Virtual LANs Flashcards

1
Q

How do VLANs function?

A

by logically segmenting the network into different broadcast domains so that packets are only switched between ports that are designed for the same VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the implemeentation of VLANs on a switch.

A
  • the switch maintains a separate bridging table for each VLAN
    -if the frame comes in on a port in VLAN 1, the switch searches the bridging table for VLAN 1
  • when the frame is received, the switch adds the source address to the bridging table if it is unknown.
  • the destination is checked so a forwarding decision can be made.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe how Network Administrators configure VLANs statically and dynamically.

A

Statically: network administratos configure port-by-port. Each port is associated with a specific VLAN. The network administrator is responsible for keying in the mappings between the ports and VLANs.
Dynamically: the ports are able to dynamically work out their VLAN config. Uses a software database of MAC address to VLAN mappings (which the network administrator must first set up)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name any benefits to VLANs

A
  1. they permit the netowrk administrator to organize the LAN logically instead of physically.
  2. Each VLAN is in a separate broadcast domain and traffic between VLANs is routed. This helps limit the broadcast traffic and keep traffic that ir related in the same VLAN.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 types of VLANs.

A
  1. Port-based VLANs
  2. MAC address based VLANs
  3. Layer 3 based VLANs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe how Port-based VLANs work.

A

switch ports are assigned to VLANs (i.e. ports 1-5 -> VLAN 1). Devices in one VLAN only communicate within that VLAN unless routing connects them. It improves traffic management, increases security and simplifies design. It requires a router or layer 3 switch for inter-VLAN communication. 802.1Q is used on trunk ports for identifying VLAN traffic. Packets don’t “leak” into other domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe how MAC address based VLANs work.

A

When VLANs are created, assign devices to VLANs based on their unique MAC address. Devices retain their VLAN no matter which port they are connected to. It offers flexibility, yet adds overhead. It impacts performance, scalability and administation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe how Layer-3 Based VLANs work.

A

It uses IP routing to enable communication between VLANs. Each VLAN is assigned an IP subnet and a layer 3 switch or router handles inter-VLAN routing. Each VLAN is a separate subnet. This enhances scalability, traffic management and reduces broadcast traffic. Enables efficient communication between network segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the number of VLANs in a switch depend on?

A

-> traffic patterns
-> types of application
-> network management needs
-> group commonality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain the purpose of the 802.1Q protocol.

A

Used to support VLAN tagging traffic between LAN switches on Ethernet network. It allows multiple VLANs to coexist on a single physical network link by inserting a VLAN tag into the Ethernet frame header.
This 802.1Q VLAN tag includes:
tag protocol ID (value 0x8100)| tag control info ( each 2 bytes)

the tag control info includes:
user priority (3 bits) | canonical format indicator (1 bit) | VLAN ID (12 bits)

user priority: used by sender to prioritise different types of traffic
canonical traffic: used for compatability between different types of MAC protocols
VLAN ID: specifies the VLAN (1- 4094), 0x000 = frame doesn’t belong to a VLAN, 0xfff = reserved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What mechanism of protocol could be used to ensure that a broadcast storm could not occur? explain the basic operation of this mechanism.

A

The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of STOp is to prevent bridge loops and the broadcast radiation that results from them.

Bridges running STP:
-> participate with other bridges in the election of a single bridge as the root bridge (lowest ID)
-> calculate the distance of the shortest to the root bridge from all other bridges, choosing the port that will provide that shortest path as each bridges’ “Root port”
-> for each LAN segment (a line between two bridges), elect a designated bridge (port with the best route to the rot bridge on a link) and port on that bridge.
-> select the bridge ports to be included in the spanning tree. the ports selected are the root ports and designated ports, these forward traffic (All others clock traffic)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is meant by the term Broadcast storm?

A

a continuous broadcast of frames in looped switches. Never ending that broadcast and switches getting the same message from different ports and continuously updating it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of VLAN is most useful in a shared hot-desk type offic setup where each user plugs their laptop into a docking station as required?

A

The MAC address based VLAN is more suitable as it is more flexible and individual switch port VLAN member is not hardwired and will change based on the device plugged in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly