maximum number of switches and bandwidth limits


Recommended Posts

hey guys, i'm doing a bit of research on the topic of connecting a lot of switches together, are their any issues in doing this besides bandwidth issues?

Cisco SGE2010 48-port Gigabit Switch

I've read that daisy chaining them is a no no, but what about if i have a central switch and hang say 20 switches off gigabit ports? What sort of switch would be ideal in this situation?

the network theoretically would be serving around 832 wired users.

No you would not daisy chain switches together for that many nodes.. A star setup would be used -- core switch with switches off it, you could daisy chain off of that if you wanted for some sections.

You would most likely be creating segments, ie vlanning you prob do not want 832 computers all on the same broadcast domain, etc.

Your prob looking something like a 6509 for the core.

yep will be vlanning

there are 832 ethernet connected users across 4 buildings with 2 floors per building at this site, i also have 2 other much smaller sites to contend with and no budget woot woot :p

left out a lot of detail as this is an assignment and i only needed that specific information :p

thanks for the quick reply

  • 2 weeks later...

Dude,

There is cascading restriction with hubs/repeaters, i.e, there should not be more than 4 hubs between any two stations.

However with switches, in theory there is no cascade restriction. As switches are becoming increasingly intelligent and with switching method such as Store-and-Forward & per-port buffering you can connect many many switches in a cascade. (daisy chaining switches is big NO NO).

In multiple layers of cascade, the latency will increase and bandwidth will reduce as you go deeper in cascade, and you are accessing a station which is connected to the root switch.

But for this problem, instead of using top-bottom approach, you should use bottom-up approach. I.E., you start by how many stations you want to connect (overall size of network), how much traffic they are going to generate (application type, response time, packet size, # of packets transmitted), can you segment/group the stations based on their traffic pattern (vlan, port density). This will give you the basic technical requirement for creating a network. Once you have this or atleast have a rough realistic idea then go to Cisco web and look at various solution, especially Multi-Layer Switching and Fabric Switching. Concepts you need to look at are Core block and Switch Block.

Something wrong with using a stack cable? :unsure:

  On 09/05/2010 at 12:27, .hasan said:

yep will be vlanning

there are 832 ethernet connected users across 4 buildings with 2 floors per building at this site, i also have 2 other much smaller sites to contend with and no budget woot woot :p

left out a lot of detail as this is an assignment and i only needed that specific information :p

thanks for the quick reply

I didn't see this bit, sorry :D

So, we have 8 floors to cover? and do we have WAN connectivity (I'm assuming we do...) I'd put 3750 stacks in each building on each floor - you can easily have 5 3750 switches in a stack so this won't be an issue, nor will bandwidth with stacking cables :) the smaller sites meh, just throw in a 2960 or something equally useful - no need for a stack at smaller sites...

WAN connectivity will connect them all together, ideally you want some core switching, however, your issue here would be placement as we don't know how all builds are laid out etc and we can't just go putting 6500s everywhere :p maybe a 4500 could do, again you've no budget so... :blink:

It has been a while since i have come back to this thread, i do apologize but i have made a lot of progress since i posted this thread :)

  On 23/05/2010 at 18:05, Sn00pY said:

Something wrong with using a stack cable? :unsure:

I didn't see this bit, sorry :D

So, we have 8 floors to cover? and do we have WAN connectivity (I'm assuming we do...) I'd put 3750 stacks in each building on each floor - you can easily have 5 3750 switches in a stack so this won't be an issue, nor will bandwidth with stacking cables :) the smaller sites meh, just throw in a 2960 or something equally useful - no need for a stack at smaller sites...

WAN connectivity will connect them all together, ideally you want some core switching, however, your issue here would be placement as we don't know how all builds are laid out etc and we can't just go putting 6500s everywhere :p maybe a 4500 could do, again you've no budget so... :blink:

We sure do have wan connectivity! 300Mbps/300Mbps with 6 public ip addresses to use across the 3 sites!

I've decided to stack 3x 3750's in each building, on each floor. The core switch is a 4900M

Atm i'm trying to work out how to make use of these additional ip addresses. I'm thinking of using one at the main campus to host a www server, but i haven't really found any good resources on the subject. From what i understand i need a switch before my first router? I could be way off on that one lol.

On the internal network I have 5 vlan's. The servers are on vlan 100, buildings a,b,c and d are on 200,300,400 and 500, they are all on different subnets. I'm using ip helper so i only need the one dhcp server.

I have a packet tracer design running, had to make do with it's limitations but it gives more than enough information coupled with my visio diagram and some project management stuff that i'm still working on to explain what the hell i'm on about :laugh:

I'm really pushing for a High Distinction on this one, I have put a lot of hours into it so far lol

Thanks to everyone for all the help, i still got a long way to go with the whole cisco scene but i think i'll have to invest some more time/money and attempt some certifications in the near future :)

The advantage of using 3750s is they can actually terminate and work a s router - we use 3750s as CEs for 1Gbit connections - so... you are fine :) the 3750 is a L3 Switch :)

Depending on the fibre coming in, or the connection coming in, you may need something like a 2960 to act as "mux" but it's dependant on the fibre/termination.

SFP in the 3750 - fibre in. boom. job done.

this was my teachers method of explaining how i should host a web server on the network, he has experience working in australia's largest telco as a network engineer.

ispe.jpg

another teacher of mine (his from the states, these 2 teachers argue on different points until the cows come home :laugh: )

he told me that, i could do it that way OR (from what i understood) have the www server connected to an interface on the router (customer side) statically assigned, i obviously have no ability to do routing on the isp side but we'll assume it will automagically be done when the connection is provisioned

any opinions?

If your router had a extra interface sure you could do that.. But the method shown with the switch on your side of your border is correct, since they are giving you 14 IPs to work with, you might have other machines in the dmz latter other than just a web server.

Now depending on the ISP, I doubt they would connect you with a glue network like that - the 139 network with a /30 mask

They could just put 1 IP of your /28 range on their router -- and then you could do with the rest how you see fit. Not always a need for a glue network like that.

I would much prefer you put the DMZ on a firewall and not a switch - you can't really make a DMZ on a switch you'll just be doing VLANing - you generally would have a DMZ Switch as a whole unit but hey - It's just a project the security isn't the top issue here I'm guessing.

"you generally would have a DMZ Switch as a whole unit but hey"

That's the way he has it setup in that drawing -- the whole switch is in the dmz, its on that 203/28 network.. His lan is on a private 10 network behind a nat/firewall.

  On 26/05/2010 at 13:45, BudMan said:

"you generally would have a DMZ Switch as a whole unit but hey"

That's the way he has it setup in that drawing -- the whole switch is in the dmz, its on that 203/28 network.. His lan is on a private 10 network behind a nat/firewall.

"I would much prefer you put the DMZ on a firewall and not a switch"

not like you not to read the whole sentence BudMan...

Guess Im just not understanding your point then.. That dmz is not a vlan on the switch from that drawing, the switch looks to be used as method to add ports.

You don't know the feature set of that first CE router -- its could have ACLs on it to only allow specific traffic to the hosts connected to the switch.

And sure you might even subnet that /28 to assign IPs to the dmz, and then the rest to the hosts behind the firewal/nat, etc.

As he said his 2 teachers discuss the different methods, there are always multiple ways to setup something - quite often will depend on what hardware you have on hand, and budget, etc.

Would you want a full firewall device in front of your dmz hosts, and then anther between the dmz and your private network -- sure would be a nice setup.

But sure I agree with you something more like this might be better.

post-14624-12748920434033.jpg

I hear you -- but his drawing would work too. Shoot the DMZ/Firewall segment could be done with 1 device if he had the interfaces on it.

post-14624-12748928475058.jpg

As long as his "dmz" is isolated from his private network -- I would consider it a dmz, etc. So lots of ways to set it up.

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • But you don't own a licence. You are essentially renting it and give it back when they decided to revoke it.
    • All set as AI did the trick
    • NOPE! Too expensive still.
    • AnyDesk 9.5.7 by Razvan Serea AnyDesk is a fast remote desktop system and enables users to access their data, images, videos and applications from anywhere and at any time, and also to share it with others. AnyDesk is the first remote desktop software that doesn't require you to think about what you can do. CAD, video editing or simply working comfortably with an office suite for hours are just a few examples. AnyDesk is designed for modern multi-core CPUs. Most of AnyDesk's image processing is done con­currently. This way, AnyDesk can utilize up to 90% of modern CPUs. AnyDesk works across multiple platforms and operating systems: Windows, Linux, Free BSD, Mac OS, iOS and Android. Just five megabytes - downloaded in a glimpse, sent via email, or fired up from your USB drive, AnyDesk will turn any desktop into your desktop in se­conds. No administrative privileges or installation needed. AnyDesk 9.5.7 changelog: Fixed Bugs Fixed deadlock when updating chat server Fixed crashes caused by exceptions in internal communication layer Fixed crash when opening new monitor in Session in a new window Fixed crash on shutdown Fixed bug that allowed naming Permission Profiles identical to predefined Profiles Fixed bug that could cause licensed remote clients to show up as free Fixed visual bug that caused Set-Password button to show up when Unattended Access was disabled Fixed bug that lead to selecting the wrong initial resolution for webcams New Features Added command line option --record-screen to start a Screen Recording Other Changes Improved visual consistency in some list views Download: AnyDesk 9.5.7 | macOS ~14.0 MB (Free for private use, paid upgrade available) Links: AnyDesk Home Page | Other platforms | Release History | Screenshot Get alerted to all of our Software updates on Twitter at @NeowinSoftware
    • WUT?! Tell us you've never built desktop software without telling us you've never built desktop software... The chromium rendering engine is the content-rendering engine for "chromium-based browsers," but that does NOT mean there's a full-on UI underneath that is somehow bloating these products. The bloat is from the additional UI components that the browser vendor (Vivaldi) is adding atop the base package. Most chromium browsers customize the default skin/theme of the overall package so there's absolutely zero added overhead; it's really just a different CSS-based theme pack. Vivaldi, however, adds more than just a different skin; they add built-in extensions (that are managed by other built-in extensions), add other customization modules, and all kinds of other bloat -- and these add-ons are EXACTLY where the resource-hogging stems from. The mere fact it's a chromium-based browser has no impact on the matter. Lastly, power users literally DO notice resource-intensive applications -- they'll even be familiar with tools and widgets that expose those measurements the way only a power-user would! General consumers, however, would simply remark that their rig is sluggish and probably outdated and blindly upgrade to whatever the salespeople are hawking at the local computer store. General consumers wouldn't even upgrade their existing computer cuz they wouldn't know how to!
  • Recent Achievements

    • First Post
      Celilo earned a badge
      First Post
    • One Year In
      K.I.S.S. earned a badge
      One Year In
    • Week One Done
      solidox earned a badge
      Week One Done
    • Dedicated
      solidox earned a badge
      Dedicated
    • Week One Done
      Devesh Beri earned a badge
      Week One Done
  • Popular Contributors

    1. 1
      +primortal
      442
    2. 2
      ATLien_0
      166
    3. 3
      +FloatingFatMan
      151
    4. 4
      Nick H.
      66
    5. 5
      macoman
      63
  • Tell a friend

    Love Neowin? Tell a friend!