ITEC 275 Computer Networks – Switching, Routing, and WANs Week 3 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Slides:



Advertisements
Similar presentations
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Advertisements

Top-Down Network Design Chapter Three Characterizing the Existing Internetwork Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Chapter 1: Introduction
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 1, Tuesday 1/9/2007)
Telecommunications Chapter 5 Chapter 5 Telecommunications
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
Service Providers & Data Link & Physical layers Week 4 Lecture 1.
Computer Networks & Security
Review on Networking Technologies Linda Wu (CMPT )
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (January 14, 2015)
CIS 460 – Network Analysis and Design Chapter 3 – Characterizing the Existing Internetwork.
Network Management Concepts and Practice Author: J. Richard Burke Presentation by Shu-Ping Lin.
ITEC 275 Computer Networks – Switching, Routing, and WANs
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
Chapter 5 Networks Communicating and Sharing Resources
Characterizing the Existing Internetwork PART 1
Chapter 9A Network Basics.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 3 Robert D’Andrea 2015 Some slides provide by Priscilla Oppenheimer and used with permission.
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
T OP -D OWN N ETWORK D ESIGN C HAPTER T HREE C HARACTERIZING THE E XISTING I NTERNETWORK Oppenheimer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 2.
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
Chapter 1 Communication Networks and Services Network Architecture and Services.
Other LAN Technologies. 2 LAN Standards u 802 Working Groups –802.3Ethernet LANs –802.5Token-Ring Networks –802.11Radio LANs – VG-AnyLAN.
WHAT IS NETWORKING?. Networking is … How computers talk to each other.
Top-Down Network Design Chapter Four Characterizing Network Traffic
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 3 Robert D’Andrea 2015 Some slides provide by Priscilla Oppenheimer and used with permission.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Review of Network Technologies. Basic of Network concepts Computer Network – A Communication system for connecting computers/hosts Why? – Better connectivity.
Topic 3 Analysing network traffic
Network design Topic 2 Existing network infrastructure.
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 3 Robert D’Andrea Winter 2016.
Local Area Networks: Monil Adhikari. Primary Function of a LAN File serving – large storage disk drive acts as a central storage repository Print serving.
Local Area Networks Honolulu Community College
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 3 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.
Top-Down Network Design Chapter Three Characterizing the Existing Internetwork Oppenheimer.
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2004 Cisco Press & Priscilla Oppenheimer.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 3 Robert D’Andrea 2015.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Data and Computer Communications Eighth Edition by William Stallings Chapter 15 – Local Area Network Overview.
Computer Networks and Internet. 2 Objectives Computer Networks Computer Networks Internet Internet.
Top-Down Network Design Chapter Three Characterizing the Existing Internetwork Copyright 2004 Cisco Press & Priscilla Oppenheimer.
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
© 2015 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 7: Networking Concepts IT Essentials v6.0.
Local Area Networks Honolulu Community College
Top-Down Network Design Chapter Four Characterizing Network Traffic
ITEC 275 Computer Networks – Switching, Routing, and WANs
Module 5 - Switches CCNA 3 version 3.0.
Computer Networks.
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Presentation transcript:

ITEC 275 Computer Networks – Switching, Routing, and WANs Week 3 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission Accuracy is a measurement of lost packets. This measurement is achieved by keeping track of lost packets while measuring response time.

Agenda Review Learning Activities – Analyzing an Existing Network – Analyzing Traffic in an Existing Network – QoS Introduce homework problems

What’s the Starting Point? According to Abraham Lincoln: – “If we could first know where we are and whither we are tending, we could better judge what to do and how to do it.”

Where Are We? When we characterize the infrastructure of a network, we develop a set of network maps and locate major devices and network segments. Developing a network map should involve understanding traffic flow, performance characteristics of network segments, and insight into where the users are concentrated and the level of traffic a network design must support. Everything you can think of to understand your customers network.

Where Are We? Characterize the existing internetwork in terms of: – Its infrastructure Logical structure (modularity, hierarchy, topology) Physical structure – Addressing and naming – Wiring and media – Architectural and environmental constraints – Health

How to Start? Characterization can start by using a top- down approach. – Starting with a map or set of maps depicting a high-level abstraction of informatiom Geographical information WAN WAN to LAN Buildings and floors Rooms containing servers, routers, mainframes, and switches Virtual information

How to Start? Characterizing large complex networks should reflect influence from the OSI reference model. A network map should depict applications and services used by the network users. Internal and external web sites and external data access entries Ftp operations Printer and file sharing devices DHCP, DNS, SNMP Router interface names, firewalls, NAT, IDS, and IPS

Get a Network Map Gigabit Ethernet Eugene Ethernet 20 users Web/FTP server Grants Pass HQ Gigabit Ethernet FEP (Front End Processor) IBM Mainframe T1 Medford Fast Ethernet 50 users Roseburg Fast Ethernet 30 users Frame Relay CIR = 56 Kbps DLCI = 5 Frame Relay CIR = 56 Kbps DLCI = 4 Grants Pass HQ Fast Ethernet 75 users Internet T1

Characterize Addressing and Naming IP addressing for major devices, client networks, server networks, private needing translation, and so on Any addressing oddities, such as discontinuous subnets? Any strategies for addressing and naming? – Route summarization reduces routes in a router – For example, sites may be named using airport codes San Francisco = SFO, Oakland = OAK

Discontiguous Subnets Area 1 Subnets Area 0 Network Area 2 Subnets Router ARouter B

Characterize the Wiring and Media Single-mode fiber Multi-mode fiber Shielded twisted pair (STP) copper Unshielded-twisted-pair (UTP) copper Coaxial cable Microwave Laser Radio Infra-red

Telecommunications Wiring Closet Horizontal Wiring Work-Area Wiring Wallplate Main Cross-Connect Room (or Main Distribution Frame) Intermediate Cross-Connect Room (or Intermediate Distribution Frame) Building A - HeadquartersBuilding B Vertical Wiring (Building Backbone) Campus Backbone Campus Network Wiring

Architectural Constraints Make sure the following are sufficient – Air conditioning – Heating – Ventilation – Power – Protection from electromagnetic interference – Doors that can lock

Architectural Constraints ParameterCopper Twisted PairMM FiberSM FiberWireless DistanceUp to 100 meters Up to 2 kilometers (Fast Ethernet) Up to 550 m (Gigabit Ethernet) Up to 300 m (10 Gigabit Ethernet) Up to 10 km (Fast Ethernet) Up to 5 km (Gigabit Ethernet) Up to 80 km (10 Gigabit Ethernet) Up to 500 m at 1 Mbps Bandwidth Up to 10 Gigabits per second (Gbps) Up to 10 Gbps Up to 10 Gbps or higher Up to 54 Mbps PriceInexpensiveModerate Moderate to expensive Moderate DeploymentWiring closetInternode or interbuilding

Architectural Constraints Make sure there’s space for: – Cabling conduits – Patch panels – Equipment racks – Work areas for technicians installing and troubleshooting equipment

Wireless Installation Inspect the architecture and environment constraints of the site to determining the feasibility of a wireless transmission. – Wireless transmission is RF (radio frequency) – A wireless expert should be hired – Network designers can install access points will be located and where the people concentration will be located – Access point is based on signal loss between the access point and the user of the access point.

RF Phenomena Wireless Installations Reflection causes the signal to bounce back on itself. Absorption occurs as the signal passes through materials Refraction is when a signal passes through one medium of one density and then through another medium of another density. Signal will bend. Diffraction when a signal can pass in part through a medium more easily in one part than another

RF Phenomena Wireless Installations A wireless Site Survey should be performed on the existing network for signal propagation, strength, and accuracy in different areas. – NIC cards ship with utilities on them to measure signal strength – Signal strength can be determined using a protocol analyzer – Access points send beacon frames every 100 milliseconds (ms). Use a protocol analyzer to analyze the signal strength being emitted from the different grid locations of the access points.

RF Phenomena Wireless Installations - Use a protocol analyzer to capture CRC errors. These errors stem from corruption and collisions. - Observe if frames are being lost in transmission - Observe the acknowledgment (ACK) and frame retries after a missing ACK. ACK is called a control frame. Clients and access points use them to implement a retransmission mechanism

RF Phenomena Wireless Installations Wired Ethernet Detects collisions through CSMA/CD (802.11) Ethernet uses CSMA/CA as the access method to gain access of the wire. An ACK control frame is returned to a sender for packet received. If a frame does not receive an ACK, it is retransmitted.

Check the Health of the Existing Internetwork Baseline network performance with sufficient time and at a typical time Baseline availability gather information from the customer on MTBF and MTTR Baseline bandwidth utilization during a specific time frame. This is usually a percentage of capacity. Accuracy is an upper layer protocol’s responsibility. A frame with a bad CRC is dropped and retransmitted. A good threshold rule for handling errors is that there should be no more than one bad frame per megabyte of data.

Check the Health of the Existing Internetwork - Accuracy is a measurement of lost packets. This measurement is achieved by keeping track of lost packets while measuring response time. -Switches have replaced hubs. - There should be fewer than 0.1 percent of frames encounter collisions. - There should be no late collisions. Indicate bad cabling, cabling longer than 100 meters, bad NIC, or duplex mismatch.

Check the Health of the Existing Internetwork - Autonegotiation has received it’s share of critism in the past for being inaccurate when setting up a point-to-point link half duplex and full duplex. - Autonegotiation of speed is usually not a problem. If set up incorrectly, it does not work. The speeds are 10 Mbps, 100 Mbps, or 1000 Mbps.

Check the Health of the Existing Internetwork - Category 3 cable will support 10MBps, but not 100 MBps and higher. Errors increase. Efficiency is linked to large frame sizes. Bandwidth utilization is optimized for efficiency when applications and protocols are in large sized frames. – Change window sizes on clients and servers. Increasing maximum transmission unit (MTU). – Able to ping and telnet but not be able to send HTTP, and FTP. – A hump exist on the sides of the average transmission. – Runt frames (less than 64 bytes) are a result of collisions on the same shared Ethernet segment.

Check the Health of the Existing Internetwork Response time can be measured using the round-trip time (RTT)ping command. Observe response time on a user workstation. Run typical applications to get a response. Response time for network services protocols, such as, DHCP and DNS. Status of major routers, switches, and firewalls

Characterize Availability Enterprise Segment 1 Segment 2 Segment n MTBFMTTR Date and Duration of Last Major Downtime Cause of Last Major Downtime Fix for Last Major Downtime

Network Utilization in Minute Intervals

Network Utilization in Hour Intervals

Bandwidth Utilization by Protocol Protocol 1 Protocol 2 Protocol 3 Protocol n Relative Network Utilization Absolute Network Utilization Broadcast Rate Multicast Rate

Characterize Packet Sizes

Characterize Response Time Node A Node B Node C Node D Node ANode BNode CNode D X X X X

Check the Status of Major Routers, Switches, and Firewalls Show buffers Show environment Show interfaces Show memory Show processes Show running-config Show version

Tools Protocol analyzers Multi Router Traffic Grapher (MRTG) Remote monitoring (RMON) probes Cisco Discovery Protocol (CDP) Cisco IOS NetFlow technology CiscoWorks

Network Traffic Factors Traffic flow Location of traffic sources and data stores Traffic load Traffic behavior Quality of Service (QoS) requirements

User Communities User Community Name Size of Community (Number of Users) Location(s) of Community Application(s) Used by Community

Data Stores Data StoreLocationApplication(s)Used by User Community(or Communities)

Traffic Flow Destination 1Destination 2Destination 3Destination MB/secMB/secMB/secMB/sec Source 1 Source 2 Source 3 Source n

Traffic Flow Example Administration Business and Social Sciences Math and Sciences 50 PCs 25 Macs 50 PCs 30 PCs 30 Library Patrons (PCs) 30 Macs and 60 PCs in Computing Center Library and Computing Center App Kbps App 2 60 Kbps App Kbps App 4 48 Kbps App Kbps Total 808 Kbps App 1 48 Kbps App 2 32 Kbps App 3 96 Kbps App 4 24 Kbps App Kbps App Kbps App Kbps Total 1900 Kbps App 1 30 Kbps App 2 20 Kbps App 3 60 Kbps App 4 16 Kbps Total 126 Kbps App 2 20 Kbps App 3 96 Kbps App 4 24 Kbps App 9 80 Kbps Total 220 Kbps Arts and Humanities Server Farm 10-Mbps Metro Ethernet to Internet

Types of Traffic Flow Terminal/host Client/server Thin client Peer-to-peer Server/server Distributed computing

Traffic Flow for Voice over IP The flow associated with transmitting the audio voice is separate from the flows associated with call setup and teardown. – The flow for transmitting the digital voice is essentially peer-to-peer. – Call setup and teardown is a client/server flow A phone needs to talk to a server or phone switch that understands phone numbers, IP addresses, capabilities negotiation, and so on.

Network Applications Traffic Characteristics Name of Application Type of Traffic Flow Protocol(s) Used by Application User Communities That Use the Application Data Stores (Servers, Hosts, and so on) Approximate Bandwidth Requirements QoS Requirements

Traffic Load To calculate whether capacity is sufficient, you should know: – The number of stations – The average time that a station is idle between sending frames – The time required to transmit a message once medium access is gained That level of detailed information can be hard to gather, however.

Size of Objects on Networks Terminal screen: 4 Kbytes Simple 10 Kbytes Simple web page: 50 Kbytes High-quality image: 50,000 Kbytes Database backup: 1,000,000 Kbytes or more

Traffic Behavior Broadcasts – All ones data-link layer destination address FF: FF: FF: FF: FF: FF – Doesn’t necessarily use huge amounts of bandwidth – But does disturb every CPU in the broadcast domain Multicasts – First bit sent is a one 01:00:0C:CC:CC:CC (Cisco Discovery Protocol) – Should just disturb NICs that have registered to receive it – Requires multicast routing protocol on internetworks

Network Efficiency Frame size Protocol interaction Windowing and flow control Error-recovery mechanisms

QoS Requirements ATM service specifications – Constant bit rate (CBR) – Realtime variable bit rate (rt-VBR) – Non-realtime variable bit rate (nrt-VBR) – Unspecified bit rate (UBR) – Available bit rate (ABR) – Guaranteed frame rate (GFR)

QoS Requirements per IETF IETF (Internet Engineering Task Force) IETF integrated services working group specifications – Controlled load service Provides client data flow with a QoS closely approximating the QoS that same flow would receive on an unloaded network – Guaranteed service Provides firm (mathematically provable) bounds on end-to-end packet-queuing delays

QoS Requirements per IETF IETF differentiated services working group specifications – RFC 2475 – IP packets can be marked with a differentiated services code point (DSCP) to influence queuing and packet-dropping decisions for IP datagrams on an output interface of a router.

Summary Characterize the existing internetwork before designing enhancements. Helps you verify that a customer’s design goals are realistic. Helps you locate where new equipment will be placed. Helps you cover yourself if the new network has problems due to unresolved problems in the old network.

Summary Continue to use a systematic, top-down approach Don’t select products until you understand network traffic in terms of: – Flow – Load – Behavior – QoS requirements

Review Questions What factors will help you decide if the existing internetwork is in good enough shape to support new enhancements? When considering protocol behavior, what is the difference between relative network utilization and absolute network utilization? Why should you characterize the logical structure of an internetwork and not just the physical structure? What architectural and environmental factors should you consider for a new wireless installation?

Review Questions List and describe six different types of traffic flows. What makes traffic flow in voice over IP networks challenging to characterize and plan for? Why should you be concerned about broadcast traffic? How do ATM and IETF specifications for QoS differ?

This Week’s Outcomes Analyzing an Existing Network Analyzing Traffic in an Existing Network QoS

Due this week 2-1 – Concept questions 2

Next week 3-1 – Concept questions 3 FranklinLive session 4 Ensure you have the VMware View Client installed Examine the MIMIC simulator software

Q & A Questions, comments, concerns?