Bandwidth Management and Optimisation (BMO): Policy development workshop Overview of Challenges and Solutions.

Slides:



Advertisements
Similar presentations
Computer Networks TCP/IP Protocol Suite.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
TCP/IP MODEL Maninder Kaur
IP datagrams Service paradigm, IP datagrams, routing, encapsulation, fragmentation and reassembly.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
Review: Routing algorithms Distance Vector algorithm. –What information is maintained in each router? –How to distribute the global network information?
Guide to TCP/IP, Third Edition
Chapter 7: Transport Layer
Chapter 7 – Transport Layer Protocols
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
TCP/IP Lecture Extra. TCP/IP Developed by DARPA (Defense Advanced Research Projects) TCP is a connection-oriented transport protocol that sends data as.
Using Prices to Allocate Resources at Access Points Jimmy Shih, Randy Katz, Anthony Joseph One Administrative Domain Access Point A Access Point B Network.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
13/10/14 INASP: Effective Network Management Workshops Unit 9: Making a Difference.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Gursharan Singh Tatla Transport Layer 16-May
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
1 Transport Layer Computer Networks. 2 Where are we?
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
TCP/IP Suite Transmission Control Protocol/ Internet Protocol Presentation by Chandra Porchia.
Transport Layer OSI Model. The transport layer is responsible for the segmentation and the delivery of a message from one process to another.
University of the Western Cape Chapter 12: The Transport Layer.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
The Transport Layer application transport network data link physical application transport network data link physical application transport network data.
Transport Control Protocol (TCP) Features of TCP, packet loss and retransmission, adaptive retransmission, flow control, three way handshake, congestion.
CS 453 Computer Networks Lecture 18 Introduction to Layer 3 Network Layer.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
The Internet Book. Chapter 16 3 A Packet Switching System Can Be Overrun Packet switching allows multiple computers to communicate without delay. –Requires.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
79 Sidevõrgud IRT 4060/ IRT 0020 vooruloeng 8 / 3. nov 2004 Vooülekanne Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
4343 X2 – The Transport Layer Tanenbaum Ch.6.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
Introduction Chapter 1. TCP/IP Reference Model Why Another Model? Although the OSI reference model is universally recognized, the historical and technical.
BASICS Gabriella Paolini (GARR) 27/05/11 - ICCU Roma 1 How INTERNET works !
Chapter 7: Transport Layer
Instructor Materials Chapter 6: Quality of Service
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
RSVP and Integrated Services in the Internet: A Tutorial
Net 221D : Computer Networks Fundamentals
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Chapter 5 The Network Layer.
Congestion Control, Internet transport protocols: udp
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Quality of Service Connecting Networks.
Transport Layer Unit 5.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
IT351: Mobile & Wireless Computing
PRESENTATION COMPUTER NETWORKS
Advanced Computer Networks
Congestion Control, Internet Transport Protocols: UDP
Chapter 11. Frame Relay Background Frame Relay Protocol Architecture
Computer Networks Topic :User datagram protocol Transmission Control Protocol -Hemashree S( )
COMPUTER NETWORKS CS610 Lecture-29 Hammad Khalid Khan.
Computer Networks Protocols
The TCP/IP Model.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

Bandwidth Management and Optimisation (BMO): Policy development workshop Overview of Challenges and Solutions

Objectives - Discuss challenges and solutions to bandwidth management and optimisation - Compare technical and policy-based solutions - Determine which policy-based solution can be used within your institution

TCP/IP reminder Understanding basic TCP/IP issues is important in understanding problems of congested circuits –IP = Internet Protocol, basic protocol on which the Internet is built. A connectionless and unreliable protocol –TCP = Transmission Control Protocol, adds (among other things) flow control to the IP layer, a connection-oriented, reliable-transport protocol As TCP segments are received so they are acknowledged, and the sending host knows it can send more. if a segment is not acknowledged then it is retransmitted Severe congestion can lead to severe degradation in performance and regressive deterioration of a circuits performance

Traffic graphs Volumes of inbound and outbound traffic Primary tool for first-line diagnosis of problems Theyre an essential tool for effective bandwidth management Network traffic strand of this workshop is dealing with the practical issues of monitoring and reporting such issues

- Symmetric circuit - Maximum traffic load of 12.4 Mbps - Not overloaded - The kind of traffic patterns we might all like to see?

- Symmetric circuit - Maximum traffic load of 10 Mbps - Completely saturated during office hours

Dropped packets - Between a quarter and a third of inbound datagrams are being dropped - Catastrophic for everyone - When TCP is used as a transport protocol it can aggravate the situation because a router which is experiencing congestion will drop packets which TCP recognizes as packet loss and sends a duplicate of each one to fix the problem which not only is not fixed but it forwards further traffic to the congested router, etc, etc.!

Effects of congestion Packets delivered affected by congestion. When the offered load is within the packet handling capacity of the network (no congestion) every packet is delivered. When the offered load gets near the handling capacity of the network, congestion appears (moderate congestion) and there is only a small increase on the number of packets delivered which is not proportional to the number of packets offered. When congestion gets worse (severe congestion) the number of packets delivered is reduced. The second picture shows how the offered load increases delay in packet delivery when the network cannot handle the incoming traffic Contents credit: Lancaster University, Vasileios Asloglou, Advanced Networking and the Internet Coursework. Tutorial Topic : Congestion Control techniques

What can be done - Buy more bandwidth - Optimise the efficiency of the circuit - Charge - Censor? - Control the kind of traffic that traverses the circuit

Buy more - Expensive - Often only a short-term solution - Can make things worse - Important however to benchmark - Sometimes no budget is big enough (example: the University of Helsinki, 2004)

Technical optimisation - Critically important - Often provides a basis for further action - Almost never a complete solution - What kind of technical issues…?

Examples of technical optimisation House-keeping: Microsoft updates, virus definition files, automated patches of all kinds Spam is always a problem – it is valueless traffic that eats a lot of bandwidth, and it needs to be managed downwards as much as possible Virus outbreaks can consume your bandwidth Caching is hugely important: the most effective free technical solution is Squid delay pools Traffic shaping –Commercial traffic shapers are expensive but are very effective. But note that there are open source traffic shapers as well, and these should always be considered before expensive investments in commercial solutions are considered All of these issues are essential and help a lot, but they do not influence the supply and demand problem for traffic on the network in question

Charge - Very effective at controlling or reducing demand - Can fund growth of the circuit - Highly damaging to educational and research objectives

Censor?

Policy-based solution Aims to bring about behavioral change Treats bandwidth just as any common good that needs policy management Technical solutions can distribute the bandwidth evenly and make sure that no one user can use a disproportionate amount –They can also prioritise and restrict traffic flows or users but which ones and how? Technical solutions do not necessarily ensure that the traffic that flows is consistent with institutional purposes Policy must be used to support this…

Examples of policy based approaches Some simple examples, that we can come back to later A policy that says something about… –Appropriate and inappropriate use… Can be used to reward/punish such behaviour –Ability to limit traffic by volume… Can be used to set quotas –Ability to shape traffic Can be used to throttle non-core online resources or sped up core ones –Virus protection and software standards Can be used to remove problem computers/users from the network who do not comply

Thank you Any questions?