0% found this document useful (0 votes)
8 views20 pages

MIDTERM Revised

networking

Uploaded by

alfajoraalliah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views20 pages

MIDTERM Revised

networking

Uploaded by

alfajoraalliah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

COLLEGE OF ENGINEERING AND COMPUTER

STUDIES

IT 302 NETWORKING 2

TTH 05:00PM-07:00PM/04:00PM-
07:00PM
COURSE DETAILS
COLLEGE College of Engineering and Computer Studies
PROGRAM Bachelor of Science in Information Technology
COURSE CODE IT 302
DESCRIPTIVE TITLE NETWORKING 2
CREDIT UNITS 4 units
PREREQUISITE/S IT 207
(If applicable)
CLASS SCHEDULE
(Time/Day/Room)
CONSULATION
SCHEDULE
COURSE The course includes fundamental concepts of networking, VLAN, trunking and port
DESCRIPTION aggregation, load balancing, selecting routing & switching equipment.
COURSE OUTLINE AND TIME FRAME
PRELIM MIDTERM PREFINAL FINAL
Identifying Network VLANs Link Aggregation Load Balancing
Components
Week 1-5 Week 6-9 Week 10-14 Week 15-18

Required Student Outputs:


Face to face and Online Participation
Use of Modules
Written Assignments, Quizzes and Exams
Virtual Meeting
Individual and Group Projects and Presentations
Community Research and Interviews

Classroom Policies
1. Students who incurred 20% or more of the total class hours for the semester should be automatically
dropped from the course unless valid reasons are presented.
2. Respect for classroom authorities is required of all students.
3. Examinations and Requirements should be passed on time. Corresponding deductions will be made after
the due date.
4. Students are prohibited from unauthorized use of class platforms use for online classes.
5. The class should start and end with a prayer.
6. Academic honesty is highly required. Students caught cheating will be given a score of zero or a failing
grade.
IT 302: NETWORKING 2
MIDT
VLAN’s

Topics: c
● Purpose of VLAN
● Virtual Network Devices
● Implementing VLAN’s
● Other VLAN Classification Criteria
Objectives:
1. Define and Discuss VLANs
2. Demonstrate and Assigned switch ports to a VLAN, change ports, Add, move, and Verified VLAN
configuration
3. Develop a Christian viewpoint on VLAN as a technology that enables responsible stewardship of
network resources, fosters community and collaboration, establishes boundaries for security, and
allows for unity in diversity.

Time Frame: 5 hrs.


Values Integration
CHRISTIAN PERSPECTIVE:

In a Christian context, understanding the principles behind virtual network devices and LAN
segmentation can be likened to broader spiritual and ethical concepts. Here’s a perspective based on
Christian values:

1. Unity and Stewardship

 Virtual Servers and Consolidation: The consolidation of multiple virtual servers on a single
physical device can be seen as an analogy to the Christian principle of unity. Just as
virtualization allows for efficient use of resources by combining multiple functions into a single
physical server, Christians are called to unite their efforts and resources to serve a greater
purpose. The idea of being good stewards of what we have, using our talents and resources
wisely, reflects the efficient and responsible use of technology in network management.
 Scriptural Reference: 1 Peter 4:10 (NIV): “Each of you should use whatever gift you have
received to serve others, as faithful stewards of God’s grace in its various forms.” Just as
virtualization optimizes resources, Christians are encouraged to use their gifts and resources
in a way that benefits others and glorifies God.

2. Security and Protection

 Firewalls and Network Security: Firewalls protect networks from unauthorized access, akin
to how Christians are called to protect their hearts and minds from negative influences. The
concept of guarding against harmful elements resonates with the Biblical teaching of
maintaining spiritual vigilance.
 Scriptural Reference: Proverbs 4:23 (NIV): “Above all else, guard your heart, for everything
you do flows from it.” Just as firewalls secure a network, Christians are advised to protect their
inner selves from negative influences and maintain their faith.

3. Diversity and Flexibility

 VLANs and Network Segmentation: VLANs allow for the segmentation of networks into
different broadcast domains, which can be compared to the diversity within the Christian
community. While Christians are unified in faith, there is a recognition of different roles and
functions within the body of Christ.
 Scriptural Reference: 1 Corinthians 12:4-6 (NIV): “There are different kinds of gifts, but the
same Spirit distributes them. There are different kinds of service, but the same Lord. There are
different kinds of working, but in all of them and in everyone it is the same God at work.”
VLANs illustrate how different parts of a network can operate independently while still
contributing to the whole, similar to how diverse members of a church work together.

WEEK 1
SUBJECT MATTER DISCUSSION

I. Introduction

What is a VLAN?

In simple terms, a VLAN is a set of workstations within a LAN that can communicate with
each other as though they were on a single, isolated LAN.
What does it mean to say that they “communicate with each other as though they were on a
single, isolated LAN”?

Among other things, it means that:

● broadcast packets sent by one of the workstations will reach all the others in the VLAN
● broadcasts sent by one of the workstations in the VLAN will not reach any workstations that
are not in the VLAN
● broadcasts sent by workstations that are not in the VLAN will never reach workstations that
are in the VLAN
● the workstations can all communicate with each other without needing to go through a
gateway. For example, IP connections would be established by ARPing for the destination IP
and sending packets directly to the destination workstation—there would be no need to send
packets to the IP gateway to be forwarded on.
● the workstations can communicate with each other using non-routable protocols.

The purpose of VLANs


The basic reason for splitting a network into VLANs is to reduce congestion on a large LAN. To
understand this problem, we need to look briefly at how LANs have developed over the years.
Initially LANs were very flat—all the workstations were connected to a single piece of coaxial cable, or
to sets of chained hubs. In a flat LAN, every packet that any device puts onto the wire gets sent to
every other device on the LAN.

As the number of workstations on the typical LAN grew, they started to become hopelessly
congested; there were just too many collisions, because most of the time when a workstation tried to
send a packet, it would find that the wire was already occupied by a packet sent by some other
device.

This section describes the three solutions for this congestion that were developed:
● Using routers to segment LANs
● Using switches to segment LANs
● Using VLANs to segment LANs

II. Discussion

Virtual Network Devices


A major data center paradigm shift is underway. This shift is away from a company having
its own data center (with its raised flooring and large air conditioning system) containing
multiple physical servers, each of which offered a specific service (for example, e-mail,
DNS services, or Microsoft Active Directory).

Virtual Servers
The computing power available in a single high-end server is often sufficient to handle the
tasks of multiple independent servers. With the advent of virtualization , multiple servers
(which might be running different operating systems) can run in virtual server instances on
one physical device. For example, a single high-end server might be running an instance of
a Microsoft Windows Server providing Microsoft Active Directory (AD) services to an
enterprise, while simultaneously running an instance of a Linux server acting as a corporate
web server, and at the same time acting as a Sun Solaris UNIX server providing corporate
DNS services. Figure 3-37 illustrates this concept of a virtual server. Although the virtual
server in the figure uses a single network interface card (NIC) to connect out to an Ethernet
switch, many virtual server platforms support multiple NICs. Having multiple NICs offers
increased throughput and load balancing.
Virtual Switches
One potential tradeoff you make with the previously described virtual server scenario is that
all servers belong to the same IP subnet, which could have QoS and security implications.
If these server instances ran on separate physical devices, they could be attached to
different ports on an Ethernet switch. These switch ports could belong to different VLANs,
which could place each server in a different broadcast domain. Fortunately, some virtual
servers allow you to still have Layer 2 control (for example, VLAN separation and filtering).
This Layer 2 control is made possible by the virtual server not only virtualizing instances of
servers, but also virtualizing a Layer 2 switch.

Figure 3-38 depicts a virtual switch . Notice that the servers logically reside on separate VLANs, and
frames from those servers are appropriately tagged when traveling over a trunk to the attached
Ethernet switch.
Using routers to segment LANs
The early solution to this problem was to segment the network using routers. This would split the
network into a number of smaller LANs. There would be less workstations on each LAN, and so less
congestion. Of course, routable data being sent between LANs would have to be routed, so the layer
3 addresses would have to be organized so that each LAN had an identifiable set of addresses that
could be routed to—such as an IP subnet or an AppleTalk zone. Non-routable protocols would have
to be bridged, which is not quite so congestion-reducing, because bridges forward all broadcasts. But,
at least for unicast packets, a bridge only forwards packets if it knows that the destination address is
not in the originating LAN.

Using switches to segment LANs


As switches became more available, there was a move from chained hubs to a set of hubs connected
to a switch. A switch only sends traffic to a given port if the traffic has to go to that port. So switches
have the effect of reducing congestion at workstations, by stopping the workstations from seeing all
the traffic from the other ports of the switch.
A simple switched network, though, still needs routers to set the boundaries of where broadcasts are
sent (referred to as “broadcast containment”). So, the typical LAN was set up as shown in the
following figure:
Domain terminology
The above figure introduces the concept of a LAN segment. This is also referred to as a collision
domain, because when a device is trying to send a packet, it can only collide with packets sent by
other devices on the same segment. Each LAN segment consists of all the devices attached to a
single switch port—the switch stops packets from different ports from
colliding with each other. The LAN itself is referred to as a broadcast domain, because if any device
within the LAN
sends out a broadcast packet, it will be transmitted to all devices in that LAN, but not to devices
beyond the LAN.

Using VLANs to segment LANs


As LANs became larger, data rates became faster, and users desired greater flexibility, the routers in
a network started to become a bottleneck. This is because:

􀁺 routers typically forward data in software, and so are not as fast as switches
􀁺 splitting up a LAN using routers meant that a LAN typically corresponded to a particular physical
location. This became limiting when many users had laptops, and wanted to be able to move between
buildings, but still have the same network environment wherever they plugged in.

So, switch vendors started implementing methods for defining “virtual LANs”—sets of switch ports,
usually distributed across multiple switches, that somehow interacted as though they were in a single
isolated LAN. This way, workstations could be separated off into separate LANs without being
physically divided up by routers.

At about the same time, hubs became less popular and have been largely replaced by L2 switches.
This has made the whole concept of a collision domain somewhat historical. In modern networks, a
“collision domain” mostly consists of a single device attached to an L2 switch port, or possibly a PC
with something like an IP phone attached to it.

So, the layout of the LAN has become more like:


So, instead of the LANs corresponding to physical areas divided from each other by routers,
there are virtual LANs distributed across the network. For example, all the devices in the
various areas labelled “VLAN A” all belong to a single virtual LAN—i.e. a single broadcast
domain.

Advantages of using VLANs


1. Performance. As mentioned above, routers that forward data in software become a bottleneck as
LAN data rates increase. Doing away with the routers removes this bottleneck.

2. Formation of virtual workgroups. Because workstations can be moved from one VLAN to
another just by changing the configuration on switches, it is relatively easy to put all the people
working together on a particular project all into a single VLAN. They can then more easily share files
and resources with each other.
To be honest, though, virtual workgroups sound like a good idea in theory, but often do not work well
in practice. It turns out that users are usually more interested in accessing company-wide resources
(file servers, printers, etc.) than files on each others' PCs.

3. Greater flexibility. If users move their desks, or just move around the place with their laptops,
then, if the VLANs are set up the right way, they can plug their PC in at the new location, and still be
within the same VLAN. This is much harder when a network is physically divided up by routers.

4. Ease of partitioning off resources. If there are servers or other equipment to which
the network administrator wishes to limit access, then they can be put off into their own
VLAN. Then users in other VLANs can be given access selectively.

Implementing VLANs

Port-based VLANs

In the previous section, we simply stated that the network is split up into sets of virtual LANs. It is one
thing to say this; it is quite another thing to understand how this is actually achieved.
Fundamentally, the act of creating a VLAN on a switch involves defining a set of ports, and defining
the criteria for VLAN membership for workstations connected to those ports. By far the most common
VLAN membership criterium is port-based. We will consider that criterium here, and visit the other
options in "Other VLAN classification criteria" on page 10.

With port-based VLANs, the ports of a switch are simply assigned to VLANs, with no extra
criteria.

All devices connected to a given port automatically become members of the VLAN to which that port
was assigned.
In effect, this just divides a switch up into a set of independent sub-switches.
Distributing a single VLAN across multiple switches

The figure in "Using VLANs to segment LANs" on page 5 shows an example of a VLANbased
network. It shows some of VLAN A connected to one switch, and some more of VLAN A connected to
another switch.

You may be asking “Are these both part of the same VLAN A, or separate VLANs that all happen to
be called VLAN A?”
The answer is that they are all parts of the same VLAN—there is a single VLAN A that is spread
across two switches.

How is this achieved? How does one switch know that when it receives a broadcast packet that it
associates to VLAN A that it must also forward that broadcast to other switches?
This can be done in a number of different ways, and in the early days of VLANs, just about every one
of these ways was tried. Some vendors had their switches use a proprietary protocol to inform each
other of their VLAN tables; some vendors used time-divided multiplexing in which different timeslots
were allocated to different VLANs; other vendors used frame tagging.

In the end, frame tagging became the accepted standard. As we will see, in most respects this
is a simple and elegant solution. However, it initially had one big downside: it required a
fundamental change to format of the Ethernet header. This split the world’s Ethernet devices
into those that recognized tagged headers and those that did not recognize tagged headers.
In other words, a lot of Ethernet equipment was rendered obsolete.

How does tagging work?


Simply, 4 bytes are inserted into the header of an Ethernet packet. This consists of 2 bytes of Tag
Protocol Identifier (TPID) and 2 bytes of Tag Control Information (TCI):
TPID is the tag protocol identifier, which indicates that a tag header is following and contains the user
priority, canonical format indicator (CFI), and the VLAN ID. User priority is a 3-bit field that allows
priority information to be encoded in the frame. Eight levels of priority are allowed, where zero is the
lowest priority and seven is the highest
priority.

The CFI is a 1-bit indicator that is always set to zero for Ethernet switches. CFI is used for
compatibility between Ethernet and Token Ring networks. If a frame received at an Ethernet port has
a CFI set to 1, then that frame should not be bridged to an untagged port.

Then, the VID field contains the identifier of the VLAN. Actually, it is only the VID field that is really
needed for distributing VLANs across switches—but the IEEE decided that they while they were
altering the format of the Ethernet header, they might as well add the User Priority and CFI too.

Let us see how this tag makes it simple to distribute VLANs across switches. Consider a broadcast
packet arriving at a switch port. By some criterion, the packet is associated with VLAN 47, i.e. a VLAN
with VLAN ID=47. Now, port 17 of this switch is connected to port 12 of another switch that also has
some ports in VLAN 47. The network administrator
needs to configure port 17 of switch 1 and port 12 of switch 2 as “tagged” member ports of VLAN 47.
This tells switch 1 to send the broadcast out port 17 as a tagged packet, with VID=47 in the tag. And
it tells switch 2 to accept that tagged packet and associate it with VLAN 47. Then, switch 2 will send
the packet out all its member ports of VLAN 47, because
that is what it does with broadcasts that it has associated with VLAN 47.

The tag makes it very easy for the second switch to know what to do with the packet, because the tag
marks this packet as belonging to VLAN 47, and switch 2 knows exactly what it should do with
packets that belong to VLAN 47.
So, there really are only two simple rules:

􀁺 If a port is a tagged member of a VLAN, then any packets sent out that port by that VLAN must
have a tag inserted into the header.
􀁺 If a tagged packet arrives in at a port, and the port is a tagged member of the VLAN corresponding
to the VID in the packet's tag, then the packet is associated with that VLAN. With these two simple
rules, it is possible to distribute VLANs across multiple switches.

Mixing tagged and untagged packets on the same port

In the previous section, we discussed using tags to indicate the VLAN membership of packets that
are transferred from one switch over to another. But, it is also possible that untagged packets will be
transported across that link that joins the two switches.

For example, it could be that port 17 of switch 1 is an untagged member of VLAN 56, and port 12 of
switch 2 is an untagged member of VLAN 56. In this case, if switch 1 needed to transport VLAN 56
packets over to switch 2, it would send them untagged. When those untagged packets arrived at
switch 2, what VLAN would switch 2 decide to associate these packets with, given that they do not
have a tag to indicate their VLAN membership? Well, in fact, switch 2 would realise that VLAN 56 is
the untagged VLAN on the receiving port, so untagged packets would be deemed to belong to VLAN
56.

Obviously, a port can be an untagged member of only one port-based VLAN, otherwise there would
be uncertainty about what VLAN incoming untagged packets belonged to. (Note, the situation is a bit
different when subnet and protocol-based VLANs are introduced—see page 10 onwards). This VLAN
is often referred to as the “native” VLAN of
the port.

Often, you might not want to associate a native VLAN with the port that connects a switch to another
switch, so that all packets coming into that port must use a VLAN tag to indicate their VLAN
membership. This stops the switch from accepting any untagged packets on the port. In AlliedWare
Plus, this is achieved by configuring a port to trunk mode and not configuring a native VLAN on it. In
AlliedWare, it is achieved by setting the parameter acceptable=vlan on the port, so that the port will
only accept VLAN-tagged packets.

Only accepting packets that match the port’s VLAN configuration (ingress filtering)
Consider a port that is connected to a normal workstation. Normal applications on the workstation will
never send tagged packets, so there is no requirement for the switch port to accept tagged packets.
But, is there any harm if the port does accept tagged packets if they happen to come along? Well, the
answer is “quite possibly yes”. If the workstation does send tagged packets, then it is very likely doing
so for malicious reasons.

To guard against such maliciousness, most switches provide the ability to configure “ingress filtering”.
When ingress filtering is applied to a port, packets will only be accepted into a port if they match the
VLAN configuration of that port. So, if the port is an untagged member of one VLAN, and nothing
else, then only untagged packets will be accepted on the port. If the port is tagged for a set of VLANs,
then a tagged packet will be accepted into the port only if
it is tagged with the VID of one of the tagged VLANs configured on the port.

We highly recommend that you configure ingress filtering on all switch ports, because there is seldom
a good reason for a port to accept packets from VLANs that are not configured on that port. Under
AlliedWare Plus ingress filtering is enabled on all ports by default.

Other VLAN classification criteria


Up until now, we have been thinking just of port-based VLANs. However, there are other ways of
defining VLAN membership. In this section, we will consider two examples of these other types of
VLAN:
􀁺 Protocol-based VLANs
􀁺 Subnet-based VLANs

Protocol-based VLANs
With this method, different protocol types are assigned to different VLANs. For example, IP defines
one VLAN, IPX defines another VLAN, Netbeui yet another VLAN, etc.

Subnet-based VLANs
With this method, the VLAN membership is defined by the subnet to which a workstation's IP address
belongs.

Workstation or packet?
Now that you have read the descriptions of protocol-based and subnet-based VLANs, it is possible
that some awkward questions will come to your mind, like:

􀁺 Isn't a VLAN a set of workstations? How does a protocol specify a workstation? Surely a given
workstation can send out packets using different protocols (often at the same time), depending on
which applications it is running?
And

􀁺 In the case of a subnet-based VLAN, which VLAN does a workstation belong to when it is not
sending IP packets?
These are good questions. At this point, you may be starting to see that the description of a VLAN as
a set of
workstations is a bit of a simplification. So, let us look a bit deeper here and get to a better
understanding of what VLAN membership means.

In fact, a given workstation can belong to multiple VLANs. It could belong to one subnet based VLAN
when sending IP packets, another protocol-based VLAN when sending IPX packets, and yet another
different port-based VLAN when sending some other protocol. So, certainly, when analysing the
VLAN setup on a network, it is a mistake to ask “what
VLAN does this workstation belong to?” The more meaningful question to ask is “if a packet of such-
and-such a protocol arrived at port x of the switch, which VLAN would that packet be associated
with?”

It is important to really understand the change of mind-set that has just been introduced here. When
initially learning about VLANs, it is usual to think of VLANs as sets of workstations. And, in practice,
this is often all that a network administrator wants to achieve. However, once the VLAN configuration
on a switch becomes complex, with multiple VLANs of different types all configured on the same port,
it is no longer possible to really think about the VLAN from the workstation point of view. It becomes
necessary to think of it from the packet point of view.

Therefore, it really is vital to think of packets being associated to VLANs when trying to understand
VLAN configurations. Any other approach just ends in confusion. The main point is that, when using
protocol-based and subnet-based VLANs, it is data streams that are divided into VLANs, not
necessarily whole workstations.

Some specific examples


Up until now, we have looked generically at how VLANs are implemented. In this section, we put this
generic description into context by examining some specific examples. Let us consider a case where
multiple VLANs have been configured on a switch, and see what happens when certain packets
arrive at the port.

VLAN setup on the switch


The switch uses the following VLANs:
􀁺 ports 1 - 4 of the switch are untagged members of the port-based VLAN 2.
􀁺 ports 3 - 6 of the switch are untagged members of the subnet-based VLAN 3, which is
configured for the subnet 192.168.1.0/255.255.255.0.
􀁺 port 4 is an untagged member of the protocol-based VLAN 4, which is configured for
protocols IP and IPX.
􀁺 port 5 is a tagged member of VLAN 2
􀁺 port 6 is a tagged member of VLAN 4
This switch implementation also has the following rules:
1. Subnet-based VLANs take precedence over protocol-based VLANs, which take
precedence over port-based VLANs.
2. If a tagged packet arrives at a port, it is only accepted if that port is a tagged member of
the VLAN corresponding to the VID in the packet's tag.

Treatment of packets
Now let us look at certain packets arriving at the switch:

A untagged IPX packet arrives at port 1


Port 1 is only a member of VLAN 2, so the packet will be associated with VLAN 2. The switch will
look at the forwarding table for VLAN 2. If the destination MAC address of the packet is in the
forwarding table, the packet will be forwarded out the corresponding port in that table entry. If the
destination MAC address is not in the forwarding table for VLAN 2,
then the packet will be flooded out all other ports of VLAN 2. So, it will be sent as an untagged packet
out ports 2-4, and as a tagged packet out port 5.

An untagged IP packet with source/dest IP address in the 192.168.1.0/ 255.255.255.0 subnet


arrives at port 4

Port 4 is a member of a subnet-based VLAN 3 configured for the subnet 192.168.1.0/ 255.255.255.0.
So, the packet will be associated to VLAN 3. The switch will look at the forwarding table for VLAN 3. If
the destination MAC address of the packet is in the forwarding table, the packet will be forwarded out
the corresponding port in that table entry.
If the destination MAC address is not in the forwarding table for VLAN 3, then the packet will be
flooded out all other ports of VLAN 3. It will be sent as an untagged packet out ports 3, 5, and 6.
An untagged IP packet with source/dest IP address not in the 192.168.1.0/
255.255.255.0 subnet arrives at port 4

Port 4 is a member of a subnet-based VLAN 3 configured for the subnet 192.168.1.0/ 255.255.255.0,
but the packet's addresses are not in that subnet. So, the packet will not be associated with VLAN 3.
The next VLAN type in the precedence order is the protocol-based VLAN. Port 4 is a member of the
protocol-based VLAN 4, configured for IP and IPX. As this is an IP packet, it will be associated with
VLAN 4. The switch only has one other port in VLAN 4. The packet will be sent as a tagged packet
out port 6.

An untagged AppleTalk packet arrives at port 4


The AppleTalk packet cannot be associated with the subnet-based or the protocol-based VLANs on
port 4, so it must drop through to the port-based VLAN on port 4. So the packet is associated with
VLAN 2. The switch will look at the forwarding table for VLAN 2. If the destination MAC address of the
packet is in the forwarding table, the packet
will be forwarded out the corresponding port in that table entry. If the destination MAC address is not
in the forwarding table for VLAN 2, then the packet will be flooded out all other ports of VLAN 2. So, it
will be sent as an untagged packet out ports 1-3, and as a tagged packet out port 5.

A tagged IPX packet arrives at port 4


Port 4 is an untagged member of the protocol-based VLAN 4, configured for IP and IPX. But, the
packet is tagged, so it will be dropped.

A tagged packet with VID=10 arrives at port 5


Port 5 is a tagged member of VLAN 2. But the VID in the packet's tag does not match the VID of the
VLAN (2), so the packet is dropped.

A tagged packet with VID=2 arrives at port 5


Port 5 is a tagged member of VLAN 2. The VID in the packet's tag matches the VID of the VLAN, so
the packet is associated with VLAN 2. The switch will look at the forwarding table for VLAN 2. If the
destination MAC address of
the packet is in the forwarding table, the packet will be forwarded out the corresponding port in that
table entry. If the destination MAC address is not in the forwarding table for VLAN2, then the packet
will be flooded out all other ports of VLAN 2. So, it will be sent as an untagged packet out ports 1-4.

III. Summary/KeyPoints
■ Virtual networking components were described. These components include virtual server,
virtual switch, virtual desktop,

After completion of this topic, you will be able to answer the following questions:

What functions are performed by Ethernet switch features, such as VLANs, trunks,
Spanning Tree Protocol, link aggregation, Power over Ethernet, port monitoring, user
authentication, and first-hop redundancy?

IV. Evaluation Activities


Using simulation software packet tracer. Create your kind of network having 3
separate groups of VLAN on a single network. Use either a single switch, dual switch
of your choice. Submit your output on Schoology before Midterm Exam. Video
references will be posted on schoology.
REFERENCE SIMULATION USING PACKET TRACER

Task 1: Prepare the Network


Step 1: Cable a network that is similar to the one in the topology diagram.
You can use any current switch in your lab as long as it has the required interfaces shown in the
topology.
Note: If you use 2900 or 2950 switches, the outputs may appear different. Also, certain commands
may
be different or unavailable.
Step 2: Clear any existing configurations on the switches, and initialize all ports in the
shutdown
state.
If necessary, refer to Lab 2.5.1, Appendix 1, for the procedure to clear switch configurations.
It is a good practice to disable any unused ports on the switches by putting them in shutdown. Disable
all
ports on the switches:

Task 2: Perform Basic Switch Configurations


Step 1: Configure the switches according to the following guidelines.
• Configure the switch hostname.
• Disable DNS lookup.
• Configure an EXEC mode password of class.
• Configure a password of cisco for console connections.
• Configure a password of cisco for vty connections.
Step 2: Re-enable the user ports on S2 and S3.

Task 3: Configure and Activate Ethernet Interfaces


Step 1: Configure the PCs.
You can complete this lab using only two PCs by simply changing the IP addressing for the two PCs
specific to a test you want to conduct. For example, if you want to test connectivity between PC1 and
PC2, then configure the IP addresses for those PCs by referring to the addressing table at the
beginning
of the lab. Alternatively, you can configure all six PCs with the IP addresses and default gateways.

Task 4: Configure VLANs on the Switch


Step 1: Create VLANs on switch S1.
Use the vlan vlan-id command in global configuration mode to add a VLAN to switch S1. There are
four
VLANS configured for this lab: VLAN 10 (faculty/staff); VLAN 20 (students); VLAN 30 (guest); and
VLAN
99 (management). After you create the VLAN, you will be in vlan configuration mode, where you can
assign a name to the VLAN with the name vlan name command.

Step 2: Verify that the VLANs have been created on S1.


Use the show vlan brief command to verify that the VLANs have been created.

Step 3: Configure and name VLANs on switches S2 and S3.


Create and name VLANs 10, 20, 30, and 99 on S2 and S3 using the commands from Step 1. Verify
the
correct configuration with the show vlan brief command.
What ports are currently assigned to the four VLANs you have created?
_______________________________

Step 4: Assign switch ports to VLANs on S2 and S3.


Refer to the port assignment table on page 1. Ports are assigned to VLANs in interface configuration
mode, using the switchport access vlan vlan-id command. You can assign each port individually or
you
can use the interface range command to simplify this task, as shown here. The commands are
shown for
S3 only, but you should configure both S2 and S3 similarly. Save your configuration when done.
Step 4: Determine which ports have been added.
Use the show vlan id vlan-number command on S2 to see which ports are assigned to VLAN 10.
Which ports are assigned to VLAN 10?
_______________________________________________________
Note: The show vlan id vlan-name displays the same output.
You can also view VLAN assignment information using the show interfaces interface switchport
command.

Step 5: Assign the management VLAN.


A management VLAN is any VLAN that you configure to access the management capabilities of a
switch.
VLAN 1 serves as the management VLAN if you did not specifically define another VLAN. You assign
the
management VLAN an IP address and subnet mask. A switch can be managed via HTTP, Telnet,
SSH,
or SNMP. Because the out-of-the-box configuration of a Cisco switch has VLAN 1 as the default
VLAN,
VLAN 1 is a bad choice as the management VLAN. You do not want an arbitrary user who is
connecting
to a switch to default to the management VLAN. Recall that you configured the management VLAN
as
VLAN 99 earlier in this lab.
From interface configuration mode, use the ip address command to assign the management IP
address
to the switches.

Assigning a management address allows IP communication between the switches, and also allows
any
host connected to a port assigned to VLAN 99 to connect to the switches. Because VLAN 99 is
configured as the management VLAN, any ports assigned to this VLAN are considered management
ports and should be secured to control which devices can connect to these ports.

Step 6: Configure trunking and the native VLAN for the trunking ports on all switches.
Trunks are connections between the switches that allow the switches to exchange information for all
VLANS. By default, a trunk port belongs to all VLANs, as opposed to an access port, which can only
belong to a single VLAN. If the switch supports both ISL and 802.1Q VLAN encapsulation, the trunks
must specify which method is being used. Because the 2960 switch only supports 802.1Q trunking, it
is
not specified in this lab.
A native VLAN is assigned to an 802.1Q trunk port. In the topology, the native VLAN is VLAN 99. An
802.1Q trunk port supports traffic coming from many VLANs (tagged traffic) as well as traffic that
does not
come from a VLAN (untagged traffic). The 802.1Q trunk port places untagged traffic on the native
VLAN.
Untagged traffic is generated by a computer attached to a switch port that is configured with the
native
VLAN. One of the IEEE 802.1Q specifications for Native VLANs is to maintain backward compatibility
with
untagged traffic common to legacy LAN scenarios. For the purposes of this lab, a native VLAN serves
as
a common identifier on opposing ends of a trunk link. It is a best practice to use a VLAN other than
VLAN
1 as the native VLAN.

Use the interface range command in global configuration mode to simplify configuring trunking.
Step 8: Ping several hosts from PC2.
Ping from host PC2 to host PC1 (172.17.10.21). Is the ping attempt successful? _________
Ping from host PC2 to the switch VLAN 99 IP address 172.17.99.12. Is the ping attempt successful?
_________
Because these hosts are on different subnets and in different VLANs, they cannot communicate
without a
Layer 3 device to route between the separate subnetworks.
Ping from host PC2 to host PC5. Is the ping attempt successful? _________
Because PC2 is in the same VLAN and the same subnet as PC5, the ping is successful

Step 9: Move PC1 into the same VLAN as PC2.


The port connected to PC2 (S2 Fa0/18) is assigned to VLAN 20, and the port connected to PC1 (S2
Fa0/11) is assigned to VLAN 10. Reassign the S2 Fa0/11 port to VLAN 20. You do not need to first
remove a port from a VLAN to change its VLAN membership. After you reassign a port to a new
VLAN,
that port is automatically removed from its previous VLAN.
Ping from host PC2 to host PC1. Is the ping attempt successful? _________
Even though the ports used by PC1 and PC2 are in the same VLAN, they are still in different
subnetworks, so they cannot communicate directly.

Step 10: Change the IP address and network on PC1.


Change the IP address on PC1 to 172.17.20.22. The subnet mask and default gateway can remain
the
same. Once again, ping from host PC2 to host PC1, using the newly assigned IP address.
Is the ping attempt successful? _________
Why was this attempt successful? _________________________

CHRISTIAN PERSPECTIVE:
From a Christian perspective, the concept of Virtual Local Area Networks (VLANs) can be
understood in the context of stewardship and community. VLANs are a networking technology that
allows the segmentation of a physical network into multiple virtual networks.
In the Christian faith, stewardship is the responsible management and care of resources entrusted
to us by God. VLANs can be seen as a way to efficiently manage and utilize network resources. By
segmenting a physical network into VLANs, organizations can allocate resources more effectively,
ensuring that each part of the network serves its intended purpose.
VLANs can be used to create isolated network segments that enhance security and privacy. In a
Christian context, this can be related to the idea of creating safe and supportive communities where
individuals can collaborate and communicate freely. VLANs can help protect sensitive data and foster
trust among network users.
VLANs establish boundaries within a network, much like how Christianity teaches the importance
of moral and ethical boundaries. VLANs can be used to separate different types of traffic, such as
guest networks, employee networks, and critical infrastructure. This separation aligns with the
principle of safeguarding what is valuable and protecting against harm.
VLANs require careful planning and administration. In Christianity, responsible leadership and
administration are highly regarded virtues. Administrators who configure VLANs must make wise
decisions about resource allocation, security policies, and network design, keeping the best interests
of the community in mind.

V. References
CompTIA Network+ N10-005 Authorized Cert Guide, References and Resources, Kevin
Wallace, CCIE #7945

SMB University: Selling Cisco SMB Foundation Solutions. Networking Fundamentals

Alcatel-Lucent (2008) Multi-Chassis Link Aggregation Group Redundacy for Layer2 VPN;

Groups.http://www.alcatel‐lucent.com/wps/portal/Products
Enhancing Network Capacity and Redundancy using Multi-Chassis Link Aggregation

Multiple Systems Link Aggregation Control Protocol. Rick van ‘tSpijker. Master of Science-
Mobile and Distributed Computer Networks. Leeds Metropolitan University Innovation
North. 31 May 2010.

© 2008 Allied T ele sis, Inc. All rights reserved. Information in this document is subject to
change without notice. All company names, logos, and product designs that are trademarks
or registered trademarks are the property of their respective owners.

Cisco Application Control Engine Module Server Load-Balancing Configuration Guide.


Software Version A2(3.0) October 2009.

VLAN Configuration, Cisco Connected Grid Ethernet Switch Module Software Interface
Card Configuration Guide.

VI. Signatures of Program Head and Dean


Engr. Jennee Faith Joy Resano Rhea S. Calvo, MSCS
Dean Program Head

You might also like