Question

In: Operations Management

Give examples of criteria that can be used to divide the network into different VLAN?

Give examples of criteria that can be used to divide the network into different VLAN?

Solutions

Expert Solution

Question - Give examples of criteria that can be used to divide the network into different VLANs?

Answer

VLAN's - The effective way, we can construct our extended network is to sub-divide it into sections called Virtual Local Area Networks or VLANs. We can combine the computers of end-users who work simultaneously into VLANs, regardless if they are situated in close corporal propinquity. Frequently, a company generates unrelated VLANs for different sectors or divisions. The VLAN provides a security frontier and increases performance by seclusion broadcast and multicast traffic.

Advantages of VLANs

Generally, a local area network (LAN) behaves as a broadcast province. It means, all appliances or devices on the LAN will catch broadcast information or messages from all other appliances on that particular LAN. The imparting within the LAN goes via appliances such as switches, core & bridges. VLANs are generally unrelated by switches that break the network into multiple broadcast provinces, to decrease the amount of traffic of all the devices which leads to increase performance.

The VLAN formation also makes it serene for executives to control network resources. Customers or End-users can be combined logically with the resources which they required. Operational users and computers from one VLAN to another are serene and can be consummated with the help of software in place of having to substantially agape computer from a subnet and pass them to another and when a customer's computer substantially moves to another location (such as, with a laptop), the VLAN administration software can concede the computer and instinctively assign it to the supposed VLAN.

At last, using VLANs extend security. When we use TCP/IP for network imparting, as most of the companies do today, VLANs can impart with each other via a router and users who deal with extremely tactful imparting and servers that hold classified data can be positioned on a high-security division. Imparting from other users on the LAN will be exposed to the router's ingress controls and decontaminating. In the absence of a router, appliances or devices on each VLAN are not fit to measure or ingress those on another VLAN even if they are substantially connected to the same switch.

There are some criteria or tools through which we can divide the network into different VLANs

A) To dichotomize a network into VLANs, one construct network apparatus. Easy apparatus can separate only per substantial port, in this case each VLAN is associated with an allocated network cable. More urbane appliances or devices can sign frames via VLAN labeling, such that a single coordinated (trunk) might be used to convey data for multiple VLANs. As VLANs allow bandwidth, a VLAN trunk may use link accumulation or both to path data coherently.

B) Let's talk about Subnets and VLANs. They both are sensible dissection of a network. They enable us to hold on to one network and break it into smaller parts utilizing different approaches. A Subnet is a compressed technique to say sub-network, which is a part of the IP version (4 Grade). Therefore IP4 succor multiple Subnets. VLAN is a cipher or phrase. It is called a virtual local area network, which is commonly going to be operated by a switch.

Here, we're speaking about subnets. Therefore, we need to talk about a Subnet Mask too. When we notice an IP address, a further bit of information is frequently entrusted and which is the Subnet Mask. Lots of distinct subnet masks are feasible or conceivable, but some (3 of them) are next to afar the most regular. These subnet masks are very frequent. They're all an amalgamation of the digit and the digit '0' and if we notice, they're assembled into 4 parts, same as IP address has '4' octets, the subnet mask has '4' octets too, segregated by periods. The subnet mask notify us which section of the IP address is considered for the network.

C) A Technical Example

The key switches require to be block between them to move frames from every VLAN. The portal (router + security device) requires to be block to whatever core switch it bung into, presume single-homing. The VLAN must exist on every coalition of this uplink, in addition to 3 other VLANs. The portal requires to be constructed with an IP address for every VLAN & Subnet to route between them.


Related Solutions

What are the different types of hypothesis tests that can be used? Give examples along with...
What are the different types of hypothesis tests that can be used? Give examples along with an explanation.
Give examples of two different biochemical tests that can be used to phenotypically identify microbes.
Give examples of two different biochemical tests that can be used to phenotypically identify microbes.
If I have multiple alternatives, explain and give examples of the criteria used to determine which...
If I have multiple alternatives, explain and give examples of the criteria used to determine which alternative is chosen when evaluating using, and please use  Net Present Worth, PW-Cost, or PW-Benefit.
how foundations can be used to evade tax. give examples.
how foundations can be used to evade tax. give examples.
a) Give examples of 2 different biomonitoring approaches that could be used to assess the toxicity...
a) Give examples of 2 different biomonitoring approaches that could be used to assess the toxicity of a water source b) Define what WET tests are and how you wold apply them for the biomonitoring of a water body c) Discuss the difference between the olfactory and chemical analysis for the assessment of odorous emissions
Briefly discuss the different physical principles that are used in temperature measuring instruments and give examples...
Briefly discuss the different physical principles that are used in temperature measuring instruments and give examples of instruments that use each of these principles. 1. The thermoelectric effect 2. Resistance change 3. Sensitivity of semiconductor device 4. Radiative heat emission 5. Thermography 6. Thermal expansion 7. Sensitivity of fiber-optic devices 8. Color change 9. Change of state of material
How can vendor allowances be used to cook the books? Give two examples.
How can vendor allowances be used to cook the books? Give two examples.
Discuss the concept of Virtual Local Area Network (VLAN). In particular, answer the following questions: •...
Discuss the concept of Virtual Local Area Network (VLAN). In particular, answer the following questions: • What technologies enable the creation of VLANs? • What advantages do VLANs bring to cloud deployments? • What are the ways of securing VLANs?
explain different types of switches and scanning and provide examples of when they can be used...
explain different types of switches and scanning and provide examples of when they can be used My major is rehabilitation services. the class is assistuve technology. the book is assistive technology for people with disabilities
Give three examples of how Linux is used in distinctly different applications to illustrate its proliferation...
Give three examples of how Linux is used in distinctly different applications to illustrate its proliferation in a diverse range of modern application domains?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT