Virtual lans, Computer Networking

Assignment Help:

One of the design requirements is to isolate other network traffic and broadcast from finance department to improve security. In order for this to possible we will implement VLAN on the network. This implementation will meet ECCMC business goals requirement, although VLAN implementation allow us to meet the requirement, it also allow the company network to be divided into logical group in order to achieve scalability requirement.

Implementing VLANs on the ECCMC network will allow the IT support to be able to manage users and their workstation by grouping them according to their functions. For instance new user's workstation from personnel department can be added to the oxford branch verse versa without much configuration.

Another reason why we are implementing VLANs, is because future growth of 5% yearly is expected, with this in place the technical goal in area of scalability will be achieved as new employee can place anywhere in the network without affecting the physical and logical design of the network.  Table 5.2 show VLANs division of the ECCMC department

Department

VLANs

Management

Management 802.1q Trunking( Native VLAN 65)

Personnel

10

Finance

20

IT support

30

Doctors

40

Nurses

50

Table: Departments VLANs information

 


Related Discussions:- Virtual lans

Different technologies involved in establishing wan links, What are the dif...

What are the different technologies involved in establishing WAN links? Analog connections - using conventional telephone lines; Digital connections - using digital-grade telep

Configure the logical topology - configure router1, Configure Router1. ...

Configure Router1. From Host1, connect to the console of Router 1 and establish a console session. Directions for creating a console connection using HyperTerminal are in Appen

Security and reciprocity of RSA, Q. Security and Reciprocity of RSA? S...

Q. Security and Reciprocity of RSA? Security and Reciprocity of RSA - Kp and N are issued publicly. - Ks is kept secret. - Since the snooper does not know p and

Explain the routing table of solaris system, Question 1 Write a note on a)...

Question 1 Write a note on a) Internet layer b) strict source routing Question 2 Explain the routing table of Solaris system Question 3 Explain following concepts a) MIM

What is passive topology , When the computers on the network basically list...

When the computers on the network basically listen and receive the signal, they are referred to as passive due to they don't amplify the signal in any way.

Name the two types of oltp, a) TP lite , based on stored procedures. b)...

a) TP lite , based on stored procedures. b) TP heavy , based on the TP monitors.

Difference between multiprogramming and multithreading, Question: a) L...

Question: a) List three characteristics and two potential problems of a peer-to-peer environment. b) List three characteristics and two potential problems of a client/

What is the igp (interior gateway protocol), Any protocol used by an intern...

Any protocol used by an internetwork to exchange routing data within an autonomous system. E.g. RIP, IGRP and OSPF.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd