Lecture 4: Introduction to Computer Network Design



Similar documents
Lecture 12: Network Management Architecture

NETWORK DESIGN & ANALYSIS PTIIK

The TCP/IP Reference Model

Question: 3 When using Application Intelligence, Server Time may be defined as.

Network Simulation Traffic, Paths and Impairment

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Clearing the Way for VoIP

Lecture 18: Telecommunications Management Network (TMN)

Computer Networks CS321

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

Requirements of Voice in an IP Internetwork

THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS

Lecture 5: Foundation of Network Management

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

Enterprise Edge Communications Manager. Data Capabilities

VoIP / SIP Planning and Disclosure

Application Note. Network Optimization with Exinda Optimizer

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN

Communications and Computer Networks

Architecture and Performance of the Internet

Networking Topology For Your System

Chapter 2 - The TCP/IP and OSI Networking Models

How To Provide Qos Based Routing In The Internet

Computer Networks Vs. Distributed Systems

VoIP Over the Internet: Is Toll Quality Achievable?

Voice Over IP. MultiFlow IP Phone # 3071 Subnet # Subnet Mask IP address Telephone.

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

IVCi s IntelliNet SM Network

Accelerate Private Clouds with an Optimized Network

Security Design.

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Transport Layer Protocols

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Lecture 28: Internet Protocols

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Leased Line + Remote Dial-in connectivity

Chapter 1 Reading Organizer

UPPER LAYER SWITCHING

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery

Network System Design Lesson Objectives

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Voice over IP (VoIP) for Telephony. Advantages of VoIP Migration for SMBs BLACK BOX blackbox.com

Voice over IP Basics for IT Technicians

Multi Protocol Label Switching (MPLS) is a core networking technology that

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

TDM services over IP networks

Distributed Systems 3. Network Quality of Service (QoS)

Network Models OSI vs. TCP/IP

CSCI 362 Computer and Network Security

Introduction to Network Management

Understanding Latency in IP Telephony

Internet Concepts. What is a Network?

VOICE OVER IP AND NETWORK CONVERGENCE

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

IP Telephony Management

Computer Networks & Security 2014/2015

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

SSVP SIP School VoIP Professional Certification

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

Improving Quality of Service

AP200 VoIP Gateway Series Design Features & Concept AddPac R&D Center

Data Communication Networks and Converged Networks

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

CSE 3461 / 5461: Computer Networking & Internet Technologies

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP

Top-Down Network Design

Avaya ExpertNet Lite Assessment Tool

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Jive Core: Platform, Infrastructure, and Installation

Application Note How To Determine Bandwidth Requirements

Basic Network Configuration

Optimizing Converged Cisco Networks (ONT)

SSVVP SIP School VVoIP Professional Certification

This chapter covers four comprehensive scenarios that draw on several design topics covered in this book:

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Networking 4 Voice and Video over IP (VVoIP)

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Distributed applications monitoring at system and network level

Rev Technology Document

Agilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402

Region 10 Videoconference Network (R10VN)

Nortel Technology Standards and Protocol for IP Telephony Solutions

Voice over IP (VoIP) Basics for IT Technicians

Transcription:

Lecture 4: Introduction to Computer Design Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 4-1 Computer s Prof. Shervin Shirmohammadi CEG 4185 4-2 1

Background design has generally been considered an art consisting of a set of rules acquired through experience. For example the 80/20 rule where 80% of a network s traffic is local and 20% is remote. Bridge when you can, route when you must. Based on an antiquated view that bridging was easier and cheaper. technologies and requirements have increased tremendously. There are many options available now. Prof. Shervin Shirmohammadi CEG 4185 4-3 Factors that affect Design Capacity planning (a major factor in the design of the network). Generally the solution to a problem will be throw bandwidth to the problem. Sometimes and especially recently it offers some relief but it is does not solve all problems. Delay performance Has become very important in real-time services and needs to be optimized. Reliability, Maintainability, and Availability (RMA). A factor that is really important for customer satisfaction. Prof. Shervin Shirmohammadi CEG 4185 4-4 2

The Technical View A really can be thought of as of three things and they all need to be considered when working on a network design project Connections Communications Services Connections: provided by Hardware that ties things together Wire/Fiber Transport Mechanisms Routers Switches/Hubs Computers Prof. Shervin Shirmohammadi CEG 4185 4-5 The Technical View ( ) Communications: provided by Software A common language for 2 systems to communicate with each other. Interoperability Protocols TCP/IP (Internet/Windows NT), IPX / SPX (Novell Netware 4), AppleTalk, etc. Services: the Heart of ing - specially important today: the Internet in particular is moving quickly from a connection emphasis to a service oriented network. Cooperation between 2 or more systems to perform some function Applications driven telnet, ftp, http, SNMP, UDP, etc. Prof. Shervin Shirmohammadi CEG 4185 4-6 3

High Level View of Design Section 1 (Conceptual Model) Section 2 (Logical Model) Section 3 (Physical Model) Analysis Architecture Design Requirements, Flows, Risks Relationships within and between Functions Technology, Equipment Choices, Connectivity Choices Prof. Shervin Shirmohammadi CEG 4185 4-7 Overview of Analysis State of existing network Problems with existing network goals Requirements from users, applications, devices Analysis Description for requirements for the network Descriptions of traffic flows Mappings of applications and devices to network Prof. Shervin Shirmohammadi CEG 4185 4-8 4

Overview of Architecture Description for requirements for network Descriptions of traffic flows Mappings of applications and devices to network Architecture Reference architecture for network (end to end structure). Relationships between functions (routing, management, performance, security). Descriptions of interactions, trade-offs, dependencies, and constraints. Prof. Shervin Shirmohammadi CEG 4185 4-9 Overview of Design Reference architecture for network Relationships between network functions Descriptions of interactions, trade-offs, dependencies, and constraints. Design Physical details, evaluate and choose technologies. Strategies for interoperability. Evaluation criteria. Prof. Shervin Shirmohammadi CEG 4185 4-10 5

Levels of Hierarchy Hierarchy Levels of Diversity Core Access End Users Hierarchy: degree of concentration of traffic flows at interconnection points Prof. Shervin Shirmohammadi CEG 4185 4-11 - 1 Level Broadcast Domain Flat Bridged or Switched : what is the problem with this? Prof. Shervin Shirmohammadi CEG 4185 4-12 6

- 2 Levels Broadcast Domain Broadcast Domain What is the hierarchy degree? Broadcast Domain Prof. Shervin Shirmohammadi CEG 4185 4-13 The Need for Diversity Flows are forced through hierarchy Prof. Shervin Shirmohammadi CEG 4185 4-14 7

Flows Improvement with a CDN CDN Content Delivery provides direct connectivity Diversity (aka, Interconnectivity, aka Redundancy): interconnecting the network at different levels to achieve desired performance. Prof. Shervin Shirmohammadi CEG 4185 4-15 & System Complexity 4 th Generation Decision-making Complexity Interactions 3 rd Generation Services 2 nd Generation Interoperability Interactions 1 st Generation Connectivity Where are we today? Prof. Shervin Shirmohammadi CEG 4185 4-16 8

Architecture & Design Defensibility Very important and often overlooked part of network analysis and design. During analysis you are gathering data and making decisions. Details about how one got to those decisions is generally lost. It is important to keep an audit trail. A set of documents, data, and decisions for the architecture and design. This audit would answer questions like: Why did you choose this technology? Why does it cost this amount? Time spent at this phase can save large amount of time and resources later. What type of information? (Time stamp it) Requirements (What type of Requirements would you expect?) Problem definitions (There is no end to these). Goals, Decisions Data (What type of data?) Prof. Shervin Shirmohammadi CEG 4185 4-17 A Systems Methodology The idea is to view the network and a subset of its environment (what it impacts or interacts with) as a system. This primarily implies looking at the services associated with the network (3 rd generation networks). Interactions and dependencies between the network its users, applications, and devices arises from this analysis. Traditional view of a system Device Device Better generic components of a system User Application User Application Device Device Prof. Shervin Shirmohammadi CEG 4185 4-18 9

Comparison to OSI Application Presentation Session Transport Data Link Physical OSI User Application Device System Levels Prof. Shervin Shirmohammadi CEG 4185 4-19 Service Characteristics Service Characteristics: individual network performance and functional parameters that are used to describe the network. These can be considered as requirements from the network. E.g.: Providing 1.5 Mb/s peak capacity to a user Guaranteeing a maximum RTT of 100 msec Defining a specific security level for a group of users Functional Security Manageability Billing WAN Non-Functional Capacity Delay RMA User-server WAN service LAN-WAN Prof. Shervin Shirmohammadi CEG 4185 4-20 10

Service Metrics Service Metrics: measurements of characteristics in the actual network to monitor, verify, and manage services. Services must be described and provisioned end-to-end at all network components between well-defined demarcation points. Otherwise some components might not be capable of supporting the services. Services must also be configurable, measureable, and verifiable within the system to ensure that applications, users and devices are getting the services requested Leads to accounting and billing How: using service metrics. Prof. Shervin Shirmohammadi CEG 4185 4-21 Service Levels Service Levels: grouping of a number of service characteristics. E.g., combining capacity (1.5 Mb/s) and reliability (99.99% uptime). Can be offered by service providers to customers, in packages: Basic (No Priority) Gold (High Capacity) Platinum (High Capacity, Reliability, Low Delay) Prof. Shervin Shirmohammadi CEG 4185 4-22 11

System Components & Services (1) GigE GigE OC-48 OC-48 GigE FE Servers (4) GigE Switch Router POS/O C-48 Router GigE Switch User PCs (100) Potential aggregate capacity (Gb/s) 0.1 1 10 Possible Demarcation Points Distance along transmission path Prof. Shervin Shirmohammadi CEG 4185 4-23 System Components & Services (2) Servers (4) GigE GigE GigE Switch OC-48 OC-48 GigE FE FE Router POS/O C-48 Router GigE Firewall Switch FE FE Switch User PCs (100) Potential aggregate capacity (Gb/s) 0.1 1 10 Distance along transmission path Prof. Shervin Shirmohammadi CEG 4185 4-24 12

Types of Service Best-effort service No control how the network will satisfy the service request. Unpredictable and unreliable service with variable performance. Guaranteed service Opposite of best-effort service. Predictable and reliable. Implies a contract between the user and the service provider. Predictable service Some degree of predictability without accountability. Service requirements must be configurable, measurable, and verifiable. Control of the system is required. Prof. Shervin Shirmohammadi CEG 4185 4-25 Best Effort Performance Fast Ethernet Capacity Fast Ethernet (Mb/s) 0 50 100 Capacity Available Resource Loading Throughput Congestion begins to load network Number of Concurrent Traffic Flows Prof. Shervin Shirmohammadi CEG 4185 4-26 13

Guaranteed Performance Telephony network, with Call Admission Control (CAC) Capacity Fast Ethernet (Mb/s) 0 50 100 Resource Loading As calls are added resource loading increases System Resources are fully loaded at this point No more calls allowed until resource are available Number of Concurrent Traffic Flows (Calls) Prof. Shervin Shirmohammadi CEG 4185 4-27 Best Effort vs. Guaranteed Best Effort: allows maximum number of traffic flows, but performance degradation likely. Guaranteed: performance will be met, but fewer traffic flows can be accepted. Many applications need a hybrid of the two (Predictable Effort). E.g., VoIP requires characteristics of CAC while operating on top of best-effort Internet. Prof. Shervin Shirmohammadi CEG 4185 4-28 14

Performance Characteristics Capacity is a measure of the system s ability to transfer information (voice, data, video, etc). Delay is a measure of the time difference in the transmission of information across the system. RMA refers to Reliability, Maintainability, and Availability Prof. Shervin Shirmohammadi CEG 4185 4-29 Capacity Bandwidth: theoretical capacity of one or more network devices or communication links in the system. Raw capacity does not take into account overhead from higher-layer protocols or performance loss due to device inefficiencies. Throughput: is the realizable capacity of the system or its network devices. E.g., theoretical SONET OC-3c link capacity (bandwidth) is 155.52 Mb/s This does not include data-link, network, or transport-layer protocol overhead. Performing at line rate when T=155.52 Mb/s In reality, when tested with TCP, SONET OC-3c link capacity (throughput) is 80 to 128 Mb/s Where does the majority of this overhead coming from? Prof. Shervin Shirmohammadi CEG 4185 4-30 15

Sources: Delay Propagation, transmission, queuing, and processing There are several ways to measure delay Direction (end-to-end, round-trip) Latency time it takes to process information and reply. E.g., response time of a network device. Jitter or delay variation change in delay over time. Realtime and near real-time require strict delay variation. Jitter is NOT delay Prof. Shervin Shirmohammadi CEG 4185 4-31 RMA Reliability: a statistical indicator of the frequency of failure of the network. Represents un-scheduled outages of services. Predictable behavior delivery of information must occur within wellknown time boundaries. Analogy: air travel. Passengers expect flights to depart and arrive within reasonable boundaries. Maintainability: a statistical measure of the time to restore the system to fully operational status after it has experienced a fault. It is generally expressed as a mean-time-to-repair (MTTR). One has to be somewhat careful with this value since it usually assumes that logistics (ordering and receiving a burned out device) time is not included. Availability: relationship between the frequency of missioncritical failures and the time to restore the service. Defines as the mean time between failures divided by the sum of mean time to repair and mean time between failures: A = (MTBF) / (MTBF + MTTR) Prof. Shervin Shirmohammadi CEG 4185 4-32 16

Performance Envelopes A combination of two or more performance requirements with upper and lower thresholds for each. 10 6 Appl 1 Appl 4 10 5 Appl 2 Data Size (Mbytes) 10 4 10 3 10 2 Appl 3 10 1 Appl 5 10 0 10-4 10-3 10-2 10-1 10 0 10 1 10 1/Delay (Seconds 1 ) 2 Prof. Shervin Shirmohammadi CEG 4185 4-33 Supportability Post-implementation costs (80% of network life cycle cost are the operations and support costs) and system reliability and system maintainability Training of operators Quality of staff to perform maintenance What affects this Degree of redundancy in critical path components. Quality of network components Location and accessibility of components Implementation of test and monitoring equipment Prof. Shervin Shirmohammadi CEG 4185 4-34 17