Skip to main content
SolarWinds MSP
  • Login
  • Support
  • Partnerships
    • Solution Provider Program
    • Technology Alliance Program
SolarWinds MSP
  • Products
    • Remote Monitoring & Management Protect your customers with a platform from the global leader in monitoring and management.
    • Backup & Recovery Manage backup for servers, workstations, applications, and business documents from one cloud-based dashboard.
    • Mail Protection & Archiving Protect users from email threats and downtime.
    • Password Management Easily adopt and demonstrate best practice password and documentation management workflows.
      • Passportal Demo
    • PSA & Ticketing Manage ticketing, reporting, and billing to increase helpdesk efficiency.
    • Threat Monitoring Detect, respond to, and report on threats across your managed networks.
    • Remote Support Help support customers and their devices with remote support tools designed to be fast and powerful.
  • Solutions

    I'm looking to...

    I'm looking for...

    • Drive Efficiency with Automation
    • Manage my MSP Business More Efficiently
    • Manage my IT Department More Efficiently
    • Layered Security
    • Data-Driven Insights
    • Cross-Platform Support
  • Resources

    Webcasts & Events

    Resource Center

    • Ask the N-Central Experts
    • Daily Live Demos
    • Backup Foundations Training
    • RMM Foundations Training
    • Upcoming Events
    • Upcoming Webcasts
    • Resource Library
      • Case Studies
      • Product Information
      • eBooks
      • White Papers
      • Infographics
    • SolarWinds MSP Free Tools
    • GDPR Resource Center
    • Security Resource Center
    • MSP Institute Webinar Series
    • MSP Advice Project
  • About
    • Contact
    • Worldwide sales and support
    • Careers
    • Awards and Recognition
    • Get A Quote
    • Newsroom
      • Press Releases
      • In The News
      • Media Contacts
    • Leadership Team
    • Legal
      • Cookie Policy
      • Privacy Notice
      • Software Services Agreement
      • Terms of Use
      • Backup Fair Use Policy
    • Security
      • SolarWinds Security Statement
      • Vendor Data Protection Requirements
    • Support
  • Blog
  • Contact Sales
    • Get A Quote
    • General Inquiry
  • TRY NOW
    • SolarWinds RMM
    • SolarWinds Backup
    • MSP Manager
    • SolarWinds Passportal
    • SolarWinds Mail Assure
    • SolarWinds Risk Intelligence
    • SolarWinds Take Control
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • Tips & Advice
    • Training
Home Blog MSP Business Networking Understanding VLAN Trunking
Networking

Understanding VLAN Trunking

By SolarWinds MSP
5 August, 2019

Trunking, a term frequently used in IT and telecommunications, refers to a network configuration that efficiently conveys data between multiple entities without using one-to-one links. Similar to how a tree trunk carries water to every branch and leaf, a network trunk essentially carries multiple streams of signals to the correct locations. For managed services providers (MSPs), trunking in networking will typically relate either to link aggregation or virtual local area network (VLAN) trunking, a practice that is integral to VLAN configuration. IP trunking refers specifically to Voice over Internet Protocol (VoIP) services, which may be relevant to some MSP customers as well. 

What does trunk mean in networking? 

A trunk is a single channel of communication that allows multiple entities at one end to correspond with the correct entity at the other end. It is a “link” that carries many signals at the same time, creating more efficient network access between two nodes. Trunking is perhaps best known in reference to telecommunications, where the method is used to connect switching centers and create multiple-signal links. But trunking is also important in computer networking, where it has two main advantages: 

Link aggregation

Sometimes, trunking refers specifically to port trunking, also known as link aggregation or Ethernet bonding. This is a method of combining individual Ethernet links to act as one logical link, potentially making it possible to overcome certain bandwidth limitations. This allows you to connect several switches with Ethernet ports and allocate traffic among all the ports, relieving switch-switch or switch-to-server congestion. If failover occurs, link aggregration enables faster recovery, as the signals simply use another port while still routing to the correct endpoint. As a result, this simultaneous packet transmission may result in improved performance. The IEEE standard for link aggregation is referred to as 802.1AX. 

VLAN trunking

What is VLAN trunking? To answer this question, it’s important to understand why networks have VLANs. VLANs came into use in part to mitigate some difficulties with switched networks, which replaced hubs. Switches offer enhanced control compared to hubs, including increased throughput, reduced collisions, and more. However, these switched networks have a flat topology that can create some congestion and redundancy issues. VLANs offer a solution. 

A VLAN is a way to provide connectivity for subnets on a network. With a VLAN, it’s possible to configure a single switched network to better suit system requirements without making physical network changes. MSPs can assign switches to VLANs and create logical groups to partition communication. Network switches support VLANs and create a Layer 2 subnet implementation. On a practical level, this both prevents certain devices from interacting and allows others to connect more efficiently. 

CTA Image

SolarWinds Remote Monitoring and Management

Get the tools you need to manage, secure, and improve all things IT—all within a single web-based dashboard.

Try It Free Learn More

Why is trunking important to VLAN configuration? 

With VLAN trunking, it’s possible to extend a VLAN across the network. When you implement multiple VLANs across a network, trunk links are necessary to ensure that VLAN signals remain properly segregated for each to reach their intended destination. This is also more efficient, as multiple VLANs can be configured on a single port. 

With these multiple VLANs on a single port, the system has to have a way of distinguishing and routing signals. A trunking VLAN port always uses identifying tags to mark frames as they pass between switches. The most common trunking protocol, IEEE 802.1Q, adds a tag to the Ethernet frame as it passes through, marking it as belonging to a specific VLAN. This tag, which includes the Media Access Control (MAC) address, ultimately helps route the Ethernet frame to the correct endpoint as it passes across the trunked link and the host port. 

IEEE 802.1Q is an open standard protocol, and typically the best (and only) option if you’re using equipment from multiple vendors. The Cisco VLAN Trunking Protocol (VTP) is a proprietary protocol, and can potentially be useful—for instance, when you configure a new VLAN on a VTP server, it automatically distributes it across switches, reducing configuration time. 

Some maintenance is necessary for VLAN trunking—for example, the switch-forward tables must stay up-to-date in case of network topology changes. This means continually refreshing the tables to allow new changes to emerge and old forwarding frames to be cleared out. It’s worth noting, too, that there are two types of possible trunking here: symmetrical and asymmetrical trunking. Symmetrical trunking allows any port within a group to transmit packets to any other port, allowing for higher data transmission and reception rates. Asymmetrical trunking allows only one port on a switch to receive packets, so transmission rates are high while data reception is slower. 

What is the difference between an access port and a trunk port? 

Essentially, access ports handle traffic for one VLAN, while trunk ports are equipped to route traffic to and from multiple VLANs using a tagging protocol. Here is the basic difference between a trunk port vs. an access port: 

Access ports

An access port is a connection on a switch that transmits data to and from a specific VLAN. Because an access port is only assigned to a single VLAN, it sends and receives frames that aren’t tagged and only have the access VLAN value. This doesn’t cause signal issues because the frames remain within the same VLAN. If it does happen to receive a tagged packet, it will simply avoid it. This is a simpler configuration, but not the most efficient choice if the network is even moderately complex. 

Trunk ports

Unlike an access port, a trunk port can transmit data from multiple VLANs. If you have a dozen VLANs on a particular switch, you don’t need additional cables or switches for each VLAN—just that single link. A trunk port allows you to send all those signals for each switch or router across a single trunk link. In contrast to an access port, a trunk port must use tagging in order to allow signals to get to the correct endpoint. Trunk ports typically offer higher bandwidth and lower latency than access ports. 

What is IP trunking?

IP trunking is a transmission method for the large-scale use of Voice over Internet Protocol (VoIP). VoIP involves sending voices over the internet as data, rather than as electrical signals (as with traditional telephone landlines). When an organization wants to use VoIP, the data must be handled properly—especially because the connection between internal and external networks typically consists of just one link. 

While VoIP is used by millions of individuals for personal reasons, few of those individuals need IP trunking. However, businesses and larger organizations do require trunking, because they need a way to handle multiple call lines and the many services like call waiting and voicemail that are associated with VoIP. Trunking allows multiple calls to go through simultaneously, which is a must for many organizations. Although the same VoIP trunk connects all business users (both in-office and remote), the signals are sent over a single trunking link that allows each call to reach the correct destination. 

IP trunking means the service provider utilizes trunking to both send and receive switches for each call. The typical trunking configuration is the Privacy Branch Exchange (PBX). As the voices are digitized into IP packets, the PBX system can address and route the packets to the receiving endpoint—that is, to the other caller. This transmission process occurs over the caller’s unique IP address. 

IP trunking may happen on the backend, but VoIP is still relevant for many MSPs. If your customers might be interested in moving their phone service to the data network, it’s worth understanding how IP trunking can make that possible. In other cases, you may wish to utilize VLAN trunking in order to optimize a customer’s network. When managing these many moving parts, consider taking advantage of SolarWinds® RMM [https://www.solarwindsmsp.com/products/rmm] to utilize a comprehensive set of remote monitoring and management tools in a single dashboard.

 

For more networking tips and explanations check out our blog. 

 

Network Planning and Design
Centralized Networks vs Decentralized Networks
How to Check Bandwidth Usage Across Your Network

You might also like...

Networking

What Is a Network Segment?

Networking

How VLAN Works

Networking

An Overview of Subnet Classes

Networking

Top 5 questions MSPs ask about NetPath 

Networking

Why You Should Monitor Your Network All the Time

Networking

Common Network Authentication Methods

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts

  • Why Properly Documenting Non-Technical Conversations and Decisions is Essential
  • Password Stealing 101: Common Methods and Defenses
  • Imaging vs. Cloning: Key Differences
  • Should You Give Your Clients Gifts Over the Holiday Season?
  • DDoS—What You Need to Know

Categories:

  • Business Growth (420)
  • Security (345)
  • Tips & Advice (334)
  • Managed Services (303)
  • Best Practices (247)
  • Business (214)
  • Cybersecurity (194)
  • Backup & Disaster Recovery (116)
  • IT Support (109)
  • ITSM (78)
  • Data (64)
  • Product (63)
  • Cloud Computing (61)
  • Marketing (57)
  • Mail (53)
  • Networking (34)
  • Risk Intelligence (31)
  • Customer Service (29)
  • Remote Management (27)
  • Automation (19)
  • GDPR (17)
  • Services & Support (16)
  • Operations (16)
  • Service Desk (15)
  • Research & Trends (14)
  • PSA (12)
  • Business Risk (12)
  • Internet of Things (11)
  • Mobile (11)
  • Training (11)
  • Security-series (8)
  • Cybersecurity Awareness Month (6)
  • LOGICcards (4)
  • Machine Learning (3)
Show moreless
SolarWinds MSP

© SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd.
All Rights Reserved.

Products

  • SolarWinds RMM
  • SolarWinds N-central
  • SolarWinds Backup
  • SolarWinds MSP Manager
  • SolarWinds Mail Assure
  • SolarWinds Risk Intelligence
  • SolarWinds Take Control
  • SolarWinds Threat Monitor
  • SolarWinds Passportal

Solutions

  • How We Help MSPs
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights

About

  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Privacy
  • Legal
  • Security
  • Subscription Preferences
  • SolarWinds

Support

  • SolarWinds RMM
  • Solarwinds N-central
  • SolarWinds Backup
  • SolarWinds Mail Assure
  • SolarWinds Take Control
  • SolarWinds MSP Manager
  • Solarwinds Risk Intelligence
  • Solarwinds Threat Monitor
  • SolarWinds Passportal
  • SolarWinds Take Control Downloads
  • Backup & Recovery Downloads
  • Sitemap
  • Service Status