Cascading Switches. Will it affect performance?How to throttle speed for a particular computer with high activity?What would be an optimal design for linking multiple switches?Limit Internal LAN Traffic and Internet Traffic - Managed Switch?Trouble Cascading VLANs Cisco SwitchesCan squeezing an RJ11 cable affect network performance?Inconsistent Network Speeds by PortCascading a switch interface to another switchconfig of cisco 2950 switchesDo unmanaged switches honour QoS priorities set by managed switches?
What is "industrial ethernet"?
JSON selector class in Python
Can there be an UN resolution to remove a country from the UNSC?
Should developer taking test phones home or put in office?
What's the difference between a deep fryer and a chip pan?
Appropriate way to say "see you tomorrow" when meeting online
Why does Linux list NVMe drives as /dev/nvme0 instead of /dev/sda?
Is it illegal to withhold someone's passport and green card in California?
How to make clear to people I don't want to answer their "Where are you from?" question?
Run specific apex tests during "sfdx force:source:deploy"
Unusual mail headers, evidence of an attempted attack. Have I been pwned?
What can I do with a research project that is my university’s intellectual property?
Understanding the reasoning of the woman who agreed with King Solomon to "cut the baby in half"
What is the origin of Scooby-Doo's name?
Why do all the teams that I have worked with always finish a sprint without completion of all the stories?
Apply brace expansion in "reverse order"
Can Ogre clerics use Purify Food and Drink on humanoid characters?
Is a single radon-daughter atom in air a solid?
Loss of power when I remove item from the outlet
When to remove insignificant variables?
Suggested order for Amazon Prime Doctor Who series
Are all instances of trolls turning to stone ultimately references back to Tolkien?
How does the spell Remove Curse interact with a Sword of Vengeance?
Do I have to explain the mechanical superiority of the player-character within the fiction of the game?
Cascading Switches. Will it affect performance?
How to throttle speed for a particular computer with high activity?What would be an optimal design for linking multiple switches?Limit Internal LAN Traffic and Internet Traffic - Managed Switch?Trouble Cascading VLANs Cisco SwitchesCan squeezing an RJ11 cable affect network performance?Inconsistent Network Speeds by PortCascading a switch interface to another switchconfig of cisco 2950 switchesDo unmanaged switches honour QoS priorities set by managed switches?
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;
I am really new to large scale networking and all I know is the basics. I will be doing a network for a huge workspace consisting of multiple offices. There will be a total of 308 Clients, with at least 12 clients per office.
I am following this diagram:
I will be using CISCO SG500-28 Managed Switch as my main switch, where another switch CISCO SG250-18 Managed Switch will tap in.
For ease of installation, I plan to use CISCO SG250-18 Managed Switch for every part or a sector, then Desktop Switches will connect to this.
My question:
- Is this okay?
- Does a cascade of switches affect overall performance?
- Can the last node obtain gigabit file transfer speeds from the other nodes?
- Can the Main Switch handle every client?
cisco switch network design
add a comment |
I am really new to large scale networking and all I know is the basics. I will be doing a network for a huge workspace consisting of multiple offices. There will be a total of 308 Clients, with at least 12 clients per office.
I am following this diagram:
I will be using CISCO SG500-28 Managed Switch as my main switch, where another switch CISCO SG250-18 Managed Switch will tap in.
For ease of installation, I plan to use CISCO SG250-18 Managed Switch for every part or a sector, then Desktop Switches will connect to this.
My question:
- Is this okay?
- Does a cascade of switches affect overall performance?
- Can the last node obtain gigabit file transfer speeds from the other nodes?
- Can the Main Switch handle every client?
cisco switch network design
4
Don't have time for a full answer but I would never consider a Small Business series device as a core switch. Also note that the SG500 is end of sale
– JFL
Jun 5 at 13:21
1
Based on experience and testing, Cisco recommends no more than a 20:1 access to distribution bandwidth ratio. The access switches should connect to distribution switches, not each other, and you should not have access interfaces on the distribution switch. The 160 meter distance is no problem for fiber connections between the distribution and access switches, and the access switches can be placed close enough to the hosts for copper cabling.
– Ron Maupin♦
Jun 5 at 16:36
Outside the network aspect of the question, it seems like you've been given a budget for this network that is too small to build a network that will fulfill the needs and limitations of the situation. Unless this is a very low budget organization that can operate with a very poor quality network, you should alert those who write the checks that they will need to invest more money to get an acceptable network. No offense, one of the things they will need to spend money on is a consultant who can design and build an effective network.
– Todd Wilcox
Jun 6 at 17:00
add a comment |
I am really new to large scale networking and all I know is the basics. I will be doing a network for a huge workspace consisting of multiple offices. There will be a total of 308 Clients, with at least 12 clients per office.
I am following this diagram:
I will be using CISCO SG500-28 Managed Switch as my main switch, where another switch CISCO SG250-18 Managed Switch will tap in.
For ease of installation, I plan to use CISCO SG250-18 Managed Switch for every part or a sector, then Desktop Switches will connect to this.
My question:
- Is this okay?
- Does a cascade of switches affect overall performance?
- Can the last node obtain gigabit file transfer speeds from the other nodes?
- Can the Main Switch handle every client?
cisco switch network design
I am really new to large scale networking and all I know is the basics. I will be doing a network for a huge workspace consisting of multiple offices. There will be a total of 308 Clients, with at least 12 clients per office.
I am following this diagram:
I will be using CISCO SG500-28 Managed Switch as my main switch, where another switch CISCO SG250-18 Managed Switch will tap in.
For ease of installation, I plan to use CISCO SG250-18 Managed Switch for every part or a sector, then Desktop Switches will connect to this.
My question:
- Is this okay?
- Does a cascade of switches affect overall performance?
- Can the last node obtain gigabit file transfer speeds from the other nodes?
- Can the Main Switch handle every client?
cisco switch network design
cisco switch network design
edited Jun 6 at 12:21
Mike Pennington
27.7k1168140
27.7k1168140
asked Jun 5 at 12:50
Aaron AlfonsoAaron Alfonso
412
412
4
Don't have time for a full answer but I would never consider a Small Business series device as a core switch. Also note that the SG500 is end of sale
– JFL
Jun 5 at 13:21
1
Based on experience and testing, Cisco recommends no more than a 20:1 access to distribution bandwidth ratio. The access switches should connect to distribution switches, not each other, and you should not have access interfaces on the distribution switch. The 160 meter distance is no problem for fiber connections between the distribution and access switches, and the access switches can be placed close enough to the hosts for copper cabling.
– Ron Maupin♦
Jun 5 at 16:36
Outside the network aspect of the question, it seems like you've been given a budget for this network that is too small to build a network that will fulfill the needs and limitations of the situation. Unless this is a very low budget organization that can operate with a very poor quality network, you should alert those who write the checks that they will need to invest more money to get an acceptable network. No offense, one of the things they will need to spend money on is a consultant who can design and build an effective network.
– Todd Wilcox
Jun 6 at 17:00
add a comment |
4
Don't have time for a full answer but I would never consider a Small Business series device as a core switch. Also note that the SG500 is end of sale
– JFL
Jun 5 at 13:21
1
Based on experience and testing, Cisco recommends no more than a 20:1 access to distribution bandwidth ratio. The access switches should connect to distribution switches, not each other, and you should not have access interfaces on the distribution switch. The 160 meter distance is no problem for fiber connections between the distribution and access switches, and the access switches can be placed close enough to the hosts for copper cabling.
– Ron Maupin♦
Jun 5 at 16:36
Outside the network aspect of the question, it seems like you've been given a budget for this network that is too small to build a network that will fulfill the needs and limitations of the situation. Unless this is a very low budget organization that can operate with a very poor quality network, you should alert those who write the checks that they will need to invest more money to get an acceptable network. No offense, one of the things they will need to spend money on is a consultant who can design and build an effective network.
– Todd Wilcox
Jun 6 at 17:00
4
4
Don't have time for a full answer but I would never consider a Small Business series device as a core switch. Also note that the SG500 is end of sale
– JFL
Jun 5 at 13:21
Don't have time for a full answer but I would never consider a Small Business series device as a core switch. Also note that the SG500 is end of sale
– JFL
Jun 5 at 13:21
1
1
Based on experience and testing, Cisco recommends no more than a 20:1 access to distribution bandwidth ratio. The access switches should connect to distribution switches, not each other, and you should not have access interfaces on the distribution switch. The 160 meter distance is no problem for fiber connections between the distribution and access switches, and the access switches can be placed close enough to the hosts for copper cabling.
– Ron Maupin♦
Jun 5 at 16:36
Based on experience and testing, Cisco recommends no more than a 20:1 access to distribution bandwidth ratio. The access switches should connect to distribution switches, not each other, and you should not have access interfaces on the distribution switch. The 160 meter distance is no problem for fiber connections between the distribution and access switches, and the access switches can be placed close enough to the hosts for copper cabling.
– Ron Maupin♦
Jun 5 at 16:36
Outside the network aspect of the question, it seems like you've been given a budget for this network that is too small to build a network that will fulfill the needs and limitations of the situation. Unless this is a very low budget organization that can operate with a very poor quality network, you should alert those who write the checks that they will need to invest more money to get an acceptable network. No offense, one of the things they will need to spend money on is a consultant who can design and build an effective network.
– Todd Wilcox
Jun 6 at 17:00
Outside the network aspect of the question, it seems like you've been given a budget for this network that is too small to build a network that will fulfill the needs and limitations of the situation. Unless this is a very low budget organization that can operate with a very poor quality network, you should alert those who write the checks that they will need to invest more money to get an acceptable network. No offense, one of the things they will need to spend money on is a consultant who can design and build an effective network.
– Todd Wilcox
Jun 6 at 17:00
add a comment |
5 Answers
5
active
oldest
votes
Is this okay?
Hardly ideal. I assume since you are using cheap, obsolete switches, that you're on a very limited budget. You'll have to weigh the factors below.
Does a cascade of switches affect overall performance?
The problem with cascading switches is that you are concentrating traffic on the links to upstream switches. For example, the last switch has 26 x 1G ports. So if more than 10 PCs try to download something at the same time, you've maxed out your capacity on that switch. All the upstream switches will also be maxed out before you even consider the PCs attached to them.
Can the last node obtain gigabit file transfer speeds from the other
nodes?
Yes, but only if everyone else is not sending any traffic. Otherwise, no.
Can the Main Switch handle every client?
The main switch has the same problem: your servers are plugged into 1G ports. So that limits how much data they can send/receive. Everyone is competing for a piece of that 1G bandwidth.
Now, all this may be OK if all you're doing is reading and editing Word documents. But if you're doing some sort of transactional processing (payments, reservations, etc.) for a business, this network design may not be sufficient. We can't answer that question for you, and even if we could, it would just be our (my) opinion, which is off-topic here.
Hi! Really appreciate the answer. What could be a better approach to this?
– Aaron Alfonso
Jun 5 at 14:27
4
Try to connect all switches directly to the core switch. Use a core switch with 10G ports for your servers. And if this is a business, buy current switches with a support contract.
– Ron Trunk
Jun 5 at 14:32
The reason why it has to be sectored is because of the placement of the clients. The farthest client is roughly around 160M from the core switch. So my idea, rather than going directly to switch at 160M, I'd go for the nearer sub-switch.
– Aaron Alfonso
Jun 5 at 14:39
3
Can you use fiber connections instead of copper for that switch? How many clients are that far away?
– Ron Trunk
Jun 5 at 14:47
I have 4 sectors. Each sector will at least have 70 clients. If I may ask, if 2 nodes is downloading at 100mbps, the uplink of that certain switch is at 200mbps?
– Aaron Alfonso
Jun 5 at 14:56
|
show 1 more comment
There are several reasons for not chaining switches, all of which relate to performance with the parameters effective throughput, resilience, latency.
As Ron has aptly pointed out, more aggregation means more bandwidth competition - all users behind a core switch port compete for the bandwidth of that single port. In another perspective, the longer a potential path in your network is and the more ports are involved, the more total bandwidth is bound by a flow along that path. To keep paths short, a tree is a better approach than a chain.
Some might argue that latency increases when more L2 hops are necessary - while this is true it only becomes noticeable with longer chains. A gigabit switch has a forwarding delay of at most 10 µs (usually much less), so for a chain of 2 or 3 switches it doesn't matter too much unless you're running very latency-sensitive applications.
Additionally, chaining switches introduces more single points of failure and increases their impact - if reliability is a concern. When a middle switch or its link fails, all switches and users behind it are separated from the network.
Most often, there's not only a single deployed cable from the core cabinet to the next. So, use those to create direct links to the core from more remote cabinets. Instead of chaining the switches, try to cross-patch a remote switch, so that it can connect directly to the core.
add a comment |
This design is ok only if you are willing to accept a single point of failure for all office switches, web farm, sql, file-server and internet.
This design is ok only if you are willing to accept periodic spanning-tree hits every time links flap. By the way, the Cisco SG series doesn't support rapid-pvst, so you have to live with one spanning-tree for all vlans (I'm assuming you're using vlans, no?).
Honestly it's going to get worse if you add redundancy to this 100% switched network because then you have more spanning-tree to deal with. But I'm guessing nobody hired you to be a network engineer... you seem to be a coder who is likely moonlighting as a network guy. Thus, bask in the plausible deniability of the bad design!
Improve this design by adding redundancy and some routed segmentation between the offices. Keep in mind that if you do routing, you'll need to renumber the segments that are behind a router; you'll also need something that supports SVI's or dedicated routed interfaces.
A routed hub and spoke topology would be better but it require more fiber density than you can get on the SG series, and it would require running fiber (which may not have been done yet). It would also require things that support dynamic routing on fiber interfaces. SG series switches have a rather limited routing table size.
Is this okay?
I wouldn't do it that way, but many things depend on requirements. If your employer is really cheap, maybe it's the best you can do.
Does a cascade of switches affect overall performance?
Others addressed over subscription in this topology; then again if your uplinks are 10% utilitized all day long it wont matter. That said, you can't scale a design like this very well.
Can the last node obtain gigabit file transfer speeds from the other nodes?
As long as there isn't congestion along common paths.
Can the Main Switch handle every client?
It depends on how much load your clients are generating.
Honestly I'd be more worried about the questions you haven't asked... I elaborated on some of those above.
BTW, in a setup like this where you've run copper to every switch in the topology, uplink ports are not necessarily obvious unless you standardize that "the first two ports are my uplinks" (or something like that). You might not care now, but wait until you get your first broadcast storm and have to track down where it's coming from. Trust me... be sure it's easy to find the uplinks. It's also good to label your uplinks with source / destination on both sides.
add a comment |
Additional comments:
Remember to allow for growth too - no new switch should be installed fully populated. There should always be some spare ports. I've seen recommendations from 50% full to at least 20% empty ports. That includes your core switch stack.
Stack? Yes if your budget stretches that far, the core switch should be a stack of two switches and every server has a redundant channel bond. And each link out to distribution switches should be a pair as well. Of course this adds to the capital costs significantly.
Also remember to look ahead - talk to management and see if there are any plans for more space, or additional offices/desks or cameras, phones that need POE, the future uses of wireless, guest wireless, additional Access points, and so on. All this should be factored into a long-term plan.
UPS - your servers and core switches should be UPSed - and monitored so everything shuts down cleanly.
Training - you and others may need additional training for this new switching. Don't hesitate to include that as a cost.
Depending on your environment, and the "cost" of an outage should indicate whether you beef up the redundancy or cheap it, being aware of the risks.
add a comment |
When you design a network, You need to consider it in two ways.
- Technical
- Business
Specially your business can have critical functionalities and non critical functionalities. Your technical design should be fulfill their business requirement and if there is no business requirement means, there is no requirement for Network as well.
According to that your cascade design may create some draw back. If any failure on upstream switch, It will affect to all device which connected with It. If you want solve that issue you can config stack on upstream switches, but SG500 switches are not supported stacking. Additionally VSS also support for improve redundancy.
When you design a Network you should consider about about below point.
- Simplicity
- Redundancy
- Security
Based on your requirement, this may be okay or not okay. Check with your business and technical requirement.
add a comment |
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "496"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f59619%2fcascading-switches-will-it-affect-performance%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
5 Answers
5
active
oldest
votes
5 Answers
5
active
oldest
votes
active
oldest
votes
active
oldest
votes
Is this okay?
Hardly ideal. I assume since you are using cheap, obsolete switches, that you're on a very limited budget. You'll have to weigh the factors below.
Does a cascade of switches affect overall performance?
The problem with cascading switches is that you are concentrating traffic on the links to upstream switches. For example, the last switch has 26 x 1G ports. So if more than 10 PCs try to download something at the same time, you've maxed out your capacity on that switch. All the upstream switches will also be maxed out before you even consider the PCs attached to them.
Can the last node obtain gigabit file transfer speeds from the other
nodes?
Yes, but only if everyone else is not sending any traffic. Otherwise, no.
Can the Main Switch handle every client?
The main switch has the same problem: your servers are plugged into 1G ports. So that limits how much data they can send/receive. Everyone is competing for a piece of that 1G bandwidth.
Now, all this may be OK if all you're doing is reading and editing Word documents. But if you're doing some sort of transactional processing (payments, reservations, etc.) for a business, this network design may not be sufficient. We can't answer that question for you, and even if we could, it would just be our (my) opinion, which is off-topic here.
Hi! Really appreciate the answer. What could be a better approach to this?
– Aaron Alfonso
Jun 5 at 14:27
4
Try to connect all switches directly to the core switch. Use a core switch with 10G ports for your servers. And if this is a business, buy current switches with a support contract.
– Ron Trunk
Jun 5 at 14:32
The reason why it has to be sectored is because of the placement of the clients. The farthest client is roughly around 160M from the core switch. So my idea, rather than going directly to switch at 160M, I'd go for the nearer sub-switch.
– Aaron Alfonso
Jun 5 at 14:39
3
Can you use fiber connections instead of copper for that switch? How many clients are that far away?
– Ron Trunk
Jun 5 at 14:47
I have 4 sectors. Each sector will at least have 70 clients. If I may ask, if 2 nodes is downloading at 100mbps, the uplink of that certain switch is at 200mbps?
– Aaron Alfonso
Jun 5 at 14:56
|
show 1 more comment
Is this okay?
Hardly ideal. I assume since you are using cheap, obsolete switches, that you're on a very limited budget. You'll have to weigh the factors below.
Does a cascade of switches affect overall performance?
The problem with cascading switches is that you are concentrating traffic on the links to upstream switches. For example, the last switch has 26 x 1G ports. So if more than 10 PCs try to download something at the same time, you've maxed out your capacity on that switch. All the upstream switches will also be maxed out before you even consider the PCs attached to them.
Can the last node obtain gigabit file transfer speeds from the other
nodes?
Yes, but only if everyone else is not sending any traffic. Otherwise, no.
Can the Main Switch handle every client?
The main switch has the same problem: your servers are plugged into 1G ports. So that limits how much data they can send/receive. Everyone is competing for a piece of that 1G bandwidth.
Now, all this may be OK if all you're doing is reading and editing Word documents. But if you're doing some sort of transactional processing (payments, reservations, etc.) for a business, this network design may not be sufficient. We can't answer that question for you, and even if we could, it would just be our (my) opinion, which is off-topic here.
Hi! Really appreciate the answer. What could be a better approach to this?
– Aaron Alfonso
Jun 5 at 14:27
4
Try to connect all switches directly to the core switch. Use a core switch with 10G ports for your servers. And if this is a business, buy current switches with a support contract.
– Ron Trunk
Jun 5 at 14:32
The reason why it has to be sectored is because of the placement of the clients. The farthest client is roughly around 160M from the core switch. So my idea, rather than going directly to switch at 160M, I'd go for the nearer sub-switch.
– Aaron Alfonso
Jun 5 at 14:39
3
Can you use fiber connections instead of copper for that switch? How many clients are that far away?
– Ron Trunk
Jun 5 at 14:47
I have 4 sectors. Each sector will at least have 70 clients. If I may ask, if 2 nodes is downloading at 100mbps, the uplink of that certain switch is at 200mbps?
– Aaron Alfonso
Jun 5 at 14:56
|
show 1 more comment
Is this okay?
Hardly ideal. I assume since you are using cheap, obsolete switches, that you're on a very limited budget. You'll have to weigh the factors below.
Does a cascade of switches affect overall performance?
The problem with cascading switches is that you are concentrating traffic on the links to upstream switches. For example, the last switch has 26 x 1G ports. So if more than 10 PCs try to download something at the same time, you've maxed out your capacity on that switch. All the upstream switches will also be maxed out before you even consider the PCs attached to them.
Can the last node obtain gigabit file transfer speeds from the other
nodes?
Yes, but only if everyone else is not sending any traffic. Otherwise, no.
Can the Main Switch handle every client?
The main switch has the same problem: your servers are plugged into 1G ports. So that limits how much data they can send/receive. Everyone is competing for a piece of that 1G bandwidth.
Now, all this may be OK if all you're doing is reading and editing Word documents. But if you're doing some sort of transactional processing (payments, reservations, etc.) for a business, this network design may not be sufficient. We can't answer that question for you, and even if we could, it would just be our (my) opinion, which is off-topic here.
Is this okay?
Hardly ideal. I assume since you are using cheap, obsolete switches, that you're on a very limited budget. You'll have to weigh the factors below.
Does a cascade of switches affect overall performance?
The problem with cascading switches is that you are concentrating traffic on the links to upstream switches. For example, the last switch has 26 x 1G ports. So if more than 10 PCs try to download something at the same time, you've maxed out your capacity on that switch. All the upstream switches will also be maxed out before you even consider the PCs attached to them.
Can the last node obtain gigabit file transfer speeds from the other
nodes?
Yes, but only if everyone else is not sending any traffic. Otherwise, no.
Can the Main Switch handle every client?
The main switch has the same problem: your servers are plugged into 1G ports. So that limits how much data they can send/receive. Everyone is competing for a piece of that 1G bandwidth.
Now, all this may be OK if all you're doing is reading and editing Word documents. But if you're doing some sort of transactional processing (payments, reservations, etc.) for a business, this network design may not be sufficient. We can't answer that question for you, and even if we could, it would just be our (my) opinion, which is off-topic here.
edited Jun 5 at 19:08
user56700
1,3071311
1,3071311
answered Jun 5 at 13:36
Ron TrunkRon Trunk
43.9k34193
43.9k34193
Hi! Really appreciate the answer. What could be a better approach to this?
– Aaron Alfonso
Jun 5 at 14:27
4
Try to connect all switches directly to the core switch. Use a core switch with 10G ports for your servers. And if this is a business, buy current switches with a support contract.
– Ron Trunk
Jun 5 at 14:32
The reason why it has to be sectored is because of the placement of the clients. The farthest client is roughly around 160M from the core switch. So my idea, rather than going directly to switch at 160M, I'd go for the nearer sub-switch.
– Aaron Alfonso
Jun 5 at 14:39
3
Can you use fiber connections instead of copper for that switch? How many clients are that far away?
– Ron Trunk
Jun 5 at 14:47
I have 4 sectors. Each sector will at least have 70 clients. If I may ask, if 2 nodes is downloading at 100mbps, the uplink of that certain switch is at 200mbps?
– Aaron Alfonso
Jun 5 at 14:56
|
show 1 more comment
Hi! Really appreciate the answer. What could be a better approach to this?
– Aaron Alfonso
Jun 5 at 14:27
4
Try to connect all switches directly to the core switch. Use a core switch with 10G ports for your servers. And if this is a business, buy current switches with a support contract.
– Ron Trunk
Jun 5 at 14:32
The reason why it has to be sectored is because of the placement of the clients. The farthest client is roughly around 160M from the core switch. So my idea, rather than going directly to switch at 160M, I'd go for the nearer sub-switch.
– Aaron Alfonso
Jun 5 at 14:39
3
Can you use fiber connections instead of copper for that switch? How many clients are that far away?
– Ron Trunk
Jun 5 at 14:47
I have 4 sectors. Each sector will at least have 70 clients. If I may ask, if 2 nodes is downloading at 100mbps, the uplink of that certain switch is at 200mbps?
– Aaron Alfonso
Jun 5 at 14:56
Hi! Really appreciate the answer. What could be a better approach to this?
– Aaron Alfonso
Jun 5 at 14:27
Hi! Really appreciate the answer. What could be a better approach to this?
– Aaron Alfonso
Jun 5 at 14:27
4
4
Try to connect all switches directly to the core switch. Use a core switch with 10G ports for your servers. And if this is a business, buy current switches with a support contract.
– Ron Trunk
Jun 5 at 14:32
Try to connect all switches directly to the core switch. Use a core switch with 10G ports for your servers. And if this is a business, buy current switches with a support contract.
– Ron Trunk
Jun 5 at 14:32
The reason why it has to be sectored is because of the placement of the clients. The farthest client is roughly around 160M from the core switch. So my idea, rather than going directly to switch at 160M, I'd go for the nearer sub-switch.
– Aaron Alfonso
Jun 5 at 14:39
The reason why it has to be sectored is because of the placement of the clients. The farthest client is roughly around 160M from the core switch. So my idea, rather than going directly to switch at 160M, I'd go for the nearer sub-switch.
– Aaron Alfonso
Jun 5 at 14:39
3
3
Can you use fiber connections instead of copper for that switch? How many clients are that far away?
– Ron Trunk
Jun 5 at 14:47
Can you use fiber connections instead of copper for that switch? How many clients are that far away?
– Ron Trunk
Jun 5 at 14:47
I have 4 sectors. Each sector will at least have 70 clients. If I may ask, if 2 nodes is downloading at 100mbps, the uplink of that certain switch is at 200mbps?
– Aaron Alfonso
Jun 5 at 14:56
I have 4 sectors. Each sector will at least have 70 clients. If I may ask, if 2 nodes is downloading at 100mbps, the uplink of that certain switch is at 200mbps?
– Aaron Alfonso
Jun 5 at 14:56
|
show 1 more comment
There are several reasons for not chaining switches, all of which relate to performance with the parameters effective throughput, resilience, latency.
As Ron has aptly pointed out, more aggregation means more bandwidth competition - all users behind a core switch port compete for the bandwidth of that single port. In another perspective, the longer a potential path in your network is and the more ports are involved, the more total bandwidth is bound by a flow along that path. To keep paths short, a tree is a better approach than a chain.
Some might argue that latency increases when more L2 hops are necessary - while this is true it only becomes noticeable with longer chains. A gigabit switch has a forwarding delay of at most 10 µs (usually much less), so for a chain of 2 or 3 switches it doesn't matter too much unless you're running very latency-sensitive applications.
Additionally, chaining switches introduces more single points of failure and increases their impact - if reliability is a concern. When a middle switch or its link fails, all switches and users behind it are separated from the network.
Most often, there's not only a single deployed cable from the core cabinet to the next. So, use those to create direct links to the core from more remote cabinets. Instead of chaining the switches, try to cross-patch a remote switch, so that it can connect directly to the core.
add a comment |
There are several reasons for not chaining switches, all of which relate to performance with the parameters effective throughput, resilience, latency.
As Ron has aptly pointed out, more aggregation means more bandwidth competition - all users behind a core switch port compete for the bandwidth of that single port. In another perspective, the longer a potential path in your network is and the more ports are involved, the more total bandwidth is bound by a flow along that path. To keep paths short, a tree is a better approach than a chain.
Some might argue that latency increases when more L2 hops are necessary - while this is true it only becomes noticeable with longer chains. A gigabit switch has a forwarding delay of at most 10 µs (usually much less), so for a chain of 2 or 3 switches it doesn't matter too much unless you're running very latency-sensitive applications.
Additionally, chaining switches introduces more single points of failure and increases their impact - if reliability is a concern. When a middle switch or its link fails, all switches and users behind it are separated from the network.
Most often, there's not only a single deployed cable from the core cabinet to the next. So, use those to create direct links to the core from more remote cabinets. Instead of chaining the switches, try to cross-patch a remote switch, so that it can connect directly to the core.
add a comment |
There are several reasons for not chaining switches, all of which relate to performance with the parameters effective throughput, resilience, latency.
As Ron has aptly pointed out, more aggregation means more bandwidth competition - all users behind a core switch port compete for the bandwidth of that single port. In another perspective, the longer a potential path in your network is and the more ports are involved, the more total bandwidth is bound by a flow along that path. To keep paths short, a tree is a better approach than a chain.
Some might argue that latency increases when more L2 hops are necessary - while this is true it only becomes noticeable with longer chains. A gigabit switch has a forwarding delay of at most 10 µs (usually much less), so for a chain of 2 or 3 switches it doesn't matter too much unless you're running very latency-sensitive applications.
Additionally, chaining switches introduces more single points of failure and increases their impact - if reliability is a concern. When a middle switch or its link fails, all switches and users behind it are separated from the network.
Most often, there's not only a single deployed cable from the core cabinet to the next. So, use those to create direct links to the core from more remote cabinets. Instead of chaining the switches, try to cross-patch a remote switch, so that it can connect directly to the core.
There are several reasons for not chaining switches, all of which relate to performance with the parameters effective throughput, resilience, latency.
As Ron has aptly pointed out, more aggregation means more bandwidth competition - all users behind a core switch port compete for the bandwidth of that single port. In another perspective, the longer a potential path in your network is and the more ports are involved, the more total bandwidth is bound by a flow along that path. To keep paths short, a tree is a better approach than a chain.
Some might argue that latency increases when more L2 hops are necessary - while this is true it only becomes noticeable with longer chains. A gigabit switch has a forwarding delay of at most 10 µs (usually much less), so for a chain of 2 or 3 switches it doesn't matter too much unless you're running very latency-sensitive applications.
Additionally, chaining switches introduces more single points of failure and increases their impact - if reliability is a concern. When a middle switch or its link fails, all switches and users behind it are separated from the network.
Most often, there's not only a single deployed cable from the core cabinet to the next. So, use those to create direct links to the core from more remote cabinets. Instead of chaining the switches, try to cross-patch a remote switch, so that it can connect directly to the core.
edited Jun 6 at 6:28
answered Jun 5 at 17:57
Zac67Zac67
36.7k22672
36.7k22672
add a comment |
add a comment |
This design is ok only if you are willing to accept a single point of failure for all office switches, web farm, sql, file-server and internet.
This design is ok only if you are willing to accept periodic spanning-tree hits every time links flap. By the way, the Cisco SG series doesn't support rapid-pvst, so you have to live with one spanning-tree for all vlans (I'm assuming you're using vlans, no?).
Honestly it's going to get worse if you add redundancy to this 100% switched network because then you have more spanning-tree to deal with. But I'm guessing nobody hired you to be a network engineer... you seem to be a coder who is likely moonlighting as a network guy. Thus, bask in the plausible deniability of the bad design!
Improve this design by adding redundancy and some routed segmentation between the offices. Keep in mind that if you do routing, you'll need to renumber the segments that are behind a router; you'll also need something that supports SVI's or dedicated routed interfaces.
A routed hub and spoke topology would be better but it require more fiber density than you can get on the SG series, and it would require running fiber (which may not have been done yet). It would also require things that support dynamic routing on fiber interfaces. SG series switches have a rather limited routing table size.
Is this okay?
I wouldn't do it that way, but many things depend on requirements. If your employer is really cheap, maybe it's the best you can do.
Does a cascade of switches affect overall performance?
Others addressed over subscription in this topology; then again if your uplinks are 10% utilitized all day long it wont matter. That said, you can't scale a design like this very well.
Can the last node obtain gigabit file transfer speeds from the other nodes?
As long as there isn't congestion along common paths.
Can the Main Switch handle every client?
It depends on how much load your clients are generating.
Honestly I'd be more worried about the questions you haven't asked... I elaborated on some of those above.
BTW, in a setup like this where you've run copper to every switch in the topology, uplink ports are not necessarily obvious unless you standardize that "the first two ports are my uplinks" (or something like that). You might not care now, but wait until you get your first broadcast storm and have to track down where it's coming from. Trust me... be sure it's easy to find the uplinks. It's also good to label your uplinks with source / destination on both sides.
add a comment |
This design is ok only if you are willing to accept a single point of failure for all office switches, web farm, sql, file-server and internet.
This design is ok only if you are willing to accept periodic spanning-tree hits every time links flap. By the way, the Cisco SG series doesn't support rapid-pvst, so you have to live with one spanning-tree for all vlans (I'm assuming you're using vlans, no?).
Honestly it's going to get worse if you add redundancy to this 100% switched network because then you have more spanning-tree to deal with. But I'm guessing nobody hired you to be a network engineer... you seem to be a coder who is likely moonlighting as a network guy. Thus, bask in the plausible deniability of the bad design!
Improve this design by adding redundancy and some routed segmentation between the offices. Keep in mind that if you do routing, you'll need to renumber the segments that are behind a router; you'll also need something that supports SVI's or dedicated routed interfaces.
A routed hub and spoke topology would be better but it require more fiber density than you can get on the SG series, and it would require running fiber (which may not have been done yet). It would also require things that support dynamic routing on fiber interfaces. SG series switches have a rather limited routing table size.
Is this okay?
I wouldn't do it that way, but many things depend on requirements. If your employer is really cheap, maybe it's the best you can do.
Does a cascade of switches affect overall performance?
Others addressed over subscription in this topology; then again if your uplinks are 10% utilitized all day long it wont matter. That said, you can't scale a design like this very well.
Can the last node obtain gigabit file transfer speeds from the other nodes?
As long as there isn't congestion along common paths.
Can the Main Switch handle every client?
It depends on how much load your clients are generating.
Honestly I'd be more worried about the questions you haven't asked... I elaborated on some of those above.
BTW, in a setup like this where you've run copper to every switch in the topology, uplink ports are not necessarily obvious unless you standardize that "the first two ports are my uplinks" (or something like that). You might not care now, but wait until you get your first broadcast storm and have to track down where it's coming from. Trust me... be sure it's easy to find the uplinks. It's also good to label your uplinks with source / destination on both sides.
add a comment |
This design is ok only if you are willing to accept a single point of failure for all office switches, web farm, sql, file-server and internet.
This design is ok only if you are willing to accept periodic spanning-tree hits every time links flap. By the way, the Cisco SG series doesn't support rapid-pvst, so you have to live with one spanning-tree for all vlans (I'm assuming you're using vlans, no?).
Honestly it's going to get worse if you add redundancy to this 100% switched network because then you have more spanning-tree to deal with. But I'm guessing nobody hired you to be a network engineer... you seem to be a coder who is likely moonlighting as a network guy. Thus, bask in the plausible deniability of the bad design!
Improve this design by adding redundancy and some routed segmentation between the offices. Keep in mind that if you do routing, you'll need to renumber the segments that are behind a router; you'll also need something that supports SVI's or dedicated routed interfaces.
A routed hub and spoke topology would be better but it require more fiber density than you can get on the SG series, and it would require running fiber (which may not have been done yet). It would also require things that support dynamic routing on fiber interfaces. SG series switches have a rather limited routing table size.
Is this okay?
I wouldn't do it that way, but many things depend on requirements. If your employer is really cheap, maybe it's the best you can do.
Does a cascade of switches affect overall performance?
Others addressed over subscription in this topology; then again if your uplinks are 10% utilitized all day long it wont matter. That said, you can't scale a design like this very well.
Can the last node obtain gigabit file transfer speeds from the other nodes?
As long as there isn't congestion along common paths.
Can the Main Switch handle every client?
It depends on how much load your clients are generating.
Honestly I'd be more worried about the questions you haven't asked... I elaborated on some of those above.
BTW, in a setup like this where you've run copper to every switch in the topology, uplink ports are not necessarily obvious unless you standardize that "the first two ports are my uplinks" (or something like that). You might not care now, but wait until you get your first broadcast storm and have to track down where it's coming from. Trust me... be sure it's easy to find the uplinks. It's also good to label your uplinks with source / destination on both sides.
This design is ok only if you are willing to accept a single point of failure for all office switches, web farm, sql, file-server and internet.
This design is ok only if you are willing to accept periodic spanning-tree hits every time links flap. By the way, the Cisco SG series doesn't support rapid-pvst, so you have to live with one spanning-tree for all vlans (I'm assuming you're using vlans, no?).
Honestly it's going to get worse if you add redundancy to this 100% switched network because then you have more spanning-tree to deal with. But I'm guessing nobody hired you to be a network engineer... you seem to be a coder who is likely moonlighting as a network guy. Thus, bask in the plausible deniability of the bad design!
Improve this design by adding redundancy and some routed segmentation between the offices. Keep in mind that if you do routing, you'll need to renumber the segments that are behind a router; you'll also need something that supports SVI's or dedicated routed interfaces.
A routed hub and spoke topology would be better but it require more fiber density than you can get on the SG series, and it would require running fiber (which may not have been done yet). It would also require things that support dynamic routing on fiber interfaces. SG series switches have a rather limited routing table size.
Is this okay?
I wouldn't do it that way, but many things depend on requirements. If your employer is really cheap, maybe it's the best you can do.
Does a cascade of switches affect overall performance?
Others addressed over subscription in this topology; then again if your uplinks are 10% utilitized all day long it wont matter. That said, you can't scale a design like this very well.
Can the last node obtain gigabit file transfer speeds from the other nodes?
As long as there isn't congestion along common paths.
Can the Main Switch handle every client?
It depends on how much load your clients are generating.
Honestly I'd be more worried about the questions you haven't asked... I elaborated on some of those above.
BTW, in a setup like this where you've run copper to every switch in the topology, uplink ports are not necessarily obvious unless you standardize that "the first two ports are my uplinks" (or something like that). You might not care now, but wait until you get your first broadcast storm and have to track down where it's coming from. Trust me... be sure it's easy to find the uplinks. It's also good to label your uplinks with source / destination on both sides.
edited Jun 6 at 1:26
answered Jun 6 at 0:29
Mike PenningtonMike Pennington
27.7k1168140
27.7k1168140
add a comment |
add a comment |
Additional comments:
Remember to allow for growth too - no new switch should be installed fully populated. There should always be some spare ports. I've seen recommendations from 50% full to at least 20% empty ports. That includes your core switch stack.
Stack? Yes if your budget stretches that far, the core switch should be a stack of two switches and every server has a redundant channel bond. And each link out to distribution switches should be a pair as well. Of course this adds to the capital costs significantly.
Also remember to look ahead - talk to management and see if there are any plans for more space, or additional offices/desks or cameras, phones that need POE, the future uses of wireless, guest wireless, additional Access points, and so on. All this should be factored into a long-term plan.
UPS - your servers and core switches should be UPSed - and monitored so everything shuts down cleanly.
Training - you and others may need additional training for this new switching. Don't hesitate to include that as a cost.
Depending on your environment, and the "cost" of an outage should indicate whether you beef up the redundancy or cheap it, being aware of the risks.
add a comment |
Additional comments:
Remember to allow for growth too - no new switch should be installed fully populated. There should always be some spare ports. I've seen recommendations from 50% full to at least 20% empty ports. That includes your core switch stack.
Stack? Yes if your budget stretches that far, the core switch should be a stack of two switches and every server has a redundant channel bond. And each link out to distribution switches should be a pair as well. Of course this adds to the capital costs significantly.
Also remember to look ahead - talk to management and see if there are any plans for more space, or additional offices/desks or cameras, phones that need POE, the future uses of wireless, guest wireless, additional Access points, and so on. All this should be factored into a long-term plan.
UPS - your servers and core switches should be UPSed - and monitored so everything shuts down cleanly.
Training - you and others may need additional training for this new switching. Don't hesitate to include that as a cost.
Depending on your environment, and the "cost" of an outage should indicate whether you beef up the redundancy or cheap it, being aware of the risks.
add a comment |
Additional comments:
Remember to allow for growth too - no new switch should be installed fully populated. There should always be some spare ports. I've seen recommendations from 50% full to at least 20% empty ports. That includes your core switch stack.
Stack? Yes if your budget stretches that far, the core switch should be a stack of two switches and every server has a redundant channel bond. And each link out to distribution switches should be a pair as well. Of course this adds to the capital costs significantly.
Also remember to look ahead - talk to management and see if there are any plans for more space, or additional offices/desks or cameras, phones that need POE, the future uses of wireless, guest wireless, additional Access points, and so on. All this should be factored into a long-term plan.
UPS - your servers and core switches should be UPSed - and monitored so everything shuts down cleanly.
Training - you and others may need additional training for this new switching. Don't hesitate to include that as a cost.
Depending on your environment, and the "cost" of an outage should indicate whether you beef up the redundancy or cheap it, being aware of the risks.
Additional comments:
Remember to allow for growth too - no new switch should be installed fully populated. There should always be some spare ports. I've seen recommendations from 50% full to at least 20% empty ports. That includes your core switch stack.
Stack? Yes if your budget stretches that far, the core switch should be a stack of two switches and every server has a redundant channel bond. And each link out to distribution switches should be a pair as well. Of course this adds to the capital costs significantly.
Also remember to look ahead - talk to management and see if there are any plans for more space, or additional offices/desks or cameras, phones that need POE, the future uses of wireless, guest wireless, additional Access points, and so on. All this should be factored into a long-term plan.
UPS - your servers and core switches should be UPSed - and monitored so everything shuts down cleanly.
Training - you and others may need additional training for this new switching. Don't hesitate to include that as a cost.
Depending on your environment, and the "cost" of an outage should indicate whether you beef up the redundancy or cheap it, being aware of the risks.
answered Jun 6 at 0:20
CriggieCriggie
42929
42929
add a comment |
add a comment |
When you design a network, You need to consider it in two ways.
- Technical
- Business
Specially your business can have critical functionalities and non critical functionalities. Your technical design should be fulfill their business requirement and if there is no business requirement means, there is no requirement for Network as well.
According to that your cascade design may create some draw back. If any failure on upstream switch, It will affect to all device which connected with It. If you want solve that issue you can config stack on upstream switches, but SG500 switches are not supported stacking. Additionally VSS also support for improve redundancy.
When you design a Network you should consider about about below point.
- Simplicity
- Redundancy
- Security
Based on your requirement, this may be okay or not okay. Check with your business and technical requirement.
add a comment |
When you design a network, You need to consider it in two ways.
- Technical
- Business
Specially your business can have critical functionalities and non critical functionalities. Your technical design should be fulfill their business requirement and if there is no business requirement means, there is no requirement for Network as well.
According to that your cascade design may create some draw back. If any failure on upstream switch, It will affect to all device which connected with It. If you want solve that issue you can config stack on upstream switches, but SG500 switches are not supported stacking. Additionally VSS also support for improve redundancy.
When you design a Network you should consider about about below point.
- Simplicity
- Redundancy
- Security
Based on your requirement, this may be okay or not okay. Check with your business and technical requirement.
add a comment |
When you design a network, You need to consider it in two ways.
- Technical
- Business
Specially your business can have critical functionalities and non critical functionalities. Your technical design should be fulfill their business requirement and if there is no business requirement means, there is no requirement for Network as well.
According to that your cascade design may create some draw back. If any failure on upstream switch, It will affect to all device which connected with It. If you want solve that issue you can config stack on upstream switches, but SG500 switches are not supported stacking. Additionally VSS also support for improve redundancy.
When you design a Network you should consider about about below point.
- Simplicity
- Redundancy
- Security
Based on your requirement, this may be okay or not okay. Check with your business and technical requirement.
When you design a network, You need to consider it in two ways.
- Technical
- Business
Specially your business can have critical functionalities and non critical functionalities. Your technical design should be fulfill their business requirement and if there is no business requirement means, there is no requirement for Network as well.
According to that your cascade design may create some draw back. If any failure on upstream switch, It will affect to all device which connected with It. If you want solve that issue you can config stack on upstream switches, but SG500 switches are not supported stacking. Additionally VSS also support for improve redundancy.
When you design a Network you should consider about about below point.
- Simplicity
- Redundancy
- Security
Based on your requirement, this may be okay or not okay. Check with your business and technical requirement.
answered Jun 5 at 16:32
infrainfra
1,561317
1,561317
add a comment |
add a comment |
Thanks for contributing an answer to Network Engineering Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f59619%2fcascading-switches-will-it-affect-performance%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
4
Don't have time for a full answer but I would never consider a Small Business series device as a core switch. Also note that the SG500 is end of sale
– JFL
Jun 5 at 13:21
1
Based on experience and testing, Cisco recommends no more than a 20:1 access to distribution bandwidth ratio. The access switches should connect to distribution switches, not each other, and you should not have access interfaces on the distribution switch. The 160 meter distance is no problem for fiber connections between the distribution and access switches, and the access switches can be placed close enough to the hosts for copper cabling.
– Ron Maupin♦
Jun 5 at 16:36
Outside the network aspect of the question, it seems like you've been given a budget for this network that is too small to build a network that will fulfill the needs and limitations of the situation. Unless this is a very low budget organization that can operate with a very poor quality network, you should alert those who write the checks that they will need to invest more money to get an acceptable network. No offense, one of the things they will need to spend money on is a consultant who can design and build an effective network.
– Todd Wilcox
Jun 6 at 17:00