Preview

VLAN

Satisfactory Essays
Open Document
Open Document
493 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
VLAN
IT/242
VLAN
July 13, 2014
Lawrence Master

Virtual Local Area Networks is the group of different LAN which can communicate with each other as if they were all located in the same physical segment. VLAN allow us to group the devices into a single domain, which enable us to confine broadcast traffic to devices that needs the access, and also will reduce the traffic on the rest of the network.
The benefits of VLAN are the following:
It will provide us with higher performance.
It will improve our manageability over the network.
It will simplify the software configurations.
It will increase our security options for the network.
To improve the performance in these company, the possible implementation of switches to re-route people straight to the router instead of going through different hubs. In order to reduce the network congestion, we can divide the network logically speaking into broadcast domains which will add security to it. All the departments in the organization will be divided by their group function, given them their own segment.
By having the network divided into four sections, the network will better secure by making each section compartmentalize. We can achieve this by having each section logically separated from the rest which will restrict the access from segment to segment. If we want to increase security on the network, this is the way to do it. In controlling the access to the individuals segment on the company, we can establish users groups based on their required function; allowing the segment to access the information needed and making sure that only those who need it, access it.
The VLAN membership to use could be a port assigned based, this will facilitate the future reorganization of the physical network layout. The type of switch that we can use could be Layer 3. Layer 3 will give us the ability to have a greater control over the LAN, user assignments, and network which Layer 2 will failed to provide us with those benefits.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    A VLAN membership based on port assignment will help to facilitate any future restructuring of the physical layout. This…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    When designing the layout of a LAN, the party can choose from a selection of different technologies on which to base the main part of their LAN. The technology choices that the party adopts will be a critical part in the way their LAN performs. Two important LAN setups are a network based on Ethernet or Token Ring technology. Besides operating in a small space, LANs have some other distinctive features. LANs are typically owned, controlled, and managed by a single person or organization.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Nt1310 Unit 7 Lab 7.1

    • 1302 Words
    • 6 Pages

    Construct a diagram of the most effective structure for the organization's WAN connections and justify your choices.…

    • 1302 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Netw410 Week2

    • 716 Words
    • 3 Pages

    The actual business goals for this project is to offer new and better services and support, open the network to key constituents, build relationships and information accessibility to a new level, as a basis for the network organizational model, avoid business disruption caused by network security problems, avoid business disruption caused by natural and unnatural disaster, modernize outdated technologies and reduce telecommunications and network costs, including overhead associated with separate networks for voice, data and video.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The utilization of networking hardware is used to connect different computers to a server in the case of my company it will be used to connect the different sections within our company. There are many different types of hardware to include bridges, routers, switches, and even networking cards. Our company will use routers, firewalls, and switches. With the routers and firewalls we will protected from threats to a degree by viruses, and attackers. One of the most commonly used is McAfee Antivirus which is the software that I would present to be used as security software. With the routers and firewalls, it will block any unwanted activity coming across the network. The use of the software allows the use of a security firewall that works with the internet firewall increasing our chances of not being attacked or corrupted by viruses, and hackers. It also provides anti-spyware upon the network, indicates safety of websites, and web protection detects and helps rid the network of any spyware, malware, and viruses, phishing and spam when it comes to email, and web usage. Without both networking hardware and software total security cannot exist.…

    • 939 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 users and each user must have different security rights. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    A VLAN-enabled Ethernet network will require several devices to operate correctly. First, switches will need to be connected to the network’s assets and be configured to section them off into the correct VLANs. Cabling will be needed to connect the assets to the switches, switches to each other, and the switches to the router. Routers will be required so the VLANs can communicate with each other and be able to communicate outside the network.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    I would suggest installing a Local Area Network, which will supply networking capabilities to computers in the company. The set up for installation requires a modem and wireless routers to be able to connect all computers to the internet, using Ethernet cables or wireless card connections will allow all computers access to the internet via a broadband connection. Each computer or client will be able to access all necessary information on the network this can be achieved by utilizing file sharing will allowing that company to dictate who has access to what information on the network. I would also suggest printer sharing, which will allow the company to dictate who has access to the printer. I would also utilize TCP/IP Protocols; which are the rules that allow computers to connect to one another and that enable computers and peripheral devices to exchange information.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Networking is everywhere one of the main benefits is that we can share devices such as printers, scanners, CD-ROM drives and many more. Also, we can connect to networks as Meyers (2003, p3) said “one network can be connected to another network and become a more powerful tool because of the great resources”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Network Topology Design

    • 696 Words
    • 3 Pages

    I would also use private network addresses for the advantage of making it easier for the organization to change their internet service provider without having to renumber their IP addresses and for added security. The use of a subnet would work as well. Subnetting will allow a network administrator to divide one physical network into smaller logical networks. It would also control the flow of traffic for security and efficiency. There is not an accurate mechanism that exists for assigning network or subnet number dynamically. The network layer address numbers should be planned well, administered and accurately documented. The benefits of this approach will make the network easy to manage, maintain, troubleshot and isolated to the location as well as scalable (Oppenheimer, p. 169, 2011). Skipping the planning and administering of a structured model approach to the network layer addressing can cause problems such as disorganization, duplicate network addresses, illegal addresses that cause routers to not route to the internet, shortage of addresses (Oppenheimer, p. 168-169, 2011).…

    • 696 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Logical Network Design

    • 719 Words
    • 3 Pages

    When the logical design of a network is planned, an engineer will generally map out the logical layout and addressing of the network. This allows the person to picture the topology of the network and the addressing scheme that will be used amongst the network devices. Information must be gathered about several important factors before the logical design of the network is started. For example, depending on the services that will be provided to users, you may need to analyze the possible traffic patterns that might result from your plan. Locate potential bottlenecks and, where possible, alleviate them by providing multiple paths to resources or by putting up servers that provide replicas of important data so that load balancing can be provided. You need to determine who the clients are and what their actual needs will be. Distinguish between novice and power users. The services that will be provided on the network should also be determined during the logical planning stage. They may be limited by a scope, such as a firewall between LANs. And if so, that still doesn't account for configuring a firewall to enable access to the Internet. You may also need to determine if an Internet connection will be needed for \internal network's users and outside vendor. Will all users need to access email—both within the internal network and through the firewall on the Internet? The same goes for what sites users will be allowed to access using a network browser and other network applications. Will you have…

    • 719 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Abc Company

    • 454 Words
    • 2 Pages

    ABC Company has those given item from Table 1.1 for their network. The topology was compose of 1 server switch, 3 transparent switches, 6 client switches, 15 PC’s (1st,3rdand 5th has 3 units of pc per floor) the rest has only 2 but every floor can accommodate 100 host per floor ,it has also 7 servers (1 TFTP and 6 DHCP servers in every floor) .…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Network Management System

    • 3867 Words
    • 16 Pages

    This refers to layout of a network, how different nodes in the network are connected to each other and how they communicate. Examples of topologies commonly used are:…

    • 3867 Words
    • 16 Pages
    Powerful Essays

Related Topics