Solved

switch

Posted on 2013-07-01
1
287 Views
Last Modified: 2013-07-05
Hi,

I am looking for a switch that forwards IP multicast in hardwar than the software.
I found Catalyst 4500 series switches but are there more choices?trying to lower the cost?

KJ

IP Multicast on the Catalyst 4500 Series Switch

The Catalyst 4500 series switch supports an ASIC-based Integrated Switching Engine that provides Ethernet bridging at Layer 2 and IP routing at Layer 3. Because the ASIC is specifically designed to forward packets, the Integrated Switching Engine hardware provides very high performance with ACLs and QoS enabled. At wire-speed, forwarding in hardware is significantly faster than the CPU subsystem software, which is designed to handle exception packets.
The Integrated Switching Engine hardware supports interfaces for inter-VLAN routing and switchports for Layer 2 bridging. It also provides a physical Layer 3 interface that can be configured to connect with a host, a switch, or a router.
0
Comment
Question by:JCORION
1 Comment
 
LVL 7

Accepted Solution

by:
unfragmented earned 500 total points
ID: 39293535
Cisco switches are going to forward multicast in hardware (ie using an ASIC), as generally their general CPU isn't very powerful.  Layer 2 forwarding is pretty trivial.  Obviously you will need a layer 3 switch to forward multicast between layer 3 networks.  Catalyst 3750's (with the ipservices license) will do L3 multicast just fine.  Catalyst 29xx switches won't do L3, but will do L2 just fine.

Note the 'caveat' around 'exception packets'.  Tunnelled packets, PIM registers, and other packets that need processing by the control plane will impact the general CPU.

Cisco does promote the idea of 'forwarding in hardware' as it has a lot of investment in ASIC development.  I see it as neither right no wrong - just something to be aware of, as it is something their marketing people love to push.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The worst thing when starting a new job is when the previous Network Administrator left behind no documentation. How do you get into the devices? If you've been in this situation or just accidently mistyped your password, this article will hopefully…
This tutorial will go through the steps required to write a script that will back up the configuration settings of a HP-ProCurve switch. You will need to get the following things to follow this tutorial: Telnet Scripting Tool e.g. TST10.exe …
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

26 Experts available now in Live!

Get 1:1 Help Now