This document provides an overview of local area networks (LANs) and virtual LANs (VLANs). It defines LAN as a network covering a small area like a home, office or campus to connect computers in close proximity. The document discusses common LAN topologies like bus, ring and star. It then introduces VLAN as a way to logically segment devices within a LAN even if they share the same infrastructure. The document explains how VLANs work using tags and trunking between switches. It outlines benefits of VLANs like improved security, flexibility and traffic management compared to traditional LANs.
Inter-VLAN routing is the process of forwarding network traffic from one VLAN to another VLAN using a
router.
VLANs divide broadcast domains in a LAN environment. Whenever hosts in one VLAN need to
communicate with hosts in another VLAN, the traffic must be routed between them. This is known as
inter-VLAN routing. On Catalyst switches it is accomplished by creating Layer 3 interfaces (Switch virtual
interfaces (SVI)).
1. An introduction of LAN.
2. An introduction of VLAN.
3. Properties of VLAN.
4. Types of VLAN.
5. VLAN Identification Method
6. VLAN Trunking Protocol.
7. Inter-VLAN routing.
Inter-VLAN routing is the process of forwarding network traffic from one VLAN to another VLAN using a
router.
VLANs divide broadcast domains in a LAN environment. Whenever hosts in one VLAN need to
communicate with hosts in another VLAN, the traffic must be routed between them. This is known as
inter-VLAN routing. On Catalyst switches it is accomplished by creating Layer 3 interfaces (Switch virtual
interfaces (SVI)).
1. An introduction of LAN.
2. An introduction of VLAN.
3. Properties of VLAN.
4. Types of VLAN.
5. VLAN Identification Method
6. VLAN Trunking Protocol.
7. Inter-VLAN routing.
This chapter will cover how to configure, manage, and troubleshoot VLANs and
VLAN trunks. It will also examine security considerations and strategies relating
to VLANs and trunks, and best practices for VLAN design.
in the slide we discuss - VLAN overview, effectiveness, benefits, how VLAN work, memberships mode, operations, creation Guidelines, add VLAN, accessing,managing and verifying .
thourighly explained working and types of network switches a very good ready to present presentation aesthetically pleasing as well best for university or college use click like if u lyk it thanks
What is GSM?
The Global System for Mobile communications is a digital cellular communications system. It was developed in order to create a common European mobile telephone standard but it has been rapidly accepted worldwide.
Formerly it was “Groupe Spéciale Mobile” (founded in 1982)
now: Global System for Mobile Communication.
Services:
Tele-services
Bearer or Data Services
Supplementary services
Applications:
Mobile telephony
GSM-R
Telemetry System
- Fleet management
- Automatic meter reading
- Toll Collection
- Remote control and fault reporting of DG sets
Value Added Services
Advantages:
Better Quality of speech
Data transmission is supported
New services offered due to ISDN compatibility
International Roaming possible
Large market
Crisper, cleaner quieter calls
disadvantages:
Dropped and missed calls
Less Efficiency
Security Issues
conclusion
The mobile telephony industry rapidly growing and that has become backbone for business success and efficiency and a part of modern lifestyles all over the world.
In this session I have tried to give and over view of the GSM system. I hope that I gave the general flavor of GSM and the philosophy behind its design.
The GSM is standard that insures interoperability without stifling competition and innovation among the suppliers to the benefit of the public both in terms of cost and service quality.
A VPN (Virtual Private Network) extends a private network across a public network, such as the
Internet.
A VPN is a network that uses a public telecommunication infrastructure, such as the Internet, to provide
remote offices or individual users with secure access to their organization's network. A VPN ensures
privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol
(L2TP). Data is encrypted at the sending end and decrypted at the receiving end.
This chapter will cover how to configure, manage, and troubleshoot VLANs and
VLAN trunks. It will also examine security considerations and strategies relating
to VLANs and trunks, and best practices for VLAN design.
in the slide we discuss - VLAN overview, effectiveness, benefits, how VLAN work, memberships mode, operations, creation Guidelines, add VLAN, accessing,managing and verifying .
thourighly explained working and types of network switches a very good ready to present presentation aesthetically pleasing as well best for university or college use click like if u lyk it thanks
What is GSM?
The Global System for Mobile communications is a digital cellular communications system. It was developed in order to create a common European mobile telephone standard but it has been rapidly accepted worldwide.
Formerly it was “Groupe Spéciale Mobile” (founded in 1982)
now: Global System for Mobile Communication.
Services:
Tele-services
Bearer or Data Services
Supplementary services
Applications:
Mobile telephony
GSM-R
Telemetry System
- Fleet management
- Automatic meter reading
- Toll Collection
- Remote control and fault reporting of DG sets
Value Added Services
Advantages:
Better Quality of speech
Data transmission is supported
New services offered due to ISDN compatibility
International Roaming possible
Large market
Crisper, cleaner quieter calls
disadvantages:
Dropped and missed calls
Less Efficiency
Security Issues
conclusion
The mobile telephony industry rapidly growing and that has become backbone for business success and efficiency and a part of modern lifestyles all over the world.
In this session I have tried to give and over view of the GSM system. I hope that I gave the general flavor of GSM and the philosophy behind its design.
The GSM is standard that insures interoperability without stifling competition and innovation among the suppliers to the benefit of the public both in terms of cost and service quality.
A VPN (Virtual Private Network) extends a private network across a public network, such as the
Internet.
A VPN is a network that uses a public telecommunication infrastructure, such as the Internet, to provide
remote offices or individual users with secure access to their organization's network. A VPN ensures
privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol
(L2TP). Data is encrypted at the sending end and decrypted at the receiving end.
Networking Cable is the medium through which information usually moves from one network device to
another. There are several types of cable which are commonly used with LANs. In some cases, a network
will utilize only one type of cable, other networks will use a variety of cable types. The type of cable
chosen for a network is related to the network's topology, protocol, and size. Understanding the
characteristics of different types of cable and how they relate to other aspects of a network is necessary
for the development of a successful network.
A virtual local area network (VLAN) is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain regardless of their physical location
This presentations gives basic overview about networking and in depth insights about Openstack Neutron component.
Covers understanding on VLAN,VXLAN,Openstack vSwitch
Quite simply explained we use networks for communication between computers, sharing of data and peripherals. In the business world we use networks for ease of administration and to cut costs.
Sharing data example imagine an office with 5 secretaries working on 5 different computers, one requires a file from another computer in a non networked office this file would have to be written to a portable media then loaded onto the computer. In a networked office the file could be accessed via the network from a shared folder.
Sharing peripherals example the same office with 5 secretaries working on 5 different computers, in order to print their work each computer would need to have a printer attached. In a networked office you could have one shared printer, cutting costs
Indian Railway is the state-owned railway company of India, which owns and operates most of the country's rail transport. It is overseen by the Ministry of Railways of the Government of India It's provides the full knowledge about Indian railways & its signalling system and it's gives the knowledge about rail-net and the network used in Indian rail and the topology used in indian railway for the internet .
1 month Summer Training Report on "Universal Axel Counter" .
in this report it's gives full description about CEL Profile and the description about universal axle counter and solar cell
it's gives the full description about satellite . it's provide the knowledge about wireless communication.and it's gives the comparison between oft and satellite.ti's gives the basic knowledge about optical fibre
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
2. BSNL
BASIC OF NETWORKING
ALTTC BASIC OF NETWORKING 2
• There are 7 layer in
networking
• Out Of the 7 layers, we
are concerned with the
bottom 3 layers.
• The top 4 layers are used
more on host machines
to support TCP/UDP,
HTTP, other
applications
Application Layer (Layer
7)
Presentation Layer
(Layer 6)
Session Layer (Layer 5)
Transport Layer (Layer
4)
Network Layer (Layer 3)
Data Link Layer (Layer
2)
Physical Layer (Layer 1)
3. BSNL
Network Devices
• There are 5 general devices:
Repeater
Hub
Bridge
Switch
Router
ALTTC BASIC OF NETWORKING 3
4. BSNL
Repeater
A Layer 1 device
An electronic device to receive a signal
on a port and retransmits it at a higher
level or higher power
Used when you need to go farther
distances than the cabling will allow
Usually has 2 ports (IN/OUT)
ALTTC BASIC OF NETWORKING 4
5. BSNL
Hub
A Layer 1 device
A device that contains multiple ports
Has no logic or “brain”
Simply passes data out all other ports
In simple terms, it is a multi-port repeater
ALTTC BASIC OF NETWORKING 5
6. BSNL
Bridge
A Layer 2 device
Connects multiple Layer 2 segments
Has logic or “brain”
Learns what Layer 2 MAC addresses are
associated with each port
Receives frames destined for a particular
MAC address and only sends the data out
the correct port
ALTTC BASIC OF NETWORKING 6
7. BSNL
Switch
A layer 2 device
Basically a multi-port bridge
Learns MAC Addresses to Port
mappings
Doesn’t flood data out every port unless
the MAC address hasn’t been learned
ALTTC BASIC OF NETWORKING 7
8. BSNL
Router
A Layer 3 device
Connects multiple Layer 3 networks
Uses Layer 3 addressing (IP addressing)
Allows communication between
different Layer 2 segments
Breaks up broadcast domains
ALTTC BASIC OF NETWORKING 8
9. BSNL
Introduction
• Definition: A local area network
(LAN) supplies networking capability to a
group of computers in close proximity to
each other such as in an office building, a
school, or a home. A LAN is useful for
sharing resources like files, printers, games
or other applications. A LAN in turn often
connects to other LANs, and to the Internet
or other WAN.
ALTTC LAN & VLAN 9
12. BSNL
LAN OVERVIEW
• A LAN is a computer network that covers a small area (home,
office, building, campus)
– a few kilometers
• LANs have higher data rates (10Mbps to 40Gbps) as compared to
WANs
• LANs (usually) do not involve leased lines; cabling and
equipments belong to the LAN owner
• A LAN consists of
– Shared transmission medium
• now so valid today due to switched LANs (for wired LANs),
but still valid for wireless LANs
– regulations for orderly access to the medium
– set of hardware and software for the interfacing devices
ALTTC LAN & VLAN
12
14. BSNL
Bus Topology
• Stations attach to linear medium
(bus)
– Via a tap - allows for transmission
and reception
• Transmission propagates in
medium in both directions
• Received by all other stations
– Not addressed stations ignore
• Need to identify target station
– Each station has unique address
– Destination address included in
frame header
• Terminator absorbs frames at the
end of medium 14
15. BSNL
Bus Topology
• Need to regulate transmission
– To avoid collisions
• If two stations attempt to transmit at same time,
signals will overlap and become garbage
– To avoid continuous transmission from a single
station. If one station transmits continuously, access is
blocked for others
• Solution: Transmit Data in small blocks – frames
ALTTC LAN & VLAN 15
16. BSNL
Ring Topology
• Repeaters joined by point-to-point links in closed
loop
– Links are unidirectional
– Receive data on one link and retransmit on another
– Stations attach to repeaters
• Data transmitted in frames
– Frame passes all stations in a circular manner
– Destination recognizes address and copies frame
– Frame circulates back to source where it is removed
• Medium access control is needed to determine
when station can insert frame
ALTTC LAN & VLAN 16
18. BSNL
Star Topology
• Each station connected
directly to central node
– using a full-duplex
(bi-directional) link
• Central node can broadcast (hub)
– Physical star, but logically like bus due
to broadcast medium
– Only one station can transmit at a time;
otherwise, collision occurs
• Central node can act as frame switch
– retransmits only to destination
– today’s technology
ALTTC LAN & VLAN 18
19. BSNL
Summary Of Network Topology
ALTTC LAN & VLAN 19
Topology/structure Advantages Disadvantages
Bus structure -easy to install
-simply expandable
-short cable lengths
-net expansion limits
-complicated access
methods
Ring structure -large net expansion -complex error tracing
-high wiring expenditure
-when disturbances net
failure
Star structure -simple cross-linking
-simple extension
-high reliability
-high wiring expenditure
-net failure in case of
failure or overloading of
the hubs
20. BSNL
ADVANTAGES OF LAN
• Expensive hardware can be shared e.g. laser
printer.
• Users can access the same files.
• Messages can be sent between users.
• A single Internet connection can be shared
among many users.
• Network software is cheaper than buying
individual packages.
ALTTC LAN & VLAN 20
21. BSNL
DISADVANTAGES OF LAN
ALTTC LAN & VLAN 21
Disadvantages of connecting computers in a LAN:
• Special security measures are needed to stop users from using
programs and data that they should not have access to.
• Networks are difficult to set up and need to be maintained by skilled
technicians.
• If the file server develops a serious fault, all the users are affected,
rather than just one user in the case of a stand-alone machine.
• Wired and therefore more difficult to setup. Drilling holes in wall,
running cables in lofts etc, fitting sockets and redecorating. More
expensive to set up. More time consuming to set up. Not as flexible,
can only use where there is a socket - cannot use outside for example.
• Wired systems cannot be used in listed buildings
23. BSNL
Introduction
In simple terms, a VLAN is a set of workstations
within a LAN that can communicate with each
other as though they were on a single, isolated
LAN.
What does it mean to say that they “communicate
with each other as though they were on a single,
isolated LAN”?
Among other things, it means that:
broadcast packets sent by one of the workstations
will reach all the others in the VLAN
ALTTC LAN & VLAN 23
24. BSNL
Introduction
ALTTC LAN & VLAN 24
Broadcasts sent by one of the workstations in the VLAN
will never reach any workstations that are not in the
VLAN
The workstations can all communicate with each other
without needing to go through a gateway. For example, IP
connections would be established by AR Ping for the
destination
IP and sending packets directly to the destination
workstation—there would be no need to send packets to the
IP gateway to be forwarded on.
The workstations can communicate with each other using
non-routable protocols
25. BSNL
VLAN-based LAN
• As we earlier
discussed ,By
utilizing VLANs, the
same users can be
spread out over
various geographical
locations and still
remain in their same
IP subnet (broadcast
domain).
ALTTC LAN & VLAN 25
26. BSNL
VLAN OVERVIEW
ALTTC LAN & VLAN 26
• A VLAN allows a network administrator to create groups
of logically networked devices that act as if they are on
their own independent network, even if they share a
common infrastructure with other VLANs.
• Using VLANs, you can logically segment switched
networks based on functions, departments, or project
teams.
• You can also use a VLAN to geographically structure your
network to support the growing reliance of companies on
home-based workers.
• These VLANs allow the network administrator to
implement access and security policies to particular groups
of users.
28. BSNL
HOW VLAN WORKS ?
• VLANs are identified by a number
– Valid ranges 1-4094
• On a VLAN-capable switch, you assign ports
with the appropriate VLAN number
• The switch then only allows data to be sent
between ports with the same VLAN
• Since almost every network is larger than a single
switch, there needs to be a way to have traffic
sent between two different switches
ALTTC LAN & VLAN 28
29. BSNL
HOW VLAN WORKS ?
• One way to do it is to assign a port on each switch with a
VLAN and run a cable between the switches
– Not very feasible or cost effective
• For example, if there were 6 hosts on each switch on 6
different vlans, you would need 6 ports on each switch
to connect the switches together. This would mean
that if you had 24 different vlans you could only have
24 hosts on a 48 port switch
ALTTC LAN & VLAN 29
30. BSNL
HOW VLAN WORKS ?
• There was a standard develop to make it so that a
single connection between two switches could be
used to send traffic for all vlans
• 802.1q – Provides a VLAN tag in front of the
Layer 2 frame
• We enable 802.1q tagging (trunking) on the ports
between the switches
• The switch receives the frame with the 802.1q header and
strips it off & It determines what VLAN and sends the
data to the appropriate port
ALTTC LAN & VLAN 30
31. BSNL
Types of VLAN
• Three basic VLAN memberships for
determining and controlling how a packet
entering a switch gets assigned to a VLAN.
ALTTC LAN & VLAN 31
32. BSNL
Port driven VLANs
• Most common configuration method
• User assigned by port association
• Easily administered through GUIs
• Maximizes security between VLANs
• Packets do not “leak” into other domains
ALTTC LAN & VLAN 32
33. BSNL
Port driven VLANs cont’d.
• User assigned port association ???
• For example, in a bridge with four ports, ports 1, 2, and 4
belong to VLAN 1 and port 3 belongs to VLAN 2
ALTTC LAN & VLAN 33
Port VLAN
1 1
2 1
3 2
4 1
Assignment of ports to different VLAN's.
Disadvantage:
•Does not allow for user mobility
34. BSNL
MAC address driven VLANs
• User assigned based on MAC addresses
• Offers flexibility
• For Example:Since MAC addresses form a part
of the workstation's network interface card, when a
workstation is moved, no reconfiguration is needed to
allow the workstation to remain in the same VLAN
• Impacts performance, scability, and administration
ALTTC LAN & VLAN 34
35. BSNL
MAC address driven VLANs cont’d
• Disadvantage
• VLAN membership must be assigned initially.
• In networks with thousands of users. Also, in environments
where notebook PC's are used, the MAC address is associated
with the docking station and not with the notebook PC.
Consequently, when a notebook PC is moved to a different
docking station, its VLAN membership must be reconfigured.
ALTTC LAN & VLAN 35
MAC Address VLAN
1212354145121 1
2389234873743 2
3045834758445 2
5483579475843 1
Assignment of IP subnet addresses to different VLAN's
36. BSNL
Network address driven VLANs
• The network IP subnet address can be used to
classify VLAN membership
ALTTC LAN & VLAN 36
IP Subnet VLAN
23.2.24 1
26.21.35 2
Assignment of IP subnet addresses to different VLAN's
37. BSNL
Network address driven VLANs
cont’d
• IP addresses are used only as a mapping to
determine membership in VLAN's.
• In Layer 3 VLAN's, users can move their
workstations without reconfiguring their network
addresses. The only problem is that it generally
takes longer to forward packets using Layer 3
information than using MAC addresses.
ALTTC LAN & VLAN 37
39. BSNL
Benefits of VLAN
• VLANs allow network administrators to organize LANs logically
instead of physically.
• Easily move workstations on the LAN
• Easily add workstations to the LAN
• Easily change the LAN configuration
• Easily control network traffic
• Improve security
VLAN can also be used to control broadcast domains
Set up firewalls
Restrict access
Inform the network manager of an intrusion
• Eliminate the need for expensive routers
ALTTC LAN & VLAN
39
40. BSNL
Disadvantages Of Vlan
*Management is complex
*Possible problems in interoperability
*A VLAN cannot forward traffic to another
VLAN(need a router to communicate
between VLANs)
ALTTC LAN & VLAN 40
41. BSNL
LAN V/S VLAN
• VLAN requires lesser cost by eliminating use of
expensive routers unlike LAN.
• Data transmission is safe on VLAN as compared
to LAN.
• VLAN delivers better performance when
compared to traditional LANs.
• VLAN also helps in reducing traffic
ALTTC LAN & VLAN 41