Network Architecture By Dr. Shadi Masadeh 1.

Slides:



Advertisements
Similar presentations
© 2005 Prentice Hall7-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
Advertisements

Protocols and the TCP/IP Suite
Network Design and Implementation IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
2005/05/25 Unified Modeling Lanauage 1 Introduction to Unified Modeling Language (UML) – Part One Ku-Yaw Chang Assistant Professor.
Chapter 6 System Engineering - Computer-based system - System engineering process - “Business process” engineering - Product engineering (Source: Pressman,
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
UNIT 5 SEMINAR Unit 5 Chapter 6, plus Lab 10 for next week Course Name – IT482 Network Design Instructor – David Roberts Contact Information:
9 Systems Analysis and Design in a Changing World, Fourth Edition.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Data Network Designing and Evaluation
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Jemerson Pedernal IT 2.1 FUNDAMENTALS OF DATABASE APPLICATIONS by PEDERNAL, JEMERSON G. [BS-Computer Science] Palawan State University Computer Network.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Company LOGO Network Architecture By Dr. Shadi Masadeh 1.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
PART1 Data collection methodology and NM paradigms 1.
Protocols and layering Network protocols and software Layered protocol suites The OSI 7 layer model Common network design issues and solutions.
Dr. Ir. Yeffry Handoko Putra
Date: April. 13, Monday Evening.
CompTIA Security+ Study Guide (SY0-401)
Chapter 12: Architecture
Chapter 19: Network Management
View Controllers In the Model-View-Controller (MVC) design pattern, a controller object provides the custom logic needed to bridge the application’s data.
Course Outcomes of Object Oriented Modeling Design (17630,C604)
Chapter 2 Database System Concepts and Architecture
Information Collection and Presentation Enriched by Remote Sensor Data
Connecting LANs, Backbone Networks
What Are Routers? Routers are an intermediate system at the network layer that is used to connect networks together based on a common network layer protocol.
Distribution and components
CHAPTER 3 Architectures for Distributed Systems
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
CHAPTER 2 CREATING AN ARCHITECTURAL DESIGN.
Oracle Solaris Zones Study Purpose Only
Introduction to Cloud Computing
#01 Client/Server Computing
Designing Routing and Switching Architectures. Howard C. Berkowitz
IS3120 Network Communications Infrastructure
Chapter 7 Backbone Network
CompTIA Security+ Study Guide (SY0-401)
Chapter 5 Networks Communicating and Sharing Resources
Protocols and the TCP/IP Suite
Object-Oriented Analysis
Software Defined Networking (SDN)
An Introduction to Computer Networking
Big-Data around the world
Chapter 12: Physical Architecture Layer Design
Data collection methodology and NM paradigms
Computer communications
Software Design Lecture : 15.
An Introduction to Software Architecture
CHAPTER 9 (part a) BASIC INFORMATION SYSTEMS CONCEPTS
Operating Systems : Overview
Cloud-Enabling Technology
Operating Systems : Overview
Protocols and the TCP/IP Suite
Requirements Definition
Chapter 5 Architectural Design.
Design Yaodong Bi.
Chapter-6 Access Network Design.
#01 Client/Server Computing
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Network Architecture By Dr. Shadi Masadeh 1

Network Architecture Background What is network architecture? In general, architecture is the art and science of designing and constructing, or the discipline dealing with the principles of design and building . Network architecture Includes addressing and routing, network management, performance, and security. .

Network Architecture What is network architecture? A more specific definition Understanding of the relationships between (architectural) components of the network. Network architecture guides the technical design of the network, through the application of high-level design principles to the network building blocks.

Network Architecture Building blocks might view as: The physical entities (routers, switches, multiplexers, servers, etc.) in the network, or Functional entities instead of physical entities. In doing so, the set of high-level design principles that constitute the network architecture is applied to how the network functions and operates. Network functions are closely coupled to users, their applications, and their devices. This allows user requirements to be directly represented in the network architecture. Measures the network success, the success of a network can be defined by how well user, application, and device requirements are supported through these functions.

Architecture and Design Architecture and design are similar in many ways, and designs are often just more detailed versions of the architecture. Figure 5.1 compares some of the similarities and differences between architecture and design.

Architecture and Design Architecture and design are similar in one important way: they both attempt to solve multidimensional problems based on the results of the network analysis process. Figure 5.2 shows that a solution space can be made up of many variables (e.g., performance, security, and network management) and that network architecture solutions are based on relationships between these variables.

Architecture and Design Network architecture describes relationships, between components. Network design usually specifies technologies, protocols, and network devices Architecture and design complement each other. Another way that architecture can differ from design is in the need for location information. Location is important for some parts of the architecture (e.g., external interfaces, locations of existing devices and applications), Relationships between components are generally location independent. Inserting location information into the network architecture can be constraining. For a network design, location information is important. (In the design there is a sufficient amount of detail that locations play an important part of the decision-making process.)

Component Architectures Component architecture is a description of how and where each function of a network is applied within that network. It consists of a set of mechanisms (hardware and software) by which that function is applied to the network Each function of a network represents a major capability of that network; four functions that are major capabilities of networks: Addressing/routing Network management Performance Security. Other general functions, such as infrastructure and storage….

Component Architectures Mechanisms are hardware and software that help a network to achieve each capability. See Figure 5.3

Component Architectures

Network Management Component Architecture Network management is providing functions to control, plan, allocate, deploy, coordinate, and monitor network resources. Network management is part of most or all of the network devices. such As, the network management architecture is important as it determines how and where management mechanisms are applied in the network. Network management mechanisms include monitoring and data collection; instrumentation to access, transfer, act upon, and modify data; device and service configuration; and data processing, display, and storage.

Reference Architecture A reference architecture is a description of the complete network architecture and contains all of the component architectures (i.e., functions) being considered for that network.

Component Architectures

Component Architectures

Architectural Models We have three types of architectural models are presented here: topological models (geographical) flow-based models (traffic flows) functional models (features)

1. Topological models There are two popular topological models: LAN/MAN/WAN model . Access/Distribution/Core model.

LAN/MAN/WAN This model is simple and is based on the geographical and/or topological separation of networks. For example, the LAN/MAN/WAN model is often used as a LAN/WAN model, or the LAN component is separated into campus, buildings, or even floors.

Access/Distribution/Core models This model focuses on function instead of location. can be used to reflect the behavior of the network at its access, distribution, and core areas.

The access area : is closest to the users and their applications . is where most traffic flows are sourced and sinked. flows and requirements can be treated. on an individual basis more easily than in the distribution and core areas.

The distribution area : can also source and sink flows, but they are more likely to be to or from multiple-user devices, such as servers or specialized devices. Few users are normally directly connected to the distribution area.

The core of the network : is used for bulk transport of traffic. flows are not usually sourced or sinked at the core. any view of individual flows is lost at the core.

2. Flow-Based Models

3. Functional Models In this model we present : service-provider model intranet/extranet model end-to-end models. The service-provider architectural model is based on service-provider functions, focusing on privacy and security, service delivery to customers (users), and billing. In this model, interactions between providers (the networks) and with users.

The intranet/extranet architectural model focuses on security and privacy, including the separation of users, devices, and applications based on secure access. Note that in this model there can be several levels of hierarchy (security/privacy)

The end-to-end architectural model focuses on all components in the end to-end path of a traffic flow. This model is most closely aligned to the flow-based perspective of networking.