74
C
HAPTER
4: VLAN O
VERVIEW
Figure 29
A VLAN implementation
Advantages of VLANs
Compared with the traditional Ethernet, VLAN enjoys the following advantages.
■
Broadcasts are confined to VLANs. This decreases bandwidth consumption and
improves network performance.
■
Network security is improved. Because each VLAN forms a broadcast domain,
hosts in different VLANs cannot communicate with each other directly unless
routers or Layer 3 switches are used.
■
A more flexible way to establish virtual workgroups. VLAN can be used to
create a virtual workgroup spanning physical network segments. When the
physical position of a host changes within the range of the virtual workgroup,
the host can access the network without changing its network configuration.
VLAN Principles
VLAN tag
VLAN tags in the packets are necessary for a switch to identify packets of different
VLANs. A switch works at the data link layer of the OSI model (Layer 3 switches
are not discussed in this chapter) and it can identify the data link layer
encapsulation of the packet only, so you need to add the VLAN tag field into the
data link layer encapsulation if necessary.
In 1999, IEEE issues the IEEE 802.1Q protocol to standardize VLAN
implementation, defining the structure of VLAN-tagged packets.
In traditional Ethernet data frames, the type field of the upper layer protocol is
encapsulated after the destination MAC address and source MAC address, as
shown in Figure 30.
Figure 30
Encapsulation format of traditional Ethernet frames
Switch
Router
Switch
VLAN A
VLANB
VLAN A
VLANB
VLAN A
VLAN B
Type
Data
DA&SA
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...