Data Network Design and Evaluation Dr Usman Saeed Assistant Professor Faculty of Computing and Information Technology North Jeddah Branch King Abdulaziz.

Slides:



Advertisements
Similar presentations
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Advertisements

Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
Chapter 7: Transport Layer
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking Assist. Prof.
A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
5: DataLink Layer5-1 Asynchronous Transfer Mode: ATM r 1990’s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
What's inside a router? We have yet to consider the switching function of a router - the actual transfer of datagrams from a router's incoming links to.
Introduction Future wireless systems will be characterized by their heterogeneity - availability of multiple access systems in the same physical space.
4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side, delivers.
Requirements Capture and Specification IACT424/924 Corporate Network Design and Implementation.
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
Protocols and the TCP/IP Suite
Real-time traffic Dr. Abdulaziz Almulhem. Almulhem©20012 Agenda RT traffic characteristic RT traffic profiles RT traffic requirements RT Architecture.
Networking Basics: A Review Carey Williamson iCORE Chair and Professor Department of Computer Science University of Calgary.
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
Network Design and Implementation IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
1 Networking Basics: A Review Carey Williamson iCORE Professor Department of Computer Science University of Calgary.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Asynchronous Transfer Mode: ATM r 1980s/1990’s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture.
Module 4: Designing Routing and Switching Requirements.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Establishing Connections Networking Modes: When you are evaluating a network, you concentrate on circuit switching versus packet switching. But it's also.
Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD School of Computer & Communication Engineering.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
Ch 1. Computer Networks and the Internet Myungchul Kim
S4-Chapter 3 WAN Design Requirements. WAN Technologies Leased Line –PPP networks –Hub and Spoke Topologies –Backup for other links ISDN –Cost-effective.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
. Large internetworks can consist of the following three distinct components:  Campus networks, which consist of locally connected users in a building.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
J. Liebeher (modified by M. Veeraraghavan) 1 Introduction Complexity of networking: An example Layered communications The TCP/IP protocol suite.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Network Requirements Analysis CPIT 375 Data Network Designing and Evaluation.
Data Network Design and Evaluation Dr Usman Saeed Assistant Professor Faculty of Computing and Information Technology North Jeddah Branch King Abdulaziz.
Computer Networking A Top-Down Approach Featuring the Internet Introduction Jaypee Institute of Information Technology.
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chapter 7: Transport Layer
NET 3710 WAN Data Networks.
The OSI Model and the TCP/IP Protocol Suite
Introduction to Networking
The OSI Model and the TCP/IP Protocol Suite
Protocols and the TCP/IP Suite
Virtual Private Network
Protocols and the TCP/IP Suite
Computer Networking A Top-Down Approach Featuring the Internet
The OSI Model and the TCP/IP Protocol Suite
Chapter 8 – Data switching and routing
Presentation transcript:

Data Network Design and Evaluation Dr Usman Saeed Assistant Professor Faculty of Computing and Information Technology North Jeddah Branch King Abdulaziz University

Example 1 Consider the subtleties in network behavior introduced through the use of virtual private networks, intranets, or VPNs. VPNs are quite useful; however, care must be taken to understand their potential impact on network security, routing, and management. Since VPNs tunnel (encapsulate) and can encrypt traffic flowing across a network, they often require more effort to secure, monitor, and manage. How VPNs impact security, routing, and management will be considered during the architecture process. VPN ???

Example 2 The analysis, architecture, and design processes can be applied to any network project, regardless of size or scope. Since we are developing sets of problem statements, objectives, and requirements as input to the analysis process, we can scale the architecture and design to meet the scope of the project. Consider the use of VPNs from Example 1.1. We can develop problem statements, objectives, and requirements for VPNs in an existing network, and develop an analysis, architecture, and design solely around a VPN deployment. Problem Statement, objectives, requirements ???

Example 3 A network’s architecture and design are analogous to the architecture and design of a home. Both the network and home architecture describe the major functional components of each (for the network: network management, addressing and routing, security and privacy, and performance; for the home: plumbing, electrical, HVAC [heating, vacuum, air conditioning], framing) and the relationships among them (for the network: interactions, dependencies, trade-offs, and constraints; for the home: where each component is placed relative to the others). The network and home designs are also similar in that they both provide physical detail to the architecture. For the network this means where major network devices are located; and, for the home, where ducts, outlets, faucets, drains, and so forth are located.

Example 4 Voice over IP (VoIP) is of interest to many organizations and is an example of a network project that would benefit from tactical and strategic plans. If we apply the one-/three-/five year plan discussed earlier, the current target (one-year plan) would include the network design for VoIP, based on what is achievable within one year, and the problem statements, objectives, and requirements that result from the requirements analysis process. One Year/ Three Year/ Five Year Plan ???

Example 5 Once, in performing an analysis on a customer’s metropolitan- area network (MAN), I realized that the problem was not what the customers thought. They thought that the technology chosen at that time, switched multimegabit data service (SMDS), and the routing protocol (OSPF) were not working properly together. However, the problem actually was that the network personnel had forgotten to connect any of their LANs to the MAN. Of course, when they ran tests from one LAN to another, no data were being passed. It was an easy problem to fix, but a lot of work was spent changing the customer’s view on the problem and expectations of what needed to be done. The customer originally wanted to change vendors for the routing equipment and replace the SMDS service. Eventually, they were convinced that the equipment and service were fine and that the problem was internal to the organization.

Example 6 A request came from a customer that each building should have Fast Ethernet (FE) capacity to the rest of the network. As part of the requirements analysis, this request became a requirement for 100 Mb/s peak capacity from the users in each building. This service request was then matched in the requirements and design processes by a technology choice that could meet or exceed the request. In this case FE was chosen as the technology, and the service offering was 100 Mb/s to each building. Service metrics were then added, consisting of measuring the FE connections from the IP switch or router at each building to the backbone. Metrics ??

Example 7 The graph at the bottom of the figure is an estimate of the expected aggregate capacity at each segment of the path. In this network a packet over SONET (POS) link at the OC-48 level (2.544 Gb/s) connects two routers, which then connect to Gigabit Ethernet (GigE) switches.

After it was implemented, a security firewall was added at the users’ LAN (with FE interfaces) What Happened ??

Example 8 An example of a best-effort service request and offering is a file transfer (e.g., using FTP) over the Internet. FTP uses TCP as its transport protocol, which adapts, via a sliding window flow-control mechanism, to approximate the current state of the network it is operating across. Thus, the service requirement from FTP over TCP is best effort, and the corresponding service offering from the Internet is best effort. Why is it enough ??

Example 9 An example of a predictable service request and offering can be seen in a network designed to support real-time streams of telemetry data. An architectural/design goal for a network supporting real-time telemetry is the ability to specify end-to- end delay and have the network satisfy this delay request. A real-time telemetry stream should have an end-to-end delay requirement, and this requirement would form the basis for the service request. For example, this service request may be for an end-to-end delay of 25 ms, with a delay variation of ±400 s. This would form the request and the service level (i.e., a QoS level) that needs to be supported by the network. Any other example of predictable service ???

Example 10 The bandwidth of a SONET OC-3c link is Mb/s, which is three times the bandwidth of an OC-1 link (51.84 Mb/s). This bandwidth does not include data-link, network, or transport- layer protocol (e.g., SONET, IP, or transport control protocol/user datagram protocol [TCP/UDP]) overhead or, in the case of wide-area networks, the loss in performance due to the bandwidth × delay product in the network. When a network or element is performing at its theoretical capacity, it is said to be performing at line rate. When an OC-3c circuit was tested, values of realizable capacity (throughput) ranged from approximately 80 to 128 Mb/s (measurements taken at the transport [TCP] layer of the National Research and Education Network [NREN] and Numerical Aerodynamic Simulation [NAS] networks, NASA Ames Research Center, March 1996).

Question 1 In Example 2, an analogy was drawn between a network’s architecture and design and a home’s architecture and design. Provide a similar analogy, using a computer’s architecture and design

Specific comparisons are that the signal and data busses comprise the physical network with the Operating System analogous to the router and route-policy systems in the network. As the network is equipped with ports in locations necessary for user and device access, the computer is equipped with interfaces and interface devices that enhance the ability of users to interact with the computer – mouse, keyboard, monitor, etc.

Question 2 For Example 7, the delay characteristics are as follows: GigE segment 100 us PoS OC-48 segment 1 ms FE segment 200 us Security firewall 5 ms Calculate the total delay for end-to-end delay performance (in the direction from user PC to server) before and after the security firewall is added.

Question 3 Which of the following applications require best-effort (unpredictable and unreliable), guaranteed (predictable and reliable, with accountability), or predictable service. Give reasons for your choices. High-quality (phone company-grade) voice calls Voice over IP (VoIP) calls File transfers via FTP Audio file downloads A commercial video-on-demand service User access to servers in a corporation

High-Quality (phone company-grade) voice calls: Guaranteed service – Required because the calls are very sensitive to dropped data in order to retain legibility and identity of the calling party Voice over IP (VoIP): Predictable service – Given the user expectations and the nature of public IP networks, the VoIP connection needs to be predictable, but does not require the end-end guarantee of a traditional phone call. FTP File Transfers: Best Effort – Best effort is adequate to provide the connection between user and source with TCP ensuring delivery off all data frames Audio File Downloads: Best Effort – As with FTP, this is a non real-time application that can make use of TCP to ensure delivery over a variable time. Video on demand: Guaranteed Service – Required to ensure that the video data stream maintains a fixed loss and jitter tolerance across a heterogeneous network to avoid loss of video signal or unsatisfactory picture quality. Server access: Best effort – As with other non time sensitive applications, Server access can be accomplished over a best effort service that best accommodates the variable bandwidth and user demands for the data link.