Switch vlan division
In the general video surveillance projects that I have been exposed to, the surveillance network is basically independent, with separate wiring and separate switching equipment, so VLAN is rarely involved. Recently I came across a hotel monitoring project. Office, wireless, and monitoring were all in the same physical network. The switches used VLAN to divide different network segments, so I studied VLAN and made some conclusions.
Usually I misunderstand that the main purpose of vlan is not network isolation, but to improve network performance and enhance network security.
What is vlan? (Recommended learning: PHP video tutorial)
vlan (Virtual Local Area Network) is a virtual local area network, which means that the sites in the network are not limited to their physical locations. A network technology that can be flexibly added to different logical subnets as needed.
Virtual LAN based on switched Ethernet In switched Ethernet, VLAN technology can be used to divide the physical network connected by switches into multiple logical subnets. In other words, broadcast packets sent by a station in a VLAN will only be forwarded to stations belonging to the same VLAN. (Improve network performance)
In switched Ethernet, each site can belong to different virtual LANs. The sites that constitute a virtual LAN are not restricted to their physical locations. They can be connected to the same switch or to different switches. Virtual LAN technology makes the network topology very flexible. For example, users on different floors or in different departments can join different virtual LANs as needed. (Enhance network security)
Purpose of vlan
Improve network performance: When the network is large, there will be a lot of broadcast information on the network, which will make the network Performance deteriorates, and broadcast storms may even form, causing network congestion. The transmission of broadcast packets within the entire network can be reduced by dividing many virtual LANs, because broadcast information will not cross VLANs. Broadcasts can be limited to the scope of each virtual network, reducing the broadcast domain and improving network transmission. efficiency, thereby improving network performance.
Enhanced security: Virtual networks cannot communicate directly but must be forwarded through routers, which provides the possibility for advanced security control and enhances network security.
How vlan is divided
Based on the port.
Based on mac address.
Based on ip address.
Based on multicast (used in WAN, not used in LAN).
Based on certain rules.
The most commonly used method of division is to combine ports and IP addresses to divide vlans. Certain ports are a vlan, and an IP address is configured for the vlan. Then the computers in the vlan use this address as Gateway, other vlans cannot be in the same subnet as this vlan.
For more PHP-related technical articles, please visit the PHP Graphic Tutorial column to learn!
The above is the detailed content of Switch vlan division. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics











Broadcom recently announced the launch of the Trident5-X12 chip, which is equipped with a new NetGNT (Network General Neural Network Traffic Analyzer) on-chip neural network inference engine. NetGNT is different from traditional packet processing. It can work in parallel to enhance standard packet processing. pipeline. Traditional pipelines can only process one packet/path at a time, while NetGNT, as a machine learning inference engine, can be trained to identify various traffic patterns across the entire chip. It is understood that the Trident5-X12 chip has powerful software programming functions and on-site upgrade functions, providing a bandwidth of up to 16.0 Terabits/second, which is twice that of Trident4-X9. In addition, the new chip also supports

What is the dis command used in switch inspection? In the maintenance and management process of network equipment, switches are an indispensable part. Inspection of switches is one of the important links to ensure the normal operation of the network. During the inspection process, the dis command is a commonly used command on switches. The purpose and function of the dis command will be introduced in detail below. dis is the abbreviation of display. It is a commonly used command on Huawei switch equipment and is used to display various information of the equipment. The dis command can display the configuration information and operating status of the switch.

The working principle of the switch is based on the second layer of the OSI reference model, the data link layer. A switch is a network device based on a learning process that enables communication between different devices in the network by parsing and forwarding data frames. The switch can continuously improve the contents of its internal forwarding table, improve the efficiency and reliability of data exchange, and ensure the stability and security of the connection. Switches are widely used in enterprise networks, data centers, campus networks and other scenarios to provide stable and efficient connection services for various applications.

The working principle of the switch includes: 1. Data frame reception and analysis; 2. Forwarding table update; 3. Data frame forwarding; 4. Flood processing; 5. Connection maintenance. Detailed introduction: 1. Data frame reception and parsing. When the switch receives a data frame, it will first parse the data frame and extract the source MAC address and destination MAC address and other information; 2. Update of the forwarding table, The switch maintains a forwarding table internally, which records the correspondence between MAC addresses and interfaces; 3. Forwarding of data frames, etc.

The following takes an H3C switch as an example to introduce the three authentication methods of telnet service. Configuration steps for None authentication mode: [H3C] telnetserverenable//Enable Telnet service [H3C] user-interfacevty04//Allow remote users 0-4, a total of 5 accounts at the same time Log in [H3C-line-vty0-4] authentication-modenone//Authentication mode is none, no authentication is required [H3C-line-vty0-4] user-rolelevel-3//Set login user permissions Password authentication mode configuration steps: [ H3C]telne

The main functions of the switch are physical addressing, network topology, error checking, frame sequence and flow control; the switch is a network device used for electro-optical signal forwarding, and also has some new functions such as support for virtual LAN, Support for link aggregation, and some even have firewall functions.

Differences: 1. Different working principles: The switch works at the relay layer and is mainly addressed based on MAC address. The router works at the network layer, addresses according to the IP address, and can handle the TCP/IP protocol; 2. Different functions: the switch can make multiple computers connected to it form a local area network, but it cannot automatically identify the address where the data packet is sent and arrived. The router is responsible for automatically identifying the addresses where data packets are sent and arrived, and can handle the routing of data packets; 3. Different usage scenarios: Routers are usually used for sending and receiving in one place. A switch is used to connect multiple computers.

A switch is a network device used for forwarding electrical (optical) signals. It can provide an exclusive electrical signal path for any two network nodes connected to the switch. The switch is only used to distribute network data. It can connect many hosts, each of which has its own external IP. The switch works at the relay layer, addressing based on MAC address, and cannot provide this function.