Premium Essay

Virtual Lan

In:

Submitted By sanjayshah
Words 7303
Pages 30
SPECIAL TOPICS

Special Topics:Resilient Packet Ring

Resilient Packet Ring (RPR) - a Flexible Data Access Technology for Metropolitan Area Networks
Steven S. Gorshe Principal Engineer - PMC-Sierra, Inc. steve_gorshe@pmc-sierra.com

ABSTRACT
IEEE 802.17 Resilient Packet Ring (RPR) is a promising new technology that was standardized to meet the needs of telecommunications network providers and enterprise data networks. RPR allows substantial reuse of the valuable existing telecommunications infrastructure, while also allowing a greatly simplified means of aggregating packetized data from many customers into the provider’s access and metro networks. The RPR fairness protocol and algorithm insures fair medium access among an RPR’s users. RPR also provides the high reliability that has become increasingly important for enterprise network users. This paper reviews the key aspects of RPR, including medium access control and its fairness mechanism, physical layer options, protection/restoration options, and bridging and routing within and across an RPR.

INTRODUCTION
The increasing importance and bandwidth demands of enterprise networks in the 1990s generated the desire for a new metropolitan area network (MAN) and wide area network (WAN) protocol. From a data network perspective, the existing protocols lacked a fast, simple Layer 1 mechanism to recover

from network faults. From a telecommunications network perspective, it was critical to have a network access technique that would allow maximum re-use of the existing SONET/SDH network infrastructure. These needs were the primary drivers behind the development of the Resilient Packet Ring (RPR) protocol in IEEE 802.17, which has recently been approved as a standard [1]. A ring topology was chosen in order to meet the need for robustness with fast recovery from network faults. The topology consists of two

Similar Documents

Free Essay

Is-3120 Lab 6 Question and Answer

...efficient, thanks to 802.1Q trunks E.A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure. F. Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their size. G.VLANs makes it easier for IT staff to configure new logical groups, because the VLANs all belong to the same broadcast domain. 2. What are some drawbacks of implementing VLANs within a network? •Usable bandwidth is shared among all the devices connected to the LAN •ALL devices connected within a LAN can hear ALL the packets irrespective of whether the packet is meant for that device or not. It is possible for some unscrupulous node listening to data packets not meant for that. •Suppose, your organization has different departments. Using a traditional LAN, when any changes take place within the organization, physical cables and devices need to be moved to reorganize the LAN infrastructure. •A LAN cannot extend beyond its physical boundary across a WAN as in VLANs. Management is complex Possible problems in interoperability A VLAN cannot forward traffic to another VLAN (need a router to communicate 802.1D Spanning Tree Protocol (STP) has a drawback of slow convergence. 3. What mode must VTP is set on a switch in order to extend a VLAN definition? The mode is VTP Transparent Mode. The VTP Transparent mode is something between a...

Words: 848 - Pages: 4

Free Essay

Ccna 3 Chapter 1 V5.0 Exam Answers

...promote infrastructure scalability, operational continuity, and transport flexibility. They are service provider switches that aggregate traffic at the edge of the network. They are cloud-managed access switches that enable virtual stacking of switches. They are campus LAN switches that perform the same functions as Cisco 2960 switches. _______________________________________________________________ 3 Which statement describes a characteristic of Cisco Catalyst 2960 switches? They are best used as distribution layer switches. They are modular switches. New Cisco Catalyst 2960-C switches support PoE pass-through. They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x. _______________________________________________________________ 4 What are two functions of a router? (Choose two.) It manages the VLAN database. It increases the size of the broadcast domain. It determines the best path to send packets. It controls the flow of data via the use of Layer 2 addresses. It connects multiple IP networks. _______________________________________________________________ 5 Which technology is required when switched networks are designed to include redundant links? link aggregation virtual private networks virtual LANs Spanning Tree Protocol _______________________________________________________________ 6 What is a characteristic of in-band device management? It is used to monitor and make configuration...

Words: 861 - Pages: 4

Premium Essay

Nt1310 Unit 1 Vlan Research Paper

...The project is the basis of the following theory: VLAN is a logical network, provides logical segmentation of network. Virtual LANs separate layer2 switch into multiple-broadcast domains. Each VLAN is its own individual broadcast domain, i.e. IP subnet. Here groups of ports or individual ports can be assigned to a specific VLAN and Only the ports which are belonging to the same VLAN can freely communicate; ports assigned to separate VLANs require a router to communicate, Broadcasts from one VLAN will never be sent ports belonging to another VLAN. A layer two switch that supports VLAN is not always necessarily a layer three switch, in addition to supporting VLANs, must also be capable of routing, and caching IP traffic flows. Layer 3 switches allows IP packets to be switched as opposed to routed, which reduces latency. VLANS work by handling tags to the network packets creating the functionality and aspect of network traffic, which is physically on one and only one network but acts as...

Words: 783 - Pages: 4

Premium Essay

Nt1310 Unit 3 Assignment 1

...Sub-Objective Name Configure, verify and troubleshoot VLANs Objective Tested Implementing Ethernet Virtual LANs Bloom Level 2 Question Stem Which of the following are the reasons for creating a VLAN? (Choose all that apply) Options (A) To reduce the the number of devices receiving a broadcast frame. (B) To improve security for hosts that send sensitive data by keeping them in a separate VLAN (C) To create separate collision domain (D) To group users from different departments (E) Correct Answer(s) A and B Explanation VLANs are normally implemented to create separate broadcast domains to increase the security and reduce the number of devices receiving a broadcast frame. They are...

Words: 733 - Pages: 3

Free Essay

New 205

...Packet Tracer – Who Hears the Broadcast? Topology Objectives Part 1: Observe Broadcast Traffic in a VLAN Implementation Part 2: Complete Review Questions Scenario In this activity, a 24-port Catalyst 2960 switch is fully populated. All ports are in use. You will observe broadcast traffic in a VLAN implementation and answer some reflection questions. Part 1: Observe Broadcast Traffic in a VLAN Implementation Step 1: Use ping to generate traffic. a. Click PC0 and click the Desktop tab> Command Prompt. b. Enter the ping 192.168.1.8 command. The ping should succeed. Unlike a LAN, a VLAN is a broadcast domain created by switches. Using Packet Tracer Simulation mode, ping the end devices within their own VLAN. Based on your observation, answer the questions in Step 2. Step 2: Generate and examine broadcast traffic. a. Switch to Simulation mode. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2 Packet Tracer - Who Hears the Broadcast? b. Click Edit Filters in the Simulation Panel. Uncheck the Show All/None checkbox. Check the ICMP checkbox. c. Click the Add Complex PDU tool, this is the open envelope icon on the right toolbar. d. Float the mouse cursor over the topology and the pointer changes to an envelope with a plus (+) sign. e. Click PC0 to serve as the source for this test message and the Create Complex PDU dialog window opens. Enter the following values:  Destination IP Address:...

Words: 503 - Pages: 3

Premium Essay

Responding

...you: 1. Prepare an opening statement that specifies your organization’s capabilities to manage a deployment of this size.  2. Graphically depict and effectively promote your company’s structured development and services using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. 3. Explain what the client can expect from your services. Our organization is a small sized network consulting company that specializes in LAN configuration, Inter-LAN routing designing, topology designs, and VLAN configurations.   Our quality team of experts are all CCIE qualified in all the services we can provide for the merger of the two networks.   Many of our consultants are highly rated in the industry.   The following is a partial listing of some of the previous work that we have performed for a variety of enterprises.   We can provide references upon your request.       • We have designed a hierarchical LAN topology.       • For a private network we designed their address scheme.       • We provided additional network security by configuring port security on switches.       • We...

Words: 383 - Pages: 2

Free Essay

Wireless

...TERM PAPER Wireless LAN Security Enabling and Protecting the Enterprise INSIDE INSIDE ∆ Wireless LAN Technology ∆ ∆ ∆ Benefits of Wireless LANs Security Risks and Technical Challenges Recommendations WIRELESS LAN SECURITY Contents Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless LAN Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Benefits of Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Simplified Implementation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Extended Reach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Increased Worker Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Reduced Total Cost of Ownership and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Risks and Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 “Leaky” Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Unapproved Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Exposure of Wireless Devices . . . . . . . . . . . . . . . ....

Words: 2559 - Pages: 11

Free Essay

Networking

...Solution | Healthcare Network Allied Telesis Healthcare Network Construction Guidebook Contents Healthcare Network Solution | Introduction Outline of a Healthcare Network Importance of the network Main requirements in designing a healthcare network Non-stop Network Network bandwidth and QoS (Quality of Service) Data capacity Network bandwidth and cost of LAN devices QoS (Quality of Service) Redundancy and proactive measures to overcome network failures Core switch redundancy Comparison of redundancy of communication Loop protection Secure and Reliable Network Security Importance of security: both physical and human factors Threats to network security Network authentication External network (Internet) connection Inter-regional cooperative healthcare network Effective use of Wireless LAN Security in Wireless LAN Install and operation of Wireless LAN Ease of Operation Critical issues for network operation SNMP (Simple Network Management Protocol) Measures against system failures; device failures, incorrect wiring Use of SNMP IPv6 Network Configuration Example Network configuration for hospitals with fewer than 100 beds Network configuration for hospitals with more than 100 and fewer than 200 beds Network configuration for hospitals with more than 200 beds (i) Network configuration for hospitals with more than 200 beds (ii) 3 4 4 5 7 7 7 8 9 10 10 11 12 13 13 13 14 15 19 20 21 21 22 23 23 24 24 25 26 27 28 30 32 34 2 | Healthcare Network Solution Healthcare Network...

Words: 8999 - Pages: 36

Free Essay

Ankara

...An ISS Technical White Paper Wireless LAN Security 802.11b and Corporate Networks 6303 Barfield Road · Atlanta, GA 30328 Tel: 404.236.2600 · Fax: 404.236.2626 WWireWireless Lan Security 802.11b Wireless LAN Security Introduction Although a variety of wireless network technologies have or will soon reach the general business market, wireless LANs based on the 802.11 standard are the most likely candidate to become widely prevalent in corporate environments. Current 802.11b products operate at 2.4GHz, and deliver up to 11Mbps of bandwidth – comparable to a standard Ethernet wired LAN in performance. An upcoming version called 802.11a moves to a higher frequency range, and promises significantly faster speeds. It is expected to have security concerns similar to 802.11b. This low cost, combined with strong performance and ease of deployment, mean that many departments and individuals already use 802.11b, at home or at work – even if IT staff and security management administrators do not yet recognize wireless LANs as an approved technology. This paper addresses the security concerns raised by both current and upcoming 802.11 network technologies. Wireless LAN Business Drivers Without doubt, wireless LANs have a high gee-whiz factor. They provide always-on network connectivity, but don’t require a network cable. Office workers can roam from meeting to meeting throughout a building, constantly connected to the same network resources enjoyed by wired...

Words: 3757 - Pages: 16

Premium Essay

Determining Databases and Data Communications

...Determining Databases and Data Communications Determining Databases and Data Communications Having a clear understanding of the technologies to implement is an incredible tool for managing companies with computer technology as their primary means of sustainability. This knowledge helps their personnel responsible for information management to make informed decisions about which technology to actually implement. These strategic decisions permit the manager to effectively utilize time and resources in seemingly intimidating tasks. This is shown in both scenarios. In the first scenario a marketing assistant working at a consumer electronics company is tasked with maintaining booths for trade shows from start to finish. In addition that individual is also tasked to resolve any issues related to product shipment that may arise. Knowing what information is to be retained is important in ensuring best tools are used in trade fairs. Situations like these calls for detailed list of displays, equipment, and booths that are necessary and how they are being shipped and retrieved. Let’s say a trade show is to be organized in San Antonio, Texas with a requirement of one booth and display. The marketing assistant must make sure the booth with display is brought to the location in time and taken back for future use to the company. With knowing the delivering postal tracking number, a tab can be kept on the dispatch and retrieval date. Every trade show typically needs certain...

Words: 1031 - Pages: 5

Premium Essay

Cis Guide

...A local area network (LAN): connects two or more devices in a limited geographical region so that every device on the network can communicate with every other device. Connects Pc’s in one building. A wide area network (WAN): is not restricted to a geographical location, although it might be confined within the bounds of a state or country. A WAN connects several LANs, and may be limited to an enterprise (a corporation or an organization) or accessible to the public. It interconnects LAN’s. Analog technologies: information is translated into electric pulses of varying amplitude (waves). Digital technologies translation of information is into binary format (zero or one) where each bit is representative of two distinct amplitudes. Communication and media channels: Twisted pair cable: most prevalent, used almost all business telephone wiring. Copper wires, inexpensive. Slow for transmitting data, subject to interference and easily tapped. Coaxial Cable: insulated copper wires. Less susceptible to electrical interference than twisted and can carry more much data. (TV uses it) more expensive and inflexible Fiber Optics: thousand of filaments of glass fibers that transmit information via light pulses. Surrounded by cladding. More data and security. Transmission Technologies: Digital Subscriber Line (DSL): a high-speed, digital data transmission technology using existing analog telephone lines. Network Protocol: Ethernet: A common LAN protocol A protocol...

Words: 2572 - Pages: 11

Free Essay

Wireless Vulnerabilities

...information system * Administrative - feeble countermeasures in the authoritative methodology that influence the information systems. * Physical - frail countermeasures in the physical design of, and access to, offices and fenced in areas where computerized data frameworks are house. * Personnel - feeble countermeasures in approach, procedure, and methods utilized for security screening of staff having entry to the system. I would like to focus my paper on Wireless Vulnerabilities, because assailants have discovered new parkways to exploit shortcomings in remote systems that, as a rule, have yet to be tended to by associations. There are a few known vulnerabilities that happen for the most part as a result of the very way of the LAN, which utilizes radio frequencies...

Words: 2588 - Pages: 11

Free Essay

Wifi

...Wi-FiFrom Wikipedia, the free encyclopediaJump to: navigation, search For the radio station, see WIFI (AM). Wi-Fi logoWi-Fi ( /ˈwaɪfaɪ/, also spelled Wifi or WiFi) is a popular technology that allows an electronic device to exchange data wirelessly (using radio waves) over a computer network, including high-speed Internet connections. The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards".[1] However, since most modern WLANs are based on these standards, the term "Wi-Fi" is used in general English as a synonym for "WLAN". A device that can use Wi-Fi (such as a personal computer, video game console, smartphone, tablet, or digital audio player) can connect to a network resource such as the Internet via a wireless network access point. Such an access point (or hotspot) has a range of about 20 meters (65 feet) indoors and a greater range outdoors. Hotspot coverage can comprise an area as small as a single room with walls that block radio waves or as large as many square miles — this is achieved by using multiple overlapping access points. "Wi-Fi" is a trademark of the Wi-Fi Alliance and the brand name for products using the IEEE 802.11 family of standards. Only Wi-Fi products that complete Wi-Fi Alliance interoperability certification testing successfully may use the "Wi-Fi CERTIFIED" designation and trademark. Wi-Fi has had a checkered security...

Words: 2476 - Pages: 10

Premium Essay

Test

...Enterprise Setting Daniel Joel Clark A Capstone Presented to the Information Technology College Faculty of Western Governors University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Security Assurance January 9, 2014 1 SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the past thirteen years, and still new articles appear saying similar warnings, with only the solutions evolving...

Words: 18577 - Pages: 75

Premium Essay

Business Networking and Communication

...their own data and applications. C. saves money when software is shared. D. enables data sharing, increasing efficiency and productivity. Answer: B Reference: Basic Network Anatomy Difficulty: Easy Copyright © 2008 Prentice-Hall. All rights reserved. Chapter 8: Networking and Digital Communication 4. All of the following statements are true EXCEPT: A. Wireless networks are convenient. B. Wireless networks are generally slower than wired LANs. C. Wireless networks use radio transmitters. D. Wireless networks are generally faster than wired networks. Answer: D 5. Reference: Networks Near and Far Difficulty: Moderate A(n) ____________ broadcasts messages to all devices connected to a LAN. A. switch B. port C. hub D. node Answer: C 6. Reference: Networks Near and Far Difficulty: Moderate In a local area network, a ____________ only transmits data to the destination node. A. switch B. port C. hub D. router Answer: A 7. Reference: Networks Near and Far Difficulty: Moderate LAN stands for: A. local area nodes. B. logical arrangement of networks. C. local area...

Words: 3749 - Pages: 15