Sie sind auf Seite 1von 4

Virtual Local Area Network Technology and Applications

Dr. V. Rajaravivarma
Electronics & Computer Technology Department
Price Hall 118, School of Technology
North Carolina A&T State University
Greensboro, NC 274 11

Abstract - This paper gives the details of logical, rather than a physical, collection of
VLAN technology and explains not only how users. In a router-based network users are
it works, but also explains the different types identified by their physical location in the
of V L A N s and where they should be into a network. This is expressed in a network-
network.Next some real world networks and layer address, which tells the router which
some of the common problems associated with physical segment or ring it must send data to.
those traditional layouts are discussed. Then Users in a physical LAN must therefore be in
we’ll integrate switches into those problem one building or part of a building [ 5 ] . A
networks and examine the effect. VLAN need not be restricted to a floor,
building, or even a city. V L A N s allow very
1. INTRODUCTION large mechanism, simply grouping physical
In almost every industry and every ports together, or they can provide a very
type of application, data is being presented flexible toolkit, combining existing hubs,
through images rather than text. The World routers and FDDI backbones with dedicated
Wide Web, documenting imaging, medical switched ports, ATM backbones, wide area
technology, CAD,video training, and pre- networks, and more.
press editing are just a few of the To understand better this paper gives
applications that are absorbing greater the details of VLAN technology and explains
amounts of bandwidth. It take 8 bytes to not only how it works, but also explains the
transfer the word “airplane”. It takes 80,000 different types of VLANs and where they
bytes to send a picture of an airplane. It should be into a network. The Use of VLAN
takes 8,000,000 bytes to send a simple video technology, LAN switches, and the benefits
sequence of one. Because of that today’s of VLANs are discussed in sections 2, 3, and
corporations routinely buy the fastest 4 respectively. Next in section 5, a real world
computers on the market and want those network problem associated with those
machines to run on the fastest safest network traditional layout are discussed..
possible [ 11-[4]. The network switch was
invented to help networks to achieve these 2. USE OF W A N
precise characteristics. Virtual Local Area
Network (VLAN) technology is one of the VLANs offer significant benefits in
hottest areas of networking, but many people term in terms effeiecient use of banwidth,
understand what a VLAN really is. flexibility, performance and security. VLAN
The LAN switch/ATM switch technology functions by logically segmenting
network allows users to be combined into as the network into different broadcast domains
“virtual LANs,” or “VLANs.” There are two so that packets are only switched between
ways to think about V L A N s . A VLAN is a ports that are designated for the same

49
$10.000 1997 IEEE
0-8186-7873-9/97
VLAN. Thus, by containg traffic originating examine the packet when it is either received
on a particular LAN only to ther LANs or forwared by the switch. Based on the set
within the same VLAN, switched virtual of rules defined by the administrator, these
networks avoid wasting bandwidth, a techniques where the packet is to be sent,
drawback inherent in traditional filtered, and/or broadcast. These control
bridged/switched networs where packets are mechanisms can be centrally administered.
often forwarded to LANs that are to LANs VLAN packet identification (packet tagging)
that do not require them. This approach also is a relatively new approach that has been
improve scalability, particularly in LAN specifically developed for switched
environments that support broadcast and communications. This approach places a
applicationsthat flood packets throughout unique identifier in the header of each packet
the network. as it is forwarded throughout the switech
fabric. The identifier is understood and
3. LAN SWITCHES examined by each switch prior to any
broadcasts or transmissions to other
Switches are one of the core switches, routers, or end-station devices.
components of VLAN communications. When the packet exists the switch fabric, the
They are the entry port for end-station switch removes the identifier before the
devices into the switched fabric and for packet is transmitted to the target station.
communications across the enterprise. The overall benefits of both approaches
Switches provide the intelligence to make allow VLAN architecturesthat are
filtering and forwarding decisions by packet, nonintrusive to end-node applications and
based on VLAN metrics defined by network protocols. Switches provide all the filtering,
managers, and to communicate this identification, and forwarding without any
information to other switches and routers modification to the attached end station
within the network. And while today LAN devices. This delivers a VLAN architecture
switches are installed between shared that easily integrates with existing LAN
segment hubs and routers located within the applicationswhile offering scalability and
backbone, they will take on a larger, more migration t6 ATM networks.
significant role for VLAN segmentation and
low-latency forwarding as they are deployed 4. BENEFITS OF VLAN
in the wiring closet. LAN switches offer
significant increases in performance and Unfortunately, if a device is moved
dedicated bandwidth across the network, from one hub to another, its networkaddress
with the intelligence necessary for VLAN is no longer correct, and someone from the
segmentation. networking group must go to the machine
The most common approaches for and correct it. This isn’t much work if it
logically grouping users into administratively seldom happens, but in a larger network with
defined V L A N s include packet filtering and a high percentage of workstations moving
paket identification. Packet filtering is a every year the process can eat up large
technique that examines particular amounts of time. And until the update is
information about each packet based on completed, thar machine can’t communicate.
user-defined offsets. Paket indentification A good VLAN capability elimiantes this
(tagging) uniquely assigns a user-defined ID problem. A workstation or server remains in
to each packet. Both of these techniques the same VLAN, automatically, no matter

50
where in the network it’s connected. Therefore when a device moves, it
Theoretically, network addresses can automatically remains in the same VLAN.
be assigned in anyway the administrator
chooses. Unfortunately, that is not true in 5. APPLICATION
practice in most networks today. The reason
is the Internet. In order to mesh a private Let us take an example of an enterprise
network with the Internet, it is necessary to network [7] which employed Ethemet and
restrict network numbers to those assigned token ring on individual segements
by the Internet Number Autority. The (sometimes on the same floor) and used 100
explosive growth in the worlwide network Mbps FDDI as its backbone technology.Here
[6] has used up a large percentage of the the shared files were extremely large and low
possible network numbers, so that individual router throughput caused a halt while large
organizations are very restricted in the files were passed. So the company decided
numbers available to them. to upgrade their network. Instead of each
Until the widespread implementaion workstation as a dedicated port on a switch,
of Internet Protocol, VLANs can be helphl they replaced their current routers with
in reducing waste. VLAN makes it possible switeches and reallocate those routers to
to use a limited number of networ addresses other areas of of the network. The most
very effciently. In a hubhouter-based obvious improvement was in intranetwork
network, each segement or ring needs its traffic. Now the data zipped through the
own subnet number, so that the routers can network without slowing down. The switch
move data between them. In a VLAN based automatically performs translation so 16
network, any number of segments or rings Mbps token rings can transmit data to
can be combined into a single VLAN, so Ethernet segments or FFDI rings rapidly and
addresses need not be wasted. effectively. In addition, the switch solution
There are variety of possible ways to seamingly integrated the company’s existing
create VLANs. lOOMbps FDDI ring which allowed the
(1) Port-Based VLANs is the simplest form company to keep its original backbone in
of VLAN. In this model a VLAN is a place.
collection of switch ports, sometimes only a
single switch, soometimes on a number of 6. CONCLUSION
switches.
(2) MAC-Based VLANs by using the MAC VLANs offer significant cost and
source addresses. Here each VLAN is a list performance befits for a majority of the
of MACS. This approach solves some of the LANs installed today. These benefits are
limitations of the Port-Based VLANs. realized as network managers migrate to
(3) Layer Three-Based VLANs allow a switched LAN architectures across the
subnet to spread across a number of ports enterprise. V L A N s are more than simply a
and sometimes allow mgrq thqn one subnet shared hub, routing, switching, or networ
per port. This provides good flexibilty, and is management solution. It is the combination
easier to manage than MAC-based VLANs. of all these components that provides
(4) Policy-Based VLANs are the most powerfhl segmentation and efficient
flexible VLANs. They assign devices to administration across the network.
VLANs using polices, established in network
management, which applies to all switches.

51
7. REFERENCES
1. N. Kavak, “Data Communications in
ATM Networks,” IEEE Network, vo1.9,
no.3, May/June 1995.

2. A. Gupta and D. Ferrari, ‘‘Resource


Partitioning for Real-time Communication,”
IEEE/ACM Trans. On Networking, vol.3,
no.5, Oct. 1995, pp. 501-518.

3. S. Fotedar et al, “ATM Virtual Private


Networks,” Commun. ACM, vol. 38, no.2,
Feb. 1995, pp.101-109.

4. V.J. Friesen et al, ‘’Resource Management


with Virtual Paths in ATM Networks,’’ IEEE
Network, vol. 10, no.5, Sep./Oct.1996,
pp. 10-20

5.G.R.McClain, “Hand Book of Networking


and Connectivity,” AP Professional, Boston,
MA, 1994.

6.J. Gong and P. Srinagesh, “An Economic


Analysis of Network Architecture,” IEEE
Network, vol. 10, no.2, March/April 1996,
pp. 18-21.

7. “The Switching Book,” Xylan


Corporation, Calabasas, CA.

52

Das könnte Ihnen auch gefallen