Professional Documents
Culture Documents
VIRTUAL
LOCAL AREA NETWORK
Prepared By M. Omar Hayat DF#002126 Rahim R Khalfan DF#002118 Noordin DF#002151 Teacher Prof. Fazal Karim Subject DATA COMMUNICATION
CONTENTS
STEP 1: 2.0- 8.0 Organizing VLAN 2.0 Port Configuration 3.0 MAC based VLAN 4.0 Through telnet 5.0 Layer 3 VLAN 6.0 Router Vs Layer 3 7.0 How VLAN Works 8.0
8.0
VLAN Trunking Protocol 9.0 Illustration 10.0 How VLAN works II 11.0
VIRTUAL
LOCAL AREA NETWORK
I ntroduction
As networks have grown in size and complexity, many companies have turned to Virtual Local Area Networks to provide some way of structuring this growth Logically. The Network can be constructed as one big flat network in which there are no sub networks or routers, and where any computer can potentially link with any other Computer. However, many administrators prefer the physical division of network that router provides contain broadcasts within their boundaries and add security.
V i r t u a l L. A. N
By Virtual L.A.N , we refer to the logical subnetwork* in a flat switched network environment. Basically, a VLAN is a collection of nodes that are grouped together in a single broadcast domain that is based on something other than physical location. Further it is explained in 3 easy steps in the upcoming pages :-
*Subnetwork: Individual LANs and network links joined by routers. Each individual LAN or network link ocnstitutes a subnetwork.
S T E P O N E:
Or g a n i z i n g V i r t u a l L.A.N
The first goal to organize the computer and users into separate VLAN's base is on computer hardware address, port connector address, IP address, or other techniques. Once VLANs are created, routers are required to forward packet* among them.
Port Configuration Method Mac Based VLANS Through Telnet Layer 3 VLANS
Example: Ports 2,4,5 and 8 are grouped as lan #1 and ports 1,3,6,7,9 and 10 are grouped into lan #2.Two back plane designs are used in hub or switch devices to allow lan configurations: multi bus blackplanes or TDM* (time devison multiplexing) backplanes. With the multi bus design, each bus represents a lan and ports are linked to a specific bus. In the TDM design, a specific LAN owns specific time slots on a single bus. Because LANs are configured with in the hub or switch it self ,it is not possible with some hubs* or switches to bridge* a LAN configured in one device with a LAN configured in another device.
*TDM:Time Division Muliplexer refer that the signal is given a time slot. That the transmission of signal into the line at a specific time . *Bridge: Its a devise to interconnect similar network. *Hubs: are little tiny boxes with 4 to 24 RJ-45 connectors on the back that are used to connect Ethernet lines together.
MAC-BASED VLANS:
The MAC address is the hardwired address built into network interface cards. The network administrator essentially creates a table that defines which MAC addresses belong with what VLAN. As compared to Port configuration methods, this methods provides true VLAN capabilities because membership in a VLANs is not directly tied to a specific Port Configuration is done in software and in some cases, a computer can belong to two or more VLANs. In addition ,if a computer is moved to another location, it still belongs to the same VLAN because its MAC address moves with it.
LAYER 3 VLANS:
This type of VLANs uses layer 3 information to build V LANs based on internetwork protocol addresses. For eg:, all the computers in the marketing VLAN might have IP address 100.200.1.x (where x is specific number for each workstation)while computers in the research VLAN have the IP address 100.200.2.x. Alayer 3 switch is capable of looking at the network address in a frame and forwarding the frame based on information in a table that matches the network address with membership in a particular VLAN .However, looking at the layer 3 address can cause performance problems .Like the MAC-based VLANs, moves are easy because the port of the workstation does not determine VLAN membership. The layer three approach can be extended to include more routing functionally right in the switch, and that is what many vendors have done with thier highend switches. You can refer to SWITCHED NETWORKS to learn about the architectural details of these high end switches.
THROUGH TELNET
VLAN using most switches simply by logging into the switch via Telnet and entering the parameters for the VLAN (name, domain and port assignments). After you have created the VLAN, any network segments connected to the assigned ports will become part of that VLAN. While you can have more than one VLAN on a switch, they cannot communicate directly with one another on that switch. If they could, it would defeat the purpose of having a VLAN, which is to isolate a part of the network. Communication between VLANs requires the use of a router*.
*Router: It is a data communication device which allow data to be directed to its destination based on the data packets and the destination address.
ILLUSTRATION
In the image above, each switch has two VLANs. On the first switch, VLAN A and VLAN B are sent through a single port (trunked) to the router and through another port to the second switch. VLAN C and VLAN D are trunked from the second switch to the first switch, and through the first switch to the router. This trunk can carry traffic from all four VLANs. The trunk link from the first switch to the router can also carry all four VLANs. In fact, this one connection to the router allows the router to appear on all four VLANs, as if it had four, different, physical ports connected to the switch. The VLANs can communicate with each other via the trunking connection between the two switches using the router. For example, data from a computer on VLAN A that needs to get to a computer on VLAN B (or VLAN C or VLAN D) must travel from the switch to the router and back again to the switch. Because of the transparent bridging algorithm and trunking, both PCs and the router think that they are on the same physical segment! As you can see, LAN switches are an amazing technology that can really make a difference in the speed and quality of your network. For more information, please be sure to check out the great links on the next page.
S T E P T H R E E: PowerfullfeaturesofVLAN
Security - Separating systems with sensitive data from the rest of the network decreases the chance that someone will gain access to information they are not authorized to see. Projects/Special applications - Managing a project or working with a specialized
application can be simplified by the use of a VLAN that brings all of the required nodes together.
Broadcasts/Traffic flow - Since a principle element of a VLAN is the fact that it does
not pass broadcast traffic to nodes that are not part of the VLAN, it automatically reduces broadcasts. Access lists provide the network administrator with a way to control who sees what network traffic. An access list is a table the network administrator creates that lists what addresses have access to that network.
Departments/Specific job types - Companies may want VLANs set up for departments that are heavy network users (such as Multimedia or Engineering), or a VLAN across departments that is dedicated to specific types of employees (such as managers or sales people).
ROUTER VS LAYER3
When a router receives a packet, it looks at the Layer 3 (Network Layer) source and destination addresses to determine the path the packet should take. A standard switch relies on the MAC addresses to determine the source and destination of a packet, which is Layer 2 (Data) networking. The fundamental difference between a router and a Layer 3 switch is that Layer 3 switches have optimized hardware to pass data as fast as Layer 2 switches, yet they make decisions on how to transmit traffic at Layer 3, just like a router. Within the LAN environment, a Layer 3 switch is usually faster than a router because it is built on switching hardware. In fact, many of Cisco's Layer 3 switches are actually routers that operate faster because they are built on "switching" hardware with customized chips inside the box. The pattern matching and caching on Layer 3 switches is similar to the pattern matching and caching on a router. Both use a routing protocol and routing table to determine the best path. However, a Layer 3 switch has the ability to reprogram the hardware dynamically with the current Layer 3 routing information. This is what allows much faster packet processing. An important item to note: Routers are necessary when communicating between two VLANs
CREDITS
CREDITS Call meeting every weekends ; draw Figure 1 & figure 2 and every suggested graphics ; Co operative , financer and provide resources Research work;
Attend meetings every weekends ; Type all materials and also presented bright ideas; Co operative , Research on net and gathered infos; Research work;
Attend meetings every weekends ; Gather all materials, figures for printing; Co operative , Research on net and gathered infos; Research work; WEB SITIES
SOFTWARES RESOURCES
MS Word 2000 Internet Explorer 6.0 Photoshop 5.5 MS Visio Professional ( for figures) MS Paint brush Coffee Cup Viewer
BOOK S
Network Encyclopedia
INDEX A
Application 7.0
L
Layer 3 VLAN 6.0,7.0
B
Backbone11.0 Bandwidth 12.0 Bridge 3.0 Broadcast 1.0, 12.0
M
MAC address 4.0 Marketing 11.0 Multimedia 12.0 Multiplexing 3.0
C
Cisco 7.0 Communication 5.0, 9.0 Credits 13.0
P
Packet 2.0 Physical 7.0
R
Research 11.0 Router 5.0
D
Datalink 7.0 Domain 1.0, 5.0
S
Security 12.0 Switch 6.0, 11.0
E
Ethernet 3.0 Engineering 12.0
T
Telnet 5.0 TDM 3.0 Traffic flow 12.0
F
Features of VLAN 12.0
H
Hub 3.0
I
IP address 6.0 Illustration10.0
W
Working of VLAN 8.0, 11.0