In order to establish a proper VLAN, there is need for VTP servers, VTP clients and switches in VTP mode (Stallings, 2007 P. 76). Due to the rapid expansion and location considerations the best way to ensure access to normal service from different locations is to subnet the network. Each department like marketing, engineering and the like will each have a subnet. The same subnets should exist on every single switch. Having each subnet embedded in each switch will allow routing of traffic from different departments thus control bandwidth. The different activities done by the departments will form a basis for division of the VLAN network. The subnets that should exist will be based on marketing, engineering, operations and the call center.
The flexibility, scalability and improved security features of VLAN are desirable. It offers better security than other forms of LAN protocols. Another advantage that is introduced by the VLANs is the ability of users in different geographical locations to share resources. Broad cast domains offer the ability to control congestion in the networks as well as avoid bandwidth consumption control (Regan, 2004).
Security control can be achieved easily once the division of different subnets is achieved. Access controls can be introduced such that password would be needed to access the resources in the network. Each department would only be allowed to access the resources that are in that department only and not any from any other department (Stallings, 2007). It is also important to set up security barriers between sections so that no intruder can gain access in to another section without due authority.
Based on the ease of administration and assignment, VLAN membership should be based on port assigned base. The advantage that this membership introduces as compared to other membership like MAC address, User ID and Network address is found in its simplicity when reorganizing future structure and layout of the plan. Implementation will be done on layer three switches which are preferred to layer two due to its ability to provide a bigger control of the network. Once all the above is done trunking is implemented (Ouellet et al., 2002).
However before implementation it is necessary to identify the kind of trunking protocols that will be used. Trunking introduces awareness to all switches of the VLAN host and its locations. This will go a long way in provision of the necessary rationale for communication and service availability. VLAN Trunking protocol specified by IEEE 802.1Q is the preferred protocol of use. It introduces fast access speed in the network. In addition to that it also allows management of different VLANs among multiple switches. Configuration of switches should be done based on client and server technology approach. At least one VTP server and VTP clients should be implemented.
Laying the network in a star topological structure where no node depends on another for service ensures availability of service even in the event of failure of some nodes. The topology will also ensure service in case of VLAN in availability.
References:
Ouellet, E., Padjen, R., Fuller R., & Pfund, A. (2002). Building a Cisco wireless LAN. London:
Elsevier.
Regan, P. (2004). Wide area networks. New Jersey: Pearson Education, Inc.
Stallings, W. (2007). Data and computer communications. New York: Prentice hall.