A Seminar Report On VLAN TRUNKING PROTOC PDF
A Seminar Report On VLAN TRUNKING PROTOC PDF
A Seminar Report On VLAN TRUNKING PROTOC PDF
Seminar Report On
Submitted By
Sushant Rawool - 111P010
Mital Waghela - 111P021
Affiliated to
University of Mumbai
Rizvi College of Engineering
Department of Computer Engineering
New Rizvi Educational Complex, Off-Carter Road,
Bandra(w), Mumbai - 400050
CERTIFICATE
This is certify that
Sushant Rawool
Mital Waghela
of Third Year Computer Engineering have completed the seminar work entitled “VLAN Trunk-
ing Protocol” under my supervision at Rizvi College of Engineering, Mumbai under the University of
Mumbai.
Date:
Acknowledgements
I am profoundly grateful to Prof. Shiburaj Pappu for his expert guidance and continuous encourage-
ment throughout to see that this report rights its target since its commencement to its completion.
I would like to express deepest appreciation towards Dr. Varsha Shah, Principal RCOE, Mumbai and
Prof. Dinesh B. Deore HOD Computer Department whose invaluable guidance supported me in com-
pleting this report.
At last I must express my sincere heartfelt gratitude to all the staff members of Computer Engineering
Department who helped me directly or indirectly during this course of work.
Sushant Rawool
Mital Waghela
ABSTRACT
In computer networking, a single layer-2 network may be partitioned to create multiple distinct broad-
cast domains, which are mutually isolated so that packets can only pass between them via one or more
routers; such a domain is referred to as a virtual local area network, virtual LAN or VLAN. This is
usually achieved on switch or router devices. Simpler devices only support partitioning on a port level
(if at all), so sharing VLANs across devices requires running dedicated cabling for each VLAN. More
sophisticated devices can mark packets through tagging, so that a single interconnect (trunk) may be
used to transport data for various VLANs. When you configure a new VLAN on one VTP server, the
VLAN is distributed through all switches in the domain. This reduces the need to configure the same
VLAN everywhere. VTP is a Cisco-proprietary protocol that is available on most of the Cisco Catalyst
series products.
I NDEX
1 Introduction 1
1.1 What is VLAN? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 What is trunk? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Need of VTP: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2 Trunking Protocol 3
2.1 ISL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.2 IEEE 802.1Q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3 VTP Modes 5
3.1 SEVER: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.2 CLIENT: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.3 TRANSPARENT: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
4 VTP Messages 7
4.1 CRN number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.2 VTP Advertisements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.2.1 Summary advertisements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.2.2 Subset advertisements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.2.3 Advertisement requests from clients . . . . . . . . . . . . . . . . . . . . . . . . 8
4.3 VTP Prunning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
References 10
APPENDICES 10
A Project Hosting 11
List of Figures
Chapter 1
Introduction
A trunk link is not assigned to a specific VLAN. Instead, one, many, or all active VLANs can be
transported between switches using a single physical trunk link. Connecting two switches with separate
physical links for each VLAN is possible. Cisco supports trunking on both Fast Ethernet and Gigabit
Ethernet switch links, as well as aggregated Fast and Gigabit EtherChannel links.
The role of VTP is to maintain VLAN configuration consistency across a common network adminis-
tration domain (VTP domain). To maintain consistency, we must configure the VLANs in one switch,
and set it up as a VTP server. The other switches act as VTP clients to receive VLANs information.
Some switches can be transparent and they only forward VLAN information, but they will not join any
VLAN in the domain.
Chapter 2
Trunking Protocol
Because a trunk link can be used to transport many VLANs, a switch must identify frames withtheir
VLANs as they are sent and received over a trunk link. Frame identification, or tagging,assigns a unique
user-defined ID to each frame transported on a trunk link. This ID can bethought of as the VLAN num-
ber or VLAN color, as if each VLAN was drawn on a networkdiagram in a unique color.VLAN frame
identification was developed for switched networks. As each frame is transmittedover a trunk link, a
unique identifier is placed in the frame header. As each switch along the wayreceives these frames, the
identifier is examined to determine to which VLAN the framesbelong.
If frames must be transported out another trunk link, the VLAN identifier is retained inthe frame
header. Otherwise if frames are destined out an access link, the switch removesthe VLAN identifier
before transmitting the frames to the end station. Therefore, all traces ofVLAN association are hidden
from the end station. VLAN identification can be performed using several methods. Each uses a different
frameidentifier mechanism, and some are suited for specific network media. These methods aredescribed
in the sections that follow.
2.1 ISL
The Inter-Switch Link (ISL) protocol is a Cisco proprietary method for preserving the source VLAN
identification of frames passing over a trunk link. ISL performs frame identification in Layer 2 by en-
capsulating each frame between a header and trailer. Any Cisco switch or routerdevice configured for
ISL can process and understand the ISL VLAN information.
When a frame is destined out a trunk link to another switch or router, ISL adds a 26-byte headerand
a 4-byte trailer to the frame. The source VLAN is identified with a 10-bit VLAN ID in theheader. The
trailer contains a cyclic redundancy check(CRC) to assure the data integrity of thenew encapsulated
frame. Figure 4-4 shows how Ethernet frames are encapsulated andforwarded out a trunk link. Because
tagging information is added at the beginning and end ofeach frame, ISL is sometimes referred to as
double tagging.
If a frame is destined for an access link, the ISL encapsulation (both header and trailer) isremoved
before transmission. This removal preserves ISL information only for trunk linksanddevices that can
understand the protocol.
Chapter 3
VTP Modes
Switches can operate in one of three VTP modes: server, transparent, or client.
Its is an optional feature. It is used to handle huge organization. It does two functions:
1. Centralized VLAN management capability such as : Creation,Deletion and Modification
2. Controls flow of VLAN on trunk.
In vtp we put every switch in any of vtp domain and make all the switches as client and only 2
or 3 switches as server so whatever changes we do on server, will automatically goes on all the client
switches.
3.1 SEVER:
VTP servers have full control over VLAN creation and modification for their domains. All VTP infor-
mation is advertised to other switches in the domain, while all received VTP information is synchronized
with the other switches. By default, a switch is in VTP server mode. Note that each VTP domain must
have at least one server so that VLANs can be created, modified, or deleted, and so that VLAN informa-
tion can be propagated.
3.2 CLIENT:
VTP clients do not allow the administrator to create, change, or delete any VLANs. Instead, they listen to
VTP advertisements from other switches and modify their VLAN configurations accordingly. In effect,
this is a passive listening mode. Received VTP information is forwarded out trunk links to neighboring
switches in the domain.
3.3 TRANSPARENT:
VTP transparent switches do not participate in VTP. While in transparent mode, a switch does not
advertise its own VLAN configuration, and a switch does not synchronize its VLAN database with
received advertisements. It is used for private use of network. transparent mode does nt accept the
advertise of server or client mode.
Chapter 4
VTP Messages
Each switch participating in VTP advertises VLANs, revision numbers, and VLAN parameterson its
trunk ports to notify other switches in the management domain. VTP advertisements aresent as multicast
frames. The switch intercepts frames sent to the VTP multicast address andprocesses them with its
supervisory processor. VTP frames are forwarded out trunk links as aspecial case. Because all switches
in a management domain learn of new VLAN configuration changes, aVLAN need only be created and
configured on just one VTP server switch in the domain.
The VTP advertisement process starts with configuration revision number 0 (zero). Whensubsequent
changes are made, the revision number is incremented before advertisements aresent out. When listening
switches receive an advertisement with a greater revision number thanis locally stored. If advertisement
is lower revision number thanis locally stored then switch discards the frame. TheVTP revision number
is stored in NVRAM.
If the VTP revision number is not reset to zero, a new server switch might advertise VLANs asnon-
existent or deleted. If the advertised revision number happens to be greater than previous legitimate
advertisements, listening switches would overwrite good VLAN database entrieswith null or deleted
VLAN status information. This is referred to as a VTP synchronizationproblem. Advertisements can
originate as requests from client-mode switches that want to learn aboutthe VTP database at boot-up
time. As well, advertisements can originate fromserver-mode switches as VLAN configuration changes
occur. VTP advertisements can occur in three forms:
advertisements are followed by one or more subset advertisements, with more specific VLAN configu-
ration data.
When forwarding frames out all ports in a broadcast domain or VLAN, trunk ports are included.
By default, a trunk link transports traffic from all VLANs, unless specific VLANs are removed from
the trunk with the clear trunk command. Generally, in a network with several switches, trunk links are
enabled between switches and VTP is used to manage the propagation of VLAN information. This sce-
nario causes the trunk links between switches to carry traffic from all VLANsnot just from the specific
VLANs created.
VTP pruning makes more efficient use of trunk bandwidth by reducing unnecessary flooded traffic.
Broadcast and unknown unicast frames on a VLAN are forwarded over a trunk link only if the switch
on the receiving end of the trunk has ports in that VLAN. VTP pruning occurs as an extension to VTP
version 1, using an additional VTP message type. When a Catalyst switch has a port associated with a
VLAN, the switch sends an advertisement to its neighbor switches that it has active ports on that VLAN.
The neighbors keep this information, enabling them to decide if flooded traffic from a VLAN should use
a trunk port or not.
Chapter 5
Much work has gone into improving the usability of VTP version 3 in three major areas:
The new version of VTP offers better administrative control over which device is allowed to update
other devices view of the VLAN topology. The chance of unintended and disruptive changes is sig-
nificantly reduced, and availability is increased. The reduced risk of unintended changes will ease the
change process and help speed deployment.
Functionality for the VLAN environment has been significantly expanded. Two enhancements are
most beneficial for todays networks:
In addition to supporting the earlier ISL VLAN range from 1 to 1001, the new version supports the
whole IEEE 802.1Q VLAN range up to 4095.
In addition to supporting the concept of normal VLANs, VTP version 3 can transfer information re-
garding Private VLAN (PVLAN) structures.
The third area of major improvement is support for databases other than VLAN (for example, MST).
5.2 Conclusion
It is very good for big organisation, since it allows multiple VLANs on a single link i.e trunk. VLAN
Trunking Protocol manages big netwrok by creating VTP modes which helps in creating VLANs without
going on all the switches again and again. it gives ease of management,flexibility,security etc. The data
is not lost even if device goes down since its server mode saves all the data in flash memory.
References
[1] Business Computing and Global Informatization (BCGIN), 2012 Second International Conference
on
[2] Network of the Future (NOF), 2012 Third International Conference on the
[3] Parallel and Distributed Systems, IEEE Transactions on (Volume:22 , Issue: 2 )
[4] http://en.wikipedia.org/wiki
Appendix A
Project Hosting
The report is shared at Academia.edu. The complete report about the seminar is uploaded here for future
reference.
QR CODE: