engineers is to assume that there is simply a lack of bandwidth and thus the solution chosen is a link bandwidth upgrade. Take the network administrator view of the network. If complaints are received from the Telephone Sales Center that network performance is lacking, which link would he recommend be upgraded? Instinctively the inexperienced administrator orders the 100 Mbps between the Telephone Sales Center and the Data Center upgraded to Gigabit Ethernet. Embarrassingly, the upgrade will have no affect on the performance of the network. The correct course of action is to set the Data Center switch as the STP root. This will allow the traffic flow as shown in Figure . It is possible that an upgrade to the link is still required but at least the full benefits of the upgrade will now be realized. When considering a Layer 2 topology and STP, keep in mind the following: Tools do exist that allow the mapping of the Layer 2 topology. When dealing with large complex networks or when required to work regularly with unfamiliar networks, these tools can be of great benefit. For simpler, familiar, networks, simply documenting the STP states within the LAN would be sufficient.
Content 4.3 Troubleshooting Switched Ethernet Networks 4.3.5 Troubleshooting Ethernet broadcast traffic One of the key performance benefits of a switch is its ability to keep local traffic local while still allowing any two devices to communicate. Switches are able to do this because switching decisions are based on the destination MAC address. Assuming VLANs are not in use, there are three instances where a switch cannot forward a frame to a single interface and will instead flood the frame out of all the ports. These situations occur when the destination MAC address is: In each case the behavior is required for normal network operation. However, excessive broadcasts will result in one or both of the following problems: The amount of broadcasts present in a network can be determined using most protocol analyzers. As an alternative, the information can be determined using the show interfaces command on an IOS based switch or router. Judging whether the amount of broadcasts present is excessive can be difficult. There are no rules as to what is normal and it really depends on the applications and upper layer protocols being used. Broadcasts are used extensively by the IP protocol for addressing multiple hosts, ARP, and routing updates. It is not unusual to find up to 30% of traffic is made up of broadcasts. When encountering a situation where it appears that network performance may be degraded due to excessive broadcasts it is helpful if the network documentation baselines normal broadcast levels so a comparison can be made. Where excessive broadcasts are observed, it is important to identify the source of the broadcasts so that appropriate steps can be taken. When analyzing traffic, keep in mind that switches are responding to broadcast frames, while traffic analyzers are usually more concerned about the Layer 3 packets. Generally this is not a problem as a broadcast packet is carried by broadcast frame but different tools will report broadcasts differently depending on whether they have a Layer 2 or Layer 3 focus. Generally, excessive broadcasts result from one of the following situations: Using a protocol analyzer, the source of the problem can be readily ascertained. Each of the above situations dictates a different solution. Some applications such as Symantec’s Ghost server and streaming video servers use broadcast and multicast traffic. This is an attempt to reduce the number of streams of traffic sent, thereby minimizing bandwidth usage and to improving performance. While it may be possible to reconfigure the application so that it does not use multicasts or broadcasts, often this introduces other problems. If the network requires applications that are heavy producers of broadcast and multicast traffic, consider the following techniques to reduce the impact on other devices in the network: Very large Layer 2 broadcast domains can sometimes occur where the hosts themselves do not generate much traffic and their perceived network needs are not great. It is tempting in these situations to avoid the expense of a Layer 3 hierarchy and simply adopt a flat, switched, structure. Unfortunately, modern operating systems use broadcasts extensively to discover network services and other hosts. Very large, lightly loaded, Layer 2 networks will quickly find that the majority of their traffic is made up of broadcasts. Laptop users that complain that their computer runs applications faster when they are not connected to the network are a signal that there may be excessive broadcasts. The solution is to use a proven hierarchical network structure using routers to break up the broadcast domains. Many routing protocols, notably distance vector, use broadcasts. Link state routing protocols such as OSPF use multicasts. These mechanisms are required for exchanging routing updates. Network instability that results in routes being added and removed from routing tables can generate significant amounts of broadcast traffic.
Content 4.3 Troubleshooting Switched Ethernet Networks 4.3.6 Troubleshooting Ethernet switch flooding LAN switches use forwarding tables, called Content Addressable Memory (CAM), to direct traffic to specific ports based on the VLAN number and the destination MAC address of the frame. When there is no entry corresponding to the frame's destination MAC address in the incoming VLAN, the unicast frame will be sent to all forwarding ports within the respective VLAN. This is called flooding. Limited flooding is part of the normal switching process. However, there are situations when continuous flooding can cause adverse performance effects on the network. Note that most modern switches including the Catalyst 2900 XL, 3500 XL, 2950, 3550, 4000, 5000, and 6000 maintain Layer 2 forwarding tables per VLAN. Low-bandwidth links can become saturated with large amounts of flooded traffic. When this happens, network performance will degrade, occasionally causing a loss of connectivity. Server S1 in VLAN 1 is running a bulk data transfer backup to server S2 in VLAN 2. Server S1 has its default gateway pointing to router A's VLAN 1 interface. Server S2 has its default gateway pointing to router B's VLAN 2 interface. Packets from S1 to S2 will follow this path: S1–VLAN 1–-switch A–-router A–-VLAN 2–-switch B–-VLAN 2–-S2 (orange line) Packets from S2 to S1 will go along the following path: S2–VLAN 2–switch B–router B–VLAN 1–switch A–flooded to VLAN 1–S1 (red line) Note that with such an arrangement, switch A will not "see" traffic from the S2 MAC address in VLAN 2. This is because the source MAC address will be