Preview

Vlan Implementation Plan

Satisfactory Essays
Open Document
Open Document
544 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Vlan Implementation Plan
VLAN Implementation Plan
Axia College

There are many benefits of creating a Virtual Local Area Network such as decreased bandwidth consumption, increased security, and geographical separation which means users of a VLAN do not have to be in the same geographical location to share resources.
A plan to segment the network is that the network will be split into broadcast domains which will reduce network congestion and this will also add to security. The different segments of the network will be divided by group functions, the marketing group will have a segment, the engineering group will have a segment, operations will have their own segment, and the call center will have their own.
The plan to improve security is that each segment will be separated from the rest of the network, so access is restricted form the segment to segment. The best way to increase security is by controlling access to the individual segment by user groups based on the segments of networks. This will ensure that the engineering staff will have the access they need but also anyone else that needs it has access too. The same will apply for the other groups, providing security barriers around the data that needs to be protected.
A Port assigned based VLAN membership will be used to facilitate the ease of future reorganization of the physical layout of the network. This will allow the centralized administration of the network and the user of the network, so that if further relocation of office space is needed, a simple location of the user can be accomplished without regard to the network or the resources that are needed. This option will provide for a simpler administration that MAC addresses, user ID, or Network address VLAN membership when it comes to the placement and the changing the personnel assignment of the groups.
Using Layer 3 switch will provide a greater control if the network, VLAN, and user assignment in VLAN membership. Layer 2 switches could satisfy the requirements

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 5 Assignment 2

    • 1305 Words
    • 4 Pages

    5. A campus LAN drawing shows hundreds of user devices cabled to LAN switches on various…

    • 1305 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The benefits of creating a Virtual Local Area Network (VLAN) are numerous and include such things as less bandwidth consumption, greater security, and the ability for users to be in different geographical locations while still sharing resources. One plan to segment the network is to divide it into broadcast domains, reducing network congestion and also increasing security. The network will be segmented according to group functions. For instance, the engineering department will have one segment, the call center will have another segment, operations will have another segment, and the marketing department will have another segment.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    With the current application of 802.11b wireless solution Highbrow Ed is using, hot spots are inefficient for application delivery, and to manage the bandwidth they will need for the collaboration and expansion required in the future. An upgrade to an optimized Wireless LAN (WLAN) architecture will solve all of their business needs.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    VLAN has a great deal of functionality to networks. They are created mainly for separating the network in to separate broadcast each representing separate functionalities or physical locations within an organization.…

    • 682 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Voice over Internet Protocol (VoIP) will support the telecommunication needs of the company. VoIP will reduce costs by eliminating any long distance…

    • 1121 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Netw410 Week2

    • 716 Words
    • 3 Pages

    The actual business goals for this project is to offer new and better services and support, open the network to key constituents, build relationships and information accessibility to a new level, as a basis for the network organizational model, avoid business disruption caused by network security problems, avoid business disruption caused by natural and unnatural disaster, modernize outdated technologies and reduce telecommunications and network costs, including overhead associated with separate networks for voice, data and video.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    - to provide a means of connecting devices to the network and controlling which ones are allowed.…

    • 688 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    One of the security options that we are going to use is Privacy or confidentiality. This will keep all information secret from all people unless you are authorized to see it. This will help with employee’s not finding things that they should not see like social security numbers, address, and sensitive documents for the company and so on. Having this as a security options is great. I would implement this on all of the networks that I would manage.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NETW410 Week 5 Lab Report

    • 297 Words
    • 2 Pages

    The internal network will use private ip addresses, while the external network will use a public ip addressing scheme. The modems for all sites will use static public ip addresses. This will help to keep the ip address the same at each site and to make it possible to for the sites to connect to one another. All of the computers attached to the network will be using dynamic ip addresses in which will be automatically obtained based on availability. Any networked printers should have dhcp reservations created within the network to hold that ip address and prevent any other devices from obtaining this same ip address. Instructor’s computers will have their own separate vlan to prevent students from accessing sensitive information. The wireless access points will have ip ranges assigned to each type of network, the guest network and student network will be on their own respective vlans. Each device on both of these vlans will automatically obtain an ip address. The internal servers will also be on separate vlans, and will be assigned static private ips. This will make the resources easily accessible. The student portal is being used on the internet through an external website; this will use a public ip address in which will be statically provided by the host.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    The equipment expected to effectively set up the LAN networks at every area are a switch/firewall mix, a modem, remote network interface cards for every workstation, and the cabling important to associate the switch to the modem and the modem to the Internet to secure the WAN association. Servers and their arrangement additionally have influence in keeping networks and information safe. Each bit of equipment and programming are essential in shielding the network and the information from electronic dangers.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    NETW206 W3 Ilab Report

    • 590 Words
    • 3 Pages

    In your own words, summarize what you have learned about configuring expanded switched networks: VLANS and VTP.…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The more time you spend hardening your network, the safer it will be for not only your customers but your employees as well. Your Human Resources department will undoubtedly have confidential personal information on file for every employee. This could include social security numbers, information on dependents, emergency contacts, home addresses and telephone numbers, etc. That information will most likely be stored in an electronic format somewhere on your network. Keeping that information safe and secure from prying eyes should be a…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It241 Appendix B

    • 1021 Words
    • 5 Pages

    1 Why is this technology appropriate for this scenario? Users can access data from either building or any location that is part of the WLAN.…

    • 1021 Words
    • 5 Pages
    Good Essays

Related Topics