Virtual LAN

Mr. O. P. Chandrakar


AVirtual LAN also called a VLAN, is a logical subgroup within a local area network that is created via software rather than manually moving cables in the wiring closet. A VLAN acts like an ordinary LAN, but connected devices don't have to be physically connected to the same segment. It is a local area network with a definition that maps workstations on some other basis than geographic location (for example, by department, type of user, or primary application).  

While clients and servers may be located anywhere on a network, they are grouped together by VLAN technology, and broadcasts are sent to devices within the VLAN.

Key features of VLAN

The benefits of a VLAN include the ability to share information and resources across locations as if they were all under one roof. As a result of this, businesses can operate more efficiently with improved productivity. Site-to-site VPN is frequently used to implement VLAN with the added benefit of strong security.

There are two fundamental limitations of VLANS: performance and management costs.

In regard to performance, local area networks typically operate at 100 Mbps with latencies of less than 5 ms. On the other hand, wide area networks typically connect at 1.5 Mbps or less with latencies averaging around 100 ms. So, a VLAN will not perform as well as a local network. This is generally not a problem, but can be if applications are chatty (i.e., send a lot of small messages back and forth just to accomplish one task) or require a lot of bandwidth (i.e., video streaming). So, when designing a VLAN, one must take care to provision enough bandwidth to accommodate the applications being serviced.

In regard to management costs: A VLAN is a wide area network and typically requires additional security such as that provided by IPsec and PKI. The need to support geographically dispersed locations and extra security can increase overhead. Basically, it's much more complex than connecting computers together in the same building as would be the case with an ordinary LAN.

Standards for VLANs

The standard 802.1q defines the operation of Virtual LAN (VLAN) Bridges that permit the definition, operation and administration of Virtual LAN topologies within a Bridged LAN infrastructure.  802.1v is the proposed supplement that will benefit users of multi-protocol LANs by permitting them to specify VLAN structures suitable for each protocol present in a LAN, and removing the need for a non-standard relay function between VLANs.

  • Virtual LANs operate at layer 2 of the OSI model. However, a VLAN is often configured to map directly to an IP network, or subnet, which gives the appearance it is involved in layer 3.  

  • This also means that if you tried to cascade your switches hoping that the VLAN would work for both, then it would most probably fail.

  • In order to cascade two switches together for a VLAN, they must support 'Trunk Links' where the above mentioned 'tags' will be sent through a port of the first switch, into the port of the second switch.  

Security in VLAN

VLANs provide security in two ways:

  • High-security users can be grouped into a VLAN, possibly on the same physical segment, and no users outside of that VLAN can communicate with them.

  • Because VLANs are logical groups that behave like physically separate entities, inter- VLAN communication is achieved through a router. Thus, all the security and filtering functionality that routers traditionally provide can be used.


VLANs function at layer 2. Since their purpose is to isolate traffic within the VLAN, in order to bridge from one VLAN to another, a router is required. The router works at the higher layer 3 network protocol, which requires that network layer segments are identified and coordinated with the VLANs. This is a complicated job, and VLANs tend to break down as networks expand and more routers are encountered. The industry is working towards "virtual routing" solutions, which allows the network manager to view the entire network as a single routed entity.

Virtual LANs solve the problem of containing traffic within workgroups that are geographically dispersed. They allow moves, adds and changes to be performed via software at a console rather than manually changing cables in the wiring closet.  

Layer 3: The network layer...This layer handles the routing of the data (sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level). The network layer does routing and forwarding.

Layer 2: The data-link layer...This layer provides synchronization for the physical level and does bit-stuffing for strings of 1's in excess of 5. It furnishes transmission protocol knowledge and management.