RESEARCH ARTICLES
Published 2024-05-13
Keywords
- VGG16
How to Cite
Meghana S, Suriya Hanchinal, Preethi H A, & Naveen Chandra Gowda. (2024). Campus Area Network Design Using Cisco Packet Tracer. International Journal of Computational Learning & Intelligence, 3(2), 323–329. https://doi.org/10.5281/zenodo.11065719
Copyright (c) 2024 Meghana S, Suriya Hanchinal, Preethi H A, Naveen Chandra Gowda

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abstract
An effective network is necessary to enable the methodical and economical information flow throughout an organization in the in the form of documents, files, and assets. The initiative sheds light on a number of ideas such as IP address configuration, topology design, and the way to transfer data in the format of packets to the various university locations' wireless networks. The project's goal is to use the software to design the university network's topology. Wireless networking systems are implemented utilizing Cisco Packet Tracer.References
- Huang, M., Luo, W., & Wan, X. (2019, April). Research on network security of campus network. In Journal of Physics: Conference Series (Vol. 1187, No. 4, p. 042113). IOP Publishing.
- Perera, C., Qin, Y., Estrella, J. C., Reiff-Marganiec, S., & Vasilakos, A. V. (2017). Fog computing for sustainable smart cities: A survey. ACM Computing Surveys (CSUR), 50(3), 1-43.
- Galaviz-Mosqueda, A., Morales-Sandoval, M., Villarreal-Reyes, S., Galeana-Zapién, H., Rivera-Rodriguez, R., & Alonso-Arevalo, M. A. (2017). Multi-hop broadcast message dissemination in vehicular ad hoc networks: A security perspective review. International Journal of Distributed Sensor Networks, 13(11), 1550147717741263.
- Ahmed, S. T., Kumar, V. V., Singh, K. K., Singh, A., Muthukumaran, V., & Gupta, D. (2022). 6G enabled federated learning for secure IoMT resource recommendation and propagation analysis. Computers and Electrical Engineering, 102, 108210.
- Kumar, S. S., Ahmed, S. T., Vigneshwaran, P., Sandeep, H., & Singh, H. M. (2021). Two phase cluster validation approach towards measuring cluster quality in unstructured and structured numerical datasets. Journal of Ambient Intelligence and Humanized Computing, 12, 7581-7594.
- Chen, S., Ma, R., Chen, H. H., Zhang, H., Meng, W., & Liu, J. (2017). Machine-to-machine communications in ultra-dense networks—A survey. IEEE Communications Surveys & Tutorials, 19(3), 1478-1503.
- Ahmed, S. T., Basha, S. M., Ramachandran, M., Daneshmand, M., & Gandomi, A. H. (2023). An edge-AI enabled autonomous connected ambulance route resource recommendation protocol (ACA-R3) for eHealth in smart cities. IEEE Internet of Things Journal.
- Guo, H., Li, J., Liu, J., Tian, N., & Kato, N. (2021). A survey on space-air-ground-sea integrated network security in 6G. IEEE Communications Surveys & Tutorials, 24(1), 53-87.
- Liu, H., Wang, Y., Fan, W., Liu, X., Li, Y., Jain, S., ... & Tang, J. (2022). Trustworthy ai: A computational perspective. ACM Transactions on Intelligent Systems and Technology, 14(1), 1-59.