How routing work in full mesh topology.

Devil
Comes here often

How routing work in full mesh topology.

How routing work in full mesh topology of Meraki enabled with Hub to Hub communication in an organization.

4 Replies 4
ww
Kind of a big deal
Kind of a big deal

Not sure what you are asking, but in full mesh everyone learns each others routes directly.

maybe this helps: https://www.willette.works/cisco-mx-sd-wan-connectivity-models/

Uberseehandel
Kind of a big deal

The how of mesh doesn't matter.

 

From the documentation - 

 

Impact of Meshing on Throughput
Due to the half-duplex nature of wireless communication and that signals being passed through a repeater AP must be retransmitted to the next hop, throughput is greatly reduced when using a repeater. While many factors impact wireless throughput, it is safe to assume that the addition of meshing can reduce throughput by approximately 50%, with that reduction being applied for each subsequent repeater that must be traversed to reach a gateway. Therefore, it is advised to minimize the number of hops between a client and gateway.

 

In other words, "Avoid meshing like the plague".

 

Unfortunately, WiFi manufacturers operate on a SWAT principle, so they are delaying switching to IEEE802.11ad technology which has sufficient bandwidth to spatially separate the backhaul traffic from the rest of the WiFi packets, which offers some amelioration to a basic issue of physics. Probably, WiFi technology as currently implemented is overdue for a complete replacement, there is no other way to overcome the physical limitations of Half Duplex communication.

 

 

Robin St.Clair | Principal, Caithness Analytics | @uberseehandel

@Uberseehandel the topic is full-mesh in the AutoVPN sense, not the MR sense 😉.


@BrechtSchamp wrote:

@Uberseehandel the topic is full-mesh in the AutoVPN sense, not the MR sense 😉.


😂for other, analogous reasons, meshed VPNs are probably to be avoided as much as meshed WiFi. I have found that it is simpler, and less complex (ergo more reliable), to move applications up to the Cloud and communicate vertically from client device to application directly, rather than the VPN alternatives. There will always be organisations which resist the simple logic of this, but it works, it is secure, and, in my experience, resilient.

 

Strange, but true

Robin St.Clair | Principal, Caithness Analytics | @uberseehandel
Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.
Labels