Preview

It242 - Vlan

Good Essays
Open Document
Open Document
488 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It242 - Vlan
VLAN

IT/242

VLAN
Virtual Local Area Networks (VLAN) are beneficial because they improve security and bandwidth consumption. The call center has expanded taking up space on other floors causing part of the Engineering department and the Operations department to move offsite. All of the departments still need to be connected so that their data is still accessible to each other despite the expansion. A VLAN will allow these employees to continue to connectivity with their groups and any shared services and security from the physical LAN. Members will have the freedom to move from one group or area to another with the help from software versus having to physically move workstations, wires, or any other devices.
Originally, the traditional methods of a LAN were used because each department was separated on different floors. Since, the call center employees have moved to the other floors occupied by the other departments, security issues could be likely to arise as well as bandwidth issues. This can happen because now all the departments can see the call center’s transmissions as well as the transmissions from the other departments that have moved offsite. By implementing a VLAN, different domains can avoid bandwidth consumption because the network is split into different segments and then divided into different groups; every group or department will have its own segment, which will greatly reduce the bandwidth consumption. Creating group permissions will ensure that department will only be able to access the information that they have access to, reducing security issues.
A port assigned VLAN membership should be used. Administrators can easily change configurations by using the port assigned protocol. A layer 3 flow-based switch would be used because of its enhanced performance. The switch can identify flow of IP packets that have the same source and destination and create a predefined route, which increases processing speeds. According to



References: Orbit-Computer Solutions.com. (2012). VLAN Trunking.. Retrieved from http://www.orbit-computer-solutions.com/VLAN-Trunking.php Shinder, D. (2005, July 12). Scaling your network with VLANs. Retrieved from http://www.techrepublic.com/article/scaling-your-network-with-vlans/5779489 Stallings, W. (2009). Business Data Communications (6th ed.). : Prentice Hall.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It240 Lan Topologies

    • 268 Words
    • 2 Pages

    12. Your network consists of a 24-port bridge, two servers, and 15 workstations. Each computer interfaces with the bridge using its own segment of CAT 5 twisted-pair cable, which is terminated at both ends with RJ-45 connectors. What type of physical topology do you have?…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The benefits of creating a Virtual Local Area Network (VLAN) are numerous and include such things as less bandwidth consumption, greater security, and the ability for users to be in different geographical locations while still sharing resources. One plan to segment the network is to divide it into broadcast domains, reducing network congestion and also increasing security. The network will be segmented according to group functions. For instance, the engineering department will have one segment, the call center will have another segment, operations will have another segment, and the marketing department will have another segment.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    With the current application of 802.11b wireless solution Highbrow Ed is using, hot spots are inefficient for application delivery, and to manage the bandwidth they will need for the collaboration and expansion required in the future. An upgrade to an optimized Wireless LAN (WLAN) architecture will solve all of their business needs.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    VLAN has a great deal of functionality to networks. They are created mainly for separating the network in to separate broadcast each representing separate functionalities or physical locations within an organization.…

    • 682 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Voice over Internet Protocol (VoIP) will support the telecommunication needs of the company. VoIP will reduce costs by eliminating any long distance…

    • 1121 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The best network design to ensure the security of Corporation Techs internal access while retaining public Web site availability consists of several layers of defense in order to protect the corporation’s data and provide accessibility to employees and the public.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    lasb 8 IS3220

    • 390 Words
    • 2 Pages

    5. If the organization implemented wireless LAN (WLAN) technology, what would you recommend regarding the use of VPNs or encryption within the…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NETW410 Week 5 Lab Report

    • 297 Words
    • 2 Pages

    The internal network will use private ip addresses, while the external network will use a public ip addressing scheme. The modems for all sites will use static public ip addresses. This will help to keep the ip address the same at each site and to make it possible to for the sites to connect to one another. All of the computers attached to the network will be using dynamic ip addresses in which will be automatically obtained based on availability. Any networked printers should have dhcp reservations created within the network to hold that ip address and prevent any other devices from obtaining this same ip address. Instructor’s computers will have their own separate vlan to prevent students from accessing sensitive information. The wireless access points will have ip ranges assigned to each type of network, the guest network and student network will be on their own respective vlans. Each device on both of these vlans will automatically obtain an ip address. The internal servers will also be on separate vlans, and will be assigned static private ips. This will make the resources easily accessible. The student portal is being used on the internet through an external website; this will use a public ip address in which will be statically provided by the host.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Activity 1

    • 667 Words
    • 3 Pages

    Although the freedom to roam the facility and always be connected to the LAN can be a great advantage for network users, the amount of support needed to manage the system and users is much higher than that required by a wired network. Due to the broadcasting nature of a wireless system, security is an important concern and provisions should be made for guest / unauthorized users to use the system in a limited and controlled way. Additional support by the IT Team is often required to configure a user to use the wireless network, to ensure the wide variety of hardware will work with the College’s wireless system, and to provide Help Desk support for wireless…

    • 667 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    6. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs departmental folders, and data.…

    • 368 Words
    • 2 Pages
    Good Essays
  • Good Essays

    4. You have just started a new business. You need to have three to four workstations available for your…

    • 1887 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    VLAN Technology

    • 1717 Words
    • 7 Pages

    VLAN's also allow broadcast domains to be defined without using routers. Bridging software is used instead to define which workstations are to be included in the broadcast domain. Routers would only have to be used to communicate between two VLAN's.…

    • 1717 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Vlan

    • 4398 Words
    • 18 Pages

    This is to certify that the project entitled “VIRTUAL LAN” has been carried out by PRIYAMVADA V. HALBE under my guidance in partial fulfillment of the degree of Bachelor of Engineering in Computer Engineering of North Maharashtra University, Jalgaon during the academic year 2009-2010. To the best of my knowledge and belief this work has not been submitted elsewhere for the award of any other degree.…

    • 4398 Words
    • 18 Pages
    Better Essays
  • Satisfactory Essays

    Daily Time Record

    • 1587 Words
    • 7 Pages

    Configuration of the site used by the call center trainees; Discussion about the parts of a CPU, IP address and MAC address…

    • 1587 Words
    • 7 Pages
    Satisfactory Essays

Related Topics