Virtual lans, Computer Networking

One of the design requirements is to isolate other network traffic and broadcast from finance department to improve security. In order for this to possible we will implement VLAN on the network. This implementation will meet ECCMC business goals requirement, although VLAN implementation allow us to meet the requirement, it also allow the company network to be divided into logical group in order to achieve scalability requirement.

Implementing VLANs on the ECCMC network will allow the IT support to be able to manage users and their workstation by grouping them according to their functions. For instance new user's workstation from personnel department can be added to the oxford branch verse versa without much configuration.

Another reason why we are implementing VLANs, is because future growth of 5% yearly is expected, with this in place the technical goal in area of scalability will be achieved as new employee can place anywhere in the network without affecting the physical and logical design of the network.  Table 5.2 show VLANs division of the ECCMC department




Management 802.1q Trunking( Native VLAN 65)





IT support






Table: Departments VLANs information


Posted Date: 2/21/2013 6:36:16 AM | Location : United States

Related Discussions:- Virtual lans, Assignment Help, Ask Question on Virtual lans, Get Answer, Expert's Help, Virtual lans Discussions

Write discussion on Virtual lans
Your posts are moderated
Related Questions
(i)  Suppose that frames are 1250 bytes long including 25 bytes of overhead. Also assume that ACK frames are 25 bytes long. a)  Calculate the efficiency of stop-and-wait ARQ in

Most protocol suites have dissimilar OSI layer protocols within them. At layer 3, IP is for TCP/IP. TCP is layer 4. IPX is for IPX/SPX. SPX is layer 4. DDP is for Appletal

Why it is necessary to have layering in a network? A computer network is a very complex system. It becomes very difficult to execute as a single entity. The layered approach di

Question 1: ‘There is an overwhelming imperative for organisations to analyse every bit of information they can extract from their huge data warehouses for competitive advant

a) TP lite , based on stored procedures. b) TP heavy , based on the TP monitors.

Fat tree It is a modified version of the tree network. In this group the bandwidth of edge (or the connecting wire among nodes) increases towards the root. It is a more practic

10Base2 - Thinnet Cable diameter is about 0.64 cm (RG-58) More flexible as well as easier to handle and install than Thicknet "2" represents a maximum segment len

What is Error Detection? What are its methods? Data can be corrupted during transmission. For reliable communication errors must be deducted and corrected. Error Detection uses

Responses Responses  are sent  from the  server to the client. A responses is a three  digit code that  may be followed by additional textual information.

How Firewall configuration makes all the difference The greatest blunder that any company make is to just install a firewall and think that they have ensured perfect securit