Free Essay

Vlan

In:

Submitted By br34kin
Words 532
Pages 3
Assignment: VLAN

By creating a Virtual Local Area Network (VLAN) for this company it would best fit their needs. Because the benefits of a VLAN are numerous, this would include decreased bandwidth usage, increased security and separation of location. Where the member user of a VLAN they do not have to be in the same location to be able to share resources. To reduce the network congestion it will be split logically into broadcast domains, this will increase to security. Then the different section of the network will be divided by the group functions which would include Marketing, engineering, operation and the call center each department will have their own section.

By splitting the network in sections for each department, it will make the network more secure through compartmentalization. The segments will be logically divided from the rest of the network, access then can be restricted between the segments. By controlling access to indivual segments is going to be the best way of better security, this is going to be accomplished by creating user groups for each of the different segments. By creating a VLAN this will ensure the Marketing department will have access to the resources needed. This will also apply to the other departments and it will provide the security around the data that needs to be protected.

By going with a Port assigned based VLAN the different groups are used to facilitate any future reorganization of the physical network layout will made easier. By choosing this option it will allow for centralized administration for the network and users of the network. Which in the case the relocation of offices and space are needed could be accomplished with out any regard of the network or resources needed. By using the layer 3 switches it will give a greater control over the network, and also user assignment in the VLAN membership. The layer 2 switch would meet the requirements of the VLAN , membership of personnel and security on the other hand it would not give an efficient control of the network or speed of network operations. Using the IEEE 802.1Q trunking protocol on this network will help in reducing the dependency on a single vendor for the hardware used, because this protocol is not proprietary. This also will allow for a more cost effective expansion in the future. By going with the VLAN trunking protocol (VTP) it will increase the efficiency and speed of the network it will also automate administration of the VLAN, which will reduce the administrative cost required. This will also increase the scalability of the network so that it can accommodate any future needs of the company. By using the VTP, switches should be configured in one of two ways, with at least one VTP server and a client VTP. A VTP server mode will administer the VTP and the VLAN, with changes they have to be made through the VTP server mode. The network is best to have a physical layout in a star topology in case there is a problem with the VLAN this way while there is a fault the network can still function while the VLAN and VTP are reconfigured or repaired.

Similar Documents

Free Essay

Vlan

...VLAN - Benefits and Limitations Introduction The purpose of this walkthrough is to provide a better understanding of Virtual Local Area Networks and their use in the networking world. In the following sections, I will define a VLAN and describe its benefits as well as some limitations. I will explain why it is important for a network administrator to understand VLANs, and give some basic instructions to determine how many VLANs a department would typically need. Finally, contact information will be provided for any additional questions you might have. Use of this information will be used to determine a department's VLAN needs. If VLANs are well thought out in advance, the need to readdress devices and modify VLAN configurations more than once will not become an issue. This will save everyone involved a great deal of effort and minimize the amount of changes that will be needed. What is a VLAN? Virtual LANs can be viewed as a group of devices on different LAN segments which can communicate with each other as if they were all on the same physical LAN segment. Switches using VLANs create the same division of the network into separate domains but do not have the latency problems of a router. Switches are also a more cost-effective solution. By now you are probably wondering why someone would go to all this work to end up with what appears to be the same network as the original one. In many instances, LANs have been grouped with physical location being the primary...

Words: 791 - Pages: 4

Free Essay

Vlan

...VLAN When setting up a VLAN you have to look at the benefit of having a VLAN. The benefits of creating a VLAN are flexibility, performance improvement, and savings on cost. With flexibility you can move users to new locations without reconfiguring the system. The VLAN improves performance by segmenting broadcast traffic into port groupings, this helps to preserve network bandwidth and save processor time. The last benefit is cost savings; VLANs will eliminate the need to use routers to partition LANs into multiple broadcast domains, thus reducing hardware costs. Let’s look at the security aspect of a VLAN; one way to improve security with the VLAN is by isolating groups. High-security users can be grouped into a VLAN, possibly on the same segment, and no users outside that VLAN can communicate with those users. Using a VLAN membership that is port assigned based will be used to help future reorganization of the physical layout of the network. This will help if there is relocation or reallocation since there will be a centralized administration of the network and the users of the network. This choice will provide for simpler administration than MAC address, User ID, or Network address VLAN membership when it comes to the placement and changing the personnel assignment of the groups (Regan, 2004). Now let’s talk about layers. You would think that since VLANs are created on Layer 2 switches that this would be the best layer to utilize, but using the layer 3 switch offers...

Words: 638 - Pages: 3

Free Essay

Medium Network Design

...Universidad Interamericana, Recinto de Guayama | Diseño de una Red Mediana | | Luis Lugo 16 de enero de 2013 | Introducción En este trabajo estaré diseñando una red mediana para un colegio técnico el cual contiene pocos estudiantes. Este diseño usa conmutadores en las capas 2 y 3 proveyendo servicios a usuarios y a la misma vez seguridad para toda la red. La organización tiene alrededor de 700 usuarios y existen diferentes dominios dentro de esta red. Diseño Este diseño debe tener varios requerimientos específicos para poder completar lo que es una red mediana segura. Uno de estos requerimientos y el mayor de estos es que la red debe de proveer conectividad para tres servidores y alrededor de 700 clientes. De la misma manera, la red va a permitir que si en alguna ocasión alguno de estos equipos necesita separarse el otro, esto sea posible. En esta red otro de los requerimientos importantes es el de evitar ataques, ya que como la red va a estar comunicándose entre dos edificios, esta es más susceptible a ataques que provengan de afuera. El centro o “core” de esta red es un solo conmutador de capa 3 con interfaz de “Ethernet” este conmutador “core” le provee los servicios de índole de ambas capas (2 y 3) hacia los equipos necesarios. La red tiene 4 sub redes diferentes, una de estas es para los servidores, otra para los clientes, otra para el sistema de red inalámbrico y la última para la administración. Se diseñó un NDIS para monitorear...

Words: 1290 - Pages: 6

Free Essay

Redes

...CURSO: Management Information Systems Investigar el concepto de redes de computadoras y sus diferentes tipos. Una red de computadoras, también llamada red de ordenadores, red de comunicaciones de datos o red informática, es un conjunto de equipos informáticos y software conectados entre sí por medio de dispositivos físicos que envían y reciben impulsos eléctricos, ondas electromagnéticas o cualquier otro medio para el transporte de datos, con la finalidad de compartir información, recursos y ofrecer servicios. Las redes se clasifican en 2 categorías por alcance y por conexión: Por alcance: • Una red de área local (LAN) se refiere a un grupo de dispositivos interconectados que se encuentran bajo el mismo control administrativo. • La red área metropolitana (MAN) es una red formada por un conjunto de redes LAN en las que se conectan equipos • Las redes de área extensa (WAN) constituyen redes que conectan redes LAN en ubicaciones que se encuentran geográficamente separadas. Internet es el ejemplo más común de una WAN • Red de área personal, o PAN (Personal Area Network), es una red de ordenadores usada para la comunicación entre los dispositivos de la computadora cerca de una persona. • WPAN (Wireless Personal Area Network), es una red de computadoras inalámbrica para la comunicación entre distintos dispositivos (tanto computadoras, puntos de acceso a internet, teléfonos celulares, PDA, dispositivos de audio, impresoras) cercanos al punto de acceso. Estas redes normalmente son de...

Words: 2428 - Pages: 10

Free Essay

Creating Vlans

...Creating Vlans, first determine the ports range for each vlan? If 3 vlans are to be created: >> A Switch has ports from fa0/1 to fa0/24 >> Assign port ranges to each vlan: 1. Vlan 10 has fa0/2-7 (suppose net-id is: 10.0.0.0) 2. Vlan 20 has fa0/8-12 (suppose net-id is: 20.0.0.0) 3. Vlan 30 has fa0/13-18 (suppose net-id is: 30.0.0.0) >> Reserve fa0/1 for switch-to-router connection and fa0/24 for switch-to-switch connection. Set trunk mode to both these ports early on: * Go to the switch. * Go in Enable mode and Configuration Terminal. * Write for both reserved ports the following: * Int fa0/1 * Switchport mode trunk * Exit * Int fa0/24 * Switchport mode trunk * Exit >> Now create vlan on the switch: * In switch’s config terminal * Write vlan <vlan id> in this case we have vlan 10 * Do the following: * Vlan 10 * Name HR * Vlan 20 * Name admin * Vlan 30 * Name office >> Once the vlan ids are created. It is time to set their interfaces for the port ranges we just mentioned at the top. * Inside switch’s config terminal * Write int range fa0/2-7 (in this case for vlan 10). Do the following * Int range fa0/2-7 * Switchport mode access * Switchport access vlan 10 * Exit * Int range fa0/8-12 * Switchport mode access * Switchport access vlan 20 * Exit * Int...

Words: 642 - Pages: 3

Premium Essay

It/244 Assignment: Vlan

...Assignment: VLAN IT/242 January 19, 2012 Instructor: Dr. Jimmie Flores Assignment: VLAN VLAN short for Virtual Local Area Network is a new LAN technology that allows addition of a cost effective network that does not compromise security or performance of the network. VLAN is defined as “a switched network that is logically segmented on an organizational basis; either by functions, project teams, or applications rather than on a physical or geographical basis” (Regan, (2004)). Using VLAN’s are excellent for organizations with multiple departments since VLAN can be created for the specific needs of each department even ignoring the need of a central physical location. “A VLAN can be thought of as a broadcast domain that exists within a defined set of switches” (Regan, (2004)). Switches are nowadays more economical in price so organizations are replacing older hubed networks with switched networks designed for using VLAN’s. VLAN’s are able to divide and isolate a network into different broadcast domains. According to Regan, (2004) VLAN’s are basically a bridge domain that has all broadcast traffic isolated and contained within the VLAN. VLAN’s also provides complete and total isolation from other VLAN’s. Security is also improved by using VLAN’s since they are able to isolate groups. Users are not able to physically connect to a VLAN so access can’t be gained from just plugging into the switch (Regan, (2004)). Servers also can be assigned to multiple...

Words: 740 - Pages: 3

Free Essay

It 242 Week 4 Vlan

...VLAN Student Name IT 242 January 30, 2011 VLAN Virtual Local Area Network (VLAN) is one of the latest network technologies that has been created in the past several years. The technology for VLAN is growing rapidly as well as the costs of the equipment used to implement the secure network that is often considered expensive. Virtual Local Area Networks were born out of the need for a cost effective network that did not compromise the need for high security and performance so the VLAN met all the requirements for the special network (Regan, 2004). The VLAN offers a great deal of functionality for any network as it was created to separated the network into separate broadcast while still allowing each network to still function in the different locations. An example of this process is if a business has different departments such as Operations, Sales, and Human Resources. The VLANs are implements specifically for each department making it an individual network within the business. When implementing a VLAN, it is important to know that to create the VLAN there is a need for layer 2 switch. One common misconception regarding VLANs is that there is a need to install separate software in order to implement the VLAN within the network. The fact is VLANs need special hardware that is built into the switch, which implements a separate network of the main network. Depending on what the network’s security policies and infrastructure, VLANs assignment can be implemented using one...

Words: 688 - Pages: 3

Premium Essay

E Switching Lab Ccna

... | |S2 |VLAN 99 |172.17.99.12 |255.255.255.0 |N/A | |S3 |VLAN 99 |172.17.99.13 |255.255.255.0 |N/A | |PC1 |NIC |172.17.10.1 |255.255.255.0 | | |PC2 |NIC |172.17.20.1 |255.255.255.0 | | |PC3 |NIC |172.17.30.1 |255.255.255.0 | | |PC4 |NIC |172.17.10.2 |255.255.255.0 | | |PC5 |NIC |172.17.20.2 |255.255.255.0 | | |PC6 |NIC |172.17.30.2 |255.255.255.0 | | Port Assignments (Switches 2 and 3) |Ports |Assignment |Network | |Fa0/1 – 0/5 |802.1q Trunks | | |Fa0/11 – 0/17 |VLAN 10 – engineering ...

Words: 1364 - Pages: 6

Premium Essay

Ios Commands

...|Chapter |Task |Commands | |11.02: Command-Line Interface |Privilege EXCE Mode (Enable & Disable)|IOS> enable | |(CLI) | |IOS# | | | | | | | |IOS# disable | | | |IOS> | | |Login Out |IOS# logout | | | |-or- | | | |IOS# exit | |11.03: IOS Basics |Context-Sensitive Help |Router> ? | | | | | | | |Router#...

Words: 2715 - Pages: 11

Premium Essay

Ccna

...CISCO 640-802 Cisco Certified Network Associate 251 Q&A Looking for Real Exam Questions for IT Certification Exams! We guarantee you can pass any IT certification exam at your first attempt with just 10-12 hours study of our guides. Our study guides contain actual exam questions, you will get word to word same on your actual test; accurate answers with detailed explanation verified by experts and all graphics and drag-n-drop exhibits shown just as on the real test. To test the quality of our guides, you can download the one-fourth portion of any guide from http://www.certificationking.com absolutely free. Besides, we also offer complete version of following exams absolutely free. You can start your certification from these free guides and if you are satisfied you can buy the rest ♦ Microsoft: 70-270, 70-305, 70-526, MB2-421 ♦ Cisco 642-901, 642-502, 642-425 ♦ Oracle: 1Z0-001, 1Z0-007, 1Z0-040, 1Z0-200 ♦ Novell: 50-676, 50-565 ♦ Adobe: 9A0-019 ♦ Apple: 9L0-004, 9L0-505, 9L0-606 ♦ 3COM: 3M0-211 ♦ Citrix: 1Y0-223, 1Y0-256 ♦ CIW: 1D0-420 ♦ EMC: E20-001 ♦ Enterasys: 2B0-011 ♦ Exam Express: EE0-011 ♦ Foundry: FN0-100 ♦ Hyperion: 4H0-002 ♦ HP: HP0-045, HP0-052, HP0-055, HP0-090, HP0-216, HP0-417 ♦ Juniper: JN0-120, JN0-330 ♦ Lotus: 190-510 ♦ Network Appliances: NS0-121 ♦ Network General: 1T6-520 ♦ Nortel: 920-430, 920-803 ♦ OMG: UM0-100 ♦ Sybase: 510-015 ♦ SAIR: 3X0-101, 201 ♦ SAS: A00-201 ♦ Tibco: TB0-103 ….. For pricing and placing order, please visit http://certificationking...

Words: 5081 - Pages: 21

Premium Essay

Vtp Questions and Answers

...bits in the incoming frame are received. This does not allow the switch to discard frames that fail the FCS check. B. This is also same as A. But Switch waits 64 bytes to be received before forwarding the first bytes of the outgoing frame. Collisions may occur during first 64 bytes of the frame. Frames in error due to collision will not be forwarded. The FCS still cannot be checked. C,E,F : They are not related to Switch mode transport. QUESTION NO: 107 Which protocol admin overhead in a switch network by allowing the configuring of a new VLAN to be distributed to all the switches in a domain? A. STP B. VTP C. GVRP D. SNMP E. DHCP Answer: B Explanation : Sybex CCNA Study Guide 4th Edition (Page 359) ” The basic goals of VLAN Trunking Protocol (VTP) are to manage all configured VLANs across a switched internetwork and to maintain consistency throughout that network. VTP allows an administrator to add, delete, and rename VLANs—information that is then propagated to all other switches in the VTP domain.” QUESTION NO: 109 Which of the...

Words: 1609 - Pages: 7

Free Essay

Netw206

...Assessment on the Network’s Health Grading Rubric Categories Points and Grading Content Points and Grading Content Points and Grading Content Points and Grading Content Content and Terminal Course Objective 20 The network report contains the TCO with extensive detail for the network VLAN configuration. 15 The network report contains the TCO with basic detail regarding the network VLAN configuration. 10 The network report contains the TCO with limited detail regarding the network VLAN configuration. 5 The network report contains the TCO with little to no parts covered on the network VLAN configuration. Creativity 10 The network report has creative details and descriptions using the student’s own determination, experience, or knowledge to meet network requirements. 8 The network report has few creative details and descriptions using the student’s own determination, experience, or knowledge to meet network requirements. 6 The network report has one creative detail and descriptions using the student’s own determination, experience, or knowledge to meet network requirements. 4 The network report contains no creative details and descriptions using the student’s own determination, experience, or knowledge to meet network requirements. Grammar and Punctuation 5 The network report contains fewer than two grammatical errors. 4 The network report contains fewer than four grammatical errors. 3 The network report contains fewer than six grammatical errors....

Words: 828 - Pages: 4

Premium Essay

Vlan Virtual Local Area Network

...VLAN Virtual Local Area Network Introduction: A VLAN (Virtual Local Network) is a network of computers that behave as though they are connected to the same wire even though physically they may be located on different segments of the LAN. VLAN are configured through software rather than hardware. This is a big advantage to VLAN because that makes it flexible and when moved physically it can stay on the same VLAN without any hardware configuration. (http://www.webopedia.com) A VLAN has three major functions: 1. Limited the size of broadcast domains. 2. Improves network performance. 3. Provides a level of security. VLAN Switched Port and Configuration: Using a switched VLAN will allow you to create groups of logically network devices that act as though they are on their own independent network. And this includes if they share a common infrastructure with other VLANs. When you configure a VLAN, you must sign it a number ID and you also have the option of name it. The purpose of VLAN implementations is to associate ports with particular VLANs. You configure the port to forward a frame to a specific VLAN. A port can be configured to support these VLAN types: Static VLAN, Dynamic VLAN, and, Voice VLAN. (http://www.orbit-computer-solutions.com) VLAN Trunking: VLAN trunking enables the movement of traffic to different parts of the network configured in a VLAN. A trunk is a point-to-point link between...

Words: 572 - Pages: 3

Premium Essay

Ccna 3 Pt Lab Manual

...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: LAN Switching and Wireless course as part of an official Cisco Networking Academy Program. PT Activity 1.2.4: Build a Hierarchical Topology Topology Diagram Learning Objectives • • Add devices to a topology. Connect the devices. Introduction Packet Tracer is integrated throughout this course. You must know how to navigate the Packet Tracer environment to complete this course. Use the tutorials if you need a review of Packet Tracer fundamentals. The tutorials are located in the Packet Tracer Help menu. This activity focuses on building a hierarchical topology, from the core to the distribution and access layers. All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3 CCNA Exploration LAN Switching and Wireless: LAN Design PT Activity 1.2.4: Build a Hierarchical Topology Task 1: Add Devices to the Topology Step 1. Add the missing distribution layer routers. The routers you need are located in Custom Made Devices. R1 and R3 are 1841 routers. Ctrl-click the 1841 router to add more than one. Press ESC to cancel. R2 is a 2621XM router. Step 2. Add the remaining access layer switches. Following the topology diagram, add nine 2960-24TT switches to complete the rest of the access...

Words: 48601 - Pages: 195

Premium Essay

206 Quizzes

...206 quizes Grading Summary These are the automatically computed results of your exam. Grades for essay questions, and comments from your instructor, are in the "Details" section below. | Date Taken: | 11/9/2012 | Time Spent: | 13 min , 51 secs | Points Received: | 25 / 50  (50%) | | Question Type: | # Of Questions: | # Correct: | Multiple Choice | 10 | 5 | | | Grade Details - All Questions |  1. | Question : | (TCO 1) Classifying and prioritizing traffic based on type of data. | |   | Student Answer: | |  Quality of Service (QoS) |   | | |  Redundancy |   | | |  Scalability |   | | |  VLANs |   | Instructor Explanation: | Chapter 1 | | |   | Points Received: | 0 of 5 |   | Comments: | | | |  2. | Question : | (TCO 1) What options are available for switching hardware? | |   | Student Answer: | |  Modular, fixed, stack |   | | |  Fixed, daisy-chained, trunked |   | | |  Isolated, modular, stack |   | | |  Modular, fixed, dynamic |   | Instructor Explanation: | Chapter 1 | | |   | Points Received: | 5 of 5 |   | Comments: | | | |  3. | Question : | (TCO 1) At what layer(s) of the hierarchical model would you typically find Cisco’s 6500 series chassis? | |   | Student Answer: | |  Access |   | | |  Core |   | | |  C & D |   | | |  Distribution |   | Instructor Explanation: | Chapter 1 | | |   | Points Received: | 0 of 5 |   | Comments: | | ...

Words: 1498 - Pages: 6