One other disadvantage is with the non-E series. When sending traffic between 2 hosts, the frame always enters the stack-ring. So if you have a stack of 6 switches and you have 2 hosts on the same exact switch in the stack, the frame still enters the stack-ring unnecessarily.
So if you are planning to run a stacked core or distribution go with 2 - 3 switches stacked max. The 3750s claim to support up to 48 etherchannels, but from my personal experience, the performance is not that great.
In addition to what the other posters have already noted, disadvantage of the stack, different IOS versions can not be run independently on different switches, nor can one switch be rebooted while possibly keeping the network up/hot with another switch.
Other advantages of the stack, possible avoidance of STP issues and multiple channels that can span stack members.
Also, on the non-E series, besides all packets being sent onto the stack rings whether necessary or not, it's also the source switch that removes the frame. I.e. all stack frames will hop across all stack links. Also, when the stack bandwidth is touted as 32 or 64 Mbps, realize there are two rings, so the effective bandwidth is half that noted, and second, the bandwidth is being doubled because it's full duplex, for example, on a non-E 3750, each stack connection is really 8 GBps, full duplex.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...