Transformation of Network Infrastructure in Educational Environments: A Study Proposal for the Oxford Educational Unit

  • Verónica Pailiacho Mena Pontificia Universidad Católica del Ecuador Sede Ambato
  • Enrique Garcés Freire Pontificia Universidad Católica del Ecuador Sede Ambato
  • Dennis Chicaiza Universidad Técnica de Ambato
  • Francisco Vega Pontificia Universidad Católica del Ecuador Sede Ambato
Keywords: Network redesign, VLANs, Network security, GNS3

Abstract

Nowadays, network infrastructure is the backbone of communication within organizations, and the education sector is no exception. Moreover, it has an added value, since without adequate infrastructure it is not possible to provide access to innovative and educational resources that support the teaching–learning process. This research presents a proposal for a study of the communications network of the Oxford Educational Unit, located in the province of Cotopaxi, Ecuador. The project focused on improving the scalability and security of the existing infrastructure, and the Kanban method was used to organize the activities to be carried out. During the analysis phase, an inventory of active network devices was conducted, determining that the network is flat, with a high volume of broadcast packets, and includes devices operating with factory-default configurations and without any monitoring mechanisms. Therefore, a network redesign is proposed, incorporating key aspects such as compliance with structured cabling standards, network segmentation, implementation of VLANs and Inter-VLAN routing, configuration of security measures (BPDU Guard, Port Security, DHCP Snooping), and additional controls through firewalls and ACLs. A simulation was developed using GNS3 to validate the effectiveness of the proposed design, demonstrating its ability to optimize performance, ensure security, and adapt to the institution’s future growth. Additionally, the proposal was validated by field specialists, achieving 100% satisfaction in criteria such as structure, adaptability, and security.

Downloads

Download data is not yet available.

References

[1] G. Millán Naveas, M. Vargas Guzmán, G. Millán Naveas, y M. Vargas Guzmán, «A flow control algorithm for high-speed computer networks», Ingeniare Rev. Chil. Ing., vol. 28, n.o 1, pp. 24-30, mar. 2020, doi: 10.4067/S0718-33052020000100024.
[2] R. Hajıyeva, N. Rustamov, I. B. Sapaev, y A. Akhmedov, «Computer Network Design Problem», en Applications of Mathematics in Science and Technology, CRC Press, 2025. [En línea]. Disponible en: https://doi.org/10.1201/9781003606659-4
[3] S. A. Guapi Acán, R. C. Oñate López, y S. B. Anilema Mejía, «Estudio de la infraestructura de redes LAN de las instituciones educativas de la ciudad de Riobamba en el año 2021», vol. 9, pp. 508-527, doi: https://doi.org/10.23857/dc.v9i1.3148.
[4] W. Yang, «Design and Implementation of Real-time Computer Network Security Monitoring System», en Proceedings of the 2024 2nd International Conference on Artificial Intelligence, Systems and Network Security, en AISNS ’24. New York, NY, USA: Association for Computing Machinery, mar. 2025, pp. 292-296. doi: 10.1145/3714334.3714383.
[5] A. P. Guimarães, P. R. Martins Maciel, y R. Matias, «Optimization of computer networks design integrating dependability and business aspects», en 2020 IEEE Latin-American Conference on Communications (LATINCOM), nov. 2020, pp. 1-6. doi: 10.1109/LATINCOM50620.2020.9282310.
[6] O. A. Dowins y O. M. Cornelio, «Computer Network Design of the office area of the telecommunications company SERTOD», Fusion Pract. Appl., n.o Issue 1, pp. 26-31, ene. 2021, doi: 10.54216/FPA.060101.
[7] V. Bhuse, «Detecting Rogue Switch and Device Behaviour Using Network Anomalies in LAN», Eur. Conf. Cyber Warf. Secur., vol. 24, pp. 42-51, jun. 2025, doi: 10.34190/eccws.24.1.3705.
[8] «Unidad Educativa Oxford». Accedido: 16 de septiembre de 2025. [En línea]. Disponible en: https://www.oxford.edu.ec/
[9] F. Vega-Tapia y V. Pailiacho-Mena, «Rediseño de la red de comunicaciones de la Unidad Educativa Oxford», 2024, Accedido: 16 de septiembre de 2025. [En línea]. Disponible en: https://repositorio.puce.edu.ec/handle/123456789/44096
[10] N. L. Sowjanya, «An Efficient VLAN Implementation to decrease Traffic Load in a Network», Int. J. Adv. Trends Comput. Sci. Eng., vol. 9, n.o 2, pp. 2147-2153, abr. 2020, doi: 10.30534/ijatcse/2020/189922020.
[11] E. Ariganello, Redes CISCO. Guía de estudio para la certificación CCNA Security.
[12] A. H. Abdi, L. Audah, A. M. Omar, y M. J. Abdiaziz, «Design and Simulation of a Secured Enterprise Network Architecture for All Departments at East Africa University (EAU), Somalia», en 2024 4th International Conference of Science and Information Technology in Smart Administration (ICSINTESA), jul. 2024, pp. 552-557. doi: 10.1109/ICSINTESA62455.2024.10747898.
[13] K. Gallegos y V. Pailiacho-Mena, «Plan de transición de IPV4 a IPV6 en una red LAN», PUCESA. [En línea]. Disponible en: https://repositorio.puce.edu.ec/items/1d8189dd-9f4b-4501-96c9-ab52448a2b71
[14] E. Garcés Freire y V. Pailiacho Mena, Kanban como herramienta de gestión para actividades en grupos de investigación informáticos. 2023. [En línea]. Disponible en: https://www.pucesi.edu.ec/webs2/libros-docentes/2023/libro-ciencia-innovacion-tecnologia.pdf
[15] S. Shafiq y I. Inayat, «Towards Studying the Communication Patterns of Kanban Teams: A Research Design», en 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW), sep. 2017, pp. 303-306. doi: 10.1109/REW.2017.34.
[16] M. A. Calle et al., «Comparación de Parámetros para una Selección Apropiada de Herramientas de Simulación de Redes», Inf. Tecnológica, vol. 29, n.o 6, pp. 253-266, dic. 2018, doi: 10.4067/S0718-07642018000600253.
Published
2026-01-16
How to Cite
Pailiacho Mena, V., Garcés Freire, E., Chicaiza, D., & Vega, F. (2026). Transformation of Network Infrastructure in Educational Environments: A Study Proposal for the Oxford Educational Unit. Ciencias De La Ingeniería Y Aplicadas, 10(1), 147-163. https://doi.org/10.61236/ciya.v10i1.1241
Section
Research article