VLAN Completed
VLAN Completed
COMMUNICATION
A project report submitted to
Sri Ramakrishna Mission Vidyalaya College of Arts and Science, Coimbatore- 20 in partial
fulfillment of the requirements for the award of the degree of
S.HEMNATH
( 22UCA018 )
APRIL – 2025
1
CERTIFICATE
This is to certify that the project entitled “DESIGN AND IMPLEMENTATION OF VLAN
COMMUNICATION’’ submitted to Sri Ramakrishna Mission Vidyalaya College of Arts and Science,
Coimbatore - 20, Affiliated to Bharathiar University, in partial fulfillment of the requirements for the award of
the degree of BACHELOR OF COMPUTER APPLICATIONS is a record of original project work done by
S.HEMNATH ( 22UCA018 ) during the Academic year 2024-2025 of his study in the Department of
Computer Applications at Sri Ramakrishna Mission Vidyalaya College of Arts and Science, Coimbatore-20,
under my supervision and guidance and the dissertation has not formed the basis for the award of any Degree /
Diploma / Associateship / Fellowship or other similar title to any candidate of any university.
Date:
2
DECLARATION
I hereby declare that the thesis entitled “DESIGN AND IMPLEMENTATION OF VLAN
COMMUNICATION ” submitted in partial fulfillment of the requirements for the award of the degree of
BACHELOR OF COMPUTER APPLICATIONS of Bharathiar University is a record of original work
done by me during the Academic Year 2024-2025 under the supervision and guidance of
Dr.M.CHANDRAN MCA.,M.Phil.,Ph.D., Associate Professor, Department of Computer Applications,
Sri Ramakrishna Mission Vidyalaya College of Arts and Science, Coimbatore - 20. The dissertation has not
formed the basis for the award of any Degree / Diploma / Associateship / Fellowship or other similar title to
any candidate of any university.
3
ACKNOWLEDGEMENT
I would like to express my sincere thanks to our Secretary, Dr. K. KANDHAPPAN M.A.,
M.Phil., D.L.L., DCHI., Ph.D., Sri Ramakrishna Mission Vidyalaya College of Arts and Science,
Coimbatore - 20 for giving me the permission to do the project.
At the outset I record my profound thanks to our Principal Dr. A. MUTHUSAMY M.Sc., M.Ed.,
M.Phil., Ph.D., Sri Ramakrishna Mission Vidyalaya College of Arts and Science, Cbe-20 for
following me to carry out this project work, I take this opportunity to acknowledge my deep sense of
gratitude to our honorable Director Dr. R. SRIDHAR M.Sc., MCA, M.Phil., Ph.D., Sri Ramakrishna
Mission Vidyalaya College of Arts and Science for permitting me to carry my project work.
I would also express my sincere thanks to Dr. J.M. DHAYASHANKAR MCA., M.Phil., Ph.D.,
Associate Professor, Sri. D. GOVINDARAJ M.Sc., M.Phil., (Ph.D.,) Assistant Professor, Sri. M.
RAJKUMAR MCA., Assistant Professor and all the faculty members of Department Computer
Applications, Sri Ramakrishna Mission Vidyalaya College of Arts and Science, CBE-20 for their
valuable support and suggestions in my project work.
Finally, I express my heartful gratitude to my beloved Parents and Friends without whose sustained support, I
could not have made debut in Computer Applications.
4
SYNOPSIS
system that is user friendly simple, and cost-effective. It comes with the collection of information of patients,
details of the diagnosis, etc. The main function of this system is firstly registered and then store the details of
the patient and the details of the staff and get back these details as and when required, and also for the utilize
these details purposely. System input holds the patient’s details, while system output is to get these details on
the screen. The Lab Reporting System can be pass into using a username and password. And it is accessible
by each level of a user according to their part. Every user can see this data that they are approachable. And
only that user can add the data into database who has editing permission. The data can be recovers easily.
The data are efficiently protected for personal use and makes clarifying of data very rapidly.
5
CONTENT
S. NO TITLE PAGE NO
3. PROPOSED SYSTEM 10
3.1 Features 10
13
4.2.1 Before VLANs 13
4.2.2 After VLANs
4.3 Data Flow Diagram
7
6.2 Implementation
6.2.1 Device and IP Addressing Details
6.2.2 VLAN Segmentation & Purpose
6.3 Configuration Command
8. CONCLUSION
8.1 Conclusion
8.2 Future Enhancement
8
1. ABOUT THE PROJECT
In modern networking, Virtual Local Area Networks (VLANs) play a vital role in
improving network efficiency, security, and scalability. VLANs allow network administrators
to logically segment a physical network into multiple isolated broadcast domains, enabling
better control over data traffic flow. Unlike traditional LANs, where all connected devices
share the same broadcast domain, VLANs divide the network into independent sections,
reducing congestion and enhancing overall performance.
9
1.1 SYSTEM SPECIFICIATION
10
1.2 ABOUT THE SOFTWARE
11
1.2.3 Packet Tracer User Interface Glossary
When you open Packet Tracer, by default you will be presented with the following interface:
This bar provides the File, Edit, Options, View, Tools, Extensions,
1 Menu Bar and Help menus. You will find basic commands such as Open, Save, Save
as Pkz, Print, and Preferences in these menus.
This bar provides shortcut icons to the File and Edit menu commands. This
2 Main Tool Bar bar also provides buttons for Copy, Paste, Undo, Redo, Zoom, the Drawing
Palette, and the Custom Devices Dialog.
This bar provides access to these commonly used workspace
Common Tools tools: Select, Move Layout, Place Note, Delete, Inspect, Resize Shape, Add
3
Bar Simple PDU, and Add Complex PDU. See "Workspace Basics" for more
information.
You can toggle between the Physical Workspace and the Logical
Logical/Physical
Workspace with the tabs on this bar. In Logical Workspace, this bar also
4 Workspace and
allows you to go back to a previous level in a cluster, create a New
Navigation Bar
Cluster, Move Object, Set Tiled Background, and Viewport.
This area is where you will create your network, watch simulations, and
5 Workspace
view many kinds of information and statistics.
You can toggle between Realtime Mode and Simulation Mode with the tabs
Real time / on this bar. This bar also provides buttons to Power Cycle Devices and Fast
6
Simulation Bar Forward Time as well as the Play Control buttons and the Event List toggle
button in Simulation Mode.
This box is where you choose devices and connections to put into the
Network
7 workspace. It contains the Device-Type Selection Box and the Device-
Component Box
Specific Selection Box.
This box contains the type of devices and connections available in Packet
Device-Type
8 Tracer. The Device-Specific Selection Box will change depending on which
Selection Box
type of device you choose.
Device-Specific This box is where you choose specifically which devices you want to put in
9
Selection Box your network and which connections to make.
12
User Created This window manages the packets you put in the network during simulation
10
Packet Window* scenarios. See the "Simulation Mode" section for more details.
13
another. However, nothing "runs" until you capture it (the first time through, as with a
protocol sniffer)
14
or play it (re-playing the captured events as an animation). When you capture or play the
simulation, you will see graphical representations of packets traveling from one device to
another. You can pause the simulation, or step forward or backward in time, investigating
many types of information on specific PDUs and devices at specific times. However, other
aspects of the network will still run in real time. For example, if you turn off a port, its link
light will respond immediately by turning red
You can also hide the Event List (and the entire Simulation Panel) with the Event List
button in the Simulation Bar. You will still have access to the Play Controls on the bar.
15
2. SYSTEM STUDY
2.1.2 DRAWBACKS
Broadcast Storms
Since all devices shared the same broadcast domain, excessive broadcasts could
overwhelm the network.
Security Issues
Devices could eavesdrop on network traffic since all packets were sent to all devices.
Sensitive data could be accessed by unintended users.
16
3. PROPOSED SYSTEM
3.1 FEATURES
The proposed VLAN system improves upon the traditional VLAN communication
model by integrating automation, enhanced security, scalability, and optimized traffic
management. One of the key enhancements in the proposed system is the implementation of
dynamic VLAN assignment, where devices are automatically assigned to VLANs based on
MAC addresses, protocols, or authentication methods such as 802.1X. This eliminates the
need for manual configuration and improves network efficiency.
Security is also a major focus in the proposed system. Features such as port security,
MAC filtering, and VLAN Access Control Lists (ACLs) ensure that only authorized devices
can communicate within a VLAN. Additionally, Private VLANs (PVLANs) provide further
isolation by restricting communication between devices within the same VLAN, improving
data security and reducing potential attack surfaces.
17
4. SYSTEM DESIGN AND DEVELOPMENT
18
4.1.3 IPv4 Packet Header Fields
IPv4 protocol defines many different fields in the packet header. These fields contain
binary values that the IPv4 services reference as they forward packets across the network.
19
4.1.5 Classful IP addressing
In 1989, ARPANET had been transformed into what we now call the Internet. Over
the next decade, the number of hosts on the Internet grew exponentially, from 159,000 in
October 1989, to over 72 million by the end of the millennium. As of January 2007, there
were over 433 million hosts on the Internet. Without the introduction of VLSM and CIDR
notation in 1993 (RFC 1519), Name Address Translation (NAT) in 1994 (RFC 1631), and
private addressing in 1996 (RFC 1918), the IPv4 32-bit address space would now be
exhausted.
20
4.1.7 The IPv4 Classful Addressing Structure
The designations of network bits and host bits were established in RFC 790 (released
with RFC 791). As shown in the fig 1.5, class A networks used the first octet for network
assignment, which translated to a 255.0.0.0 classful subnet mask. Because only 7 bits were
left in the first octet (remember, the first bit is always 0), this made 2 to the 7th power or 128
networks.
With 24 bits in the host portion, each class A address had the potential for over 16
million individual host addresses. Before CIDR and VLSM, organizations were assigned an
entire classful network address. What was one organization going to do with 16 million
addresses? Now you can understand the tremendous waste of address space that occurred in
the beginning days of the Internet, when companies received class A addresses. Some
companies and governmental organizations still have class A addresses.
21
4.2 VLAN COMMUNICATION
The VLAN is a new technology which is used to logically divide the network into
different broadcast domains. So that the packets are delivered within the port of same VLAN
group. Implementing VLAN technology enables a network to more flexibly support business
goals.
22
must be forwarded through a device that supports routing.
23
A VLAN creates a logical broadcast domain that can span multiple physical LAN
segments. VLANs improve network performance by separating large broadcast domains into
smaller ones. If a device in one VLAN sends a broadcast Ethernet frame, all devices in the
VLAN receive the frame, but devices in other VLANs do not.
VLANs enable the implementation of access and security policies according to
specific groupings of users. Each switch port can be assigned to only one VLAN.
A Virtual Local Area Network (VLAN) is a logical segmentation of a physical network that
groups devices into a subnetwork, regardless of their physical location. VLANs enable
network administrators to create multiple isolated networks within the same physical
infrastructure, improving security, traffic management, and network performance.
Unlike traditional LANs, where all devices within a switch belong to the same broadcast
domain, VLANs logically separate network traffic, allowing devices in different VLANs to
communicate only through a router or a Layer 3 switch. This segmentation helps reduce
network congestion, improves scalability, and enhances security by restricting unnecessary
communication between different groups of devices.
24
For example, in an organization such as a university or corporate environment, VLANs can
be created to logically separate different departments or groups while sharing the same
physical network infrastructure. This segmentation helps improve network performance,
enhance security, and simplify management. Consider the following VLAN assignments in
an educational institution:
Even though all devices, including computers, printers, and access points, may be physically
connected to the same network switch, VLAN configuration ensures logical segmentation.
This means that devices within the same VLAN can directly communicate with each other,
but communication between different VLANs is restricted unless inter-VLAN routing is
enabled. Inter-VLAN routing, typically performed by a Layer 3 switch or a router, allows
controlled communication between VLANs when necessary. For example, if the CS
department (VLAN 20) needs to share data with the BCA department (VLAN 30), a
network administrator can configure inter-VLAN routing with appropriate access control
lists (ACLs) to regulate traffic flow securely.
25
This VLAN-based segmentation not only enhances network security by preventing
unauthorized access but also reduces broadcast traffic, thereby improving overall network
performance and efficiency. Proper VLAN planning and implementation ensure a structured
and manageable network environment, particularly in large organizations with multiple
departments and varying network requirements.
26
VLAN Port Check
Start
Device Send
the Data
Check
Same No
Drop the Data
VLAN as
Yes
Forward Data
to same VLAN
(within Switch)
Is
Destination No
Drop the Data
on Same
Switch?
Yes
End
27
4.2.3 Key Characteristics of VLANs:
Default VLAN
The default VLAN is the VLAN that all switch ports belong to when the switch is first
initialized. It is typically used as a fallback VLAN.
▪ VLAN 1 is the default VLAN.
For security reasons, administrators often change or restrict VLAN 1 usage.
🔹 Example: A new switch with no configuration assigns all ports to VLAN 1 by default.
28
Example:
VLAN 10 – B. Com
VLAN 20 – CS
VLAN 30 – BCA
VLAN 40 – IT
This setup improves network performance and security by restricting inter-departmental traffic.
Voice VLAN
A Voice VLAN is specifically designed to carry voice-over-IP (VoIP) traffic with high
priority. Ensures low latency and high-quality voice communication.
Uses Quality of Service (QoS) to prioritize voice traffic over normal data.
Reduces packet loss, jitter, and delay for VoIP calls.
Example:
VLAN 70 is assigned for IP phones in a company, ensuring smooth VoIP
communication.
Management VLAN
A Management VLAN is dedicated to network administration tasks, such as managing
switches and routers.
Provides secure access to network administrators.
Prevents unauthorized users from accessing network configuration settings.
Typically assigned to a separate VLAN ID from user traffic.
Example:
VLAN 50 is reserved for network administrators to remotely manage switches and
routers.
29
Native VLAN
A Native VLAN is used for untagged traffic on a trunk port. When a switch receives
untagged frames on a trunk link, it assigns them to the Native VLAN.
Prevents VLAN mismatches between interconnected switches.
Default Native VLAN is VLAN 1, but it's recommended to change it for security
reasons.
Example:
If VLAN 99 is set as the Native VLAN, untagged frames on a trunk port will be
assigned to VLAN 99.
Key Features:
The port belongs to one VLAN only.
Incoming frames are untagged and assigned to the configured VLAN.
Outgoing frames remain untagged, making it simple for non-VLAN-aware devices.
🔹 Example Configuration (Cisco Switch):
30
4.2.5.2 Trunk Mode
In Trunk Mode, a switch port carries multiple VLANs using VLAN tagging (IEEE
802.1Q). Trunk ports are usually used for inter-switch connections or router-to-switch
connections.
Key Features:
The port carries traffic for multiple VLANs.
Uses 802.1Q tagging to differentiate VLAN traffic.
Requires a Native VLAN for untagged frames.
31
5. SYSTEM DESIGN AND DEVELOPMENT
Trunking Implementation
802.1Q Trunking allows multiple VLANs to pass through a single link between
switches.
32
Example configuration:
Switch(config)# interface FastEthernet 0/1
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan 10,20,30,40
33
6. TESTING AND IMPLEMENTATION
34
6.2 Implementation
This network is designed to segregate traffic using VLANs, grouping staff and
students into their respective departments. Each device is assigned an IP address within the
same subnet (192.168.1.0/24) but is logically separated using VLANs.
35
VLAN 30 (BCA Department)
BCA Staff and Students are in a separate VLAN.
VLAN 40 (IT Department)
IT Staff and Students operate in VLAN 40.
Sw2_Rajeshwari Configuration
Switch>
Switch>ena
Switch#config t
Switch(config)#hostname Sw2_Rajeshwari
Sw2_Rajeshwari(config)#vlan 10
Sw2_Rajeshwari(config-vlan)#name B.Com
Sw2_Rajeshwari(config-vlan)#exi
Sw2_Rajeshwari(config)#vlan 20
Sw2_Rajeshwari(config-vlan)#name CS
Sw2_Rajeshwari(config-vlan)#ex
Sw2_Rajeshwari(config)#vlan 30
Sw2_Rajeshwari(config-vlan)#name BCA
Sw2_Rajeshwari(config-vlan)#ex
Sw2_Rajeshwari(config)#vlan 40
Sw2_Rajeshwari(config-vlan)#name IT
Sw2_Rajeshwari(config-vlan)#exit
36
Sw2_Rajeshwari(config)#interface range fastEthernet 0/5-
6 Sw2_Rajeshwari(config-if-range)#switchport mode trunk
Sw2_Rajeshwari(config-if-range)#exit
Sw2_Rajeshwari#show vlan
Switch>ena
Switch#config t
Switch(config)#hostname Sw1_Rajeshwari
Sw2_Rajeshwari(config)#vlan 10
Sw2_Rajeshwari(config-vlan)#name B.Com
Sw2_Rajeshwari(config-vlan)#exi
Sw2_Rajeshwari(config)#vlan 20
Sw2_Rajeshwari(config-vlan)#name CS
Sw2_Rajeshwari(config-vlan)#ex
37
Sw2_Rajeshwari(config)#vlan 30
Sw2_Rajeshwari(config-vlan)#name BCA
Sw2_Rajeshwari(config-vlan)#ex
Sw2_Rajeshwari(config)#vlan 40
Sw2_Rajeshwari(config-vlan)#name IT
Sw2_Rajeshwari(config-vlan)#exit
38
Sw1_Rajeshwari#show vlan
Switch>
Switch>ena
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname Sw3_Rajeshwari
Sw3_Rajeshwari(config)#vtp mode client
Setting device to VTP CLIENT mode.
Sw3_Rajeshwari(config)#vtp domain SP
Domain name already set to SP.
39
Sw3_Rajeshwari(config)#interface fastEthernet 0/2
Sw3_Rajeshwari(config-if)#switchport mode access
Sw3_Rajeshwari(config-if)#switchport access vlan 30
Sw3_Rajeshwari(config-if)#exi
Sw3_Rajeshwari#
Sw3_Rajeshwari#config t
Enter configuration commands, one per line. End with CNTL/Z.
40
Sw3_Rajeshwari#show vlan brief
Verification Command
Sw1_Rajeshwari#show vlan id 10
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
41
Sw1_Rajeshwari#show vlan id 20
20 CS active Fa0/2
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
Sw1_Rajeshwari#show vlan id 30
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
Sw1_Rajeshwari#show vlan id 40
40 IT active Fa0/4
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
42
Sw1_Rajeshwari#show vlan name IT
40 IT active Fa0/4
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
43
TOPOLOGY _2
Sw1_Rajeshwari#
Sw1_Rajeshwari#config t
Enter configuration commands, one per line. End with CNTL/Z.
44
Sw1_Rajeshwari#show vlan
Sw2_Rajeshwari>
Sw2_Rajeshwari>
Sw2_Rajeshwari>ena
Sw2_Rajeshwari#config t
Enter configuration commands, one per line. End with CNTL/Z.
45
Sw2_Rajeshwari(config)#interface fastEthernet 0/13
Sw2_Rajeshwari(config-if)#switchport mode access
Sw2_Rajeshwari(config-if)#switchport access vlan 30
Sw2_Rajeshwari(config-if)#exi
46
Sw3_Rajeshwari>
Sw3_Rajeshwari>
Sw3_Rajeshwari>
Sw3_Rajeshwari>ena
Sw3_Rajeshwari#config t
Enter configuration commands, one per line. End with CNTL/Z.
47
Sw3_Rajeshwari(config-if)#interface fastEthernet 0/23
Sw3_Rajeshwari(config-if)#switchport mode access
Sw3_Rajeshwari(config-if)#switchport access vlan 30
Sw3_Rajeshwari(config-if)#exit
48
8. CONCLUSION
8.1 Conclusion
49
BIBLIOGRAPHY
[1] Cisco Networking Academy “CCNA 1 and 2 Companion Guide” year-2003, Author:
Cisco Networking Academy, Publication: Pearson Education
[2] Cisco Networking Academy “CCNA 3 and 4 Companion Guide” year-2003, Author:
Cisco Networking Academy, Publication: Pearson Education
[3] W. A. Arbaugh, J. R. Davin, “Security for virtual private intranets,” Computer, vol. 31 (9),
pp. 48-55, 1998.
[4] C. L. Hedrick, “RFC1058: Routing information protocol,” Internet RFCs,1988.
[5] Somasundaram.S , Chandran.M. "Discovery of Geo-Locations by Tracing IP Address
Using VLSM Technique". International Journal of P2P Network Trends and Technology
(IJPTT)”.V11:1-4 Sep 2014. ISSN: 2249-2615. www.ijpttjournal.org. Published by
Seventh Sense Research Group.
[6] Somasundaram.S, Chandran.M. "A Simulation Based Study on Inter-VLAN
Routing" International Journal of Computer Sciences and Engineering (JCSE)”. Volume
4 Issue 7, Page 24 -29, July 2016. ISSN: 2347-2693
[7] Cisco, “Configure InterVLAN Routing on Layer 3 Switches”, 2016, [Online].
Available:http://www.cisco.com /c/en/us/support/docs/lan-switching/inter-vlan-routing/
41860 -howto-L3-intervlanrouting.pdf
[8] Cisco,” Configuring InterVLAN Routing with Catalyst 3750/3560/3550 Series Switches“,
2014 [Online]. Available: http://www.cisco.com/c/en/us/
support/docs/lan-switching/inter- vlan-routing/41260-189.pdf
[9] Cisco, “Understanding vlan trunk protocol (vtp),” 2007.
[Online].Available:http://www.cisco.com/application/pdf /paws /10558/21.pdf
[10] Rajiv O. Verma, "Effective Remote Management for Inter-VLAN Routing Networks"
International Journal of Application or Innovation in Engineering & Management
(IJAIEM), ISSN 2319 - 4847,2013.
[11] “Cisco Packet Tracer 7.0 Tool” Cisco Networking Academy.
50
SCREENSHOT
VLAN Assignment
51
The IP address is validated during transmission from the source to the destination.
52
Data was transferred from Sw1_Rejeshwari to Sw2_Rejeshwari
53
Data was transferred from Sw3_Rejeshwari to VLAN 10 (B.Com Student PC)
Response received for VLAN 10 (B.Com Student PC) to VLAN 10 (B.Com Staff)
54
55
VLAN Configuration using Access Mode only
56
VLAN has been assigned to the switch interface
57
Data is transferred from a VLAN using the access mode structure
58