maximum number of switches and bandwidth limits


Recommended Posts

hey guys, i'm doing a bit of research on the topic of connecting a lot of switches together, are their any issues in doing this besides bandwidth issues?

Cisco SGE2010 48-port Gigabit Switch

I've read that daisy chaining them is a no no, but what about if i have a central switch and hang say 20 switches off gigabit ports? What sort of switch would be ideal in this situation?

the network theoretically would be serving around 832 wired users.

No you would not daisy chain switches together for that many nodes.. A star setup would be used -- core switch with switches off it, you could daisy chain off of that if you wanted for some sections.

You would most likely be creating segments, ie vlanning you prob do not want 832 computers all on the same broadcast domain, etc.

Your prob looking something like a 6509 for the core.

yep will be vlanning

there are 832 ethernet connected users across 4 buildings with 2 floors per building at this site, i also have 2 other much smaller sites to contend with and no budget woot woot :p

left out a lot of detail as this is an assignment and i only needed that specific information :p

thanks for the quick reply

  • 2 weeks later...

Dude,

There is cascading restriction with hubs/repeaters, i.e, there should not be more than 4 hubs between any two stations.

However with switches, in theory there is no cascade restriction. As switches are becoming increasingly intelligent and with switching method such as Store-and-Forward & per-port buffering you can connect many many switches in a cascade. (daisy chaining switches is big NO NO).

In multiple layers of cascade, the latency will increase and bandwidth will reduce as you go deeper in cascade, and you are accessing a station which is connected to the root switch.

But for this problem, instead of using top-bottom approach, you should use bottom-up approach. I.E., you start by how many stations you want to connect (overall size of network), how much traffic they are going to generate (application type, response time, packet size, # of packets transmitted), can you segment/group the stations based on their traffic pattern (vlan, port density). This will give you the basic technical requirement for creating a network. Once you have this or atleast have a rough realistic idea then go to Cisco web and look at various solution, especially Multi-Layer Switching and Fabric Switching. Concepts you need to look at are Core block and Switch Block.

Something wrong with using a stack cable? :unsure:

  On 09/05/2010 at 12:27, .hasan said:

yep will be vlanning

there are 832 ethernet connected users across 4 buildings with 2 floors per building at this site, i also have 2 other much smaller sites to contend with and no budget woot woot :p

left out a lot of detail as this is an assignment and i only needed that specific information :p

thanks for the quick reply

I didn't see this bit, sorry :D

So, we have 8 floors to cover? and do we have WAN connectivity (I'm assuming we do...) I'd put 3750 stacks in each building on each floor - you can easily have 5 3750 switches in a stack so this won't be an issue, nor will bandwidth with stacking cables :) the smaller sites meh, just throw in a 2960 or something equally useful - no need for a stack at smaller sites...

WAN connectivity will connect them all together, ideally you want some core switching, however, your issue here would be placement as we don't know how all builds are laid out etc and we can't just go putting 6500s everywhere :p maybe a 4500 could do, again you've no budget so... :blink:

It has been a while since i have come back to this thread, i do apologize but i have made a lot of progress since i posted this thread :)

  On 23/05/2010 at 18:05, Sn00pY said:

Something wrong with using a stack cable? :unsure:

I didn't see this bit, sorry :D

So, we have 8 floors to cover? and do we have WAN connectivity (I'm assuming we do...) I'd put 3750 stacks in each building on each floor - you can easily have 5 3750 switches in a stack so this won't be an issue, nor will bandwidth with stacking cables :) the smaller sites meh, just throw in a 2960 or something equally useful - no need for a stack at smaller sites...

WAN connectivity will connect them all together, ideally you want some core switching, however, your issue here would be placement as we don't know how all builds are laid out etc and we can't just go putting 6500s everywhere :p maybe a 4500 could do, again you've no budget so... :blink:

We sure do have wan connectivity! 300Mbps/300Mbps with 6 public ip addresses to use across the 3 sites!

I've decided to stack 3x 3750's in each building, on each floor. The core switch is a 4900M

Atm i'm trying to work out how to make use of these additional ip addresses. I'm thinking of using one at the main campus to host a www server, but i haven't really found any good resources on the subject. From what i understand i need a switch before my first router? I could be way off on that one lol.

On the internal network I have 5 vlan's. The servers are on vlan 100, buildings a,b,c and d are on 200,300,400 and 500, they are all on different subnets. I'm using ip helper so i only need the one dhcp server.

I have a packet tracer design running, had to make do with it's limitations but it gives more than enough information coupled with my visio diagram and some project management stuff that i'm still working on to explain what the hell i'm on about :laugh:

I'm really pushing for a High Distinction on this one, I have put a lot of hours into it so far lol

Thanks to everyone for all the help, i still got a long way to go with the whole cisco scene but i think i'll have to invest some more time/money and attempt some certifications in the near future :)

The advantage of using 3750s is they can actually terminate and work a s router - we use 3750s as CEs for 1Gbit connections - so... you are fine :) the 3750 is a L3 Switch :)

Depending on the fibre coming in, or the connection coming in, you may need something like a 2960 to act as "mux" but it's dependant on the fibre/termination.

SFP in the 3750 - fibre in. boom. job done.

this was my teachers method of explaining how i should host a web server on the network, he has experience working in australia's largest telco as a network engineer.

ispe.jpg

another teacher of mine (his from the states, these 2 teachers argue on different points until the cows come home :laugh: )

he told me that, i could do it that way OR (from what i understood) have the www server connected to an interface on the router (customer side) statically assigned, i obviously have no ability to do routing on the isp side but we'll assume it will automagically be done when the connection is provisioned

any opinions?

If your router had a extra interface sure you could do that.. But the method shown with the switch on your side of your border is correct, since they are giving you 14 IPs to work with, you might have other machines in the dmz latter other than just a web server.

Now depending on the ISP, I doubt they would connect you with a glue network like that - the 139 network with a /30 mask

They could just put 1 IP of your /28 range on their router -- and then you could do with the rest how you see fit. Not always a need for a glue network like that.

I would much prefer you put the DMZ on a firewall and not a switch - you can't really make a DMZ on a switch you'll just be doing VLANing - you generally would have a DMZ Switch as a whole unit but hey - It's just a project the security isn't the top issue here I'm guessing.

"you generally would have a DMZ Switch as a whole unit but hey"

That's the way he has it setup in that drawing -- the whole switch is in the dmz, its on that 203/28 network.. His lan is on a private 10 network behind a nat/firewall.

  On 26/05/2010 at 13:45, BudMan said:

"you generally would have a DMZ Switch as a whole unit but hey"

That's the way he has it setup in that drawing -- the whole switch is in the dmz, its on that 203/28 network.. His lan is on a private 10 network behind a nat/firewall.

"I would much prefer you put the DMZ on a firewall and not a switch"

not like you not to read the whole sentence BudMan...

Guess Im just not understanding your point then.. That dmz is not a vlan on the switch from that drawing, the switch looks to be used as method to add ports.

You don't know the feature set of that first CE router -- its could have ACLs on it to only allow specific traffic to the hosts connected to the switch.

And sure you might even subnet that /28 to assign IPs to the dmz, and then the rest to the hosts behind the firewal/nat, etc.

As he said his 2 teachers discuss the different methods, there are always multiple ways to setup something - quite often will depend on what hardware you have on hand, and budget, etc.

Would you want a full firewall device in front of your dmz hosts, and then anther between the dmz and your private network -- sure would be a nice setup.

But sure I agree with you something more like this might be better.

post-14624-12748920434033.jpg

I hear you -- but his drawing would work too. Shoot the DMZ/Firewall segment could be done with 1 device if he had the interfaces on it.

post-14624-12748928475058.jpg

As long as his "dmz" is isolated from his private network -- I would consider it a dmz, etc. So lots of ways to set it up.

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • The 2025 Complete Splunk Beginner Bundle is now 25% off by Steven Parker Today's highlighted deal comes via Neowin Deals store, where you can save 75% on The 2025 Complete Splunk Beginner Bundle. Splunk is a powerful data platform used to gather information from multiple sources and index it for efficient access. You can then use collected data to create visualizations, analytics, and a variety of automated and security-related functions. With its web-style interface, Splunk is easy to use and is utilized by many companies worldwide. What's Included: Splunk Fundamentals for Effective Management of SOC and SIEM Oak Academy 38 Lessons (3.5h) Lifetime $20.00 Value Splunk | Splunk Core Certified User Certification Prep Lab Oak Academy, 63 Lessons (6h),Lifetime, $20.00 Value Splunk | Splunk Core Certified Power User SPLK 1002 Prep Oak Academy, 53 Lessons (5.5h), Lifetime, $20.00 Value Splunk| Splunk Enterprise Certified Admin Certification Prep Oak Academy, 68 Lessons (8.5h), Lifetime, $20.00 Value Requirements Basic understanding of IT and networking concepts Familiarity with Linux and Windows operating systems A computer with internet access for hands-on practice Good to Know Length of time users can access this course: lifetime Access options: desktop or mobile Redemption deadline: redeem your code within 30 days of purchase Experience level required: all levels Certificate of Completion ONLY Updates included Closed captioning NOT available NOT downloadable for offline viewing Learn more about our Lifetime deals here! Lifetime access to this 2025 Complete Splunk Beginner Bundle normally costs $80, but this deal can be yours for just $19.99, that's a saving of $60. For full terms, specifications, and info, click the link below. Get the 2025 Complete Splunk Beginner Bundle for just $19.99 (75% off MSRP: $80) Although priced in U.S. dollars, this deal is available for digital purchase worldwide. We post these because we earn commission on each sale so as not to rely solely on advertising, which many of our readers block. It all helps toward paying staff reporters, servers and hosting costs. Other ways to support Neowin Whitelist Neowin by not blocking our ads Create a free member account to see fewer ads Make a donation to support our day to day running costs Subscribe to Neowin - for $14 a year, or $28 a year for an ad-free experience Disclosure: Neowin benefits from revenue of each sale made through our branded deals site powered by StackCommerce.
    • and you got scammed because 2077 launch its one of the worse thing i ever remember and even to this day the game never reached its potential
    • Basic Auth needs to die especially for anything internet bound and exchange in the office 365 suite is extremely internet bound as the cloud service it is. Microsoft has been announcing it for years now. There is always a balance between security and usability, in this case it should be glaringly obvious.
    • the more they want to charge more the more people won't buy anything at launch and wait until its reduced price or discount, hell i even waited until its free on epic game store. and smoke pass model its not viable and having others to pay 80 dollars to subside it wont help
    • Pandemic of 2020, AKA justification to "print" 10 trillion $$$ and keep the Ponzi scheme alive for another while. Until the next one.
  • Recent Achievements

    • Apprentice
      Wireless wookie went up a rank
      Apprentice
    • Week One Done
      bukro earned a badge
      Week One Done
    • One Year In
      Wulle earned a badge
      One Year In
    • One Month Later
      Wulle earned a badge
      One Month Later
    • One Month Later
      Simmo3D earned a badge
      One Month Later
  • Popular Contributors

    1. 1
      +primortal
      558
    2. 2
      ATLien_0
      258
    3. 3
      +FloatingFatMan
      182
    4. 4
      Michael Scrip
      124
    5. 5
      Steven P.
      100
  • Tell a friend

    Love Neowin? Tell a friend!