09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>the</strong> spanning tree is also recalculated and, if <strong>the</strong> blocked interface has<br />

a better cost, it becomes primary. However, port trunks can readjust<br />

<strong>the</strong> traffic flow <strong>to</strong> accommodate for lost member links. The need for<br />

redundancy needs <strong>to</strong> be evaluated against <strong>the</strong> cost (in terms of<br />

usefulness) of <strong>the</strong> idle ports.<br />

Until Gigabit E<strong>the</strong>rnet became available, port trunking was <strong>the</strong> only<br />

way <strong>to</strong> provide backbone <strong>network</strong> links beyond 200Mbps (100Mbps<br />

full-duplex E<strong>the</strong>rnet). At <strong>the</strong> time of this writing, Gigabit E<strong>the</strong>rnet is<br />

only available over single or multimode fiber optic cable. This allows it<br />

<strong>to</strong> be easily implemented over existing 100BaseFX cabling<br />

infrastructures. However, many early nonstandard Gigabit E<strong>the</strong>rnet<br />

implementations only delivered around 400Mbps, and many of <strong>the</strong><br />

standards-based Gigabit implementations suffer packet loss when<br />

utilization reaches around 80 percent. Alternatively, most<br />

workgroup-class switches with <strong>to</strong>day's Application-Specific<br />

Integrated Circuits (ASICs) can provide "wire rate" full-duplex<br />

transmission without any problem. So, right now, port trunking will<br />

probably perform better than <strong>the</strong> current Gigabit offerings. Port<br />

trunking also has <strong>the</strong> added benefit of redundancy, due <strong>to</strong> <strong>the</strong> load<br />

balancing and recovery capabilities inherent in its functional design.<br />

Port Mirroring<br />

In <strong>the</strong> beginning of <strong>the</strong> chapter, a brief overview of packet sniffers was<br />

given. Packet sniffers are hardware and/or software <strong>to</strong>ols used <strong>to</strong><br />

moni<strong>to</strong>r Layer 2 packets as <strong>the</strong>y are transmitted across <strong>the</strong> shared<br />

transmission medium. The operative word here is "shared." With<br />

<strong>network</strong> switches, each port is a collision domain, which makes each<br />

port on <strong>the</strong> switch effectively its own shared <strong>network</strong> segment (see<br />

Figure 6.9).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!