Free Essay

Vlan

In:

Submitted By mojicas
Words 791
Pages 4
VLAN - Benefits and Limitations

Introduction

The purpose of this walkthrough is to provide a better understanding of Virtual Local Area Networks and their use in the networking world. In the following sections, I will define a VLAN and describe its benefits as well as some limitations. I will explain why it is important for a network administrator to understand VLANs, and give some basic instructions to determine how many VLANs a department would typically need. Finally, contact information will be provided for any additional questions you might have.

Use of this information will be used to determine a department's VLAN needs. If VLANs are well thought out in advance, the need to readdress devices and modify VLAN configurations more than once will not become an issue. This will save everyone involved a great deal of effort and minimize the amount of changes that will be needed.

What is a VLAN?

Virtual LANs can be viewed as a group of devices on different LAN segments which can communicate with each other as if they were all on the same physical LAN segment.

Switches using VLANs create the same division of the network into separate domains but do not have the latency problems of a router. Switches are also a more cost-effective solution.

By now you are probably wondering why someone would go to all this work to end up with what appears to be the same network as the original one. In many instances, LANs have been grouped with physical location being the primary concern. VLANs are built with traffic patterns in mind. Using VLANs, we are able to group these devices into a single domain. This allows us to confine broadcast traffic for this workgroup to just those devices that need to see it, and reduce traffic to the rest of the network. There is an increased connection speed due to the elimination of latency from router connections. An additional benefit of increased security could be made if you make the decision to not allow access to the host from foreign networks, for example those that originate from another subnet beyond the router.

We can now create a network that is independent of physical location and group users into logical workgroups. For instance, if a department has users in three different locations, they can now provide access to servers and printers as if they were all in the same building.

VLAN Benefits

As we have seen, there are several benefits to using VLANs. To summarize, VLAN benefits include:

Increased performance
Improved manageability
Simplification of software configurations
Increased security options
Increased performance

Switched networks by nature will increase performance over shared devices in use today by reducing collisions. Grouping users into logical networks will also increase performance by limiting broadcast traffic to users performing similar functions within workgroups. Additionally, less traffic will need to be routed, and the latency added to routers will be reduced.

Improved manageability

VLANs provide an easy, flexible, less costly way to modify logical groups in changing environments. VLANs make large networks more manageable by allowing centralized configuration of devices located in assorted locations.

Simplification of software configurations

VLANs will allow LAN administrators to "fine tune" their networks by grouping users. Software configurations can be made the same across machines with the consolidation of a department's resources into a single subnet. IP addresses and subnet masks will be more consistent across the entire VLAN. These services can be more effectively deployed when they can span buildings within a VLAN.

Increased security options

VLANs have the ability to provide additional security not available in a shared network environment. A switched network delivers packets only to the intended recipients and packets only to other members of the VLAN. This allows the network administrator to segment users requiring access to sensitive information into separate VLANs from the rest of the general users regardless of physical location.

VLAN Limitations

There are a few limitations to using VLANs:

Device limitations
Port constraints
Device limitations

The number of Ethernet addresses than can be supported by each device is 500. This is a distribution of about 20 devices per port on a 25 port switch. In an ideal network situation, there is one device per port, for example, a printer, a workstation, and voice IP phone will require 3 ports. If you wanted to have one VLAN assignment for each port, then the maximum VLANs will equal 25.

Port Constraints

If a hub or switch is connected to one port, every port on that hub must belong to the same VLAN. Hubs do not have the capability to provide VLANs to individual ports, and VLANs can not be extended beyond the device port even if a switch capable of supporting VLANs is attached.

Similar Documents

Free Essay

Vlan

...VLAN When setting up a VLAN you have to look at the benefit of having a VLAN. The benefits of creating a VLAN are flexibility, performance improvement, and savings on cost. With flexibility you can move users to new locations without reconfiguring the system. The VLAN improves performance by segmenting broadcast traffic into port groupings, this helps to preserve network bandwidth and save processor time. The last benefit is cost savings; VLANs will eliminate the need to use routers to partition LANs into multiple broadcast domains, thus reducing hardware costs. Let’s look at the security aspect of a VLAN; one way to improve security with the VLAN is by isolating groups. High-security users can be grouped into a VLAN, possibly on the same segment, and no users outside that VLAN can communicate with those users. Using a VLAN membership that is port assigned based will be used to help future reorganization of the physical layout of the network. This will help if there is relocation or reallocation since there will be a centralized administration of the network and the users of the network. This choice will provide for simpler administration than MAC address, User ID, or Network address VLAN membership when it comes to the placement and changing the personnel assignment of the groups (Regan, 2004). Now let’s talk about layers. You would think that since VLANs are created on Layer 2 switches that this would be the best layer to utilize, but using the layer 3 switch offers...

Words: 638 - Pages: 3

Free Essay

Vlan

...Assignment: VLAN By creating a Virtual Local Area Network (VLAN) for this company it would best fit their needs. Because the benefits of a VLAN are numerous, this would include decreased bandwidth usage, increased security and separation of location. Where the member user of a VLAN they do not have to be in the same location to be able to share resources. To reduce the network congestion it will be split logically into broadcast domains, this will increase to security. Then the different section of the network will be divided by the group functions which would include Marketing, engineering, operation and the call center each department will have their own section. By splitting the network in sections for each department, it will make the network more secure through compartmentalization. The segments will be logically divided from the rest of the network, access then can be restricted between the segments. By controlling access to indivual segments is going to be the best way of better security, this is going to be accomplished by creating user groups for each of the different segments. By creating a VLAN this will ensure the Marketing department will have access to the resources needed. This will also apply to the other departments and it will provide the security around the data that needs to be protected. By going with a Port assigned based VLAN the different groups are used to facilitate any future reorganization of the physical network layout will made easier...

Words: 532 - Pages: 3

Free Essay

Medium Network Design

...Universidad Interamericana, Recinto de Guayama | Diseño de una Red Mediana | | Luis Lugo 16 de enero de 2013 | Introducción En este trabajo estaré diseñando una red mediana para un colegio técnico el cual contiene pocos estudiantes. Este diseño usa conmutadores en las capas 2 y 3 proveyendo servicios a usuarios y a la misma vez seguridad para toda la red. La organización tiene alrededor de 700 usuarios y existen diferentes dominios dentro de esta red. Diseño Este diseño debe tener varios requerimientos específicos para poder completar lo que es una red mediana segura. Uno de estos requerimientos y el mayor de estos es que la red debe de proveer conectividad para tres servidores y alrededor de 700 clientes. De la misma manera, la red va a permitir que si en alguna ocasión alguno de estos equipos necesita separarse el otro, esto sea posible. En esta red otro de los requerimientos importantes es el de evitar ataques, ya que como la red va a estar comunicándose entre dos edificios, esta es más susceptible a ataques que provengan de afuera. El centro o “core” de esta red es un solo conmutador de capa 3 con interfaz de “Ethernet” este conmutador “core” le provee los servicios de índole de ambas capas (2 y 3) hacia los equipos necesarios. La red tiene 4 sub redes diferentes, una de estas es para los servidores, otra para los clientes, otra para el sistema de red inalámbrico y la última para la administración. Se diseñó un NDIS para monitorear...

Words: 1290 - Pages: 6

Free Essay

Redes

...CURSO: Management Information Systems Investigar el concepto de redes de computadoras y sus diferentes tipos. Una red de computadoras, también llamada red de ordenadores, red de comunicaciones de datos o red informática, es un conjunto de equipos informáticos y software conectados entre sí por medio de dispositivos físicos que envían y reciben impulsos eléctricos, ondas electromagnéticas o cualquier otro medio para el transporte de datos, con la finalidad de compartir información, recursos y ofrecer servicios. Las redes se clasifican en 2 categorías por alcance y por conexión: Por alcance: • Una red de área local (LAN) se refiere a un grupo de dispositivos interconectados que se encuentran bajo el mismo control administrativo. • La red área metropolitana (MAN) es una red formada por un conjunto de redes LAN en las que se conectan equipos • Las redes de área extensa (WAN) constituyen redes que conectan redes LAN en ubicaciones que se encuentran geográficamente separadas. Internet es el ejemplo más común de una WAN • Red de área personal, o PAN (Personal Area Network), es una red de ordenadores usada para la comunicación entre los dispositivos de la computadora cerca de una persona. • WPAN (Wireless Personal Area Network), es una red de computadoras inalámbrica para la comunicación entre distintos dispositivos (tanto computadoras, puntos de acceso a internet, teléfonos celulares, PDA, dispositivos de audio, impresoras) cercanos al punto de acceso. Estas redes normalmente son de...

Words: 2428 - Pages: 10

Free Essay

Creating Vlans

...Creating Vlans, first determine the ports range for each vlan? If 3 vlans are to be created: >> A Switch has ports from fa0/1 to fa0/24 >> Assign port ranges to each vlan: 1. Vlan 10 has fa0/2-7 (suppose net-id is: 10.0.0.0) 2. Vlan 20 has fa0/8-12 (suppose net-id is: 20.0.0.0) 3. Vlan 30 has fa0/13-18 (suppose net-id is: 30.0.0.0) >> Reserve fa0/1 for switch-to-router connection and fa0/24 for switch-to-switch connection. Set trunk mode to both these ports early on: * Go to the switch. * Go in Enable mode and Configuration Terminal. * Write for both reserved ports the following: * Int fa0/1 * Switchport mode trunk * Exit * Int fa0/24 * Switchport mode trunk * Exit >> Now create vlan on the switch: * In switch’s config terminal * Write vlan <vlan id> in this case we have vlan 10 * Do the following: * Vlan 10 * Name HR * Vlan 20 * Name admin * Vlan 30 * Name office >> Once the vlan ids are created. It is time to set their interfaces for the port ranges we just mentioned at the top. * Inside switch’s config terminal * Write int range fa0/2-7 (in this case for vlan 10). Do the following * Int range fa0/2-7 * Switchport mode access * Switchport access vlan 10 * Exit * Int range fa0/8-12 * Switchport mode access * Switchport access vlan 20 * Exit * Int...

Words: 642 - Pages: 3

Premium Essay

It/244 Assignment: Vlan

...Assignment: VLAN IT/242 January 19, 2012 Instructor: Dr. Jimmie Flores Assignment: VLAN VLAN short for Virtual Local Area Network is a new LAN technology that allows addition of a cost effective network that does not compromise security or performance of the network. VLAN is defined as “a switched network that is logically segmented on an organizational basis; either by functions, project teams, or applications rather than on a physical or geographical basis” (Regan, (2004)). Using VLAN’s are excellent for organizations with multiple departments since VLAN can be created for the specific needs of each department even ignoring the need of a central physical location. “A VLAN can be thought of as a broadcast domain that exists within a defined set of switches” (Regan, (2004)). Switches are nowadays more economical in price so organizations are replacing older hubed networks with switched networks designed for using VLAN’s. VLAN’s are able to divide and isolate a network into different broadcast domains. According to Regan, (2004) VLAN’s are basically a bridge domain that has all broadcast traffic isolated and contained within the VLAN. VLAN’s also provides complete and total isolation from other VLAN’s. Security is also improved by using VLAN’s since they are able to isolate groups. Users are not able to physically connect to a VLAN so access can’t be gained from just plugging into the switch (Regan, (2004)). Servers also can be assigned to multiple...

Words: 740 - Pages: 3

Free Essay

It 242 Week 4 Vlan

...VLAN Student Name IT 242 January 30, 2011 VLAN Virtual Local Area Network (VLAN) is one of the latest network technologies that has been created in the past several years. The technology for VLAN is growing rapidly as well as the costs of the equipment used to implement the secure network that is often considered expensive. Virtual Local Area Networks were born out of the need for a cost effective network that did not compromise the need for high security and performance so the VLAN met all the requirements for the special network (Regan, 2004). The VLAN offers a great deal of functionality for any network as it was created to separated the network into separate broadcast while still allowing each network to still function in the different locations. An example of this process is if a business has different departments such as Operations, Sales, and Human Resources. The VLANs are implements specifically for each department making it an individual network within the business. When implementing a VLAN, it is important to know that to create the VLAN there is a need for layer 2 switch. One common misconception regarding VLANs is that there is a need to install separate software in order to implement the VLAN within the network. The fact is VLANs need special hardware that is built into the switch, which implements a separate network of the main network. Depending on what the network’s security policies and infrastructure, VLANs assignment can be implemented using one...

Words: 688 - Pages: 3

Premium Essay

E Switching Lab Ccna

... | |S2 |VLAN 99 |172.17.99.12 |255.255.255.0 |N/A | |S3 |VLAN 99 |172.17.99.13 |255.255.255.0 |N/A | |PC1 |NIC |172.17.10.1 |255.255.255.0 | | |PC2 |NIC |172.17.20.1 |255.255.255.0 | | |PC3 |NIC |172.17.30.1 |255.255.255.0 | | |PC4 |NIC |172.17.10.2 |255.255.255.0 | | |PC5 |NIC |172.17.20.2 |255.255.255.0 | | |PC6 |NIC |172.17.30.2 |255.255.255.0 | | Port Assignments (Switches 2 and 3) |Ports |Assignment |Network | |Fa0/1 – 0/5 |802.1q Trunks | | |Fa0/11 – 0/17 |VLAN 10 – engineering ...

Words: 1364 - Pages: 6

Premium Essay

Ios Commands

...|Chapter |Task |Commands | |11.02: Command-Line Interface |Privilege EXCE Mode (Enable & Disable)|IOS> enable | |(CLI) | |IOS# | | | | | | | |IOS# disable | | | |IOS> | | |Login Out |IOS# logout | | | |-or- | | | |IOS# exit | |11.03: IOS Basics |Context-Sensitive Help |Router> ? | | | | | | | |Router#...

Words: 2715 - Pages: 11

Premium Essay

Ccna

...CISCO 640-802 Cisco Certified Network Associate 251 Q&A Looking for Real Exam Questions for IT Certification Exams! We guarantee you can pass any IT certification exam at your first attempt with just 10-12 hours study of our guides. Our study guides contain actual exam questions, you will get word to word same on your actual test; accurate answers with detailed explanation verified by experts and all graphics and drag-n-drop exhibits shown just as on the real test. To test the quality of our guides, you can download the one-fourth portion of any guide from http://www.certificationking.com absolutely free. Besides, we also offer complete version of following exams absolutely free. You can start your certification from these free guides and if you are satisfied you can buy the rest ♦ Microsoft: 70-270, 70-305, 70-526, MB2-421 ♦ Cisco 642-901, 642-502, 642-425 ♦ Oracle: 1Z0-001, 1Z0-007, 1Z0-040, 1Z0-200 ♦ Novell: 50-676, 50-565 ♦ Adobe: 9A0-019 ♦ Apple: 9L0-004, 9L0-505, 9L0-606 ♦ 3COM: 3M0-211 ♦ Citrix: 1Y0-223, 1Y0-256 ♦ CIW: 1D0-420 ♦ EMC: E20-001 ♦ Enterasys: 2B0-011 ♦ Exam Express: EE0-011 ♦ Foundry: FN0-100 ♦ Hyperion: 4H0-002 ♦ HP: HP0-045, HP0-052, HP0-055, HP0-090, HP0-216, HP0-417 ♦ Juniper: JN0-120, JN0-330 ♦ Lotus: 190-510 ♦ Network Appliances: NS0-121 ♦ Network General: 1T6-520 ♦ Nortel: 920-430, 920-803 ♦ OMG: UM0-100 ♦ Sybase: 510-015 ♦ SAIR: 3X0-101, 201 ♦ SAS: A00-201 ♦ Tibco: TB0-103 ….. For pricing and placing order, please visit http://certificationking...

Words: 5081 - Pages: 21

Premium Essay

Vtp Questions and Answers

...bits in the incoming frame are received. This does not allow the switch to discard frames that fail the FCS check. B. This is also same as A. But Switch waits 64 bytes to be received before forwarding the first bytes of the outgoing frame. Collisions may occur during first 64 bytes of the frame. Frames in error due to collision will not be forwarded. The FCS still cannot be checked. C,E,F : They are not related to Switch mode transport. QUESTION NO: 107 Which protocol admin overhead in a switch network by allowing the configuring of a new VLAN to be distributed to all the switches in a domain? A. STP B. VTP C. GVRP D. SNMP E. DHCP Answer: B Explanation : Sybex CCNA Study Guide 4th Edition (Page 359) ” The basic goals of VLAN Trunking Protocol (VTP) are to manage all configured VLANs across a switched internetwork and to maintain consistency throughout that network. VTP allows an administrator to add, delete, and rename VLANs—information that is then propagated to all other switches in the VTP domain.” QUESTION NO: 109 Which of the...

Words: 1609 - Pages: 7

Free Essay

Netw206

...Assessment on the Network’s Health Grading Rubric Categories Points and Grading Content Points and Grading Content Points and Grading Content Points and Grading Content Content and Terminal Course Objective 20 The network report contains the TCO with extensive detail for the network VLAN configuration. 15 The network report contains the TCO with basic detail regarding the network VLAN configuration. 10 The network report contains the TCO with limited detail regarding the network VLAN configuration. 5 The network report contains the TCO with little to no parts covered on the network VLAN configuration. Creativity 10 The network report has creative details and descriptions using the student’s own determination, experience, or knowledge to meet network requirements. 8 The network report has few creative details and descriptions using the student’s own determination, experience, or knowledge to meet network requirements. 6 The network report has one creative detail and descriptions using the student’s own determination, experience, or knowledge to meet network requirements. 4 The network report contains no creative details and descriptions using the student’s own determination, experience, or knowledge to meet network requirements. Grammar and Punctuation 5 The network report contains fewer than two grammatical errors. 4 The network report contains fewer than four grammatical errors. 3 The network report contains fewer than six grammatical errors....

Words: 828 - Pages: 4

Premium Essay

Vlan Virtual Local Area Network

...VLAN Virtual Local Area Network Introduction: A VLAN (Virtual Local Network) is a network of computers that behave as though they are connected to the same wire even though physically they may be located on different segments of the LAN. VLAN are configured through software rather than hardware. This is a big advantage to VLAN because that makes it flexible and when moved physically it can stay on the same VLAN without any hardware configuration. (http://www.webopedia.com) A VLAN has three major functions: 1. Limited the size of broadcast domains. 2. Improves network performance. 3. Provides a level of security. VLAN Switched Port and Configuration: Using a switched VLAN will allow you to create groups of logically network devices that act as though they are on their own independent network. And this includes if they share a common infrastructure with other VLANs. When you configure a VLAN, you must sign it a number ID and you also have the option of name it. The purpose of VLAN implementations is to associate ports with particular VLANs. You configure the port to forward a frame to a specific VLAN. A port can be configured to support these VLAN types: Static VLAN, Dynamic VLAN, and, Voice VLAN. (http://www.orbit-computer-solutions.com) VLAN Trunking: VLAN trunking enables the movement of traffic to different parts of the network configured in a VLAN. A trunk is a point-to-point link between...

Words: 572 - Pages: 3

Premium Essay

Ccna 3 Pt Lab Manual

...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: LAN Switching and Wireless course as part of an official Cisco Networking Academy Program. PT Activity 1.2.4: Build a Hierarchical Topology Topology Diagram Learning Objectives • • Add devices to a topology. Connect the devices. Introduction Packet Tracer is integrated throughout this course. You must know how to navigate the Packet Tracer environment to complete this course. Use the tutorials if you need a review of Packet Tracer fundamentals. The tutorials are located in the Packet Tracer Help menu. This activity focuses on building a hierarchical topology, from the core to the distribution and access layers. All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3 CCNA Exploration LAN Switching and Wireless: LAN Design PT Activity 1.2.4: Build a Hierarchical Topology Task 1: Add Devices to the Topology Step 1. Add the missing distribution layer routers. The routers you need are located in Custom Made Devices. R1 and R3 are 1841 routers. Ctrl-click the 1841 router to add more than one. Press ESC to cancel. R2 is a 2621XM router. Step 2. Add the remaining access layer switches. Following the topology diagram, add nine 2960-24TT switches to complete the rest of the access...

Words: 48601 - Pages: 195

Premium Essay

206 Quizzes

...206 quizes Grading Summary These are the automatically computed results of your exam. Grades for essay questions, and comments from your instructor, are in the "Details" section below. | Date Taken: | 11/9/2012 | Time Spent: | 13 min , 51 secs | Points Received: | 25 / 50  (50%) | | Question Type: | # Of Questions: | # Correct: | Multiple Choice | 10 | 5 | | | Grade Details - All Questions |  1. | Question : | (TCO 1) Classifying and prioritizing traffic based on type of data. | |   | Student Answer: | |  Quality of Service (QoS) |   | | |  Redundancy |   | | |  Scalability |   | | |  VLANs |   | Instructor Explanation: | Chapter 1 | | |   | Points Received: | 0 of 5 |   | Comments: | | | |  2. | Question : | (TCO 1) What options are available for switching hardware? | |   | Student Answer: | |  Modular, fixed, stack |   | | |  Fixed, daisy-chained, trunked |   | | |  Isolated, modular, stack |   | | |  Modular, fixed, dynamic |   | Instructor Explanation: | Chapter 1 | | |   | Points Received: | 5 of 5 |   | Comments: | | | |  3. | Question : | (TCO 1) At what layer(s) of the hierarchical model would you typically find Cisco’s 6500 series chassis? | |   | Student Answer: | |  Access |   | | |  Core |   | | |  C & D |   | | |  Distribution |   | Instructor Explanation: | Chapter 1 | | |   | Points Received: | 0 of 5 |   | Comments: | | ...

Words: 1498 - Pages: 6