The Year of the Virtual LAN
|
|
- Brook Hutchinson
- 6 years ago
- Views:
Transcription
1 The Year of the Virtual LAN IEEE Conference, Maui, July 1995 mmcnealis@cisco.com
2 Agenda Where are we today? Virtual LAN Technologies IEEE Virtual LANs vlans and IEEE 802.1d Conclusion Date -3/16/95 2
3 Where are we today? vlans over-hyped and under-defined. vlan membership criteria: Port-Centric Protocol/Subnet MAC Address Standardization Process. vlan Identification Automated Configuration vlan Management Date -3/16/95 3
4 vlan Technologies vlan Signaling. vlan Tagging. LAN Emulation for ATM backbones. Date -3/16/95 4
5 vlan Signaling Switches maintain lists of MAC Addresses associated with a particular vlan. Exchange this information with other switches connected to the backbone. Enables intelligent forwarding/directed broadcasting. Date -3/16/95 5
6 vlan Signaling Evaluation Advantage: Preserves the original packet format Disadvantages: Requires routing-like protocol to distribute MAC <--> vlan tables Scalability Requires unique addressing Date -3/16/95 6
7 Suitability for vlan Tagging Functions at the Data Link Layer:- IEEE IEEE / Ethernet FDDI Token Ring MAC Scalability - 4 byte vlan Identifier field. Media independent/transparent to non vlan devices. Simple to implement/low overhead. Potential security benefits. Date -3/16/95 7
8 IEEE Framing Single Secure Data Exchange (SDE) PDU header inserted between frame s MAC and Data: MAC Clear Header Protected Header DATA MAC SAID M DF LSAP (vlan ID) Station ID DATA I CV VLAN ID carried in the 4 byte SAID (Security Association Identifier) field. Date -3/16/95 8
9 Engineering Marketing MENLO Finance PARK Frames on the backbone FDDI BACKBONE MOUNTAIN VIEW Marketin Support Engineering Marketing Finance SAN JOSE Engineerin SANTA Finance CLARA Support Entry/Exit points of a shared backbone configured to accept supported colors header inserted/removed as packets forwarded to/from the shared backbone Date -3/16/95 9
10 vlan Tagging Packets traversing shared backbone carry vlan ID within the packet header. Remote switches make intelligent forwarding decisions based upon vlan tag. vlan tag inserted/removed as packets enter/ exist shared LAN backbone. Date -3/16/95 10
11 vlan Tagging Evaluation Advantages: Scalable. Independent of vlan membership criteria. Supports multiple vlans per source. Facilitates inter-vlan routing. Low processing overhead. Disadvantage: potential MTU violation. Date -3/16/95 11
12 The IEEE Standard Interoperable LAN/MAN Security (SILS) Standard for Secure Data Exchange (SDE). Addresses the need for traffic segmentation and network security. Optional support for: Fragmentation. Authentication. Encryption. Security Management Information Base (SMIB). Date -3/16/95 12
13 vlans and IEEE 802.1d Autonomous Spanning Tree topology computed for each Virtual LAN. Better resilience and network stability Extend scalability by tunneling BPDUs across vlan backbone Requires Bridge ID per vlan supported. Backwards compatibility may mandate new Group Address. Date -3/16/95 13
14 Conclusion Standardization on vlan Identification is the first of three parts to achieving virtual networking interoperability. IEEE is a legitimate vlan tagging mechanism well suited to vlan switching and should be endorsed. Date -3/16/95 14
15 VLAN membership based on port/protocol combination Existing VLAN membership is at interface level In Client/Server environment clients on different LANs currently share the same VLAN/ traffic LAT Clients NetBIOS Server CISCO 7000 CISCO 7000 NetBIOS PCs LAT Server Date -3/16/95 15
16 Advantage: vlan Signaling Evaluation Preserves the original packet format Disadvantages: Requires routing-like protocol to distribute MAC <--> vlan tables Scalability Requires unique addressing Date -3/16/95 16
Routing Between VLANs Overview
Routing Between VLANs Overview This chapter provides an overview of VLANs. It describes the encapsulation protocols used for routing between VLANs and provides some basic information about designing VLANs.
More informationCatalyst 1900 Series and Catalyst 2820 Series Enterprise Edition Software Configuration Guide
INDEX A allowed list, VLAN 2-28 to 2-29 ATM 2-5 firmware upgrade B-5 to B-7 LANE trunk connections 1-4 module 2-9, 2-13, 2-23 networks 2-5 trunk 2-4, 2-14 B bridge groups 3-15 bridge number 2-10 Bridge
More informationRouting Between VLANs Overview
Routing Between VLANs Overview This chapter provides an overview of VLANs. It describes the encapsulation protocols used for routing between VLANs and provides some basic information about designing VLANs.
More informationLOCAL AREA NETWORKS Q&A Topic 4: VLAN
A. Indicate whether the sentence or statement is true or false: 1. VLANs are more flexible in handling moves and additions of ports than routers 2. VLANs logically segment the physical LAN infrastructure
More informationConfiguring Access and Trunk Interfaces
Configuring Access and Trunk Interfaces Ethernet interfaces can be configured either as access ports or trunk ports. Trunks carry the traffic of multiple VLANs over a single link and allow you to extend
More informationResilient Packet Ring 5 Criteria (2. Compatibility)
Resilient Packet Ring 5 Criteria (2. Compatibility) - 802. Overview and Architecture - 802.1D, 802.1Q, 802.1f - Systems management standards Byoung-Joon (BJ) Lee IEEE 802 RPRSG, July 10-14, 2000 2000,
More informationOverview of Bridging
Overview of Bridging The Bridging section of this guide discusses the following software components for bridging and routing protocols in Cisco routers: Transparent and Source-Route Transparent (SRT) Bridging,
More informationVLANs. CCNA Exploration Semester 3 Chapter Sep-13
VLANs CCNA Exploration Semester 3 Chapter 3 1 Topics The role of VLANs in a network Trunking VLANs Configure VLANs on switches Troubleshoot common VLAN problems 2 Semester 3 LAN Design Basic Switch Concepts
More informationGigabit Networks, VLANs & Wireless LANs
Hands-On Gigabit Networks, VLANs & Wireless LANs ( Advanced Local Area Networks ) Course Description This Hands-On course will discuss traditional Ethernet as it is evolving today and its future. Ethernet
More informationExtending Switched Networks with Virtual LANs. 2000, Cisco Systems, Inc. 7-1
Extending Switched Networks with Virtual LANs 2000, Cisco Systems, Inc. 7-1 Objectives Upon completion of this chapter, you will be able to perform the following tasks: Configure a VLAN Configure VLAN
More informationVLANs Level 3 Unit 9 Computer Networks
VLANs Some Requirements of LANs Need to split up broadcast domains to make good use of bandwidth People in different departments may need to be grouped together for access to servers Security: restrict
More informationConfiguring VLANs. Understanding VLANs CHAPTER
7 CHAPTER This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco MWR 2941 router. It includes information about VLAN
More informationUsing VLAN & Bridge APPENDIX
APPENDIX I Using VLAN & Bridge The VLAN & Bridge application allows you to configure groups of ports independent of their physical location as a virtual LAN. This arrangement is called a logical grouping
More informationCisco Systems, Inc. Norman Finn. July 9, /12. Class of Service in Class of Service in Norman Finn Cisco Systems
Class of Service in 802.1 Norman Finn Cisco Systems, Inc. July 9, 1996 1/12 CoS Bridging Example sw2 16 Mb T-R 100 Mb Ether sw3 sw1 10 Mb Ether FDDI X Y 100 Mb and 10 Mb Ethernet prevent passing access
More informationCompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,
More informationConfiguring Transparent Bridging
Configuring Transparent Bridging Document ID: 10676 Contents Introduction Before You Begin Conventions Prerequisites Components Used Bridging Transparent Bridging Configuration Examples Example 1: Simple
More informationSwitched Ethernet Virtual LANs
Switched Ethernet Virtual LANs Computer Networks Lecture 4 http://goo.gl/pze5o8 Switched Ethernet 2 LAN Switches Behave as bridges (operates in the logical tree topology) Switching is implemented by hardware
More informationCisco Express Forwarding Overview
Cisco Express Forwarding () is advanced, Layer 3 IP switching technology. optimizes network performance and scalability for networks with large and dynamic traffic patterns, such as the Internet, on networks
More informationRisanuri Hidayat. 13/03/2012 Jurusan Teknik Elektro dan Tekn Informasi UGM
Risanuri Hidayat 1 Ilustrasi 2 VLAN JTETI UGM 3 Virtual LAN A virtual LAN (VLAN) is a group of PCs, servers, and other network resources that behave as if they were connected to a single network segment
More informationCompTIA Network+ Course
CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency
More informationChapter 5: STP. * What is STP? How does STP work?
Chapter 5: STP * What is STP? How does STP work? * What would be the worst case scenario that could happen to a redundant path switched network with the STP is disabled? When multiple paths exist between
More informationTransparent Bridging and VLAN
Transparent Bridging and VLAN Plug and Play Networking (C) Herbert Haas 2005/03/11 Algorhyme I think that I shall never see a graph more lovely than a tree a graph whose crucial property is loop-free connectivity.
More informationSource-Route Bridging
25 CHAPTER Chapter Goals Describe when to use source-route bridging. Understand the difference between SRB and transparent bridging. Know the mechanism that end stations use to specify a source-route.
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco ME 3400 Ethernet Access switch. It includes information
More informationLAN Emulation Overview
This overview chapter gives a high-level description of (LANE). Procedures for configuring LANE are provided in the following chapters in this publication: Configuring chapter Configuring Token Ring chapter
More informationEnterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.
2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are
More information2. LAN Topologies Gilbert Ndjatou Page 1
2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers
More informationInternetworking Part 1
CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:
More informationComputer Networking. December 2004 CEN CN
Computer Networking CEN CN 1 Layer 2 - Bridge Frame Header Data Bridge Trailer Data Link Layer Physical Layer More complex than repeat, it requires hardware and software Bridges have diminished because
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 9 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094). It includes information about VLAN membership modes, VLAN configuration
More informationIT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://
IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com Exam : JN0-343 Title : Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version : DEMO 1 / 6 1.How
More informationVLAN Configuration. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the CGR 2010 ESM. It includes information about VLAN membership
More informationDeveloping Standards for Metro Ethernet Networks
Developing Standards for Metro Ethernet s Stephen Haddock shaddock@extremenetworks.com Chief Technology Officer Agenda Metro Ethernet s Metro Ethernet Forum Services Model and Definitions Traffic Management
More informationUnderstanding and Configuring VTP
27 CHAPTER This chapter describes the VLAN Trunking Protocol (VTP) on the Catalyst 4500 series switch. It also provides guidelines, procedures, and configuration examples. This chapter includes the following
More informationConfiguring MPLS and EoMPLS
37 CHAPTER This chapter describes how to configure multiprotocol label switching (MPLS) and Ethernet over MPLS (EoMPLS) on the Catalyst 3750 Metro switch. MPLS is a packet-switching technology that integrates
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on your Catalyst 3550 switch. It includes information about VLAN
More informationVLANs. LAN Switching and Wireless Chapter 3. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
VLANs LAN Switching and Wireless Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of VLANs in a converged network. Explain the role of trunking
More informationUpon completion of this chapter, you will be able to perform the following tasks: Identify what a VLAN is and how it operates. Configure a VLAN to
Upon completion of this chapter, you will be able to perform the following tasks: Identify what a VLAN is and how it operates. Configure a VLAN to improve network performance. Identify what role the switch
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationChapter 6 Connecting Device
Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks
More informationConfiguring VLAN CHAPTER
CHAPTER 10 LMS collects data about devices so that you can configure and manage Virtual Local Area Network (VLAN) in your network. You must set up your LMS server properly to ensure that Data Collection
More informationSpanning Tree Protocol(STP)
Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 10 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership
More informationConfiguring Source-Route Bridging
This chapter describes source-route bridging (SRB) configuration tasks. For a discussion of remote source-route bridging (RSRB) configuration tasks, refer to the Configuring Remote Source-Route Bridging
More informationConfigure Virtual LANs in Layer 2 VPNs
The Layer 2 Virtual Private Network (L2VPN) feature enables Service Providers (SPs) to provide L2 services to geographically disparate customer sites. A virtual local area network (VLAN) is a group of
More informationOverview. About the Catalyst 2820 and Catalyst 1900 Switches CHAPTER
CHAPTER 1 Overview This chapter describes the Enterprise Edition software features for Catalyst 2820 and Catalyst 1900 switches. It also describes the feature default settings and shows the management
More informationPPPoE on ATM. Finding Feature Information. Prerequisites for PPPoE on ATM. Restrictions for PPPoE on ATM
This feature module describes the PPP over Ethernet (PPPoE) on ATM feature. The feature provides the ability to connect a network of hosts over a simple bridging-access device to a remote access concentrator.
More informationConfiguring VLANs. Finding Feature Information. Prerequisites for VLANs
Finding Feature Information, page 1 Prerequisites for VLANs, page 1 Restrictions for VLANs, page 2 Information About VLANs, page 2 How to Configure VLANs, page 7 Monitoring VLANs, page 19 Where to Go Next,
More informationCisco Networking Academy Curriculum - Semester Three Scope and Sequence
Cisco Networking Academy Curriculum - Semester Three Scope and Sequence Course Description: This is the third course in four courses designed to introduce new content and extend previously learned networking
More informationPacket Switching on L2 (LAN Level)
Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Spanning Tree Protocol
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 12 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership
More information8 VLANs. 8.1 Introduction. 8.2 vlans. Unit 8: VLANs 1
8 VLANs 8.1 Introduction Layer 2 devices, such as network switches and wireless access points can be used to create virtual LANs (vlans), which can enhanced network security as it can be used to isolate
More informationConfiguring Banyan VINES
Configuring Banyan VINES This chapter describes how to configure Banyan VINES and provides configuration examples. For a complete description of the VINES commands in this chapter, refer to the Banyan
More informationConfiguring VTP. Understanding How VTP Version 1 and Version 2 Work CHAPTER
10 CHAPTER This chapter describes how to configure the VLAN Trunking Protocol (VTP) on the Catalyst 6500 series switches For complete syntax and usage information for the commands that are used in this
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 14 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Catalyst 3750 switch. It includes information about VLAN
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 14 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094). It includes information about VLAN modes and the VLAN Membership
More informationEthernet Service Provision (ESP)
(ESP) An Ethernet Service Provider supplies Ethernet Layer 2 services among Customers sites. A number of vendors are providing equipment for this purpose. A number of ESPs exist, and use various technologies
More informationRevision of Previous Lectures
Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture
More informationConfiguring the Catalyst 3920
CHAPTER 5 Configuring the Catalyst 3920 You might not have to configure the Catalyst 3920 for it to work in your network; it is shipped with default configuration parameters and can function with these
More informationThe following steps should be used when configuring a VLAN on the EdgeXOS platform:
EdgeXOS VLANs VLAN Overview This document provides an overview of what a VLAN is and how it is configured on the EdgeXOS platform. Use the step-by-step guide below to configure a VLAN on the Edge appliance
More informationMixed-Media Bridging
CHAPTER 31 Mixed-Media Bridging Background Transparent bridges are found predominantly in Ethernet networks, and source-route bridges (SRBs) are found almost exclusively in Ring networks. For more information
More informationIntroducing Campus Networks
Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching
More informationVLAN Trunking Protocol (VTP)
24 CHAPTER Prerequisites for VTP, page 24-1 Restrictions for VTP, page 24-1 Information About VTP, page 24-2 Default Settings for VTP, page 24-9 How to Configure VTP, page 24-10 For complete syntax and
More informationConfiguring VLANs. Finding Feature Information. Prerequisites for VLANs
Finding Feature Information, page 1 Prerequisites for VLANs, page 1 Restrictions for VLANs, page 2 Information About VLANs, page 2 How to Configure VLANs, page 8 Monitoring VLANs, page 22 Where to Go Next,
More informationUnderstanding Issues Related to Inter VLAN Bridging
Understanding Issues Related to Inter VLAN Bridging Document ID: 11072 Contents Introduction Prerequisites Requirements Components Used Conventions Spanning Tree Topology Concerns Recommended Use of Hierarchical
More informationConfiguring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling
CHAPTER 14 Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling With Release 12.1(13)E and later, the Catalyst 6500 series switches support IEEE 802.1Q tunneling and Layer 2 protocol tunneling.
More informationThis chapter describes how to configure VLANs on the Cisco 7600 series routers.
CHAPTER 14 This chapter describes how to configure VLANs on the Cisco 7600 series routers. For complete syntax and usage information for the commands used in this chapter, refer to the Cisco 7600 Series
More informationConfiguring STP and RSTP
7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains
More informationAnalysis of Virtual Local Area Networking Technology. Zheng Zhang
6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 2016) Analysis of Virtual Local Area Networking Technology Zheng Zhang Jiangxi Vocational and Technical
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 16 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on your Catalyst 2950 or Catalyst 2955 switch. It includes information
More informationTable of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP
Table of Contents (Rapid) Spanning Tree Protocol (R)STP Karst Koymans Informatics Institute University of Amsterdam (version 34, 2014/02/17 14:41:48) Monday, February 17, 2014 Bridge loops Two bridges
More informationConfiguring VLANs. Understanding VLANs
This document describes how to configure your Cisco wireless mobile interface card (WMIC) to operate with the VLANs set up on your wired LAN. These sections describe how to configure your WMIC to support
More informationData Communications. Connecting Devices
Data Communications Connecting Devices Connecting Devices Networks do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, or segments of LANs, we use
More informationConfiguring Q-in-Q VLAN Tunnels
This chapter describes how to configure Q-in-Q VLAN tunnels. Finding Feature Information, page 1 Feature History for Q-in-Q Tunnels and Layer 2 Protocol Tunneling, page 1 Information About Q-in-Q Tunnels,
More informationSwitches running the LAN Base feature set support only static routing on SVIs.
Finding Feature Information, on page 1 Prerequisites for VLANs, on page 1 Restrictions for VLANs, on page 2 Information About VLANs, on page 2 How to Configure VLANs, on page 6 Monitoring VLANs, on page
More informationChapter 3 Reading Organizer
Name Date Chapter 3 Reading Organizer After completion of this chapter, you should be able to: 3.1 Compare the types of switches used in an enterprise network. Explain how Spanning Tree Protocol prevents
More informationVLANs. Traditional Campus Networks. Performance Issues. Broadcast Issues. Bridges terminate collision domains
Traditional Campus Networks Broadcast Domain VLANs Collision Domain 1 Collision Domain 2 Bridges terminate collision domains 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc.
More informationATM in TCP/IP environment: Adaptations and Effectiveness
Bremen Institute of Industrial Technology and Applied Work Science ATM in TCP/IP environment: Adaptations and Effectiveness Dipl.-Ing. Kai-Oliver Detken, BIBA ATM Traffic Symposium, Mykonos, Greece, September
More informationBridging Commands. December Cisco IOS Bridging Command Reference BR-1
Bridging Commands BR-1 access-expression Bridging Commands access-expression To define an access expression, use the access-expression command in interface configuration mode. To remove the access expression
More informationEnabling DECnet Routing, page 2 (required) Enabling Concurrent Routing and Bridging, page 5 (optional)
Configuring First Published: December 15, 1997 Last Updated: December 14, 2011 The Configuring module describes how to configure the Cisco implementation of the routing protocol. Finding Feature Information
More informationVLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1
VLANs 2003, Cisco Systems, Inc. All rights reserved. 2-1 Traditional Campus Networks Broadcast Domain Collision Domain 1 Collision Domain 2 Bridges terminate collision domains 2003, Cisco Systems, Inc.
More informationTable of Contents 1 VLAN Configuration 1-1
Table of Contents 1 VLAN Configuration 1-1 Overview 1-1 Introduction to VLAN 1-1 VLAN Fundamentals 1-2 Types of VLAN 1-3 Introduction to Port-Based VLAN 1-3 Configuring a VLAN 1-4 Configuration Task List
More informationVLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1
VLANs 2003, Cisco Systems, Inc. All rights reserved. 2-1 Traditional Campus Networks Broadcast Domain Collision Domain 1 Collision Domain 2 Bridges terminate collision domains 2003, Cisco Systems, Inc.
More informationAdministrivia. Homework on class webpage If you are having problems following me in class (or doing the homework problems), please buy the textbook
Administrivia Homework on class webpage If you are having problems following me in class (or doing the homework problems), please buy the textbook Project Discussion class_ gotcha Reading finally on webpage
More informationTracking Packet Flow Using Path Analysis
CHAPTER 4 Tracking Packet Flow Using Path Analysis Path Analysis is an operations and diagnostic application that traces the connectivity between two specified points on your network and the physical and
More informationLecture 9: Switched Ethernet Features: STP and VLANs
Lecture 9: Switched Ethernet Features: STP and VLANs Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Ethernet Switch Features The following features
More informationImplement Spanning Tree Protocols. LAN Switching and Wireless Chapter 5
Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of redundancy in a converged
More informationIP over ATM. IP over ATM. Agenda. IP over ATM : Solving the Problem I.
IP over ATM IP over ATM Classical IP over ATM, MARS, MCS, NHRP, LANE, MPOA ATM is connection-oriented Assumes connection-oriented applications IP is connection-less Assumes connection-less network Significant
More informationUnderstanding VLANs. Existing Shared LAN Configurations CHAPTER
CHAPTER 1 Understanding VLANs This chapter provides an introduction to VLANs and switched internetworking, compares traditional shared LAN configurations with switched LAN configurations, and discusses
More informationChapter 4 Configuring Switching
Chapter 4 Configuring Switching Using the Switching Tab The navigation tabs on the top of the home page include a Switching tab that lets you manage your GS108T Gigabit Smart Switch using features under
More informationVLAN - SP6510P8 2013/4. Copyright 2011 Micronet Communications, INC
VLAN - SP6510P8 2013/4 www.micronet.info Copyright 2011 Micronet Communications, INC Agenda VLAN Protocol VLAN Voice VLAN www.micronet.info 2 Micronet Communications Inc. Benefit Bandwidth Preservation
More informationFor information about configuring these settings from Cluster Management Suite (CMS), refer to the online help.
Configuring VLANs This chapter provides information about configuring virtual LANs (VLANs). It includes command-line interface (CLI) procedures for using commands that have been specifically created or
More informationTechnical Specification MEF 1. Ethernet Services Model, Phase November 2003
Technical Specification Ethernet Services Model, Phase 1 10 November 2003 Disclaimer The information in this publication is freely available for reproduction and use by any recipient and is believed to
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationLANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed.
LAN interconnecting devices INTRODUCTION LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed. Connecting devices
More informationToken Ring VLANs and Related Protocols
CHAPTER 4 Token Ring VLANs and Related Protocols A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end stations might
More informationConfiguring VTP. Understanding How VTP Works CHAPTER
CHAPTER 13 This chapter describes how to configure the VLAN Trunking Protocol (VTP) on the Cisco 7600 series routers. For complete syntax and usage information for the commands used in this chapter, refer
More informationARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address
ARP, IP Chong-Kwon Kim Routing Within a LAN MAC Address Each station (or network interface) should be uniquely identified Use 6 byte long address Broadcast & Filter Broadcast medium Signals are transmitted
More informationCiscoFusion. (C) 1997 Networking Hardware Division raj 01/09/97. CiscoFusion maintains routers in the network path
CiscoFusion CiscoFusion maintains routers in the network path Current collapsed backbone networks CiscoFusion Network of the future ATM Switch The New Wiring Closet Today's Wiring Closet Multilayer Switch
More informationAdaptation Problems and Solutions. MARCOM 97, Dipl.-Ing. Kai-Oliver Detken, BIBA Bremen, Germany, October the 16th, 1997
IP-over over-atm: Migrations, Adaptation Problems and Solutions MARCOM 97, Dipl.-Ing. Kai-Oliver Detken, BIBA Bremen, Germany, October the 16th, 1997 Content Introduction of the European ACTS project EIES
More information