifying strengths, weaknesses, and security
vulnerabilities.
Identify Security Threats and Vulnerabilities:
Analyze potential security threats and vulnerabilities in the current network
infrastructure, with a focus on risks posed by hackers and malicious applications.
Develop Holistic Network Security Strategy:
Formulate a comprehensive strategy for network infrastructure security that addresses
routers, firewalls, switches, servers, and other critical components.
Integrate Cisco Packet Tracer for Simulation:
Deploy Cisco Packet Tracer as a simulation tool to create a virtual testing environment
for proposed network enhancements.
Enhance Network Performance:
Propose and implement improvements to the network infrastructure with a focus on
enhancing overall performance, speed, and reliability.
Develop Implementation Roadmap for Cisco Packet Tracer:
Develop a detailed implementation roadmap for the integration of Cisco Packet Tracer
into Northern Isabela Academy's network infrastructure.
Significance of the Study
The scope of the study, "Optimizing Northern Isabel Academy Network Performance
Infrastructure and Security with Cisco Packet Tracer," includes various dimensions that
meet the needs of interested parties contributing to academic and practical progress on
information technology.
The school
The overall reputation of Northern Isabela Academy is positively enhanced through the
implementation of improvements in network performance infrastructure and security.
The research ensures that the school's network infrastructure is well managed, reliable,
and safe which directly affects its operation efficiency.
Researchers Themselves
To gain a deeper understanding, it shall be an instrument that guides them and navigates
them through the discovery of credible, reliable, and comparable factors referred to as
essential data. For future IT students who are new to the specific domain of network
performance infrastructure and security, this research is a crucial guide.
Teachers
Teachers particularly in information and communication technology will be benefited
from this research. The findings of this research are providing teachers with up to date
and appropriate information on the network performance infrastructure and security.
Educating professionals can continually improve their own knowledge and learning
methods, which will help them to progress professionally as they are updated with the
most recent developments in network performance and security.
Students
This research provides practical information and applications related to network
performance infrastructure and security for IT students.
Future Researchers
The results of the research will be used as a basis for researchers who wish to
understand network performance infrastructure and security better. The results of this
study serve as the starting point for future research.
The Community
The practical impact of this research has a major effect on the larger community. In
addition to the education institution, Northern Isabel Academy's enhanced network
capabilities and security measures are of great benefit to the community.
Scope and Limitation of the Study
Scope
Only the network infrastructure, performance and safety of the Northern Isabela
Academy are covered by this study. On the geographical front, this study focuses on
routers, firewalls, switches, servers, load balancing equipment and data storage systems
only at the Academy. The technical scope of this is to integrate and simulate Cisco
Packet Tracer as a tool for enhancing the network. Given the current state of network
infrastructure as it stands at the time of research, this study will be carried out over a
specified period. The implementation of this study is limited to the Northern Isabela
Academy, and it does not include any further education institutions or organization.
Limitations
Resource limitations such as time, budget and human resources which could affect the
depth and scale of data collection, analysis and implementation are limiting this study.
The applicability of these findings may be influenced by outside factors, e.g. changes in
technology or unforeseen events. The findings of that study are intended exclusively for
the Northern Isabel Academy and may not be universal in scope. The success of
implementation may be influenced by human factors such as the ability of teachers, staff
and students to adapt to changes. The rapid evolution of technologies poses an obstacle
as the study's been developed in a technology landscape. Although it provides a virtual
environment for testing, the Packet Tracer may not be able to fully replicate all real
Cisco world scenarios. To assess whether or not a research project will be successful,
such limitations are of paramount importance.
Chapter 2
Review of Related Literature
This chapter presents the related literature and studies that will provide reliable
sources about the topic of the enhanced network performance infrastructure and security
with Cisco Packet Tracer.
Impacts of using Cisco Packet Tracer
The utilization of Cisco Packet Tracer emerges as a cornerstone in the realm of
computer network education, primarily driven by its multifaceted roles and distinctive
advantages. Foremost among these is the provision of a robust platform for virtual
networking simulation, offering students an immersive experience that enhances their
practical knowledge of fundamental networking principles, Sheikh Raashid Javid
(2014).
Moreover, the article underscores the instrumental role of Packet Tracer in
facilitating practical knowledge enhancement. By enabling students to grasp the
application of diverse networking protocols in real-world scenarios, the tool empowers
them to undertake mini-projects, fostering innovation and creativity in problem-solving
within the networking domain Sheikh Raashid Javid (2014).
Smith (2018) emphasized that a robust network infrastructure is foundational for
the effective functioning of educational institutions in the digital age. It underpins
communication, collaboration, resource access, and the integration of technology,
ultimately contributing to an environment that fosters efficient learning and academic
excellence. As technology continues to evolve, maintaining and upgrading network
infrastructure will be crucial for staying at the forefront of educational innovation.
Sadan Cambazoglu and Arif Sari (2015) assessed the MACAW protocol's
performance in a mobile ad hoc network with ongoing jamming. It investigates how the
jamming attack affects statistics on network throughput, load, WLAN delay, and data
dropped. The research also contrasts the jamming attack's performance with the
network's performance under typical circumstances without security threats. They used
simulation to evaluate how well the MACAW protocol performed in a range of
conditions, including a persistent jamming attack. To assess the effect of the jamming
assault on the network, they simulated two scenarios and analyzed performance
indicators. The study makes use of both malicious and benign simulation scenarios as
well as metrics for network throughput, load, WLAN delay, and data dropped statistics.
Simulations help to improve learning settings. Virtual representations of the
complicated world enable instructors to provide students with hands-on experience that
should transfer straight to the real world. Simulation for Network Education,
Marquardson, and Gomillion (2019) discuss the benefits of using simulated
environments for teaching networking skills. They explore the potential for simulations
to enhance training in the field and the effectiveness of using simulations to teach
computer networking principles. It also discusses how virtual and augmented reality
technologies contribute to expanding training using simulations. This research provides
valuable insights into the use of simulated environments for education and the transfer
of skills to real-world settings. The implications of this research for the future of
network education and training are significant.
The study conducted by P Preetha, et al. (2015) delves into the realm of
Quantum Information Science, with a primary focus on network performance,
particularly Quantum Anonymous Collision Detection in Quantum Networks. The
researchers developed a theoretical model, proposing a protocol that ensures anonymity
for multiple senders, emphasizing the unique aspects of quantum anonymous collision
detection. The investigation primarily unfolded within the context of Quantum
Networks, employing theoretical modeling grounded in quantum information science
concepts and methods. The study's noteworthy findings include the successful
development of a protocol addressing anonymity concerns for multiple senders, with a
specific emphasis on quantum collision detection. Looking ahead, the researchers
recommend further exploration of fading channel models, scalability considerations in
large-scale networks, and potential applications in wireless communication systems such
as cellular networks and satellite communication systems. This work lays the
groundwork for future research endeavors that can extend and apply the proposed
protocol to diverse communication environments.
VLAN technology is one of the hottest areas of networking systems. A VLAN
allows network devices to be combined as virtual LANs in a logical rather than a
physical association. VLAN allows us to construct numerous networks with a single
class of IP address, and by blocking inter-VLAN connection, we may enable or refuse
users access to a certain network. The main requirement for establishing VLAN is
network breaking, and we have showed VLAN configuration on Cisco Packet Tracer to
better understand this. VLANs provide a number of advantages, but our research has
revealed that they are being used for a variety of purposes that they were not designed
for Saampatii Vakharkar and Nitin Sakhare (2022).
N Tarkaa, et al (2017) directed their attention to the design and simulation of
Local Area Networks (LANs) using Cisco Packet Tracer. Operating within the
quantitative research paradigm, the study employed a simulation model to analyze LAN
performance under varied scenarios. Set in the Department of Electrical and Electronics
Engineering at the Federal University of Agriculture, Makurdi, Nigeria, the research
utilized a sample comprising a simulated LAN network implemented through Cisco
Packet Tracer. The findings underscored the efficacy of Cisco Packet Tracer as a
predictive tool for assessing network impacts arising from hardware upgrades, changes
in topology, increased traffic load, or new applications. Noteworthy outcomes also
included the identification of influential factors such as LAN topologies, transmission
media, and IPv4 addressing and subnetting on network performance. The research
serves as a foundation for future inquiries, proposing further investigations into the
repercussions of factors like IPv6 addressing, diverse network protocols, and the
integration of wireless networks on LAN performance. This study contributes valuable
insights to the field, providing a basis for future research avenues in the domain of local
area network design and simulation.
Conceptual Framework
Input Process Output
In-depth analysis of
existing network Data Collection
Improved network
infrastructure Optimization of performance,
Identification of network upgraded
security vulnerabilities configurations infrastructure, and
Implementation of enhanced security
Understanding of in Northern Isabela
Cisco Packet Tracer Cisco Packet Tracer
simulations Academy
capabilities.
The IPO Model is a functional framework for conceptualizing ideas that can be
used to generate new ones. It provides methods for gaining a deeper understanding of
how ideas work and for making the most of their details. IPO is a functional graph that
identifies the inputs, outputs, and processing activities that are necessary to change
inputs into outputs. IPO is used to represent a process flow. In some cases, the model is
set to include any storage that may occur during the process as well as the actual
storage.
The input, as the initial step phase of this research, represents the In-depth
analysis of existing network infrastructure, identification of security vulnerabilities,
understanding of Cisco Packet Tracer capabilities. From the figure above, it can be
gleaned that the process will start from data collection, with the use of a validated
researcher-made questionnaire, then comes the statistical treatment of the results. This
step also includes the optimization of network configurations, implementation of Cisco
Packet Tracer simulations, for a better understanding of the results. Finally, the output
will be an Improved network performance, upgraded infrastructure, and enhanced
security in Northern Isabela Academy.
Synthesis
The study underscores the pivotal role of Cisco Packet Tracer in computer
network education, serving as an immersive simulation platform for practical knowledge
enhancement and innovative problem-solving. This multifaceted tool facilitates real-
world protocol application and fosters creativity, contributing to effective
communication and academic excellence in educational institutions. The studies reveal
the critical need for secure network protocols, the transformative potential of simulated
environments in learning, and innovative solutions for anonymity in quantum networks.
Additionally, there's insight into unconventional uses of VLAN technology and the
validation of Cisco Packet Tracer's efficacy in predicting LAN impacts. Collectively,
these findings portray Cisco Packet Tracer as a versatile and integral tool in network
education, addressing practical, security, and innovative aspects.
Chapter III – METHODOLOGY
3.1 Requirement Specification
Project Scope
Our project aims to enhance the network performance infrastructure and security
at Northern Isabela Academy, connecting 10 Personal Computers (PCs) in a computer
laboratory and 2 PCs in the principal's office to a central network infrastructure and
deploy Virtual Local Area Networks (VLANs) for resource management. The primary
objectives include optimizing connectivity, ensuring data security, and enhancing overall
network performance.
Tools and Technologies
Cisco Packet Tracer serves as the main tool for the project's development and
simulation. The underlying principle behind this decision arises from its proficiency in
emulating Cisco equipment and modeling complex networks, hence offering a realistic
testing environment. The assessment of alternative tools choice is Packet Tracer 7.3.
Nevertheless, Cisco Packet Tracer was chosen because of its adaptability and user-
friendly interface, which matched the project's specifications perfectly. The decision-
making process was aided by the tool's ability to accurately simulate Cisco equipment,
which guaranteed high accuracy throughout testing and validation.
Implementation Strategy
Cisco Packet Tracer - The project will utilize this development tool to design and
simulate network architecture for implementation.
Software - including firewall and intrusion prevention systems (IPS) software, is needed
for the project.
Hardware - The network interface cards for up to date, routers, and high-speed gigabit
switches.
Programming languages - Command-line interfaces and graphical user interfaces are
used instead of standard.
Time Schedule - The timeline is divided in to two weeks for the evaluation and analysis
phase and three weeks for the design and simulation phase. The procurement of
hardware and software and the implementation phase is on-going process. Throughout
the course, there will be continuous monitoring and assessment in addition to training
and documentation.
Testing tools - For preliminary testing, Cisco Packet Tracer will be one of the testing
tools used.
3.2 Project Design
In this section, we present a comprehensive overview of the architectural and
detailed design models employed in the implementation of the Northern Isabela
Academy network.
Architectural Design
The network architecture is based on a combination of router-switch
configurations, incorporating the following components:
End Devices: Twelve PCs designated as user workstations.
Router: A central router connecting two switches and facilitating inter-network
communication.
Switch0: Connecting PCs in the computer laboratory.
Switch1: Connecting PCs in the principal's office.
Detailed Design Model
PC Configuration: PCs are configured with unique IP addresses.
PCs in Computer Laboratory (PC0-PC9): [Link] to [Link]
PCs in Principal's Office (PC10-PC11): [Link] to [Link]
Router Configuration: Router0 is configured with IP addresses.
Interface to Switch0: [Link]
Interface to Switch1: [Link]
Switch0 Configuration: Switch0 is configured with IP address [Link]
Gig0/1: Connection to Router0
Fa0/11: Connection to PCs in the computer laboratory
Switch1 Configuration: Switch1 is configured with IP address [Link]
Gig0/0: Connection to Router0
Fa0/3: Connection to PCs in the principal's office
Rationale for Choices
Topology:
Reason: The router-switch configuration was selected to meet the project's objectives of
scalability, security, and improved performance.
Benefit: This choice aligns with the academy's requirements, providing an optimal
balance between functionality and resource utilization.
Alternatives Considered
Topology Alternatives:
Considered Alternatives: Bus and ring topologies.
Choice: Router-switch configuration was chosen for its scalability, security, and efficient
inter-network communication.
Rationale for Architectural Choices
Inter-Network Communication
Reason: The router facilitated communication between the computer laboratory and the
principal's office, allowing for efficient data transfer between the two sections of the
academy.
Benefit: Improved network performance and optimized data exchange between two
sections of the academy.
Scalability
Reason: The design allowed for future expansion, accommodating additional devices
without significant adjustments to the existing infrastructure.
Benefit: Scalability ensures the network can adapt to potential growth in the number of
devices or changes in the academy's infrastructure.
Security
Reason: The router provides a level of security by separating the two sections (computer
laboratory and principal's office) into distinct networks, enhancing data security and
confidentiality.
Benefit: Enhanced data security and isolation of network segments for improved
confidentiality.
Design Models
In addition to textual descriptions, the architectural and detailed design models are
presented visually in the attached diagrams, providing a more tangible representation of
the network configuration.
This design approach establishes a scalable, secure, and high-performance network
infrastructure, effectively addressing the needs of Northern Isabela Academy.
3.3 Project Development
Abstract Design Implementation
The development of the project involves a meticulous and strategic approach to address
the specific needs of the educational institution.
Connectivity Setup:
- PCs were linked to their respective switches within the computer laboratory and
the principal's office.
- The switches were connected to Router0 for inter-network communication.
Router-Switch Configuration:
- The router as central component of the network architecture which responsible
for facilitating inter-network communication between the computer laboratory and the
principal's office.
- Router0 was configured with specific IP addresses connected to Switch0
([Link]) and Switch1 ([Link]).
Switch Configuration:
- Switch0 ([Link]) and Switch1 ([Link]) were configured with their
unique IP addresses.
- Switch0 was connected to Router0 through Gig0/1, facilitating communication
with PCs in the computer laboratory through Fa0/11.
- Switch1 was connected to Router0 through Gig0/0, allowing communication
with PCs in the principal's office through Fa0/3.
PC Configuration:
- PCs were configured with their assigned unique IP addresses based on their
location.
- PCs in the computer laboratory were assigned IP addresses ranging from
[Link] to [Link].
- PCs in the principal's office were assigned IP addresses ranging from
[Link] to [Link].
The abstract design implementation ensured a well-defined structure for the network,
promoting efficient communication, scalability, and security. The use of a router-switch
configuration allowed for explicit segmentation of network segments, enhancing the
overall network performance of Northern Isabela Academy.
3.4 Operating and Testing Procedure
Verification and Validation
In the process of enhancing Northern Isabela Academy's network performance and
security, a thorough verification and validation strategy was implemented. To ensure the
efficacy of the network design, we conducted several key tasks:
Network assessment: a meticulous review of the proposed network topology was
undertaken, ensuring its alignment with the academy's specific requirements. This
involved both logical and physical inspections within Cisco Packet Tracer to guarantee
seamless connectivity and functionality.
Network Topology Review: a series of configuration verification tests were performed.
This included validating IP addressing, subnetting, and routing configurations across all
Cisco devices involved in the network enhancement.
Test Plans and Procedures
The test plans were meticulously designed to cover critical functions, and each plan had
specific procedures outlined.
Network Setup - Verified physical connections and ensured all devices were powered
on.
IP Configuration - Confirmed that each PC had the correct IP address.
Inter-Network Communication - Tested data transfer and communication between PCs
in the computer laboratory and the principal's office.
Test Tools Used
Various testing tools were employed to ensure comprehensive evaluation:
Cisco Packet Tracer – Utilize as primary tool to ensure a comprehensive evaluation for
network simulation and configuration.
Wireshark - Utilized for detailed traffic analysis and vulnerability scanning,
respectively.
Involvement of Others
For Northern Isabela Academy's network enhancing need to be verified and tested
through collaboration from peers, classmates, and colleagues:
IT specialists/Security experts - Gave input on QoS and performance in accordance with
institution requirements and emphasized security issues.
Classmates - Provided valuable insights on how the system worked, pointed out possible
problems, and made suggestions for enhancement.
3.5 Evolution/Maintenance
Modifications and Updates
Post-delivery, the project has undergone several modifications and updates to ensure that
the network infrastructure remains resilient, efficient, and capable of addressing
emerging challenges. Some ongoing process involves the following:
Post-Implementation Assessment - This involved evaluating the performance of the
upgraded network infrastructure and identifying any unforeseen issues that required
further improvement and effectiveness of the implemented solutions to serve as a
foundation for subsequent modifications.
Hardware Upgrades – The hardware upgrades of network component are crucial to
maintain compatibility with the latest standards and to support the increasing demand
for high-speed data transfer within the network.
Security Enhancement - Regular security audits were conducted to identify and address
potential vulnerabilities. This proactive approach involved updating and patching
security protocols, ensuring that the network remained resilient against emerging threats.
Timely Issue Resolution - Address any emerging issues promptly by implementing
solutions based on continuous monitoring and thorough diagnostics.
The evolution and maintenance have been characterized by a proactive and adaptive
approach. The project has not only sustained its initial improvements but has also
positioned the institution to meet future challenges in the evolving landscape of
networking and cybersecurity. This ongoing commitment to excellence ensures that
Northern Isabela Academy's network remains a reliable and secure foundation for its
educational and administrative activities.