Solved

Differences between a Csico 24 port 3750G and a 3750E?

Posted on 2008-06-12
2
2,614 Views
Last Modified: 2008-06-13
Can someone tell me the major differences between a Csico 48 port 3750G and a 3750E?
0
Comment
Question by:typertec
2 Comments
 
LVL 10

Accepted Solution

by:
atlas_shuddered earned 250 total points
ID: 21773638
3750E supports the following:

1.  Upgrade from 64Gig/sec processing to 128
2.  Power supply can support up to 48 class 3 devices (e.g. AP's) rather than the limit of 48 class 2 devices (ip phones)
3.  Pair of 10Gig uplinks vs. the 4 1Gig on the G series.
0
 
LVL 13

Assisted Solution

by:kdearing
kdearing earned 100 total points
ID: 21776560
Well, a big difference is performance:

                                     3750G-48TS             3750E-48TD
Forwarding Rate          38.7 Mpps                 101.2Mpps
Switch Fabric               32Gbps                     128Gbps
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Broadband over Power Lines Broadband over Power Lines is the technology of transmitting computer data through power lines. This method of connectivity allows the user to have access to the internet without having to rely on additional cables, suc…
This article is a how to to configure a UCS Ethernet-uplink portchannel via the console. It is easy to do and can be done quite quickly. In certain versions of the UCS manager the portchannel has issues coming up and this is a workaround. I am…
In a recent question (https://www.experts-exchange.com/questions/29004105/Run-AutoHotkey-script-directly-from-Notepad.html) here at Experts Exchange, a member asked how to run an AutoHotkey script (.AHK) directly from Notepad++ (aka NPP). This video…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

756 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question