SlideShare a Scribd company logo
Virtual Local Area Network (VLAN)
Co-ordinated By:
K.Sandeep Kumar
Seminar By:
P.Vinodhini Veena
10321A12C0
Guided By:
M. Sandhya Rani
Faculty pc1 Faculty pc2
Student pc
Table of Contents
Objective
Introduction
VLAN Overview
VLAN in detail
Types of VLAN
Network traffic types
Switch ports
Managing VLAN
Benefits of VLAN over WLAN
Conclusion
References
Questions time
Objective
The main Objective of this presentation is to
 Explain importance of VLAN in today's life.
 To show configuring and Managing of VLAN
 How it`s beneficial from WLAN.
 TO show the Role of VLAN in switched LAN
Introduction
VLAN stands for Virtual Local Area Network.
• Viewed as a group of devices on different physical
LAN
• Can communicate with each other as if they were
all on the same physical LAN
• Configured through software rather than
hardware
• Extremely flexible.
Introduction
 Both the switches and VLAN go together.
 VLAN gives the administrator flexibility .
 VLAN extends the traditional router bonded
broadcast domain to VLAN bonded
broadcast domain.
Introducing VLANs (1)
 VLAN ID Ranges - Access VLANs are divided into either a
normal range or an extended range.
 Normal Range VLANs -Used in small- and medium-sized
business and enterprise networks.
 Identified by a VLAN ID between 1 and 1005.
 IDs 1002 through 1005 are reserved for Token Ring and FDDI (Fiber
distributed data interface)VLANs.
 IDs 1 and 1002 to 1005 are automatically created and cannot be
removed.
 Configurations are stored within a VLAN database file, called vlan.dat.
 The vlan.dat file is located in the flash memory of the switch.
 The VLAN trunking protocol (VTP), which helps to manage
VLAN configurations between switches, can learn only normal
range VLANs and stores them in the VLAN database file.
Introducing VLANs (2)
 Extended Range VLANs - Enable service providers to
extend their infrastructure to a greater number of
customers.
 Some global enterprises could be large enough to need
extended range VLAN IDs.
 Are identified by a VLAN ID between 1006 and 4094.
 Support fewer VLAN features than normal range
VLANs.
 Are saved in the running configuration file.
Introducing VLANs (3)
 255 VLANs Configurable
 One Cisco Catalyst 2960 switch can support up to 255
normal range and extended range VLANs, although the
number configured affects the performance of the
switch hardware.
VLAN Overview (1)
 A VLAN allows a network administrator to create groups of
logically networked devices that act as if they are on their own
independent network, even if they share a common
infrastructure with other VLANs.
 Using VLANs, you can logically segment switched networks
based on functions, departments, or project teams.
 You can also use a VLAN to geographically structure your
network to support the growing reliance of companies on
home-based workers.
 These VLANs allow the network administrator to implement
access and security policies to particular groups of users.
VLAN Overview (2)
VLAN in detail
 A VLAN is a logically separated IP sub network.
 VLANs allow multiple IP networks and subnets to
exist on the same switched network.
 For computers to communicate on the same VLAN,
each must have an IP address and a subnet mask that
is consistent for that VLAN.
 The switch has to be configured with the VLAN and
each port in the VLAN must be assigned to the VLAN.
VLAN in detail (1)
 A switch port with a singular VLAN configured
on it is called an access port.
 Remember, just because two computers are
physically connected to the same switch does
not mean that they can communicate.
 Devices on two separate networks and subnets
must communicate via a router (Layer 3), using
VLANs.
VLAN in detail(2)
Types of VLANs
 Data VLAN
 Default VLAN
 Native VLAN
 Management VLAN
 Voice VLAN
Data VLAN
 Data VLAN - a VLAN that is configured to carry
only user-generated traffic.
 It is common practice to separate voice and
management traffic from data traffic.
 A data VLAN is sometimes referred to as a user
VLAN.
Data VLAN(1)
Default VLAN
 All switch ports become a member of the default
VLAN after the initial boot up of the switch.
 Having all the switch ports participate in the default
VLAN makes them all part of the same broadcast
domain.
 This allows any device connected to any switch port to
communicate with other devices on other switch ports.
 The default VLAN for Cisco switches is VLAN 1.
 VLAN 1 has all the features of any VLAN, except that
you cannot rename it and you can not delete it.
Default VLAN(1)
 Layer 2 controls traffic, such as CDP and spanning
tree protocol traffic, will always be associated with
VLAN 1 - this cannot be changed.
 In the figure, VLAN 1 traffic is forwarded over the
VLAN trunks connecting the S1, S2, and S3 switches.
 It is a security best practice to change the default
VLAN to a VLAN other than VLAN 1; this entails
configuring all the ports on the switch to be
associated with a default VLAN other than VLAN 1.
Default VLAN(2)
Native VLAN (1)
 A native VLAN is assigned to an 802.1Q trunk port.
 An 802.1Q trunk port supports traffic coming from
many VLANs (tagged traffic) as well as traffic that
does not come from a VLAN (untagged traffic).
 The 802.1Q trunk port places untagged traffic on the
native VLAN.
 In the figure, the native VLAN is VLAN 99.
 Untagged traffic is generated by a computer attached
to a switch port that is configured with the native
VLAN.
Native VLAN (2)
 Native VLANs are set out in the IEEE 802.1Q
specification to maintain backward compatibility
with untagged traffic common to legacy LAN
scenarios.
 For our purposes, a native VLAN serves as a
common identifier on opposing ends of a trunk
link.
 It is a best practice to use a VLAN other than
VLAN 1 as the native VLAN.
Native VLAN (3)
Management VLAN
 A management VLAN is any VLAN you configure to
access the management capabilities of a switch.
 VLAN 1 would serve as the management VLAN if you
did not proactively define a unique VLAN to serve as
the management VLAN.
 You assign the management VLAN an IP address and
subnet mask.
 A switch can be managed via HTTP, Telnet, SSH, or
SNMP.
 VLAN 1 is normally used as the default VLAN,
 VLAN1 would be a bad choice as the management
VLAN; you wouldn't want an arbitrary user connecting to
a switch to default to the management VLAN.
Management VLAN (1)
Voice VLAN
 It is easy to appreciate why a separate VLAN is
needed to support Voice over IP (VoIP).
 VoIP traffic requires:
 Assured bandwidth to ensure voice quality
 Transmission priority over other types of network
traffic
 Ability to be routed around congested areas on
the network
 Delay of less than 150 milliseconds (ms) across the
network
 Voice VLAN works between a Catalyst switch, A
Cisco ip Phone and a computer.
Voice VLAN (1)
Voice VLAN (2)
The Cisco IP Phone contains an integrated three-port
10/100 switch as shown in the Figure. The ports provide
dedicated connections to these devices :
 Port 1 connects to the switch or other voice-over-IP
(VoIP) device.
 Port 2 is an internal 10/100 interface that carries the IP
phone traffic.
 Port 3 (access port) connects to a PC or other device.
Voice VLAN (3)
Voice VLAN (4)
Sample switch port output associated with ip phone-connected port
Network traffic type
As VLAN has all the characteristics of LAN a Vlan
Should accommodate the same nw traffic as LAN
This includes :
• Network management traffic
• Control traffic
• Ip telephony traffic
• Multicast traffic
• Normal data traffic
• Scavenger class traffic
Network traffic type (1)
 Network Management and Control Traffic
Many different types of network management
and control traffic can be present on the
network, such as Cisco Discovery Protocol (CDP)
updates, Simple Network Management Protocol
(SNMP) traffic, and Remote Monitoring (RMON)
traffic.
Network traffic type (2)
Network traffic type (3)
IP Telephony
 The types of IP telephony traffic are signaling traffic
and voice traffic.
 Signaling traffic is, responsible for call setup,
progress, and teardown, and traverses the network
end to end.
 The other type of telephony traffic consists of data
packets of the actual voice conversation.
 Data traffic should be associated with a data VLAN
(other than VLAN 1), and voice traffic is associated
with a voice VLAN.
Network traffic type (4)
Network traffic type (5)
 IP Multicast
 IP multicast traffic is sent from a particular source address to a
multicast group that is identified by a single IP and MAC
destination-group address pair.
 Multicast traffic can produce a large amount of data streaming
across the network.
 When the network must support multicast traffic, VLANs should
be configured to ensure multicast traffic only goes to those user
devices that use the service provided, such as remote video or
audio applications.
 Routers must be configured to ensure that multicast traffic is
forwarded to the network areas where it is requested.
Network traffic type (6)
Normal Data
 Normal data traffic is related to file creation
and storage, print services, e-mail database
access, and other shared network applications
that are common to business uses.
 VLANs are a natural solution for this type of
traffic because you can segment users by their
functions or geographic area to more easily
manage their specific needs.
Network traffic type (7)
Scavenger Class
 The Scavenger class is intended to provide less-than best-
effort services to certain applications.
 Applications assigned to this class have little or no
contribution to the organizational objectives of the enterprise
and are typically entertainment oriented in nature.
 These include peer-to-peer media-sharing applications
(KaZaa, Morpheus, Groekster, Napster, iMesh, and so on),
gaming applications (Doom, Quake, Unreal Tournament, and
so on), and any entertainment video applications.
VLAN Switch Port (1)
 Static VLAN - Ports on a switch are manually assigned to a
VLAN.
 Static VLANs are configured using the Cisco CLI.
 This can also be accomplished with GUI management applications, such
as the Cisco Network Assistant.
 Dynamic VLAN - This mode is not widely used in production
networks.
 A dynamic port VLAN membership is configured using a special server
called a VLAN Membership Policy Server (VMPS).
 With the VMPS, you assign switch ports to VLANs dynamically, based on
the source MAC address of the device connected to the port.
 The benefit comes when you move a host from a port on one switch in the
network to a port on another switch in the network-the switch
dynamically assigns the new port to the proper VLAN for that host.
VLAN Switch Port (3)
VLAN Switch Port (2)
 Voice VLAN - A port is configured to be in voice mode so that it
can support an IP phone attached to it.
 It is assumed that the network has been configured to ensure
that voice traffic can be transmitted with a priority status over
the network.
 When a phone is first plugged into a switch port that is in voice
mode, the switch port sends messages to the phone providing
the phone with the appropriate voice VLAN ID and
configuration.
 The IP phone tags the voice frames with the voice VLAN ID and
forwards all voice traffic through the voice VLAN.
VLAN Switch Port (4)
Controlling Broadcast
Domain
Single VLAN
Controlling Broadcast
Domain
Two VLANs
Controlling Broadcast
Domain
Intra VLAN communication
ARP request and Mac address
Configuring VLANs
Configuring VLANs (1)
Configuring VLANs (2)
The use of show VLAN brief command to display the contents of vlan.dat
File the default VLANs can be seen and student Vlan is highleted
Configuring VLANs(3)
Managing Vlans
Deleting a VLAN
Benefits of VLAN over WLAN
Benefits of VLAN over WLAN(1)
 Security - Groups that have sensitive data are
separated from the rest of the network, decreasing
the chances of confidential information breaches.
 Faculty computers are on VLAN 10 and completely
separated from student and guest data traffic.
 Cost reduction - Cost savings result from less need
for expensive network upgrades and more efficient
use of existing bandwidth and uplinks.
Benefits of VLAN over WLAN
(2)
 Higher performance - Dividing flat Layer 2 networks
into multiple logical workgroups (broadcast domains)
reduces unnecessary traffic on the network and
boosts performance.
 Broadcast storm mitigation - Dividing a network into
VLANs reduces the number of devices that may
participate in a broadcast storm.
 In the figure you can see that although there are six
computers on this network, there are only three
broadcast domains: Faculty, Student, and Guest.
Benefits of VLAN over
WLAN(3)
 Improved IT staff efficiency - VLANs make it easier to
manage the network because users with similar
network requirements share the same VLAN.
 When you provide a new switch, all the policies and
procedures already configured for the particular VLAN
are implemented when the ports are assigned.
 It is also easy for the IT staff to identify the function of
a VLAN by giving it an appropriate name.
 In the figure, for easy identification VLAN 20 could be
named "Student", VLAN 10 could be named "Faculty",
and VLAN 30 "Guest."
Benefits of VLAN over
WLAN(4)
 Simpler project or application management -
VLANs aggregate users and network devices to
support business or geographic requirements.
 Having separate functions makes managing a project
or working with a specialized application easier, for
example, an e-learning development platform for
faculty.
 It is also easier to determine the scope of the effects of
upgrading network services.
Conclusion
 VLANs are used to segment broadcast
domains
 In a switched LAN.
 This improves the performance and
manageability of LANs
 VLAS provide network administrators flexible
control over traffic associated with devices in
LAN
 Reduce the cost of dealing with moves and
changes for organizations seen as an added
benefit.
References
 "VLAN Information." UCDavis Network 21. 06 Mar. 2006
<http://net21.ucdavis.edu/newvlan.htm>.
 "VLAN." 06 Mar. 2006 <http://www.webopedia.com/TERM/V/VLAN.html>.
 "Answers.com." Virtual LAN. 06 Mar. 2006
<http://www.answers.com/topic/virtual-lan?method=6>.
 "Network World Research Center." VLAN (Virtual LAN). 06 Mar. 2006
<http://www.networkworld.com/details/471.html>.
 "The Virtual LAN Technology Report." 1996. decisys. 06 Mar. 2006
<http://www.3com.com/other/pdfs/solutions/en_US/20037401.pdf>.
 "Virtual LAN." Wikipedia The Free Online Encyclopedia. 02 Mar. 2006. 06
Mar. 2006 <http://en.wikipedia.org/wiki/VLAN>.
You’ve got minutes to ask…
Any Queries ?
Vlan final

More Related Content

What's hot

Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
Lilesh Pathe
 
Ccna summer training ppt
Ccna summer training pptCcna summer training ppt
Ccna summer training ppt
saroj choudhary
 
Vlan
VlanVlan
Inter VLAN Routing
Inter VLAN RoutingInter VLAN Routing
Inter VLAN Routing
Netwax Lab
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
Er. Anmol Bhagat
 
Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switching
Sumita Das
 
VLAN Network for Extreme Networks
VLAN Network for Extreme NetworksVLAN Network for Extreme Networks
VLAN Network for Extreme Networks
Dani Royman Simanjuntak
 
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersCisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Bruno Teixeira
 
IP Address
IP AddressIP Address
IP Address
Rahul P
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
Darshan Dalwadi
 
Nat
NatNat
VPC PPT @NETWORKERSHOME
VPC PPT @NETWORKERSHOMEVPC PPT @NETWORKERSHOME
VPC PPT @NETWORKERSHOME
networkershome
 
Link Aggregation Group - LACP
Link Aggregation Group - LACPLink Aggregation Group - LACP
Link Aggregation Group - LACP
PLVision
 
Switching
SwitchingSwitching
Switching
sheekha_11
 
Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)
KHNOG
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
miteshppt
 
MPLS
MPLSMPLS

What's hot (20)

Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
Ccna summer training ppt
Ccna summer training pptCcna summer training ppt
Ccna summer training ppt
 
Packet tracer
Packet tracerPacket tracer
Packet tracer
 
Vlan
VlanVlan
Vlan
 
Inter VLAN Routing
Inter VLAN RoutingInter VLAN Routing
Inter VLAN Routing
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switching
 
VLAN Network for Extreme Networks
VLAN Network for Extreme NetworksVLAN Network for Extreme Networks
VLAN Network for Extreme Networks
 
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersCisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
 
IP Address
IP AddressIP Address
IP Address
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
Nat
NatNat
Nat
 
VPC PPT @NETWORKERSHOME
VPC PPT @NETWORKERSHOMEVPC PPT @NETWORKERSHOME
VPC PPT @NETWORKERSHOME
 
Link Aggregation Group - LACP
Link Aggregation Group - LACPLink Aggregation Group - LACP
Link Aggregation Group - LACP
 
Switching
SwitchingSwitching
Switching
 
Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Vlan
VlanVlan
Vlan
 
MPLS
MPLSMPLS
MPLS
 

Viewers also liked

VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation
Mohit Kumar
 
Presentation
PresentationPresentation
Presentation
Ismail Miah
 
Lan security ipv6 presentation
Lan security ipv6 presentationLan security ipv6 presentation
Lan security ipv6 presentation
yateendrasahu
 
LAN Security
LAN Security LAN Security
LAN Security
Syed Ubaid Ali Jafri
 
Network switches, functions & role in networks
Network switches, functions & role in networksNetwork switches, functions & role in networks
Network switches, functions & role in networks
IT Tech
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniquestameemyousaf
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 

Viewers also liked (9)

VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation
 
Presentation
PresentationPresentation
Presentation
 
Lan security ipv6 presentation
Lan security ipv6 presentationLan security ipv6 presentation
Lan security ipv6 presentation
 
LAN Security
LAN Security LAN Security
LAN Security
 
Network switches, functions & role in networks
Network switches, functions & role in networksNetwork switches, functions & role in networks
Network switches, functions & role in networks
 
VLAN
VLANVLAN
VLAN
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Network security
Network securityNetwork security
Network security
 

Similar to Vlan final

W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdfW3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
gummybear37
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
Atakan ATAK
 
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram SnehiVLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
MR. VIKRAM SNEHI
 
Vlan.pdf
Vlan.pdfVlan.pdf
Vlan.pdf
itwkd
 
Transceviers
TransceviersTransceviers
Transceviers
vinay mp
 
Vlan Types
Vlan TypesVlan Types
Vlan Types
IT Tech
 
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptxLecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
SaqibAhmedKhan4
 
1. Explain the significance of each of the following types of VLAN .pdf
1. Explain the significance of each of the following types of VLAN .pdf1. Explain the significance of each of the following types of VLAN .pdf
1. Explain the significance of each of the following types of VLAN .pdf
banishkyliachomasl99
 
Virtual local area networks
Virtual local area networksVirtual local area networks
Virtual local area networksRavi Kodoli
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptx
BOURY1
 
Chapter 8 .vlan.pdf
Chapter 8 .vlan.pdfChapter 8 .vlan.pdf
Chapter 8 .vlan.pdf
manojkumar595505
 
Virtual Local Area Networks (VLANs) and Types.pptx
Virtual Local Area Networks (VLANs) and Types.pptxVirtual Local Area Networks (VLANs) and Types.pptx
Virtual Local Area Networks (VLANs) and Types.pptx
Vignesh kumar
 
Vlans and inter vlan routing
Vlans and inter vlan routingVlans and inter vlan routing
Vlans and inter vlan routing
Mohammedseleim
 
Config vlans
Config vlansConfig vlans
Config vlans
amri am
 
VLAN (virtual local area network)
VLAN (virtual local area network)VLAN (virtual local area network)
VLAN (virtual local area network)
Netwax Lab
 
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
VLAN -VIRTUAL LAN -COMPUTER NETWORKSVLAN -VIRTUAL LAN -COMPUTER NETWORKS
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
NITHIN KALLE PALLY
 
CCNA_RSE_Chp6.pptx
CCNA_RSE_Chp6.pptxCCNA_RSE_Chp6.pptx
CCNA_RSE_Chp6.pptx
santosh Kumar
 
Openstack Neutron Insights
Openstack Neutron InsightsOpenstack Neutron Insights
Openstack Neutron Insights
Atul Pandey
 

Similar to Vlan final (20)

W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdfW3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
 
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram SnehiVLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
 
Vlan.pdf
Vlan.pdfVlan.pdf
Vlan.pdf
 
Transceviers
TransceviersTransceviers
Transceviers
 
Vlan
VlanVlan
Vlan
 
Vlan Types
Vlan TypesVlan Types
Vlan Types
 
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptxLecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
 
1. Explain the significance of each of the following types of VLAN .pdf
1. Explain the significance of each of the following types of VLAN .pdf1. Explain the significance of each of the following types of VLAN .pdf
1. Explain the significance of each of the following types of VLAN .pdf
 
Virtual local area networks
Virtual local area networksVirtual local area networks
Virtual local area networks
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptx
 
Chapter 8 .vlan.pdf
Chapter 8 .vlan.pdfChapter 8 .vlan.pdf
Chapter 8 .vlan.pdf
 
Virtual Local Area Networks (VLANs) and Types.pptx
Virtual Local Area Networks (VLANs) and Types.pptxVirtual Local Area Networks (VLANs) and Types.pptx
Virtual Local Area Networks (VLANs) and Types.pptx
 
Virtual lan
Virtual lanVirtual lan
Virtual lan
 
Vlans and inter vlan routing
Vlans and inter vlan routingVlans and inter vlan routing
Vlans and inter vlan routing
 
Config vlans
Config vlansConfig vlans
Config vlans
 
VLAN (virtual local area network)
VLAN (virtual local area network)VLAN (virtual local area network)
VLAN (virtual local area network)
 
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
VLAN -VIRTUAL LAN -COMPUTER NETWORKSVLAN -VIRTUAL LAN -COMPUTER NETWORKS
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
 
CCNA_RSE_Chp6.pptx
CCNA_RSE_Chp6.pptxCCNA_RSE_Chp6.pptx
CCNA_RSE_Chp6.pptx
 
Openstack Neutron Insights
Openstack Neutron InsightsOpenstack Neutron Insights
Openstack Neutron Insights
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Vlan final

  • 1. Virtual Local Area Network (VLAN) Co-ordinated By: K.Sandeep Kumar Seminar By: P.Vinodhini Veena 10321A12C0 Guided By: M. Sandhya Rani Faculty pc1 Faculty pc2 Student pc
  • 2. Table of Contents Objective Introduction VLAN Overview VLAN in detail Types of VLAN Network traffic types Switch ports Managing VLAN Benefits of VLAN over WLAN Conclusion References Questions time
  • 3. Objective The main Objective of this presentation is to  Explain importance of VLAN in today's life.  To show configuring and Managing of VLAN  How it`s beneficial from WLAN.  TO show the Role of VLAN in switched LAN
  • 4. Introduction VLAN stands for Virtual Local Area Network. • Viewed as a group of devices on different physical LAN • Can communicate with each other as if they were all on the same physical LAN • Configured through software rather than hardware • Extremely flexible.
  • 5. Introduction  Both the switches and VLAN go together.  VLAN gives the administrator flexibility .  VLAN extends the traditional router bonded broadcast domain to VLAN bonded broadcast domain.
  • 6. Introducing VLANs (1)  VLAN ID Ranges - Access VLANs are divided into either a normal range or an extended range.  Normal Range VLANs -Used in small- and medium-sized business and enterprise networks.  Identified by a VLAN ID between 1 and 1005.  IDs 1002 through 1005 are reserved for Token Ring and FDDI (Fiber distributed data interface)VLANs.  IDs 1 and 1002 to 1005 are automatically created and cannot be removed.  Configurations are stored within a VLAN database file, called vlan.dat.  The vlan.dat file is located in the flash memory of the switch.  The VLAN trunking protocol (VTP), which helps to manage VLAN configurations between switches, can learn only normal range VLANs and stores them in the VLAN database file.
  • 7. Introducing VLANs (2)  Extended Range VLANs - Enable service providers to extend their infrastructure to a greater number of customers.  Some global enterprises could be large enough to need extended range VLAN IDs.  Are identified by a VLAN ID between 1006 and 4094.  Support fewer VLAN features than normal range VLANs.  Are saved in the running configuration file.
  • 8. Introducing VLANs (3)  255 VLANs Configurable  One Cisco Catalyst 2960 switch can support up to 255 normal range and extended range VLANs, although the number configured affects the performance of the switch hardware.
  • 9. VLAN Overview (1)  A VLAN allows a network administrator to create groups of logically networked devices that act as if they are on their own independent network, even if they share a common infrastructure with other VLANs.  Using VLANs, you can logically segment switched networks based on functions, departments, or project teams.  You can also use a VLAN to geographically structure your network to support the growing reliance of companies on home-based workers.  These VLANs allow the network administrator to implement access and security policies to particular groups of users.
  • 11. VLAN in detail  A VLAN is a logically separated IP sub network.  VLANs allow multiple IP networks and subnets to exist on the same switched network.  For computers to communicate on the same VLAN, each must have an IP address and a subnet mask that is consistent for that VLAN.  The switch has to be configured with the VLAN and each port in the VLAN must be assigned to the VLAN.
  • 12. VLAN in detail (1)  A switch port with a singular VLAN configured on it is called an access port.  Remember, just because two computers are physically connected to the same switch does not mean that they can communicate.  Devices on two separate networks and subnets must communicate via a router (Layer 3), using VLANs.
  • 14. Types of VLANs  Data VLAN  Default VLAN  Native VLAN  Management VLAN  Voice VLAN
  • 15. Data VLAN  Data VLAN - a VLAN that is configured to carry only user-generated traffic.  It is common practice to separate voice and management traffic from data traffic.  A data VLAN is sometimes referred to as a user VLAN.
  • 17. Default VLAN  All switch ports become a member of the default VLAN after the initial boot up of the switch.  Having all the switch ports participate in the default VLAN makes them all part of the same broadcast domain.  This allows any device connected to any switch port to communicate with other devices on other switch ports.  The default VLAN for Cisco switches is VLAN 1.  VLAN 1 has all the features of any VLAN, except that you cannot rename it and you can not delete it.
  • 18. Default VLAN(1)  Layer 2 controls traffic, such as CDP and spanning tree protocol traffic, will always be associated with VLAN 1 - this cannot be changed.  In the figure, VLAN 1 traffic is forwarded over the VLAN trunks connecting the S1, S2, and S3 switches.  It is a security best practice to change the default VLAN to a VLAN other than VLAN 1; this entails configuring all the ports on the switch to be associated with a default VLAN other than VLAN 1.
  • 20. Native VLAN (1)  A native VLAN is assigned to an 802.1Q trunk port.  An 802.1Q trunk port supports traffic coming from many VLANs (tagged traffic) as well as traffic that does not come from a VLAN (untagged traffic).  The 802.1Q trunk port places untagged traffic on the native VLAN.  In the figure, the native VLAN is VLAN 99.  Untagged traffic is generated by a computer attached to a switch port that is configured with the native VLAN.
  • 21. Native VLAN (2)  Native VLANs are set out in the IEEE 802.1Q specification to maintain backward compatibility with untagged traffic common to legacy LAN scenarios.  For our purposes, a native VLAN serves as a common identifier on opposing ends of a trunk link.  It is a best practice to use a VLAN other than VLAN 1 as the native VLAN.
  • 23. Management VLAN  A management VLAN is any VLAN you configure to access the management capabilities of a switch.  VLAN 1 would serve as the management VLAN if you did not proactively define a unique VLAN to serve as the management VLAN.  You assign the management VLAN an IP address and subnet mask.  A switch can be managed via HTTP, Telnet, SSH, or SNMP.  VLAN 1 is normally used as the default VLAN,  VLAN1 would be a bad choice as the management VLAN; you wouldn't want an arbitrary user connecting to a switch to default to the management VLAN.
  • 25. Voice VLAN  It is easy to appreciate why a separate VLAN is needed to support Voice over IP (VoIP).  VoIP traffic requires:  Assured bandwidth to ensure voice quality  Transmission priority over other types of network traffic  Ability to be routed around congested areas on the network  Delay of less than 150 milliseconds (ms) across the network  Voice VLAN works between a Catalyst switch, A Cisco ip Phone and a computer.
  • 27. Voice VLAN (2) The Cisco IP Phone contains an integrated three-port 10/100 switch as shown in the Figure. The ports provide dedicated connections to these devices :  Port 1 connects to the switch or other voice-over-IP (VoIP) device.  Port 2 is an internal 10/100 interface that carries the IP phone traffic.  Port 3 (access port) connects to a PC or other device.
  • 29. Voice VLAN (4) Sample switch port output associated with ip phone-connected port
  • 30. Network traffic type As VLAN has all the characteristics of LAN a Vlan Should accommodate the same nw traffic as LAN This includes : • Network management traffic • Control traffic • Ip telephony traffic • Multicast traffic • Normal data traffic • Scavenger class traffic
  • 31. Network traffic type (1)  Network Management and Control Traffic Many different types of network management and control traffic can be present on the network, such as Cisco Discovery Protocol (CDP) updates, Simple Network Management Protocol (SNMP) traffic, and Remote Monitoring (RMON) traffic.
  • 33. Network traffic type (3) IP Telephony  The types of IP telephony traffic are signaling traffic and voice traffic.  Signaling traffic is, responsible for call setup, progress, and teardown, and traverses the network end to end.  The other type of telephony traffic consists of data packets of the actual voice conversation.  Data traffic should be associated with a data VLAN (other than VLAN 1), and voice traffic is associated with a voice VLAN.
  • 35. Network traffic type (5)  IP Multicast  IP multicast traffic is sent from a particular source address to a multicast group that is identified by a single IP and MAC destination-group address pair.  Multicast traffic can produce a large amount of data streaming across the network.  When the network must support multicast traffic, VLANs should be configured to ensure multicast traffic only goes to those user devices that use the service provided, such as remote video or audio applications.  Routers must be configured to ensure that multicast traffic is forwarded to the network areas where it is requested.
  • 36. Network traffic type (6) Normal Data  Normal data traffic is related to file creation and storage, print services, e-mail database access, and other shared network applications that are common to business uses.  VLANs are a natural solution for this type of traffic because you can segment users by their functions or geographic area to more easily manage their specific needs.
  • 37. Network traffic type (7) Scavenger Class  The Scavenger class is intended to provide less-than best- effort services to certain applications.  Applications assigned to this class have little or no contribution to the organizational objectives of the enterprise and are typically entertainment oriented in nature.  These include peer-to-peer media-sharing applications (KaZaa, Morpheus, Groekster, Napster, iMesh, and so on), gaming applications (Doom, Quake, Unreal Tournament, and so on), and any entertainment video applications.
  • 38. VLAN Switch Port (1)  Static VLAN - Ports on a switch are manually assigned to a VLAN.  Static VLANs are configured using the Cisco CLI.  This can also be accomplished with GUI management applications, such as the Cisco Network Assistant.  Dynamic VLAN - This mode is not widely used in production networks.  A dynamic port VLAN membership is configured using a special server called a VLAN Membership Policy Server (VMPS).  With the VMPS, you assign switch ports to VLANs dynamically, based on the source MAC address of the device connected to the port.  The benefit comes when you move a host from a port on one switch in the network to a port on another switch in the network-the switch dynamically assigns the new port to the proper VLAN for that host.
  • 40. VLAN Switch Port (2)  Voice VLAN - A port is configured to be in voice mode so that it can support an IP phone attached to it.  It is assumed that the network has been configured to ensure that voice traffic can be transmitted with a priority status over the network.  When a phone is first plugged into a switch port that is in voice mode, the switch port sends messages to the phone providing the phone with the appropriate voice VLAN ID and configuration.  The IP phone tags the voice frames with the voice VLAN ID and forwards all voice traffic through the voice VLAN.
  • 44. Controlling Broadcast Domain Intra VLAN communication ARP request and Mac address
  • 47. Configuring VLANs (2) The use of show VLAN brief command to display the contents of vlan.dat File the default VLANs can be seen and student Vlan is highleted
  • 51. Benefits of VLAN over WLAN
  • 52. Benefits of VLAN over WLAN(1)  Security - Groups that have sensitive data are separated from the rest of the network, decreasing the chances of confidential information breaches.  Faculty computers are on VLAN 10 and completely separated from student and guest data traffic.  Cost reduction - Cost savings result from less need for expensive network upgrades and more efficient use of existing bandwidth and uplinks.
  • 53. Benefits of VLAN over WLAN (2)  Higher performance - Dividing flat Layer 2 networks into multiple logical workgroups (broadcast domains) reduces unnecessary traffic on the network and boosts performance.  Broadcast storm mitigation - Dividing a network into VLANs reduces the number of devices that may participate in a broadcast storm.  In the figure you can see that although there are six computers on this network, there are only three broadcast domains: Faculty, Student, and Guest.
  • 54. Benefits of VLAN over WLAN(3)  Improved IT staff efficiency - VLANs make it easier to manage the network because users with similar network requirements share the same VLAN.  When you provide a new switch, all the policies and procedures already configured for the particular VLAN are implemented when the ports are assigned.  It is also easy for the IT staff to identify the function of a VLAN by giving it an appropriate name.  In the figure, for easy identification VLAN 20 could be named "Student", VLAN 10 could be named "Faculty", and VLAN 30 "Guest."
  • 55. Benefits of VLAN over WLAN(4)  Simpler project or application management - VLANs aggregate users and network devices to support business or geographic requirements.  Having separate functions makes managing a project or working with a specialized application easier, for example, an e-learning development platform for faculty.  It is also easier to determine the scope of the effects of upgrading network services.
  • 56. Conclusion  VLANs are used to segment broadcast domains  In a switched LAN.  This improves the performance and manageability of LANs  VLAS provide network administrators flexible control over traffic associated with devices in LAN  Reduce the cost of dealing with moves and changes for organizations seen as an added benefit.
  • 57. References  "VLAN Information." UCDavis Network 21. 06 Mar. 2006 <http://net21.ucdavis.edu/newvlan.htm>.  "VLAN." 06 Mar. 2006 <http://www.webopedia.com/TERM/V/VLAN.html>.  "Answers.com." Virtual LAN. 06 Mar. 2006 <http://www.answers.com/topic/virtual-lan?method=6>.  "Network World Research Center." VLAN (Virtual LAN). 06 Mar. 2006 <http://www.networkworld.com/details/471.html>.  "The Virtual LAN Technology Report." 1996. decisys. 06 Mar. 2006 <http://www.3com.com/other/pdfs/solutions/en_US/20037401.pdf>.  "Virtual LAN." Wikipedia The Free Online Encyclopedia. 02 Mar. 2006. 06 Mar. 2006 <http://en.wikipedia.org/wiki/VLAN>.
  • 58. You’ve got minutes to ask… Any Queries ?