Full Paper View Go Back
Virtual Local Area Network Technology
Shivappa M Metagar1 , R.G.Hiregouder 2 , Hare Ram Sing3
Section:Review Paper, Product Type: Journal
Vol.1 ,
Issue.4 , pp.12-16, Sep-2013
Online published on Oct 30, 2013
Copyright © Shivappa M Metagar, R.G.Hiregouder , Hare Ram Sing . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Shivappa M Metagar, R.G.Hiregouder , Hare Ram Sing, “Virtual Local Area Network Technology,” International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.12-16, 2013.
MLA Style Citation: Shivappa M Metagar, R.G.Hiregouder , Hare Ram Sing "Virtual Local Area Network Technology." International Journal of Scientific Research in Network Security and Communication 1.4 (2013): 12-16.
APA Style Citation: Shivappa M Metagar, R.G.Hiregouder , Hare Ram Sing, (2013). Virtual Local Area Network Technology. International Journal of Scientific Research in Network Security and Communication, 1(4), 12-16.
BibTex Style Citation:
@article{Metagar_2013,
author = {Shivappa M Metagar, R.G.Hiregouder , Hare Ram Sing},
title = {Virtual Local Area Network Technology},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {9 2013},
volume = {1},
Issue = {4},
month = {9},
year = {2013},
issn = {2347-2693},
pages = {12-16},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=87},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=87
TI - Virtual Local Area Network Technology
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Shivappa M Metagar, R.G.Hiregouder , Hare Ram Sing
PY - 2013
DA - 2013/10/30
PB - IJCSE, Indore, INDIA
SP - 12-16
IS - 4
VL - 1
SN - 2347-2693
ER -
Abstract :
VLANs are one of the important technologies is widely used in enterprise networks to improve Ethernet capability and support network policies. However, manuals and textbooks, offer very little information about how VLANs are actually used in practice in different fields. Through discussions with network administrators and analysis of configuration data, we describe how three university campuses and one academic department use VLANs to achieve a variety of goals. We argue that VLANs are ill-suited to some of these goals (e.g., VLANs are often used to realize access control policies, but constrain the types of policies that can be expressed). Furthermore, the use of VLANs leads to significant complexity in the configuration of network devices.
Key-Words / Index Term :
Computer, Virtual Devices, LAN, End users
References :
[1]. Umesh Kumar Singh, ShivlalMewada, Lokesh Laddhani & Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Volume-9, No.4, pp (106-111), April 2011.
[2]. IEEE, ``Draft Standard for Virtual Bridge Local Area Networks,'' P802.1Q/D1, May 16, 1997, This is the draft standard for VLAN's which covers implementation issues of Layer 1 and 2 VLAN's.
[3]. Mathias Hein, David Griffiths, Orna Berry, ``Switching Technology in the Local Network: From LAN to Switched LAN to Virtual LAN,'' February 1997,Textbook explanation of what VLAN's are and their types.
[4]. Susan Biagi, "Virtual LANs," Network VAR v4 n1 p. 10- 12, January 1996, An Overview of VLAN's, advantages, and disadvantages.
[5]. David J. Buerger, ``Virtual LAN cost savings will stay virtual untilnetworking's next era,'' Network World, March 1995, A short summary on VLAN's.
[6]. IEEE, ``Traffic Class Expediting and Dynamic Multicast Filtering,'' 802.1p/D6, April 1997,This is the standard for implementing priority and dynamic multicasts. Implementation of priority in VLAN's is based on this standard.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.