Question

In: Computer Science

Discuss the concept of Virtual Local Area Network (VLAN). In particular, answer the following questions: •...

Discuss the concept of Virtual Local Area Network (VLAN). In particular, answer the following questions:
• What technologies enable the creation of VLANs?
• What advantages do VLANs bring to cloud deployments?
• What are the ways of securing VLANs?

Solutions

Expert Solution

Technologies enable the creation of VLANs:-

Inter-Switch Link ( This is the technology that supports high-speed trunking between switches, and switches, routers, or servers in a fast Ethernet environment.)

VLAN Standardization (IEEE 802.1q provide for the standardization of VLANs based on three-layer approaches, currently several different transport mechanisms are used for communicating VLAN information across high-performance backbones)

VLAN Standard Implementation (Means that user can maintain the use of the VLAN trunking scheme used by the vendor)

Advantages of VLAN to cloud deployment:-

Every organization has a big amount of data. And that data is coming from different sectors like data is coming from IT or Sales team like this which depends on the organization's structure. So here VLANs look at your entire possible VLAN landscape and spend some time accessing the logic for how to best group your users. VLAN also provides strong security and simplicity so that we maintain and improve our service.

The way of securing VLANs:

Basically, the first thing is just to simplify the multi-VLAN deployment is by use of the private VLAN. So that primary VLAN carries traffic from promiscuous port to all other ports in the same VLAN.

Trunks are connected between two switches so we think these are not safe but remember one think these trunk links are connected those devices which are under you control. So, some attackers can be leverage to gain access to the trunk or to the VLAN, Due to this we know that how the attack works, and how to you prevent from them.


Related Solutions

Which one of the following is a local area network?
Which one of the following is a local area network?A: Two local area networks connected by a switch •B: Two local area networks connected by a UTP •C: Two local area networks connected by a switch •D: Two local area networks connected by a hub •E: Two local area networks connected by a router •F: Two computers connected by a router •G: Two computers connected by s switch •H: Two computers connected by a hub •I: Two computer connected by...
Virtual Projects Research about virtual projects. Based on your research, answer the following questions: -Which virtual...
Virtual Projects Research about virtual projects. Based on your research, answer the following questions: -Which virtual project problems are unique to the phenomenon of being dispersed and which are common project problems in any project? -Which virtual problems are the most serious for virtual projects? Why? Which virtual problems might be fatal for virtual projects? Why? -What are some potential solutions to virtual team problems? Which solutions would apply to regular project teams also? PS: Please respond in a very...
The objective is to design a local area network for a real or hypothetical organization of...
The objective is to design a local area network for a real or hypothetical organization of at least four subnets, with at least 100 PCs in each, using Windows and TCP/IP. hardware design: Include the following in a table: part name, description, supplier, unit cost, extended cost. Assume that all PCs were bought with NICs (do not include their costs), but no cables. Compute the total cost for all parts. Do not forget the internetworking device(s). I just need help...
Answer the following questions. Show all work leading to your answer. On a network with an...
Answer the following questions. Show all work leading to your answer. On a network with an IP address of 140.133.28.72 and a subnet mask of 255.248.0.0, what is the network ID? You have decided to create 254 subnets on your Class B network. What subnet mask will you use to accomplish this? What is the maximum number of hosts you can assign to any single subnet? Your workstation's IP address is 10.35.88.12, and your supervisor's workstation's IP address is 10.35.91.4....
Ava’s company is in the process of designing and building a new local area network to...
Ava’s company is in the process of designing and building a new local area network to support the newly expanded branch which is dedicated to handle the stock market related business transactions. A list of networking devices has been sent to you for your approval. This list includes hubs, switches, and routers. Would you approve these network devices to be used to build this new local area network? Please provide reasons to support your decision.
Suppose both the sender and receiver are in the same local area network. If the sender...
Suppose both the sender and receiver are in the same local area network. If the sender has the receiver's IP address only, but not the MAC address, how does ARP (Address Resolution Protocol) find out the receiver's MAC address?
1. Which of the following is a disadvantage of the virtual network approach? a. Lack of...
1. Which of the following is a disadvantage of the virtual network approach? a. Lack of hands-on control b. Greater demand on managers c. Weaker employee loyalty d. High level of conflict e. Weak and ambiguous boundaries 2. According to the administrative model of decision making, most managers settle for a satisficing rather than a maximizing solution. True False 3. All of the following are assumptions of the classical decision-making model except: a. decision goals often are vague, conflicting, and...
How do network bridges scale up a local area network by reducing the collision domain? Why...
How do network bridges scale up a local area network by reducing the collision domain? Why can’t bridges make a local area network collision free?
What is a Local Area Network (LAN)? What are the components of a typical LAN? What...
What is a Local Area Network (LAN)? What are the components of a typical LAN? What are the functions of each component?
Describe topologies and concepts in the understanding, usage, and design of local area network (LAN), wide...
Describe topologies and concepts in the understanding, usage, and design of local area network (LAN), wide area network (WAN) transmission methods, and communications topologies in the design of networks: 1.Distinguish between the client-server and peer-to-peer models used to control access to a network 2.Describe various networking hardware devices and the most common physical topologies 3.Describe the seven layers of the O S I model 4.Explain best practices for topologies when working with networks and computers •The Thomas Brown Foundation is...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT