Modernizing the old rule
3.4.3.2 Modernizing the old rule
This old rule has merit, but it needs to be modernized. It is still a good idea to keep broadcast traffic off of the WAN, for exactly the same reasons that it was important 10 to 15 years ago. However, two current trends in networking are leading network designers away from universally bridging throughout a campus. First, many more devices are being connected to the network than there ever were in the past. Second, certain changes in network technology have changed the way things scale. Let me explain what I mean by this second point. In the old-style network of Figure 3-11 , user workstations were connected to shared 10Mbps Ethernet segments. All segments were interconnected via a 100Mbps FDDI ring. If you have a dozen active devices sharing a 10Mbps Ethernet segment, the collision overhead limits the total throughput on the segment to somewhere between 3 and 5Mbps in practice. So each of these dozen devices can use a steady state bandwidth of a few hundred kbps and a burst capacity of a fewMbps. Today it is common to connect end devices directly to 100Mbps Fast Ethernet switch ports, and backbone speeds are several Gbps. Thus, each station has access to a steady state bandwidth of 100Mbps sending and receiving simultaneously. Each station is therefore able to use 200Mbps of backbone capacity, with the lack of local contention increasing the tendency for routine traffic to burst from very low to very high instantaneous loads. This is almost a factor of 1000 higher than in the older style of network, but our backbone speed has only increased by a factor of between 10 and 100. In other words, each station is now able to make a much larger impact on the functioning of the network as a whole. This is why traffic prioritization and shaping flattening out the bursts have become so much more critical in network design. If more cars are on the road, there is a limit to how much the flow rate can be improved by just increasing the number of lanes. New methods of traffic control are needed as well.3.5 Hierarchical Design
Whats really valuable about the old-style design shown in Figure 3-11 is that it leads to the useful and practical concept of hierarchical network design. Figure 3-12 and Figure 3-13 show what a hierarchical network design is and how it works. At this point, however, whether this network is basically bridged or routed is still questionable.Parts
» Money Geography Business Requirements
» Installed Base Bandwidth Business Requirements
» Layer 1 Layer 2 The Seven Layers
» Layer 3 Layer 4 The Seven Layers
» Layer 5 Layer 6 Layer 7 The Seven Layers
» Routing Versus Bridging Networking Objectives
» Top-Down Design Philosophy Networking Objectives
» Failure Is a Reliability Issue
» Performance Is a Reliability Issue
» Guidelines for Implementing Redundancy
» Redundancy by Protocol Layer
» Multiple Simultaneous Failures Complexity and Manageability
» Always let network equipment perform network functions Intrinsic versus external automation
» Examples of automated fault recovery
» Fault tolerance through load balancing
» Avoid manual fault-recovery systems
» Isolating Single Points of Failure
» Multiple simultaneous failures Predicting Your Most Common Failures
» Combining MTBF values Predicting Your Most Common Failures
» Traffic Anomalies Failure Modes
» Software Problems Human Error
» Ring topology Basic Concepts
» Star topology Basic Concepts
» Mesh Topology Basic Concepts
» Spanning Tree eliminates loops Spanning Tree activates backup links and devices
» Protocol-Based VLAN Systems VLANs
» Why collapse a backbone? Backbone capacity
» Backbone redundancy Collapsed Backbone
» Trunk capacity Distributed Backbone
» Trunk fault tolerance Distributed Backbone
» Ancient history Switching Versus Routing
» One-armed routers and Layer 3 switches
» Filtering for security Filtering
» Filtering for application control
» Containing broadcasts Switching and Bridging Strategies
» Redundancy in bridged networks Filtering
» Trunk design VLAN-Based Topologies
» VLAN Distribution Areas VLAN-Based Topologies
» Sizing VLAN Distribution Areas
» Multiple Connections Implementing Reliability
» Routers in the Distribution Level Routers in Both the Core and Distribution Levels
» Connecting Remote Sites Large-Scale LAN Topologies
» General Comments on Large-Scale Topology
» Cost Efficiency Selecting Appropriate LAN Technology
» Installed Base Maintainability Selecting Appropriate LAN Technology
» Ethernet addresses Ethernet Framing Standards
» Collision Detection Ethernet and Fast Ethernet
» Transceivers Ethernet and Fast Ethernet
» FDDI Local Area Network Technologies
» Wireless Local Area Network Technologies
» Firewalls and Gateways Local Area Network Technologies
» Horizontal Cabling Structured Cabling
» Vertical Cabling Structured Cabling
» Network Address Translation IP
» Multiple Subnet Broadcast IP
» Unregistered Addresses General IP Design Strategies
» Easily summarized ranges of addresses
» Sufficient capacity in each range
» Standard subnet masks for common uses
» The Default Gateway Question
» Types of Dynamic Routing Protocols
» Split Horizons in RIP Variable Subnet Masks
» Basic Functionality IGRP and EIGRP
» Active and Stuck-in-Active Routes
» Interconnecting Autonomous Systems IGRP and EIGRP
» Interconnecting Autonomous Systems OSPF
» Redistributing with Other Routing Protocols
» IP Addressing Schemes for OSPF OSPF Costs
» Autonomous System Numbers BGP
» IPX Addressing Schemes General IPX Design Strategies
» RIP and SAP Accumulation Zones
» Using Equipment Features Effectively
» Hop Counts Elements of Efficiency
» Bottlenecks and Congestion Elements of Efficiency
» Filtering Elements of Efficiency
» QoS Basics Quality of Service and Traffic Shaping
» Layer 2 and Layer 3 QoS Buffering and Queuing
» Assured Forwarding in Differentiated Services
» Traffic Shaping Quality of Service and Traffic Shaping
» Defining Traffic Types Quality of Service and Traffic Shaping
» RSVP Quality of Service and Traffic Shaping
» Network-Design Considerations Quality of Service and Traffic Shaping
» Configuration Management Network-Management Components
» Fault Management Performance Management Security Management
» Designing a Manageable Network
» VLAN structures Architectural Problems
» LAN extension Architectural Problems
» Redundancy features Architectural Problems
» Out-of-Band Management Techniques Management Problems
» Multicast Addressing IP Multicast Networks
» Multicast Services IP Multicast Networks
» Group Membership IP Multicast Networks
» Multicast administrative zones Network-Design Considerations for Multicast Networks
» Multicast and QoS Network-Design Considerations for Multicast Networks
Show more