preview

Nt1330 Unit 4.3

Good Essays

4.2 Tagging Whenever the frames are being sent over the network they have to be know from which Vlan they are being sent from so that the bridges that are present across can send them only to the specific address rather then all the output ports that are present. To identification of the receiver ports are done with the help of tag header that is added to the frame. The additional features of the tag header are as follows: i. User priority is defined through it. ii. It indicates the mac address format. iii. Source routing control information is specified. The frames, which consist of the tags in them, are called as tagged frame. VLAN information is conveyed using the tagged frames. The tag header consist of two formats and they are as follows: …show more content…

5.1 Authentication servers: Individual users play an important role in any form of institution or organization but concerns are raised about the security. The network administrators clearly lay down a set of rules, regulations and protocols that an individual user has to agree accordingly upon which part of the resources and what class of service that the user can obtain. To overcome the problems mentioned above we can use the concept of authentication servers. These authentication servers are used to define the VLAN membership with the help of the user id rather than the older methods where MAC addresses or IP addresses are used. This greatly enhances the integration levels with the network operating system and provides more flexibility. The most valued advantage of the authentication servers is that the VLAN which the user uses can be carried anywhere without any respect to the workstation or …show more content…

”For example in a campus environment, professors working on the same project can send broadcast messages to one another without the necessity of belonging to the same department. This can reduce traffic if the multicasting capability of IP was previously used”[2]. The concept of Virtual work groups seems to be a good one in theory but in practice this does not work properly. 7.3 Security People from the same group can broadcast messages with assurance. Other users in different groups will not get these messages. The VLANs provide some extra security. The level of security among the host or workstations across the VLAN has increased over the period of time. It reduces the chances of an outsider or alien host from entering into the network an exercises a lot of control on issues like broadcast domain, firewall and access restriction. 7.4 More flexibility Users can plug their computers at the new locations and still be in the same VLAN. This is very hard when routers physically divide the network. 7.5 Partitioning off resources Its easy for the administrator to limit access to any equipment or servers he wishes to limit and they can be kept off in their own VLAN and the administrator can give access to other users in other VLANs selectively. 7.6

Get Access