Provide a literature review of how vlan can be used

Assignment Help Computer Networking
Reference no: EM131074736

Task 1:

ACL (Access Control List) is basically list of conditions to regulate network traffic. Applying access list makes the router analyze every packet passing through the interface. Appropriate use of access list, provides immense advantages in a network. However, manuals and textbooks offer very little information about how ACLs are actually used in practice. As a network engineer, you have been assigned the task of providing a detailed report on the following aspects of ACL usage in enterprise networks

- Solve security issues with ACL
- Context-based access control
- How extended ACL differ from Time-based ACL

Task 2:

VLAN (Virtual Local Area Network) is used to logically segment group of devices. VLAN enables these devices to communicate as if they are in the same physical medium, although located in different LAN segments. As a network administrator provide a literature review of how VLAN can be used in different scenarios to enhance the security of a network. The student is expected to review at least two research articles.

Evaluation Criteria:

The evaluation will be done on the strength of analysis presented in the assignment:
- Assignment work proposal submission:

Submit a work proposal for this assignment on or before, which must include:
- Understanding of deliverables - a detail description of deliverables
- General overview of proposed plan - initial understanding of solution to all the tasks
- Resources identified

Follow the guidelines mentioned below for your assignment:

- The document should not be more than 15 to 20 pages in (size A4) paper.

- The document should be well presented and neatly done.

- Assignment should be computer typed using Calibri size 12 font and the Softcopy is to be submitted through Moodle(Turnitin).

- Heading should be with Font Size 14, Bold, Underline

- Use Diagrams and Examples to explain your topic.

- Copy paste from the Internet is strictly not acceptable.

- In-text citation and referencing using CU Harvard referencing Style.

Verified Expert

Reference no: EM131074736

Questions Cloud

Analyze the different liability in this case : Analyze the different liability in this case if the sexual harasser were an independent contractor versus an employee. Cite at least five peer-reviewed sources. Format your paper consistent with APA guidelines.
Find the pd gain that produce the fastest system response : MECH 436 Applied Controls - PID Controller Tuning II. Find the PD gain that produce the fastest system response to a step disturbance with a maximum of 25% overshoot, Find the steady state error and plot the result
Create a new best practice for hr management : Create a new best practice for HR management
Discuss how cultural diversity can affect the workplace : Cultural diversity is defined as how each person's culture is different from others. Discuss how cultural diversity can affect the workplace. How does community diversity and generational diversity affect the workplace? What do you believe a cultu..
Provide a literature review of how vlan can be used : Routing and Switching - As a network administrator provide a literature review of how VLAN can be used in different scenarios to enhance the security of a network.
Data on levels of imports and exports : Provide data on levels of imports and exports throughout 2000-2010. (Annual numbers for each year is ideal)  Look at the value of imports and exports in real (inflation-adjusted) dollars or you can present them as a % of GDP.
Predict the stock price of facebook over the next five year : Assess the performance of the stock within the first year of the public offering, indicating the drivers of the performance and the resulting impact to the company performance.
Mark-recapture laboratory : This is a laboratory that simulates a population census technique commonly used by wildlife biologists in the field. The first step is to trap a random sample of animals of the desired species. These animals are then ear-tagged or marked in some o..
Demonstrate how to give constructive feedback : Constructive feedback is information-specific, issue-focused, and based on observations. For this essay, you are asked to prepare a conversation between a health unit coordinator and an employee that they oversee which demonstrates constructive fe..

Reviews

Write a Review

Computer Networking Questions & Answers

  Which of the following statements is true in a data center

1. a network engineer is preparing an implementation plan of xumuc. she is not certain as to which layer of the cisco

  What you expect the subject of standard 1.2.840.113549 to be

Where in the tree would a new Microsoft file format for a new product be placed?

  Explain comprehensive disaster recovery plan for network

Explain a comprehensive disaster recovery plan for hypothetical network consisting of 20 desktop computers in domain network with 2 network servers and 2 application servers.

  Create a technical proposal for a network services

You will create a technical proposal for a Windows Server-based set of network services given the simplified RFP (Request for Proposal) provided below

  How client process in given end system find location of user

Explain how a client process in a given end system can find the location of a given user to establish a connection, for example, Internet telephone, at a given point in time.

  What are the demerits that this method poses for your

q1. why might read write and read create rights pose a security threat?q2. how do clients receive updates in the

  Describe mckinnon in the context of the frameworks

Describe McKinnon in the context of the frameworks and theories of cyber-crime and cyber criminals discussed in the classroom

  How does packet switching use the mac address

How does packet switching use the MAC address? Reference other material that aided you in your understanding

  Advantages of current technologies virtual private networks

Write down the advantages of some of the current technologies including VoIP, Unified Communications, Virtual Private Networks.

  Compare the bus topology and the star topology

Describe the five IP addressing classes. Provide an example for each of classes in binary and dotted-decimal representation. Show the conversion of each of the addresses. Describe the function of the subnet address for each of the classes and how ..

  What is the maximum number of hosts it can handle

A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle - What are the values of the header length, total length, identification, flags, and fragment offset fields for all three fragment header..

  Discuss the many uses of gre and how you could secure it

Protocol 47 or GRE is one of the most flexible IP protocols in networking but it is insecure. Discuss the many uses of GRE and how you could secure it across insecure networks like the Internet

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd