Provide a literature review of how vlan can be used

Assignment Help Computer Networking
Reference no: EM131074736

Task 1:

ACL (Access Control List) is basically list of conditions to regulate network traffic. Applying access list makes the router analyze every packet passing through the interface. Appropriate use of access list, provides immense advantages in a network. However, manuals and textbooks offer very little information about how ACLs are actually used in practice. As a network engineer, you have been assigned the task of providing a detailed report on the following aspects of ACL usage in enterprise networks

- Solve security issues with ACL
- Context-based access control
- How extended ACL differ from Time-based ACL

Task 2:

VLAN (Virtual Local Area Network) is used to logically segment group of devices. VLAN enables these devices to communicate as if they are in the same physical medium, although located in different LAN segments. As a network administrator provide a literature review of how VLAN can be used in different scenarios to enhance the security of a network. The student is expected to review at least two research articles.

Evaluation Criteria:

The evaluation will be done on the strength of analysis presented in the assignment:
- Assignment work proposal submission:

Submit a work proposal for this assignment on or before, which must include:
- Understanding of deliverables - a detail description of deliverables
- General overview of proposed plan - initial understanding of solution to all the tasks
- Resources identified

Follow the guidelines mentioned below for your assignment:

- The document should not be more than 15 to 20 pages in (size A4) paper.

- The document should be well presented and neatly done.

- Assignment should be computer typed using Calibri size 12 font and the Softcopy is to be submitted through Moodle(Turnitin).

- Heading should be with Font Size 14, Bold, Underline

- Use Diagrams and Examples to explain your topic.

- Copy paste from the Internet is strictly not acceptable.

- In-text citation and referencing using CU Harvard referencing Style.

Verified Expert

Reference no: EM131074736

Questions Cloud

Analyze the different liability in this case : Analyze the different liability in this case if the sexual harasser were an independent contractor versus an employee. Cite at least five peer-reviewed sources. Format your paper consistent with APA guidelines.
Find the pd gain that produce the fastest system response : MECH 436 Applied Controls - PID Controller Tuning II. Find the PD gain that produce the fastest system response to a step disturbance with a maximum of 25% overshoot, Find the steady state error and plot the result
Create a new best practice for hr management : Create a new best practice for HR management
Discuss how cultural diversity can affect the workplace : Cultural diversity is defined as how each person's culture is different from others. Discuss how cultural diversity can affect the workplace. How does community diversity and generational diversity affect the workplace? What do you believe a cultu..
Provide a literature review of how vlan can be used : Routing and Switching - As a network administrator provide a literature review of how VLAN can be used in different scenarios to enhance the security of a network.
Data on levels of imports and exports : Provide data on levels of imports and exports throughout 2000-2010. (Annual numbers for each year is ideal)  Look at the value of imports and exports in real (inflation-adjusted) dollars or you can present them as a % of GDP.
Predict the stock price of facebook over the next five year : Assess the performance of the stock within the first year of the public offering, indicating the drivers of the performance and the resulting impact to the company performance.
Mark-recapture laboratory : This is a laboratory that simulates a population census technique commonly used by wildlife biologists in the field. The first step is to trap a random sample of animals of the desired species. These animals are then ear-tagged or marked in some o..
Demonstrate how to give constructive feedback : Constructive feedback is information-specific, issue-focused, and based on observations. For this essay, you are asked to prepare a conversation between a health unit coordinator and an employee that they oversee which demonstrates constructive fe..

Reviews

Write a Review

Computer Networking Questions & Answers

  Evluate the challenges e-business and e-commerce

assess the challenges e-business and e-commerce technologies present to the field of information technology. describe

  Local area network and wide area network

These are your preferences, but you should also provide reasons for why you would use that medium in the network. Local area network and Wide area network

  Identify and briefly explain any four key requirements

An organization called Ranbaxy Inc. has currently 3 divisions in 3 different locations within Sydney city. One of the divisions serves as the company headquarters.

  Identify the users of the information system.

Identify the users of the information system.

  Research both legacy and voip telecommunications

Research both legacy and VoIP telecommunications. Determine which one is more secure and why.Define what it is and how it will be used in the telecommunications model. Provide 3 sources for your ideas.

  How do integrated systems affect the installation of network

Your consulting firm has been hired to implement a computer network for health care delivery to allow for coordination of care. How do integrated systems affect the installation of networks

  Craft an initial posting that extends our knowledge past

Choose a topic, term, question that is of interest to you and is related to wide area networks. Using the Internet and other appropriate references, craft an initial posting that extends our knowledge past what is in the reading.

  Explain the features of telecommunications networks

assume that you were recently hired by a manufacturing company as a systems administrator trainee. your first

  Devices and type of network circuits used in network

Include the devices and type of network circuits you would use. You will need to make some assumptions, so be sure to document your assumptions and explain why you have designed the network in this way.

  Configure switch connects servers supply oceanic-atmospheric

You are asked to configure the backbone switch which connects servers supplying oceanic and atmospheric data to mariners and pilots around world.

  Explain llc and mac

Explain two layers: LLC & MAC, and how are they different from what is available in TCP/IP protocol? Why do we require these two extra layers for LAN?

  Describe and explain denial of service

Describe and explain Denial of Service (DoS) and Distributed Denial of Service (DDoS) network attacks

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd