Provide a literature review of how vlan can be used

Assignment Help Computer Networking
Reference no: EM131074736

Task 1:

ACL (Access Control List) is basically list of conditions to regulate network traffic. Applying access list makes the router analyze every packet passing through the interface. Appropriate use of access list, provides immense advantages in a network. However, manuals and textbooks offer very little information about how ACLs are actually used in practice. As a network engineer, you have been assigned the task of providing a detailed report on the following aspects of ACL usage in enterprise networks

- Solve security issues with ACL
- Context-based access control
- How extended ACL differ from Time-based ACL

Task 2:

VLAN (Virtual Local Area Network) is used to logically segment group of devices. VLAN enables these devices to communicate as if they are in the same physical medium, although located in different LAN segments. As a network administrator provide a literature review of how VLAN can be used in different scenarios to enhance the security of a network. The student is expected to review at least two research articles.

Evaluation Criteria:

The evaluation will be done on the strength of analysis presented in the assignment:
- Assignment work proposal submission:

Submit a work proposal for this assignment on or before, which must include:
- Understanding of deliverables - a detail description of deliverables
- General overview of proposed plan - initial understanding of solution to all the tasks
- Resources identified

Follow the guidelines mentioned below for your assignment:

- The document should not be more than 15 to 20 pages in (size A4) paper.

- The document should be well presented and neatly done.

- Assignment should be computer typed using Calibri size 12 font and the Softcopy is to be submitted through Moodle(Turnitin).

- Heading should be with Font Size 14, Bold, Underline

- Use Diagrams and Examples to explain your topic.

- Copy paste from the Internet is strictly not acceptable.

- In-text citation and referencing using CU Harvard referencing Style.

Verified Expert

Reference no: EM131074736

Questions Cloud

Analyze the different liability in this case : Analyze the different liability in this case if the sexual harasser were an independent contractor versus an employee. Cite at least five peer-reviewed sources. Format your paper consistent with APA guidelines.
Find the pd gain that produce the fastest system response : MECH 436 Applied Controls - PID Controller Tuning II. Find the PD gain that produce the fastest system response to a step disturbance with a maximum of 25% overshoot, Find the steady state error and plot the result
Create a new best practice for hr management : Create a new best practice for HR management
Discuss how cultural diversity can affect the workplace : Cultural diversity is defined as how each person's culture is different from others. Discuss how cultural diversity can affect the workplace. How does community diversity and generational diversity affect the workplace? What do you believe a cultu..
Provide a literature review of how vlan can be used : Routing and Switching - As a network administrator provide a literature review of how VLAN can be used in different scenarios to enhance the security of a network.
Data on levels of imports and exports : Provide data on levels of imports and exports throughout 2000-2010. (Annual numbers for each year is ideal)  Look at the value of imports and exports in real (inflation-adjusted) dollars or you can present them as a % of GDP.
Predict the stock price of facebook over the next five year : Assess the performance of the stock within the first year of the public offering, indicating the drivers of the performance and the resulting impact to the company performance.
Mark-recapture laboratory : This is a laboratory that simulates a population census technique commonly used by wildlife biologists in the field. The first step is to trap a random sample of animals of the desired species. These animals are then ear-tagged or marked in some o..
Demonstrate how to give constructive feedback : Constructive feedback is information-specific, issue-focused, and based on observations. For this essay, you are asked to prepare a conversation between a health unit coordinator and an employee that they oversee which demonstrates constructive fe..

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd