SlideShare a Scribd company logo
1 of 18
Top-Down Network Design

            Chapter Four

     Characterizing Network Traffic



     Copyright 2010 Cisco Press & Priscilla Oppenheimer
Network Traffic Factors

•   Traffic flow
•   Location of traffic sources and data stores
•   Traffic load
•   Traffic behavior
•   Quality of Service (QoS) requirements
User Communities
User        Size of      Location(s) of   Application(s)
Community   Community    Community        Used by
Name        (Number of                    Community
            Users)
Data Stores
Data Store   Location   Application(s) Used by User
                                       Community(or
                                       Communities)
Traffic Flow

           Destination 1   Destination 2   Destination 3   Destination
           MB/sec          MB/sec          MB/sec          MB/sec


Source 1


Source 2


Source 3


Source n
Library and Computing Center
Traffic Flow                               30 Library Patrons (PCs)          10-Mbps Metro

 Example                                   30 Macs and 60 PCs in
                                           Computing Center
                                                                            Ethernet to Internet

                                                 Server Farm                App 1   108   Kbps
      App 2    20   Kbps                                                    App 2    60   Kbps
      App 3    96   Kbps                                                    App 3   192   Kbps
      App 4    24   Kbps                                                    App 4    48   Kbps
      App 9    80   Kbps                                                    App 7   400   Kbps
      Total   220   Kbps                                                    Total   808   Kbps




         50 PCs                                                                               25 Macs
                                                                                              50 PCs

  Administration                                                                      Arts and
                           App 1     30   Kbps
                                                                                     Humanities
                           App 2     20   Kbps            App 1   48 Kbps
                           App 3     60   Kbps            App 2   32 Kbps
                           App 4     16   Kbps            App 3   96 Kbps
                           Total    126   Kbps            App 4   24 Kbps
                                                          App 5 300 Kbps                    Math and
                                                          App 6 200 Kbps
                                                          App 8 1200 Kbps                   Sciences
              30 PCs                                      Total 1900 Kbps      50 PCs

       Business and
      Social Sciences
Types of Traffic Flow

•   Terminal/host
•   Client/server
•   Thin client
•   Peer-to-peer
•   Server/server
•   Distributed computing
Traffic Flow for Voice over IP
• The flow associated with transmitting
  the audio voice is separate from the
  flows associated with call setup and
  teardown.
   – The flow for transmitting the digital voice
     is essentially peer-to-peer.
   – Call setup and teardown is a client/server
     flow
      • A phone needs to talk to a server or phone
        switch that understands phone numbers, IP
        addresses, capabilities negotiation, and so on.
Network Applications
                      Traffic Characteristics

Name of     Type of    Protocol(s)   User           Data Stores      Approximate    QoS
Application Traffic    Used by       Communities    (Servers, Hosts, Bandwidth      Requirements
            Flow       Application   That Use the   and so on)       Requirements
                                     Application
Traffic Load
• To calculate whether capacity is sufficient,
  you should know:
  – The number of stations
  – The average time that a station is idle between
    sending frames
  – The time required to transmit a message once
    medium access is gained
• That level of detailed information can be
  hard to gather, however
Size of Objects on Networks

•   Terminal screen: 4 Kbytes
•   Simple e-mail: 10 Kbytes
•   Simple web page: 50 Kbytes
•   High-quality image: 50,000 Kbytes
•   Database backup: 1,000,000 Kbytes or
    more
Traffic Behavior
• Broadcasts
   – All ones data-link layer destination address
       • FF: FF: FF: FF: FF: FF
   – Doesn’t necessarily use huge amounts of bandwidth
   – But does disturb every CPU in the broadcast domain
• Multicasts
   – First bit sent is a one
       • 01:00:0C:CC:CC:CC (Cisco Discovery Protocol)
   – Should just disturb NICs that have registered to receive
     it
   – Requires multicast routing protocol on internetworks
Network Efficiency

•   Frame size
•   Protocol interaction
•   Windowing and flow control
•   Error-recovery mechanisms
QoS Requirements

• ATM service specifications
  –   Constant bit rate (CBR)
  –   Realtime variable bit rate (rt-VBR)
  –   Non-realtime variable bit rate (nrt-VBR)
  –   Unspecified bit rate (UBR)
  –   Available bit rate (ABR)
  –   Guaranteed frame rate (GFR)
QoS Requirements per IETF

• IETF integrated services working group
  specifications
  – Controlled load service
     • Provides client data flow with a QoS closely
       approximating the QoS that same flow would
       receive on an unloaded network
  – Guaranteed service
     • Provides firm (mathematically provable) bounds on
       end-to-end packet-queuing delays
QoS Requirements per IETF

• IETF differentiated services working group
  specifications
  – RFC 2475
  – IP packets can be marked with a differentiated
    services codepoint (DSCP) to influence
    queuing and packet-dropping decisions for IP
    datagrams on an output interface of a router
Summary

• Continue to use a systematic, top-down
  approach
• Don’t select products until you understand
  network traffic in terms of:
  –   Flow
  –   Load
  –   Behavior
  –   QoS requirements
Review Questions
• List and describe six different types of traffic flows.
• What makes traffic flow in voice over IP networks
  challenging to characterize and plan for?
• Why should you be concerned about broadcast
  traffic?
• How do ATM and IETF specifications for QoS
  differ?

More Related Content

What's hot

Chapter04 Implementing And Managing Group And Computer Accounts
Chapter04      Implementing And  Managing  Group And  Computer  AccountsChapter04      Implementing And  Managing  Group And  Computer  Accounts
Chapter04 Implementing And Managing Group And Computer Accounts
Raja Waseem Akhtar
 

What's hot (20)

Network topologies
Network topologiesNetwork topologies
Network topologies
 
Computer Network Complete Introduction
Computer Network Complete IntroductionComputer Network Complete Introduction
Computer Network Complete Introduction
 
Difference between cellular and adhoc networks
Difference between cellular and adhoc networksDifference between cellular and adhoc networks
Difference between cellular and adhoc networks
 
Presentation on topology
Presentation on topologyPresentation on topology
Presentation on topology
 
Chapter11
Chapter11Chapter11
Chapter11
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
Introduction to tcp ip linux networking
Introduction to tcp ip   linux networkingIntroduction to tcp ip   linux networking
Introduction to tcp ip linux networking
 
Application layer
Application layerApplication layer
Application layer
 
Chapter07
Chapter07Chapter07
Chapter07
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Computer network
Computer networkComputer network
Computer network
 
Chapter04 Implementing And Managing Group And Computer Accounts
Chapter04      Implementing And  Managing  Group And  Computer  AccountsChapter04      Implementing And  Managing  Group And  Computer  Accounts
Chapter04 Implementing And Managing Group And Computer Accounts
 
Apache web server
Apache web serverApache web server
Apache web server
 
Hbase
HbaseHbase
Hbase
 

Similar to Chapter04

Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
Piero Fraternali
 
Delivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demandDelivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demand
Amazon Web Services
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)
Nitesh Singh
 
Zigbee intro v5
Zigbee intro v5Zigbee intro v5
Zigbee intro v5
rajrayala
 
7.) convergence (w automation)
7.) convergence (w automation)7.) convergence (w automation)
7.) convergence (w automation)
Jeff Green
 
Hp aspera-big data cloud-v2
Hp aspera-big data cloud-v2Hp aspera-big data cloud-v2
Hp aspera-big data cloud-v2
dkumiaspera
 

Similar to Chapter04 (20)

Chapter03
Chapter03Chapter03
Chapter03
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Chapter04
Chapter04Chapter04
Chapter04
 
Delivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demandDelivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demand
 
Web Services for the Internet of Things
Web Services for the Internet of ThingsWeb Services for the Internet of Things
Web Services for the Internet of Things
 
New tcp-ip model
New tcp-ip modelNew tcp-ip model
New tcp-ip model
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)
 
Zigbee intro v5
Zigbee intro v5Zigbee intro v5
Zigbee intro v5
 
7.) convergence (w automation)
7.) convergence (w automation)7.) convergence (w automation)
7.) convergence (w automation)
 
Continuum pcap-oem
Continuum pcap-oemContinuum pcap-oem
Continuum pcap-oem
 
NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP)
NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP) NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP)
NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP)
 
Networking - TCP/IP stack introduction and IPv6
Networking - TCP/IP stack introduction and IPv6Networking - TCP/IP stack introduction and IPv6
Networking - TCP/IP stack introduction and IPv6
 
To Infiniband and Beyond
To Infiniband and BeyondTo Infiniband and Beyond
To Infiniband and Beyond
 
goldman11.ppt
goldman11.pptgoldman11.ppt
goldman11.ppt
 
goldman11.ppt
goldman11.pptgoldman11.ppt
goldman11.ppt
 
Chapter4 Network
Chapter4 NetworkChapter4 Network
Chapter4 Network
 
Hp aspera-big data cloud-v2
Hp aspera-big data cloud-v2Hp aspera-big data cloud-v2
Hp aspera-big data cloud-v2
 
Keystone - ApacheCon 2016
Keystone - ApacheCon 2016Keystone - ApacheCon 2016
Keystone - ApacheCon 2016
 
Platforms for Accelerating the Software Defined and Virtual Infrastructure
Platforms for Accelerating the Software Defined and Virtual InfrastructurePlatforms for Accelerating the Software Defined and Virtual Infrastructure
Platforms for Accelerating the Software Defined and Virtual Infrastructure
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.com
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Chapter04

  • 1. Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer
  • 2. Network Traffic Factors • Traffic flow • Location of traffic sources and data stores • Traffic load • Traffic behavior • Quality of Service (QoS) requirements
  • 3. User Communities User Size of Location(s) of Application(s) Community Community Community Used by Name (Number of Community Users)
  • 4. Data Stores Data Store Location Application(s) Used by User Community(or Communities)
  • 5. Traffic Flow Destination 1 Destination 2 Destination 3 Destination MB/sec MB/sec MB/sec MB/sec Source 1 Source 2 Source 3 Source n
  • 6. Library and Computing Center Traffic Flow 30 Library Patrons (PCs) 10-Mbps Metro Example 30 Macs and 60 PCs in Computing Center Ethernet to Internet Server Farm App 1 108 Kbps App 2 20 Kbps App 2 60 Kbps App 3 96 Kbps App 3 192 Kbps App 4 24 Kbps App 4 48 Kbps App 9 80 Kbps App 7 400 Kbps Total 220 Kbps Total 808 Kbps 50 PCs 25 Macs 50 PCs Administration Arts and App 1 30 Kbps Humanities App 2 20 Kbps App 1 48 Kbps App 3 60 Kbps App 2 32 Kbps App 4 16 Kbps App 3 96 Kbps Total 126 Kbps App 4 24 Kbps App 5 300 Kbps Math and App 6 200 Kbps App 8 1200 Kbps Sciences 30 PCs Total 1900 Kbps 50 PCs Business and Social Sciences
  • 7. Types of Traffic Flow • Terminal/host • Client/server • Thin client • Peer-to-peer • Server/server • Distributed computing
  • 8. Traffic Flow for Voice over IP • The flow associated with transmitting the audio voice is separate from the flows associated with call setup and teardown. – The flow for transmitting the digital voice is essentially peer-to-peer. – Call setup and teardown is a client/server flow • A phone needs to talk to a server or phone switch that understands phone numbers, IP addresses, capabilities negotiation, and so on.
  • 9. Network Applications Traffic Characteristics Name of Type of Protocol(s) User Data Stores Approximate QoS Application Traffic Used by Communities (Servers, Hosts, Bandwidth Requirements Flow Application That Use the and so on) Requirements Application
  • 10. Traffic Load • To calculate whether capacity is sufficient, you should know: – The number of stations – The average time that a station is idle between sending frames – The time required to transmit a message once medium access is gained • That level of detailed information can be hard to gather, however
  • 11. Size of Objects on Networks • Terminal screen: 4 Kbytes • Simple e-mail: 10 Kbytes • Simple web page: 50 Kbytes • High-quality image: 50,000 Kbytes • Database backup: 1,000,000 Kbytes or more
  • 12. Traffic Behavior • Broadcasts – All ones data-link layer destination address • FF: FF: FF: FF: FF: FF – Doesn’t necessarily use huge amounts of bandwidth – But does disturb every CPU in the broadcast domain • Multicasts – First bit sent is a one • 01:00:0C:CC:CC:CC (Cisco Discovery Protocol) – Should just disturb NICs that have registered to receive it – Requires multicast routing protocol on internetworks
  • 13. Network Efficiency • Frame size • Protocol interaction • Windowing and flow control • Error-recovery mechanisms
  • 14. QoS Requirements • ATM service specifications – Constant bit rate (CBR) – Realtime variable bit rate (rt-VBR) – Non-realtime variable bit rate (nrt-VBR) – Unspecified bit rate (UBR) – Available bit rate (ABR) – Guaranteed frame rate (GFR)
  • 15. QoS Requirements per IETF • IETF integrated services working group specifications – Controlled load service • Provides client data flow with a QoS closely approximating the QoS that same flow would receive on an unloaded network – Guaranteed service • Provides firm (mathematically provable) bounds on end-to-end packet-queuing delays
  • 16. QoS Requirements per IETF • IETF differentiated services working group specifications – RFC 2475 – IP packets can be marked with a differentiated services codepoint (DSCP) to influence queuing and packet-dropping decisions for IP datagrams on an output interface of a router
  • 17. Summary • Continue to use a systematic, top-down approach • Don’t select products until you understand network traffic in terms of: – Flow – Load – Behavior – QoS requirements
  • 18. Review Questions • List and describe six different types of traffic flows. • What makes traffic flow in voice over IP networks challenging to characterize and plan for? • Why should you be concerned about broadcast traffic? • How do ATM and IETF specifications for QoS differ?