Compare cert salaries and plan your next career move
If you are running a L3 Access Layer you shouldn't need an FHRP, just dual home the access to the distributtion and lower the IGP timers for sub-second convergence.
Why stick with 48 port switches, when you have that many users you might want to look into 4500/6500 family with 48port modules and other special modules like FWSM
There are advantages to interconnecting the distributation over a L3 link, but I'll let you research that one.
Presumably I would need a FHRP if I were to dual home hosts or servers to access switches, right?
m3zilla wrote: » Final year project as in this is a school assignment? Either way, you should be striving for the best design, not what's most complicated. If you're going to do that, why not just stack the switches and configure an etherchannel between the the switches and servers/hosts? I don't think I've ever seen a NIC team on an end user machine...sounds like a waste of ports, not to mention most machine plugs into a phone, and not directly to a switch.
SteveO86 wrote: » Take from me, a complicated design is not always the best. A scalable design however is. This is your big project for the class you want to take the best of what learned and combine it to make a picture perfect design. Complexity leads to a tough troubleshooting process, which you might be graded on. Management of the network also needs to be considered when designing a network. Running 4500/6500s and multiple OSPF areas with summarization. (Maybe NSSA's for the access and server core modules) is a simple yet complex design, you need to account for IP addressing, which can be complex in itself. Dual homeing your clients to different blades within the chassis relying on the server OS usually has both NICs on the same subnet/VLAN so you don't need the FHRP. Or Check out 6500s running VSS for chassis redundancy, very expensive design. Campus Network Design Fundamentals is also a great book by Diane Teare (She did some CCDA/CCDP books) I can't beleive I forgot about that one. I'd also consider it a good primer for the CCDP.
it_consultant wrote: » One slight quibble, your last bullet point, switches only load balance if you have them in a LAG group, and that load balance only occurs on that LAG. In order to actually load balance the traffic you will need to run a TRILL (Transparent interconnection of lots of links) or SPB (shortest path bridging) style switch. This is actually a good idea for you, since this is a class project and you are being tested on your ability to design a network. We would use TRILL in a case where we might anticipate running a converged data and storage network, commonly referred to as FCOE or FCIP.
it_consultant wrote: » A LAG will turn 2 1GB links into 1 2GB link with failover protection. An equal cost route will round robin, but this does not bond the connections. Your devices will only get 1GB through that link. If there is any one thing I have learned in networking it is this, switch when you can, route when you have too.
it_consultant wrote: » The use of the network should drive our design.
Trifidw wrote: » Remember a etherchannel will send traffic down a single switchport based on its predefined criteria (mac/ip address/port) so you still do only have 2x 1GB ports. That saying is very old and doesn't fully apply to todays networks with CEF etc. L3 to the edge is a valid design.
DevilWAH wrote: » I so agree, so often I hear people talk about there net work like its out of a text book. I don't believe there is such a thing as right and wrong ways to design a network. But there are defiantly good and bad ways, it gets interesting when whats good for one network is bad for another. While I agree 1000 devices on a sub net is not an proformance issue, it can be a management issue. I don't as a rule run vlans between buildings or floor. Really so I can pin down the location of IP address, and makes setting up network monitoring more straight forward. The other reason I would subnet is for data control (like security or qos). Once you have a subnet it makes controlling the data easier, filtering, routing, ACL's and such. Every configuration on a network should be there for a reason, the argument "because it the standard" or "that's how it says to do it " is not a good reason. The questions you need to ask are. Is it secure? Does it do what I need it to do? Is it the most efficient way to do it? And I think that is the order in which you need to ask the questions. There is always a better way to do things, like with any thing technology moves on and ideas change. You can spend a lot of time worrying about "is this the right way to do it" rather than worrying about "is this doing the right thing for what I require".
networker050184 wrote: » Since this is for a school project why not go with an internal VPLS design? Cool, somewhat complicated and plenty of stuff to mess around with. Sounds like the perfect school project to me!
it_consultant wrote: » It will work, we think it is a bad idea. If I were to come across this network on a consulting gig, I would immediately re-engineer it if it were in my scope. You are displaying good conceptual understanding of routing, but you are not understanding when not to route and why we disagree with the premise that each access switch should have its own VLAN; that is as clumsy as home running each "VLAN" into an open port on a firewall (seen it done) from a daisy chain of access switches below.
Eildor wrote: » but why would you re-engineer it? i'm still not clear on why it is such a bad idea. one of the requirements i gave myself is that the network should be reliable, users shouldn't be able to detect a failure in the network... i need to have a routed access layer in order to achieve that kind of reliability - no? and as a result of having l3 in the access layer each access switch is therefore going to need its own vlan. is this not correct? sorry about grammar, accessing the forum on mobile seems to have issues with uppercase. thanks.
DevilWAH wrote: » Generally routing proformance is more costly than switching, which is another good reason to only use it when necessary.
A question.. What are the benefits of using routing over switching?? and what are the advantages of switching over routing?
m3zilla wrote: » Do you any articles or studies to back this up? I'd be interested to see the performance between routing vs switching the access layer. Unless you know your L2 topology inside out, troubleshooting routing is much easier than troubleshooting an STP issue. It's also much easier to predict behavior when a failure occur.
DevilWAH wrote: » And as for point two, rouble shooting Layer 2 is just as straight forward as Layer 3. I think a Lot of people get brought up on Layer 3 and assume that Layer 2 is the "weaker brother" and complicated. However this is far from true, Layer 2 has some great features and is in many ways just like routing. The logic is the same and the trouble shooting steps the same. So I have to completely disagree with your statement that routing is easier and more predictable. It is simple not true, if you want to be a complete network engineer you should have a full understanding of both. Other wise you are missing a very important half of the picture.
networker050184 wrote: » I have to disagree with this, but I think a lot of it is just personal preference. I think routing is a lot more straight forward, predictable and tunable than a flat L2 network. When I set up a network its routing as far down as possible. Leave the broadcast and STP domains as small and confined as possible.
DevilWAH wrote: » Cost of a layer 2 switch compared to a Layer 3 is a good start so see the difference
And as for point two, rouble shooting Layer 2 is just as straight forward as Layer 3. I think a Lot of people get brought up on Layer 3 and assume that Layer 2 is the "weaker brother" and complicated. However this is far from true, Layer 2 has some great features and is in many ways just like routing. The logic is the same and the trouble shooting steps the same. So I have to completely disagree with your statement that routing is easier and more predictable. It is simple not true, if you want to be a complete network engineer you should have a full understanding of both. Other wise you are missing a very important half of the picture.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.