1 / 7

CNT 4104 Florida Gulf Coast University Instructor Zalewski , Janusz October 24 th , 2008

CNT 4104 Florida Gulf Coast University Instructor Zalewski , Janusz October 24 th , 2008. VLAN Functionality Understanding and Using Virtual Local Area Network Technology Author: Josh Gallegos. Introduction – Why VLAN?. Can segment the “broadcast domain” No cross traffic between VLANs

garry
Download Presentation

CNT 4104 Florida Gulf Coast University Instructor Zalewski , Janusz October 24 th , 2008

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CNT 4104 Florida Gulf Coast University Instructor Zalewski , Janusz October 24th, 2008 VLAN FunctionalityUnderstanding and Using Virtual Local Area Network TechnologyAuthor: Josh Gallegos

  2. Introduction – Why VLAN? • Can segment the “broadcast domain” • No cross traffic between VLANs • Reduces congestion/collisions • Increased security • VLANs independent of physical location • Allows networking across different places, for better or worse…

  3. How does it work? • Port routed • Packets received pushed out to same port • Configured on an Ethernet switch • Embedded tags • Done via IEEE 802.1Q protocol • VLAN identifier (1-4096) • Priority (1-7) • Allows forwarding based on packet header • Logical entity: Software controlled

  4. Security Aspect • Segments cannot cross packets • Permits sectioning purely for wireless access • 802.1Q protocol allows segregation of switches, routers and firewalls

  5. Example of a VLAN setup 1 2 3 4 5 6 7 Low priority 4 6 1 4 3 7 High priority How should we assign priority??

  6. Programming Example • Not yet complete

  7. References • Fat man. Digital image. Chiefhomeofficer.com. 23 Oct. 2008 <http://www.chiefhomeofficer.com/wp- content/uploads/2008/04/cartoon-in-shorts-at-pc1.jpg>. • Phifer, Lisa. “Using VLANs to compartmentalize WLAN traffic” SearchNetworking.com 23 Oct. 2008 <http://searchnetworking.techtarget.com/generic/0,295 582,sid7_gci1168965,00.html>. • “Virtual LAN” Wikipedia, The Free Encyclopedia. 23 Oct. 2008 < http://en.wikipedia.org/wiki/Virtual_LAN >. • “What is a VLAN?” TechFAQ.com 23 Oct. 2008 <http://www.tech-faq.com/vlan.shtml>.

More Related