... Once a tunnel is established, encryption protocols are used to CHAPTER 1: Network Fundamentals 24 separated logically through the use of a VLAN. VLAN databases can provide important details to ... became very clear that when hubs and switches only come in predefined capacities such as 5, 8, 12, 24, or even 36 ports, potentially we could be wasting resources by not fully utilizing all the ports ... companies expand and spread into different locations, it became difficult to have people in the same departments on the same LAN segments. Someone envisioned being able to reconfigure one physical device...