thank you all for your contributions. But this is where i am fuzzy. Exactly this example. two switches connected with a cat 5e cable. PC1 on switchA. PC2 on switch B. In a normal scenario, they are all on the same subnet. VLANs have nothing to do with IP addresses as I understand it. If you say that VLANs make 2 logical switches out of one physical hardware device, I can sort of understand that-the MAC to port mapping within a VLAN is restricted to those ports on that VLAN. But as everyone knows, you can have a bunch of switches in a LAN and all devices connected to those switches can see each other if they are on the same subnet (e.g. 192.168.1.x with a net mask of 255.255.255.0). At some point the VLAN will happen across a packet that asks for a MAC address not in its VLAN-and when that happens, does it not have to do something *extra*? That *extra* as I understand it, is to send out a broadcast packet to the whole subnet.
I do not see why your thorough explanations are invoking the concept of 'different subnets' to explain VLAN behavior when VLANs are ignorant of IP addresses.
No. because the devices on VLAN1 cannot see the devices on VLAN2 (unless you bridge the VLANs or two devices are members of both VLAN1 and VLAN2 and they are trying to talk to each other).
Sure, you can send out a request to a device IP address that is on VLAN2 from VLAN1, it'll hit the switch, switch doesn't know about the MAC on VLAN2 from VLAN1, so it'll send out a broadcast to all VLAN1 devices, since that is where it came in on and get no response.
That is no different than if you tried to talk to an IP address on your local subnet that doesn't exist. Difference here is that VLAN2 devices won't be molested by those broadcast packets, as they are on a different virtual network and the switch will only send broadcast packets to members of the same VLAN (again, unless bridged).
You can also do things like set QoS with VLANs. Most switches that support VLANs can also do some very basic QoS, but it gets enhances a LOT more by doing it based on VLANs. So, you can, for example, set all of your VOIP devices to VLAN1 and set VLAN1 as the highest QoS priority and set all of the other devices on VLAN2 and set that VLAN as a lower priority.
If the switch isn't crap, it'll reduce jitter for the higher priorty VLAN, especially in cases of high network utilization.
Or I can see a scenario in my family, I have 3 young kids. As they are older, I just might not want them accessing some network resources (like backup server/storage). I could do that by account access restrictions, but I can make it more secure (I knew me as a kid) by assigning various ports or devices to their own VLANs and just not having the backup server on the same VLAN as my kid's devices, but have the primary server on the same VLAN as their devices and on the same VLAN as the backup server, so the backup server can pull periodic backups, but my kids can't access it from their stuff.
Want to get more paranoid, go in and created ACLs on the switch so that they can't decide to plug their laptop in to a port that DOES have access to the backup server.
And on and on.
Many reasons for VLANs, even in a home network sometimes.