Open Access Open Access  Restricted Access Subscription Access

Network Performance through Virtual Local Area Network (VLAN) Implementation & Enforcement on Network Security for Enterprise


Affiliations
1 Department of Computer Science and Information Technology Bishop Stuart University Mbarara Uganda, South Africa
2 Faculty of Economics, University of Gdansk, Poland
3 Universidad de Cádiz, Cadiz, Spain
4 University of Kerbala, Iraq
5 Federal University of Technology, Akure,, Nigeria
 

The aim of this paper was to enhance an enterprise network performance through VLAN implementation by simulating an existing LAN and rectify LAN using VLAN at, in two different scenarios. To rectify the drawbacks of existing enterprise network using virtual local area network. To simulate and compare the new (VLAN) and existing (NO_VLAN) enterprise network performance Virtual LAN technology can also be used to mitigate vulnerability surface for hackers by reducing the traffic request to servers, network visualization leads to ease of administration. There were more benefits of network virtualization through the implementation of VLAN. Thus, VLANs improved bandwidth utilization, power, speed and security. However, nowadays the high-speed network makes people to sense that network is a much more powerful tool to enhance in any business enterprise and make the company running more efficient. The main purpose of the network ability in the universities is to support learning, teaching, research and sharing of information. Unfortunately, even though the capacity of the bandwidth considered to be sufficient, the network can appear slow and inconsistent due to some factors like: the poor network design, the number of devices on the network, local network protocols (MAC Protocol) and misuse of the bandwidth by accessing to bandwidth hungry websites and applications (Dhurgham , 2018).

Keywords

VLAN, Network, Enterprises, Security
User
Notifications
Font Size

  • . Distribution of Network Services. International Journal of Science and Research (IJSR), 2608- 2615.
  • . Akpah, S., Mireku-Gyimah, D., & L Aryeh, F. (2017). Improving the Performance of a Network by Managing the Utilisation with squidGuard.
  • . Sehgal, U., Anu , & Prity. (2012). Virtual Local Area Networks Technologies Implementation and Developments in last few years classified by Port, MAC Address and LAN Based Protocol. International Journal of Advances in Engineering Research, 82-93.
  • . Abid , A. A., & Yousif, A. B. (2016). Designing a Resilient and High Performance Network. International Journal of Business Data Communications and Networking, 38-54.
  • . Adeleke, D. S. (2016). RELATIONSHIP BETWEEN INFORMATION LITERACY AND USE OF ELECTRONIC INFORMATION RESOURCES BY POSTGRADUATE STUDENTS OF THE UNIVERSITY OF IBADAN Library Philosophy & Practice.
  • . Agwu, C. O., & al. (2015). he Proposed Roles of VLAN and Inter-VLAN Routing in Effective Distribution of Network Services. International Journal of Science and Research (IJSR), 2608- 2615.
  • . Alimi, I. A., Mufutau, A. O., & Ebinowen, T. D. (2015). Cost-Effective and Resilient Large-Sized Campus Network Design. American Journal of Information Science and Computer Engineering, 21-32.
  • . Creswell, J. W. (2016). Research design: Qualitative, quantitative, and mixed method approaches. London: Sage Publications, Inc.
  • . Creswell, J. W. (2007). Qualitative Inquiry and Research Design: Choosing among Five Approaches. 3rd Edition. Thousand Oaks: Sage.
  • . Dhurgham , A. J.-K. (2018). Improving LAN Performance Based on IEEE802.1Q VLAN Switching Techniques. Journal of University of Babylon, 286-297.
  • . Fort, J. (2018, july 9). cyberpedia. Retrieved from paloaltonetworks.com: https://www.paloaltonetworks.com/solutions/initi atives/network-segmentation
  • . Grandhi, S. A. (2014). Method and system for improving responsiveness in exchanging frames in a wireless local area network. Washington D.C: U.S. Patent 8,830,846
  • . Gyan & Sadhana. (2018). Virtual Local Area Network (VLAN). greater noida: International Journal of Scientific Research Engineering & Technology (IJSRET). Retrieved from www.ijsret.org
  • . Gyan, P. P., & Sadhana, P. (2013). Virtual Local Area Network (VLAN) . International Journal of Scientific Research Engineering & Technology (IJSRET, 006-010.
  • . Hameed , A; Mian, A N. (2015). Finding efficient VLAN topology for better broadcast containment. International Conference on the Network of the Future, 1-6.
  • . Hameed, A., & A, N. (2015). Finding efficient VLAN topology for better broadcast containment. International Conference on the Network of the Future, 1-6.
  • . Isiaka , A. A., & Akeem , O. M. (2015). Enhancement of Network Performance of an enterprises network with VLAN. American Journal of Mobile Systems, Applications and Services, 82-93.
  • . Jasani , H., & Kulgachev, V. (2010). 802.11 networks performance evaluation using OPNET. ACM conference on Information technology education (SIGITE '10), 149-152.
  • . Jayan, I., & Kshama, S. B. (2017). STUDY ON VIRTUAL LAN USAGE IN CAMPUS NETWORKS. International Journal of Research in Computer & Information, 8-12.
  • . Jon, Z. (2018). What Is the Meaning of Sample Size? https://sciencing.com/meaning-sample-size5988804.html.
  • . Julian, F. (2018, july 09). Jisc community. The advantages of network segmentation.
  • . Kezar, A. (2014). Higher education change and social networks: A review of research. The Journal of Higher Education, 91-125.
  • . Louise, B., & Nghiem, S. (2018). Cost-effectiveness. Mechanical Circulatory and Respiratory Support,: https://www.sciencedirect.com/topics/engineerin g/target-population.
  • . Martinez Rivera, &. D. (2015). Between theory and practice: the importance of ICT in Higher Education as a tool for collaborative learning. london: Procedia-Social and Behavioral Sciences.
  • . Minlan, Y., Rexford, J., Xin, S., Sanjay, R., & Fe, N. (2011). A survey of virtual LAN usage in campus networks. IEEE Communications Magazine, 98- 103.
  • . Mohamed, E. M. (2008). Factors Affecting LAN Performance.
  • . Munam , A. S., Khurram , S., & Carsten , M. (2016). Network Performance Optimization. https://www.researchgate.net/publication/220791 517, 57-62.
  • . Neema-Abooki, P. A.-A. (2015). Usability of Computers in Teaching and Learning at Tertiarylevel Institutions in Uganda. African Journal of Teacher Education.
  • . Northforge Innovations. (2015). OPNET Modeler (currently, Riverbed Modeler). Retrieved 2019, from https://gonorthforge.com/opnet-modelercurrently-riverbed-modeler/
  • . Nweso, E. N., & al. (2015). he Proposed Roles of VLAN and Inter-VLAN Routing in Effective Distribution of Network Services. International Journal of Science and Research (IJSR), 2608- 2615.
  • . Ojiugwo, C. N., & al. (2015). he Proposed Roles of VLAN and Inter-VLAN Routing in Effective Distribution of Network Services. International Journal of Science and Research (IJSR), 2608- 2615.
  • . Olzak, T. (2018, april 18). infosec. Retrieved from infosecinstitute.com: https://resources.infosecinstitute.com/vlannetwork-chapter-5/
  • . ORIKE, K. U. (2017). Competency of Business Education Students in Information Communication Technology (ICT) for Learning in Tertiary Institutions in Rivers State.
  • . Penard, T. P. (2015). Internet adoption and usage patterns in Africa: Evidence from Cameroon. Technology in Society. Technology in Society, 71-80.
  • . Rawat, D. B. (2016). Recent advances on software defined wireless networking. SoutheastCon: IEEE.
  • . Rik, F. (2014, April 21). rikfarrow.com. Retrieved from VLAN INSECURITY": http:// rikfarrow.com/Network/net0103.html.
  • . Sarah Ali Abdullah. (2016). Simulation of Virtual LANs (VLANs) Using OPNET. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), Vol .11(Issue. 6), 67-80.
  • . Saul , M. (2018). Questionnaire. simplypsychology. Retrieved from https://www.simplypsychology.org/questionnaire s.html
  • . Saunders, M., Lewis, P., & Thornhill, A. (2015). Research Methods for Business Students. New York: Pearson.
  • . Sekaran, U., & Bougie, R. (2010). Research methods for business: A skill-building approach (5th ed.). Haddington: John Wiley & Sons.
  • . Syed, Z., Joshi, S., Vikram , R. R., & Kuriakose, J. (2014). A novel approach to naval architecture using 1G VLAN with RSTP. Eleventh International Conference on Wireless and Optical Communications Networks, 1-5.

Abstract Views: 291

PDF Views: 1




  • Network Performance through Virtual Local Area Network (VLAN) Implementation & Enforcement on Network Security for Enterprise

Abstract Views: 291  |  PDF Views: 1

Authors

Yakubu Ajiji Makeri
Department of Computer Science and Information Technology Bishop Stuart University Mbarara Uganda, South Africa
Giuseppe T. Cirella
Faculty of Economics, University of Gdansk, Poland
Francisco Javier Galas
Universidad de Cádiz, Cadiz, Spain
Hamid Mohsin Jadah
University of Kerbala, Iraq
Adetayo Olaniyi Adeniran
Federal University of Technology, Akure,, Nigeria

Abstract


The aim of this paper was to enhance an enterprise network performance through VLAN implementation by simulating an existing LAN and rectify LAN using VLAN at, in two different scenarios. To rectify the drawbacks of existing enterprise network using virtual local area network. To simulate and compare the new (VLAN) and existing (NO_VLAN) enterprise network performance Virtual LAN technology can also be used to mitigate vulnerability surface for hackers by reducing the traffic request to servers, network visualization leads to ease of administration. There were more benefits of network virtualization through the implementation of VLAN. Thus, VLANs improved bandwidth utilization, power, speed and security. However, nowadays the high-speed network makes people to sense that network is a much more powerful tool to enhance in any business enterprise and make the company running more efficient. The main purpose of the network ability in the universities is to support learning, teaching, research and sharing of information. Unfortunately, even though the capacity of the bandwidth considered to be sufficient, the network can appear slow and inconsistent due to some factors like: the poor network design, the number of devices on the network, local network protocols (MAC Protocol) and misuse of the bandwidth by accessing to bandwidth hungry websites and applications (Dhurgham , 2018).

Keywords


VLAN, Network, Enterprises, Security

References