Virtual Local Area Networks (VLAN) Group 3 Shade Alabsa, Blayne Cohran, Betty Kretlow, Sayali Joshi, Siva Kalyan Chakravarthy.

Slides:



Advertisements
Similar presentations
LAN Segmentation Virtual LAN (VLAN).
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
Virtual LANs.
VLAN KRISHNAKUMAR RAJENDRAN NIKITA PATEL TEJENDRA PATEL Guided by Prof, Edmund Gean.
VLANs Virtual LANs CIS 278.
Oct 12, 2004CS573: Network Protocols and Standards1 Virtual LANs Network Protocols and Standards Autumn
VLANs and GVRP Curtis Simonson Bridge Functions Consortium InterOperability Lab July, 2000.
VLANs Module 2. 2 VLANs  VLANs  Trunking  VLAN Trunking Protocol (VTP)
Ethernet and switches selected topics 1. Agenda Scaling ethernet infrastructure VLANs 2.
VLANs (Virtual LANs) CS 158B Elaine Lim Allison Nham.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
VLANs- Chapter 3 CCNA Exploration Semester 3 Modified by Profs. Ward
Jan 10, 2008CS573: Network Protocols and Standards1 Virtual LANs Network Protocols and Standards Winter
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 8: Virtual LANs (VLANs)
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Sybex CCNA Chapter 9: VLAN’s Instructor & Todd Lammle.
VLANs.ppt CCNA Exploration Semester 3 Chapter 3
CCENT Study Guide Chapter 11 VLANs and Inter-VLAN Routing.
1 Lecture #6 Switch – VLAN Asst.Prof. Dr.Anan Phonphoem Department of Computer Engineering, Faculty of Engineering, Kasetsart University, Bangkok, Thailand.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel.
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
IEEE 802.1q - VLANs Nick Poorman.
Semester 3, v Chapter 3: Virtual LANs
Sybex CCNA Chapter 11: VLAN’s Instructor & Todd Lammle.
VLAN Trunking Protocol
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VLANs.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
VLAN Suman Pandey. References D. Passmore, and J. Freeman, “The Virtual LAN Technology Report”, March, 1997 IEEE.
Chapter 8: Virtual LAN (VLAN)
CS 540 Computer Networks II
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
© 2002, Cisco Systems, Inc. All rights reserved..
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs Cisco Networking Academy.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Switching Topic 2 VLANs.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
Virtual LAN (VLAN) W.lilakiatsakun. VLAN Overview (1) A VLAN allows a network administrator to create groups of logically networked devices that act as.
Virtual Local Area Networks (VLANs) Part II
Configuring VLAN Chapter 14 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Understand basic concept of VLAN  Configure.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
CCNA3 v3 Module 9 v3 CCNA 3 Module 9 JEOPARDY K. Martin.
Instructor & Todd Lammle Sybex CCNA Chapter 9: VLAN’s 1.
VLANs Last Update Copyright Kenneth M. Chipps Ph.D.
W&L Page 1 CCNA CCNA Training 2.5 Describe how VLANs create logically separate networks and the need for routing between them Jose Luis.
1 VLANs Relates to Lab 6. Short module on basics of VLAN switching.
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Chapter 8 – Virtual LANs Virtual LANs VLAN Concepts VLAN Configuration.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 VLANs.
Virtual Local Area Networks In Security By Mark Reed.
Switching and VLANs.
Chapter 11 VLANs and Inter-VLAN Routing
Large-scale (Campus) Lan design (Part II)
Virtual Local Area Networks or VLANs
HELLO WORLD!!! Run Project 2: WELCOME Subject: Virtual LAN’s
Switching and VLANs.
Virtual Local Area Networks (VLANs) Part I
VLANs: Virtual Local Area Networks
Virtual LANs.
Virtual Local Area Network
Switching and VLANs.
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
Switching and VLANs.
Chapter 3 VLANs Chaffee County Academy
Presentation transcript:

Virtual Local Area Networks (VLAN) Group 3 Shade Alabsa, Blayne Cohran, Betty Kretlow, Sayali Joshi, Siva Kalyan Chakravarthy

VLANs What is it? Why use VLANs? How does it work? What does it look like? Advantages and disadvantages Uses

What are VLANs? “A LAN consists of all devices in the same broadcast domain.” VLAN’s do this on the switch level allowing multiple broadcast domains on one switch. Partitions broadcast domain on the data link layer. Standardized by 802.1Q – Preceded by ISL from Cisco which is proprietary

Why use VLANs? “Switches are easy, routers are hard.” Users are assigned to one or more VLANs by an administrator, automatically or via a management system. The switches maintain VLAN configuration information. VLANs can span multiple switches and sites. Users should be grouped by community of interest, not location in building. However users in single community of interest are rarely located in same part of building. Groups of users are usually separated into their own IP networks for network management, performance, security and other policy reasons.

How does it work? Ethernet frames are tagged as they are encountered by the first VLAN aware host, usually the switch its connected to. Switches must know station VLAN membership across all switches. Table Maintenance Frame tagging TDM

VLAN Membership methods Membership by port Define which port of switch belong to which VLAN. Advantage : Easy to configure. Disadvantage : require switch reconfiguration whenever workstation moved from one place to another. Membership by MAC address (dynamic) Membership based on mac address of workstation. Switch automatically assigns port to a VLAN using device’s MAC address. When device connected to switch port, switch queries to VMPS to establish membership Membership by protocol type Header contains protocol type field. Traffic handled on the basis of its protocol. Segregates or forward traffic from port depending on protocol of traffic. Membership by IP subnet address Membership is based on Layer 3 header and switch reads layer 3 IP address and associate a VLAN membership.

What does it look like? Tag header : Information added to each frame to indicate which VLAN the frame belongs to. Bridges will forward frames only to those ports that belong to the VLAN instead of to all output ports. Two formats of Tag header are 1. Ethernet Frame Tag Header: 2. Token Ring and Fiber Distributed Data Interface (FDDI) : Tag control information(TCI) :

What does it look like? TPID – Tag Protocol Identifier 16 bit field set to 0x8100 to identify frame as an 802.1Q tagged frame Priority 3 bit field refers to 802.1P priority. Represented by 8 levels 0 -7 CFI – Canonical Format Indicator 1 bit field to indicate whether the mac address is canonical format. 1 == noncanonical 0 == canonical VID – VLAN Identifier 12 bit field to uniquely identify which VLAN the frame belongs to. Frame Size

What does it look like? 802.1Q tag is 4 bytes Maximum frame size 1522 bytes and minimum is 68 bytes. On a switch that doesn’t support VLAN’s frames are silently dropped if the frame size is over 1518 Frames less than 1518 are processed as normal on non supporting VLAN switches.

Types of VLAN connections Trunk Link Devices connected to trunk link are VLAN-aware. All frames on a trunk link must have a special header attached.

Access Link Connects a VLAN-unaware device to the port of a VLAN-aware bridge. All frames on access links must be implicitly tagged. Hybrid Link Both VLAN-aware and VLAN-unaware devices are attached. Hybrid link can have both tagged and untagged frames, but all the frames for a specific VLAN must be either tagged or untagged. Access LinkHybrid Link

Frame Processing and Tagging Filtering Database Static Entries - Static information added, modified and deleted by management only. Two types of static entries Static Filtering entries Static Registration Entries Dynamic Entries – Learns by the bridge and not created or updated by the management. Entries are updated only if Port allows learning Source address is a workstation address and not a group address Space available in the database There are three types of dynamic entries Dynamic Filtering Entries Group Registration Entries Dynamic Registration Entries

Q-in-Q

Advantages and Disadvantages Allows formation of work groups And better isolation between groups of users Limits broadcast domains Facilitates network administration

Uses You can use multiple VLANs for a given L3 network to force traffic to go through an intermediary device, like an IDS. E.g, security zone DMZ gets a vlan for DMZ- Front and DMZ-Back. -Front connects firewall to upstream port on IDS, -Back connects downstream port on IDS to servers. Home brewed “VPN” across ISP – 802.1Q tunneling example

Resources Forouzan, Behrouz A. Data Communications and Networking, Fifth Edition. New York: McGraw-Hill, Print. Forouzan, Behrouz A. TCP/IP Protocol Suite. Boston: McGraw-Hill Higher Education, Print. Lammle, Todd. CCNA: Cisco Certified Network Associate Study Guide. Indianapolis, IN: Wiley, Print. Odom, Wendell, and Wendell Odom. CCENT/CCNA ICND Official Cert Guide ; CCNA ICND Official Cert Guide. N.p.: n.p., n.d. Print. Odom, Wendell. CCENT/CCNA ICND Official Cert Guide. Indianapolis, IN: Cisco, n.d. Print. Tanenbaum, Andrew S. Computer Networks. Upper Saddle River, NJ: Prentice Hall PTR, Print. Molenaar, Rene. "802.1Q Tunneling (Q-in-Q) Configuration Example." N.p., n.d. Web. Evenchik, Len. "Communication Protocols and Internet Architectures." (n.d.): n. pag. Harvard. Harvard. Web.. Varadarajan, Suba. "Virtual Local Area Networks." Virtual Local Area Networks. Washington University St. Louis, 14 Aug Web. 16 July "Inter-Switch Link and IEEE 802.1Q Frame Format." Cisco. Cisco, 25 Aug Web. 16 July