enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. VLAN Trunking Protocol - Wikipedia

    en.wikipedia.org/wiki/VLAN_Trunking_Protocol

    VLAN Trunking Protocol. VLAN Trunking Protocol ( VTP) is a Cisco proprietary protocol that propagates the definition of Virtual Local Area Networks ( VLAN) on the whole local area network. [ 1] To do this, VTP carries VLAN information to all the switches in a VTP domain. VTP advertisements can be sent over 802.1Q, and ISL trunks.

  3. VLAN - Wikipedia

    en.wikipedia.org/wiki/VLAN

    A virtual local area network ( VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer ( OSI layer 2 ). [ 2][ 3] In this context, virtual refers to a physical object recreated and altered by additional logic, within the local area network. Basically, a VLAN behaves like a virtual switch or ...

  4. Dynamic Trunking Protocol - Wikipedia

    en.wikipedia.org/wiki/Dynamic_Trunking_Protocol

    The Dynamic Trunking Protocol (DTP) is a proprietary link layer protocol developed by Cisco Systems for the purpose of negotiating trunking on a link between two VLAN -aware switches, and for negotiating the type of trunking encapsulation to be used. VLAN trunks formed using DTP may utilize either IEEE 802.1Q or Cisco ISL trunking protocols. [1]

  5. IEEE 802.1Q - Wikipedia

    en.wikipedia.org/wiki/IEEE_802.1Q

    IEEE 802.1Q. IEEE 802.1Q, often referred to as Dot1q, is the networking standard that supports virtual local area networking (VLANs) on an IEEE 802.3 Ethernet network. The standard defines a system of VLAN tagging for Ethernet frames and the accompanying procedures to be used by bridges and switches in handling such frames.

  6. VLAN hopping - Wikipedia

    en.wikipedia.org/wiki/VLAN_hopping

    VLAN hopping is a computer security exploit, a method of attacking networked resources on a virtual LAN (VLAN). The basic concept behind all VLAN hopping attacks is for an attacking host on a VLAN to gain access to traffic on other VLANs that would normally not be accessible. There are two primary methods of VLAN hopping: switch spoofing and ...

  7. Trunking - Wikipedia

    en.wikipedia.org/wiki/Trunking

    Trunking in telecommunication originated in telegraphy, and later in telephone systems where a trunk line is a communications channel between telephone exchanges. Other applications include the trunked radio systems commonly used by police agencies. [1] In the form of link aggregation and VLAN tagging, trunking has been applied in computer ...

  8. Private VLAN - Wikipedia

    en.wikipedia.org/wiki/Private_VLAN

    Private VLAN. Private VLAN, also known as port isolation, is a technique in computer networking where a VLAN contains switch ports that are restricted such that they can only communicate with a given uplink. The restricted ports are called private ports. Each private VLAN typically contains many private ports, and a single uplink.

  9. Router on a stick - Wikipedia

    en.wikipedia.org/wiki/Router_on_a_stick

    Router on a stick. Router R1 is a one-armed router carrying out inter-VLAN routing. A router on a stick, also known as a one-armed router, [ 1][ 2] is a router that has a single physical or logical connection to a network. It is a method of inter- VLAN routing where one router is connected to a switch via a single cable.