Top-Down Network Design

Similar documents
Planeamento e Gestão de Redes. Análise de Requisitos

Protocol Architecture

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Distributed Systems 3. Network Quality of Service (QoS)

Quality of Service in ATM Networks

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

UPPER LAYER SWITCHING

Top-Down Network Design

Protocol Architecture. ATM architecture

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Protocols and Architecture. Protocol Architecture.

Overview of Computer Networks

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

ATM. Asynchronous Transfer Mode. Networks: ATM 1

Multiservice Access Technologies

Chapter 7 outline. 7.5 providing multiple classes of service 7.6 providing QoS guarantees RTP, RTCP, SIP. 7: Multimedia Networking 7-71

QoS in IP networks. Computer Science Department University of Crete HY536 - Network Technology Lab II IETF Integrated Services (IntServ)

CS335 Sample Questions for Exam #2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Computer Networks & Security 2014/2015

Encapsulating Voice in IP Packets

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

This topic lists the key mechanisms use to implement QoS in an IP network.

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

Transport and Network Layer

An Introduction to VoIP Protocols

CHAPTER 1 ATM TRAFFIC MANAGEMENT

Ethernet. Ethernet. Network Devices

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

16/5-05 Datakommunikation - Jonny Pettersson, UmU 2. 16/5-05 Datakommunikation - Jonny Pettersson, UmU 4

Improving Quality of Service

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Lecture 28: Internet Protocols

Requirements of Voice in an IP Internetwork

Computer Networks CS321

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

VOICE OVER IP AND NETWORK CONVERGENCE

Overview of Voice Over Internet Protocol

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Need for Signaling and Call Control

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Communications and Computer Networks

Mathatma Gandhi University

Review: Lecture 1 - Internet History

How To Provide Qos Based Routing In The Internet

TCP/IP Protocol Suite. Marshal Miller Chris Chase

1.1. Abstract VPN Overview

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP

Internet Concepts. What is a Network?

18: Enhanced Quality of Service

The TCP/IP Reference Model

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

Network Simulation Traffic, Paths and Impairment

Introduction Chapter 1. Uses of Computer Networks

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

CSCI Topics: Internet Programming Fall 2008

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Multimedia Requirements. Multimedia and Networks. Quality of Service

The OSI and TCP/IP Models. Lesson 2

Module 7 Internet And Internet Protocol Suite

Computer Networks and the Internet

Communication Networks. MAP-TELE 2011/12 José Ruela

02-QOS-ADVANCED-DIFFSRV

Network Considerations for IP Video

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and

Zarządzanie sieciami telekomunikacyjnymi

QoS (Quality of Service)

Chapter 3 ATM and Multimedia Traffic

Nortel Technology Standards and Protocol for IP Telephony Solutions

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

The IP Transmission Process. V1.4: Geoff Bennett

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

Packetized Telephony Networks

Lecture 33. Streaming Media. Streaming Media. Real-Time. Streaming Stored Multimedia. Streaming Stored Multimedia

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

EXPLORER. TFT Filter CONFIGURATION

technology standards and protocol for ip telephony solutions

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov

6LoWPAN Technical Overview

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Clearing the Way for VoIP

A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

LAN Switching and VLANs

Internet Architecture and Philosophy

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

CSE 3461 / 5461: Computer Networking & Internet Technologies

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

Chapter 5. Data Communication And Internet Technology

Voice Over IP. Priscilla Oppenheimer

Motivation. QoS Guarantees. Internet service classes. Certain applications require minimum level of network performance:

TECHNICAL CHALLENGES OF VoIP BYPASS

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Computer Networks - Xarxes de Computadors

Strategies. Addressing and Routing

Chapter 1 Computer Networks and the Internet

TCP/IP, Addressing and Services

Transcription:

Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer Network Traffic Factors Traffic flow unidirectional, bidirectional symmetric, asymmetric Location of traffic sources and data stores Traffic load Traffic behavior Quality of Service (QoS) requirements Page 1

User Communities A user community is a set of workers who use a particular application or set of applications. User Communities (an example) Page 2

Data Stores A data store is an area in a network where application layer data resides. A data store can be a server, a server farm, a Storage-Area Network, a mainframe, or any device of an internetwork where large quantities of data are stored Data Stores (an example) Page 3

Traffic Flow The simplest method for characterizing the size of a flow is to measure the number of KBps or MBps between communicating entities. Page 4

Types of Traffic Flow Terminal/host: traffic is usually asymmetric. The terminal sends a few characters and the host sends many characters. (Telnet) Client/server: The flow is usually bidirectional and asymmetric. File Transfer Protocol (FTP), HTTP is probably the most widely used client/server protocol. Thin client: A special case of the client/server architecture. The bulk of data processing occurs on a server. User applications originate on a central server. Types of Traffic Flow Peer-to-peer: the flow is usually bidirectional and symmetric. Each host acts as both a client and server (BitTorrent). Server/server: traffic includes transmissions between servers and transmissions between servers and management applications. The flow is generally bidirectional. Distributed computing: refers to applications that require multiple computing nodes working together to complete a job. Page 5

Traffic Flow for Voice over IP The flow associated with transmitting the audio voice is separate from the flows associated with call setup and teardown. The flow for transmitting the digital voice is essentially peer-to-peer. Call setup and teardown is a client/server flow A phone needs to talk to a server or phone switch that understands phone numbers, IP addresses, capabilities negotiation, and so on. Network Applications Traffic Characteristics Traffic flow for an application: Terminal/host, Client/server, Peer-to-peer, Server/server, Distributed computing Page 6

Traffic Load To calculate whether capacity is sufficient, you should know: The number of stations The average time that a station is idle between sending frames The time required to transmit a message once medium access is gained That level of detailed information can be hard to gather, however Size of Objects on Networks Page 7

Traffic Behavior Broadcasts All ones data-link layer destination address FF: FF: FF: FF: FF: FF Doesn t necessarily use huge amounts of bandwidth But does disturb every CPU in the broadcast domain Multicasts First bit sent is a one 01:00:0C:CC:CC:CC (Cisco Discovery Protocol) Should just disturb NICs that have registered to receive it Requires multicast routing protocol on internetworks A router does not forward broadcasts or multicasts. All devices on one side of a router are considered part of a single broadcast domain. Network Efficiency Frame size: using a frame size that is the maximum supported for the medium in use has a positive impact on network performance for bulk applications. Avoid fragmentation and reassembly of frames performance degrades. Protocol interaction: Inefficiency is also caused by the interaction of protocols and the misconfiguration of acknowledgment timers and other parameters. Page 8

Network Efficiency Windowing and flow control A station's send window is based on the recipient's receive window. The recipient states in every TCP packet how much data it is ready to receive. The recipient's receive window is based on how much memory the receiver has and how quickly it can process received data. Error-recovery mechanisms Connectionless protocols usually do not implement error recovery. Most data link layer & network layer protocols are connectionless. Some transport layer protocols, such as UDP, are connectionless. Error-recovery mechanisms for connection-oriented protocols vary. QoS Requirements Terminologies that ATM engineers use for classifying and specifying QoS requirements for classes of traffic. ATM service specifications Constant bit rate (CBR): a source end system reserves network resources in advance and asks for a guarantee that the negotiated QoS be assured to all cells Realtime variable bit rate (rt-vbr) Non-realtime variable bit rate (nrt-vbr) Unspecified bit rate (UBR) Available bit rate (ABR) Guaranteed frame rate (GFR) Map applications and protocols to the correct service category in order to meet network performance objectives. Page 9

QoS Requirements per IETF Terminologies that IETF engineers use for classifying and specifying QoS requirements for classes of traffic. IETF integrated services working group specifications Controlled load service Provides client data flow with a QoS closely approximating the QoS that same flow would receive on an unloaded network Guaranteed service Provides firm bounds on end-to-end packet-queuing delays QoS Requirements per IETF IETF differentiated services working group specifications - RFC 2475 IP packets can be marked with a differentiated services codepoint (DSCP) to influence queuing and packetdropping decisions for IP datagrams on an output interface of a router Page 10

Network Traffic Checklist I have identified major traffic sources and stores and documented traffic flow between them. I have categorized the traffic flow for each application as being terminal/host, client/server, peer-to-peer, server/server, or distributed computing. I have estimated the bandwidth requirements for each appl. I have estimated bandwidth requirements for routing protocols I have characterized network traffic in terms of broadcast/multicast rates, efficiency, frame sizes, windowing and flow control, and error-recovery mechanisms. I have categorized the QoS requirements of each application. I have discussed the challenges associated with implementing end-to-end QoS and the need for devices across the network to do their part in implementing QoS strategies. Summary Continue to use a systematic, top-down approach Don t select products until you understand network traffic in terms of: Flow Load Behavior QoS requirements Page 11

Review Questions List and describe six different types of traffic flows. What makes traffic flow in voice over IP networks challenging to characterize and plan for? Why should you be concerned about broadcast traffic? How do ATM and IETF specifications for QoS differ? Page 12