VLAN IT/242 May 20, 2011 By, ******* ******* VLAN In this paper I will present a plan on how a VLAN could be implemented so that bandwidth is not consumed. My plan will ensure that the network is not flooded with packets, and that members of the same VLAN can be located in different buildings or cities. The benefit of creating a VLAN VLAN offers many benefits not found in most LANs. Performance enhancers broadcast data packets that are targeted and processed by all devices on a network, but only specific …show more content…
A plan used to segment the network into different broadcast domains to avoid bandwidth consumption. Because the network will be split in four parts: Operations, Marketing, Engineering, and a call center. Each department will be separate from the network, which would make access between each department restricted. Establishing user groups will increase security. Each department will only have access to only its own resources. The type of switch to be used, layer 2 or layer 3, and why you would choose it over the other. There is the need to break larger network segments down to four smaller ones. Switches will operate at the data link layer. A bridge works only with layer 2 protocols and layer 2 MAC addresses. What type of VLAN membership and the value of that choice over other options? I will use a port based VLAN membership to facilitate the ease of any reorganization of the physical layout of the network. This will be essential for group users and administrators in the event there would be a need for any relocations of office space. The types of trunking configured on the switch to reduce dependency on single vendor and enable more cost effective expansions in the future the type of trunking. The type of trunking I suggest is IEEE 802.1Q trucking protocol. The purpose and benefit of using the VLAN trunk protocol (VTP). The purpose of using VTP is to add efficiency and speed to the network. The benefit of using VTP it can increase the scalability of
“Networks are all around us. They are in our walls, in the air. At schools, hotels, hospitals, even coffee shops. Always there, always on…This power exists today. In our routers. In our switches... . (Cisco, n.d.)
Routers and switches will be utilized to route network signals to all areas of this large network. Telephony systems will be introduced to serve the VOIP located at each location to assist with communication needs. Wireless technologies will also be needed to assist with mobility and other devices such as printers, laptops, fax machines, etc. Lastly, a physical firewall will be enforced at each location to protect the network from internal and external intruders.
People from the same group can broadcast messages with assurance. Other users in different groups will not get these messages. The VLANs provide some extra security. The level of security among the host or workstations across the VLAN has increased over the period of time. It reduces the chances of an outsider or alien host from entering into the network an exercises a lot of control on issues like broadcast domain, firewall and access restriction.
There are various types of equipment that the company should look for when considering this network. The first item to look at when considering equipment is the Operating system and software that we would need. Next, the group took into consideration the type of server the company needs to make this network a reality. Another thing that we looked at is the possibility of having ThinClients over regular desktops for all workstations. Of course, it was taken into consideration that some employees would not want ThinClients. So, we show the type of tower we plan to place into those spaces, along with any peripheral device for both. Then, we will look at the network devices that will go into each building that include switches, routers, repeaters, hubs, and wireless access points. Finally, the group will note guidelines for choosing a local ISP at each site. Each Item outlined helps to build a network based on the specifications given by the company.
Each branch maintains slightly different network systems. Plans to implement compatibility among each office and the devices in the office
The Ethernet lines run from the network switch, sometimes through a patch panel, out of the communication room and connect to the VoIP phones and other IP devices. Adding PoE enables devices to be powered over the same Cat 5 cabling infrastructure, providing the most cost-effective solution. Allows users too freely and safely mix legacy and PoE-compatible devices on their network. PoE technology is designed in a way that does not degrade the network data communication performance or decrease network reach. There are two ways to implement Power over Ethernet: endspan and midspan. A VLAN allows a network of computers and users to communicate in a simulated environmentas if they exist in a single LAN and are sharing a single broadcast and multi cast domain. The purpose of implementing a VLAN is to
VLANs or Virtual Local Area Networks are logical local area networks that extend beyond the traditional LAN architecture. Because a VLAN is a logical entity, creating and configuring a VLAN is done completely in software. The advantages to using this type of LAN include but are not limited to the ability to conserve the network resources, to bridge geographical drawbacks, and to better manage the movement of personnel and equipment. To understand the need for VLANs you must first understand the Local Area Network (LAN). The definition of a LAN started as a group of computers that were connected in the same area, but today’s LAN is defined as a single broadcast domain. This is explained easily by looking at a large organization where each department would be on a separate LAN found behind a router or switch. With today’s expanding networks it has become important for these
For example, the Sales and Marketing Division has a desktop computer for each of the account representatives. All of these computers are connected to a small local area network (LAN) that serves only the Sales and Marketing Division. The
Held, G. (1999). Data communications networking devices: Operation, utilization, and LAN and WAN internetworking. Chichester: Wiley.
The nature of the market structure and demand of Cisco Systems is its business market which contains fewer but larger companies. For Cisco Systems, this implies that even though they have fewer clients than other companies, they still have a good and profitable relationship with their clients. For the customers of Cisco Systems, this implies that they will receive better and faster service and products because they don’t have to compete for the attention and service of Cisco Systems.
Since one office is in the center of the WAN, it would be the most logical location for the main server headquarters. This main location would be home to six servers, two of them being print servers and the other four each hosting their own specific applications to all of the workstations in the network. The first of the four servers would hold the business management applications needed by any of the accountants or human resource teams. The second would hold the medical managing software that would hold all patient information, insurance, and bills that could be accessed from any of the 5 office locations in the network for both doctor and patient convenience. The third will be used to host a web server and the final system will be used as a domain controller that will manage the users and groups on the network.
As this demand for dynamic and unpredictable data grows, more and more devices have to be added to existing networks and configured accordingly. The need of the hour is to regulate networks centrally and as a whole rather than configure individual network devices and gain more control to achieve flexibility in existing networks.
The proposed network is designed for the UMUC new building in Rockville. This new building will have some administrative offices, lecture rooms, library, and computer labs with an open Wi-Fi. This new building will have total six computer labs that will be used for instruction. Each of these labs will have 25 computers, 23 student computers and one instructor computer, one server in the closet and in addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students for doing their own purpose like homework. In Student Computer Lab there will be 30 computers and a server in the closet. There will be 10 computers for student’s use and 5 computers for Library staff in the library so they can access to the library resources for staff use, with the exception of the admissions office, which will have five computers. There will be six class room which will have a computer for instructor’s use. Finally, there will be 7 offices in the building and each of these offices will have one computer. There will be two server rooms, one on the first floor and another one on the second floor. There should be at least 3 separate networks: Administrative, Instructional, and Public. All staff-accessed computers will be on the
The ability to send and receive data efficiently is the most important objective of networking computers.