14. 14-31
In the VLAN trunking, a special port on each switch is configured as a trunk
port to interconnect the two VLAN switches.
1
8
9
102
7
…
Electrical Engineering
(VLAN ports 1-8)
Computer Science
(VLAN ports 9-15)
15
…
2
73
Ports 2,3,5 belong to EE VLAN
Ports 4,6,7,8 belong to CS VLAN
5
4 6 816
1
16. 16-31
VLAN Trunking
The trunk port belongs to all VLANs, and frames sent to any
VLAN are forwarded over the trunk link to the other switch.
Connecting two
VLAN switches
with two VLANs:
(a) two cables
(b) trunked
18. 18-31
VLAN Tagging
VLAN Tagging, also known as Frame Tagging, is a method to help identify packets
travelling through trunk links. When an Ethernet frame traverses a trunk link, a
special VLAN tag is added to the frame and sent across the trunk link.
Workstation 2
VLAN 4
Workstation 3
VLAN 5
20. 20-31
VLAN Tagging
VLAN Tagging - IEEE 802.1Q
The 802.1q standard was created by the IEEE group to address the problem
breaking large networks into smaller and manageable ones through the use of
VLANs.
24. Types of VLANs
24-31
Traditionally, two methods of implementing VLANs:
Static or Port-Based:
Ports on a switch are assigned to a specific VLAN.
Dynamic:
VLANs created by accessing a Network Management server. The
MAC address/VLAN ID mapping is set up by the Network
Administrator and the server assigns a VLAN ID when the device
contacts it.
25. Types of VLANs
25-31
Types of Port-Based VLANs:
Defined by the type of traffic they support or by the functions
they perform.
– Data VLAN.
– Management VLAN.
– Default VLAN.
– Native VLAN.
– Voice VLAN.
27. Advantages and Disadvantages
27-31
Advantages
Disadvantages
Higher performance and reduced latency.
Users may work on sensitive information which
should not be seen by other users.
VLAN Removes the physical boundary
× Management is complex
× Possible problems in interoperability
× A VLAN cannot forward traffic to another
VLAN(need a router to communicate
between VLANs)
29. Conclusion
• Using VLANs in networks, greatly reduces costs of setting up and
maintenance of the networks.
• VLAN helps the manager of the network in managing hosts and
their limitations and accesses.
• By using VLAN, hosts in different and independent LANs can be in
a same broadcast domain.
• VLANs may low-off the requirement of using switches, therefore
the probability of cyber attacks decreases.
29-31
30. References
30-31
[1] James F. Kurose & Keith W. Ross, Computer Networking a t
T Top-Down Approach, Sixth edition
[2] Andrew S. Tanenbaum, Computer Networks, Fourth edition
[3] www.cyberlone.com
[4] www.firewall.cx
[5] www.wikipedia.org
[6] www.blog.router-switch.com
31. Thank you for your attention!
The End
31-31
Any Questions?