Virtual lans, Computer Networking

One of the design requirements is to isolate other network traffic and broadcast from finance department to improve security. In order for this to possible we will implement VLAN on the network. This implementation will meet ECCMC business goals requirement, although VLAN implementation allow us to meet the requirement, it also allow the company network to be divided into logical group in order to achieve scalability requirement.

Implementing VLANs on the ECCMC network will allow the IT support to be able to manage users and their workstation by grouping them according to their functions. For instance new user's workstation from personnel department can be added to the oxford branch verse versa without much configuration.

Another reason why we are implementing VLANs, is because future growth of 5% yearly is expected, with this in place the technical goal in area of scalability will be achieved as new employee can place anywhere in the network without affecting the physical and logical design of the network.  Table 5.2 show VLANs division of the ECCMC department

Department

VLANs

Management

Management 802.1q Trunking( Native VLAN 65)

Personnel

10

Finance

20

IT support

30

Doctors

40

Nurses

50

Table: Departments VLANs information

 

Posted Date: 2/21/2013 6:36:16 AM | Location : United States







Related Discussions:- Virtual lans, Assignment Help, Ask Question on Virtual lans, Get Answer, Expert's Help, Virtual lans Discussions

Write discussion on Virtual lans
Your posts are moderated
Related Questions

Wait protocol The wait protocol is used for resolving the conflicts, which arise due to number of multiprocessors demanding the same resource. There are two types of wait prot

What is virtual channel? Virtual channel is normally a connection from one source to one destination, although multicast connections are also allowed. The other name for virtua

a. If a password to a cipher is exactly 8 characters long, and each character can be selected from [0-9], [a-z], and [A-Z], how many different passwords are possible? b. Suppose

Q. Working of  TCP - buffers? TCP - buffers Sending & receiving buffers - Processes don't consume data at the same speed Sending site: - White section: unfilled

Process communicating End   systems  communicate with each  other by the  processes. A process  can be  thought  of a s program  that is  running  within  end systems. Process

The following information was obtained from a host computer: 00:05:17.176507 74.125.228.54.1270 > 64.254.128.66.25: S 2688560409:2688560409(0) win 16384 (DF) (ttl 46, id 2096

What is a difference between a domain and workgroup?

What is CRC The CRC is computed while transmission and appended to output stream as soon as last bit goes out onto wire. If the CRC were in header, it will be necessary to make

You have been tasked with the job of designing the new network layout for R2I's new location. R2I has a fractional T1 line that enters the premises at Site B. You can use: 1