Enterprise Network Design and Implementation
DOI:
https://doi.org/10.5281/zenodo.13933408Keywords:
Cisco Packet Tracer, configuration, enterprise networksAbstract
One kind of network intended for setting up an internet connection on an enterprise setup in a building is an enterprise network module. It acts as the company's cornerstone. The enterprise network's base is provided by the CCNA learning goals. A private or public network's construction requires the proper tools and procedures to ensure its dependability. Networks are important to organizations, especially virtual and wide area networks. In this article, we plan and implement new network services in a new building. This project is being implemented using Cisco Packet Tracer. A person who studies computer networking and technology gains knowledge of several subjects, such as IP address configuration, topology design, and data transmission.References
Okyere-Dankwa, S., & Mensah Sitti, A. A. (2023). Managing the cost of computer network.
Abubakar, A. H. A., Muhammad, A., & Mohammed, K. (2020). CST4500: Computer Network And Internetworking.
He, X. (2021, August). Research on Computer Network Security Problems and Countermeasures. In Journal of Physics: Conference Series (Vol. 1992, No. 3, p. 032069). IOP Publishing.
Durresi, A., & Denko, M. (2009). Advances in wireless networks. Mobile Information Systems, 5(1), 1-3.
Sudhanva Manjunath, Athreya Abhay Pratap Singh, Naveen Chandra Gowda, Yerriswamy T, & Veena H N. (2023). Machine Learning Techniques to Detect DDoS Attacks in IoT’s, SDN’s: A Comprehensive Overview. International Journal of Human Computations & Intelligence, 2(4), 203–211. https://doi.org/10.5281/zenodo.8027034
Samuel D Jonathan, Jonathan S Paul, Naveen Chandra Gowda, Ambika B J, & Kiran Kumar P N. (2023). Comparative Analysis of Cryptographic Algorithms. International Journal of Human Computations & Intelligence, 2(5), 212–219. https://doi.org/10.5281/zenodo.8068102
Chatzoglou, E., Kambourakis, G., & Kolias, C. (2021). Empirical evaluation of attacks against IEEE 802.11 enterprise networks: The AWID3 dataset. IEEE Access, 9, 34188-34205.
Verma, C., Hart, M., Bhatkar, S., Parker-Wood, A., & Dey, S. (2015). Improving scalability of personalized recommendation systems for enterprise knowledge workers. IEEE Access, 4, 204-215.
Chkirbene, Z., Hamila, R., Al-Dweik, A., & Khattab, T. (2023). Advancing Data Center Networks: A Focus on Energy and Cost Efficiency. IEEE Access.
Naveen Chandra Gowda, Harshith Savanth K, Sagar Shaw, & Tharun Deepika M. (2023). Digital Signatures in Digital Communications: A Review. International Journal of Computational Learning & Intelligence, 2(2), 76–86. https://doi.org/10.5281/zenodo.7920995
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Sanjana Rai B S, Kushal T, Shashank B N, Rohan T R, Naveen Chandra Gowda
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.