Skip to content
Mead & Hunt Site Logo
  • Markets
    • Aviation
    • Cultural Resources
    • Education
    • Federal
    • Food & Beverage
    • Justice
    • State & Local
    • Transportation
    • Water
  • Services
    • Architecture & Interiors
    • Construction Services
    • Engineering
    • Environmental
    • Planning
    • Sustainability & Resilience
    • Technology
  • Portfolio
  • News
  • About
    • Purpose & Values
    • Meet Our Team
    • Diversity & Inclusion
    • Locations
    • Our History
    • Events
  • Careers
    • Career Opportunities
    • Why Work Here?
    • Scholarship Opportunities
Menu
  • Markets
    • Aviation
    • Cultural Resources
    • Education
    • Federal
    • Food & Beverage
    • Justice
    • State & Local
    • Transportation
    • Water
  • Services
    • Architecture & Interiors
    • Construction Services
    • Engineering
    • Environmental
    • Planning
    • Sustainability & Resilience
    • Technology
  • Portfolio
  • News
  • About
    • Purpose & Values
    • Meet Our Team
    • Diversity & Inclusion
    • Locations
    • Our History
    • Events
  • Careers
    • Career Opportunities
    • Why Work Here?
    • Scholarship Opportunities
Mead & Hunt Site Logo
  • Markets
    • Aviation
    • Cultural Resources
    • Education
    • Federal
    • Food & Beverage
    • Justice
    • State & Local
    • Transportation
    • Water
  • Services
    • Architecture & Interiors
    • Construction Services
    • Engineering
    • Environmental
    • Planning
    • Sustainability & Resilience
    • Technology
  • Portfolio
  • News
  • About
    • Purpose & Values
    • Meet Our Team
    • Diversity & Inclusion
    • Locations
    • Our History
    • Events
  • Careers
    • Career Opportunities
    • Why Work Here?
    • Scholarship Opportunities
Menu
  • Markets
    • Aviation
    • Cultural Resources
    • Education
    • Federal
    • Food & Beverage
    • Justice
    • State & Local
    • Transportation
    • Water
  • Services
    • Architecture & Interiors
    • Construction Services
    • Engineering
    • Environmental
    • Planning
    • Sustainability & Resilience
    • Technology
  • Portfolio
  • News
  • About
    • Purpose & Values
    • Meet Our Team
    • Diversity & Inclusion
    • Locations
    • Our History
    • Events
  • Careers
    • Career Opportunities
    • Why Work Here?
    • Scholarship Opportunities

Data Networks: VLANs and subnets within the transportation industry

  • February 17, 2022
Share on LinkedIn
Share on Facebook
Share on Twitter
Share on Email
Data network VLANs and subnets

I moved from Massachusetts to North Carolina in September of 1993. My extended family still lives there, so I drive once or twice annually north and south. Driving on I-95 was always the most challenging part of my journey. The congestion, the delays, the obnoxious drivers, and on and on…. Everybody was driving on the same road network with no good alternatives.

Recently, we’ve attempted to address congestion by the use of reversible lanes, high occupancy vehicle (HOV) lanes, high-occupancy toll (HOT) lanes, express lanes, and bus-on-shoulder systems (BOSS). These strategies segment our road network! One must pay or qualify to drive on these special lanes, sort of like a membership scheme. The benefits of these facilities are quality of service (QoS), travel-time reliability, less congestion, safety, and security. This segmentation of the road network is analogous to the segmentation of data networks into Virtual Local Area Networks (VLANs) and subnetworks (subnets).

What are VLANs and subnets?

These networking technologies or techniques are used to break down a large network into smaller and more manageable segments and separate network traffic, just like the HOT lanes and express lanes do in a highway facility.

VLANs and subnets have much in common. Both techniques allow for segmentation of a network for efficiency, security, manageability, QoS, functionality, and more. A VLAN is a subnet, but a subnet is not necessarily a VLAN.

How do VLANs work?

VLANs operate in Layer 2 of the Open Systems Interconnection model (OSI model), which is the Data Link Layer, using managed ethernet switches. A switch port or group of switch ports can be assigned to a particular VLAN. For example, a 24-port ethernet switch could be logically divided into three 8-port switches, with each set belonging to a particular VLAN. Another switch at a different location can be configured similarly. The hosts on each of the three VLANs can communicate with each other (intra-VLAN) through the same switches, and yet be invisible to the other two VLANs. In other words, each VLAN has its own broadcast domain and privacy from the other VLAN users.

In an Intelligent Transportation System (ITS) network, surveillance cameras, traffic signals, and Dynamic Message Signs (DMSs) each could be on separate VLANs with different sets of security and QoS policies.

How do subnets work?

Subnets, on the other hand, function at OSI Layer 3. Subnetting allows a large network to be divided into smaller ones for efficiency, manageability, security, etc. Postal ZIP codes offer a good analogy for conceptualizing subnets. According to USPS, there are 41,692 ZIP codes and 161.4 million addresses. The first digit of a ZIP code represents a general geographic area, starting with 0 in the East (e.g., Worcester, MA 01608), moving to 9 in the West (e.g., Los Angeles, CA 91007). The next two digits represent a general area, and the last two are specific to a Post Office or Zone. When mail arrives in a post office, it is sorted based on the ZIP code and forwarded to the right geographic location for further processing. How difficult would it have been to deliver mail without ZIP codes and regional post offices? VERY! Without them, one single post office would have had to know every last one of the 161.4 million addresses. A post office functions like a router in a network. It looks at the ZIP code on an envelope, and forwards it to the next post office until it arrives to the local post office for delivery to the recipient.

Subnets function in the same way in networking as zip codes in mail delivery. Each device in a network has an Internet Protocol (IP) address, which uniquely identifies that device in the network. An IP address is a 32-bits binary number represented in four groups of 3-digit decimal numbers separated by dots (aka dotted decimal notation), e.g., 192.168.218.121. This number is divided into two parts: one part represents a network and the other represents a host on that network. In a Class A IP address, the leftmost group represents network addresses, and the remaining three groups represent host addresses on the network. Each host group ranges from 0 to 255, so the total number of hosts in a Class A network is 16,777,216 (256*256*256).  A network this big presents many challenges, such as bandwidth efficiency, congestion management, collision avoidance, locating hosts, etc. Therefore, a mechanism like the postal ZIP code is needed to quickly locate an address in a network as well as manage network traffic and delivery more efficiently. Subnetting or sub-networking accomplishes this goal by diving a large network into smaller and more manageable segments.

How would this work in practice?

Let us assume Mead & Hunt is given the Class A IP address 5.0.0.0. Every computer, printer, IP phone, employees’ workstations, and other network assets could be placed in one large flat network, with thousands of devices and one network with the ID of 5.0.0.0. This would be the equivalent of having no ZIP code in the US postal system, and would be very inefficient. So, in this scenario with Mead & Hunt, it would make sense to sub-divide the network based on some logical metric—for example, states, cities, and local offices. This would allow us to manage the network more efficiently. Let us assume Mead & Hunt has 14 offices in each of the 50 states and DC. Subnetting the Class A IP will look something like this:

The IP address 5.0.0.0 will be the registered web address of Mead & Hunt for the outside world.  We will subdivide this number starting with 0 in the east and move up as we go west. We will follow the same logic within each state. For example, John’s PC in the Raleigh, NC office will have the address 5.0.0.55. In this example, the subnet ID will be 5.0.0 and 55 identifies John’s PC. Jennifer’s PC network address in Sacramento, CA could be 5.50.0.33. Here, 5.50.0 is the subnet ID and 33 is Jennifer’s PC ID. If John wants to print a document in his office printer, the network traffic doesn’t leave his office’s Local Area Network (LAN) or subnet. But if he wants to send an email to Jennifer in Sacramento, the email traverses many routes before it is delivered to Jennifer. Communication between subnets requires a network router(s) to forward data between the two subnets. This is similar to a local post office sorting and forwarding mail to other post offices for final delivery.

The motivation for subnetting is the same as for VLANs: to reduce the size of the network for manageability, security, and reliability, amongst other benefits. The following is a list of few differences between subnets and VLANs:

VLANs vs subnets

  • VLANs allow creation of different logical and physical networks, whereas subnets allow creation of a logical network through the same physical network
  • VLANs operate at Layer 2 and use both IP addresses and MAC addresses (hard-coded address burned onto a network device); subnets use IP addresses and function at Layer 3 of OSI model
  •  VLANs isolate network traffic at the switch level; subnets isolate network traffic at the router level
  • VLANs uses 802.1Q protocol; subnets use IPv4/IPv6
  • VLANs save infrastructure costs through logical partitioning of network switches and creation of router sub-interfaces for inter-VLAN routing

So how does this affect transportation infrastructure?

Modern ITS communications networks are built on the IP/Ethernet technology. Both VLANs and subnets are used to separate network traffic generated by various ITS devices for the purpose of security, manageability, functionality, QoS, etc., as mentioned above.

I’ve written before about how new technologies are shifting the future of transportation infrastructure. In today’s connected world, with the evolution of Connected Automated Vehicles (CAV) and Smart Cities, and fusion of ITS networks with agencies’ enterprise networks, cybersecurity is more relevant than ever. Every roadside ITS device increases the “attack surface” by one—and there are thousands of them! A hacker may not be much interested in breaking into a DMS, but they may be much more interested in using a DMS as an entry point to an agency’s enterprise network in order to launch a ransomware attack. Separating and isolating ITS networks with VLANs and subnets is one of the many tools available to secure the network.

Why put an enterprise network at risk by fusing it with an ITS network? Well, that is a topic for another day!!!

Auref Aslami headshot

Auref Aslami, PE, CPM, CCNA

Auref is a seasoned ITS engineer with 28+ years of ITS design, operation, maintenance, and verification and validation experience. He has led many efforts in the deployment of advanced technologies to promote safety, transportation reliability, congestion reduction, and air quality improvement. When not at work, you can find Auref biking, watching football, and reading.

Linkedin Envelope
PrevPrevious
NextNext

Most Popular

Why is ADA compliance important?
May 19, 2022
Designing for a future climate – The future is now
May 16, 2022
Mead & Hunt Expands CEI Services to Illinois
May 16, 2022
Military Appreciation Month Profile: Rob Vernon
May 12, 2022

Main Menu

  • Home
  • Markets
  • Services
  • Portfolio
  • News
  • About
  • Careers
Menu
  • Home
  • Markets
  • Services
  • Portfolio
  • News
  • About
  • Careers

Useful Links

  • Ebids
  • Equipment & Parts
  • GSA Schedules Program
  • U.S. Government Contract Vehicles
  • Policy for Third-Party Recruiters
Menu
  • Ebids
  • Equipment & Parts
  • GSA Schedules Program
  • U.S. Government Contract Vehicles
  • Policy for Third-Party Recruiters

Get in touch

  • Apply Today
  • Contact Us
  • Locations
  • Title VI
Menu
  • Apply Today
  • Contact Us
  • Locations
  • Title VI

Connect with us

Linkedin Facebook Twitter Instagram Vimeo

© 2022 Mead & Hunt, Inc. All rights reserved.

  • Privacy & CCPA Policy
  • Do Not Sell
  • Site Map
This website uses cookies to improve your experience. Read full privacy policy
ACCEPTREJECTSETTINGS
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
Powered by CookieYes Logo