Network+ Certification Exam Tutorial: How And When To Use Virtual LANs (VLANs)
Computers & Technology → Networking
- Author Chris Bryant
- Published October 6, 2006
- Word count 647
From your Network+ exam studies, you know that switches forward broadcasts, and that sounds great, but that's not always a good thing. A switch can have anywhere from 12 ports to 80 or more, and by default all hosts connected to that switch are going to be in the same broadcast domain. Let's say we have an 80-port switch. If one host connected to that switch sends a broadcast, by default, all of the other 79 hosts are going to receive the broadcast. That will unnecessarily take up our network's available bandwidth.
It gets worse. For some network services and protocols, a broadcast received by a host results in that receiving host transmitting a broadcast of its own. Then when all the hosts receive that broadcast, they all end up transmitting even more broadcasts. Pretty soon, all these broadcasts have snowballed into a broadcast storm, which can take up most of a network's bandwidth and make normal network operations almost impossible.
Most likely, only a few hosts on each switch really need to communicate with each other. Let's take a eight-port switch for example, where three of the hosts are in the Security department, another three in the Accounting department, and the other two in the Publishing department.
If any of these PCs sends a broadcast, every other host attached to that switch is going to receive it, and may well generate a broadcast of its own in response. That's what we want to guard against, and we can do so through the creation of Virtual LANs, or VLANs. Physically, these hosts all reside on the same Local Area Network, but we can configure the switch to place them in different logical (virtual) LANs. When a switch is configured with VLANs, the switch will forward a broadcast only to those hosts in the same VLAN as the host that originated it. By creating three VLANs on this switch, we now have three smaller broadcast domains, which helps to limit the scope of a broadcast.
After placing the Security hosts in their own VLAN, and then doing the same for the Accounting and Publishing hosts, broadcasts are now limited to being forwarded throughout their own VLAN. If a host in the Security department sends a broadcast, only other hosts in that same VLAN will receive it.
Now, here's another one of those good news / bad news scenarios we've discussed. (Better get used to those -- in networking, almost everything we do has a good side and a bad side!)
Good news: Broadcasts will not be forwarded (propagated), between VLANs. A broadcast sent by one host in a VLAN will be forwarded only to other hosts in that same VLAN.
Bad news: No other traffic is going to be able to go from one VLAN to another, either. By default, there will be no inter-VLAN traffic on the switch. For traffic to go between VLANs, a Layer Three device must be involved, and that L3 device will most likely be a router.
Notice I said "most likely".
Most books for exams such as Network+ and CCNA say that a switch is a Layer Two device, and a router is a Layer Three device, and that's it. In today's networking, though, that's not the case, and I don't want you to be confused when you hear the term "layer three switch" in the real world. (Or worse, I don't want you to be confused in a job interview if someone mentions this term.)
There are switches available today that are also capable of routing, and these L3 switches are becoming more and more popular as the price goes down. Having an L3 switch eliminates the need for routers in some small networks, so you need to know about them. For your Network+ and CCNA exams, if the term mentioned is simply "switch", they're talking about a classic "layer 2 switch" that doesn't perform routing.
Chris Bryant, CCIE #12933, is the owner of The Bryant Advantage , home of free CCNA and CCNP tutorials! Pass the Network+ exam with Chris Bryant!
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- Optimize Your Website for the Better Sight
- How To Develop & Implement A Network Security Plan
- Mastering VoIP: Overcoming Common Communication Challenges
- What Concerns Do Enterprises Have When Choosing Network Monitoring Software?
- Spectrum Router Red Light: Troubleshooting Guide and Solutions
- Web Development Made Easy: Why Outsourcing is the Smart Choice
- INTERNET OF THINGS
- Enhancing Business Communication with 3CX: A Powerful Unified Communications Solution
- How to Fix "No Signal, Please Check Your Antenna Connection" Error
- AN INTRODUCTION TO INTERNET MARKETING
- Passwordless is the New Cyber Security, Emir Ceric’s Meveto Transform Verification, Logging In and Remote Sign Out
- The Ultimate Guide to Master YouTube and Monetization
- Preventing data theft in an enterprise environment
- The Art Of Cold Calling [Mastery In Seven Simple Steps]
- Quantum Computing and the future of IT Security
- 5G TECHNOLOGY AND IOT: HOW DO THESE TRENDS RELATE?
- SkyVPN Launches New Gaming Servers with Dedicated Servers for PUBG
- Smm reseller panel
- Steps to Transfer Files Using Kindle Desktop Application
- Save time on your FTP updates with FTPGetter Professional
- Add a file hosting and sharing service to your site with YetiShare
- MCS Multicast Switch for Next Generation ROADM
- Business Networking Tips for Beginners
- Using Virtual Serial Ports in Proteus
- Network Security Checklist for All Types of Businesses
- Create Your Own File-Hosting Website with YetiShare
- Cat5 cable vs Cat6 Cables: What are the Contrast?
- Automate FTP Downloads and Uploads with FTPGetter Professional
- On Demand Freelance Marketplace For Field Engineers
- Cisco Network Infrastructure Services in San Francisco