Top-Down Network Design Chapter Four Characterizing Network Traffic

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
© 2007 Cisco Systems, Inc. All rights reserved. 1 Network Addressing Networking for Home and Small Businesses – Chapter 5.
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer.
T OP -D OWN N ETWORK D ESIGN C HAPTER F OUR C HARACTERIZING N ETWORK T RAFFIC Oppenheimer.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
CIS 460 – Network Analysis and Design Chapter 4 – Characterizing Network Traffic.
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Integrated Services Advanced Multimedia University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot December 2010 December 2010.
Integrated Services (RFC 1633) r Architecture for providing QoS guarantees to individual application sessions r Call setup: a session requiring QoS guarantees.
Chapter 18. Virtual-Circuit Networks: Frame Relay and ATM
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
1 Integrated and Differentiated Services Multimedia Systems(Module 5 Lesson 4) Summary: r Intserv Architecture RSVP signaling protocol r Diffserv Architecture.
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Oppenheimer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
Computer Networks with Internet Technology William Stallings
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Top-Down Network Design Chapter Four Characterizing Network Traffic
Topic 3 Analysing network traffic
Chapter 3: Network Protocols and Communications
Department of Computer and IT Engineering University of Kurdistan
Chapter 9 Introduction To Data-Link Layer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2004 Cisco Press & Priscilla Oppenheimer.
Chapter 6 outline r 6.1 Multimedia Networking Applications r 6.2 Streaming stored audio and video m RTSP r 6.3 Real-time, Interactive Multimedia: Internet.
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
Chapter 9 Introduction To Data-Link Layer
Chapter 3 Part 1 Switching and Bridging
INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723
Chapter 2 PHYSICAL LAYER.
Chapter 9 Introduction To Data-Link Layer 9.# 1
Local Area Networks Honolulu Community College
EE 122: Lecture 19 (Asynchronous Transfer Mode - ATM)
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
David J. Young Collective Technologies 25-August-1998
The OSI Model and the TCP/IP Protocol Suite
Semester 1 Cisco Discovery JEOPADY Chapter 3.
Introduction to Networking & Telecommunications
Network Layer Goals: Overview:
Networking for Home and Small Businesses – Chapter 6
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
CS4470 Computer Networking Protocols
Chapter 3 Switching.
Instructor Materials Chapter 3: Network Protocols and Communications
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Web Development & Design Chapter 1, Sections 4, 5 & 6
Wednesday, September 19, 2018 What Is the Internet?
Chapter 4-1 Network layer
Networking for Home and Small Businesses – Chapter 6
Chapter 2 Introduction Application Requirements VS. Transport Services
Chapter 25 Multimedia TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite
Advanced Computer Networks
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Network Core and QoS.
EE 122: Quality of Service and Resource Allocation
Data Communication Networks
Switching Techniques.
Networking for Home and Small Businesses – Chapter 6
Connecting to the Network
The OSI Model and the TCP/IP Protocol Suite
Data-Link Layer The Internet is a combination of networks glued together by connecting devices (routers or switches) If a packet is to travel from a host.
Computer Networks Protocols
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Multicasting Unicast.
Network Core and QoS.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer

Network Traffic Factors Traffic flow Location of traffic sources and data stores Traffic load Traffic behavior Quality of Service (QoS) requirements

User Communities User Community Name Size of Community (Number of Users) Location(s) of Community Application(s) Used by Community

Data Stores Data Store Location Application(s) Used by User Community(or Communities)

Traffic Flow Destination 1 Destination 2 Destination 3 Destination MB/sec MB/sec MB/sec MB/sec Source 1 Source 2 Source 3 Source n

Library and Computing Center Business and Social Sciences Traffic Flow Example Library and Computing Center 10-Mbps Metro Ethernet to Internet 30 Library Patrons (PCs) 30 Macs and 60 PCs in Computing Center App 1 108 Kbps App 2 60 Kbps App 3 192 Kbps App 4 48 Kbps App 7 400 Kbps Total 808 Kbps Server Farm App 2 20 Kbps App 3 96 Kbps App 4 24 Kbps App 9 80 Kbps Total 220 Kbps 25 Macs 50 PCs 50 PCs Arts and Humanities Administration App 1 30 Kbps App 2 20 Kbps App 3 60 Kbps App 4 16 Kbps Total 126 Kbps App 1 48 Kbps App 2 32 Kbps App 3 96 Kbps App 4 24 Kbps App 5 300 Kbps App 6 200 Kbps App 8 1200 Kbps Total 1900 Kbps Math and Sciences 30 PCs 50 PCs Business and Social Sciences

Types of Traffic Flow Terminal/host Client/server Thin client Peer-to-peer Server/server Distributed computing

Traffic Flow for Voice over IP The flow associated with transmitting the audio voice is separate from the flows associated with call setup and teardown. The flow for transmitting the digital voice is essentially peer-to-peer. Call setup and teardown is a client/server flow A phone needs to talk to a server or phone switch that understands phone numbers, IP addresses, capabilities negotiation, and so on.

Network Applications Traffic Characteristics Name of Application Type of Traffic Flow Protocol(s) Used by Application User Communities That Use the Application Data Stores (Servers, Hosts, and so on) Approximate Bandwidth Requirements QoS Requirements

Traffic Load To calculate whether capacity is sufficient, you should know: The number of stations The average time that a station is idle between sending frames The time required to transmit a message once medium access is gained That level of detailed information can be hard to gather, however

Size of Objects on Networks Terminal screen: 4 Kbytes Simple e-mail: 10 Kbytes Simple web page: 50 Kbytes High-quality image: 50,000 Kbytes Database backup: 1,000,000 Kbytes or more

Traffic Behavior Broadcasts Multicasts All ones data-link layer destination address FF: FF: FF: FF: FF: FF Doesn’t necessarily use huge amounts of bandwidth But does disturb every CPU in the broadcast domain Multicasts First bit sent is a one 01:00:0C:CC:CC:CC (Cisco Discovery Protocol) Should just disturb NICs that have registered to receive it Requires multicast routing protocol on internetworks

Network Efficiency Frame size Protocol interaction Windowing and flow control Error-recovery mechanisms

QoS Requirements ATM service specifications Constant bit rate (CBR) Realtime variable bit rate (rt-VBR) Non-realtime variable bit rate (nrt-VBR) Unspecified bit rate (UBR) Available bit rate (ABR) Guaranteed frame rate (GFR)

QoS Requirements per IETF IETF integrated services working group specifications Controlled load service Provides client data flow with a QoS closely approximating the QoS that same flow would receive on an unloaded network Guaranteed service Provides firm (mathematically provable) bounds on end-to-end packet-queuing delays

QoS Requirements per IETF IETF differentiated services working group specifications RFC 2475 IP packets can be marked with a differentiated services codepoint (DSCP) to influence queuing and packet-dropping decisions for IP datagrams on an output interface of a router

Summary Continue to use a systematic, top-down approach Don’t select products until you understand network traffic in terms of: Flow Load Behavior QoS requirements

Review Questions List and describe six different types of traffic flows. What makes traffic flow in voice over IP networks challenging to characterize and plan for? Why should you be concerned about broadcast traffic? How do ATM and IETF specifications for QoS differ?