Virtual Local Area Networks Computer Science Essay

A Local Area Network ( LAN ) was originally defined as a web of computing machines located within the same country. Today, Local Area Networks are defined as a individual broadcast sphere. This means that if a user broadcasts information on his/her LAN, the broadcast will be received by every other user on the LAN. Broadcasts are prevented from go forthing a Local area network by utilizing a router. The disadvantage of this method is routers normally take more clip to treat incoming informations compared to a span or a switch.

More significantly, the formation of broadcast spheres depends on the physical connexion of the devices in the web. Virtual Local Area Networks ( VLAN ‘s ) were developed as an alternate solution to utilizing routers to incorporate broadcast traffic.

Virtual LAN ( VLAN ) refers to a group of logically networked devices on one or more Local area networks that are configured so that they can pass on as if they were attached to the same wire, when in fact they are located on a figure of different LAN sections.

Get quality help now
Verified writer

Proficient in: Computer Networking

4.9 (247)

“ Rhizman is absolutely amazing at what he does . I highly recommend him if you need an assignment done ”

+84 relevant experts are online
Hire writer

Because VLANs are based on logical alternatively of physical connexions, it is really flexible for user/host direction, bandwidth allotment and resource optimisation.

There are the undermentioned types of Virtual LANs:

Port-Based VLAN: each physical switch port is configured with an entree list stipulating rank in a set of VLANs.

MAC-based VLAN: a switch is configured with an entree list mapping single MAC addresses to VLAN rank.

Protocol-based VLAN: a switch is configured with a list of mapping bed 3 protocol types to VLAN rank – thereby filtrating IP traffic from nearby end-stations utilizing a peculiar protocol such as IPX.

Get to Know The Price Estimate For Your Paper
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

ATM VLAN – utilizing LAN Emulation ( LANE ) protocol to map Ethernet packages into ATM cells and present them to their finish by change overing an Ethernet MAC reference into an ATM reference.

2.0 What are VLAN ‘s?

In a traditional LAN, workstations are connected to each other by agencies of a hub or a repeater. These devices propagate any entrance informations throughout the web. However, if two people attempt to direct information at the same clip, a hit will happen and all the transmitted informations will be lost. Once the hit has occurred, it will go on to be propagated throughout the web by hubs and repeaters. The original information will therefore demand to be resent after waiting for the hit to be resolved, thereby incurring a important wastage of clip and resources. To forestall hits from going through all the workstations in the web, a span or a switch can be used. These devices will non send on hits, but will let broadcasts ( to every user in the web ) and multicasts ( to a pre-specified group of users ) to go through through. A router may be used to forestall broadcasts and multicasts from going through the web.

The workstations, hubs, and repeaters together form a LAN section. A LAN section is besides known as a hit sphere since hits remain within the section. The country within which broadcasts and multicasts are confined is called a broadcast sphere or LAN. Thus a LAN can dwell of one or more LAN sections. Specifying broadcast and hit spheres in a LAN depends on how the workstations, hubs, switches, and routers are physically connected together. This means that everyone on a LAN must be located in the same country ( see Figure1 ) .

VLAN ‘s allow a web director to logically section a LAN into different broadcast spheres ( see Figure2 ) . Since this is a logical cleavage and non a physical one, workstations do non hold to be physically located together. Users on different floors of the same edifice, or even in different edifices can now belong to the same LAN.


VLANs are created to supply the cleavage services traditionally provided by routers in LAN constellations. VLANs address issues such as scalability, security, and web direction. Routers in VLAN topologies provide broadcast filtering, security, reference summarisation, and traffic flow direction. By definition, switches may non bridge IP traffic between VLANs as it would go against the unity of the VLAN broadcast sphere.

This is besides utile if person wants to make multiple Layer 3 webs on the same Layer 2 switch. For illustration, if a DHCP waiter ( which will air its presence ) was plugged into a switch it will function any host on that switch that was configured to utilize the waiter. By utilizing VLANs you can easy divide the web up so some hosts wo n’t utilize that waiter and will obtain Link-local references.

Virtual LANs are basically Layer 2 concepts, compared with IP subnets which are Layer 3 concepts. In an environment using VLANs, a one-to-one relationship frequently exists between VLANs and IP subnets, although it is possible to hold multiple subnets on one VLAN or have one subnet spread across multiple VLANs. Virtual LANs and IP subnets provide independent Layer 2 and Layer 3 concepts that map to one another and this correspondence is utile during the web design procedure.

By utilizing VLANs, one can command traffic forms and react rapidly to resettlements. VLANs provide the flexibleness to accommodate to alterations in web demands and let for simplified disposal.


In a bequest web, users were assigned to webs based on geographics and were limited by physical topologies and distances. VLANs can logically group webs so that the web location of users is no longer so tightly coupled to their physical location. Technologies able to implement VLANs are:

Asynchronous Transfer Mode ( ATM )

Fiber Distributed Data Interface ( FDDI )


Fast Ethernet

Gigabit Ethernet

10 Gigabit Ethernet



It provides the flexibleness to the disposal of the web.

It reduces the broadcast traffic.

It increases the security because the information is encapsulated.

It provides the increased public presentation of the web.

It provides the physical topology independency.

VLAN offers the increased bandwidth to the web users.

VLAN provides the easy direction of a specific undertaking or a specialised application.

Making VLAN with the web switches is cheaper than making the routed web by utilizing the routers.

Plug and drama constellations without necessitating extra hardware.

Dynamic coverage across the web.

VLAN besides has some restrictions that have been described below.

VLAN provides the small security so an interloper with small cognition of routing and encoding can entree it.

It provides the broadcast restrictions, device restrictions the ports restraints.

MAC based VLAN require the managerial operating expense to pull off the web

3.0 Why usage VLAN ‘s?

VLAN ‘s offer a figure of advantages over traditional LAN ‘s. They are:

1 ) Performance

In webs where traffic consists of a high per centum of broadcasts and multicasts, VLAN ‘s can cut down the demand to direct such traffic to unneeded finishs. For illustration, in a broadcast sphere consisting of 10 users, if the broadcast traffic is intended merely for 5 of the users, so puting those 5 users on a separate VLAN can cut down traffic.

Compared to switches, routers require more processing of incoming traffic. As the volume of traffic go throughing through the routers additions, so does the latency in the routers, which consequences in decreased public presentation. The usage of VLAN ‘s reduces the figure of routers needed, since VLAN ‘s create broadcast spheres utilizing switches alternatively of routers.

2 ) Formation of Virtual Workgroups

Nowadays, it is common to happen cross-functional merchandise development squads with members from different sections such as selling, gross revenues, accounting, and research. These workgroups are normally formed for a short period of clip. During this period, communicating between members of the workgroup will be high. To incorporate broadcasts and multicasts within the workgroup, a VLAN can be set up for them. With VLAN ‘s it is easier to put members of a workgroup together. Without VLAN ‘s, the lone manner this would be possible is to physically travel all the members of the workgroup closer together.

However, practical workgroups do non come without jobs. See the state of affairs where one user of the workgroup is on the 4th floor of a edifice, and the other workgroup members are on the 2nd floor. Resources such as a pressman would be located on the 2nd floor, which would be inconvenient for the lone 4th floor user.

Another job with puting up practical workgroups is the execution of centralized waiter farms, which are basically aggregations of waiters and major resources for runing a web at a cardinal location. The advantages here are legion, since it is more efficient and cost-efficient to supply better security, uninterrupted power supply, amalgamate backup, and a proper operating environment in a individual country than if the major resources were scattered in a edifice. Centralized server farms can do jobs when puting up practical workgroups if waiters can non be placed on more than one VLAN. In such a instance, the waiter would be placed on a individual VLAN and all other VLAN ‘s seeking to entree the waiter would hold to travel through a router ; this can cut down public presentation

3 ) Simplified Administration

Seventy per centum of web costs are a consequence of adds, moves, and alterations of users in the web Every clip a user is moved in a LAN, recabling, new station addressing, and reconfiguration of hubs and routers becomes necessary. Some of these undertakings can be simplified with the usage of VLAN ‘s. If a user is moved within a VLAN, reconfiguration of routers is unneeded. In add-on, depending on the type of VLAN, other administrative work can be reduced or eliminated However the full power of VLAN ‘s will merely truly be felt when good direction tools are created which can let web directors to drag and drop users into different VLAN ‘s or to put up assumed names.

4 ) Reduced Cost

VLAN ‘s can be used to make broadcast spheres which eliminate the demand for expensive routers.

5 ) Security

Sporadically, sensitive informations may be broadcast on a web. In such instances, puting merely those users who can hold entree to that information on a VLAN can cut down the opportunities of an foreigner deriving entree to the information. VLAN ‘s can besides be used to command broadcast spheres, set up firewalls, restrict entree, and inform the web director of an invasion.

Why VLAN is required?

VLAN is required due to the undermentioned grounds.

If you have a batch of broadcast traffic in your web.

You have more than 200 web devices in your web and you want to avoid hits and informations lost.

You want to do the users on the same broadcast sphere because the users are utilizing the same web application.

You need to do individual switch.

You want to let the more security to a group of users.

Virtual networking provides odd flexibleness. A Today there are many VLAN solutions available to LAN. Cisco Systems offer comprehensive VLAN solution that allows the distant and geographically dispersed users to come together and go a portion of the same web by organizing VLAN workgroup topologies.A

Cisco offers the virtualization solutions to all types of webs including Ethernet, FDDI, Token ring and ATM.

The web devices in the VLAN are connected by following three ways.

Trunk Link

Access Link

Hybrid Link

Although VLAN offers many advantages it has following restrictions.

Device Restrictions

Port Restrictions

Broadcast Restrictions

VLAN stands Virtual Local Area Network and it is a defined in the IEEE802.1q standard.A In the VLAN the computing machines behaves as they are connected to the same LAN even though they may really be physically located to the other sections of the network.A It is a broadcast sphere that is created by the switched in the network.A In the VLAN if a computing machine is physically moved to another location, it can remain on the same VLAN without altering the computing machine hardware. A

VLAN removes the restrictions of utilizing the physical architecture by making the logical cleavages and grouping together the computing machines by utilizing their MAC references, protocols, and the port Numberss. A VLANs are created by the package, which provides the flexibleness to make them.A

In the VLAN, merely the VLAN enabled devices can send/receive informations packages. They are created to supply the cleavage services and the services like scalability, security and the direction of the computing machine network.A VLAN controls the traffic in the web. A A There are following three types of the VLAN.

Flat 1: A It is besides known as port based VLAN, which defines the practical web.

Flat 2: A It is besides known as MAC-Address based VLAN, which defines the VLAN harmonizing to the MAC reference of the machine.

Flat 3: A Level 3 VLAN consists of the Network Address Based VLAN and the Protocol Based VLAN.

VLAN is required if you have:

More than 200 devices on your local country web.

Group of the users require more security.

Groups of the users are being slowed down by the broadcasts.

If you have more broadcast traffic on your LAN.

4.0 How VLAN ‘s work

When a LAN span receives data from a workstation, it tags the information with a VLAN identifier bespeaking the VLAN from which the information came. This is called expressed tagging. It is besides possible to find to which VLAN the informations received belongs utilizing inexplicit tagging. In inexplicit labeling the information is non tagged, but the VLAN from which the information came is determined based on other information like the port on which the information arrived. Taging can be based on the port from which it came, the beginning Media Access Control ( MAC ) field, the beginning web reference, or some other field or combination of Fieldss. VLAN ‘s are classified based on the method used. To be able to make the tagging of informations utilizing any of the methods, the span would hold to maintain an updated database incorporating a function between VLAN ‘s and whichever field is used for labeling. For illustration, if tagging is by port, the database should bespeak which ports belong to which VLAN. This database is called a filtering database. Bridges would hold to be able to keep this database and besides to do certain that all the Bridgess on the LAN have the same information in each of their databases. The span determines where the information is to travel next based on normal LAN operations. Once the span determines where the information is to travel, it now needs to find whether the VLAN identifier should be added to the informations and sent. If the information is to travel to a device that knows about VLAN execution ( VLAN-aware ) , the VLAN identifier is added to the informations. If it is to travel to a device that has no cognition of VLAN execution ( VLAN-unaware ) , the span sends the information without the VLAN identifier.

In order to understand how VLAN ‘s work, we need to look at the types of VLAN ‘s, the types of connexions between devices on VLAN ‘s, the filtering database which is used to direct traffic to the correct VLAN, and tagging, a procedure used to place the VLAN arising the information.

5.0 Types of VLAN ‘s

VLAN rank can be classified by port, MAC reference, and protocol type.

1 ) Layer 1 VLAN: Membership by Port

Membership in a VLAN can be defined based on the ports that belong to the VLAN. For illustration, in a span with four ports, ports 1, 2, and 4 belong to VLAN 1 and port 3 belongs to VLAN 2 ( see Figure3 ) .











Figure3: Assignment of ports to different VLAN ‘s.

The chief disadvantage of this method is that it does non let for user mobility. If a user moves to a different location off from the assigned span, the web director must reconfigure the VLAN.

2 ) Layer 2 VLAN: Membership by MAC Address

Here, rank in a VLAN is based on the MAC reference of the workstation. The switch tracks the MAC references which belong to each VLAN ( see Figure4 ) . Since MAC addresses organize a portion of the workstation ‘s web interface card, when a workstation is moved, no reconfiguration is needed to let the workstation to stay in the same VLAN. This is unlike Layer 1 VLAN ‘s where rank tabular arraies must be reconfigured.

MAC Address










Figure4: Assignment of MAC addresses to different VLAN ‘s.

The chief job with this method is that VLAN rank must be assigned ab initio. In webs with 1000s of users, this is no easy undertaking. Besides, in environments where notebook Personal computer ‘s are used, the MAC reference is associated with the docking station and non with the notebook Personal computer. Consequently, when a notebook Personal computer is moved to a different moorage station, its VLAN rank must be reconfigured.

3 ) Layer 2 VLAN: Membership by Protocol Type

VLAN rank for Layer 2 VLAN ‘s can besides be based on the protocol type field found in the Layer 2 heading ( see Figure5 ) .



Information science




Figure5: Assignment of protocols to different VLAN ‘s.

4 ) Layer 3 VLAN: Membership by IP Subnet Address

Membership is based on the Layer 3 heading. The web IP subnet reference can be used to sort VLAN rank ( see Figure 6 ) .

IP Subnet






Figure6: Assignment of IP subnet references to different VLAN ‘s.

Although VLAN rank is based on Layer 3 information, this has nil to make with web routing and should non be confused with router maps. In this method, IP references are used merely as a function to find rank in VLAN ‘s. No other processing of IP references is done.

In Layer 3 VLAN ‘s, users can travel their workstations without reconfiguring their web references. The lone job is that it by and large takes longer to send on packages utilizing Layer 3 information than utilizing MAC references.

5 ) Higher Layer VLAN ‘s

It is besides possible to specify VLAN rank based on applications or service, or any combination thereof. For illustration, file transportation protocol ( FTP ) applications can be executed on one VLAN and telnet applications on another VLAN.

The 802.1Q bill of exchange criterion defines Layer 1 and Layer 2 VLAN ‘s merely. Protocol type based VLAN ‘s and higher bed VLAN ‘s have been allowed for, but are non defined in this criterion. As a consequence, these VLAN ‘s will stay proprietary.

5.1 Types of Connections

Devicess on a VLAN can be connected in three ways based on whether the affiliated devices are VLAN-aware or VLAN-unaware. Remember that a VLAN-aware device is one which understands VLAN memberships ( i.e. which users belong to a VLAN ) and VLAN formats.

1 ) Trunk Link

All the devices connected to a bole nexus, including workstations, must be VLAN-aware. All frames on a bole nexus must hold a particular heading attached. These particular frames are called labeled frames ( see Figure7 ) .

Figure7: Trunk link between two VLAN-aware Bridgess.

2 ) Entree Link

An entree nexus connects a VLAN-unaware device to the port of a VLAN-aware span. All frames on entree links must be implicitly tagged ( unlabeled ) ( see Figure8 ) . The VLAN-unaware device can be a LAN section with VLAN-unaware workstations or it can be a figure of LAN sections incorporating VLAN-unaware devices ( bequest LAN ) .

Figure 8: Entree nexus between a VLAN-aware span and a VLAN-unaware device.

3 ) Hybrid Link

This is a combination of the old two links. This is a nexus where both VLAN-aware and VLAN-unaware devices are attached ( see Figure9 ) . A intercrossed nexus can hold both tagged and unlabeled frames, but allthe frames for a specific VLAN must be either tagged or unlabeled.

Figure9: Hybrid nexus incorporating both VLAN-aware and VLAN-unaware devices.

It must besides be noted that the web can hold a combination of all three types of links.

5.2 Frame Processing

A span on having informations determines to which VLAN the information belongs either by implicit or expressed tagging. In expressed labeling a ticket heading is added to the information. The span besides keeps path of VLAN members in a filtering database which it uses to find where the information is to be sent. Following is an account of the contents of the filtering database and the format and intent of the ticket heading [ 802.1Q ] .

1 ) Filtering Database

Membership information for a VLAN is stored in a filtering database. The filtering database consists of the undermentioned types of entries:

I ) Static Entries

Inactive information is added, modified, and deleted by direction merely. Entries are non automatically removed after some clip ( ageing ) , but must be explicitly removed by direction. There are two types of inactive entries:

a ) Inactive Filtering Entries: which specify for every port whether frames to be sent to a specific MAC reference or group reference and on a specific VLAN should be forwarded or discarded, or should follow the dynamic entry, and

B ) Static Registration Entries: which specify whether frames to be sent to a specific VLAN are to be tagged or untagged and which ports are registered for that VLAN.

two ) Dynamic Entries

Dynamic entries are learned by the span and can non be created or updated by direction. The learning procedure observes the port from which a frame, with a given beginning reference and VLAN ID ( VID ) , is received, and updates the filtering database. The entry is updated merely if all the undermentioned three conditions are satisfied:

a ) This port allows acquisition,

B ) The beginning reference is a workstation reference and non a group reference, and

degree Celsius ) There is infinite available in the database.

Entries are removed from the database by the ageing out procedure where, after a certain sum of clip specified by direction ( 10 sec — – 1000000 sec ) , entries allow automatic reconfiguration of the filtering database if the topology of the web alterations. There are three types of dynamic entries:

a ) Dynamic Filtering Entries: which specify whether frames to be sent to a specific MAC reference and on a certain VLAN should be forwarded or discarded.

B ) Group Registration Entries: which indicate for each port whether frames to be sent to a group MAC reference and on a certain VLAN should be filtered or discarded. These entries are added and deleted utilizing Group Multicast Registration Protocol ( GMRP ) . This allows multicasts to be sent on a individual VLAN without impacting other VLAN ‘s.

degree Celsius ) Dynamic Registration Entries: which specify which ports are registered for a specific VLAN. Entries are added and deleted utilizing GARP VLAN Registration Protocol ( GVRP ) , where GARP is the Generic Attribute Registration Protocol.

GVRP is used non merely to update dynamic enrollment entries, but besides to pass on the information to other VLAN-aware Bridgess.

In order for VLAN ‘s to send on information to the right finish, all the Bridgess in the VLAN should incorporate the same information in their several filtering databases. GVRP allows both VLAN-aware workstations and Bridgess to publish and revoke VLAN ranks. VLAN-aware Bridgess registry and propagate VLAN rank to all ports that are a portion of the active topology of the VLAN. The active topology of a web is determined when the Bridgess are turned on or when a alteration in the province of the current topology is perceived.

The active topology is determined utilizing a crossing tree algorithm which prevents the formation of cringles in the web by disenabling ports. Once an active topology for the web ( which may incorporate several VLAN ‘s ) is obtained, the Bridgess determine an active topology for each VLAN. This may ensue in a different topology for each VLAN or a common one for several VLAN ‘s. In either instance, the VLAN topology will be a subset of the active topology of the web ( see Figure 10 ) .

2 ) Tagging

When frames are sent across the web, there needs to be a manner of bespeaking to which VLAN the frame belongs, so that the span will send on the frames merely to those ports that belong to that VLAN, alternatively of to all end product ports as would usually hold been done. This information is added to the frame in the signifier of a tag heading. In add-on, the ticket heading:

I ) allows user precedence information to be specified,

two ) allows beginning routing control information to be specified, and

three ) indicates the format of MAC references.

Frames in which a ticket heading has been added are called labeled frames. Tagged frames convey the VLAN information across the web.

The tagged frames that are sent across intercrossed and trunk links contain a ticket heading. There are two formats of the tag heading:

I ) Ethernet Frame Tag Header: The ethernet frame tag heading ( see Figure11 ) consists of a ticket protocol identifier ( TPID ) and tag control information ( TCI ) .

Figure11: Ethernet frame tag heading.

two ) Token Ring and Fiber Distributed Data Interface ( FDDI ) ticket heading: The ticket headings for both nominal ring and FDDI webs consist of a SNAP-encoded TPID and TCI.

Figure12: Token ring and FDDI ticket heading.

TPID is the ticket protocol identifier which indicates that a ticket heading is following and TCI ( see Figure 13 ) contains the user precedence, canonical format index ( CFI ) , and the VLAN ID.

Figure13: Tag control information ( TCI ) .

User precedence is a three spot field which allows precedence information to be encoded in the frame. Eight degrees of precedence are allowed, where nothing is the lowest precedence and seven is the highest precedence. How this field is used is described in the addendum 802.1p.

The CFI spot is used to bespeak that all MAC references present in the MAC informations field are in canonical format. This field is interpreted otherwise depending on whether it is an ethernet-encoded ticket heading or a SNAP-encoded ticket heading. In SNAP-encoded TPID the field indicates the presence or absence of the canonical format of references. In ethernet-encoded TPID, it indicates the presence of the Source-Routing Information ( RIF ) field after the length field. The RIF field indicates routing on ethernet frames.

The VID field is used to unambiguously place the VLAN to which the frame belongs. There can be a upper limit of ( 2 12 – 1 ) VLAN ‘s. Zero is used to bespeak no VLAN ID, but that user precedence information is present. This allows precedence to be encoded in non-priority LAN ‘s.

Communicating between VLANs

CiscoA IOS provides full-feature routing at Layer 3 and interlingual rendition at Layer 2 between VLANs. There are three different protocols available for routing between VLANs:

Inter-Switch Link ( ISL )

IEEE 802.10

ATM LAN Emulation

All three of these engineerings are based on OSI Layer 2 span multiplexing mechanisms.

Inter-Switch Link Protocol

Inter-Switch Link ( ISL ) protocol is used to inter-connect two VLAN-capable Fast Ethernet devices, such as the Catalyst 5000 or 3000 switches and Cisco 7500 routers. The ISL protocol is a packet-tagging protocol that contains a standard Ethernet frame and the VLAN information associated with that frame. The packages on the ISL nexus contain a standard Ethernet, FDDI, or token-ring frame and the VLAN information associated with that frame. ISL is presently supported merely over Fast Ethernet links, but a individual ISL nexus, or bole, can transport different protocols from multiple VLANs.

IEEE 802.10 Protocol

The IEEE 802.10 protocol provides connectivity between VLANs. Originally developed to turn to the turning demand for security within shared LAN/MAN environments, it incorporates hallmark and encoding techniques to guarantee informations confidentiality and unity throughout the web. Additionally, by working at Layer 2, it is good suited to high-throughput, low-latency shift environments. IEEE 802.10 protocol can run over any LAN or HDLC consecutive interface.

ATM LANE Protocol

The ATM LAN Emulation ( LANE ) protocol provides a manner for bequest LAN users to take advantage of ATM benefits without necessitating alterations to end-station hardware or package. LANE emulates a broadcast environment like IEEE 802.3 Ethernet on top of an ATM web that is a point-to-point environment.

LAN Emulation makes ATM map like a LAN. LAN Emulation allows standard LAN drivers like NDIS and ODI to be used. The practical LAN is crystalline to applications. Applications can utilize normal LAN maps without covering with the underlying complexnesss of the ATM execution. For illustration, a station can direct broadcasts and multicasts, even though ATM is defined as a point-to-point engineering and does n’t back up any-to-any services.

To carry through this, particular low-level package is implemented on an ATM client workstation, called the LAN Emulation Client or LEC. The client package communicates with a cardinal control point called a LAN Emulation Server, or LES. A Broadcast and Unknown Server ( BUS ) acts as a cardinal point to administer broadcasts and multicasts. The LAN Emulation Configuration Server ( LECS ) holds a database of LECs and the ELANs the belong to. The database is maintained by a networkA decision maker.

Planing Switched VLANs

By the clip you are ready to configure routing between VLANs, you will hold already defined them through the switches in your web. Issues related to web design and VLAN definition should be addressed during your web design. Mention to the Cisco Internetworking Design Guide and appropriate switch certification for information on these subjects:

Sharing resources between VLANs

Load Balancing

Excess Linkss


Segmenting Networks with VLANs

Segmenting the web into broadcast groups improves web security. Use router entree lists based on station references, application types, and protocol types.

Routers and their Function in Switched Networks

In switched webs, routers perform broadcast direction, path processing and distribution, and supply communications between VLANs. Routers provide VLAN entree to shared resources and connect to other parts of the web that are either logically segmented with the more traditional subnet attack or necessitate entree to remote sites across wide-area links.

7.0 Abbreviations

CFI – Canonic Format Indicator

FDDI – Fiber Distributed Data Interface

FTP – File Transportation Protocol

GARP – Generic Attribute Registration Protocol

GMRP – Group Multicast Registration Protocol

GVRP – GARP VLAN Registration Protocol

IEEE – Institute of Electrical and Electronic Engineers

LAN – Local Area Network

MAC – Media Access Control

RIF – Source-Routing Information

TCI – Tag Control Information

TPID – Tag Protocol Identifier


VLAN – Virtual Local Area Network


The deployment of level, Layer 2 switched webs has dramatically impacted the corporate LAN. By extinguishing the latency caused by Layer 3 routing, Layer 2 shift has allowed time-sensitive applications to boom. Unfortunately, as switched webs grow, you start to recognize why we had routed webs in the first topographic point. In an endeavor web, some Layer 3 routing is inevitable. However, at the entree bed, Virtual LANs ( VLANs ) can supply some of the benefits of Layer 3 routing without the latency.

Knowing when to travel to VLANs can be hard. By looking at some of the advantages of VLANs, the web decision maker can make up one’s mind if VLANs are a feasible solution for his/her web jobs.

Broadcast control

Many of the protocols used in the modern LAN make inordinate usage of broadcasts. By default, Layer 3 devices ( i.e. , routers ) block these broadcasts from going between web sections. However, in a level, switched web, broadcasts travel throughout the full web and are seen by every Personal computer connected to the wire. In a big LAN, broadcasts can overpower the web and finally take to web failure.

Now the job has gone full circle and we are back to necessitating Layer 3 routing once more, right? Well, non precisely. By spliting switch ports into VLANs, separate broadcast spheres are created. For illustration, if we have groups of users connected to Ethernet ports 1 through 24 on a Cisco Catalyst 2900 series switch, each group would be a member of the same broadcast sphere. By configuring each switch port as a separate VLAN, we could split the broadcast domains into 24 separate VLANS. A more likely scenario may be that users on ports 1 through 12 would be on one VLAN and users on ports 13 through 24 would be on another VLAN. Using this scenario, if all groups were bring forthing the same sum of broadcast traffic, you would cut the broadcasts seen by each switch port in half.


When a group of users belongs to the same broadcast sphere, all of the web traffic generated within that broadcast sphere is accessible by each user. Therefore, if a user is running a package sniffer, they can see every frame that crosses the web. Security issues result when plans send informations that is extremely sensitive, such as human resource or paysheet informations. In this state of affairs, a sniffer could entree the informations being transferred. By implementing VLANs, countries such as human resources can be split into their ain broadcast spheres, thereby forbiding other countries from entree to sensitive informations transmitted over the LAN. In add-on, because an decision maker assigns each switch port to a peculiar VLAN, they can command which devices have entree to a peculiar VLAN. For illustration, if all human resource Personal computers are a member of VLAN 10, the web decision maker can roll up the MAC addresses from the human resource Personal computers and let merely those MAC references to link to VLAN 10.

Keeping path of which MAC reference is assigned to a peculiar VLAN and exchange port can be a hard undertaking. To assist pull off this procedure, Cisco offers a plan called VLAN Membership Policy Server ( VMPS ) . VMPS can dynamically delegate switch ports to a peculiar VLAN based on the terminal station ‘s MAC reference. Additionally, VMPS can deny entree to any MAC reference that is non a member of a peculiar VLAN. This can significantly cut down web disposal and increase web security.

Reduced latency

If you ‘ve been in the industry for a piece, you ‘re likely believing, “ VLANs are great, but we were able to supply the same functionality with routers, so why did we implement Layer 2 shift in the first topographic point? ” The reply is: to cut down web latency.

Every package that crosses a router ‘s interface must be read at Layer 3 and a new MAC heading must be created. Reading a package ‘s Layer 3 turn toing information and making a new MAC heading causes latency. However, when a package is switched through a web, the Layer 2 reference is read and the package is forwarded, filtered, or flooded. The MAC heading is non recreated and this dramatically reduces latency.

Keeping your users happy

The last and most of import ground for deploying VLANs is to maintain your users happy. VLANs usage web bandwidth more expeditiously, cut down broadcasts, and increase security. What could do your users happier than that?

Warren Heaton Jr. , MCSE+I, CCNP, CCDP is the Cisco Program Manager for A Technological Advantage in Louisville, KY.

If you ‘d wish to portion your sentiment, delight post a remark below or direct the editor an electronic mail.

Cite this page

Virtual Local Area Networks Computer Science Essay. (2020, Jun 02). Retrieved from

Virtual Local Area Networks Computer Science Essay

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment