10 hours 28 minutes

Video Description

This lesson covers virtual local area networks (VLANs). Virtual local area networks are a group of local machines which communicate with each other as if they were in the same domain. VLANs are very effective in that they make for an efficient use of a network.

Video Transcription

All right. So now we've talked about virtualization from a server desktop application perspective. Gonna move on to a new topic. And even though it still is virtual, it's a little bit of a different concept with a virtual land of villian.
What we're gonna do is we're gonna use a switch to segment or toe isolate certain types of traffic on our network.
Now, traditionally, we've done this with a router, but routers are very expensive. And when we talk about expensive a ce faras routers go. I'm not talking about Link Sister Netgear. I'm talking about real routers, grown up routers that you'd actually use in production and one of the things if you go out and buy switch, you get switched with 16 porch, 24 ports,
36 porch and you're getting a lot of ports on the switch.
But if you go out and buy a router, for instance, a CE faras number of land ports, you're gonna get yours, too.
You know, it's not really that, uh, let's say that a switch is really best suited as an internal land device, and routers are really more suited today to connect us out to the wind the wide area network. So what we're gonna do is we're going to create separate little, many networks
in our internal environment
using a switch. Now, I think, really, it's easiest to see this if we do just a little evolution of network devices, just a little quick overview of the various network of devices and how they've evolved. So I'm gonna show you up on the board Hub, switch, router, villain
and layer three switch.
One of the things I'll tell you. For those of you that air Network experts, I'm gonna make some statements that at first you're going to go. But wait,
hold tight. I am actually building for dramatic effect here. So if I make a statement at first that you disagree with wait, because I'm going to build on each device and explain it a little more in depth and a little bit more in depth because I want everybody to have exactly what each device natively does. So
if by the time I finish the discussion,
if you still wanna, um
if you still have some disagreements, that's one thing, but I just don't want you to get, uh, get offended by anything that I might say, That's a generalization. So I'm gonna take just a moment, prepare the board, and then I'll show you some of the evolution of network devices.

Up Next


In our online CompTIA CASP training, you will learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor