Example 1 – developers and engineering

To illustrate the usefulness of VLANs, let's consider the simple case of a mid-sized company that has a software department and an engineering department. The software department occupies floors one and three, while the engineering department occupies floors two and four, and each floor has its own wiring closet with a switch connected to the company router.

Let's also assume that we want to have separate networks for software developers and engineers, so that the developers can communicate with each other via the developers' network, and the engineers can communicate with each other via the engineering network, but the developers shouldn't be able to access the engineering network and engineers shouldn't be able to access the developers' network. The following diagram shows this setup:

A possible method of segmenting our network using traditional network interfaces

As you can see, accomplishing our goal of having separate networks for developers and engineers in a traditional network is somewhat difficult. The developers are not all on the same interface, and neither are the engineers. One possibility is to continue having a subnet for each floor: we could call the first floor network DEVELOPERS1, the second floor network ENGINEERING1, the third floor network DEVELOPERS2, and the fourth floor network ENGINEERING2. Then we set up firewall rules to allow DEVELOPERS1 to access DEVELOPERS2 and vice versa, and do the same for ENGINEERING1 and ENGINEERING2. This would be the easiest way of segregating the developers from the engineers with the current setup, but it still falls short of our goal of having one network for developers and one for engineers. What we have actually done is set up two network groupings with two networks in each of them. Moreover, if our setup gets more complex (for example, in addition to the first four floors, we add developers and engineers to the fifth floor), it is going to be challenging to reconfigure our network.

Another possibility is to connect the first and third floor switches, and connect the second and fourth floor switches. In this scenario, each network has two switches, one of which is directly connected to the company router. The second switch will be connected to the first switch via the uplink port. As a result, the two switches will be on the same network, and we will achieve our goal of having separate networks for the developers and engineering. There are, however, some problems with this configuration:

  • We will have to run cabling between the first and second switches for the developers' and engineering networks. In a small office, this may not be a big problem. For example, assume that in our hypothetical network in the preceding diagram the company router is on the second floor of the building, in the same wiring closet as the ENGINEERING1 switch. The engineering network requires no additional cabling, as we can just disconnect ENGINEERING2 from the router and connect it to ENGINEERING1 (which will remain connected directly to the router). Thus, all we need to do is run cabling between DEVELOPERS1 and DEVELOPERS2. Nevertheless, it is not difficult to see how this is not a very scalable configuration. If we double or triple the number of floors in our hypothetical, we can see how the time and cost of running additional cabling can add up.
  • This solution is not very flexible, either. For example, if the company decides to move some of the developers onto the fourth floor, we will have to either put them on the same switch as the engineers (in which case they won't be on the developers' network), or we will have to add another switch for the developers.

Now, let's consider how we would go about setting up different developer and engineering networks using VLANs. Again, each floor will have its own switch, except that the switch will be a managed switch, capable of processing VLAN traffic. There will be trunk lines connecting each switch with the switch on the floor above it (except for the fourth floor switch) and the floor below it (except for the first floor). The switch on the first floor will be connected via the trunk port to the company router. Again, we have a diagram of this configuration, as follows:

Our new and improved network, now with VLANs

The cost of setting up this VLAN may initially be higher, because we have to use managed switches, whereas in the non-VLAN scenario, we could have used unmanaged switches, which are typically cheaper than managed switches (although we will likely save some money on cabling). Our network is now much more scalable than before, as adding another floor to the network only requires (in addition to cabling to each node) an additional switch and trunk cabling to the switch on the previous floor. Moreover, on a managed switch, we can configure individual ports, so if management decides to move the software development and engineering departments around, we can just reconfigure ports on the switches. For a relatively small network, the benefits might not be that significant. But as you might have gathered, as our networks get bigger, using VLANs makes the task of configuring and maintaining networks much easier. And as we shall see later in the chapter, technologies such as Cisco's VLAN trunking protocol make administration even easier.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset