T OP -D OWN N ETWORK D ESIGN C HAPTER F OUR C HARACTERIZING N ETWORK T RAFFIC Oppenheimer.

Slides:



Advertisements
Similar presentations
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Advertisements

Chabot College Chapter 2 Review Questions Semester IIIELEC Semester III ELEC
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
1 Fall 2005 Extending LANs Qutaibah Malluhi CSE Department Qatar University Repeaters, Hubs, Bridges, Fiber Modems, and Switches.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Wide Area Networks School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 1, Tuesday 1/9/2007)
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Service Providers & Data Link & Physical layers Week 4 Lecture 1.
Internetworking Devices that connect networks are called Internetworking devices. A segment is a network which does not contain Internetworking devices.
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
Marwan Al-Namari Week 1. Teaching Plan: Weeks 1 – 14. Week 1-6 (In week 4 you will have a Quiz No.1). Mid Term Holiday Mid-Term Exam. Week 7-14 (In week.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Connecting LANs, Backbone Networks, and Virtual LANs
Network Topologies.
We will be covering VLANs this week. In addition we will do a practical involving setting up a router and how to create a VLAN.
Each computer and router interface maintains an ARP table for Layer 2 communication The ARP table is only effective for the broadcast domain (or LAN)
CIS 460 – Network Analysis and Design Chapter 4 – Characterizing Network Traffic.
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Chapter 4: Managing LAN Traffic
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Advanced Programming Rabie A. Ramadan.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Common Devices Used In Computer Networks
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Oppenheimer.
Cisco – Chapter 11 Routers All You Ever Wanted To Know But Were Afraid to Ask.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Release 16/07/2009Jetking Infotrain Ltd. Assembling and Cabling Cisco Devices Chapter 3.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
NETWORKING FUNDAMENTALS. Bandwidth Bandwidth is defined as the amount of information that can flow through a network connection in a given period of time.Bandwidth.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Data and Computer Communications Chapter 10 – Circuit Switching and Packet Switching (Wide Area Networks)
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
Computer Networks with Internet Technology William Stallings
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
Networks and Protocols CE Week 2a. Network hardware.
WHAT IS NETWORKING?. Networking is … How computers talk to each other.
Top-Down Network Design Chapter Four Characterizing Network Traffic
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Topic 3 Analysing network traffic
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Local Area Networks Honolulu Community College
THE NETWORKS Theo Chakkapark. Open System Interconnection  The tower of power!  The source of this power comes from the model’s flexibility.
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2004 Cisco Press & Priscilla Oppenheimer.
Sem1 - Module 10 Routing Fundamentals and Subnets
Computer Communication and Networking Lecture # 4 by Zainab Malik 1.
Client-server communication Prof. Wenwen Li School of Geographical Sciences and Urban Planning 5644 Coor Hall
Chapter 9 Introduction To Data-Link Layer 9.# 1
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Top-Down Network Design Chapter Four Characterizing Network Traffic
CT1303 LAN Rehab AlFallaj.
Multicasting Unicast.
Presentation transcript:

T OP -D OWN N ETWORK D ESIGN C HAPTER F OUR C HARACTERIZING N ETWORK T RAFFIC Oppenheimer

To expose to the students about techniques for characterizing traffic flow, traffic volume, and protocol behavior O BJECTIVES To analyze network traffic patterns that help you in selecting appropriate logical and physical network design solutions

C HARACTERIZING N ETWORK T RAFFIC  In this step the flow of the traffic both existing and to be added or changed will be accounted for  This is done by identifying  Traffic flow  Location of traffic sources and data stores  Traffic load/volume  Traffic behavior  Quality of Service (QoS) requirements 3

C HARACTERIZING T RAFFIC F LOW  To determine the sources and destinations of traffic; first we need to identify the user communities  A user community is a collection of staff that do basically the same thing, such as the accounting program users  This may be a limited group, isolated to a single area or building or it may be the users who are widely geographically distributed- characterize user communities by application and protocol rather than by department boundary.  Create a chart of these groups 4

Community Name Number of Users LocationApplication Enterprise Accounting 5Building B Floor 2 Rooms 3-5 MAS90 CEO Accounting 1Building A Corner Office Quicken Network Managers 3Building C Deep Dark Basement OpenView Network Managers 3Building C Deep Dark Basement AlertPage U SER C OMMUNITY LIST 5

C HARACTERIZING T RAFFIC F LOW  Next identify where the data stores of these user communities are located  Data store(data sink) – is an area in a network where application layer data resides.  This could be a Server Server Farm Mainframe offsite NAS  Create a chart of these sites along with the user communities 6

Data Store Name LocationApplicationUsed By Accounting Data Building C Even Deeper and Darker Basement MAS90Enterprise Accounting CEO‘s BudgetBuilding A Corner Office QuickenCEO OpenView Logs Building C Deep Dark Basement OpenViewNetwork Managers AlertPage Logs Building C Deep Dark Basement AlertPageNetwork Managers D ATA S TORE LIST 7

C HARACTERIZING T RAFFIC F LOW  Documenting traffic flow (TF) on the existing network  For the data flow from the user communities to their data stores, measure or estimate the traffic flow over the links Use a network analyzer or network management tool for this This is not likely to be exact It is being used to identify bottlenecks 8

CONTINUE  Measuring TF behavior can help a network designer to do the following:  Characterize the behavior of the existing network  Plan for network development and expansion  Quantify network performance  Verify the quality of network services  Ascribe network usage to users and applications 9

CONTINUE  An individual network TF can be defined as protocol and application information transmitted between communicating entities during a single session.  a flow has attributes such as :  Direction symmetry  Routing path and routing options  No of packets  No of bytes  Address for each end of the flow  ** a communicating entity can be an end system (host), a network or an autonomous system 10

CONTINUE  Simple method for characterizing the size of flow = measure the number of Kbytes/Mbytes per second between communicating entities.  Use protocol analyzer or network management system to record load between important sources and destinations.  Cisco tools : Cisco Flow collector and data analyzer 11

C HARACTERIZING TYPES OF TF FOR NEW NETWORK APPLICATIONS  A network flow can be characterized by two things:  Direction  Symmetry Direction= specifies whether data travels in both directions or just in one directions. It also specifies the path that a flow takes as it travels from source to destination through an internetwork. Symmetry = describes whether the flow tends to have higher performance or QoS requirements in one direction than the other direction. 12

T YPES OF TRAFFIC 13

CONTINUE  A good technique for characterizing network traffic flow is to classify applications as supporting one of a few well-known flow types:  Terminal/host TF  Client/server TF  Peer-to-peer TF  Server/Server TF  Distributed computing TF  Thin client 14

T YPES OF TRAFFIC Different traffic types have different characteristics ◦ Terminal/Host  Applications based on Terminal / Host are low - volume character traffic. The traffic from the terminal will be a few characters while the host returns screen full of characters.  Example: Telnet ◦ Client/Server  The traffic flow in Client / server environment is bi-directional where clients send queries and requests to a server and the server responds with data or permission for the client to send data.  Traffic sent to the host is usually less than 100 bytes and the return traffic from the host can be more than 1500 bytes.  Example; HTTP, TCP/IP 15

T YPES OF TRAFFIC  Server-to-Server The flow depends on the relationship between the servers It includes transmissions between servers and transmissions between servers and management applications  Distributed Computing Several computers join together to solve a single problem Normally the exchange is quite high (volume of traffic) It is bi-directional 16

T YPES OF TRAFFIC  Peer-to-peer The flow is usually bi-directional. Communicating entities transmit approximately equal amounts of information.  Thin-client/server-based computing: It is a computer or a computer program which depends heavily on some other computer (its server) to fulfill its traditional computational roles. User applications originate on a central server – better security, easy to managed A computing appliance is a thin client designed to perform specific or dedicated tasks. i.e. cash register, a dedicated machine, a databse retrieval device etc.. Lower support cost (advantage) Example; Windows NT terminal Server edition 17

ApplicationType of Traffic ProtocolUser Community Data Store BandwidthQoS Enterprise Accounting Client/Server Browser/Server IPEnterprise Accounting Data Average of 2 Mbps from 8 to 5 weekdays None OpenViewTerminal/ServerIPAverage of 2 Kbps 24X7X365 OpenView Logs Average of 2 Kbps 24X7X365 None AlertPageTerminal/ServerIPAverage of 65 Kbps Every hour 24X7X365 AlertPage Logs Average of 65 Kbps Every hour 24X7X365 None T YPES OF TRAFFIC LIST 18

T YPES OF T RAFFIC  A quick estimate of traffic flow can be made by using the following table  This table shows the average flows for the different types of data  In many cases, especially when tools such as a base-lining tool or protocol analyzer are not available, this is the best that can be done 19

Type of ApplicationTypical Data Size Kbytes Type of ApplicationTypical Data Size Kbytes Terminal Screen4Graphical Screen Presentation Document 2,000 Web Page50High Resolution Image50,000 Spreadsheet100Multimedia Object100,000 Word Processing Document 200Database1,000,000 T RAFFIC F LOW E STIMATES L IST 20

T RAFFIC F LOW E XAMPLE 21 Administration Business and Social Sciences Math and Sciences 50 PCs 25 Macs 50 PCs 30 PCs 30 Library Patrons (PCs) 30 Macs and 60 PCs in Computing Center Library and Computing Center App Kbps App 2 60 Kbps App Kbps App 4 48 Kbps App Kbps Total 808 Kbps App 1 48 Kbps App 2 32 Kbps App 3 96 Kbps App 4 24 Kbps App Kbps App Kbps App Kbps Total 1900 Kbps App 1 30 Kbps App 2 20 Kbps App 3 60 Kbps App 4 16 Kbps Total 126 Kbps App 2 20 Kbps App 3 96 Kbps App 4 24 Kbps App 9 80 Kbps Total 220 Kbps Arts and Humanities Server Farm 10-Mbps Metro Ethernet to Internet

C HARACTERIZING T RAFFIC L OAD Purpose:  To avoid a design with any critical bottleneck.  To avoid bottleneck:  Research for application usage patterns, idle times between packets and sessions, frame sizes, and other traffic behavioral patterns for application and system approach.  Give large amounts of bandwidth at a problem. LAN bandwidth is extremely cheap, Gigabit Ethernet also most organizations can afford. 22

C HARACTERIZING T RAFFIC L OAD : S TEPS 1. Calculating Theoretical Traffic Load ◦ To calculate whether capacity is sufficient, you should know: ◦ The number of stations ◦ The average time that a station is idle between sending frames ◦ The time required to transmit a message once medium access is gained 2. Documenting Application-Usage Patterns ◦ Few data obtained during characterizing traffic flow  user communities, number of users in communities, and the applications that users employ. ◦ Additional information required: ◦ The frequency of application sessions (number of session per day, week, month, or whatever time period is appropriate. ◦ The length of an average application session ◦ The number of simultaneous users of an application 23

C HARACTERIZING T RAFFIC L OAD : S TEPS 3. Refining Estimates of Traffic Load Caused by Applications  Need to research the size of data objects sent by applications, the overhead caused by protocol layers, and any additional load caused by application initialization.  Table 4-5 shows some estimates for object sizes 4. Estimating Traffic Load Caused by Routing Protocols  At this point of designing process, you might not have selected routing protocols for new network but you should have identified routing protocols running on the existing network.  Use table 4-7 as guidance that shows the amount of legacy distance- vector routing protocols. 24

S IZE OF O BJECTS ON N ETWORKS Table 4-5 : Approximate Size of Objects that applications transfer across networks 25

B ANDWIDTH USED BY L EGACY R OUTING P ROTOCOLS : S AMPLES 26 Table 4-7: Bandwidth used by Legacy Routing Protocols

C HARACTERIZING TRAFFIC BEHAVIOR  To select appropriate network design solutions, designer need to understand protocol and application behavior in addition to traffic flows and load.  Exp: to select appropriate LAN topologies, designer need to investigate the level of broadcast traffic on the LAN. 27

C HARACTERIZING T RAFFIC B EHAVIOR 1. Broadcast/Multicast Behavior Broadcasts ◦ Broadcast frame = frame that goes to all network stations on a LAN ◦ All 1s in binary data-link layer destination address ◦ FF: FF: FF: FF: FF: FF ◦ Doesn’t necessarily use huge amounts of bandwidth ◦ But does disturb every CPU in the broadcast domain 28

CONTINUE Multicasts ◦ Multicast frame = frame that goes to a subset of stations. ◦ Example: 01:00:0C:CC:CC:CC (Cisco Discovery Protocol) ◦ Should just disturb NICs that have registered to receive it 29

CONTINUE  switches and bridges forward broadcast and multicast frames out all ports.  Too many broadcast frames can overwhelm end stations, switches and routers.  It is important to research the level of broadcast traffic in your proposed design and limit the number of stations in a single broadcast domain. ( A broadcast domain is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer. A broadcast domain can be within the same LAN segment or it can be bridged to other LAN segments-Ref: wiki) computer networknodesbroadcastdata link layer  Broadcast traffic is necessary and unavoidable since routing and switching protocols use broadcast and multicast to share information about the internetwork topology. 30

CONTINUE  Server send broadcast and multicast to advertise their services  Desktop protocols i.e. TCP/IP use need broadcast/multicast frames to find services etc..  Hence, when designing network topology, be sure to take into consideration the broadcast behavior of desktop protocols. 31

C HARACTERIZING T RAFFIC B EHAVIOR 2. Network Efficiency  Efficiency refers to whether applications and protocols use bandwidth effectively. Efficiency is affected by: Frame size Protocol interaction (pg 114) Windowing and flow control Error-recovery mechanisms 32

C HARACTERIZING Q O S R EQUIREMENTS Besides information about load, you also need to know if the requirements is flexible or inflexible. Two techniques in analyzing QoS requirements: (you might need to read your text pg 119 –126) 1. ATM service specifications  Constant bit rate (CBR)  Realtime variable bit rate (rt-VBR)  Non-realtime variable bit rate (nrt-VBR)  Unspecified bit rate (UBR)  Available bit rate (ABR)  Guaranteed frame rate (GFR) 33

Q O S R EQUIREMENTS 2. IETF integrated services working group specifications ◦ Controlled load service  Provides client data flow with a QoS closely approximating the QoS that same flow would receive on an unloaded network ◦ Guaranteed service  Provides firm (mathematically provable) bounds on end-to-end packet-queuing delays 34

Q O S R EQUIREMENTS  IETF differentiated services working group specifications  RFC 2475  IP packets can be marked with a differentiated services codepoint (DSCP) to influence queuing and packet-dropping decisions for IP datagrams on an output interface of a router  Grade of Service Requirements for Voice Applications  Documenting QoS Requirements  Work closely with your customer and fill in the QoS Requirements column of table

S UMMARY  Continue to use a systematic, top-down approach  Don’t select products until you understand network traffic in terms of:  Flow  Load  Behavior  QoS requirements – most technical part 36

R EVIEW Q UESTIONS  List and describe six different types of traffic flows.  What makes traffic flow in voice over IP networks challenging to characterize and plan for?  Why should you be concerned about broadcast traffic?  How do ATM and IETF specifications for QoS differ? 37