What are differences between routed and collapsed backbone  networks?

Posted on 2008-11-05
Last Modified: 2012-05-05
I understand a collapsed backbone networks  mean networks connected to a central location such as a router or a switch. Are there any differences between routed and collapsed backbone  networks? Thanks
Question by:compmlb
    LVL 3

    Accepted Solution

    A collapsed backbone is a type of routed network.  In a collapsed backbone, there is one central router or switch.  The ports of this central router or switch are connected to hubs which support other network segments in a star topology.   This type of infrastructure would typically be used on mid-sized LANs, and would be implemented for ease of central administration.  Of course, with the central administration, you would be introducing a single point of failure.  Hope that's what you were looking for!
    LVL 3

    Expert Comment

    So to clarify, they are not two different kinds of networks.  A collapsed backbone is just another type of routed network.
    LVL 2

    Expert Comment

    What you may be thinking of is a fault tolerant and non-fault tolerant toplology.
    A fault topology basicly duplicates each core componant of the network(Core router/ switches (cross connected with spanning tree) firewalls (with redundant routes) and so forth). This gives the capability of having virtually and device or port go down and retain your network functionality. These networks are obviously more expensive and complex, thus much less prevalent.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Is Threat Intelligence?

    Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

    Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
    Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now