Virtual lans, Computer Networking

One of the design requirements is to isolate other network traffic and broadcast from finance department to improve security. In order for this to possible we will implement VLAN on the network. This implementation will meet ECCMC business goals requirement, although VLAN implementation allow us to meet the requirement, it also allow the company network to be divided into logical group in order to achieve scalability requirement.

Implementing VLANs on the ECCMC network will allow the IT support to be able to manage users and their workstation by grouping them according to their functions. For instance new user's workstation from personnel department can be added to the oxford branch verse versa without much configuration.

Another reason why we are implementing VLANs, is because future growth of 5% yearly is expected, with this in place the technical goal in area of scalability will be achieved as new employee can place anywhere in the network without affecting the physical and logical design of the network.  Table 5.2 show VLANs division of the ECCMC department

Department

VLANs

Management

Management 802.1q Trunking( Native VLAN 65)

Personnel

10

Finance

20

IT support

30

Doctors

40

Nurses

50

Table: Departments VLANs information

 

Posted Date: 2/21/2013 6:36:16 AM | Location : United States







Related Discussions:- Virtual lans, Assignment Help, Ask Question on Virtual lans, Get Answer, Expert's Help, Virtual lans Discussions

Write discussion on Virtual lans
Your posts are moderated
Related Questions
Question: (a) Explain and illustrate different architectures for IEEE802.11 (WiFi). (b) The MAC management of IEEE802.11 handles transmitter activity for power management.

You require connecting two computers for file sharing. Is it possible to do this without using a hub or router? Yes, you can connect two computers together using only one cable

In distributed data processing, explain two scenarios where vertical partitioning and horizontal partitioning are used. Distributed Data Processing The distributed data pro

Fundamentals of intranet Introduction The history of the Intranet starts right from the days when computer networks came in. However, it could find a name and place for it

Q. What is Manchester? - Utilizes an inversion at the middle of each bit interval for both synchronization and bit representation - Negative-to-positive represents binary 1

There are three building blocks of client/server a) The client   b) The server and   c)  Middleware.


Uses of fragmentation and reassembly The More bit is used for fragmentation and reassembly. If this bit is 0, then either there has been no fragmentation of this packet or this

Multistation Access Unit (MAU) Combines individual automatic switches May perhaps daisy chain to support more stations

Connectionless Multiplexing  and De multiplexing Java program running in a host can create a UDP socket  with the  line Datagram's socket my socket =  new datagram's socket