Vlan Network Project Proposal
Vlan Network Project Proposal
INTRODUCTION
ABSTRACT ............................................................................................................. 5
JUSTIFICATION ..................................................................................................... 8
THEORETICAL FRAMEWORK............................................................ 10
1
INTRODUCTION
Introduction
The VLAN (Virtual LAN) appears as a solution for the logical separation of networks, it is
Network without VLAN. - In normal operation, when a switch receives a frame from
broadcast on one of its ports, sends the frame to all other ports.
2
Network with VLAN.- When VLANs are implemented on a switch, the transmission
from the traffic of unicast, multicast, and broadcast from a host in a VLAN
In particular, they are limited to the devices present in the VLAN.
Advantages of VLANs
• Security: groups that have sensitive data are separated from the rest of the
reducing the chances of data breaches occurring
Confidential. The faculty computers are located in VLAN 10.
and are completely separated from the Guest's data traffic and from the
students.
• Cost reduction: the savings in cost result from the little need for
costly network updates and more efficient use of links and bandwidth
existing.
3
computers on this network, there are only three broadcast domains: Faculty,
Student and Guest.
the ports. It is also easy for the IT staff to identify the function of a
VLAN by giving it a name. In the figure, for easier identification
VLAN 20 was named 'Student', VLAN 10 could be named 'Body'
"teacher" and the VLAN 30 "Guest".
4
ABSTRACT
Introduction
The VLAN (Virtual LAN) appears as a solution to the logical separation of networks.
that is to say, when in a physical network, in which all the devices are close to each other
wants to free these devices in groups, for example in a building where they are
connected the equipment of teachers and pupils there is hope that these will work
separately, for this there appear the VLAN that the equipments separate without
need to change no wired up one. A VLAN allows that an administrator of network
should create groups of devices connected to the network in a logical way that act
as if they were in his own independent network, even if they share a common
infrastructure with other VLAN. When it forms a VLAN, it can put a name to
Describe the principal function of the users of this VLAN. A VLAN is a
Subnetwork IP separated in a logical way. The VLAN allows for those IP networks.
and multiple subnetworks should exist in the same exchanged network Network
without VLAN .-In normal functioning, when a switch receives a plot of broadcast in
one of his ports, he sends the plot to all the rest ports. Network with VLAN. - When
the VLAN are implemented in a switch, the transmission of the traffic of unicast,
multicast and broadcast from a host in a VLAN especially, they limit themselves to
the present devices in the VLAN. The fragmentation of a great domain of broadcast
in several smaller parts reduces the traffic of broadcast and improves the
performance of the network. The fragmentation of domains in VLAN allows in
addition a better confidentiality of information inside an organization. The
fragmentation of a great domain of broadcast in several smaller parts reduces the
traffic of broadcast and improves the performance of the network.
fragmentation of domains in VLAN allows for better confidentiality of
information inside an organization. The fragmentation of domains of broadcast can
be realized by the VLAN (in the switches) or with routers. Whenever devices in
different networks of Cap 3 need to communicate, a router is necessary without
bearing in mind if the VLAN are in use. Advantages of the VLAN The productivity of
5
the user and the adaptability of the network are key drivers for growth and
the success of the business. The implementation of VLAN's technology allows that
A network should more flexibly accommodate commercial goals.
VLAN are the following ones: · Security: the groups that have sensitive information
separate from the rest of the network, diminishing the possibilities that it occurs
violations of confidential information. The computers of the educational body are in
the VLAN 10 and are completely separated from the traffic of information of the
Guest and from the students. · Reduction of cost: the saving in the cost results of
small need of expensive updates of network and more efficient uses of links and
existing bandwidth. · Better performance: the division of the flat networks of Cap 2
in multiple logical groups of work (domains of broadcast) reduces the unnecessary
traffic in the network and promotes performance. · Mitigation of the storm of
The division of a network in the VLAN reduces the quantity of devices
that can take part in a storm of broadcast. LAN's segmentation prevents that a
storm of broadcast propagates to the whole network. In the figure it can observe
that, in spite of the fact that there are six computers in this network, there are only
three domains of broadcast: educational Body, Student and Guest. · Major
efficiency of the personnel of YOU: the VLAN facilitates the management of the
network due to the fact that the users with similar requirements of network share
the same VLAN. When it provides a new switch, all the policies and procedures
that were already formed for the particular VLAN are implemented when the ports
are assigned. Also, it is easy for the personnel of YOU to identify the function of a
VLAN providing a name to him.
6
STATEMENT OF THE PROBLEM
aspects of the speed and efficiency of these modules that will shape the future
a more complete system.
7
JUSTIFICATION
The Tepeaca Higher Technological Institute does not have a control system.
school in which the departments or modules of the different careers and
specialties interact with each other and exchange information that can later
to be generated in a single report. But the fact of implementing a system like this
type involves restructuring connections, permissions, security, and other needs
within the school network. That is why we find it necessary to create
design and implement a VLAN that enables connection and discretion between
users and the ports to be used for each host.
8
REACHES AND LIMITATIONS
The expected scope is relevant until the implementation of the first network and
its version or topology which it is expected to manage and be able to cover the
specific needs for identification and access to information in real time
expected form.
The limitations that can be specified will depend on the host demand in
each VLAN is why these should be limited to 5 hosts per VLAN for
ensure the efficiency and stability of data transmission independent of
the 5 remaining ports in case the demand for the module increases.
We are talking about 4 modules and an initial total of 20 hosts in 4 VLANs although the
9
THEORETICAL FRAMEWORK
A VLAN (acronym for virtual LAN, 'virtual local area network') is a method
to createnetworksindependent logics within the same network fisica.1Several
VLAN can coexist in a singleswitchphysical or on a single physical network. They are
tools to reduce the size of thebroadcast domainand assist in the administration of
the network, separating logical segments of a local area network (the departments
of a company, for example) that should not exchange data using the network
local (although they could do it through arouteror a layer 3 switch
y 4).
10
The design of Ethernet did not offer scalability, that is, as the size increased
the network reduces its performance or the cost becomes unmanageable. CSMA/CD, the
protocol that controls access to the shared medium in Ethernet, imposes by
yes limitations regarding the maximum bandwidth and the maximum distance between
two stations. Connecting multiple Ethernet networks was at that time
complicated, and although a router could be used for interconnection, they were
expensive and required more processing time per large package, increasing
the delay.
and fast service. This redundant design requires the protocol to be enabled.
spanning tree (STP) to ensure that there is only one active logical path
to go from one node to another and thus avoid the phenomenon known as storms
broadcast. The main disadvantage of this logical topology of the network is that the
central switches become bottlenecks, as most of the
traffic flows through them.
11
CLASSIFICATION OF VLAN
Although the most common are port-based VLANs (level 1), the
virtual local area networks can be classified into four types according to the level of
the OSI hierarchy in which they operate:
12
in a combination of factors such as ports, MAC addresses, subnet, time of
day...
the port is assigned. If the user changes the input port and needs to access
the same VLAN, the network administrator must manually change the
assignment to the VLAN of the new connection port on the switch.
13
PORT-BASED VLAN
This approach is simple, quick, and easy to manage, given that there are no
complex tables to look at to configure VLAN segmentation. If
the port to VLAN association is done with an ASIC (acronym in English for
Application-Specific Integrated Circuit
specific), the performance is very good. An ASIC allows for port mapping to
VLAN has been done at the hardware level.
14
VLAN DESIGN
The first network designers used to configure VLANs with the goal of
reduce the size of the collision domain in an Ethernet segment and improve its
performance. When the switches achieved this, because each port is a domain
of collision, their priority was to reduce the size of the broadcast domain. Since, if
the number of terminals increases, the broadcast traffic increases and the consumption of
CPU for processing unwanted broadcast traffic. One of the ways most
efficient in reducing the domain of diffusion is by dividing a network
large in several VLANs.
The definition of multiple VLANs and the use of trunk links, compared to thenetworks
LANinterconnected with a router, it is a scalable solution. If it is decided to create
new groups can easily accommodate the new VLANs by making a
redistribution of the ports of the switches. In addition, the membership of a
university community member to a VLAN is independent of their
physical location. And it can even be achieved that a team belongs to several
VLANs (using a network card that supports trunking).
15
Imagine that the university has a network with an IP address range of the type
172.16.XXX.0/24, each VLAN, defined at the data link layer (level 2 of
OSI), will correspond to a different IP subnet: VLAN 10. Administration.
Subred IP 172.16.10.0/24 VLAN 20. Profesores. Subred IP 172.16.20.0/24 VLAN
30. Students. IP subnet 172.16.30.0/24
PROJECT DEVELOPMENT
Components:
1 ROUTER (1841)
2 SWHITCH (2950-24)
20 COMPUTERS (PC-PT)
2 TRUNCATED LINKS
The VLANs are configured for up to 10 hosts each, but due to the low
user demand is limited to 5 pcs per VLAN in which VLAN 2 and 4
they have trunk links for better network management.
16
First, we connect the router to the 2 switches and these to the PCs using
the fastethernet ports 0/0 and fastethernet 0/1 and the fastethernet subinterfaces
0/0.1, 0/0.2 Fastethernet 0/1.3 and Fastethernet 0/1.4 with the following IP addresses:
17
18
19
20
CONCLUSION
In conclusion, the use and implementation of VLAN technology in the technology institute
I would moderate the traffic of data and reduce the data transfer time.
in addition to improving the performance and management of the network.
Network with VLAN.- When VLANs are implemented on a switch, the transmission
the traffic of unicast, multicast, and broadcast from a host in a VLAN
in particular, they are limited to the devices present in the VLAN.
21
REFERENCES
22