Rakesh Dhar Rahul Tripathi 1 Virtual Local Area Network Logical group of network users Associate with ports on a switch Unique ID and NAME VLANs could span multiple switches 2 3 Mail Server Attendance Software ERP Tally CCTV System Telecom Data Backup Database Services 4 Easy to hide Network Stuck Lack of redundancy Broadcast issue 5 Broadcast domain become too large No security control for individual switch ports Inflexible because subnets are created only with addition of routers Net B Net A Router Net D Net C A flat network 6 Plan a efficient network. Solve Network Speed issue. Create Separate Vlan with different department & Services. Securing your network. Network Monitoring. Superior capability. 7 Create smaller broadcast domains by grouping users according to ◦ Location ◦ Department Improve security by preventing anyone in the same LAN from monitoring the network traffic (eavesdropping) 8 9 Receive Receive Switch Receive Router Receive Switch Receive Switch Receive Receive Receive BROADCAST 10 VLAN A Switch Router Switch Switch VLAN B VLAN C RECEIVE RECEIVE BROADCAST 11 Switches do not route data between VLANs Routing has to be done in routers, the same way as with ordinary subnets 12 Network monitoring - NMS software monitors network hardware to ensure all devices are operating correctly and are not near or at full capacity. Alerts can be sent to network administrators if a problem is detected. 13 Device detection - When a new device is connected to the network, the NMS detects it so that it can be recognized, configured, and added to the network. This is also called device provisioning. Performance analysis - An NMS can gauge the current and historical performance of a network. This includes the overall performance of the network as well as individual devices and connections. For example, the NMS may detect aspects of a network where throughput is nearing the maximum bandwidth available. The data can be used to optimize the flow of 14 Fault management - If a device or section of a network fails, an NMS may be able to automatically reroute traffic to limit downtime. This action may be performed on the fly or may be accomplished using a set of preconfigured rules. When a fault occurs, a network alert or notification is usually sent to one or more network administrators. 15 Thank You 16