Computer Network Tutorial

Introduction of Computer Network Types of Computer Network Network Topology Computer Networking Architecture Transmission Modes (Data Flow) Basic Networking Devices Integrate Services Digital Network (ISDN)

Model

OSI Model TCP/IP Model

Physical Layer

Digital Transmission Analog Transmission Transmission Media Switching

Data Link Layer

Error detection and Error correction Data Link Control Multiple Access Aloha

Network Layer

Network Layer - Logical Address Address Mapping Unicast Routing Protocol

Transport Layer

Process to Process Delivery User Datagram Protocol Transmission Control Protocol Stream Control Transmission Protocol Session Layer and Presentation Layer

Application Layer

Domain Name System Application Protocol E-mail Cryptography

Misc

Classes of Routing Protocols Classification of Routing Algorithms Controlled Access Protocols in Computer Networks Differences between IPv4 and IPv6 Fixed and Flooding Routing Algorithms Advantages and Disadvantages of Fibre Optics Cable APIPA Difference between Active and Passive FTP Fiber Optics and its Types Method of Joining and Fusion of Fiber Optic Cable Define Framing in Computer Network Disadvantages of Computer Network Mesh Topology Diagram in Computer Network Ring Topology in Computer Network Star Topology in Computer Networks 4G Mobile Communication Technology Advantages and Disadvantages of LAN Advantages and Disadvantages of MAN Advantages and Disadvantages of WAN Application Layer in OSI Model Cyclic Redundancy Check Example Data link layer in OSI model Difference between Transport and Network Layer Hamming Code Example Network Layer in OSI Model Session Layer in OSI Model Transport Layer in OSI Model Two Port Network in Computer Networks Uses of Computer Networks What is Computer Network What is Framing in a Computer Network Advantages and Disadvantages of Bus Topology Difference between Star Topology and Bus Topology Subnetting in Computer Network Subnetting Questions and Answers What is Bus Topology What is Network Topology and Types in Computer Networks Access Control in Networking Basic Characteristics of Computer Network Benefits of SOCKS5 Proxy in Computer Networks Computer Network viva Questions Difference between BOOTP and RARP Difference Between Network Topologies and Network Protocols Difference between NFC and RFID Difference Between Point-to-Point Link and star Topology Network Differences Between MSS and MTU Differences Between Trunk Port and Access Port Different Modes of Communication in Computer Networks MIME Protocol in Computer Networks Modes of Communication in Computer Networks Network Attack in Computer Network Port Address in Networking Simplest Protocol in Computer Network Sliding Window Protocol in Computer Network Stop And Wait Protocol in Computer Networks TCP 3-Way Handshake Process in Computer Networks What is a Proxy Server What is APPN What is ICMP Protocol What is Point-to-Point Protocol What is Port Address in Networking What is the HDLC Protocol What is VRRP Protocol Difference Between Analog and Digital Signals Difference Between Hub and Repeater Difference between Repeater and Switch Difference Between Transparent Bridge and Source Routing Bridge Source Routing Bridge in Computer Networks Transparent Bridge in Computer Networks Transport Protocol in Computer Networks Types of CSMA in Computer Networks What is Wired and Wireless Networking Network Security in Computer Network Disadvantages of Extranet Difference Between TELNET and FTP Define Protocol in Computer Networks Guided Transmission Media in Computer Network What is a Gateway in a Computer Network IGMP in Computer Networks LAN Protocols in Computer Networks MAN Meaning in Computer Modulation Techniques in Computer Networks Switching in DCN TCP/IP Applications What is IGMP? What is Modem in Networking What is Non-Persistent CSMA Difference between Cell Splitting and Cell Sectoring Forouzen Computer Network Open Loop and Closed Loop Congestion Control Types of Cluster Computing WAP-Wireless Access Point What are the elements of the Transport Protocol Difference between Gateway and Switch Flow Control in Data Link Layer Body Area Network Flooding in Computer Network Token Ring in Computer Networks VoIP in Computer Networks What is Infrared Transmission Congestion Control Techniques Forward Error Correction (FEC) Switching Techniques What is Telnet in Computer Network What are the Types of IPv4 Addresses IEEE 802.6 (DQDB) IEEE 802.15.4 Technology What is HDLC (High-level Data Link Control)? What is SMS Hubbing in Telecom? Circuit Switching in Computer Networks Communication Satellites in Computer Networks Features of HTTP Protocol IMAP4 (Internet Message Access Protocol) Internet Services How to Set up a Wireless Router Internetwork Routing in Computer Networks Distributed Computing System Features of GSM The 802.11 MAC Sublayer Protocol What is IEEE 802.3? What are Hubs and Switches in Computer Networks? What is Modem in a Computer Network? What is multicasting in Computer Networks? GSM -The Mobile Station What is Network Server? Slotted Aloha in Computer Network What is Ethernet in Computer Networks What is Arpanet? Radio Access Network (RAN) TCP 3-Way Handshake Process PING SWEEP (ICMP SWEEP) Print Server Private IP Address Security Services in Computer Networks Protocol Data Unit (PDU) CSMA with Collision Avoidance (CSMA/CA) What is Gateway in Computer Network? Advantages of Networking Data Link Layer Design Issues DHCP in Computer Networks Internet Security Association and Key Management Protocol (ISAKMP) What is Switch Hub? Telnet Full form in Networking Multimedia Systems Quality of Service in Computer Networks What is Carrier Sense Multiple Access (CSMA)? What is Circuit Switching What is Duplex Network? What is Web Protocol Network LAN Technologies Classes in Computer Network Low-Density Parity Check (LDPC) Wireless Internet Service Providers(Wisps) What is Handshaking?

Differences Between Trunk Port and Access Port

This article will help you in providing a detailed comparison between Trunk Port and Access port. Before comparing trunk and access port let us understand what they are.

What is a Trunk port?

In computer networking, a trunk port is a type of port that is used to carry traffic between network switches. Specifically, a trunk port is a port that can carry multiple VLANs (virtual LANs) simultaneously, as opposed to an access port that carries traffic for only one VLAN.

When two switches are connected, they exchange information about the VLANs that they have configured. The trunk port on each switch is responsible for carrying traffic for all of the VLANs between the switches. This allows the switches to communicate with each other and enables devices on different VLANs to communicate with each other.

For a port to be designated as a trunk port, it must be configured to use a trunking protocol, such as IEEE 802.1Q. This protocol adds a special header to Ethernet frames, which indicates the VLAN to which the frame belongs. When a frame is received on a trunk port, the switch reads the VLAN ID from the header and forwards the frame to the appropriate VLAN.

Differences Between Trunk Port and Access Port

Trunk ports are commonly used in enterprise networks to segment traffic and improve network performance. By separating traffic into different VLANs, network administrators can reduce network congestion and improve the overall efficiency of the network. Trunk ports are also used in virtualization environments, where they allow virtual machines running on different hosts to communicate with each other as if they were on the same physical network segment.

What is Access Port?

Top of FormIn computer networking, an access port is a type of port on a switch that is used to connect end devices, such as computers, printers, or servers. An access port is designed to carry traffic for only one VLAN (virtual LAN) at a time, unlike a trunk port, which can carry traffic for multiple VLANs.

When a device is connected to an access port, it is automatically assigned to the VLAN that is configured on the access port. This allows network administrators to control which devices can communicate with each other on the network. Access ports are typically used to connect end devices to the network, while trunk ports are used to connect switches and carry traffic for multiple VLANs.

Access ports are usually configured with a specific VLAN ID, which determines which VLAN the port belongs to. When a device sends traffic on an access port, the switch adds the VLAN ID to the Ethernet frame, and forwards the traffic to other devices on the same VLAN. If the device sends traffic to a device on a different VLAN, the switch blocks the traffic from reaching the other VLANs.

Differences Between Trunk Port and Access Port

In addition to separating network traffic, access ports are also used to provide security and control over the network. By assigning devices to specific VLANs, network administrators can prevent unauthorized access to the network and reduce the risk of security breaches.

Access ports are an important component of network design and are commonly used in both small and large networks. They provide a way to manage network traffic and ensure that devices are connected to the appropriate VLANs, which helps to improve network performance and security.

Differences between Trunk and Access Port

S.NoTrunk PortAccess Port
1.It is Used to connect switches.It is Used to connect end devices, such as computers, printers, or servers.
2.It carries traffic for multiple VLANs simultaneously.It carries traffic for only one VLAN at a time.
3.Trunk Port must be configured with a trunking protocol, such as IEEE 802.1Q.Access Port does not require any special configuration.
4.It allows switches to communicate with each other.It does not allow switches to communicate with each other.
5.It can carry traffic for all VLANs configured on the switch.It can carry traffic for only one VLAN configured on the switch.
6.It can be used to connect switches in different locations or buildings.It typically used to connect end devices within the same location or building.
7.It is used to reduce network congestion and improve performance.It is used to provide security and control over the network.
8.It is used to segment network traffic.It is used to isolate devices and control which devices can communicate with each other.
9.It is used in virtualization environments to enable communication between virtual machines.Access Port is not used in virtualization environments.
10.It allows devices on different VLANs to communicate with each other.It does not allow devices on different VLANs to communicate with each other.
11.It can be used to carry multiple types of traffic, such as voice and data.It typically used to carry only data traffic.
12.Trunk Port must be manually configured with the appropriate VLAN IDs.It automatically assigns devices to the VLAN configured on the port.

These are some of the key differences between trunk ports and access ports. Understanding these differences is important for designing and configuring effective network topologies. So, this is all about the comparison between trunk and access ports. Hope you understood this topic.