3-location Data Network Design 3 locations separated by 200 km among pairs. Give the new populations below 296 users, design the data network.

Slides:



Advertisements
Similar presentations
ECE358: Computer Networks Fall 2014
Advertisements

1 IK1500 Communication Systems IK1330 Lecture 3: Networking Anders Västberg
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
NETWORK LAYER (1) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Jaringan Komputer Lanjut Packet Switching Network.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Routing Strategies Fixed Routing
Networks: Switching1 Point-to-Point Network Switching.
EE 4272Spring, 2003 Chapter 10 Packet Switching Packet Switching Principles  Switching Techniques  Packet Size  Comparison of Circuit Switching & Packet.
Networks: Switching1 Point-to-Point Network Switching.
Wide Area Networks School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
2/15/2011Harvard Bits1. 2/15/2011Harvard Bits2 US Telegraph “Network” in 1856.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
Ch. 28 Q and A IS 333 Spring Q1 Q: What is network latency? 1.Changes in delay and duration of the changes 2.time required to transfer data across.
WAN Technologies.
Network Topologies.
Delivery, Forwarding and
Interior Gateway Routing Protocol (IGRP) is a distance vector interior routing protocol (IGP) invented by Cisco. It is used by routers to exchange routing.
Flow Models and Optimal Routing. How can we evaluate the performance of a routing algorithm –quantify how well they do –use arrival rates at nodes and.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Mapping Internet Addresses to Physical Addresses (ARP)
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Chapter 4: Managing LAN Traffic
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 7 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
WAN technologies and routing Packet switches and store and forward Hierarchical addresses, routing and routing tables Routing table computation Example.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
1 Routing. 2 Routing is the act of deciding how each individual datagram finds its way through the multiple different paths to its destination. Routing.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Switched network.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
1 Next Few Classes Networking basics Protection & Security.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
Sami Al-wakeel 1 Data Transmission and Computer Networks The Switching Networks.
1 Optical Burst Switching (OBS). 2 Optical Internet IP runs over an all-optical WDM layer –OXCs interconnected by fiber links –IP routers attached to.
Introduction to Network Design. e 2 Acknowledgement Edward Chow Robert Cahn.
J.Tiberghien - VUB09-06-K.Steenhaut & J.Tiberghien - VUB 1 Telecommunications Concepts Chapter 1.6 Multiplexing & Routing.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Lecture # 03 Switching Course Instructor: Engr. Sana Ziafat.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
CSCI-235 Micro-Computer Applications The Network.
Network Layer (OSI and TCP/IP) Lecture 9, May 2, 2003 Data Communications and Networks Mr. Greg Vogl Uganda Martyrs University.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
Introduction Computer networks: – definition – computer networks from the perspectives of users and designers – Evaluation criteria – Some concepts: –
Computer Communication & Networks Lecture # 03 Circuit Switching, Packet Switching Nadeem Majeed Choudhary
Distance Vector Routing
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Lecture # 3: WAN Data Communication Network L.Rania Ahmed Tabeidi.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
1587: COMMUNICATION SYSTEMS 1 Wide Area Networks Dr. George Loukas University of Greenwich,
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
6/12/2016© 2010 Raymond P. Jefferis IIILect The Network Layer.
1. Layered Architecture of Communication Networks: Circuit Switching & Packet Switching.
ROUTING AND ROUTING TABLES 2 nd semester
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Muhammad Waseem Iqbal Lecture # 20 Data Communication.
William Stallings Data and Computer Communications
The Underlying Technologies
Packet Switching Datagram Approach Virtual Circuit Approach
What Are Routers? Routers are an intermediate system at the network layer that is used to connect networks together based on a common network layer protocol.
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Network Core and QoS.
Computer communications
3-location Data Network Design
Presentation transcript:

3-location Data Network Design 3 locations separated by 200 km among pairs. Give the new populations below 296 users, design the data network.

Voice Traffic vs. Data Traffic

Data Traffic Statistics 20% of internal , www, DB traffic occurs in the busy hour. External arrives evenly during the day. Avg. internal size 60kB. External size 12kB. Each url request generates 6 datagrams to server, 6 datagrams back to client for setup connections, a datagram avg. 128B. Its http response is 2kB datagram.

Data Base Traffic Data distributed in 3 servers, one at each site. Each employee makes 100 queries and 5 updates. Query: –Query first goes to the local server, then go the remote server. Will there need to go to third server? –Query packet avg. 800B, response packet avg. 3500B. –Probability of data in a server is 1/3. Evenly spread. Update: –Update packet avg. 6000B, response packet 500B.

Cost of Services and Components Cost of PC’s, workstations, servers not considered. Routers can handle 2000 datagrams/sec >> the traffic  Delay can be neglected.

Data Network Design Principle 2.2 Blocking in not important; delay is the issue. Highly utilized links are not desirable (large delay). Design Principle 2.2 In a voice network, highly utilized links can be cost- effective, since they exploit the available bandwidth to the fullest extent, and when the link is given to a connection it receives a high grade of service (circuit switch). In a data network, highly utilized links are terrible since all call traffic using that link suffers inordinate delay.

Burstiness Burstiness= peak rate/avg rate Two solutions to simultaneous arrive of data calls: Coordination- e.g., token ring. Allow one to be servered. But is not good for WAN. Propagation delay (p.d.) for 1000 mile ring=1000/186000=5ms Transmission delay for 1000 bit packet at 16Mbps=1000/ << p.d. Queueing or use store and forward (packet switching idea).

Common Data Rate The service time for a packet of n bits on a link of speed S bps is n/S

Token Ring vs. Packet Switching Propagation delay for 1000 mile ring=1000/186,000=5.376 ms Transmission delay for 1000 bit packet at 16Mbps=1000/16,000,000 =0.0625ms For WAN, token ring protocol is not suitable. A packet switching network where each link segement operates independently is a more efficient design. Packet switching network can be modeled as a set of queues.

M/M/1 Queue Link can be modeled as a M/M/1 queue.

M/M/1 Average Waiting Time

Total Delay (50ms service time)

Initial Data Network Design

Cost of Initial Design Transit router amortized cost: $3700*0.03=$111/month 64kbps (or D64) internode link $700/month 64kbps internet link $1400/month.

Traffic in Busy Hour 20%=0.2 traffic in busy hour.

Design Principles 2.3 & : Seek to make a network where all the links have a 50% utilization 2.4: Seek to make a network where all the links have about 50% utilization and as few links as possible are underutilized. Example: Question1: How we calculate the delay? Question2: For high speed link, can we have high utilization?

Apply M/M/1 Formula Assume 1000 bytes packet (8000 bits). Case1: T1 link=1.536Mbps, 50% utilization Case2: OC-3 link=135Mbps, 80% utilization Which one has lower delay?

Apply M/M/1 Formula Case1: T1 link=1,536,000 bps,  =0.5 (50%utilization) 1/  = service time=packetsize/transmission speed =8000/ T=(1/  )/(1-  )=(1/(1-  ))*(1/  )=(1/(1-0.5))*8000/1.536M =10.4 ms. Case2: OC-3 link=135Mbps,  =0.8 (80% utilization) T=(1/(1-0.8))*(8000/135M)=5*(8000/135M)=2.96ms We may be willing tolerate a higher utilization on these links. But their delay is quite “unstable”.

Calculating Internal Traffic Internal relate to the populations of source and destination sites. The ration of populations among Anagon, Bregen, and Charmes=(1, 4/3, ¾) Let x be the volume of internal from Analog to itself. Then the traffic from Anagon to Bregen is 4/3 x. The traffic from Anagon to Charmes is ¾ x. busy hour internal 10*0.2*60000*8*296/3600(s)=78933 bps. Counting all directional internal traffic: 9.507x=78933bps  x=8303bps

Tabular Represenation of Internal Traffic

External In the initial design, each site has its own Internet connection. Therefore the external s does not go through inter-site internal network. Internet links are expensive: first targets to remove; then external s could go over inter-site network. With s/day, B/ each user gets 4000*12000*8/(3600*8hr*296)=45.045bps sends same bps external s. Multiply the population in each site we get the following external traffic table.

Tabular Represenation of External Traffic *96= bps

Busy Hour WWW Traffic Outbound small requests traffic: =40fetch/day*0.2*6req/fetch*128B/req*8b/B/(3600s) =13.653bps Inbound big www document and response traffic: =40*0.2*(6x )*8/(3600) =49.209bps For Anagon, Inbound WWW traffic: bps*96= bps outbound WWW traffic: bps*96= bps

Busy Hour WWW Traffic

DB Query Flow Assume query can be answered by a single remote server.

Busy Hour DB Traffic DB Query Traffic: 1/3 queries to each remote server: 50*0.2*800*8*(1/3)/3600=5.930 bps Their requests come back: 50*0.2*3500*8*(1/3)/3600=25.926bps DB Update Traffic: 1/3 updates to each remote server: 5*0.2*6000*8*(1/3)/3600=4.444 bps 1/3 updates responses back from each remote server: 5*0.2*500*8*(1/3)/3600=0.370 bps DB Traffic From Anagon to Bregen: Consider just DB Query(text): 96* *25.926= Consider all DB traffic: The update traffic should not be ignored 96*( )+128*( )=

DB Traffic Table

Busy Hour Traffic (64kbps links)

Busy Hour Traffic

Drop Algorithm for Network Design Drop the lightest utilized component in the network. Calculate the new routes for all traffic that use the dropped component. But do we really have control over the routing in the network? We will examine 3 types of routing: –SNA (IBM System Network Architecture) tight control –OPSF (Open Shortest Path First) some control –RIP (Routing Information Protocol) no control

Routing in SNA On IBM SNA (System Network Architecture), designer has up to 16 routes that can be specified between a pair of nodes. The paths are directional. The return path of a route can go through different links. Advantage: flexible, a lot of control Disadvantage: adding a node is not automatic, required offline programs to generate the paths.

OPSF Routing Assign each link a length (or weight) in each direction. Routes are calculated using shortest path algorithm. Traffic are directed to the next link along the shortest path. Two routes between a pair of nodes. (compared to max. of 16 for SNA) Weight can be measured as delay on the directional link. Link weights can be broadcast periodically and routing table recalculated.

Routing Information Protocol Use hop count instead of accumulated link weight for compute the route. Does not consider the bandwidth of each link. For 1000-byte packet, –a two hop path with T1 link has (1000*8b/1.535Mbps)*2=10.42ms. –A single hop path with 9.6kbps link has 1000*8b/9600bps=833ms.

Assumptions for Drop Algorithm Assume we can use shortest path routing within BMI corp. domain. All three inter-site links have a length of 10. The distance to all external domains is the same through all three gateways. Try to reduce cost by removing links and see if remaining network remain feasible.

Drop Algorithm 1.Initially, mark all links as being deletable. 2.Find the most expensive deletable link. If there is a tie, take the link with the lowest utilization. We call this the candidate link for deletion. 3.If such link exists, delete the link and see if the remaining network is feasible (can carry the traffic). If it is feasible, go back to step 2. If not feasible, mark the link “not being deletable” and loop back to step 2. 4.If such link does not exist, terminate.

Modified Drop Algorithm Code Consider increase other link’s capacity

Apply Drop Algorithm on Initial Design Round 1. Step2. Among 3 external links, choose Charmes to gateC. Step3’. Redirect traffic to Gateway A (with less traffic) by reducing the length btw Anagon and Charmes to 9. GateC  Charmes traffic (WWW+External ) go over GateA  Anagon  Charmes. Charmes  GateC traffic go over Charmes  Anagon  GateA The new traffic flow is shown next page.

Traffic Flow After Removing Link to GateC All link utilizations < 0.5; cost saving=$1400

Apply Drop Algorithm on Initial Design Round 2. Step2. Among 2 external links, choose Bregen to gateB since it has less traffic now. Step3’. Redirect traffic to Gateway A (with less traffic) GateB  Bregen traffic (WWW+External ) go over GateA  Anagon  Bregen. Bregen  GateB traffic go over Bregen  Anagon  GateA The new traffic flow is shown next page.

Traffic Flow After Removing Link To GateB All link utilizations < 0.5; cost saving another $1400

Round 3 & Round 4 Round 3: Try to delete link to gateA and find it undeletable. Round 4: Among the remaining 3 inter-site links, Bregen  Charmes has less utilization (add both directional traffic). Redirect traffic around Anagon.

Traffic Flow After Removing Link btw Bregen and Charmes Utilization between Anagon and Bregen high, need add link?

Rounds 4, 5, 6 After removing link btw Charmes and Bregen, we need to add capacity to Anagon and Bregen  no cost saving. We also lose alternative route (less reliability). Decide not to remove. Same results for link btw Anagon and Charmes, and link between Anagon to Bregen. Algorithm terminates.

Drop Algorithm Result 2 internet links removed  cost saving $2800/month

Where the Drop Algorithm Went Wrong? It chooses Anagon instead of Bregen, which has most traffic and largest population. This force more traffic onto longer paths. Lesson: Heuristic algorithms often make mistakes. If we choose to locate gateway at Bregen, we could remove link btw Anagon and Charmes: –Save $700/month –Save $102/month by placing terminal routers at Anagon and Charmes. –Final cost: $3833-$700-$102=3031/month.

Final Design Definition 2.3: A benign algorithm is one that does no damage to a design. It only improve it or leave it alone. The drop algorithm is not optimal but is it benign?