Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 25 Multimedia.
High Speed Networks and Internets : Multimedia Transportation and Quality of Service Meejeong Lee.
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer.
T OP -D OWN N ETWORK D ESIGN C HAPTER F OUR C HARACTERIZING N ETWORK T RAFFIC Oppenheimer.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 3 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 1, Tuesday 1/9/2007)
Multicast Communication
1 Computer Networks Transport Layer Protocols. 2 Application-layer Protocols Application-layer protocols –one “piece” of an app –define messages exchanged.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (January 14, 2015)
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 4 Robert D’Andrea.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
ITEC 275 Computer Networks – Switching, Routing, and WANs
CIS 460 – Network Analysis and Design Chapter 4 – Characterizing Network Traffic.
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 9.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Integrated Services Advanced Multimedia University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot December 2010 December 2010.
Integrated Services (RFC 1633) r Architecture for providing QoS guarantees to individual application sessions r Call setup: a session requiring QoS guarantees.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
1 Integrated and Differentiated Services Multimedia Systems(Module 5 Lesson 4) Summary: r Intserv Architecture RSVP signaling protocol r Diffserv Architecture.
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 7 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Oppenheimer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 4 Robert D’Andrea.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Connecting to the Network Networking for Home and Small Businesses – Chapter.
Quality of Service in the Internet The slides of part 1-3 are adapted from the slides of chapter 7 published at the companion website of the book: Computer.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
Computer Networks with Internet Technology William Stallings
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Top-Down Network Design Chapter Four Characterizing Network Traffic
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Topic 3 Analysing network traffic
EE 122: Lecture 15 (Quality of Service) Ion Stoica October 25, 2001.
1 Chapter 3. Communication Networks Wen-Shyang Hwang KUAS EE.
CSCI-235 Micro-Computer Applications The Network.
Department of Computer and IT Engineering University of Kurdistan
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Local Area Networks Honolulu Community College
Challenges in the Next Generation Internet Xin Yuan Department of Computer Science Florida State University
Chapter 9 Introduction To Data-Link Layer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2004 Cisco Press & Priscilla Oppenheimer.
Chapter 6 outline r 6.1 Multimedia Networking Applications r 6.2 Streaming stored audio and video m RTSP r 6.3 Real-time, Interactive Multimedia: Internet.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
Chapter 30 Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 9 Introduction To Data-Link Layer
Chapter 9 Introduction To Data-Link Layer 9.# 1
Date: April. 13, Monday Evening.
Local Area Networks Honolulu Community College
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Top-Down Network Design Chapter Four Characterizing Network Traffic
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer

Introduction This chapter discusses characterizing the existing network in terms of traffic flow Techniques for characterizing traffic flow, traffic volume, and protocol behavior. By recognizing traffic sources and data stores, documenting application and protocol usage, and evaluating network traffic caused by common protocols

Characterizing Traffic Flow Characterizing traffic flow involves –identifying sources and destinations of network traffic –and analyzing the direction and symmetry of data traveling between sources and destinations Identifying Major Traffic Sources and Stores –One should first identify user communities and data stores for existing and new applications –A user community is a set of workers who use a particular application or set of applications. a corporate department or set of departments –A data store (sometimes called a data sink) is an area in a network where application layer data resides. A server, Storage Area Network etc.

User Communities User Community Name Size of Community (Number of Users) Location(s) of Community Application(s) Used by Community

Data Stores Data StoreLocationApplication(s)Used by User Community(or Communities)

Characterizing Traffic Flow (Cont…) Documenting Traffic Flow on the Existing Network –involves identifying and characterizing individual traffic flows between traffic sources and stores. –“Traffic Flow Measurement: Architecture.” RFC 2722 –Measuring traffic flow behavior can also help network designers do the following: Characterize the behavior of existing networks. Plan for network development and expansion. Quantify network performance. Verify the quality of network service. Ascribe network usage to users and applications.

Characterizing Traffic Flow (Cont…) Documenting Traffic Flow on the Existing Network –An individual network traffic flow can be defined as protocol and application information transmitted between communicating entities during a single session. –Size of flow size of a flow is to measure the number of megabytes per second (MBps)

Traffic Flow Destination 1Destination 2Destination 3Destination MB/secMB/secMB/secMB/sec Source 1 Source 2 Source 3 Source n

Characterizing Traffic Flow (Cont…) Characterizing Types of Traffic Flow for New Network Applications –good technique for characterizing network traffic flow is to classify applications as supporting one of a few well-known flow types Terminal/host traffic flow –Usually asymitric –E.g Telnet –Less prevalent Client/server traffic flow –Most widely used one –Clients rely on servers for access to resources, such as storage, peripherals, application software, and processing power –bidirectional and asymmetric

Peer-to-peer traffic flow Server/server traffic flow Distributed computing traffic flow

Network Traffic Factors Traffic flow Location of traffic sources and data stores Traffic load Traffic behavior Quality of Service (QoS) requirements

Traffic Flow Example Administration Business and Social Sciences Math and Sciences 50 PCs 25 Macs 50 PCs 30 PCs 30 Library Patrons (PCs) 30 Macs and 60 PCs in Computing Center Library and Computing Center App Kbps App 2 60 Kbps App Kbps App 4 48 Kbps App Kbps Total 808 Kbps App 1 48 Kbps App 2 32 Kbps App 3 96 Kbps App 4 24 Kbps App Kbps App Kbps App Kbps Total 1900 Kbps App 1 30 Kbps App 2 20 Kbps App 3 60 Kbps App 4 16 Kbps Total 126 Kbps App 2 20 Kbps App 3 96 Kbps App 4 24 Kbps App 9 80 Kbps Total 220 Kbps Arts and Humanities Server Farm 10-Mbps Metro Ethernet to Internet

Types of Traffic Flow Terminal/host Client/server Thin client Peer-to-peer Server/server Distributed computing

Traffic Flow for Voice over IP The flow associated with transmitting the audio voice is separate from the flows associated with call setup and teardown. –The flow for transmitting the digital voice is essentially peer-to-peer. –Call setup and teardown is a client/server flow A phone needs to talk to a server or phone switch that understands phone numbers, IP addresses, capabilities negotiation, and so on.

Network Applications Traffic Characteristics Name of Application Type of Traffic Flow Protocol(s) Used by Application User Communities That Use the Application Data Stores (Servers, Hosts, and so on) Approximate Bandwidth Requirements QoS Requirements

Traffic Load To calculate whether capacity is sufficient, you should know: –The number of stations –The average time that a station is idle between sending frames –The time required to transmit a message once medium access is gained That level of detailed information can be hard to gather, however

Size of Objects on Networks Terminal screen: 4 Kbytes Simple 10 Kbytes Simple web page: 50 Kbytes High-quality image: 50,000 Kbytes Database backup: 1,000,000 Kbytes or more

Traffic Behavior Broadcasts –All ones data-link layer destination address FF: FF: FF: FF: FF: FF –Doesn’t necessarily use huge amounts of bandwidth –But does disturb every CPU in the broadcast domain Multicasts –First bit sent is a one 01:00:0C:CC:CC:CC (Cisco Discovery Protocol) –Should just disturb NICs that have registered to receive it –Requires multicast routing protocol on internetworks

Network Efficiency Frame size Protocol interaction Windowing and flow control Error-recovery mechanisms

QoS Requirements ATM service specifications –Constant bit rate (CBR) –Realtime variable bit rate (rt-VBR) –Non-realtime variable bit rate (nrt-VBR) –Unspecified bit rate (UBR) –Available bit rate (ABR) –Guaranteed frame rate (GFR)

QoS Requirements per IETF IETF integrated services working group specifications –Controlled load service Provides client data flow with a QoS closely approximating the QoS that same flow would receive on an unloaded network –Guaranteed service Provides firm (mathematically provable) bounds on end-to-end packet-queuing delays

QoS Requirements per IETF IETF differentiated services working group specifications –RFC 2475 –IP packets can be marked with a differentiated services codepoint (DSCP) to influence queuing and packet-dropping decisions for IP datagrams on an output interface of a router

Summary Continue to use a systematic, top-down approach Don’t select products until you understand network traffic in terms of: –Flow –Load –Behavior –QoS requirements

Review Questions List and describe six different types of traffic flows. What makes traffic flow in voice over IP networks challenging to characterize and plan for? Why should you be concerned about broadcast traffic? How do ATM and IETF specifications for QoS differ?