0% found this document useful (0 votes)
270 views5 pages

Ioe CN Lab 3

This lab report summarizes a virtual LAN configuration experiment using Cisco Packet Tracer. The student created two VLANs called BCT and BEI on a Cisco switch and assigned ports and IP addresses to segment four PCs into the two VLANs. Testing confirmed PCs could communicate within their VLAN but not between VLANs, demonstrating the logical isolation provided by VLAN segmentation. The conclusion is that the lab successfully configured VLANs and reinforced the benefits of using VLANs to logically organize networks.

Uploaded by

creatophile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
270 views5 pages

Ioe CN Lab 3

This lab report summarizes a virtual LAN configuration experiment using Cisco Packet Tracer. The student created two VLANs called BCT and BEI on a Cisco switch and assigned ports and IP addresses to segment four PCs into the two VLANs. Testing confirmed PCs could communicate within their VLAN but not between VLANs, demonstrating the logical isolation provided by VLAN segmentation. The conclusion is that the lab successfully configured VLANs and reinforced the benefits of using VLANs to logically organize networks.

Uploaded by

creatophile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

TRIBHUVAN UNIVERSITY

INSTITUTE OF ENGINEERING
THAPATHALI CAMPUS

A Lab Report
Of
Computer Network and Security
On
Virtual LAN Configuration

Submitted By:
Rishav Subedi (THA076BCT036)

Submitted To:
Department of Electronics and Computer Engineering
Thapathali Campus
Kathmandu, Nepal

14th July, 2023


Theory:
VLAN (Virtual Local Area Network) configuration is an essential aspect of
computer networking that enables the segmentation and organization of network
devices into logical groups, even if they are physically located on the same
network. By implementing VLANs, network administrators can enhance security,
improve network performance, and simplify network management. Here's an
overview of VLAN configuration theory:

A VLAN is a virtual broadcast domain that groups network devices logically. It


allows devices to communicate with each other as if they were on the same
physical network, even if they are located on different switches or subnets.

Benefits of VLANs:
a. Enhanced Security: VLANs can be used to separate sensitive data and restrict
access between VLANs, thereby reducing the risk of unauthorized access and data
breaches.

b. Improved Performance: By segmenting the network into smaller broadcast


domains, VLANs can reduce unnecessary network traffic and enhance overall
network performance.

c. Simplified Network Management: VLANs facilitate network administration by


enabling administrators to group devices based on common requirements or
functions, making it easier to manage network resources, apply policies, and
troubleshoot issues.

VLAN Types:
a. Port-Based VLANs:
Devices are assigned to VLANs based on the physical switch port to which they
are connected. All devices connected to the same port belong to the same VLAN.

b. Tagged VLANs (802.1Q):


Devices are assigned to VLANs based on VLAN tags added to Ethernet frames.
This method allows multiple VLANs to coexist on the same physical network
infrastructure.

c. Protocol-Based VLANs:
Devices are assigned to VLANs based on the protocols used in network traffic. For
example, all IP traffic (IPv4 or IPv6) can be assigned to a specific VLAN.
Implementation:
This lab was implemented using cisco packet tracer using the following steps:

1. Network Topology Setup:


 Opened Cisco Packet Tracer and selected a switch model along with four
PCs.
 Connected the PCs to the switch using Ethernet cables.

2. IP Configuration on the PCs:


 Assigned different IP addresses to each computer as 192.168.0.1,
192.168.0.2, 192.168.0.3, 192.168.0.4

3. VLAN Configuration on the Switch:


 Accessed the switch's configuration interface.
 Created VLANs named BCT and BEI using the following commands:
vlan 2
name BCT
vlan 3
Name BEI
Exit
 Assigned switch ports to the corresponding VLANs. For example:
enable
configure terminal
interface FastEthernet0/1
switchport mode access
switchport access vlan 2
end
 Checked the connectivity within each VLAN.
 Verified that PCs within the same VLAN could communicate with each
other, but not with PCs in the other VLAN.

In above figure, PC0 and PC1 are under same VLAN BCT and PC2 and PC3 are
under same VLAN BEI.
Results:
Two VLANs, BCT and BEI, were successfully created on the Cisco switch.
PC0 and PC1 were assigned to VLAN BCT, while PC2 and PC3 were assigned to
VLAN BEI. IP addresses were configured for each PC within their respective
VLANs. Connectivity was tested, confirming that PCs within the same VLAN
could communicate with each other but not with PCs in the other VLAN.

Communication between PC0 and PC1 is successful as they are under the same
VLAN.

Communication between the PC0 and PC3 is not successful as they are under
different VLAN.

Conclusion:
The lab demonstrated the successful configuration of Virtual LANs (VLANs)
using Cisco Packet Tracer. VLANs provided logical segmentation of the network,
improving performance and enhancing security. By isolating traffic between
VLANs, communication within each VLAN was efficient and secure. This hands-
on experience deepened the understanding of VLAN configuration and its
advantages in network management.

You might also like