Presentation1 (Autosaved)
Presentation1 (Autosaved)
11111111.11111111.11111111.11000000
255.255.255.192 /26
196.10.20.0 --------196.10.20.63
196.10.20.64 -------196.10.20.127
196.10.20.128 --------196.10.20.191
196.10.20.192 --------196.10.20.255
Purpose of Subnetting in Computer
Networks
11111111.11111111.11111110.00000000
255.255.254.0 /23
150.15.0.0 --------150.15.1.255
150.15.2.0 -------150.15.3.255
150.15.4.0 --------150.15.5.255
150.15.6.0 --------150.15.7.255
And so on
Zara bilal
- Definition:
A VLAN is a logical
subgroup within a larger
network, allowing devices to
communicate as if they were
in the same physical network,
even if they are not.
- Real-Life Analogy :
Think of VLANs as virtual
rooms in a large building
where people with similar
purposes work together.
INTRODUCTION
Improved security (isolates
sensitive data)
Better network
management (logical
grouping of devices)
Enhanced performance
(reduces broadcast traffic)
Example: Separating HR, IT,
and Finance teams into
different VLANs.
KEY BENEFITS
Illustration:
A diagram showing one
physical switch split into
multiple VLANs (e.g., VLAN 10,
20, 30).
Key Points:
VLAN tags are added to data
packets.
Switches forward traffic
only within the same VLAN
unless a router is used.
how VLAN work
Default VLAN:
All devices belong to
VLAN 1 by default.-
2. Data VLAN:
For user-generated
traffic (e.g., email, file
sharing).-
3. Voice VLAN:
Dedicated to VoIP devices.
4. Management VLAN:
For managing network
devices (e.g., switches,
routers).-
5. Native VLAN:
TYPES
Used for untagged traffic
on trunk ports.
Access Port:
Connects end devices (PCs,
printers) to a specific VLAN.
Trunk Port:
Carries traffic for multiple
VLANs between switches.-
VLAN Tagging:
Adds a VLAN identifier to the
Ethernet frame using IEEE
802.1Q protocol.
COMPONENT
-Step-by-Step Guide:
1. Assign ports to a VLAN on
a switch.
2. Set up trunk links for inter-
switch VLAN communication.
3. Configure routers for inter-
VLAN routing (Layer 3).
CONFIGURATION
Scenario: A university with
VLANs for:
Students
Teachers
Admin staff
Guest Wi-Fi
Visual Diagram: Network
divided into logical groups
with different levels of access.
CHALLENGES
Techniques to enhance
VLAN security:
Disable unused ports.
Use private VLANs for
isolated systems.
Implement VLAN hopping
prevention.
SECURITY