Title: Virtual Local Area Network (VLAN): Segmentation and Security

Year of Publication: Dec - 2017
Page Numbers: 78-89
Authors: Abbas Mehdizadeh, Kevin Suinggi, Mojtaba Mohammadpoor, Harlina Harun
Conference Name: The Third International Conference on Computing Technology and Information Management (ICCTIM2017)
- Greece

Abstract:


A virtual local area networks (VLANs) have recently expanded into an integral property of switched LAN solutions from every main LAN materiel seller. One of the motives for the attention placed on VLAN functionality now is the fast implementation of LAN switching that commenced two decades ago. Many more anxious organizations and companies are moving rapidly into networks featuring private port LAN switching designs. VLANs demonstrate an alternate solution to routers for broadcasting containment, since VLANs permit switches to also possess broadcast traffic. With the implementation of switches in continuity with VLANs, each network segment can have as few as one user, while broadcast domains can be as big as 1,000 users or probably even more. This paper presents what exactly a VLAN is and how VLAN memberships are implemented in a switched network. Membership in a VLAN can be based on MAC addresses, port members, IP addresses, IP multicast addresses and/or a combination of these aspects. VLANs are cost effective as well as time effective, can decrease the traffic of the network, and give an extra security. VLANs give upgraded system security. In a VLAN system environment, with various communicating areas, system administrator can have control over every port and client. A malevolent client can no more simply connect their station to any port of switch and sniffer the system movement utilizing a bundle sniffer. The system overseer controls every port and whatever assets it is permitted to utilize. VLANs confine delicate movement beginning from inside an undertaking department itself.