CS 453 Computer Networks Lecture 23 Network Management and Performance.

Slides:



Advertisements
Similar presentations
Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
Advertisements

Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
CSCI 4550/8556 Computer Networks
IS333, Ch. 26: TCP Victor Norman Calvin College 1.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
Comp Spring 2003 Delay Jitter Ketan Mayer-Patel.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Internetworking.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
UCB Improvements in Core-Stateless Fair Queueing (CSFQ) Ling Huang U.C. Berkeley cml.me.berkeley.edu/~hlion.
Deployment of the VoIP Servers BY: Syed khaja Najmuddin Ahmed Anil Kumar Marikukala.
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
Switching Techniques Student: Blidaru Catalina Elena.
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Mapping Internet Addresses to Physical Addresses (ARP)
Network Layer4-1 NAT: Network Address Translation local network (e.g., home network) /24 rest of.
LAN Overview (part 2) CSE 3213 Fall April 2017.
1 Transport Layer Computer Networks. 2 Where are we?
CIS 725 Wireless networks. Low bandwidth High error rates.
23-Support Protocols and Technologies Dr. John P. Abraham Professor UTPA.
TCP/IP Reference Model For more notes and topics visit: eITnotes.com.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
© 2002, Cisco Systems, Inc. All rights reserved..
Chapter 15 DHCP. Dynamic Host Configuration Protocol An Application Layer Protocol A client server protocol that automatically provides an IP host with.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
University of the Western Cape Chapter 12: The Transport Layer.
Computer Networks with Internet Technology William Stallings
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
CS 453 Computer Networks Lecture 18 Introduction to Layer 3 Network Layer.
Lecture 4: Sun: 23/4/1435 Distributed Operating Systems Lecturer/ Kawther Abas CS- 492 : Distributed system & Parallel Processing.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
Module 1: Configuring Routing by Using Routing and Remote Access.
Lecture (Mar 23, 2000) H/W Assignment 3 posted on Web –Due Tuesday March 28, 2000 Review of Data packets LANS WANS.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Lecture 1 Outline Statistical Multiplexing Inter-Process Communication.
Chapter 8 1 Chap 8 – Network Troubleshooting Learning Objectives Establish a network baseline Describe troubleshooting methodologies and troubleshooting.
TCP: Transmission Control Protocol Part II : Protocol Mechanisms Computer Network System Sirak Kaewjamnong Semester 1st, 2004.
1 CS 4396 Computer Networks Lab TCP – Part II. 2 Flow Control Congestion Control Retransmission Timeout TCP:
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
Transmission Control Protocol (TCP) BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
The Internet Book. Chapter 16 3 A Packet Switching System Can Be Overrun Packet switching allows multiple computers to communicate without delay. –Requires.
1 CSE524: Lecture 2 Internet protocols in a nutshell (Protocols in practice)
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
Computer Networks 1000-Transport layer, TCP Gergely Windisch v spring.
CCNA 2 Router and Routing Basics Module 8 TCP/IP Suite Error and Control Messages.
TCP over Wireless PROF. MICHAEL TSAI 2016/6/3. TCP Congestion Control (TCP Tahoe) Only ACK correctly received packets Congestion Window Size: Maximum.
1 Computer Networks Chapter 5. Network layer The network layer is concerned with getting packets from the source all the way to the destination. Getting.
Link Layer 5.1 Introduction and services
ETHANE: TAKING CONTROL OF THE ENTERPRISE
Network Load Balancing Functionality
Error and Control Messages in the Internet Protocol
Chapter 14 User Datagram Program (UDP)
TCP/IP Transmission Control Protocol / Internet Protocol
Understanding the OSI Reference Model
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Congestion Control, Internet transport protocols: udp
Cisco Real Exam Dumps IT-Dumps
A Selective Retransmission Protocol for Multimedia on the Internet
COS 561: Advanced Computer Networks
COMPUTER NETWORKS CS610 Lecture-36 Hammad Khalid Khan.
Switching Techniques.
Getting Connected (Chapter 2 Part 3)
Internet Control Message Protocol
Presentation transcript:

CS 453 Computer Networks Lecture 23 Network Management and Performance

Performance Issues Clearly, users of networks expect them to perform well… …and usually notice when they do not… … and expect the network management to fix the problems.

Performance Issues Down routes – network routes fail or shutdown for a variety of reasons, network management software must be able to detect route or link failures, … …and provide a means to resolve or work around the problem…. For example, rerouting traffic, until preferred routes are restored

Performance Issues Congestion – Networks (particularly WANs) have multiple routes to provide end-to-end connectivity There are usually one or more preferred routes… But these preferred routes often aggregate traffic from multiple sources… Which can overload links and create congestion (compounding problem) Network management systems should be able to— Recognize congestion …and shed traffic to other routes, if possible

Performance Issues Low end processing hardware/software High performance networks connected to old/slow hardware (routers, PCs) can cause performance problems Messages arrive faster than the hardware can process them… Messages are lost, and retransmitted,… And this problem can compound if the overload is not transient

Performance Issues Synchronous overloads – Suppose a bad message is broadcast to a network of 10,000 machines…. …and each of these machines replies with an error message… Result can be massive overload of the network Broadcast Storm UDP protocol changes to inhibit error reports for broadcast messages

Performance Issues Synchronous Overloads- Imagine the simultaneous restart of all machines/routers in a network… … like a regional power failure Every machine on the network will start and may issue a DHCP Discovery request, simultaneously… Routers will update their routes and configurations, Network hosted software will reload And the network will come to it’s knees

Performance Issues Synchronous Overloads- This is not far fetched Happens all of the time on a modest scale Recently, happened on a global scale… Due to a MS Windows automatic update Update required a restart Something like 6 million computers worldwide restarted at the same time

Performance Issues Tuning Insufficient buffer space in routers, source/destination computers Scheduling algorithm giving too little priority to processing incoming data, drops messages, causes retransmits Timer settings Too short – messages in-flight reported as lost Too long – waste time waiting for lost messages

Performance Issues Inefficient use of resources For example, high performance network with low feed

Performance Issues Jitter We want a short mean arrival time Also want small standard deviation for arrival time Large standard deviation in arrival time is called Jitter Jitter big problem with new services like VoIP Streaming audio Streaming video Can mitigate some

Network Management More things to see TCP/IP