Configuring
DLSw+ Configuration Task List
•Modes of Operation, page 306⎯Dynamically detects the capabilities of the peer router and operates according to those capabilities.
•Network Management, page
•Traffic Bandwidth and Queueing Management, page
•Access Control, page
Scalability
One significant factor that limits the size of Token Ring internet works is the amount of explorer traffic that traverses the WAN. DLSw+ includes the following features to reduce the number of explorers:
•Peer Groups and Border Peers, page 296
•Explorer Firewalls, page 300
•NetBIOS
•SNA
•UDP Unicast Feature, page 301
•LLC1 Circuits, page 302
•Dynamic Peers, page 302
•Promiscuous Peer Defaults, page 302
Peer Groups and Border Peers
Perhaps the most significant optimization in DLSw+ is a feature known as peer groups. Peer groups are designed to address the broadcast replication that occurs in a fully meshed network. When
With DLSw+, a cluster of routers in a region or a division of a company can be combined into a peer group. Within a peer group, one or more of the routers is designated to be the border peer. Instead of all routers peering to one another, each router within a group peers to the border peer; and border peers establish peer connections with each other. When a DLSw+ router receives a TEST frame or NetBIOS
You can further segment DLSw+ routers within the same border peer group that are serving the same LANs into a peer cluster. This segmentation reduces explorers because the border peer recognizes that it only has to forward an explorer to one member within a peer cluster. Only TCP encapsulation can be used with the DLSw+ Peer Clusters feature.
| Cisco IOS Bridging and IBM Networking Configuration Guide |
|