Help? Depends on what "help" is...
VLANs are a way of controlling traffic flows. Either in or out of a group(subnet) By default nothing gets in or out of a VLAN unless routed by a layer 3 device(MLS notwithstanding).
So.. the plus is Security by blocking traffic flows.. ie.. you could have a vlan set up for the server and users of the front office. Keep all the records from prying eyes unless the access lists lets them through. Or they login via one of the terminals and has the password.. whole different issue.
Traffic flow control. Keep heavily used groups from nailing other users on the same wire. One example would be a custom app that likes to use chatty broadcast packets.. every workstation on the wire has to process these broadcast packets unless they are isolated somehow. And an older PC could easily be overwhelmed resulting in calls to the helpdesk "my pc is slow" but without any apparent reason because by the time you get there, the broadcast storm is over.
Network Management. You can use a test VLAN to deploy a new project without endangering the production network.. mostly ;-) You can traffic traffic stats by VLAN to who is the heavy users and make adjustments accordingly.
Dynamic VLANs/. THese are fun.. messy to setup but can offer some interesting benefits. Roaming users with laptops. Their home VLAN travels where ever they are.. This is NOT for the faint of heart to configure and use but it's worth mentioning.
Spanning tree issues. It's possible with VLANs to tune your spanning tree topology to match the campus. What might be elected as a root bridge would not be you first choice for some reason. It gets nastier over a flat network where a new switch or a *rogue* switch inserted could cause some serious issues. If it's vlaned off, then the issues remain local. Esotric?? not really.. networks nowdays are getting complicated enough to where stuff ignored 2 years ago will bite you in the butt if you choose to ignore today.
A side bar to security is how you can group the servers in a vlan and now tightly control access to can even see the server farm.. much less use it. You can tighten it up to only web traffic goes to the webserver, only TCP goes to the database server and so on. Yes you can do this with subnets but the packets still go everwhere they should not. The VLAN traffic only goes to the ports that you have "blessed" to be part of the VLAN.
'nuff for now
MikeS Find me at
"Diplomacy; the art of saying 'nice doggie' till you can find a rock" Wynn Catlin