<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

3 Protocols You Need to Know Before Increasing Network Speeds

March 31, 2016

Traffic demands have spiked dramatically over the past five years, and gigabit Ethernet isn’t cutting it in enterprise networks anymore. While many companies have started making the transition from 1G to 10G, the next transition is pretty steep.

After 10G, you have a costly choice between 40G and 100G network speeds and most companies just don’t have the resources to make the jump. 

Port channel architecture (a general term for Cisco's EtherChannel®) is a stop-gap approach to meeting these bandwidth demands. Infrastructure migration is always the end-goal, but increasing network speeds is a decision that could take years to finalize. Instead, port channel architecture virtually widens the data pipes to help enterprises scale capacity. 

In other words, enterprises could have four 1GB links emulating 4GB of bandwidth using this architecture and forgo paying for the next bandwidth tier. To take advantage of this technology, architects must configure their networks to support aggregated and load balanced traffic well-above what the network can normally manage.

Redundancy protocols and inefficiencies make it even more complicated. In this post, I’ll cover the Spanning Tree Protocol (STP) that blocks redundant links, TRILL, and PGaP from Cisco as they pertain to EtherChannel.

Spanning Tree Protocol (STP)

Spanning Tree Protocol, or STP, was created to choose a root bridge and build loop-free paths to that root for all bridges in the network—in other words, STP stops redundant links from eating up a business’ bandwidth.

STP is not ideal for architects searching for ways to increase network speeds quickly. If there’s a faster alternative path, it’s blocked altogether. The result? Your network capacity will never reach its fullest potential. Like anything that’s completely streamlined, STP trades efficiency for predictability.

That’s where TRILL comes in.

Download Now: Network TAPs 101 - The Networking User Guide [Free eBook]

The Transparent Interconnection of Lots of Links (TRILL)

While many companies still rely on STP, the majority of businesses looking to increase their network speeds have moved to TRILL. TRILL is a routing protocol network standard which does away with STP’s streamlined service.

TRILL is a far more efficient use of the network infrastructure because it allows Ethernet frames to take direct paths outside of the main streamline. TRILL can run while also running STP.

TRILL and STP both exist in Layer 2 (the Data Link Layer) which limit their ability to help enterprises expand capacity. For port channel architecture, you need a Layer 3 switch.

Port Aggregation Protocol (PAgP)

Let’s return to the initial problem: an enterprise’s network speeds don’t match up with available network tiers—some are too hefty and others don’t provide enough bandwidth, and there isn’t an option in between. 

You wouldn’t use a plane to go from your house to your neighbor’s, but you would when you have larger loads that need to travel long distances. 

EtherChannel exists in Layer 3 and is supported by Cisco’s proprietary PAgP. With vendor-agnostic port channel architecture, network managers can take a standard 10G connection and turn it into two or four physical links that are recognized as one virtual pipeline without having to be concerned with the proprietary PGaP. This yields 20G or 40G of bandwidth in both the eastbound and westbound directions—and 40G or 80G of traffic overall. It allows the traffic to flow down one virtual lane despite the fact that there are up to four separate physical links.

EtherChannel supports different packet distribution mode, doing away with TRILL and STP’s rigid standardization processes, and it provides the most flexible solution to enterprise-level bandwidth problems.

Need to know more?

Whether your business needs to make the jump from 1G to 10G, or somewhere between 10G and 40G or 100G, port channel architecture is a safe bet to immediately address bandwidth needs (as long as network managers ensure visibility with proper connectivity).

Looking to add Network TAPs solution to your security deployment, but not sure where to start? Join us for a brief network Design-IT consultation or demo. No obligation - it’s what we love to do!

Network TAPS 101 Basics for IT Security engineers

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES