Enterprise Network Design and Implementation

Authors

  • Sanjana Rai B S School of Computer Science and Engineering, REVA University, Bengaluru, India
  • Kushal T School of Computer Science and Engineering, REVA University, Bengaluru, India
  • Shashank B N School of Computer Science and Engineering, REVA University, Bengaluru, India
  • Rohan T R School of Computer Science and Engineering, REVA University, Bengaluru, India
  • Naveen Chandra Gowda School of Computer Science and Engineering, REVA University, Bengaluru, India

DOI:

https://doi.org/10.5281/zenodo.13933408

Keywords:

Cisco Packet Tracer, configuration, enterprise networks

Abstract

One kind of network intended for setting up an internet connection on an enterprise setup in a building is an enterprise network module. It acts as the company's cornerstone. The enterprise network's base is provided by the CCNA learning goals. A private or public network's construction requires the proper tools and procedures to ensure its dependability. Networks are important to organizations, especially virtual and wide area networks. In this article, we plan and implement new network services in a new building. This project is being implemented using Cisco Packet Tracer. A person who studies computer networking and technology gains knowledge of several subjects, such as IP address configuration, topology design, and data transmission.

References

Okyere-Dankwa, S., & Mensah Sitti, A. A. (2023). Managing the cost of computer network.

Abubakar, A. H. A., Muhammad, A., & Mohammed, K. (2020). CST4500: Computer Network And Internetworking.

He, X. (2021, August). Research on Computer Network Security Problems and Countermeasures. In Journal of Physics: Conference Series (Vol. 1992, No. 3, p. 032069). IOP Publishing.

Durresi, A., & Denko, M. (2009). Advances in wireless networks. Mobile Information Systems, 5(1), 1-3.

Sudhanva Manjunath, Athreya Abhay Pratap Singh, Naveen Chandra Gowda, Yerriswamy T, & Veena H N. (2023). Machine Learning Techniques to Detect DDoS Attacks in IoT’s, SDN’s: A Comprehensive Overview. International Journal of Human Computations & Intelligence, 2(4), 203–211. https://doi.org/10.5281/zenodo.8027034

Samuel D Jonathan, Jonathan S Paul, Naveen Chandra Gowda, Ambika B J, & Kiran Kumar P N. (2023). Comparative Analysis of Cryptographic Algorithms. International Journal of Human Computations & Intelligence, 2(5), 212–219. https://doi.org/10.5281/zenodo.8068102

Chatzoglou, E., Kambourakis, G., & Kolias, C. (2021). Empirical evaluation of attacks against IEEE 802.11 enterprise networks: The AWID3 dataset. IEEE Access, 9, 34188-34205.

Verma, C., Hart, M., Bhatkar, S., Parker-Wood, A., & Dey, S. (2015). Improving scalability of personalized recommendation systems for enterprise knowledge workers. IEEE Access, 4, 204-215.

Chkirbene, Z., Hamila, R., Al-Dweik, A., & Khattab, T. (2023). Advancing Data Center Networks: A Focus on Energy and Cost Efficiency. IEEE Access.

Naveen Chandra Gowda, Harshith Savanth K, Sagar Shaw, & Tharun Deepika M. (2023). Digital Signatures in Digital Communications: A Review. International Journal of Computational Learning & Intelligence, 2(2), 76–86. https://doi.org/10.5281/zenodo.7920995

Downloads

Published

2024-10-15

How to Cite

Sanjana Rai B S, Kushal T, Shashank B N, Rohan T R, & Naveen Chandra Gowda. (2024). Enterprise Network Design and Implementation. International Journal of Human Computations & Intelligence, 3(3), 334–341. https://doi.org/10.5281/zenodo.13933408