...VLAN Student Name IT 242 January 30, 2011 VLAN Virtual Local Area Network (VLAN) is one of the latest network technologies that has been created in the past several years. The technology for VLAN is growing rapidly as well as the costs of the equipment used to implement the secure network that is often considered expensive. Virtual Local Area Networks were born out of the need for a cost effective network that did not compromise the need for high security and performance so the VLAN met all the requirements for the special network (Regan, 2004). The VLAN offers a great deal of functionality for any network as it was created to separated the network into separate broadcast while still allowing each network to still function in the different locations. An example of this process is if a business has different departments such as Operations, Sales, and Human Resources. The VLANs are implements specifically for each department making it an individual network within the business. When implementing a VLAN, it is important to know that to create the VLAN there is a need for layer 2 switch. One common misconception regarding VLANs is that there is a need to install separate software in order to implement the VLAN within the network. The fact is VLANs need special hardware that is built into the switch, which implements a separate network of the main network. Depending on what the network’s security policies and infrastructure, VLANs assignment can be implemented using one...
Words: 688 - Pages: 3
...Acme Manufacturing Network Plan Ann Johnson IT/242 October 23, 2011 David Edwards Acme Manufacturing Network Plan Acme Manufacturing needs a new network plan implemented for corporate, three distribution centers in Chicago, Phoenix, and New York, and is expecting to expand with a new facility in China. A successful network design provides future growth within the organization. Meetings are scheduled weekly in the main Atlanta Headquarters conference room with the facilities from Phoenix, New York, Chicago, and China attending via telecommunications. The network plan will include the type of cabling needed for each facility, the equipment used to connect the different facilities, and the installation of Voice over IP (VoIP) and Virtual Local Area Networks (VLANs). Security measures are needed including firewalls and a backup plan. The lines required to carry the traffic on the network are leased T1 lines and a satellite connected overseas. T1 leased lines are used for the Atlanta, Phoenix, New York, and Chicago offices. China connects through a satellite service. A Virtual Private Network (VPN) connects wireless users to their designated department through mobile devices. Routers are used to direct communication between LANs and are needed at each department. Voice over IP (VoIP) has opened possibilities for more interactive communication across WAN networks. VoIP bypasses the need of conventional telephone hardware by transmitting voice over the existing data line...
Words: 1193 - Pages: 5
...VLAN (Subclass of VPN) Networks have grown astronomically over the years , and having an extremely big and unsecured network means that many people are able to gain access to any unsecured network and traffic. What companies usually do is that they hide their local networks behind a firewall among other security mechanisms to ensure that they are secure but it is better for companies to let their employees access the company’s resources from outside the local network. VPN stands for Virtual Private Network and is a method of simulating a private network that is operating on top of a larger network like the internet. One VPN sub category is VLAN (Virtual Local Area Network) , which is what I am looking into. VPN construct ranges from Layer...
Words: 455 - Pages: 2
...Network Technology and Service Integration Unit 1 Homework The following homework is designed to cover the course objectives for this unit. Assignment 1.1: Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 3 VLSM Subnetting a Subnet Exercises on pages 9-11 VLSM Addressing Design Scenarios 1-6 on pages 15-20 Summary Route Exercises on pages 21-24 Concept Questions on pages 25-27 VLSM Case Study on page 27 Internet Research on page 29 (Use the ITT Tech Virtual Library.) • Complete Chapter 9 Review Questions 2-7, 10, 14, 20-22 on pages 258-259 of Introduction to Telecommunications. Submit your written answers to your instructor at the beginning of Unit 2. . Assignment 1.2: Virtual Labs • Complete Virtual Labs 6, 7, and 8 from the CCNA 640-802 CCNA Simulator, which you can find by clicking through these paths: ICND1 Troubleshooting Scenarios Lab 6: IP Addressing and Routing. ICND1 Troubleshooting Scenarios ICND1 Part 4: Troubleshooting Labs Lab 7: IP Routing I ICND 2 Troubleshooting Scenarios Lab 13: IP Routing II Submit your written answers to your instructor at the beginning of Unit 2. ©ITT Educational Services, Inc: Date: 03/13/09 Network Technology and Service Integration Unit 2 Homework The following homework is designed to cover the course objectives for this unit. Assignment 2.1: Textbook/Workbook Assignments • Complete the following exercises...
Words: 2825 - Pages: 12
...VLAN Plan Marcus D. Lewis It242 06/19/11 Ms. Latrea Shine The benefits of Creating VLAN VLAN’s enable the logical grouping and of end stations that are physically dispersed through a network. When users on a VLAN move to a new physical location but continue to perform the same job function, the end-stations of those users do not need to be reconfigured. Similarly, if users change their job function, they need not physically move: changing the VLAN membership of the end-stations to that of the new team makes the users' end-stations local to the resources of the new team. Since broadcasts frames are targeted and processed by all devices that create smaller domains to reduce overhead and limit resource utilization. Only those workstations in need of receiving specific broadcast or multicast traffic can exist on the domain, preventing other devices from receiving unnecessary traffic. The use of VLANs to create broadcast domains also eliminates the need for routers to handle this function, permitting operation at lower latencies compared to routers under heavy load. VLAN’s extends beyond conventional or single LAN’s to form a group of LAN’s. A VLAN can be created to provide groups of users who will be transmitting data among themselves at high volume, reducing the impact on all other workstations. These user workstations do not have to be physically moved or located near one another, since the workgroup is virtual environment and created within the switching software...
Words: 1150 - Pages: 5
...VLAN - Benefits and Limitations Introduction The purpose of this walkthrough is to provide a better understanding of Virtual Local Area Networks and their use in the networking world. In the following sections, I will define a VLAN and describe its benefits as well as some limitations. I will explain why it is important for a network administrator to understand VLANs, and give some basic instructions to determine how many VLANs a department would typically need. Finally, contact information will be provided for any additional questions you might have. Use of this information will be used to determine a department's VLAN needs. If VLANs are well thought out in advance, the need to readdress devices and modify VLAN configurations more than once will not become an issue. This will save everyone involved a great deal of effort and minimize the amount of changes that will be needed. What is a VLAN? Virtual LANs can be viewed as a group of devices on different LAN segments which can communicate with each other as if they were all on the same physical LAN segment. Switches using VLANs create the same division of the network into separate domains but do not have the latency problems of a router. Switches are also a more cost-effective solution. By now you are probably wondering why someone would go to all this work to end up with what appears to be the same network as the original one. In many instances, LANs have been grouped with physical location being the primary...
Words: 791 - Pages: 4
...IS3120 Final Project: Network Design Proposal NCIF is an industry leading research and development firm consisting of eight (8) regional offices in seven (7) countries, including the United States, Germany, Africa, India, Australia, Brazil, and China, with eleven(11) district or branch offices, consisting of 225,000 employs worldwide. NCIF resides in Hopkinton, MA (USA). NCIF’s network has been designed in adherence with the latest IEEE 802 series of standards. In keeping with these standards NCIF has installed and configured a Local Area Network (LAN) using the IEEE 802.3 Series of standards and a Wireless LAN (WLAN) using the IEEE 802.11 Series of standards. NCIF’s network architecture consists of a client-server configured Local Area Network (LAN) based on a Gigabit Ethernet Star Topology or 1000 Base-X IEEE 802.3 Standard with Carrier Sense Multiple Access/Collision Detection (CSMA/CD) and a Storage Area Network (SAN), using Category 5e cabling –tested in accordance with ANSI/TIA/EIA-568-B specifications for 1000Mb/s data transfer rates. In order to anticipate future growth and keep network traffic to a minimum, NCIF has configured, one Class B network sub classed into several smaller networks based on department/job function at each regional and remote site – implementing the dynamic host configuration protocol (DHCP) in order to assign each terminal a unique IP Address – separating each department into Zones or Segments designed to mitigate risk management...
Words: 363 - Pages: 2
...implementing VLANs within a network? A. A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure B. Broadcast storms can be mitigated by decreasing the number of broadcast domains, thus increasing their size. C.A higher level of network security can be reached by separating sensitive data traffic from other network traffic. D. Port-based VLANs increase switch-port use efficient, thanks to 802.1Q trunks E.A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure. F. Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their size. G.VLANs makes it easier for IT staff to configure new logical groups, because the VLANs all belong to the same broadcast domain. 2. What are some drawbacks of implementing VLANs within a network? •Usable bandwidth is shared among all the devices connected to the LAN •ALL devices connected within a LAN can hear ALL the packets irrespective of whether the packet is meant for that device or not. It is possible for some unscrupulous node listening to data packets not meant for that. •Suppose, your organization has different departments. Using a traditional LAN, when any changes take place within the organization, physical cables and devices need to be moved to reorganize the LAN infrastructure. •A LAN cannot extend beyond its physical boundary across a WAN as in VLANs. Management...
Words: 848 - Pages: 4
...* Classless routing in a network. * Examples of classless routing protocols are RIPv2, OSPF, IS-IS, EIGRP and BGPv4. The following protocols support the VLSM (variable length subnet mask) and CIDR (Classless inter-domain routing protocol). Classless routing protocols send the subnet mask as well as the network address in the routing update. If I was working for an established or new company that needed a lot of hosts, I would choose classless because you can set the amount of hosts. Unlike classful routing where the amount of hosts are automatically set. For example if you have an IP address of 192.165.1.2 and you need 1024 hosts then your subnet mask would be 255.255.252.0/22 the slash 22 is the CIDR. This says that I borrowed 22 network bits to come up with 1024 hosts. IP classless routing is used to tell the router: To not drop any packet when the default route is configured. Which Means to use classless addressing that is not bound to a network class A, B or C used by Classful routing. * SWITCHING IN ETHERNET (LAN’S) The most common used network is a local-area network (LAN). Ethernet is the most used and often shared-media of an LAN. Most if not all Apple computers and PCs come with 10/100 Ethernet ports for home use. The ports facilitate a user to create a small home bound network although connect to the Internet via a DSL. A 10/100 port means that the network interface supports both 10BASE-T at 10 megabits per second (Mbps) and 100BASE-T at 100 Mbps. In...
Words: 1410 - Pages: 6
...Assignment: VLAN By creating a Virtual Local Area Network (VLAN) for this company it would best fit their needs. Because the benefits of a VLAN are numerous, this would include decreased bandwidth usage, increased security and separation of location. Where the member user of a VLAN they do not have to be in the same location to be able to share resources. To reduce the network congestion it will be split logically into broadcast domains, this will increase to security. Then the different section of the network will be divided by the group functions which would include Marketing, engineering, operation and the call center each department will have their own section. By splitting the network in sections for each department, it will make the network more secure through compartmentalization. The segments will be logically divided from the rest of the network, access then can be restricted between the segments. By controlling access to indivual segments is going to be the best way of better security, this is going to be accomplished by creating user groups for each of the different segments. By creating a VLAN this will ensure the Marketing department will have access to the resources needed. This will also apply to the other departments and it will provide the security around the data that needs to be protected. By going with a Port assigned based VLAN the different groups are used to facilitate any future reorganization of the physical network layout will made easier...
Words: 532 - Pages: 3
...Gabriel Stoecker NT2640/ Thursday Troubleshooting Procedures ITT Institute Virtual Library; Method and System for performing simplified troubleshooting procedures to isolate connectivity problems. “Initializing the proxy client module with the identity of a VLAN on which the client computer is connected and which an IP address of the end station in a network, with the client IP address and client MAC address, the identity of the VLAN and the IP address of the end station provided by a remote computer coupled to the third port of the switch; disabling the first port of the switch; with the proxy client module having a logical interference with the VLAN and utilizing the IP address of the end station in the network. The client IP and client MAC addresses and the identity of VLAN provided by the remote computer to: 1) assign the client IP address + MAC addresses to the logical interface with VLAN 2) Run a sequence of connectivity tests with the end station when the first port is disabled. 3) Reporting the result of the sequence of connectivity to facilitate identification of the reasons packets are being dropped; a) Determining whether the connectivity problem is on the switch or on a link in the switch b) Identify the reason for the packets being dropped c) Identify two features responsible for dropping the packets, such as failure to respond to Address Resolution Protocol (ARP)” How Tracert Works It uses ICMP Internal Control Message Protocol...
Words: 885 - Pages: 4
...Assignment: VLAN IT/242 January 19, 2012 Instructor: Dr. Jimmie Flores Assignment: VLAN VLAN short for Virtual Local Area Network is a new LAN technology that allows addition of a cost effective network that does not compromise security or performance of the network. VLAN is defined as “a switched network that is logically segmented on an organizational basis; either by functions, project teams, or applications rather than on a physical or geographical basis” (Regan, (2004)). Using VLAN’s are excellent for organizations with multiple departments since VLAN can be created for the specific needs of each department even ignoring the need of a central physical location. “A VLAN can be thought of as a broadcast domain that exists within a defined set of switches” (Regan, (2004)). Switches are nowadays more economical in price so organizations are replacing older hubed networks with switched networks designed for using VLAN’s. VLAN’s are able to divide and isolate a network into different broadcast domains. According to Regan, (2004) VLAN’s are basically a bridge domain that has all broadcast traffic isolated and contained within the VLAN. VLAN’s also provides complete and total isolation from other VLAN’s. Security is also improved by using VLAN’s since they are able to isolate groups. Users are not able to physically connect to a VLAN so access can’t be gained from just plugging into the switch (Regan, (2004)). Servers also can be assigned to multiple...
Words: 740 - Pages: 3
...| 2 | VLAN Concept | 3 | Designing VLANS | 4 | The Access & Trunk Links | 5 | VLAN Tagging(- ISL, 802.1q, LANE and IEEE 802.10) | 6 | Analysing Tagging Protocols | 7 | InterVLAN Routing | 8 | Virtual Trunking protocol (vtp) | Introduction Virtual Local Area Networks or VLANs are one of the latest and coolest network technologies developed in the past few years, though have only recently started to gain recognition. The non-stop growth of Local Area Networks (LANs) and the need to minimize the cost for this expensive equipment, without sacrificing network performance and security, created the necessary soil for the VLAN seed to surface and grow into most modern networks. The truth is that VLANs are not as simple as most people peceive it to be. Instead they cover extensive material to be a whole study in itself as they contain a mixture of protocols, rules, and guidelines that a network administrator should be well aware of. Unfortunately, most documentation provided by vendors and other sites is inadequate or very shallow. They lightly touch upon the VLAN topic and fail to give the reader a good understanding on how VLANs really work and the wonderful things one can do when implementing them. Like most topics covered on our site, VLANs have been broken down into a number of pages, each one focusing on specific areas to help the reader build up their knowledge as preparation for designing and building their own VLAN network. Since VLANs is a topic...
Words: 7365 - Pages: 30
...Unit Five Jerrie Gomez Kaplan University Carrier Sense Multiple Access Both protocols listen for transmission, and Difference Between.com. (2011) explains that CSMA/CA is proactive, and CSMA/CD is reactive. Carrier sense multiple access/collision detection (CSMA/CD) is a protocol that deals with collisions after they occur; once a collision is identified, data transmission is stopped, and then retransmitted once listening to the network proves there is not transmitting data. Carrier sense multiple access/collision avoidance (CSMA/CA) works to detect and prevent collisions before they occur; by listening to the network for any traffic. CSMA/CD is an IEEE 802.3 standardization and CSMA/CA is IEEE 802.11, therefore CSMA/CA is better suited for wireless networks. Collision detection (CD) is easily detected on wired networks, which is why collision avoidance (CA) should be used on wireless networks, as wireless access points cannot accurately detect collisions. Price versus Performance Fast ethernet, introduced in 1995, is capable of carrying data at speeds of 100...
Words: 972 - Pages: 4
...Network nodes are not directly aware that switches handle the traffic they send and receive, making switches the silent workhorse of a network. Other than offering an administrative interface, switches do not maintain layer three IP addresses, so hosts cannot send traffic to them directly. The primary attack against a switch is the ARP poisoning attack described earlier in the “Switches” section of this chapter. However, the possibility of an ARP attack doesn’t mean switches cannot be used as security control devices. As mentioned earlier, MAC addresses are unique for every network interface card, and switches can be configured to allow only specific MAC addresses to send traffic through a specific port on the switch. This function is known as port security, and it is useful where physical access over the network port cannot be relied upon, such as in public kiosks. With port security, a malicious individual cannot unplug the kiosk, plug in a laptop, and use the switch port, because the laptop MAC will not match the kiosk’s MAC and the switch would deny the traffic. While it is possible to spoof a MAC address, locking a port to a specific MAC creates a hurdle for a would-be intruder. Switches can also be used to create virtual local area networks (VLANs). VLANs are layer two broadcast domains, and they are used to further segment LANs. As described earlier, ARP broadcasts are sent between all hosts within the same VLAN. To communicate with a host that is not in your...
Words: 399 - Pages: 2