Skip to content

CodeByPinar/cafe-network-vlan-design

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

1 Commit
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

β˜• Cafe Network VLAN Design (Enterprise-Level Simulation)

πŸ“Œ Overview

This project demonstrates the design and implementation of a segmented enterprise-style cafe network using Cisco Packet Tracer. The network is structured with VLAN segmentation, inter-VLAN routing (Router-on-a-Stick), DHCP services, and a realistic physical topology.

The goal is to simulate a real-world cafe / small enterprise network infrastructure with proper isolation, scalability, and maintainability.


🧠 Network Architecture

πŸ”Ή VLAN Segmentation

VLAN Name Network Purpose
10 Misafir 192.168.10.0/24 Guest users
20 Personel 192.168.20.0/24 Staff devices
30 YΓΆnetim 192.168.30.0/24 Management systems

πŸ”Ή Core Components

  • Router (R1-Kafe) β†’ Inter-VLAN Routing + NAT
  • Switch (SW1-Kafe) β†’ VLAN segmentation + Trunking
  • DHCP Server / Router DHCP β†’ IP distribution
  • Access Point β†’ Wireless extension (optional)
  • End Devices β†’ Clients (PCs & Laptops)

πŸ—ΊοΈ Network Diagram

πŸ“ Logical Topology

Logical Topology

Description:

  • Shows VLAN segmentation and device relationships
  • Router-on-a-stick architecture is clearly visible
  • Core (Router + Switch) and Access layer (clients) separation

πŸ“ Physical Topology

Physical Topology

Description:

  • Represents real-world rack layout
  • Devices are physically organized (Router, Switch, Server)
  • Cabling reflects structured enterprise deployment

πŸ“Έ Key Test Screenshots

πŸ”Ή DHCP Assignment (Guest VLAN)

DHCP Guest

Explanation:

  • Confirms that the guest laptop receives an IP from VLAN 10
  • Validates DHCP pool and VLAN assignment

πŸ”Ή DHCP Assignment (Management VLAN)

DHCP Management

Explanation:

  • Management PC receives correct IP from VLAN 30
  • Confirms segmentation is working correctly

πŸ”Ή Gateway Connectivity Test

Ping Gateway

Explanation:

  • Verifies communication between client and default gateway
  • Ensures Layer 3 reachability

πŸ”Ή Inter-VLAN Routing Test

Inter VLAN

Explanation:

  • Demonstrates successful routing between VLANs
  • Confirms router-on-a-stick configuration

πŸ”Ή Switch Management Access

Switch Ping

Explanation:

  • Validates access to switch management interface (VLAN 30)

πŸ”Ή DHCP Binding Table

DHCP Binding

Explanation:

  • Shows all active DHCP leases
  • Confirms multiple VLAN clients receiving IPs

πŸ”Ή VLAN Configuration Verification

VLAN Config

Explanation:

  • Displays VLAN assignments and port mappings
  • Ensures correct segmentation at Layer 2

πŸ”Ή Trunk Configuration

Trunk Config

Explanation:

  • Confirms trunk link between switch and router
  • Shows allowed VLANs (10,20,30)

βš™οΈ Configuration Details

πŸ”Έ Switch Configuration (SW1-Kafe)

  • VLAN creation
  • Access port assignment
  • Trunk configuration (802.1Q)
vlan 10
 name Misafir
vlan 20
 name Personel
vlan 30
 name Yonetim

interface range fa0/1
 switchport mode access
 switchport access vlan 10

interface range fa0/2-5
 switchport mode access
 switchport access vlan 30

interface range fa0/6-11
 switchport mode access
 switchport access vlan 20

interface gig0/1
 switchport mode trunk

πŸ”Έ Router Configuration (R1-Kafe)

Router-on-a-Stick

interface g0/1.10
 encapsulation dot1Q 10
 ip address 192.168.10.1 255.255.255.0

interface g0/1.20
 encapsulation dot1Q 20
 ip address 192.168.20.1 255.255.255.0

interface g0/1.30
 encapsulation dot1Q 30
 ip address 192.168.30.1 255.255.255.0

πŸ”Έ DHCP Configuration

ip dhcp excluded-address 192.168.10.1 192.168.10.20
ip dhcp excluded-address 192.168.20.1 192.168.20.20
ip dhcp excluded-address 192.168.30.1 192.168.30.20

ip dhcp pool MISAFIR
 network 192.168.10.0 255.255.255.0
 default-router 192.168.10.1
 dns-server 8.8.8.8

ip dhcp pool PERSONEL
 network 192.168.20.0 255.255.255.0
 default-router 192.168.20.1
 dns-server 8.8.8.8

ip dhcp pool YONETIM
 network 192.168.30.0 255.255.255.0
 default-router 192.168.30.1
 dns-server 8.8.8.8

πŸ§ͺ Testing & Validation

The network was validated using multiple test scenarios.

βœ” DHCP Test

  • Clients successfully received IP addresses from correct VLAN pools

βœ” Gateway Connectivity

  • Devices can reach their default gateway

βœ” Inter-VLAN Routing

  • Communication between VLANs verified via ICMP

βœ” Switch Management

  • Switch reachable via management VLAN (VLAN 30)

βœ” Client-to-Client Communication

  • Verified across VLANs (no ACL restriction yet)

πŸ“Έ Test Evidence

All test screenshots are located in:

screenshots/

πŸ“„ Documentation

Detailed installation and configuration guide:

πŸ“„ Kafe Ağ Kurulum Rehberi


πŸš€ Features

  • VLAN-based segmentation
  • Router-on-a-stick architecture
  • DHCP configuration
  • Trunking (802.1Q)
  • Physical & logical topology modeling
  • Scalable design

πŸ”’ Future Improvements

  • ACL implementation (Guest isolation)
  • Firewall simulation
  • Wireless VLAN segmentation
  • Network monitoring (SNMP)

🏁 Conclusion

This project successfully simulates a real-world enterprise network environment, demonstrating strong understanding of:

  • Layer 2 & Layer 3 networking
  • Network segmentation
  • Routing principles
  • Infrastructure design

πŸ‘©β€πŸ’» Author

PΔ±nar Topuz


⭐ If you like this project

Give it a star ⭐ on GitHub!

About

Secure cafe network design using Cisco Packet Tracer with VLAN segmentation, ACL-based isolation, DHCP, NAT, and Wi-Fi security (2026).

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

No contributors