SlideShare a Scribd company logo
10
Most read
GOVERNMENT ENGINEERING
COLLEGE,BHARUCH
 ELECTRONICS AND
COMMUNICATION DEPARTMENT
Presentation Topic:
Name(enrollment no):
Virtual LAN
Vipul Sharma 170140111098
What is LAN??
– A Local Area Network (LAN) was originally defined as a network of computers
located within the same area
– Local Area Networks are defined as a single broadcast domain. This means that
if a user broadcasts information on his/her LAN, the broadcast will be received
by every other user on the LAN.
– Broadcasts are prevented from leaving a LAN by using a router. The
disadvantage of this method is routers usually take more time to process
incoming data compared to a bridge or a switch.
What is Virtual LAN??
– Virtual Local area network is termed as VLAN.
– VLANs provide segmentation based on broadcast domains.
– VLANs logically segment switched networks based on the functions, project
teams, or applications of the organization regardless of the physical location or
connections to the network.
– All workstations and servers used by a particular workgroup share the same
VLAN, regardless of the physical connection or location.
More About VLAN
– The total stations(computers) are divided into logical groups instead ofphysical
segments.
– It is possible to move one station from one group to any other group without
changing the physical connections(configuration) because membership of group
is defined by software and not by hardware.
– VLAN is extremely handy where the connections are spread over multiple
buildings or departments.
LAN and VLAN
Conventional LAN connection VLAN Configuration
Types of VLAN
– Port Based: Most common configuration method. Port assign individually, in
group, in rows, or across 2 or more switches. Simple to use.
– MAC Address: Rarely implemented today. Each address must be entered into
the switch and configured individually. User find it useful.
– Protocol Base: Configured like MAC address, but instead uses a logical or IP
address. No longer common because of DHCP.
VLAN Membership
Static Membership
– Static VLANs are also referred to as
port-based VLANs. Static VLAN
assignments are created by
assigning ports to a VLAN.
– As a device enters the network, the
device automatically assumes the
VLAN of the port.
– If the user changes ports and needs
access to the same VLAN, the
network administrator must
manually make a port-to-VLAN
assignment for the new
connection.
Dynamic Membership
– Dynamic VLANs are created using
software or by protocol.
– With a VLAN Management Policy
Server (VMPS), an administrator can
assign switch ports to VLANs
dynamically based on information of
the source MAC address of the
device connected to the port or the
username used to log onto that
device.
– As a device enters the network, the
switch queries a database for the
VLAN membership of the port that
device is connected to.
Protocols and Designs.
– IEEE 802.1Q
– The protocol most commonly used
today to support VLANs is IEEE
802.1Q.
– It is open standard i.e. it is available for
all to use.
– It works with ethernet only.
– Only 4 byte tag will be added to the
original frame
– Cisco Inter-Switch Link
– It is CISCO proprietary.
– This protocol used to interconnect
switches and maintain VLAN
information as traffic travels
between switches on trunk links.
– It adds 30 bytes of tags.
– ISL is available only on some Cisco
equipment.
Benefits of VLAN
– The key benefit of VLANs is that they permit the network administrator to
organize the LAN logically instead of physically.
– This means that an administrator is able to do all of the following:
1. Easily move workstations on the LAN.
2. Easily add workstations to the LAN.
3. Easily change the LAN configuration.
4. Easily control network traffic. Improve security
VirtuaL area network (VLAN)

More Related Content

PPTX
Ipv4 presentation
PPTX
Virtual LAN
PPT
Vlan
PPTX
Virtual LAN
PPTX
Storage Area Network(SAN)
PPT
CCNA Basic Switching and Switch Configuration
PPT
Static Routing
Ipv4 presentation
Virtual LAN
Vlan
Virtual LAN
Storage Area Network(SAN)
CCNA Basic Switching and Switch Configuration
Static Routing

What's hot (20)

PPTX
CCNA PPT
PDF
Virtual Local Area Network (VLAN)
PPT
PPTX
Network address translation
PPTX
Vlans (virtual local area networks)
PPTX
VLAN Trunking Protocol (VTP)
PPT
Static Routing
PPTX
Internet Protocol version 6
PDF
PDF
Ether channel fundamentals
PDF
Design Issues and Challenges in Wireless Sensor Networks
PPTX
The Differences Between Bluetooth, ZigBee and WiFi
PPTX
Introduction of VANET
PPTX
Vanet ppt
PDF
CCNAv5 - S2: Chapter5 Inter Vlan Routing
PPTX
Wireless network security
PPSX
Features of mobile ip
PPTX
Firewall and Types of firewall
PPTX
PDF
Spanning tree protocol (stp)
CCNA PPT
Virtual Local Area Network (VLAN)
Network address translation
Vlans (virtual local area networks)
VLAN Trunking Protocol (VTP)
Static Routing
Internet Protocol version 6
Ether channel fundamentals
Design Issues and Challenges in Wireless Sensor Networks
The Differences Between Bluetooth, ZigBee and WiFi
Introduction of VANET
Vanet ppt
CCNAv5 - S2: Chapter5 Inter Vlan Routing
Wireless network security
Features of mobile ip
Firewall and Types of firewall
Spanning tree protocol (stp)
Ad

Similar to VirtuaL area network (VLAN) (20)

PPTX
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
PPT
Mod8 vlans
PDF
VLAN (virtual local area network)
PDF
Benefits of vlan
PPT
mod8-VLANs.ppt
PDF
Vlan.pdf
PPT
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
PPTX
Vla ns
PPTX
PPTX
vlansvirtuallocalareanetworks-160521034012.pptx
PPT
DOCX
DOCX
Virtual lan
PPT
Vlan final
PPT
Virtual local area network
ODP
Transceviers
PPTX
VLAN (Virtual Local Area Network) Full details.pptx
PPTX
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
Mod8 vlans
VLAN (virtual local area network)
Benefits of vlan
mod8-VLANs.ppt
Vlan.pdf
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
Vla ns
vlansvirtuallocalareanetworks-160521034012.pptx
Virtual lan
Vlan final
Virtual local area network
Transceviers
VLAN (Virtual Local Area Network) Full details.pptx
Ad

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PPTX
Cloud computing and distributed systems.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
cuic standard and advanced reporting.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation theory and applications.pdf
Cloud computing and distributed systems.
MYSQL Presentation for SQL database connectivity
cuic standard and advanced reporting.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
MIND Revenue Release Quarter 2 2025 Press Release
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx
Approach and Philosophy of On baking technology
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
“AI and Expert System Decision Support & Business Intelligence Systems”

VirtuaL area network (VLAN)

  • 1. GOVERNMENT ENGINEERING COLLEGE,BHARUCH  ELECTRONICS AND COMMUNICATION DEPARTMENT Presentation Topic: Name(enrollment no): Virtual LAN Vipul Sharma 170140111098
  • 2. What is LAN?? – A Local Area Network (LAN) was originally defined as a network of computers located within the same area – Local Area Networks are defined as a single broadcast domain. This means that if a user broadcasts information on his/her LAN, the broadcast will be received by every other user on the LAN. – Broadcasts are prevented from leaving a LAN by using a router. The disadvantage of this method is routers usually take more time to process incoming data compared to a bridge or a switch.
  • 3. What is Virtual LAN?? – Virtual Local area network is termed as VLAN. – VLANs provide segmentation based on broadcast domains. – VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless of the physical location or connections to the network. – All workstations and servers used by a particular workgroup share the same VLAN, regardless of the physical connection or location.
  • 4. More About VLAN – The total stations(computers) are divided into logical groups instead ofphysical segments. – It is possible to move one station from one group to any other group without changing the physical connections(configuration) because membership of group is defined by software and not by hardware. – VLAN is extremely handy where the connections are spread over multiple buildings or departments.
  • 5. LAN and VLAN Conventional LAN connection VLAN Configuration
  • 6. Types of VLAN – Port Based: Most common configuration method. Port assign individually, in group, in rows, or across 2 or more switches. Simple to use. – MAC Address: Rarely implemented today. Each address must be entered into the switch and configured individually. User find it useful. – Protocol Base: Configured like MAC address, but instead uses a logical or IP address. No longer common because of DHCP.
  • 7. VLAN Membership Static Membership – Static VLANs are also referred to as port-based VLANs. Static VLAN assignments are created by assigning ports to a VLAN. – As a device enters the network, the device automatically assumes the VLAN of the port. – If the user changes ports and needs access to the same VLAN, the network administrator must manually make a port-to-VLAN assignment for the new connection. Dynamic Membership – Dynamic VLANs are created using software or by protocol. – With a VLAN Management Policy Server (VMPS), an administrator can assign switch ports to VLANs dynamically based on information of the source MAC address of the device connected to the port or the username used to log onto that device. – As a device enters the network, the switch queries a database for the VLAN membership of the port that device is connected to.
  • 8. Protocols and Designs. – IEEE 802.1Q – The protocol most commonly used today to support VLANs is IEEE 802.1Q. – It is open standard i.e. it is available for all to use. – It works with ethernet only. – Only 4 byte tag will be added to the original frame – Cisco Inter-Switch Link – It is CISCO proprietary. – This protocol used to interconnect switches and maintain VLAN information as traffic travels between switches on trunk links. – It adds 30 bytes of tags. – ISL is available only on some Cisco equipment.
  • 9. Benefits of VLAN – The key benefit of VLANs is that they permit the network administrator to organize the LAN logically instead of physically. – This means that an administrator is able to do all of the following: 1. Easily move workstations on the LAN. 2. Easily add workstations to the LAN. 3. Easily change the LAN configuration. 4. Easily control network traffic. Improve security