SlideShare a Scribd company logo
1 of 42
Download to read offline
LAN
 A Local Area Network (LAN) was originally
defined as a network of computers located within the
same area
 Local Area Networks are defined as a single
broadcast domain. This means that if a user
broadcasts information on his/her LAN, the broadcast
will be received by every other user on the LAN.
 Broadcasts are prevented from leaving a LAN by
using a router. The disadvantage of this method is
routers usually take more time to process incoming
data compared to a bridge or a switch
VLAN
A VLAN is a logical group of network devices
that appears to be on the same LAN
Configured as if they are attached to the same
physical connection even if they are located on
a number of different LAN segments.
Logically segment LAN into different
broadcast domains.
VLAN
 VLANs can logically segment users into different
subnets (broadcast domains)
 Broadcast frames are only switched on the same
VLAN ID.
 This is a logical segmentation and not a physical one,
workstations do not have to be physically located
together. Users on different floors of the same
building, or even in different buildings can now
belong to the same LAN.
LAN VS VLAN
 By using switches, we
can assign computer
on different floors to
VLAN1, VLAN2, and
VLAN3
 Now, logically, a
department is spread
across 3 floors even
though they are
physically located on
different floors
VLAN Configurations
STATIC VLANS
 Static membership VLANs are called port-based and port-
centric membership VLANs.
 This is the most common method of assigning ports to
VLANs.
 As a device enters the network, it automatically assumes the
VLAN membership of the port to which it is attached.
 There is a default VLAN, on Cisco switches that is VLAN 1.
Default
VLAN 1
Default
VLAN 1
Configured
Vlan 10
DYNAMIC VLANS
 Dynamic membership VLANs are created through
network management software
Dynamic VLANs allow for membership based on the
MAC address of the device connected to the switch port.
As a device enters the network, it queries a database
within the switch for a VLAN membership
CONFIGURING PORTS
 Access ports are used when:
 Only a single device is connected to the port
 Multiple devices (hub) are connected to the port,
all belonging to the same VLAN
 Another switch is connected to this interface, but
this link is only carrying a single VLAN (non-
trunk link).
 Trunk ports are used when:
 Another switch is connected to this interface, and
this link is carrying multiple VLANs(trunk link).
• Switch(config-if)switchport mode
[access|trunk]
• An access port means that the port
(interface) can only belong to a single
VLAN.
Switch(config-if)switchport mode access
Switch(config-if)switchport mode trunk
ACCESS PORTS
TRUNK PORT
VLAN TRUNKING
 In a switched network, a trunk is a point-to-point link that
supports several VLANs.
 The purpose of a trunk is to conserve ports when a link
between two devices that implement VLANs is created.
VLAN TECHNIQUES
Two techniques
Frame Filtering--examines particular
information about each frame (MAC
address or layer 3 protocol type)
Frame Tagging--places a unique
identifier in the header of each frame as
it is forwarded throughout the network
backbone.
FRAME FILTERING
 Users can be logically group via software
based on:
– port number
– MAC address
– Ip subnet
– protocol being used
• Membership by Port
• Membership by MAC
Address
• Membership by IP
Subnet Address
port vlan
1 1
2 1
3 2
4 1
disadvantage of this
method is that it
does not allow for
user mobility.
• Membership by Port
• Membership by MAC
Address
• Membership by IP Subnet
Address
MAC Address vlan
1212354145121 1
2389234873743 1
3045834758445 2
5483573475843 1
Advantage :
• no reconfiguration needed
Disadvantage :
• VLAN membership must be
assigned initially.
• performance degradation as
members of different VLANs coexist
on a single switch port
• Membership by Port
• Membership by MAC
Address
• Membership by IP
Subnet Address
IP Subnet vlan
23.2.24 1
26.21.35 2
Advantage:
• Good for application-based VLAN
strategy
• User can move workstations
• eliminate the need for frame tagging
VLAN TAGGING
 VLAN frame tagging was specifically developed for switched
communications.
 Frame tagging places a unique identifier in the header of each
frame as it is forwarded throughout the network backbone.
 The identifier is understood and examined by each switch
before any broadcasts or transmissions are made to other
switches, routers, or end stations.
 When the frame exits the network backbone, the switch
removes the identifier before the frame is transmitted to the
target end station.
The two most common tagging schemes for
Ethernet segments are
ISL (Inter-Switch Link)
802.1Q – An IEEE standard
ISL (Frame Encapsulation)
 An Ethernet frame is encapsulated with a header that
transports VLAN IDs.
 The ISL encapsulation is added by the switch before
sending across the trunk.
 The switch removes the ISL encapsulation before
sending it out a non trunk link.
 It adds overhead to the frame as a 26-byte header
containing a 10-bit VLAN ID.
 In addition, a 4-byte cyclic redundancy check
(CRC) is appended to the end of each frame.
 This CRC is in addition to any frame checking
that the Ethernet frame requires.
IEEE 802.1Q
Significantly less overhead than the ISL.
802.1Q inserts only an additional 4 bytes
into the Ethernet frame.
The 802.1Q tag is inserted by the switch
before sending across the trunk.
The switch removes the 802.1Q tag
before sending it out a non trunk link.
 Trunking protocols were developed to effectively
manage the transfer of frames from different VLANs
on a single physical link.
 The trunking protocols establish agreement for the
distribution of frames to the associated ports at both
ends of the trunk.
 VLAN tagging information is added by the switch
before it is sent across the trunk and removed by the
switch before it is sent down a non-trunk link
CONFIGURING TRUNKING
SwitchA(config-if)switchport mode trunk
SwitchB(config-if)switchport mode trunk encapsulation
dot1q
SwitchB(config-if)switchport mode trunk
 If SwitchA can only be a 802.1.Q trunk and SwitchB can be either
ISL or 802.1Q trunk, configure SwitchB to be 802.1Q.
 On switches that support both 802.1Q and ISL, the switchport
trunk encapsulation command must be done BEFORE the
switchport mode trunk command.
VLAN Configuration
• Configuring VLANs under Linux is a process similar to
configuring regular Ethernet interfaces. The main difference is
you first must attach each VLAN to a physical device. This is
accomplished with the vconfig utility. If the trunk device itself
is configured, it is treated as native. For example, these
commands define VLANs 2-4 on device eth0:
• vconfig add eth0 2
• vconfig add eth0 3
• vconfig add eth0 4
Switch Configuration
• Before you begin configuration, make sure
the IP address of the switch falls within the
new management subnet. The IP
configuration is associated with a virtual
interface. This is normally VLAN1.
• interface VLAN1 ip address 10.0.0.2
255.255.255.224
Enabling the Trunk
• interface FastEthernet 0/1
• switchport trunk encapsulation dot1q
• switchport mode trunk
Moving the Ports
• interface FastEthernet0/2 switchport access vlan 2
• interface FastEthernet0/3 switchport access vlan 2
• interface FastEthernet0/4 switchport access vlan 3
• interface FastEthernet0/5 switchport access vlan 3
Once your changes are complete, you can see which
ports are in which VLAN by using the show vlan
command.
BENEFITS OF VLAN
• Performance
• Formation of Virtual Workgroups
• Simplified Administration
• Reduced Cost
• Security
REFERENCES
• David Passmore, John Freeman, ``The
Virtual LAN Technology Report,'‘
• Paul Frieden,” VLANS on LINUX “
• cisco
• TPID- defined value of 8100 in hex. When a frame has the EtherType equal
to 8100, this frame carries the tag IEEE 802.1Q / 802.1P.
• TCI - Tag Control Information field including user priority, Canonical format
indicator and VLAN ID.
• User Priority- Defines user priority, giving eight (2^3) priority levels. IEEE
802.1P defines the operation for these 3 user priority bits.
• CFI- Canonical Format Indicator is always set to zero for Ethernet switches.
CFI is used for compatibility reason between Ethernet type network and
Token Ring type network. If a frame received at an Ethernet port has a CFI
set to 1, then that frame should not be forwarded as it is to an untagged
port.
• VID- VLAN ID is the identification of the VLAN, which is basically used by
the standard 802.1Q. It has 12 bits and allow the identification of 4096
(2^12) VLANs. Of the 4096 possible VIDs, a VID of 0 is used to identify
priority frames and value 4095 (FFF) is reserved, so the maximum possible
VLAN configurations are 4,094.
Switch Model Number of Supported
VLANs
Catalyst 2950-12 64
Catalyst 2950-24 64
Catalyst 2950C-24 250
Catalyst 2950G-12-EI 250
Catalyst 2950G-24-EI 250
Catalyst 2950G-48-EI 250
Catalyst 2950G-24-EI-DC 250
Catalyst 2950T-24 250

More Related Content

Similar to VLAN Configuration and Implementation

Similar to VLAN Configuration and Implementation (20)

ENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptxENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptx
 
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptxLecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
 
Vlan final
Vlan finalVlan final
Vlan final
 
Virtual local area network
Virtual local area networkVirtual local area network
Virtual local area network
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
VLAN -VIRTUAL LAN -COMPUTER NETWORKSVLAN -VIRTUAL LAN -COMPUTER NETWORKS
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANS
 
Day 5 VIRTUAL LANS
Day 5 VIRTUAL LANSDay 5 VIRTUAL LANS
Day 5 VIRTUAL LANS
 
Vlan
VlanVlan
Vlan
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
 
Vlan and vtp
Vlan and vtpVlan and vtp
Vlan and vtp
 
Vlan and vtp
Vlan and vtpVlan and vtp
Vlan and vtp
 
Chapter 8 .vlan.pdf
Chapter 8 .vlan.pdfChapter 8 .vlan.pdf
Chapter 8 .vlan.pdf
 
Mod8 vlans
Mod8 vlansMod8 vlans
Mod8 vlans
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptx
 
Vlan
VlanVlan
Vlan
 
Лекц 9
Лекц 9Лекц 9
Лекц 9
 
Day 14.2 inter vlan
Day 14.2 inter vlanDay 14.2 inter vlan
Day 14.2 inter vlan
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking Protocol
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 

More from itwkd

APA Workshop.pptx
APA Workshop.pptxAPA Workshop.pptx
APA Workshop.pptxitwkd
 
Lab_3..pdf
Lab_3..pdfLab_3..pdf
Lab_3..pdfitwkd
 
Lab_3..pdf
Lab_3..pdfLab_3..pdf
Lab_3..pdfitwkd
 
Management Research-Day1.pptx
Management Research-Day1.pptxManagement Research-Day1.pptx
Management Research-Day1.pptxitwkd
 
APA Workshop.pptx
APA Workshop.pptxAPA Workshop.pptx
APA Workshop.pptxitwkd
 
Routing and Switching Essentials (course outline).pdf
Routing and Switching Essentials (course outline).pdfRouting and Switching Essentials (course outline).pdf
Routing and Switching Essentials (course outline).pdfitwkd
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptxitwkd
 
Use a systematic and recursive process to create pdf.pdf
Use a systematic and recursive process to create pdf.pdfUse a systematic and recursive process to create pdf.pdf
Use a systematic and recursive process to create pdf.pdfitwkd
 

More from itwkd (8)

APA Workshop.pptx
APA Workshop.pptxAPA Workshop.pptx
APA Workshop.pptx
 
Lab_3..pdf
Lab_3..pdfLab_3..pdf
Lab_3..pdf
 
Lab_3..pdf
Lab_3..pdfLab_3..pdf
Lab_3..pdf
 
Management Research-Day1.pptx
Management Research-Day1.pptxManagement Research-Day1.pptx
Management Research-Day1.pptx
 
APA Workshop.pptx
APA Workshop.pptxAPA Workshop.pptx
APA Workshop.pptx
 
Routing and Switching Essentials (course outline).pdf
Routing and Switching Essentials (course outline).pdfRouting and Switching Essentials (course outline).pdf
Routing and Switching Essentials (course outline).pdf
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
 
Use a systematic and recursive process to create pdf.pdf
Use a systematic and recursive process to create pdf.pdfUse a systematic and recursive process to create pdf.pdf
Use a systematic and recursive process to create pdf.pdf
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 

Recently uploaded (20)

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 

VLAN Configuration and Implementation

  • 1.
  • 2. LAN  A Local Area Network (LAN) was originally defined as a network of computers located within the same area  Local Area Networks are defined as a single broadcast domain. This means that if a user broadcasts information on his/her LAN, the broadcast will be received by every other user on the LAN.  Broadcasts are prevented from leaving a LAN by using a router. The disadvantage of this method is routers usually take more time to process incoming data compared to a bridge or a switch
  • 3. VLAN A VLAN is a logical group of network devices that appears to be on the same LAN Configured as if they are attached to the same physical connection even if they are located on a number of different LAN segments. Logically segment LAN into different broadcast domains.
  • 4. VLAN  VLANs can logically segment users into different subnets (broadcast domains)  Broadcast frames are only switched on the same VLAN ID.  This is a logical segmentation and not a physical one, workstations do not have to be physically located together. Users on different floors of the same building, or even in different buildings can now belong to the same LAN.
  • 5. LAN VS VLAN  By using switches, we can assign computer on different floors to VLAN1, VLAN2, and VLAN3  Now, logically, a department is spread across 3 floors even though they are physically located on different floors
  • 6.
  • 8. STATIC VLANS  Static membership VLANs are called port-based and port- centric membership VLANs.  This is the most common method of assigning ports to VLANs.  As a device enters the network, it automatically assumes the VLAN membership of the port to which it is attached.  There is a default VLAN, on Cisco switches that is VLAN 1. Default VLAN 1 Default VLAN 1 Configured Vlan 10
  • 9. DYNAMIC VLANS  Dynamic membership VLANs are created through network management software Dynamic VLANs allow for membership based on the MAC address of the device connected to the switch port. As a device enters the network, it queries a database within the switch for a VLAN membership
  • 10. CONFIGURING PORTS  Access ports are used when:  Only a single device is connected to the port  Multiple devices (hub) are connected to the port, all belonging to the same VLAN  Another switch is connected to this interface, but this link is only carrying a single VLAN (non- trunk link).  Trunk ports are used when:  Another switch is connected to this interface, and this link is carrying multiple VLANs(trunk link).
  • 11. • Switch(config-if)switchport mode [access|trunk] • An access port means that the port (interface) can only belong to a single VLAN.
  • 13. VLAN TRUNKING  In a switched network, a trunk is a point-to-point link that supports several VLANs.  The purpose of a trunk is to conserve ports when a link between two devices that implement VLANs is created.
  • 14. VLAN TECHNIQUES Two techniques Frame Filtering--examines particular information about each frame (MAC address or layer 3 protocol type) Frame Tagging--places a unique identifier in the header of each frame as it is forwarded throughout the network backbone.
  • 15. FRAME FILTERING  Users can be logically group via software based on: – port number – MAC address – Ip subnet – protocol being used
  • 16.
  • 17. • Membership by Port • Membership by MAC Address • Membership by IP Subnet Address port vlan 1 1 2 1 3 2 4 1 disadvantage of this method is that it does not allow for user mobility.
  • 18. • Membership by Port • Membership by MAC Address • Membership by IP Subnet Address MAC Address vlan 1212354145121 1 2389234873743 1 3045834758445 2 5483573475843 1 Advantage : • no reconfiguration needed Disadvantage : • VLAN membership must be assigned initially. • performance degradation as members of different VLANs coexist on a single switch port
  • 19. • Membership by Port • Membership by MAC Address • Membership by IP Subnet Address IP Subnet vlan 23.2.24 1 26.21.35 2 Advantage: • Good for application-based VLAN strategy • User can move workstations • eliminate the need for frame tagging
  • 20. VLAN TAGGING  VLAN frame tagging was specifically developed for switched communications.  Frame tagging places a unique identifier in the header of each frame as it is forwarded throughout the network backbone.  The identifier is understood and examined by each switch before any broadcasts or transmissions are made to other switches, routers, or end stations.  When the frame exits the network backbone, the switch removes the identifier before the frame is transmitted to the target end station.
  • 21. The two most common tagging schemes for Ethernet segments are ISL (Inter-Switch Link) 802.1Q – An IEEE standard
  • 22. ISL (Frame Encapsulation)  An Ethernet frame is encapsulated with a header that transports VLAN IDs.  The ISL encapsulation is added by the switch before sending across the trunk.
  • 23.  The switch removes the ISL encapsulation before sending it out a non trunk link.  It adds overhead to the frame as a 26-byte header containing a 10-bit VLAN ID.  In addition, a 4-byte cyclic redundancy check (CRC) is appended to the end of each frame.  This CRC is in addition to any frame checking that the Ethernet frame requires.
  • 24. IEEE 802.1Q Significantly less overhead than the ISL. 802.1Q inserts only an additional 4 bytes into the Ethernet frame. The 802.1Q tag is inserted by the switch before sending across the trunk. The switch removes the 802.1Q tag before sending it out a non trunk link.
  • 25.
  • 26.
  • 27.  Trunking protocols were developed to effectively manage the transfer of frames from different VLANs on a single physical link.  The trunking protocols establish agreement for the distribution of frames to the associated ports at both ends of the trunk.  VLAN tagging information is added by the switch before it is sent across the trunk and removed by the switch before it is sent down a non-trunk link
  • 29. SwitchA(config-if)switchport mode trunk SwitchB(config-if)switchport mode trunk encapsulation dot1q SwitchB(config-if)switchport mode trunk  If SwitchA can only be a 802.1.Q trunk and SwitchB can be either ISL or 802.1Q trunk, configure SwitchB to be 802.1Q.  On switches that support both 802.1Q and ISL, the switchport trunk encapsulation command must be done BEFORE the switchport mode trunk command.
  • 30. VLAN Configuration • Configuring VLANs under Linux is a process similar to configuring regular Ethernet interfaces. The main difference is you first must attach each VLAN to a physical device. This is accomplished with the vconfig utility. If the trunk device itself is configured, it is treated as native. For example, these commands define VLANs 2-4 on device eth0: • vconfig add eth0 2 • vconfig add eth0 3 • vconfig add eth0 4
  • 31. Switch Configuration • Before you begin configuration, make sure the IP address of the switch falls within the new management subnet. The IP configuration is associated with a virtual interface. This is normally VLAN1. • interface VLAN1 ip address 10.0.0.2 255.255.255.224
  • 32. Enabling the Trunk • interface FastEthernet 0/1 • switchport trunk encapsulation dot1q • switchport mode trunk
  • 33. Moving the Ports • interface FastEthernet0/2 switchport access vlan 2 • interface FastEthernet0/3 switchport access vlan 2 • interface FastEthernet0/4 switchport access vlan 3 • interface FastEthernet0/5 switchport access vlan 3 Once your changes are complete, you can see which ports are in which VLAN by using the show vlan command.
  • 34. BENEFITS OF VLAN • Performance • Formation of Virtual Workgroups • Simplified Administration • Reduced Cost • Security
  • 35. REFERENCES • David Passmore, John Freeman, ``The Virtual LAN Technology Report,'‘ • Paul Frieden,” VLANS on LINUX “ • cisco
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. • TPID- defined value of 8100 in hex. When a frame has the EtherType equal to 8100, this frame carries the tag IEEE 802.1Q / 802.1P. • TCI - Tag Control Information field including user priority, Canonical format indicator and VLAN ID. • User Priority- Defines user priority, giving eight (2^3) priority levels. IEEE 802.1P defines the operation for these 3 user priority bits. • CFI- Canonical Format Indicator is always set to zero for Ethernet switches. CFI is used for compatibility reason between Ethernet type network and Token Ring type network. If a frame received at an Ethernet port has a CFI set to 1, then that frame should not be forwarded as it is to an untagged port. • VID- VLAN ID is the identification of the VLAN, which is basically used by the standard 802.1Q. It has 12 bits and allow the identification of 4096 (2^12) VLANs. Of the 4096 possible VIDs, a VID of 0 is used to identify priority frames and value 4095 (FFF) is reserved, so the maximum possible VLAN configurations are 4,094.
  • 42. Switch Model Number of Supported VLANs Catalyst 2950-12 64 Catalyst 2950-24 64 Catalyst 2950C-24 250 Catalyst 2950G-12-EI 250 Catalyst 2950G-24-EI 250 Catalyst 2950G-48-EI 250 Catalyst 2950G-24-EI-DC 250 Catalyst 2950T-24 250