Hondabuff wrote: » If you are big enough to have a domain controller then you should start breaking up the network into separate vlans. Servers on one vlan and hosts on another. Cisco quotes that 500 nodes per VLAN is the max that you should go due to broadcast traffic. Good design would be 10.2.0.1/23, then 10.2.2.0, 10.2.4.0. Easy to manage that way for growth and management.
fredrikjj wrote: » My main concern there would be that they are using unmanaged switches without security features like dhcp snooping, etc, not throughput per se. Tracking down issues like that would be challenging to say the least if the switches are dumb.
--chris-- wrote: » I have a client that has ~80 computers, no projected growth in the next 3 years. The PC's are all on one class C subnet run by unmanaged switches, no segmentation. Right now, the internet is three T1's bonded together. The internal network is not the bottle neck, but they are working with an ISP to get possibly get fiber shortly and I have a concern that the network may become a bottleneck if they put more emphasis on utilizing that fiber line. Their current phone system runs on a dedicated single T1 and would probably stay that way after the Fiber move. They do not do any Skype/video right now, but I imagine they will want to once the fiber is in. So thats the scenario, at what point would breaking this subnet up start to make sense? If I left anything pertinent out, let me know...I just enough to get this thought in my head, but not enough to design an expansion.
Zartanasaurus wrote: » Small company with 80 hosts doesn't need much. I'd split them into 2 VLANs (workstations/servers) and be done with it. Are they coming to you and asking for this? If not, they may just say no since "it works now" and you're asking them to spend money.
it_consultant wrote: » My recommendation is to leave it be, but to answer the question, there are a few scenarios where VLANs and segregation become a thing. 1 - Some of your PCs need to be PCI compliant and others don't. 2 - You plan on having more than 500 computers on the subnet at the same time 3 - You need to enforce QOS 4 - Part of your network is in a physically different location 5 - You want your network to take different paths
it_consultant wrote: » I have no idea if it is on CCDA/P. It has just been my experience managing networks that those are generally the reasons why one would subnet. I matured in an era which emphasized flattening networks as opposed to structuring them. Hell, I just read that the latest release of the Brocade Fastiron software supports VXLAN which can stitch layer 2 networks on top of layer three networks. This is common in service provider switching but not common in regular bread and butter ethernet switches. The question you should always answer is "why am I doing this?". If the answer is because a certification test showed you how to do it, then it isn't really valid. Take one example, PCI compliance, a PC must be PCI compliant if it itself handles credit card information, or if it has direct and uncontrolled access to a computer that handles credit card. In a flat network that can easily spread to your entire domain if you haven't segmented. Then you segment based on security zones and put in compensating controls at your segmenting points. Phones are another good example of when people VLAN when it isn't really necessary. A regular phone call will take a tiny fraction of a 100MB link, what is the point of VLAN'ing that traffic off? For QOS maybe, but that only tells the switch which traffic to process first and which to police and possibly drop if the link gets saturated. Most LAN ports will never saturate. Now, if my phone switch is across a slower WAN link (say a point to point T1) then it is totally conceivable that the link will saturate, at which point you would VLAN your phones at the remote site from the PCs and assign them a higher QOS priority. In your case people might start using a lot of video, in which case, as you alluded to, the weak point is the internet connection. There are dozens of firewalls that can intelligently prioritize Skype (even Skype vs gtalk or something) and or load balance between more than one internet link.
DevilWAH wrote: » I think there are a number of reasons to vlan there are the management ones such as it-consultant has mentioned. But also the performance and while not so important on a network of 80 users as the network grows so do that. One is the single broadcast domain. when a device is in the same ip/vlan segment to the server/client it is trying to connect to it carries out an arp (assuming ipv4) which hits ever NIC on the segment, now on a network of 200-300 clients talking to domain servers and services in a single vlan and you can have back ground "noise" of 50+ ARP packets each second hitting your devices. and while its not a huge impact on performance it does slow down the network. Even worse should a NIC or PC go heywire and start flooding the network every device gets hit, this means if client A starts flooding at 15,000 pps the communication between server B and Client D will be affected, as will the connections between server B and its back end data base server. So putting servers and clients on a separate vlan can mitigate some of these issues. The general rule is that if you split your network in to groups of machines that talk to each other. ie servers and clients and separate them on to different subnets then you cut down broadcast massively. however sub dividing clients in to separate subnets is only really needed if you need to manage or apply different security to them. the otehr security things have been covered by others so I wont go over them again. But vlans give you three benifits 1. Reduce broadcast and in large networks improve throughput and performance by cutting background and overheads. 2. Provide a choke point to apply security between devices. 3. provide a point to monitor the network. for 80 devices assuming your equipment if reasonable up to date point one is not going to be something to consider you much (unless you get a device flooding the network ) .And unless you are going to introduce monitoring or security on to the network then points 2 and 3 are also not worth the effort. Ask your self, do I have performance issues? Do I want better visibility of the traffic? Do I need to secure the traffic? If you can answer yes to any of them then you need to consider vlans and segmenting it. if the are all NO then don't bother. If you are not sure, then you need to research it as at what point they become necessary is specific to each individual network.
it_consultant wrote: » It is good to have these discussions. One of my frustrations with network engineers and indeed, networking certifications, is that they only really solve half of the issue for a system. For example, it frustrates me that CCNP will teach you how to etherchannel, but based on that you would be completely unqualified to actually etherchannel to a server whether it is VMWARE or Windows or Linux. Network guys are now expected to really be able to do end to end connectivity to include operating systems. I am really not good at my job if I can't jump into really any system and configure the networking. Part of that is understanding when Cisco calls something "etherchannel" and say Hitachi calls it "redundant links" which really means LACP bonding . I find these forums help people (even though this one has been quiet lately) make those bridges. As for VXLAN, the use in an enterprise would be limited. I can imagine scenario where two large clusters of servers are connected by an aggregation switch where server A in cluster A needs to be able to be on the same broadcast domain as server B in cluster B. Doing a provider VLAN setup or MPLS over ethernet would be way too much overhead for that need, physically moving the server could be impossible - enter the idea of VXLAN. Brocade, Arista, and Cisco have a huge footprint in the datacenter and they offer VXLANs so there must be some sort of demand. That scenario is actually a good reason to do software defined networking.