2019
DOI: 10.1007/978-981-13-5992-7_2
|View full text |Cite
|
Sign up to set email alerts
|

Traffic Management and Security in Wired Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…Although the use of VLANs is a widespread solution in conventional corporate networks, it poses some disadvantages such as a more complex network addressing design and the potential presence of vulnerable VLAN-related protocols such as Dynamic Trunk Protocol (DTP), VLAN Trunking Protocol (VTP), or Generic VLAN Registration Protocol (GVRP). To overcome some of these drawbacks, PVLANs have been used as an alternative in order to secure and optimise layer 2 communications both in industrial [ 22 ] and corporate networks [ 23 ]. In addition, PVLANs have been proposed as an effective network isolation technique to protect IoT environments [ 24 ].…”
Section: Related Workmentioning
confidence: 99%
“…Although the use of VLANs is a widespread solution in conventional corporate networks, it poses some disadvantages such as a more complex network addressing design and the potential presence of vulnerable VLAN-related protocols such as Dynamic Trunk Protocol (DTP), VLAN Trunking Protocol (VTP), or Generic VLAN Registration Protocol (GVRP). To overcome some of these drawbacks, PVLANs have been used as an alternative in order to secure and optimise layer 2 communications both in industrial [ 22 ] and corporate networks [ 23 ]. In addition, PVLANs have been proposed as an effective network isolation technique to protect IoT environments [ 24 ].…”
Section: Related Workmentioning
confidence: 99%