Company LOGO Network Architecture By Dr. Shadi Masadeh 1.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
Using the Crosscutting Concepts As conceptual tools when meeting an unfamiliar problem or phenomenon.
2008/03/25 Unified Modeling Lanauage 1 Introduction to Unified Modeling Language (UML) – Part One Ku-Yaw Chang Assistant Professor.
Chapter 19: Network Management Business Data Communications, 4e.
© 2005 Prentice Hall7-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
Protocols and the TCP/IP Suite
Component and Deployment Diagrams
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
Semester 4 - Chapter 3 – WAN Design Routers within WANs are connection points of a network. Routers determine the most appropriate route or path through.
Chapter 9: Moving to Design
Network Design and Implementation IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
1 Objective of today’s lesson S oftware engineering occurs as a consequence of a process called system engineering. Instead of concentrating solely on.
System Engineering Instructor: Dr. Jerry Gao. System Engineering Jerry Gao, Ph.D. Jan System Engineering Hierarchy - System Modeling - Information.
Course Instructor: Aisha Azeem
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
2005/05/25 Unified Modeling Lanauage 1 Introduction to Unified Modeling Language (UML) – Part One Ku-Yaw Chang Assistant Professor.
UML Unified Markup Language Ziya Karakaya Atılım University, Computer Engineering
Chapter 6 System Engineering - Computer-based system - System engineering process - “Business process” engineering - Product engineering (Source: Pressman,
Lecture 1 The OSI Model Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
UNIT 5 SEMINAR Unit 5 Chapter 6, plus Lab 10 for next week Course Name – IT482 Network Design Instructor – David Roberts Contact Information:
UNIT 6 SEMINAR Unit 6 Chapter 7 and 8, plus Lab 12 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours:
1 Version 3.1 Module 1 WANs and Routers. 2 Version 3.1 WANS WAN operates at the physical layer and the data link layer of the OSI reference model. Provide.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Lesson Overview 3.1 Components of the DBMS 3.1 Components of the DBMS 3.2 Components of The Database Application 3.2 Components of The Database Application.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Data Network Designing and Evaluation
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Networking Material taken mainly from HowStuffWorks.com.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Jemerson Pedernal IT 2.1 FUNDAMENTALS OF DATABASE APPLICATIONS by PEDERNAL, JEMERSON G. [BS-Computer Science] Palawan State University Computer Network.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
1 Architectural Blueprints—The “4+1” View Model of Software Architecture (
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
UNIT 6 SEMINAR Unit 5 Chapter 7 and 8, plus Lab 10 Course Name – IT Network Design Instructor – Jan McDanolds, MS, Security+ Contact Information:
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
Dr. Ir. Yeffry Handoko Putra
Chapter 12: Architecture
Business System Development
Chapter 19: Network Management
Distributed Systems.
Distribution and components
Introduction to Cloud Computing
Designing Routing and Switching Architectures. Howard C. Berkowitz
Overview of System Engineering
Chapter 5 Networks Communicating and Sharing Resources
Protocols and the TCP/IP Suite
Software Defined Networking (SDN)
An Introduction to Computer Networking
Chapter 12: Physical Architecture Layer Design
Data collection methodology and NM paradigms
CS 8532: Advanced Software Engineering
Cloud-Enabling Technology
Network Architecture By Dr. Shadi Masadeh 1.
Cengage Learning: Computer Networking from LANs to WANs
Protocols and the TCP/IP Suite
Requirements Definition
Chapter-6 Access Network Design.
Presentation transcript:

Company LOGO Network Architecture By Dr. Shadi Masadeh 1

Background What is network architecture? In general, architecture is the art and science of designing and constructing, or the discipline dealing with the principles of design and building. Network architecture Includes addressing and routing, network management, performance, and security.. Network Architecture

What is network architecture? A more specific definition Understanding of the relationships between (architectural) components of the network. Network architecture guides the technical design of the network, through the application of high-level design principles to the network building blocks. Network Architecture

Building blocks might view as: The physical entities (routers, switches, multiplexers, servers, etc.) in the network, or Functional entities instead of physical entities. In doing so, the set of high-level design principles that constitute the network architecture is applied to how the network functions and operates. Network functions are closely coupled to users, their applications, and their devices. This allows user requirements to be directly represented in the network architecture. Measures the network success, the success of a network can be defined by how well user, application, and device requirements are supported through these functions. Network Architecture

Architecture and design are similar in many ways, and designs are often just more detailed versions of the architecture. Figure 5.1 compares some of the similarities and differences between architecture and design. Architecture and Design

Architecture and design are similar in one important way: they both attempt to solve multidimensional problems based on the results of the network analysis process. Figure 5.2 shows that a solution space can be made up of many variables (e.g., performance, security, and network management) and that network architecture solutions are based on relationships between these variables. Architecture and Design

Network architecture describes relationships, between components. Network design usually specifies technologies, protocols, and network devices Architecture and design complement each other. Another way that architecture can differ from design is in the need for location information. Location is important for some parts of the architecture (e.g., external interfaces, locations of existing devices and applications), Relationships between components are generally location independent. Inserting location information into the network architecture can be constraining. For a network design, location information is important. (In the design there is a sufficient amount of detail that locations play an important part of the decision-making process.) Architecture and Design

Component architecture is a description of how and where each function of a network is applied within that network. It consists of a set of mechanisms (hardware and software) by which that function is applied to the network Each function of a network represents a major capability of that network; four functions that are major capabilities of networks: Addressing/routing Network management Performance Security. Other general functions, such as infrastructure and storage…. Component Architectures

Mechanisms are hardware and software that help a network to achieve each capability. See Figure 5.3 Component Architectures

Network Management Component Architecture Network management is providing functions to control, plan, allocate, deploy, coordinate, and monitor network resources. Network management is part of most or all of the network devices. such As, the network management architecture is important as it determines how and where management mechanisms are applied in the network. Network management mechanisms include monitoring and data collection; instrumentation to access, transfer, act upon, and modify data; device and service configuration; and data processing, display, and storage.

Reference Architecture A reference architecture is a description of the complete network architecture and contains all of the component architectures (i.e., functions) being considered for that network.

Component Architectures

Architectural Models We have three types of architectural models are presented here: 1.topological models (geographical) 2.flow-based models (traffic flows) 3.functional models (features)

1. Topological models There are two popular topological models: LAN/MAN/WAN model. Access/Distribution/Core model.

LAN/MAN/WAN This model is simple and is based on the geographical and/or topological separation of networks.  For example, the LAN/MAN/WAN model is often used as a LAN/WAN model, or the LAN component is separated into campus, buildings, or even floors.

Access/Distribution/Core models  This model focuses on function instead of location.  can be used to reflect the behavior of the network at its access, distribution, and core areas.

The access area : 1.is closest to the users and their applications. 2. is where most traffic flows are sourced and sinked. 3. flows and requirements can be treated. 4.on an individual basis more easily than in the distribution and core areas.

The distribution area :  can also source and sink flows, but they are more likely to be to or from multiple-user devices, such as servers or specialized devices.  Few users are normally directly connected to the distribution area.

The core of the network :  is used for bulk transport of traffic.  flows are not usually sourced or sinked at the core.  any view of individual flows is lost at the core.

2. Flow-Based Models

3. Functional Models In this model we present : 1.service-provider model 2. intranet/extranet model 3.end-to-end models. The service-provider architectural model is based on service-provider functions, focusing on privacy and security, service delivery to customers (users), and billing. In this model, interactions between providers (the networks) and with users.

The intranet/extranet architectural model focuses on security and privacy, including the separation of users, devices, and applications based on secure access. Note that in this model there can be several levels of hierarchy (security/privacy)

The end-to-end architectural model focuses on all components in the end to-end path of a traffic flow. This model is most closely aligned to the flow-based perspective of networking.