SlideShare a Scribd company logo
1 of 21
July 19, 2022 1
VIRTUAL LANS (VLANS)
VLAN introduction
VLANs logically segment switched networks based on the functions, project
teams, or applications of the organization regardless of the physical location
or connections to the network.
All workstations and servers used by a particular workgroup share the same
VLAN, regardless of the physical connection or location.
VLAN introduction
A workstation in a VLAN group is restricted to communicating with file
servers in the same VLAN group.
VLAN introduction
VLANs function by logically segmenting the network into different
broadcast domains so that packets are only switched between ports that
are designated for the same VLAN.
Routers in VLAN topologies
provide broadcast filtering,
security, and traffic flow
management.
VLAN introduction
VLANs address scalability, security, and network management.
Switches may not bridge any traffic between VLANs, as this would violate
the integrity of the VLAN broadcast domain.
Traffic should only be routed between VLANs.
Broadcast domains with VLANs and routers
A VLAN is a broadcast domain created by one or more switches.
Broadcast domains with VLANs and routers
Layer 3 routing allows the router to send packets to the three different
broadcast domains.
Broadcast domains with VLANs and routers
Implementing VLANs on a switch causes the following to occur:
 The switch maintains a separate bridging table for each VLAN.
 If the frame comes in on a port in VLAN 1, the switch searches the bridging table for
VLAN 1.
 When the frame is received, the switch adds the source address to the bridging table if
it is currently unknown.
 The destination is checked so a forwarding decision can be made.
 For learning and forwarding the search is made against the address table for that
VLAN only.
VLAN operation
Each switch port could be assigned to a different VLAN.
Ports assigned to the same VLAN share broadcasts.
Ports that do not belong to that VLAN do not share these broadcasts.
VLAN operation
Users attached to the same shared segment, share the bandwidth of that
segment.
Each additional user attached to the shared medium means less bandwidth
and deterioration of network performance.
VLANs offer more bandwidth to users than a shared network.
The default VLAN for every port in the switch is the management VLAN.
The management VLAN is always VLAN 1 and may not be deleted. All
other ports on the switch may be reassigned to alternate VLANs.
VLAN operation
Dynamic VLANs allow for membership based on the MAC address of the
device connected to the switch port.
As a device enters the network, it queries a database within the switch for a
VLAN membership.
VLAN operation
In port-based or port-centric VLAN membership, the port is assigned to a
specific VLAN membership independent of the user or system attached to
the port.
All users of the same
port must be in the same
VLAN.
VLAN operation
Network administrators are responsible for configuring VLANs both
manually and statically.
Benefits of VLANs
The key benefit of VLANs is that they permit the network administrator to
organize the LAN logically instead of physically.
VLAN types
There are three basic VLAN memberships for determining and controlling
how a packet gets assigned: -
 Port-based VLANs
 MAC address based
 Protocol based VLANs
The frame headers are encapsulated or modified to reflect a VLAN ID before
the frame is sent over the link between switches.
Before forwarding to the destination device, the frame header is changed
back to the original format.
VLAN types
Port-based VLANs
MAC address based VLANs
Protocol based VLANs
Membership by Port
Membership by MAC-Addresses
VLAN types
The number of VLANs in a switch vary depending on several factors:
 Traffic patterns
 Types of applications
 Network management needs
 Group commonality
VLAN types
An important consideration in defining the size of the switch and the
number of VLANs is the IP addressing scheme.
Because a one-to-one correspondence between VLANs and IP subnets
is strongly recommended, there can be no more than 254 devices in
any one VLAN.
It is further recommended that VLANs should not extend outside of the
Layer 2 domain of the distribution switch.
VLAN types
There are two major methods of frame tagging, Inter-Switch Link (ISL) and
802.1Q.
ISL used to be the most common, but is now being replaced by 802.1Q
frame tagging.

More Related Content

What's hot

What's hot (20)

Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
VLAN
VLANVLAN
VLAN
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus network
 
Vlan
VlanVlan
Vlan
 
Network cable
Network cableNetwork cable
Network cable
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
BGP Path Selection & Attributes BGP Weight & BGP AS-Path Prepending
BGP Path Selection & Attributes BGP Weight & BGP AS-Path PrependingBGP Path Selection & Attributes BGP Weight & BGP AS-Path Prepending
BGP Path Selection & Attributes BGP Weight & BGP AS-Path Prepending
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ip
 
WLAN
WLANWLAN
WLAN
 
IPv6
IPv6IPv6
IPv6
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 
WLAN
WLANWLAN
WLAN
 
STP Protection
STP ProtectionSTP Protection
STP Protection
 
Introduction to vxlan
Introduction to vxlanIntroduction to vxlan
Introduction to vxlan
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 

Similar to VIRTUAL LANS (VLANS).pptx

Similar to VIRTUAL LANS (VLANS).pptx (20)

4270 vlan-tutorial
4270 vlan-tutorial4270 vlan-tutorial
4270 vlan-tutorial
 
4270-vlan-tutorial.ppt
4270-vlan-tutorial.ppt4270-vlan-tutorial.ppt
4270-vlan-tutorial.ppt
 
Benefits of vlan
Benefits of vlanBenefits of vlan
Benefits of vlan
 
Vlan configuration in medium sized network
Vlan configuration in medium sized networkVlan configuration in medium sized network
Vlan configuration in medium sized network
 
Vlan
VlanVlan
Vlan
 
VLAN (virtual local area network)
VLAN (virtual local area network)VLAN (virtual local area network)
VLAN (virtual local area network)
 
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
VLAN -VIRTUAL LAN -COMPUTER NETWORKSVLAN -VIRTUAL LAN -COMPUTER NETWORKS
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
 
Vlan
VlanVlan
Vlan
 
Virtual lan
Virtual lanVirtual lan
Virtual lan
 
Vlan.pdf
Vlan.pdfVlan.pdf
Vlan.pdf
 
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram SnehiVLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
 
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptxLecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
 
Virtual local area networks
Virtual local area networksVirtual local area networks
Virtual local area networks
 
Vlan
VlanVlan
Vlan
 
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdfW3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
Virtual lan’s (vlan’s)
Virtual lan’s (vlan’s)Virtual lan’s (vlan’s)
Virtual lan’s (vlan’s)
 
28 VLAN.pptx
28 VLAN.pptx28 VLAN.pptx
28 VLAN.pptx
 
mod8-VLANs.ppt
mod8-VLANs.pptmod8-VLANs.ppt
mod8-VLANs.ppt
 

More from KISHOYIANKISH

4. Data Manipulation.ppt
4. Data Manipulation.ppt4. Data Manipulation.ppt
4. Data Manipulation.pptKISHOYIANKISH
 
Lect 7a - Innovative Companies.ppt
Lect 7a - Innovative Companies.pptLect 7a - Innovative Companies.ppt
Lect 7a - Innovative Companies.pptKISHOYIANKISH
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.pptKISHOYIANKISH
 
Lect 6- The Value of an Invention.ppt
Lect 6- The Value of an Invention.pptLect 6- The Value of an Invention.ppt
Lect 6- The Value of an Invention.pptKISHOYIANKISH
 
Lect 7a - Innovation and Enterpreneureship.ppt
Lect 7a - Innovation and Enterpreneureship.pptLect 7a - Innovation and Enterpreneureship.ppt
Lect 7a - Innovation and Enterpreneureship.pptKISHOYIANKISH
 
Lect 3- Technology Transfer Processes.ppt
Lect 3- Technology Transfer Processes.pptLect 3- Technology Transfer Processes.ppt
Lect 3- Technology Transfer Processes.pptKISHOYIANKISH
 
Lect 5a- Diffusion of Innovations-1.ppt
Lect 5a- Diffusion of Innovations-1.pptLect 5a- Diffusion of Innovations-1.ppt
Lect 5a- Diffusion of Innovations-1.pptKISHOYIANKISH
 
Lesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptxLesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptxKISHOYIANKISH
 
Designing network topology.pptx
Designing network topology.pptxDesigning network topology.pptx
Designing network topology.pptxKISHOYIANKISH
 
Lesson 7 - Structured cabling.ppt
Lesson 7 - Structured cabling.pptLesson 7 - Structured cabling.ppt
Lesson 7 - Structured cabling.pptKISHOYIANKISH
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptxKISHOYIANKISH
 

More from KISHOYIANKISH (11)

4. Data Manipulation.ppt
4. Data Manipulation.ppt4. Data Manipulation.ppt
4. Data Manipulation.ppt
 
Lect 7a - Innovative Companies.ppt
Lect 7a - Innovative Companies.pptLect 7a - Innovative Companies.ppt
Lect 7a - Innovative Companies.ppt
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
 
Lect 6- The Value of an Invention.ppt
Lect 6- The Value of an Invention.pptLect 6- The Value of an Invention.ppt
Lect 6- The Value of an Invention.ppt
 
Lect 7a - Innovation and Enterpreneureship.ppt
Lect 7a - Innovation and Enterpreneureship.pptLect 7a - Innovation and Enterpreneureship.ppt
Lect 7a - Innovation and Enterpreneureship.ppt
 
Lect 3- Technology Transfer Processes.ppt
Lect 3- Technology Transfer Processes.pptLect 3- Technology Transfer Processes.ppt
Lect 3- Technology Transfer Processes.ppt
 
Lect 5a- Diffusion of Innovations-1.ppt
Lect 5a- Diffusion of Innovations-1.pptLect 5a- Diffusion of Innovations-1.ppt
Lect 5a- Diffusion of Innovations-1.ppt
 
Lesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptxLesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptx
 
Designing network topology.pptx
Designing network topology.pptxDesigning network topology.pptx
Designing network topology.pptx
 
Lesson 7 - Structured cabling.ppt
Lesson 7 - Structured cabling.pptLesson 7 - Structured cabling.ppt
Lesson 7 - Structured cabling.ppt
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptx
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

VIRTUAL LANS (VLANS).pptx

  • 1. July 19, 2022 1 VIRTUAL LANS (VLANS)
  • 2. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless of the physical location or connections to the network. All workstations and servers used by a particular workgroup share the same VLAN, regardless of the physical connection or location.
  • 3. VLAN introduction A workstation in a VLAN group is restricted to communicating with file servers in the same VLAN group.
  • 4. VLAN introduction VLANs function by logically segmenting the network into different broadcast domains so that packets are only switched between ports that are designated for the same VLAN. Routers in VLAN topologies provide broadcast filtering, security, and traffic flow management.
  • 5. VLAN introduction VLANs address scalability, security, and network management. Switches may not bridge any traffic between VLANs, as this would violate the integrity of the VLAN broadcast domain. Traffic should only be routed between VLANs.
  • 6. Broadcast domains with VLANs and routers A VLAN is a broadcast domain created by one or more switches.
  • 7. Broadcast domains with VLANs and routers Layer 3 routing allows the router to send packets to the three different broadcast domains.
  • 8. Broadcast domains with VLANs and routers Implementing VLANs on a switch causes the following to occur:  The switch maintains a separate bridging table for each VLAN.  If the frame comes in on a port in VLAN 1, the switch searches the bridging table for VLAN 1.  When the frame is received, the switch adds the source address to the bridging table if it is currently unknown.  The destination is checked so a forwarding decision can be made.  For learning and forwarding the search is made against the address table for that VLAN only.
  • 9. VLAN operation Each switch port could be assigned to a different VLAN. Ports assigned to the same VLAN share broadcasts. Ports that do not belong to that VLAN do not share these broadcasts.
  • 10. VLAN operation Users attached to the same shared segment, share the bandwidth of that segment. Each additional user attached to the shared medium means less bandwidth and deterioration of network performance. VLANs offer more bandwidth to users than a shared network. The default VLAN for every port in the switch is the management VLAN. The management VLAN is always VLAN 1 and may not be deleted. All other ports on the switch may be reassigned to alternate VLANs.
  • 11. VLAN operation Dynamic VLANs allow for membership based on the MAC address of the device connected to the switch port. As a device enters the network, it queries a database within the switch for a VLAN membership.
  • 12. VLAN operation In port-based or port-centric VLAN membership, the port is assigned to a specific VLAN membership independent of the user or system attached to the port. All users of the same port must be in the same VLAN.
  • 13. VLAN operation Network administrators are responsible for configuring VLANs both manually and statically.
  • 14. Benefits of VLANs The key benefit of VLANs is that they permit the network administrator to organize the LAN logically instead of physically.
  • 15. VLAN types There are three basic VLAN memberships for determining and controlling how a packet gets assigned: -  Port-based VLANs  MAC address based  Protocol based VLANs The frame headers are encapsulated or modified to reflect a VLAN ID before the frame is sent over the link between switches. Before forwarding to the destination device, the frame header is changed back to the original format.
  • 16. VLAN types Port-based VLANs MAC address based VLANs Protocol based VLANs
  • 19. VLAN types The number of VLANs in a switch vary depending on several factors:  Traffic patterns  Types of applications  Network management needs  Group commonality
  • 20. VLAN types An important consideration in defining the size of the switch and the number of VLANs is the IP addressing scheme. Because a one-to-one correspondence between VLANs and IP subnets is strongly recommended, there can be no more than 254 devices in any one VLAN. It is further recommended that VLANs should not extend outside of the Layer 2 domain of the distribution switch.
  • 21. VLAN types There are two major methods of frame tagging, Inter-Switch Link (ISL) and 802.1Q. ISL used to be the most common, but is now being replaced by 802.1Q frame tagging.