Nabilat Bolanle Basheer on LinkedIn: #day12learningchallenge #learning #networking (2024)

Nabilat Bolanle Basheer

3MTT Cybersecurity Analyst | Protecting Data and Networks | Cybersecurity Enthusiast | Quality Control & Assurance Analyst | Biochemist

  • Report this post

#Day12LearningChallengeVLAN is a custom network which is created from one or more local area networks. It enables a group of devices available in multiple networks to be combined into one logical network. The result becomes a virtual LAN that is administered like a physical LAN. How VLAN worksVLANs in networking are identified by a number.A Valid range is 1-4094. On a VLAN switch, you assign ports with the proper VLAN number.The switch then allows data which needs to be sent between various ports having the same VLAN.Since almost all networks are larger than a single switch, there should be a way to send traffic between two switches.One simple and easy way to do this is to assign a port on each network switch with a VLAN and run a cable between them.VLAN RangesHere are the important ranges of VLAN:VLAN 0-4095: Reserved VLAN, which cannot be seen or used.VLAN 1:This is a default VLAN of switches. You cannot delete or edit this VLAN, but it can be used.VLAN 2-1001:It is a normal VLAN range. You can create, edit, and delete it.VLAN 1002-1005:These ranges are CISCO defaults for token rings and FDDI. You cannot delete this VLAN.VLAN 1006-4094:It is an extended range of VLANs.Types of VLAN1. Port-Based VLANPort-based VLANs groups virtual local area network by port. In this type of virtual LAN, a switch port can be configured manually to a member of VLAN. Devices that are connected to this port will belong to the same broadcast domain that is because all other ports are configured with a similar VLAN number. The challenge of this type of network is to know which ports are appropriate to each VLAN. 2. Protocol Based VLANThis type of VLAN processes traffic based on a protocol that can be used to define filtering criteria for tags, which are untagged packets. In this Virtual Local Area Network, the layer-3 protocol is carried by the frame to determine VLAN membership. It works in multi-protocol environments. This method is not practical in a predominately IP based network.3. MAC Based VLANMAC Based VLAN allows incoming untagged packets to be assigned virtual LAN and, thereby, classify traffic depending on the packet source address. You define a Mac address to VLAN mapping by configuring mapping the entry in MAC to the VLAN table.This entry is specified using source Mac address proper VLAN ID. The configurations of tables are shared among all device ports.Application/Purpose of VLANVLAN is used when you have 200+ devices on your LAN.It is helpful when you have a lot of traffic on a LAN.VLAN is ideal when a group of users need more security or being slow down by many broadcasts.It is used when users are not on one broadcast domain.Make a single switch into multiple switches.CyberPatron Network #learning#Networking

3

2 Comments

Like Comment

Muminat Abdulmajeed

Chemist, Educator, A.I Engineer.

2d

  • Report this comment

Love this

Like Reply

1Reaction

To view or add a comment, sign in

More Relevant Posts

  • Nabilat Bolanle Basheer

    3MTT Cybersecurity Analyst | Protecting Data and Networks | Cybersecurity Enthusiast | Quality Control & Assurance Analyst | Biochemist

    • Report this post

    #Day14learningChallengeThis about reviewing all the previous topics learnt and practising configurations in Cisco Packet Tracer. And I did that. I only tool online quizzes to access my knowledge on what I have learnt so far. CyberPatron Network #Learning#Networking

    Like Comment

    To view or add a comment, sign in

  • Nabilat Bolanle Basheer

    3MTT Cybersecurity Analyst | Protecting Data and Networks | Cybersecurity Enthusiast | Quality Control & Assurance Analyst | Biochemist

    • Report this post

    #Day13LearningChallengeThe challenge is learning about DHCP (Dynamic Host Configuration Protocol) Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. Benefits of DHCP* Centralized management of IP addresses.* Centralized and automated TCP/IP configuration.* Ease of adding new clients to a network.*Reuse of IP addresses reduces the total number of IP addresses that are required.* Simple reconfiguration of the IP address space on the DHCP server without needing to reconfigure each client.* The DHCP protocol gives the network administrator a method to configure the network from a centralized area. I also learnt about the DHCP handshake which include Discover, Offer, Request and Acknowledge. I also learnt about the configuration of DHCP server using the Cisco Packet Tracer. CyberPatron Network #Learning#Networking

    • Nabilat Bolanle Basheer on LinkedIn: #day12learningchallenge #learning #networking (7)
    • Nabilat Bolanle Basheer on LinkedIn: #day12learningchallenge #learning #networking (8)

    7

    Like Comment

    To view or add a comment, sign in

  • Nabilat Bolanle Basheer

    3MTT Cybersecurity Analyst | Protecting Data and Networks | Cybersecurity Enthusiast | Quality Control & Assurance Analyst | Biochemist

    • Report this post

    #Day11learningchallengeA wireless network is a computer network that uses wireless data connections between network nodes. Wireless networking allows homes, telecommunications networks and business installations to avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.Wireless network security is a subset of network security that involves designing, implementing, and ensuring security on wireless computer networks to protect them from unauthorized access and breaches. It involves strategies designed to preserve the confidentiality, integrity, and availability of wireless networks and their resources.Types of Wireless Network Security Protocols1. Wired Equivalent Privacy (WEP)WEP developed in 1997, was designed to secure wireless networks using encryption and access restriction. However, its reliance on the insecure RC4 encryption and shared key authentication made networks vulnerable to attack.2. Wi-Fi Protected Access (WPA)WPA, launched in 2003, emerged as an effective successor to WEP, addressing its flaws. WPA uses the temporal key integrity protocol (TKIP) encryption to improve key management and integrity checks. It has two modes: WPA-Personal for home networks and WPA-Enterprise for enterprises that use RADIUS servers. WPA’s 128-bit encryption provides enhanced protection over WEP’s weaker encryption standards. 3. Wi-Fi Protected Access II (WPA2)WPA2, released in 2004, is the most popular wireless security standard that uses the AES encryption technique to provide strong security. Its advantages over WPA include better administration and lower vulnerability to assaults. WPA2 is widely adopted as the industry standard, ensuring device interoperability. 4. Wi-Fi Protected Access III (WPA3)WPA3, launched in 2018, provides greater encryption, protection against dictionary brute force attacks, and simpler device configuration via Wi-Fi Easy Connect. WPA3 comes in three types: WPA3-Personal for home use, WPA3-Enterprise for organizational settings, and Wi-Fi Enhanced Open for non-password-protected networks. How to secure Wi-Fi Networks1. Use encryption methods2.Activate the router firewall3. Protect your service set identifier (SSID)4. Utilize virtual private networks (VPNs). 5. Deploy a wireless security softwareCyberPatron Network #Networking#Learning

    • Nabilat Bolanle Basheer on LinkedIn: #day12learningchallenge #learning #networking (11)
    • Nabilat Bolanle Basheer on LinkedIn: #day12learningchallenge #learning #networking (12)

    2

    Like Comment

    To view or add a comment, sign in

  • Nabilat Bolanle Basheer

    3MTT Cybersecurity Analyst | Protecting Data and Networks | Cybersecurity Enthusiast | Quality Control & Assurance Analyst | Biochemist

    • Report this post

    #Day10learningChallengeThe challenge is learning how to configure a switch using Cisco Packet Tracer. I learnt the command for configuring the switch and I successful configure the switch and connected four PCs to the switch. I enjoyed learning new things everyday. The learning challenge has improved my knowledge in networking. CyberPatron Network #Learning#Networking

    Like Comment

    To view or add a comment, sign in

  • Nabilat Bolanle Basheer

    3MTT Cybersecurity Analyst | Protecting Data and Networks | Cybersecurity Enthusiast | Quality Control & Assurance Analyst | Biochemist

    • Report this post

    #Day9learningChallengeI learnt about the commands and configuration of router using Cisco Packet Tracer. I connected a router to two PCs and I assigned IP addresses to each PC. I selected the router and choose CLI (Command Line Interface) to do type in the commads for the configuration. Upon successful connection, the arrow color will change from red to green. CyberPatron Network #Day9#learningeveryday#networkink

    Like Comment

    To view or add a comment, sign in

  • Nabilat Bolanle Basheer

    3MTT Cybersecurity Analyst | Protecting Data and Networks | Cybersecurity Enthusiast | Quality Control & Assurance Analyst | Biochemist

    • Report this post

    I am happy to have been accepted into the Women Techsters cohort 3.5 bootcamp. I look forward to improving my knowledge and skills and also interacting with other fellows as well. Tech4Dev #WomenTechsters#WTBootcampCohort2024

    • Nabilat Bolanle Basheer on LinkedIn: #day12learningchallenge #learning #networking (17)
    • Nabilat Bolanle Basheer on LinkedIn: #day12learningchallenge #learning #networking (18)

    8

    5 Comments

    Like Comment

    To view or add a comment, sign in

  • Nabilat Bolanle Basheer

    3MTT Cybersecurity Analyst | Protecting Data and Networks | Cybersecurity Enthusiast | Quality Control & Assurance Analyst | Biochemist

    • Report this post

    Alhamdulillah it is another year to celebrate my existence on the surface of the earth. Today I celebrate another year of wonderful growth, learning and wonderful experiences. I want to celebrate the amazing woman that I am becoming. You might not be there yet but you will definitely reach there and this is to me saying never give up. Cheers to amazing years ahead. I pray for long life, peace, prosperity and everlasting love with the love of my life. Happy birthday to me.

    • Nabilat Bolanle Basheer on LinkedIn: #day12learningchallenge #learning #networking (22)
    • Nabilat Bolanle Basheer on LinkedIn: #day12learningchallenge #learning #networking (23)

    4

    2 Comments

    Like Comment

    To view or add a comment, sign in

  • Nabilat Bolanle Basheer

    3MTT Cybersecurity Analyst | Protecting Data and Networks | Cybersecurity Enthusiast | Quality Control & Assurance Analyst | Biochemist

    • Report this post

    #Day8learningChallengeThe challenge is learning the steps to set up and configure a home network. The steps include:* Choose your network type (wired, wireless or hybrid network) * Select the right equipment, and I choose router * Configure the router. * Connect the devices. I connected my smartphone and laptop, to the network by selecting the network name and entering the password.* Ensure that all devices are connected to the network and can access the internet.CyberPatron Network #learningcybersecurity#learningisfun

    1

    Like Comment

    To view or add a comment, sign in

  • Nabilat Bolanle Basheer

    3MTT Cybersecurity Analyst | Protecting Data and Networks | Cybersecurity Enthusiast | Quality Control & Assurance Analyst | Biochemist

    • Report this post

    Detailed explanation on network components and devices. #Alwayslearning

    Like Comment

    To view or add a comment, sign in

Nabilat Bolanle Basheer on LinkedIn: #day12learningchallenge #learning #networking (28)

Nabilat Bolanle Basheer on LinkedIn: #day12learningchallenge #learning #networking (29)

  • 41 Posts

View Profile

Follow

Explore topics

  • Sales
  • Marketing
  • Business Administration
  • HR Management
  • Content Management
  • Engineering
  • Soft Skills
  • See All
Nabilat Bolanle Basheer on LinkedIn: #day12learningchallenge #learning #networking (2024)
Top Articles
Latest Posts
Article information

Author: Trent Wehner

Last Updated:

Views: 6017

Rating: 4.6 / 5 (76 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Trent Wehner

Birthday: 1993-03-14

Address: 872 Kevin Squares, New Codyville, AK 01785-0416

Phone: +18698800304764

Job: Senior Farming Developer

Hobby: Paintball, Calligraphy, Hunting, Flying disc, Lapidary, Rafting, Inline skating

Introduction: My name is Trent Wehner, I am a talented, brainy, zealous, light, funny, gleaming, attractive person who loves writing and wants to share my knowledge and understanding with you.