4 Views· 10/09/22· Entertainment
VLANs Explained | Cisco CCNA 200-301
MY FULL CCNA COURSE
📹 CCNA PreLaunch - https://certbros.teachable.com..../p/cisco-ccna?coupon
HOW TO PASS THE CCNA
📚 Get a great book - https://amzn.to/3f16QA5
📹 Take a video course - https://certbros.teachable.com..../p/cisco-ccna?coupon
✔ Use practice exams - https://www.certbros.com/ccna/Exsim
SKILLSHARE COURSES
Landing your dream job takes more than just technical skills. Skillshare is a great place to learn all the soft skills you need to be successful. Use the below link for a free 14-day trial.
📺 https://skillshare.eqcm.net/vnzRkO
THE SOFTWARE I USE TO MAKE VIDEOS
🗯 Animations - https://www.certbros.com/AfterEffects
📺 Video editing - https://www.certbros.com/PremierPro
SOCIAL
🐦 Twitter - https://twitter.com/certbros
📸 Instagram - https://www.instagram.com/certbros
👔 LinkedIn - https://www.linkedin.com/company/certbros
💬 Discord - https://www.certbros.com/discord
Disclaimer: These are affiliate links. If you purchase using these links, I'll receive a small commission at no extra charge to you.
--------------------------------------------------------------------------------------------------------------- NEW DISCORD SERVER: https://certbros.com/discord
--------------------------------------------------------------------------------------------------------------- --~--
VLAN stands for Virtual Local Area Network.
Using VLANs we can virtually separate our LANs into smaller chunks.
Why would we want to do that? There are a few reasons why we might want to use VLANs. One of the main reasons is something we’ve already spoken about, and that is broadcast traffic.
Very quickly, broadcast traffic came start to slow down our networks and devices. Once our networks start to grow, we need a way to manage all of this traffic.
VLANs give us the benefits of physically separating network, but with the added bonus of being able to do this virtually. The traffic still behaves in the same way as if it was physically split.
VLANs make it very easy to control broadcast domains. It's also scalable, we don’t need new equipment or to re-cable everything every time we want to make a change.
Out of the box, cisco, and most over switches, have a default VLAN called VLAN 1. Every interface is assigned the default VLAN.
From here, we can start to make our own VLANs and split up our switch. You can add up to 4094. This is the maximum number of supported VLANs.
VLANs aren’t restricted to just one switch. We can have the same VLANs across multiple switches. This makes VLANs very versatile and scalable.
There are two types of ports on a switch, an access port and a trunk port. An access port is designed for endpoint devices to access the network. Such as computers, laptops etc.
A trunk port can send traffic from different VLANs. They’re are used to send traffic between networking devices.
802.1q tags are added to frames when they are sent over a trunk port. 802.1q is the IEEE standard. It can also be called DOT1q. This tag is 4 bytes and contains a few bits of information.
TPID or Tag protocol Identifier – this is used to identify the frame as an 802.1q tagged frame. It could also be ISL but this it’s rarely used today.
TCI or Tag Control Information – This contains 3 bits of information, the priority, CFI, which is a format indicator, and most importantly, the VLAN ID.
The tag field is then read and removed by the receiving switch.
A native VLAN is configured per trunk interface. It’s the VLAN that switch assumes the frame is on if there is no tag. By default, the native VLAN is VLAN 1. Tags are not added to frames that belong to the native VLAN.
#ccna #cisco #networking
1 Comments
InfiniteAnime
2 years ago