SlideShare a Scribd company logo
Virtual Local Area Network (VLAN)
Student: Mohammad Javad Abdolmaleki
Supervisor: Dr. Mohammad Fathi
Student ID: 9617007114 1-31
Outlines
• Introduction
• Why VLAN?
• VLAN Trunking
• VLAN Tagging
• Types of VLAN
• Advantages and Disadvantages
• Conclusion
• References
2-31
Introduction
3-31
General Description of LAN
Covering a small geographic area
• Home
• Office
• Group of buildings
Introduction
4-31
General Description of LAN
Introduction
5-31
Broadcast Domain
A broadcast domain is a logical
division of a computer network,
in which all nodes can reach
each other by broadcast at the
data link layer.
Introduction
6-31
Definition of Virtual Local Area Network
Introduction
7-31
Definition of Virtual Local Area Network
Introduction
8-31
Definition of Virtual Local Area Network
Outlines
• Introduction
• Why VLAN?
• VLAN Trunking
• VLAN Tagging
• Types of VLAN
• Advantages and Disadvantages
• Conclusion
• References
9-31
Why VLAN?
10-31
Why VLAN?
11-31
• Lack of traffic isolation
• Inefficient use of switches
• Managing users
Why VLAN?
12-31
Electrical Eng. Switch
Computer Eng. Switch
VLAN-2
Computer Eng. VLAN
VLAN-3
Electrical Eng. VLAN
VLAN-3
Electrical Eng. VLAN
Outlines
• Introduction
• Why VLAN?
• VLAN Trunking
• VLAN Tagging
• Types of VLAN
• Advantages and Disadvantages
• Conclusion
• References
13-31
14-31
In the VLAN trunking, a special port on each switch is configured as a trunk
port to interconnect the two VLAN switches.
1
8
9
102
7
…
Electrical Engineering
(VLAN ports 1-8)
Computer Science
(VLAN ports 9-15)
15
…
2
73
Ports 2,3,5 belong to EE VLAN
Ports 4,6,7,8 belong to CS VLAN
5
4 6 816
1
15-31
VLAN Trunking
Trunk
16-31
VLAN Trunking
The trunk port belongs to all VLANs, and frames sent to any
VLAN are forwarded over the trunk link to the other switch.
Connecting two
VLAN switches
with two VLANs:
(a) two cables
(b) trunked
Outlines
• Introduction
• Why VLAN?
• VLAN Trunking
• VLAN Tagging
• Types of VLAN
• Advantages and Disadvantages
• Conclusion
• References
17-31
18-31
VLAN Tagging
VLAN Tagging, also known as Frame Tagging, is a method to help identify packets
travelling through trunk links. When an Ethernet frame traverses a trunk link, a
special VLAN tag is added to the frame and sent across the trunk link.
Workstation 2
VLAN 4
Workstation 3
VLAN 5
VLAN Tagging
19-31
20-31
VLAN Tagging
VLAN Tagging - IEEE 802.1Q
The 802.1q standard was created by the IEEE group to address the problem
breaking large networks into smaller and manageable ones through the use of
VLANs.
21-31
VLAN Tagging
VLAN Tagging - IEEE 802.1Q
22-31
VLAN Tagging
VLAN Tagging - IEEE 802.1Q
• Tag Protocol Identifier (TPID)
• Tag control information (TCI)
• Priority Code Point (PCP)
• Drop Eligible Indicator (DEI)
• VLAN Identifier (VID)
Outlines
• Introduction
• Why VLAN?
• VLAN Trunking
• VLAN Tagging
• Types of VLAN
• Advantages and Disadvantages
• Conclusion
• References
23-31
Types of VLANs
24-31
Traditionally, two methods of implementing VLANs:
Static or Port-Based:
Ports on a switch are assigned to a specific VLAN.
Dynamic:
VLANs created by accessing a Network Management server. The
MAC address/VLAN ID mapping is set up by the Network
Administrator and the server assigns a VLAN ID when the device
contacts it.
Types of VLANs
25-31
Types of Port-Based VLANs:
Defined by the type of traffic they support or by the functions
they perform.
– Data VLAN.
– Management VLAN.
– Default VLAN.
– Native VLAN.
– Voice VLAN.
Outlines
• Introduction
• Why VLAN?
• VLAN Trunking
• VLAN Tagging
• Types of VLAN
• Advantages and Disadvantages
• Conclusion
• References
26-31
Advantages and Disadvantages
27-31
Advantages
Disadvantages
 Higher performance and reduced latency.
 Users may work on sensitive information which
should not be seen by other users.
 VLAN Removes the physical boundary
× Management is complex
× Possible problems in interoperability
× A VLAN cannot forward traffic to another
VLAN(need a router to communicate
between VLANs)
Outlines
• Introduction
• Why VLAN?
• VLAN Trunking
• VLAN Tagging
• Types of VLAN
• Advantages and Disadvantages
• Conclusion
• References
28-31
Conclusion
• Using VLANs in networks, greatly reduces costs of setting up and
maintenance of the networks.
• VLAN helps the manager of the network in managing hosts and
their limitations and accesses.
• By using VLAN, hosts in different and independent LANs can be in
a same broadcast domain.
• VLANs may low-off the requirement of using switches, therefore
the probability of cyber attacks decreases.
29-31
References
30-31
[1] James F. Kurose & Keith W. Ross, Computer Networking a t
T Top-Down Approach, Sixth edition
[2] Andrew S. Tanenbaum, Computer Networks, Fourth edition
[3] www.cyberlone.com
[4] www.firewall.cx
[5] www.wikipedia.org
[6] www.blog.router-switch.com
Thank you for your attention!
The End
31-31
Any Questions?

More Related Content

What's hot

Vlan Types
Vlan TypesVlan Types
Vlan Types
IT Tech
 
VirtuaL area network (VLAN)
VirtuaL area network (VLAN)  VirtuaL area network (VLAN)
VirtuaL area network (VLAN)
VipulSharma328
 
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram SnehiVLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
MR. VIKRAM SNEHI
 
VLAN
VLANVLAN
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
Nzava Luwawa
 
Vlan
VlanVlan
Inter VLAN Routing
Inter VLAN RoutingInter VLAN Routing
Inter VLAN Routing
Netwax Lab
 
Lan & vlan
Lan & vlanLan & vlan
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
Abdelkhalik Mosa
 
VLAN Trunking Protocol (VTP)
VLAN Trunking Protocol (VTP)VLAN Trunking Protocol (VTP)
VLAN Trunking Protocol (VTP)
Naveen Soni
 
Sdn ppt
Sdn pptSdn ppt
VIRTUAL LANS (VLANS).pptx
VIRTUAL LANS (VLANS).pptxVIRTUAL LANS (VLANS).pptx
VIRTUAL LANS (VLANS).pptx
KISHOYIANKISH
 
VXLAN
VXLANVXLAN
VXLAN
SAliyev1
 
vlan
vlanvlan
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
Vuz Dở Hơi
 
Vlan
VlanVlan
CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN RoutingCCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN Routing
Amir Jafari
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
Rajesh Sadhukha
 
EVPN Introduction
EVPN IntroductionEVPN Introduction
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall concepts
Mostafa El Lathy
 

What's hot (20)

Vlan Types
Vlan TypesVlan Types
Vlan Types
 
VirtuaL area network (VLAN)
VirtuaL area network (VLAN)  VirtuaL area network (VLAN)
VirtuaL area network (VLAN)
 
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram SnehiVLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
 
VLAN
VLANVLAN
VLAN
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
 
Vlan
VlanVlan
Vlan
 
Inter VLAN Routing
Inter VLAN RoutingInter VLAN Routing
Inter VLAN Routing
 
Lan & vlan
Lan & vlanLan & vlan
Lan & vlan
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
 
VLAN Trunking Protocol (VTP)
VLAN Trunking Protocol (VTP)VLAN Trunking Protocol (VTP)
VLAN Trunking Protocol (VTP)
 
Sdn ppt
Sdn pptSdn ppt
Sdn ppt
 
VIRTUAL LANS (VLANS).pptx
VIRTUAL LANS (VLANS).pptxVIRTUAL LANS (VLANS).pptx
VIRTUAL LANS (VLANS).pptx
 
VXLAN
VXLANVXLAN
VXLAN
 
vlan
vlanvlan
vlan
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
Vlan
VlanVlan
Vlan
 
CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN RoutingCCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN Routing
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
EVPN Introduction
EVPN IntroductionEVPN Introduction
EVPN Introduction
 
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall concepts
 

Similar to Virtual Local Area Network (VLAN)

Vla ns
Vla nsVla ns
Vla ns
UDLA
 
Vlan.pdf
Vlan.pdfVlan.pdf
Vlan.pdf
itwkd
 
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdfW3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
gummybear37
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
Lakshan Perera
 
CCNA Presentation
CCNA Presentation CCNA Presentation
CCNA Presentation
Said Rahim Manandoy
 
mod8-VLANs.ppt
mod8-VLANs.pptmod8-VLANs.ppt
mod8-VLANs.ppt
SAROORNAGARCMCORE
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
ernestlithur
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
robertoxe
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
Chaing Ravuth
 
Vlan
VlanVlan
28 VLAN.pptx
28 VLAN.pptx28 VLAN.pptx
28 VLAN.pptx
EnumulaBhargava1
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptx
BOURY1
 
campus_design_eng1.ppt
campus_design_eng1.pptcampus_design_eng1.ppt
campus_design_eng1.ppt
chali100
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
Abdelkhalik Mosa
 
Ccna 9
Ccna  9Ccna  9
Vlan final
Vlan finalVlan final
Vlan final
Veena Rao
 
Virtual local area network
Virtual local area networkVirtual local area network
Virtual local area network
Veena Rao
 
Unifying WiFi and VLANs with the RINA model
Unifying WiFi and VLANs with the RINA modelUnifying WiFi and VLANs with the RINA model
Unifying WiFi and VLANs with the RINA model
ARCFIRE ICT
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
Atakan ATAK
 
Mod8 vlans
Mod8 vlansMod8 vlans
Mod8 vlans
Mohan Kumaresan
 

Similar to Virtual Local Area Network (VLAN) (20)

Vla ns
Vla nsVla ns
Vla ns
 
Vlan.pdf
Vlan.pdfVlan.pdf
Vlan.pdf
 
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdfW3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
CCNA Presentation
CCNA Presentation CCNA Presentation
CCNA Presentation
 
mod8-VLANs.ppt
mod8-VLANs.pptmod8-VLANs.ppt
mod8-VLANs.ppt
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
 
Vlan
VlanVlan
Vlan
 
28 VLAN.pptx
28 VLAN.pptx28 VLAN.pptx
28 VLAN.pptx
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptx
 
campus_design_eng1.ppt
campus_design_eng1.pptcampus_design_eng1.ppt
campus_design_eng1.ppt
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
 
Ccna 9
Ccna  9Ccna  9
Ccna 9
 
Vlan final
Vlan finalVlan final
Vlan final
 
Virtual local area network
Virtual local area networkVirtual local area network
Virtual local area network
 
Unifying WiFi and VLANs with the RINA model
Unifying WiFi and VLANs with the RINA modelUnifying WiFi and VLANs with the RINA model
Unifying WiFi and VLANs with the RINA model
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
 
Mod8 vlans
Mod8 vlansMod8 vlans
Mod8 vlans
 

Recently uploaded

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 

Recently uploaded (20)

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 

Virtual Local Area Network (VLAN)

  • 1. Virtual Local Area Network (VLAN) Student: Mohammad Javad Abdolmaleki Supervisor: Dr. Mohammad Fathi Student ID: 9617007114 1-31
  • 2. Outlines • Introduction • Why VLAN? • VLAN Trunking • VLAN Tagging • Types of VLAN • Advantages and Disadvantages • Conclusion • References 2-31
  • 3. Introduction 3-31 General Description of LAN Covering a small geographic area • Home • Office • Group of buildings
  • 5. Introduction 5-31 Broadcast Domain A broadcast domain is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer.
  • 9. Outlines • Introduction • Why VLAN? • VLAN Trunking • VLAN Tagging • Types of VLAN • Advantages and Disadvantages • Conclusion • References 9-31
  • 11. Why VLAN? 11-31 • Lack of traffic isolation • Inefficient use of switches • Managing users
  • 12. Why VLAN? 12-31 Electrical Eng. Switch Computer Eng. Switch VLAN-2 Computer Eng. VLAN VLAN-3 Electrical Eng. VLAN VLAN-3 Electrical Eng. VLAN
  • 13. Outlines • Introduction • Why VLAN? • VLAN Trunking • VLAN Tagging • Types of VLAN • Advantages and Disadvantages • Conclusion • References 13-31
  • 14. 14-31 In the VLAN trunking, a special port on each switch is configured as a trunk port to interconnect the two VLAN switches. 1 8 9 102 7 … Electrical Engineering (VLAN ports 1-8) Computer Science (VLAN ports 9-15) 15 … 2 73 Ports 2,3,5 belong to EE VLAN Ports 4,6,7,8 belong to CS VLAN 5 4 6 816 1
  • 16. 16-31 VLAN Trunking The trunk port belongs to all VLANs, and frames sent to any VLAN are forwarded over the trunk link to the other switch. Connecting two VLAN switches with two VLANs: (a) two cables (b) trunked
  • 17. Outlines • Introduction • Why VLAN? • VLAN Trunking • VLAN Tagging • Types of VLAN • Advantages and Disadvantages • Conclusion • References 17-31
  • 18. 18-31 VLAN Tagging VLAN Tagging, also known as Frame Tagging, is a method to help identify packets travelling through trunk links. When an Ethernet frame traverses a trunk link, a special VLAN tag is added to the frame and sent across the trunk link. Workstation 2 VLAN 4 Workstation 3 VLAN 5
  • 20. 20-31 VLAN Tagging VLAN Tagging - IEEE 802.1Q The 802.1q standard was created by the IEEE group to address the problem breaking large networks into smaller and manageable ones through the use of VLANs.
  • 22. 22-31 VLAN Tagging VLAN Tagging - IEEE 802.1Q • Tag Protocol Identifier (TPID) • Tag control information (TCI) • Priority Code Point (PCP) • Drop Eligible Indicator (DEI) • VLAN Identifier (VID)
  • 23. Outlines • Introduction • Why VLAN? • VLAN Trunking • VLAN Tagging • Types of VLAN • Advantages and Disadvantages • Conclusion • References 23-31
  • 24. Types of VLANs 24-31 Traditionally, two methods of implementing VLANs: Static or Port-Based: Ports on a switch are assigned to a specific VLAN. Dynamic: VLANs created by accessing a Network Management server. The MAC address/VLAN ID mapping is set up by the Network Administrator and the server assigns a VLAN ID when the device contacts it.
  • 25. Types of VLANs 25-31 Types of Port-Based VLANs: Defined by the type of traffic they support or by the functions they perform. – Data VLAN. – Management VLAN. – Default VLAN. – Native VLAN. – Voice VLAN.
  • 26. Outlines • Introduction • Why VLAN? • VLAN Trunking • VLAN Tagging • Types of VLAN • Advantages and Disadvantages • Conclusion • References 26-31
  • 27. Advantages and Disadvantages 27-31 Advantages Disadvantages  Higher performance and reduced latency.  Users may work on sensitive information which should not be seen by other users.  VLAN Removes the physical boundary × Management is complex × Possible problems in interoperability × A VLAN cannot forward traffic to another VLAN(need a router to communicate between VLANs)
  • 28. Outlines • Introduction • Why VLAN? • VLAN Trunking • VLAN Tagging • Types of VLAN • Advantages and Disadvantages • Conclusion • References 28-31
  • 29. Conclusion • Using VLANs in networks, greatly reduces costs of setting up and maintenance of the networks. • VLAN helps the manager of the network in managing hosts and their limitations and accesses. • By using VLAN, hosts in different and independent LANs can be in a same broadcast domain. • VLANs may low-off the requirement of using switches, therefore the probability of cyber attacks decreases. 29-31
  • 30. References 30-31 [1] James F. Kurose & Keith W. Ross, Computer Networking a t T Top-Down Approach, Sixth edition [2] Andrew S. Tanenbaum, Computer Networks, Fourth edition [3] www.cyberlone.com [4] www.firewall.cx [5] www.wikipedia.org [6] www.blog.router-switch.com
  • 31. Thank you for your attention! The End 31-31 Any Questions?