1 00:00:01,060 --> 00:00:09,010 So before talking about violence, I think it's better to give a brief summary of lands in general. 2 00:00:10,120 --> 00:00:13,520 So Len is a local area network. 3 00:00:14,020 --> 00:00:20,980 It's a group of computers and associated devices that share a common communications line or wireless 4 00:00:20,980 --> 00:00:29,500 link to a server, typically a LAN encompasses computers within a distinct geographic area, such as 5 00:00:29,500 --> 00:00:32,200 an office or a commercial establishment. 6 00:00:33,100 --> 00:00:39,910 Computers and other mobile devices use a land connection to share resources such as a printer or even 7 00:00:39,910 --> 00:00:40,960 network storage. 8 00:00:42,730 --> 00:00:51,460 A virtual local area network, Virtual Land, or Vladi, is a group of hosts with a common set of requirements 9 00:00:51,460 --> 00:00:57,370 which communicate as if they were attached to the same broadcast domain regardless of their physical 10 00:00:57,370 --> 00:00:57,930 location. 11 00:00:58,660 --> 00:01:07,050 So a villain has the same attributes as a physical local area network or LAN, but it allows for end 12 00:01:07,060 --> 00:01:12,280 stations to be grouped together, even if not on the same network switch. 13 00:01:12,520 --> 00:01:12,890 Right. 14 00:01:13,890 --> 00:01:20,580 VLAN membership can be configured through software instead of physically relocating devices or connections. 15 00:01:22,410 --> 00:01:28,980 Vlad is an important topic, and it should be included in this course, but why did I put it in this 16 00:01:28,980 --> 00:01:30,690 section, the datalink layer? 17 00:01:31,700 --> 00:01:38,840 Yes, because the land is partitioned and isolated in a computer network at the datalink layer. 18 00:01:39,110 --> 00:01:39,770 Very good. 19 00:01:40,190 --> 00:01:41,060 Let's get into that. 20 00:01:42,410 --> 00:01:50,330 In this context, Virtual refers to a physical object recreated and altered by additional logic. 21 00:01:51,230 --> 00:01:59,030 Villans work by applying tags to network packets and handling these tags in networking systems, creating 22 00:01:59,030 --> 00:02:06,410 the appearance and functionality of network traffic that is physically on a single network, but act 23 00:02:06,410 --> 00:02:10,100 as if it is split between separate networks. 24 00:02:12,400 --> 00:02:16,810 So let's let's run down some of the primary benefits of using violence. 25 00:02:18,710 --> 00:02:20,330 So security at the top. 26 00:02:21,210 --> 00:02:27,270 Groups that have sensitive data are separated from the rest of the network, separating systems that 27 00:02:27,270 --> 00:02:32,730 have sensitive data from the rest of the network decreases the chances that people will gain access 28 00:02:32,730 --> 00:02:36,090 to the information that they're not authorized to see. 29 00:02:37,190 --> 00:02:43,700 Cost reduction, cost savings result from less need for expensive network upgrades and more efficient 30 00:02:43,700 --> 00:02:46,010 use of existing bandwidth and uplinks. 31 00:02:47,090 --> 00:02:54,680 Higher performance, careful monitoring of network use allows a network administrator to create villains 32 00:02:54,680 --> 00:03:01,130 that reduce the number of router jobs and increase the apparent bandwidth for network users. 33 00:03:02,250 --> 00:03:09,300 Broadcast storm mitigation, so dividing a network into villains reduces the number of devices that 34 00:03:09,300 --> 00:03:15,900 may participate in a broadcast storm, since a principle element of a villain is the fact that it does 35 00:03:15,900 --> 00:03:23,070 not pass broadcast traffic to nodes that are not part of the VLAN, it automatically reduces broadcasts. 36 00:03:24,470 --> 00:03:26,450 Improved it staff efficiency. 37 00:03:27,290 --> 00:03:29,870 That's right, villans make it easier to manage the network. 38 00:03:31,490 --> 00:03:37,490 When you provision a new switch, all the policies and procedures already configured for the particular 39 00:03:37,490 --> 00:03:40,520 VLAN are implemented when the ports are assigned. 40 00:03:42,870 --> 00:03:50,130 Simpler company management companies may want VLAN set out for departments that are heavy network users 41 00:03:50,130 --> 00:03:58,140 such as multimedia or engineering or VLAN across departments that is dedicated to specific types of 42 00:03:58,140 --> 00:04:01,470 employees, such as managers or salespeople.