Software Information |
|
Vlans
In order to implement VLANs in a network environment, you'll need a Layer 2 switch that supports them. Almost all switches sold today that are described as "managed" switches provide the ability to make ports members of different VLANs. However, switches that don't provide any configuration function (such as many basic, lower-end switches) don't provide the ability to configure VLANs. Almost any Cisco Catalyst switch that you'll come across today provides the ability to make ports part of different VLANs. Before getting into the details of how a VLAN functions, it's worth exploring some of the advantages that a VLAN provides. First and foremost, VLANs provide the ability to define broadcast domains without the constraint of physical location. For example, instead of making all of the users on the third floor part of the same broadcast domain, you might use VLANs to make all of the users in the HR department part of the same broadcast domain. The benefits of doing this are many. Firstly, these users might be spread throughout different floors on a building, so a VLAN would allow you to make all of these users part of the same broadcast domain. To that end, this can also be viewed as a security feature - since all HR users are part of the same broadcast domain, you could later use policies such as access lists to control which areas of the network these users have access to, or which users have access to the HR broadcast domain. Furthermore, if the HR department's server were placed on the same VLAN, HR users would be able to access their server without the need for traffic to cross routers and potentially impact other parts of the network. VLANs are defined on a switch on a port-by-port basis. That is, you might choose to make ports 1-6 part of VLAN 1, and ports 7-12 part of VLAN 2. There's no need for ports in the same VLAN to be contiguous at all - you could make ports 1, 3 and 5 on a switch part of VLAN 1, for example. On almost all switches today, all ports are part of VLAN 1 by default. If you want to implement additional VLANs, these must first be defined in the switch's software (such as the IOS on a Cisco switch), and then ports must be made members of that VLAN. A VLAN isn't limited to a single switch, either. If trunk links are used to interconnect switches, a VLAN might have 3 ports on one switch, and 7 ports on another, as shown below. The logical nature of a VLAN makes it a very effective tool, especially in larger networking environments. Inter-VLAN Communication I mentioned a few times already that a VLAN is simply a special type of broadcast domain, in that it is defined on a switch port basis rather than on traditional physical boundaries. Recall from the earlier articles in this series that when a host in one broadcast domain wishes to communicate with another, a router must be involved. This same holds true for VLANs. For example, imagine that port 1 on a switch is part of VLAN 1, and port 2 part of VLAN 99. If all of the switch's ports were part of VLAN 1, the hosts connected to these ports could communicate without issue. However, once the ports are made part of different VLANs, this is no longer true. In order for a host connected to port 1 to communicate with another connected to port 2, a router must be involved. You may already be familiar with the concept of a Layer 3 switch. A Layer 3 switch is generally a Layer 2 switching device that also includes the ability to act as a router, usually through the use of additional hardware and software features. If a switch includes Layer 3 capabilities, it can be configured to route traffic between VLANs defined in the switch, without the need for packets to ever leave the switch. However, if a switch only includes Layer 2 functionaility, an external router must be configured to route traffic between the VLANs. In some cases, it's entirely possible that a packet will leave switch port 1, be forwarded to an external router, and then be routed right back to port 2 on the originating switch. For this reason, many companies have decided to implement Layer 3 switches strategically throughout their network. Regardless of the method chosen, it's most important for you to recognize that when a host on one VLAN wants to communicate with a host on another, a router must somehow be involved. Extending VLANs Between Switches In order to extend VLANs across different switches, a trunk link must interconnect the switches. Think of a trunk link as being similar to an uplink between hubs - usually a trunk link is implemented between fast switch ports on two different switches using a crossover cable. For example, you might interconnect two Gigabit Ethernet ports on different switches using fiber optics, or two 100 Mbps switch ports using a traditional Cat5 crossover cable. In most cases it is generally recommended that you use the fastest port available for trunk connections, since this link will often carry a great deal of traffic, possibly for multiple VLANs. To begin, let's assume that you have connected a link between the 100 Mbps ports of two switches, as shown below. Notice that each of these ports are members of VLAN 1 on each switch. By default, without any additional configuration, these ports will act as a trunk link, but will only pass traffic for the VLAN associated with their port connections - VLAN 1. This type of link, where only traffic for a single VLAN is passed, is referred to as an "Access Link". While an access link does the job for a single VLAN environment, multiple access links would be required if you wanted traffic from multiple VLANs to be passed between switches. Having multiple access links between the same pair of switches would be a big waste of switch ports. Obviously another solution is required when traffic for multiple VLANs needs to be transferred across a single trunk link. The solution for this comes through the use of VLAN tagging. VLAN Tagging When you want traffic from multiple VLANs to be able to traverse a link that interconnects two switches, you need to configure a VLAN tagging method on the ports that supply the link. Although there are a number of tagging methods in use for different technologies, the two that you need to be aware of for the purpose of the CCNA exam are known as InterSwitch Link (ISL) and 802.1q. ISL is a Cisco proprietary VLAN tagging methods, while 802.1q is a open standard. When interconnecting two Cisco switches, ISL is usually the best choice, but if you need to interconnect switches of different types (a Cisco switch and an Avaya switch, for example), then you'll need to use IETF. For the CCNA exam, the only thing that you really need to know about 802.1q is that it is the open standard for VLAN tagging, and should be used in mixed environments. The exam expects you to have a somewhat deeper understanding of ISL, including how it works, when it can be used, and ultimately, its purpose. First and foremost, you need to be aware that ISL will only function on ports with a speed of 100 Mbps or greater. That is, you cannot use ISL in conjunction with a 10 Mbps port. That shouldn't be an issue, since most Cisco Catalyst switches provide at least one or two Fast Ethernet ports, even on lower-end models like the 1912. Secondly, the ports on either end of the link need to support and be configured for ISL. ISL is referred to as a VLAN tagging method. Essentially, what ISL does is tag a frame as it leaves a switch with information about the VLAN that the frame belongs to. For example, if a frame from VLAN 99 is leaving a switch, the ISL port will add information to the frame header, designating that the frame is part of VLAN 99. When this ISL frame reaches the port at the other end of the switch, it will look at the ISL header, determine that the frame is meant for VLAN 99, will strip off the ISL information, and will forward it into VLAN 99. One of the issues with VLAN tagging is that by adding information to an Ethernet frame, the size of the frame can move beyond the Ethernet maximum of 1518 bytes, to 1522 bytes. Because of this, all non-ISL ports will see frames larger than 1518 bytes as giants, and as such, invalid. This is the reason why a port needs to be configured for ISL in order for it to understand this different frame format. One VLAN tagging is configured on the ports associated with the link connecting switches, the link is known as a "Trunk Link". A trunk link is capable of transferring frames from many different VLANs through the use of technologies like ISL or 802.1q. A better strategy here would be to configure ISL tagging on one of the router's Fast Ethernet interfaces, and then configure ISL on the connected switch port. This configuration, also known as a "router on a stick", would allow the router to process the traffic of multiple VLANs, and route traffic between them. We'll get into the details of routing within the next few articles. Beyond its intended purpose of configuring trunk links between switches, ISL is often used in other ways. For example, it is possible to purchase network interface cards that support ISL. If a server were configured with an ISL-capable network card, it could be connected to an ISL port on a switch. This would allow a server to be made part of multiple VLANs simultaneously, the benefit being that hosts from different broadcast domains could then access the server without the need for their packets to be routed. While this may seem like a perfect solution, you need to remember than the server would now see all traffic from these VLANs, which could negatively impact performance. I hope this article has provided you the good information about the Vlans. This articles is submitted by Kashif Raza http://www.networkingtutorials.net
|
RELATED ARTICLES
Internet Faxing Service Review The Internet is reshaping every form of communications medium, and faxing is no exception. The latest twist: Internet faxing services that let you send messages to any fax machine from any Web browser or email, and others that give you a "personal fax phone number," then forward any documents sent there to your e-mail inbox. C++ Tutorial 1, Introduction to C++ Introduction to C++ Microsoft Business Solutions VAR/Partner Selection ? Overview for IT Director/Manager/Controller Microsoft Great Plains and Microsoft CRM become more and more popular, partly because of Microsoft muscles behind them. Now Great Plains is targeted to the whole spectrum of horizontal and vertical market clientele. Small companies use Small Business Manager (which is based on the same technology ? Great Plains Dexterity dictionary and runtime), Great Plains Standard on MSDE is for small to midsize clients, and then Great Plains serves the rest of the market up to big corporations. Microsoft CRM is extremely scalable and fits to all the market niches. Microsoft Small Business Manager Customization Options - Overview Microsoft Business Solutions Small Business Manager is Great Plains Dexterity based application and successor and small business market niche version of Microsoft Great Plains. Microsoft Great Plains itself has variety of customization and integration tools: Integration Manager, VBA/Modifier, Great Plains Dexterity, SQL Server stored procedures to name a few. By one reason or another MBS decided to restrict Small Business Manager and do not provide VBA/Modifier, restricted Great Plains ReportWriter version and didn't include Great Plains Dexterity IDE installer on SBM CD. Microsoft Great Plains implementation: Restaurants Supply Chain Management Example Microsoft Great Plains serves majority of US based horizontal and vertical markets. Being relatively flexible and customizable ? it can fit your specific business requirements with light or deep customization. You can have portion of the system customization done by your in-house developers (such tools as Modifier with VBA, MS SQL Server stored procedures, Crystal Reports do not require unique expertise) and the most critical and difficult part could be subcontracted ? especially Great Plains Dexterity. In this small article we would like to give you good example of customization scenarios, where client needs warehouse management, random weight purchasing and by-pond resale to end clients, barcoding. Internet Security Threats: Who Can Read Your Email? Before being able to choose a secure Internet communication system, you need to understand the threats to your security. Microsoft CRM: Data Conversion ? Import from Act! Best Software Act! is very popular CRM for small and mid-size organization. This system attracts business owner by its low price, plus system is very easy to use. However if your business is growing you should reach the moment to implement more advanced CRM solution. Natural question is ? how do we convert the data from Act! to new CRM solution and the mapping of your objects for conversion. You would probably like to avoid operator data entry with potential numerous errors and mistypes. Assuming that you are IT specialist, we'll give you technical side of Act to MS CRM data migration: Are You Waiting for Microsoft Longhorn Operating System I love new technology. I am still ready to wait long for Longhorn. I have tried almost all operating systems of Windows series. My interest in Longhorn is building up day by day and the reason is..! From beginning Microsoft is very successful to project Longhorn as something mysterious. Many interesting stories are connected with it, which helped Longhorn to gain pre-launch popularity; I would rather say curiosity about this product. I don't know who is the propaganda minister of Microsoft? May be Mr. Brightside or Mr.Lonely. Relax guys I was just kidding. Easy Guide to RAID Recovery What is RAID RECOVERY? Microsoft CRM Customization Secrets ? Second Edition This article is for advanced Microsoft CRM SDK C# developers. It describes the technique of direct SQL programming, when SDK doesn't have the functionality to do the job. Editing Your Photos Using Microsoft Picture It Publishing Platinum 2002 - A Great Dinosaur I started using PIP (Picture It Publishing) Platinum 2002 right after I got it in a bundle with my HP Pavallion N5295 Notebook more than several moons ago! Five Reasons for Using an O/R Mapping Tool So, why should you use any O/R mapping tool? I am not talking about a specific tool but rather all O/R mapping tools in general. There are a number of reasons for using an O/R mapping tool but before I dive into that, let me give you a brief overview of what an O/R mapping tool really is. Antivirus Software ? Get The Bugs Before They Get You! You turn on your computer, and it doesn't look quite right. Maybe your icons have changed, or the background picture is wrong. Some options are disabled. Even worse, you may not be able to boot your computer up at all. Guess what ? it's probably got a virus. Microsoft CRM Implementation - US Market Lessons Microsoft CRM is CRM answer from Microsoft Business Solutions. If you compare it to other traditional CRM applications, such as Siebel - you will see that Microsoft CRM does use all the resent Microsoft technologies, that means that Microsoft targets its CRM to Windows market exclusively, plus this means that Microsoft CRM is more difficult in its installation. Microsoft doesn't even have to care about other platforms, such as Linux/Unix or Apple. Now - we see kind of paradoxical situation when Microsoft CRM is gaining market share even in recession and early post-recession time. Where is the secret? About Microsoft Sysprep (System Preparation) Utility (Windows 2000) The Microsoft system preparation utility for Windows 2000 is a very handy tool for network support shops that deploy PC images as a means of reformatting PC's with problems. Sysprep basically strips out all the hardware information and unique information from that specific PC, which allows you to deploy the image created from that PC on to many other PC's with different hardware configurations. 15 Questions to Ask Your Software Vendor When making a decision to buy any piece of software there are a number of criteria typically evaluated. One of the most important elements in the decision process is the strength of the company that builds the software. In fact a survey of 19,000 customers has identified that company strength is the most important factor in choosing software, with the price of the software being the fifth most important element. Microsoft CRM Implementation for Large Corporation ? overview Microsoft Business Solutions CRM is now approaching the phase of being mature product and the CRM solution you may consider for large publicly traded company. Our view point considers the fact of multiple platforms and systems coexistence and balancing: UNIX, Linux, Microsoft Windows, Java, .Net, PC, AS/400, RS6000, Microsoft Exchange, Lotus Notes Domino, etc. This increases the cost of maintenance, but decreases the risk of being trapped to one vendor/solution. So far we've seen successful implementations of Microsoft CRM in the following industries: Distribution, Logistics, Non-Profit, Chemicals, Pharmaceutical, Placement/Recruiting, Medicare/Hospitals, Retail, Wholesale, Education, Beverages, Services, Defense, Aerospace, Oil & Gas. Microsoft Business Solutions Products Selection: ERP, CRM, Retail Management Let's first look at your ERP system selection (without Retail Solution). Your options are: Microsoft CRM Programming Secrets ? Tips For Developers This article is for advanced Microsoft CRM SDK C# developers. It describes the technique of direct SQL programming, when SDK doesn't have the functionality to do the job. Benefits of Shareware Shareware has been fighting the stigma of being misunderstood for decades. While corporate software giants can no longer ignore the marketing potential of a trial version, small software startups are struggling with new listings and bandwidth costs. Businesses and individual consumers need to take a closer look at the benefits of taking advantage of shareware marketing. The concept of a trial version is not a new one. Consumer expectations, and the need for immediate satisfaction have spurned the industry to realize the need for instant software. The availability of file downloads in the Internet era, is spurning a revolution of purchasers who never leaving their homes or offices. As a result, the Internet has taken the proliferation of shareware to a new level. |
home | site map |
© 2005 |