SlideShare a Scribd company logo
Copyright 2010 Cisco Press & Priscilla Oppenheimer
1
 Data source: area in a network where application layer data resides.
2
 Traffic flow
 Location of traffic sources and data stores
 Traffic load
 Traffic behavior
 Quality of Service (QoS) requirements
3
 Characterize the behavior of existing networks.
 Plan for network development and expansion.
 Quantify network performance.
 Verify the quality of network service.
 ■ Ascribe network usage to users and applications.
 to measure the number of megabytes per second (MBps) between communicating
entities. To characterize the size, of a flow, use a protocol analyzer or network
management system
4
User
Community
Name
Size of
Community
(Number of
Users)
Location(s) of
Community
Application(s)
Used by
Community
5
Data Store Location Application(s) Used by User
Community(or
Communities)
6
Destination 1 Destination 2 Destination 3 Destination MB/sec MB/sec
MB/sec MB/sec
Source 1
Source 2
Source 3
Source n
7
Administration
Business and
Social Sciences
Math and
Sciences
50 PCs 25 Macs
50 PCs
50 PCs30 PCs
30 Library Patrons (PCs)
30 Macs and 60 PCs in
Computing Center
Library and Computing Center
App 1 108 Kbps
App 2 60 Kbps
App 3 192 Kbps
App 4 48 Kbps
App 7 400 Kbps
Total 808 Kbps
App 1 48 Kbps
App 2 32 Kbps
App 3 96 Kbps
App 4 24 Kbps
App 5 300 Kbps
App 6 200 Kbps
App 8 1200 Kbps
Total 1900 Kbps
App 1 30 Kbps
App 2 20 Kbps
App 3 60 Kbps
App 4 16 Kbps
Total 126 Kbps
App 2 20 Kbps
App 3 96 Kbps
App 4 24 Kbps
App 9 80 Kbps
Total 220 Kbps
Arts and
Humanities
Server Farm
10-Mbps Metro
Ethernet to Internet
8
 Terminal/host: Terminal/host traffic is usually asymmetric. The terminal sends a
few characters and the host sends many characters. Telnet is an example of an
application that generates terminal/host traffic.
 Client/server
 Thin client
 Peer-to-peer
 Server/server
 Distributed computing
9
The flow associated with transmitting the
audio voice is separate from the flows
associated with call setup and teardown.
 The flow for transmitting the digital voice is
essentially peer-to-peer.
 Call setup and teardown is a client/server flow
 A phone needs to talk to a server or phone switch that
understands phone numbers, IP addresses, capabilities
negotiation, and so on.
10
 The audio voice flow between two IP endpoints is carried by the Real-Time
Transport Protocol (RTP), which is a connectionless protocol that runs on top of
UDP.
 The main call setup, teardown, and control protocols in an IP network are H.323,
the Cisco Skinny Client Control Protocol (SCCP), Simple Gateway Control
Protocol (SGCP), Media Gateway Control Protocol (MGCP), and Session Initiation
Protocol (SIP).
 These signaling protocols run between an IP endpoint and a voice-enabled server
and follow the client/server paradigm.
11
 Private branch exchanges (PBX) and circuit switching, and modern VoIP
networks, which use packet switching, must handle two fundamental functions:
call control and call switching.
 Call Control: handles call setup and teardown, addressing and routing, and
informational and supplementary services.
 A fundamental job of call control is to compare the digits dialed by the user
making a call to configured number patterns to determine how to route a call.
 Call switching handles the actual switching of calls. In traditional voice networks,
when a call is placed, a PBX connects the calling phone via a so-called line-side
interface to another phone’s line-side interface.
 If the call is destined for the public switched telephone network (PSTN), the call
switching function connects the line-side interface with the trunk-side interface.
 May have different path from that used by the call control packets
12
Name of
Application
Type of
Traffic
Flow
Protocol(s)
Used by
Application
User
Communities
That Use the
Application
Data Stores
(Servers, Hosts,
and so on)
Approximate
Bandwidth
Requirements
QoS
Requirements
13
 To calculate whether capacity is sufficient, you should know:
 The number of stations
 The average time that a station is idle between sending frames
 The time required to transmit a message once medium access is
gained
 That level of detailed information can be hard to gather,
however
14
 research application-usage patterns, idle times between packets and sessions,
frame sizes, and other traffic behavioral patterns for application and system
protocols.
 Another approach to avoiding bottlenecks is simply to throw large amounts of
bandwidth at the problem (also known as overprovisioning).
15
 identify user communities, the number of users in the communities, and the
applications the users employ.
 To predict the aggregate bandwidth requirement for all users of an application
document the following information:
 The frequency of application sessions (number of sessions per day, week, month, or
whatever time period is appropriate)
 The length of an average application session
 The number of simultaneous users of an application
16
If it is not practical to research these details, you can
make some assumptions:
 The number of users of an application equals the number of
simultaneous users.
 All applications are used all the time, so that your bandwidth
calculation is a worst case (peak) estimate.
 Each user opens just one session, and that session lasts all day
until the user shuts down the application at the end of the day
17
 research the size of data objects:
 Sent by applications
 The overhead caused by protocol layers
 Any additional load caused by application initialization. (Some applications send much
more traffic during initialization than during steady-state operation.)
 hard to accurately estimate the average size of data objects that users transfer to
each other and to servers; it depends
 it’s difficult to make any generalizations about the average size of objects sent on a
network.
 which protocols an application uses
18
19
 Terminal screen: 4 Kbytes
 Simple e-mail: 10 Kbytes
 Simple web page: 50 Kbytes
 High-quality image: 50,000 Kbytes
 Database backup: 1,000,000 Kbytes or more
20
 Address Resolution Protocol (ARP)
 ■ Dynamic Host Configuration Protocol (DHCP)
 ■ Internet Control Message Protocol (ICMP), version 4 and 6
 ■ Internet Group Management Protocol (IGMP), version 4 and 6
 ■ Domain Name System (DNS)
 ■ Multicast DNS (mDNS)
 ■ NetBIOS name queries
 ■ Network Time Protocol (NTP)
 ■ Simple Service Discovery Protocol (SSDP)
 ■ Service Location Protocol (SLP)
 ■ Simple Network Management Protocol (SNMP)
21
 Router with large-distance vector routing table uses significant amount of WAN
bandwidth
 RIP
 Each route in the packet uses 20 bytes
 25 routes per packet
 Sends one or more 532-byte packets every 30 seconds depending on the size of the
routing table.
 Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing
Protocol (EIGRP), use little bandwidth.
22
 Broadcasts
 All ones data-link layer destination address
 FF: FF: FF: FF: FF: FF
 Doesn’t necessarily use huge amounts of bandwidth
 But does disturb every CPU in the broadcast domain
 Multicasts
 First bit sent is a one
 01:00:0C:CC:CC:CC (Cisco Discovery Protocol)
 Should just disturb NICs that have registered to
receive it
 Requires multicast routing protocol on internetworks
23
 Scalability problem
 Use of routers
 Use of VLANs
 Too many broadcast frames can overwhelm end stations, switches, and routers.
 broadcast radiation: to describe the effect of broadcasts spreading from the sender
to all other devices in a broadcast domain.
 Broadcast radiation can degrade performance at network endpoints
24
 Efficiency refers to whether applications and protocols use bandwidth effectively
 Frame size
 use the largest possible maximum transmission unit (MTU).
 MTU can be configured for some applications
 avoid fragmentation and reassembly of frames in IP environments; degrades
performance
 MTU discovery
 Protocol interaction
 Windowing and flow control
 Send window
 Receive window
 CPU power and memory
 Some IP-based applications run on top of UDP, not TCP; no flow control, no handling
 Ping pong protocols
 Error-recovery mechanisms
 Retransmission without ack.
 SAck
25
 ATM service specifications
 Constant bit rate (CBR)
 Realtime variable bit rate (rt-VBR)
 Non-realtime variable bit rate (nrt-VBR)
 Unspecified bit rate (UBR)
 Available bit rate (ABR)
 Guaranteed frame rate (GFR)
26
 IETF integrated services working group specifications
 Controlled load service
 Provides client data flow with a QoS closely approximating the QoS that same flow would receive
on an unloaded network
 Guaranteed service
 Provides firm (mathematically provable) bounds on end-to-end packet-queuing delays
27
 IETF differentiated services working group specifications
 RFC 2475
 IP packets can be marked with a differentiated services codepoint (DSCP) to influence
queuing and packet-dropping decisions for IP datagrams on an output interface of a
router
28
 Continue to use a systematic, top-down approach
 Don’t select products until you understand network traffic in
terms of:
 Flow
 Load
 Behavior
 QoS requirements
29
List and describe six different types of traffic
flows.
What makes traffic flow in voice over IP
networks challenging to characterize and plan
for?
Why should you be concerned about broadcast
traffic?
How do ATM and IETF specifications for QoS
differ?
30

More Related Content

PPT
Chapter11
PPT
Chapter13
PPT
Chapter05
PPT
Chapter03
PPT
Chapter06
PPTX
08. networking-part-2
PPT
Chapter10
PPT
Chapter07
Chapter11
Chapter13
Chapter05
Chapter03
Chapter06
08. networking-part-2
Chapter10
Chapter07

What's hot (20)

PPTX
CISSP - Chapter 4 - Network Fundamental
PPT
Chapter02
PPTX
08. networking
PPT
Network management
PPTX
01. 02. introduction (13 slides)
PPTX
05. performance-concepts-26-slides
PPTX
Cloud Architecture
PPTX
07. datacenters
PPTX
10. compute-part-1
PDF
Introduction to Software Defined Networking (SDN)
PPT
Configuring Network Clients
PPTX
Network Troubleshooting - Part 2
PPT
E Snet Raf Essc Jan2005
PDF
Software Define Networking (SDN)
PPTX
03. non-functional-attributes-introduction-4-slides
PPTX
01. 03.-introduction-to-infrastructure
PPT
Linux Based Advanced Routing with Firewall and Traffic Control
PPTX
10. compute-part-2
PPTX
Software defined network
PPTX
11. operating-systems-part-2
CISSP - Chapter 4 - Network Fundamental
Chapter02
08. networking
Network management
01. 02. introduction (13 slides)
05. performance-concepts-26-slides
Cloud Architecture
07. datacenters
10. compute-part-1
Introduction to Software Defined Networking (SDN)
Configuring Network Clients
Network Troubleshooting - Part 2
E Snet Raf Essc Jan2005
Software Define Networking (SDN)
03. non-functional-attributes-introduction-4-slides
01. 03.-introduction-to-infrastructure
Linux Based Advanced Routing with Firewall and Traffic Control
10. compute-part-2
Software defined network
11. operating-systems-part-2
Ad

Viewers also liked (8)

PPT
Chapter01
PPTX
05. performance-concepts
PPTX
06. security concept
PPTX
09. storage-part-1
PPT
Chapter14
PPTX
04. availability-concepts
PPTX
11. operating-systems-part-1
PPT
Artificial Intelligence
Chapter01
05. performance-concepts
06. security concept
09. storage-part-1
Chapter14
04. availability-concepts
11. operating-systems-part-1
Artificial Intelligence
Ad

Similar to Chapter04 (20)

PPT
Protocol For Streaming Media
PPTX
INT_Ch17.pptx
PPT
ConfigureTwo networks principle
PPTX
Transport layer
PDF
A Machine Learning based Network Sharing System Design with MPTCP
PDF
A Machine Learning based Network Sharing System Design with MPTCP
PPT
nv.ppt
PDF
5 maximazing networkcapacity_v4-jorge_alvarado
PDF
Packet Guide SONET/SDH
PDF
Ccna 4 Chapter 4 V4.0 Answers
PPTX
NUVX Technologies general solutions
PPTX
Module 3.2vtuMCAIOTIP-based network.pptx
PPTX
transportlayerUnit4ComputerNetworkUnit4.pptx
PPTX
Network protocols
PDF
17 - Building small network.pdf
PPTX
M1-C17-Armando una red.pptx
PPTX
CN Unit-1 PPT.pptx
PPTX
ITN_Module_17.pptx
PDF
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
Protocol For Streaming Media
INT_Ch17.pptx
ConfigureTwo networks principle
Transport layer
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
nv.ppt
5 maximazing networkcapacity_v4-jorge_alvarado
Packet Guide SONET/SDH
Ccna 4 Chapter 4 V4.0 Answers
NUVX Technologies general solutions
Module 3.2vtuMCAIOTIP-based network.pptx
transportlayerUnit4ComputerNetworkUnit4.pptx
Network protocols
17 - Building small network.pdf
M1-C17-Armando una red.pptx
CN Unit-1 PPT.pptx
ITN_Module_17.pptx
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Modernizing your data center with Dell and AMD
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Empathic Computing: Creating Shared Understanding
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
cuic standard and advanced reporting.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
A Presentation on Artificial Intelligence
PPTX
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Advanced methodologies resolving dimensionality complications for autism neur...
The AUB Centre for AI in Media Proposal.docx
Per capita expenditure prediction using model stacking based on satellite ima...
Modernizing your data center with Dell and AMD
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine learning based COVID-19 study performance prediction
Encapsulation_ Review paper, used for researhc scholars
Empathic Computing: Creating Shared Understanding
Reach Out and Touch Someone: Haptics and Empathic Computing
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Review of recent advances in non-invasive hemoglobin estimation
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Spectral efficient network and resource selection model in 5G networks
cuic standard and advanced reporting.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The Rise and Fall of 3GPP – Time for a Sabbatical?
A Presentation on Artificial Intelligence
Cloud computing and distributed systems.

Chapter04

  • 1. Copyright 2010 Cisco Press & Priscilla Oppenheimer 1
  • 2.  Data source: area in a network where application layer data resides. 2
  • 3.  Traffic flow  Location of traffic sources and data stores  Traffic load  Traffic behavior  Quality of Service (QoS) requirements 3
  • 4.  Characterize the behavior of existing networks.  Plan for network development and expansion.  Quantify network performance.  Verify the quality of network service.  ■ Ascribe network usage to users and applications.  to measure the number of megabytes per second (MBps) between communicating entities. To characterize the size, of a flow, use a protocol analyzer or network management system 4
  • 5. User Community Name Size of Community (Number of Users) Location(s) of Community Application(s) Used by Community 5
  • 6. Data Store Location Application(s) Used by User Community(or Communities) 6
  • 7. Destination 1 Destination 2 Destination 3 Destination MB/sec MB/sec MB/sec MB/sec Source 1 Source 2 Source 3 Source n 7
  • 8. Administration Business and Social Sciences Math and Sciences 50 PCs 25 Macs 50 PCs 50 PCs30 PCs 30 Library Patrons (PCs) 30 Macs and 60 PCs in Computing Center Library and Computing Center App 1 108 Kbps App 2 60 Kbps App 3 192 Kbps App 4 48 Kbps App 7 400 Kbps Total 808 Kbps App 1 48 Kbps App 2 32 Kbps App 3 96 Kbps App 4 24 Kbps App 5 300 Kbps App 6 200 Kbps App 8 1200 Kbps Total 1900 Kbps App 1 30 Kbps App 2 20 Kbps App 3 60 Kbps App 4 16 Kbps Total 126 Kbps App 2 20 Kbps App 3 96 Kbps App 4 24 Kbps App 9 80 Kbps Total 220 Kbps Arts and Humanities Server Farm 10-Mbps Metro Ethernet to Internet 8
  • 9.  Terminal/host: Terminal/host traffic is usually asymmetric. The terminal sends a few characters and the host sends many characters. Telnet is an example of an application that generates terminal/host traffic.  Client/server  Thin client  Peer-to-peer  Server/server  Distributed computing 9
  • 10. The flow associated with transmitting the audio voice is separate from the flows associated with call setup and teardown.  The flow for transmitting the digital voice is essentially peer-to-peer.  Call setup and teardown is a client/server flow  A phone needs to talk to a server or phone switch that understands phone numbers, IP addresses, capabilities negotiation, and so on. 10
  • 11.  The audio voice flow between two IP endpoints is carried by the Real-Time Transport Protocol (RTP), which is a connectionless protocol that runs on top of UDP.  The main call setup, teardown, and control protocols in an IP network are H.323, the Cisco Skinny Client Control Protocol (SCCP), Simple Gateway Control Protocol (SGCP), Media Gateway Control Protocol (MGCP), and Session Initiation Protocol (SIP).  These signaling protocols run between an IP endpoint and a voice-enabled server and follow the client/server paradigm. 11
  • 12.  Private branch exchanges (PBX) and circuit switching, and modern VoIP networks, which use packet switching, must handle two fundamental functions: call control and call switching.  Call Control: handles call setup and teardown, addressing and routing, and informational and supplementary services.  A fundamental job of call control is to compare the digits dialed by the user making a call to configured number patterns to determine how to route a call.  Call switching handles the actual switching of calls. In traditional voice networks, when a call is placed, a PBX connects the calling phone via a so-called line-side interface to another phone’s line-side interface.  If the call is destined for the public switched telephone network (PSTN), the call switching function connects the line-side interface with the trunk-side interface.  May have different path from that used by the call control packets 12
  • 13. Name of Application Type of Traffic Flow Protocol(s) Used by Application User Communities That Use the Application Data Stores (Servers, Hosts, and so on) Approximate Bandwidth Requirements QoS Requirements 13
  • 14.  To calculate whether capacity is sufficient, you should know:  The number of stations  The average time that a station is idle between sending frames  The time required to transmit a message once medium access is gained  That level of detailed information can be hard to gather, however 14
  • 15.  research application-usage patterns, idle times between packets and sessions, frame sizes, and other traffic behavioral patterns for application and system protocols.  Another approach to avoiding bottlenecks is simply to throw large amounts of bandwidth at the problem (also known as overprovisioning). 15
  • 16.  identify user communities, the number of users in the communities, and the applications the users employ.  To predict the aggregate bandwidth requirement for all users of an application document the following information:  The frequency of application sessions (number of sessions per day, week, month, or whatever time period is appropriate)  The length of an average application session  The number of simultaneous users of an application 16
  • 17. If it is not practical to research these details, you can make some assumptions:  The number of users of an application equals the number of simultaneous users.  All applications are used all the time, so that your bandwidth calculation is a worst case (peak) estimate.  Each user opens just one session, and that session lasts all day until the user shuts down the application at the end of the day 17
  • 18.  research the size of data objects:  Sent by applications  The overhead caused by protocol layers  Any additional load caused by application initialization. (Some applications send much more traffic during initialization than during steady-state operation.)  hard to accurately estimate the average size of data objects that users transfer to each other and to servers; it depends  it’s difficult to make any generalizations about the average size of objects sent on a network.  which protocols an application uses 18
  • 19. 19
  • 20.  Terminal screen: 4 Kbytes  Simple e-mail: 10 Kbytes  Simple web page: 50 Kbytes  High-quality image: 50,000 Kbytes  Database backup: 1,000,000 Kbytes or more 20
  • 21.  Address Resolution Protocol (ARP)  ■ Dynamic Host Configuration Protocol (DHCP)  ■ Internet Control Message Protocol (ICMP), version 4 and 6  ■ Internet Group Management Protocol (IGMP), version 4 and 6  ■ Domain Name System (DNS)  ■ Multicast DNS (mDNS)  ■ NetBIOS name queries  ■ Network Time Protocol (NTP)  ■ Simple Service Discovery Protocol (SSDP)  ■ Service Location Protocol (SLP)  ■ Simple Network Management Protocol (SNMP) 21
  • 22.  Router with large-distance vector routing table uses significant amount of WAN bandwidth  RIP  Each route in the packet uses 20 bytes  25 routes per packet  Sends one or more 532-byte packets every 30 seconds depending on the size of the routing table.  Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP), use little bandwidth. 22
  • 23.  Broadcasts  All ones data-link layer destination address  FF: FF: FF: FF: FF: FF  Doesn’t necessarily use huge amounts of bandwidth  But does disturb every CPU in the broadcast domain  Multicasts  First bit sent is a one  01:00:0C:CC:CC:CC (Cisco Discovery Protocol)  Should just disturb NICs that have registered to receive it  Requires multicast routing protocol on internetworks 23
  • 24.  Scalability problem  Use of routers  Use of VLANs  Too many broadcast frames can overwhelm end stations, switches, and routers.  broadcast radiation: to describe the effect of broadcasts spreading from the sender to all other devices in a broadcast domain.  Broadcast radiation can degrade performance at network endpoints 24
  • 25.  Efficiency refers to whether applications and protocols use bandwidth effectively  Frame size  use the largest possible maximum transmission unit (MTU).  MTU can be configured for some applications  avoid fragmentation and reassembly of frames in IP environments; degrades performance  MTU discovery  Protocol interaction  Windowing and flow control  Send window  Receive window  CPU power and memory  Some IP-based applications run on top of UDP, not TCP; no flow control, no handling  Ping pong protocols  Error-recovery mechanisms  Retransmission without ack.  SAck 25
  • 26.  ATM service specifications  Constant bit rate (CBR)  Realtime variable bit rate (rt-VBR)  Non-realtime variable bit rate (nrt-VBR)  Unspecified bit rate (UBR)  Available bit rate (ABR)  Guaranteed frame rate (GFR) 26
  • 27.  IETF integrated services working group specifications  Controlled load service  Provides client data flow with a QoS closely approximating the QoS that same flow would receive on an unloaded network  Guaranteed service  Provides firm (mathematically provable) bounds on end-to-end packet-queuing delays 27
  • 28.  IETF differentiated services working group specifications  RFC 2475  IP packets can be marked with a differentiated services codepoint (DSCP) to influence queuing and packet-dropping decisions for IP datagrams on an output interface of a router 28
  • 29.  Continue to use a systematic, top-down approach  Don’t select products until you understand network traffic in terms of:  Flow  Load  Behavior  QoS requirements 29
  • 30. List and describe six different types of traffic flows. What makes traffic flow in voice over IP networks challenging to characterize and plan for? Why should you be concerned about broadcast traffic? How do ATM and IETF specifications for QoS differ? 30