0% found this document useful (0 votes)
2 views

CSET 207 Lab Assignment 3 VLAN

The document outlines the course details for COMPUTER NETWORKS (CSET207) at the School of Computer Science Engineering and Technology, including objectives related to VLANs and VTP. It describes VLAN configurations, VTP modes, and tasks for implementing network topologies using Packet Tracer. Additionally, it provides guidelines for assignment submission and emphasizes the importance of verification by the instructor.

Uploaded by

sureshpranav2005
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

CSET 207 Lab Assignment 3 VLAN

The document outlines the course details for COMPUTER NETWORKS (CSET207) at the School of Computer Science Engineering and Technology, including objectives related to VLANs and VTP. It describes VLAN configurations, VTP modes, and tasks for implementing network topologies using Packet Tracer. Additionally, it provides guidelines for assignment submission and emphasizes the importance of verification by the instructor.

Uploaded by

sureshpranav2005
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

School of Computer Science Engineering and Technology

Course-B. Tech Type- Core


Course Code- CSET207 Course Name- COMPUTER NETWORKS

Year- 2024 Semester- Even


Date- 13/01/2025 Batch- 2023-2027

CO-Mapping
CO1 CO2 CO3
Q1 √
Q2 √
Q3 √
Q4 √ √
Q5 √
Q6 √

Objective - Enterprise Switching: Understanding Virtual LAN (VLAN). VLAN Trunking


Protocol (VTP), VLAN Tagging, Dynamic Trunking Protocol (DTP), Spanning Tree Protocol
(STP), Router on the Stick (VLAN Routing).

A VLAN is a group of end stations in a switched network that is logically segmented by function or application,
without regard to the physical locations of the users. VLANs have the same attributes as physical LANs, but you
can group end stations even if they are not physically located on the same LAN segment.
Any switch port can belong to a VLAN, and unicast, broadcast, and multicast packets are forwarded and flooded
only to end stations in that VLAN. Each VLAN is considered as a logical network, and packets destined for
stations that do not belong to the VLAN must be forwarded through a router. The following figure shows VLANs
as logical networks. The stations in the engineering department are assigned to one VLAN, the stations in the
marketing department are assigned to another VLAN, and the stations in the accounting department are assigned
to another VLAN.
School of Computer Science Engineering and Technology

The table describes the VLAN ranges.

1 Normal Cisco default. You can use this VLAN, but you cannot modify or delete
it.

2—1005 Normal You can create, use, modify, and delete these VLANs.

1006—3967 and Extended You can create, name, and use these VLANs. You cannot change the
4048—4093 following parameters:
 The state is always active.
 The VLAN is always enabled. You cannot shut down these
VLANs.

3968-4047 and Internally These 80 VLANs and VLAN 4094 are allocated for internal device use.
4094 allocated You cannot create, delete, or modify any VLANs within the block
reserved for internal use.

3968-4094 Internally Beginning with Cisco release 5.2(1) for Cisco Nexus 7000 Series
allocated devices, VLANs 3968 to 4094 are reserved for internal use in each
VDC by default.
You can change the reserved VLANs to any other 128 contiguous
VLAN range. When you reserve such a range, it frees up the range of
VLANs that were allocated for internal use by default, and all of those
VLANs are available for user configuration except for VLAN 4094. All
VDCs inherit the new reserved range of VLANs.

The VLAN Trunking Protocol (VTP) is used to create, manage, and maintain a large network with many
interconnected switches. The VLAN Trunking Protocol (VTP) can manage the addition, deletion, and renaming
of VLANs from a central point without manual intervention and VLAN Trunk Protocol (VTP) thus reduces
network administration in a switched network.
School of Computer Science Engineering and Technology

Task 1: Implement the following topology in Packet Tracer.

**Addressing to be followed, as per the diagram

Task 2: Privilege and Global Configuration Modes.


Privileged mode allows users to view the system configuration, restart the system, and enter router configuration
mode. Privileged mode also allows all the commands that are available in user mode. Privileged mode can be
identified by the # prompt following the router name. From the user mode, a user can change to Privileged mode,
by running the "enable" command.
Router>enable
Router#
Global Configuration mode mode allows users to modify the running system configuration. From the Privileged
mode a user can move to configuration mode by running the "configure terminal" command from privileged
mode. To exit configuration mode, the user can enter "end" command or press Ctrl-Z key combination.
Router# Configure Terminal
Router(Config)#

Task 3: Setting up VTP Mode and Domain.


VTP Modes
You can configure a switch to operate in any one of these VTP modes:
 Server: In VTP server mode, you can create, modify, and delete VLANs and specify other configuration
parameters, such as VTP version and VTP pruning, for the entire VTP domain. VTP servers advertise
their VLAN configuration to other switches in the same VTP domain and synchronize their VLAN
configuration with other switches based on advertisements received over trunk links. VTP server is the
default mode.
 Client: VTP clients behave the same way as VTP servers, but you cannot create, change, or delete
VLANs on a VTP client.
 Transparent: VTP transparent switches do not participate in VTP. A VTP transparent switch does not
advertise its VLAN configuration and does not synchronize its VLAN configuration based on received
advertisements, but transparent switches do forward VTP advertisements that they receive out their
School of Computer Science Engineering and Technology
trunk ports in VTP Version 2.

A VTP domain is a set of trunked switches with the matching VTP settings (the domain name, password and VTP
version). All switches inside the same VTP domain share their VLAN information with each other.

Task 4: VLAN Tagging with Dynamic Trunking Protocol (DTP).

Dynamic Trunking Protocol is used for negotiating a trunk link between two switches as well as the
encapsulation type of either 802.1q or ISL.
The different options available while configuring a switch interface:-
Access: This mode puts the switch interface into permanent non-trunking mode regardless of whether the
neighbouring interface is a trunk port or trying to become a trunk port that is why it is known as DTP mode
OFF. The port is a dedicated layer 2 access port.
Trunk: It puts the interface into trunking mode. The interface will become a trunk interface even if the
neighbouring ports are trunk or not that is why it is called DTP mode ON.
Dynamic Auto: This is a default mode on the older CISCO switches. This mode makes the interface able to
convert to a trunk link. The interface will become a trunk link if the neighbouring interface is set to trunk or
desirable mode. If both switches interface mode is auto, then the trunk will not be formed.
Dynamic Desirable: The interface will actively attempt to convert the link into a trunk link. The interface will
become a trunk port if the neighbouring interface is set to trunk, desirable or auto.
Nonegotiate: This mode prevents the interface from generating DTP frames. This command is used only when
the switch port mode is access or trunk. You must manually configure the neighbouring interface as a trunk
interface to establish a trunk link.
**The following table must be consulted for setting up switchport modes.

Task 5: Setup and Configure VLAN.


School of Computer Science Engineering and Technology
Task 6: Inter-VLAN Routing.
VLAN traffic between switches we must use a trunk. A trunk connection is simply said nothing more but a normal
link, but it can pass traffic from different VLANs and has a method to separate traffic between VLANs. By using
trunks, we can make sure all VLAN traffic can be sent between the switches. Because our regular Ethernet frames
don’t have anything to show to which VLAN they belong we will need another protocol.
There are two trunking protocols:

 802.1Q: This is the most common trunking protocol. It’s a standard and supported by many vendors.
 ISL: This is the Cisco trunking protocol. Not all switches support it.

Submission Guidelines:
a) The assignment must be verified by the instructor during the lab (Submission on LMS will only
be considered once the working topology on Packet Tracer is verified). Submit the .cpt file along
with the details in word/pdf in zipped format on LMS within 2 days.
b) Zipped file must be saved as per the format RollNo_Lab# (Example: E24CSE632_Lab1).
c) Write name and enrolment number inside the assignment file. Without it, your submission won’t
be considered for evaluation.
d) Provide labels for IP addresses, cabling and devices.
e) Submit the assignment in your respective batch’s submission link in LMS. Submission in other
batch’s submission portal will not be checked.
f) Late submission will lead to penalty.
g) Plagiarism will lead to negative grading.

You might also like