Data Network Design and Evaluation Dr Usman Saeed Assistant Professor Faculty of Computing and Information Technology North Jeddah Branch King Abdulaziz.

Slides:



Advertisements
Similar presentations
Chapter 9: The Traditional Approach to Design Chapter 10 Systems Analysis and Design in a Changing World, 3 rd Edition.
Advertisements

Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Distributed components
1 K. Salah Module 2.1: QA – Putting it all together What is the max number of users/connections/sessions a particular network can support for handling.
Client/Server Databases and the Oracle 10g Relational Database
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Requirements Capture and Specification IACT424/924 Corporate Network Design and Implementation.
Software Architecture Design Instructor: Dr. Jerry Gao.
1-1 Introduction to Computer Networks and Data Communications.
End-to-End Analysis of Distributed Video-on-Demand Systems P. Mundur, R. Simon, and A. K. Sood IEEE Transactions on Multimedia, Vol. 6, No. 1, Feb 2004.
1 Chapter 8 Local Area Networks - Internetworking.
Traffic Characterization Dr. Abdulaziz Almulhem. Almulhem©20012 Agenda Traffic characterization Switching techniques Internetworking, again.
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
Analysis of compressed depth and image streaming on unreliable networks Pietro Zanuttigh, Andrea Zanella, Guido M. Cortelazzo.
Network Design and Implementation IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
SERVER Betül ŞAHİN What is this? Betül ŞAHİN
BUSINESS INTELLIGENCE/DATA INTEGRATION/ETL/INTEGRATION AN INTRODUCTION Presented by: Gautam Sinha.
Database System Concepts and Architecture Lecture # 3 22 June 2012 National University of Computer and Emerging Sciences.
Chapter 2 Network Design Essentials Instructor: Nhan Nguyen Phuong.
Lecturer: Ghadah Aldehim
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Communicating over the Network Network Fundamentals – Chapter 2.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
Chapter 1 Introduction to Computer Networks and Data Communications Data Communications and Computer Networks: A Business User’s Approach.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
CH2 System models.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
Demo. Overview Overall the project has two main goals: 1) Develop a method to use sensor data to determine behavior probability. 2) Use the behavior probability.
The OSI Model and the TCP/IP Protocol Suite Outline: 1.Protocol Layers 2.OSI Model 3.TCP/IP Model 4.Addressing 1.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
10 ITK261 The traditional approach to design Reading: Chapter 10 Oct 9, 11.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
MODULE I NETWORKING CONCEPTS.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Rehab AlFallaj.  OSI Model : Open system Interconnection.  is a conceptual model that characterizes and standardizes the internal functions of a communication.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
Requirement Analysis Guidelines. 2 Process Model for Requirement Analysis Gather Requirements Develop Service Metrics To measure performance Characterizing.
PART3 Data collection methodology and NM paradigms 1.
Data Communications & Computer Networks, Second Edition1 Chapter 8 Local Area Networks: Internetworking.
Net 221D:Computer Networks Fundamentals
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Computer Network Architecture Lecture 2: Fundamental of Network.
HP Openview NNM: Scalability and Distribution. Reference  “HP Openview NNM: A Guide to Scalability and Distribution”,
Company LOGO Network Architecture By Dr. Shadi Masadeh 1.
OBJECT-ORIENTED TESTING. TESTING OOA AND OOD MODELS Analysis and design models cannot be tested in the conventional sense. However, formal technical reviews.
Company LOGO Flow analysis By Dr. Shadi Masadeh 1.
Network Requirements Analysis CPIT 375 Data Network Designing and Evaluation.
Data Network Design and Evaluation Dr Usman Saeed Assistant Professor Faculty of Computing and Information Technology North Jeddah Branch King Abdulaziz.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lecture # 07 Spring-2016.
Company LOGO Introduction By Dr. Shadi Masadeh 1.
Systems Analysis and Design in a Changing World, Fourth Edition
Why Is It All?  A Network is a set of connected devices. Whenever we have multiple devices, we have the problem of how to connect them to make one-to-one.
Date: April. 13, Monday Evening.
Client/Server Databases and the Oracle 10g Relational Database
The OSI Model and the TCP/IP Protocol Suite
Software Design and Architecture
Data collection methodology and NM paradigms
Dimitrios Makrakis SITE University of Ottawa CEG 4190-Winter 2018 Flow Analysis Instructor: Dimitrios Makrakis.
The OSI Model and the TCP/IP Protocol Suite
Network Layer The network layer is responsible for the source-to-destination delivery of a packet, possibly across multiple networks (links). Whereas the.
Network Architecture By Dr. Shadi Masadeh 1.
The OSI Model and the TCP/IP Protocol Suite
Presentation transcript:

Data Network Design and Evaluation Dr Usman Saeed Assistant Professor Faculty of Computing and Information Technology North Jeddah Branch King Abdulaziz University

Flow analysis Flow analysis is the process of characterizing traffic flows for a network: where they are likely to occur and what levels of performance they will require The intent of flow analysis is not to show every possible flow in a network, but rather to show those flows that will have the greatest impact on the network architecture and design.

Flows Flows are sets of network traffic that have common attributes, such as source/destination address, type of information, directionality, or other end-to- end information. Information within a flow is transmitted during a single session of an application. Flows are end-to-end, between source and destination applications/devices/users.

Flows Flows are where performance requirements, services, and service metrics are combined with location information to show where performance and service are needed in the network It also provides some insight into the degrees of hierarchy and diversity needed in the architecture and design

Flows Most flows are bidirectional and can be represented as either a single, double sided arrow with one or two sets of performance requirements, or as two separate flows, each with its own set of requirements

Individual and Composite Flows An individual flow is the flow for a single session of an application. When an individual flow has guaranteed requirements, those requirements are usually left with the individual flow and are not consolidated Individual flows are derived directly from the requirements specification, or are estimated from our best knowledge about the application, users, devices, and their locations.

Individual and Composite Flows A composite flow is a combination of requirements from multiple applications, or of individual flows, that share a common link, path, or network. Most flows in a network are composites

Critical Flows Some flows can be considered more important than others, in that they are higher in performance or have strict requirements (e.g., mission-critical, rate- critical, realtime, interactive, high- performance), while some flows may serve more important users, their applications, and devices. Individual flows with guaranteed requirements might also be considered first in the architecture and design

Identifying and Developing Flows Flows can usually be identified and developed from information in the requirements specification: user, application, device, and network requirements; user and application behavior flows are determined based on the requirements and locations of the applications and devices that generate (source) or terminate (sink) each traffic flow.

Identifying and Developing Flows The process for identifying and developing flows consists of identifying one or more applications and/or devices that you believe will generate and/or terminate traffic flows. Once you have chosen which applications and devices to focus on, you use their requirements from the requirements specification and their locations from the requirements map.

Identifying and Developing Flows Once you have identified each flow and determined its composition and location, you combine the performance requirements of flows into a flow specification.

Identifying and Developing Flows Some common approaches to identifying flows include: Focusing on a particular application, application group, device, or function (e.g., videoconferencing or storage) Developing a “profile” of common or selected applications that can be applied across a user population Choosing the top N (e.g., 3, 5, 10, etc.) applications to be applied across the entire network

Focusing on a Particular Application The idea here is to consider one or more applications that will likely drive the architecture and design—namely, those that are high performance you can spend more time determining their flows, as opposed to spreading your time out across many applications. Choose what to focus on and select the relevant information from the requirements specification.

Focusing on a Particular Application Example: Data Migration From requirements specification, for a single session of each application: Application 1: Staging data from user devices Capacity 100 Kb/s; Delay Unknown; Reliability 100% Application 1: Migrating data between servers Capacity 500 Kb/s; Delay Unknown; Reliability 100% Application 2: Migration to remote (tertiary) storage Capacity 10Mb/s ; Delay N/A; Reliability 100%

Focusing on a Particular Application You can use the location information to map out where the users, applications, and devices are. Using the information on user and application behavior, you determine or estimate where flows will occur Once flows are mapped, you apply performance information to each flow.

A Map of Device Locations for a Network

Flows Estimated between Devices for Application 1

Performance Information Added to Central Campus Flows for Application 1

Central Campus Flows for Application 1 Expanded with Building C

Developing a Profile Sometimes a set of common applications apply to a group of users or to the entire set of users. A profile or template can be developed for those applications. There are also times when flows have the same performance requirements, regardless of whether or not they share the same set of applications.

Choosing the Top N Applications Finally, choosing the top N applications for your network is a combination of the first two approaches. It is similar to the first approach, however; instead of one particular application, you use three, five It is also similar to the second approach, in that the result can also be an application profile.

Choosing the Top N Applications May be inferred by their degrees of usage, number of users, number of devices/servers, or performance requirements Top 5 Applications –Web Browsing – –File Transfer –Word Processing –Database Transactions

Example 1 Given a MTBCF requirement of 8000 hours and a MTTR requirement of 4 hours, calculate an availability requirement. Availability = (MTBCF)/(MTBCF + MTTR) A = (8000)/( ) = 99.95% availability requirement

Example 2 Describe 2 ways to make an uptime requirement of % more precise. Define the stated uptime requirement in terms of system availability Uptime during working hours Uptime for critical component only

Example 3 Which of the following devices (for the applications given) are data sinks/sources a. A storage device receiving streaming video from a camera b. A video editing unit, using video from the storage device in (a) c. A web server d. A file server (Sink) (Source and sink) (Source) (Source and sink)