Question

In: Computer Science

Discuss the concept of Virtual Local Area Network (VLAN). In particular, answer the following questions: •...

Discuss the concept of Virtual Local Area Network (VLAN). In particular, answer the following questions:
• What technologies enable the creation of VLANs?
• What advantages do VLANs bring to cloud deployments?
• What are the ways of securing VLANs?

Solutions

Expert Solution

Technologies enable the creation of VLANs:-

Inter-Switch Link ( This is the technology that supports high-speed trunking between switches, and switches, routers, or servers in a fast Ethernet environment.)

VLAN Standardization (IEEE 802.1q provide for the standardization of VLANs based on three-layer approaches, currently several different transport mechanisms are used for communicating VLAN information across high-performance backbones)

VLAN Standard Implementation (Means that user can maintain the use of the VLAN trunking scheme used by the vendor)

Advantages of VLAN to cloud deployment:-

Every organization has a big amount of data. And that data is coming from different sectors like data is coming from IT or Sales team like this which depends on the organization's structure. So here VLANs look at your entire possible VLAN landscape and spend some time accessing the logic for how to best group your users. VLAN also provides strong security and simplicity so that we maintain and improve our service.

The way of securing VLANs:

Basically, the first thing is just to simplify the multi-VLAN deployment is by use of the private VLAN. So that primary VLAN carries traffic from promiscuous port to all other ports in the same VLAN.

Trunks are connected between two switches so we think these are not safe but remember one think these trunk links are connected those devices which are under you control. So, some attackers can be leverage to gain access to the trunk or to the VLAN, Due to this we know that how the attack works, and how to you prevent from them.


Related Solutions

Which one of the following is a local area network?
Which one of the following is a local area network?A: Two local area networks connected by a switch •B: Two local area networks connected by a UTP •C: Two local area networks connected by a switch •D: Two local area networks connected by a hub •E: Two local area networks connected by a router •F: Two computers connected by a router •G: Two computers connected by s switch •H: Two computers connected by a hub •I: Two computer connected by...
Explain the concept of Virtual Network Structure and provide examples.
Explain the concept of Virtual Network Structure and provide examples.
growth of wireless local area network
growth of wireless local area network
Virtual Projects Research about virtual projects. Based on your research, answer the following questions: -Which virtual...
Virtual Projects Research about virtual projects. Based on your research, answer the following questions: -Which virtual project problems are unique to the phenomenon of being dispersed and which are common project problems in any project? -Which virtual problems are the most serious for virtual projects? Why? Which virtual problems might be fatal for virtual projects? Why? -What are some potential solutions to virtual team problems? Which solutions would apply to regular project teams also? PS: Please respond in a very...
The objective is to design a local area network for a real or hypothetical organization of...
The objective is to design a local area network for a real or hypothetical organization of at least four subnets, with at least 100 PCs in each, using Windows and TCP/IP. hardware design: Include the following in a table: part name, description, supplier, unit cost, extended cost. Assume that all PCs were bought with NICs (do not include their costs), but no cables. Compute the total cost for all parts. Do not forget the internetworking device(s). I just need help...
In the area of quantitive literacy please answer the following questions: Discuss how you might foster...
In the area of quantitive literacy please answer the following questions: Discuss how you might foster a particular workplace skill. How would you help train others? How would you evaluate the effectiveness of that training?
Answer the following questions. Show all work leading to your answer. On a network with an...
Answer the following questions. Show all work leading to your answer. On a network with an IP address of 140.133.28.72 and a subnet mask of 255.248.0.0, what is the network ID? You have decided to create 254 subnets on your Class B network. What subnet mask will you use to accomplish this? What is the maximum number of hosts you can assign to any single subnet? Your workstation's IP address is 10.35.88.12, and your supervisor's workstation's IP address is 10.35.91.4....
Ava’s company is in the process of designing and building a new local area network to...
Ava’s company is in the process of designing and building a new local area network to support the newly expanded branch which is dedicated to handle the stock market related business transactions. A list of networking devices has been sent to you for your approval. This list includes hubs, switches, and routers. Would you approve these network devices to be used to build this new local area network? Please provide reasons to support your decision.
Suppose both the sender and receiver are in the same local area network. If the sender...
Suppose both the sender and receiver are in the same local area network. If the sender has the receiver's IP address only, but not the MAC address, how does ARP (Address Resolution Protocol) find out the receiver's MAC address?
How do network bridges scale up a local area network by reducing the collision domain? Why...
How do network bridges scale up a local area network by reducing the collision domain? Why can’t bridges make a local area network collision free?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT