Overview, Vlan introduction, Overview -1 vlan introduction -1 – Avaya P580 User Manual
Page 131
Avaya P550R, P580, P880, and P882 Multiservice Switch User Guide, Version v5.3.1
4-1
4
Using VLANs, Spanning Tree,
Hunt Groups, and VTP Snooping
Overview
The following information and procedures are provided in this
chapter and pertain to layer 2 and layer 3 module configurations:
■
■
Creating and Implementing VLANs
■
Spanning Tree Protocol Setup and Monitoring
■
Using Hunt Groups to Aggregate Bandwidth between Switches
■
Configuring VLAN Trunk Protocol (VTP) Snooping
VLAN Introduction
This section introduces Virtual Local Area Networks (VLANs),
explains how they operate, and provides procedures for creating
VLAN’s.
Need for VLANs
If a traditional bridge receives a frame with a broadcast, multicast, or
unknown destination address, it forwards the data to all bridge ports
except the port on which it was received. This process is referred to
as bridge flooding. As networks grow and the amount and types of
traffic increase, bridge flooding may create unnecessary traffic
problems that can clog the Local Area Networks (LAN).
To help control the flow of traffic through a switch and meet the
demands of growing networks, vendors have responded by using:
■
Customized packet filtering to control which packets are
forwarded.
■
More routers as broadcast firewalls to divide the network into
broadcast domains.
■
Spanning Tree Protocol to control the flow of traffic among
LANs (for redundant links).