Ethical Hacking
What is Hacking? Types of Hackers | Introduction to Cybercrime
What is Hacking? Hacking is the activity of identifying weaknesses in a computer system or a...
VLAN is a custom network which is created from one or more local area networks. It enables a group of devices available in multiple networks to be combined into one logical network. The result becomes a virtual LAN that is administered like a physical LAN. The full form of VLAN is defined as Virtual Local Area Network.
The below topology depicts a network having all hosts inside the same virtual LAN:
Without VLANs, a broadcast sent from a host can easily reach all network devices. Each and every device will process broadcast received frames. It can increase the CPU overhead on each device and reduce the overall network security.
In case if you place interfaces on both switches into separate VLAN, a broadcast from host A can reach only devices available inside the same VLAN. Hosts of VLANs will not even be aware that the communication took place. This is shown in the below picture:
VLAN in networking is a virtual extension of LAN. A LAN is a group of computer and peripheral devices which are connected in a limited area such as school, laboratory, home, and office building. It is a widely useful network for sharing resources like files, printers, games, and other applications.
In this Virtual LAN tutorial, you will learn:
Here is step by step details of how VLAN works:
Here are the important ranges of VLAN:
Range | Description |
VLAN 0-4095 | Reserved VLAN, which cannot be seen or used. |
VLAN 1: | This is a default VLAN of switches. You cannot delete or edit this VLAN, but it can be used. |
VLAN 2-1001: | It is a normal VLAN range. You can create, edit, and delete it. |
VLAN 1002-1005: | These ranges are CISCO defaults for token rings and FDDI. You cannot delete this VLAN. |
VLAN 1006-4094: | It is an extended range of VLANs. |
In the below example, there are 6 hosts on 6 switches having different VLANs. You need 6 ports to connect switches together. It means, if you have 24 various VLANs, you will have only 24 hosts on 45 port switches.
Here are the important characteristics of VLAN:
Here are the important types of VLANs
Port-based VLANs groups virtual local area network by port. In this type of virtual LAN, a switch port can be configured manually to a member of VLAN.
Devices that are connected to this port will belong to the same broadcast domain that is because all other ports are configured with a similar VLAN number.
The challenge of this type of network is to know which ports are appropriate to each VLAN. The VLAN membership can't be known just by looking at the physical port of a switch. You can determine it by checking the configuration information.
This type of VLAN processes traffic based on a protocol that can be used to define filtering criteria for tags, which are untagged packets.
In this Virtual Local Area Network, the layer-3 protocol is carried by the frame to determine VLAN membership. It works in multi-protocol environments. This method is not practical in a predominately IP based network.
MAC Based VLAN allows incoming untagged packets to be assigned virtual LAN and, thereby, classify traffic depending on the packet source address. You define a Mac address to VLAN mapping by configuring mapping the entry in MAC to the VLAN table.
This entry is specified using source Mac address proper VLAN ID. The configurations of tables are shared among all device ports.
Here is an important difference between LAN and VLAN:
LAN | VLAN |
LAN can be defined as a group of computer and peripheral devices which are connected in a limited area. | A VLAN can be defined as a custom network which is created from one or more local area networks. |
The full form of LAN is Local Area Network | The full form of VLAN is Virtual Local Area Network. |
The latency of LAN is high. | The latency of VLAN is less. |
The cost of LAN is high. | The cost of a VLAN is less. |
In LAN, the network packet is advertised to each and every device. | In VLAN, the network packet is sent to only a specific broadcast domain. |
It uses a ring, and FDDI (Fiber Distributed Data Interface) is a protocol. | It uses ISP and VTP as a protocol. |
Here are the important pros/benefits of VLAN:
Here are the important cons/ drawbacks of VLAN:
Here are the important uses of VLAN:
What is Hacking? Hacking is the activity of identifying weaknesses in a computer system or a...
What is Kali Linux? Kali Linux is a security distribution of Linux derived from Debian and...
{loadposition top-ads-automation-testing-tools} China has placed numerous restrictions on...
Data is one of the most vital components of information systems. Database powered web applications are used by...
Wireshark is a widely used network monitoring and WiFi troubleshooting tool. However, with...
$20.20 $9.99 for today 4.5 (112 ratings) Key Highlights of Ethical Hacking Tutorial PDF: 204+...