SlideShare una empresa de Scribd logo
1 de 25
CP7101-Design and Management
of Computer Networks
Dr.G.Geetha
Professor /CSE
Jerusalem College of Engineering
Flow Analysis
learn how to identify and
characterize traffic flows
Flows
• Flows (also known as traffic flows or data flows) are
sets of network traffic (application, protocol, and
control information) that have common attributes,
such as source/destination address, type of
information, directionality, or other end-to-end
information.
Figure 4.1
Flow Characteristics
• Performance Requirements
• Capacity (e.g., Bandwidth)
• Delay (e.g., Latency)
• Reliability (e.g., Availability)
• Quality of Service Levels
• Importance/ Priority Levels
• Business/Enterprise/Provider
• Political
• Other
• Directionality
• Common Sets of Users, Applications, Devices
• Scheduling (e.g., Time-of-Day)
• Protocols Used
• Addresses/Ports
• Security/Privacy Requirements
FIGURE 4.2, FIGURE 4.3
Two types of flows
• Individual
An individual flow is the flow for a single session of
an application
• Composite
A composite flow is a combination of requirements
from multiple applications, or of individual flows,
that share a common link, path, or network
Individual flow
• An individual flow is the basic unit of traffic flows
• When an individual flow has guaranteed requirements,
those requirements are usually left with the individual
flow and are not consolidated with other requirements
or flows into a composite flow
• Individual flows are derived directly from the
requirements specification, or are estimated from our
best knowledge about the application, users, devices,
and their locations.
FIGURE 4.4
• Most flows in a network are composites Figure 4.5
Presentation of Flows
upstream- downstream
• Upstream indicates the direction toward the
source and downstream is the direction
toward the destination.
• Upstream is often toward the core of the
network, while downstream is often toward
the edge of the network, particularly in
service provider networks
FIGURE 4.6
Critical Flows
• Critical flows can be considered more
important than others, in that they are higher
in performance or have strict requirements
(e.g., Mission-critical, rate-critical, real time,
interactive, high-performance).
• Critical flows may serve more important users,
their applications, and devices
Identifying and Developing Flows
• Identified and developed from information in
the requirements specification:
• User, application, device, and network
requirements
• User and application behavior (usage patterns,
models)
• User, application, and device location
information
• Performance requirements.
Identifying and Developing Flows
• Flows are determined based on the requirements
and locations of the applications and devices that
generate (source) or terminate (sink) each traffic
flow.
Process for identifying and developing
flows
1. Identifying one or more applications and/or
devices that you believe will generate and/or
terminate traffic flows
2. Use their requirements from the requirements
specification and their locations from the
requirements map
3. Based on how and where each application and
device is used, you may be able to determine
which devices generate flows and which devices
terminate flows (flow sources and sinks)
FIGURE 4.7
Flows: Application Perspective
1. Focusing on a particular application, application
group, device, or function(e.g., videoconferencing
or storage)
2. Developing a “profile” of common or selected
applications that can be applied across a user
population
3. Choosing the top N (e.g., 3, 5, 10, etc.) applications
to be applied across the entire network
1.Focusing on a Particular Application
Example: Data Migration
From requirements specification, for a single session of each
application:
• Application 1: Staging data from user devices
Capacity 100Kb/s; Delay Unknown; Reliability 100%
• Application 1: Migrating data between servers
Capacity 500Kb/s; Delay Unknown; Reliability 100%
• Application 2: Migration to remote (tertiary) storage
Capacity 10Mb/s; Delay N/A; Reliability 100%
FIGURE 4.8- 4.12
2.Developing a Profile
• Profile or template can be developed for set of
common applications apply to a group of
users or to the entire set of users
• Each flow that fits the profile is identified with
that profile’s tag
• Saving time and effort
3.Choosing the Top N Applications
• a combination of the first two approaches
Example: Top 5 Applications
1. Web Browsing
2. Email
3. File Transfer
4. Word Processing
5. Database Transactions
FIGURE 4.14
Data Sources and Sinks
• A data source generates a traffic flow, and a
data sink terminates a traffic flow
• Help provide directionality to flows
• Data sources are represented as a circle
with a dot in the center, and a data sink is
represented as a circle with a cross (i.e., star
or asterisk) in the center.
FIGURE 4.15 - 4.18
Flow Models
• Method to help describe flows in the network
• Flow models are groups of flows that exhibit
specific, consistent behavior characteristic
• Flow model apply to a single application.
• Directionality, hierarchy, and diversity are the
primary characteristics of flow models
• Directionality describes the preference to
have more requirements in one direction than
another.
Flow models
1. Peer-to-peer
2. Client–server
3. Hierarchical client–server
4. Distributed computing
Peer-to-Peer
• Peer-to-peer, is one where the users and
applications are fairly consistent in their flow
behaviors throughout the network
• They act at the same level in the hierarchy
• This has two important implications:
• cannot distinguish between flows in this model.
Therefore, either all of the flows or none of the
flows is critical
• Since the flows are equivalent, they can be
described by a single specification(e.g., Profile)
Client–Server
Flow Prioritization
• The purpose for prioritizing flows is to
determine which flows get the most resources
or which flows get resources first.
• primary resource is funding.
FIGURE 4.33-4.35
The Flow Specification
• results of identifying, defining, and describing
flows are combined into a flow specification,
or flowspec .
• Flow specifications can take one of three
types:
1. One-part, or unitary;
2. Two-part;
3. Multi-part.
Flowspec
• A one-part flowspec
– Describes flows that have only best-effort
requirements.
• A two-part flowspec
– Describes flows that have predictable requirements
and may include flows that have best-effort
requirements.
• A multipart flowspec
– Describes flows that have guaranteed requirements
and may include flows that have predictable and/or
best-effort requirements
Flowspec Algorithm
• Flowspecs are used to combine performance
requirements of multiple applications for a
composite flow or multiple flows in a section of a
path
• The flowspec algorithm is a mechanism to
combine these performance requirements
(e.g.,capacity, delay, and RMA) for flows in such a
way as to describe the optimal composite
erformance for that flow or group of flows.
• The flowspec algorithm applies the following rules:
1.Best-effort flows consist only of capacity requirements,
so only capacities are used in best-effort Calculations.
2.For flows with predictable requirements, we will use all
available performance requirements (Capacity, delay,
and RMA) in the calculations. Performance
requirements will be combined for Each characteristic
to maximize the overall performance of each flow
3.For flows with guaranteed requirements, we will list
each requirement (as an individual flow), not
Combining them with other requirements.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
Service-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA)Service-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA)
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
 
CCNA 4 Hierarchical Network Design
CCNA 4 Hierarchical Network DesignCCNA 4 Hierarchical Network Design
CCNA 4 Hierarchical Network Design
 
Tcp/ip model and protocol
Tcp/ip model and protocolTcp/ip model and protocol
Tcp/ip model and protocol
 
Object Oriented Design
Object Oriented DesignObject Oriented Design
Object Oriented Design
 
OSI Model
OSI ModelOSI Model
OSI Model
 
client server architecture
client server architecture client server architecture
client server architecture
 
Introduction to SOA
Introduction to SOAIntroduction to SOA
Introduction to SOA
 
Topic : X.25, Frame relay and ATM
Topic :  X.25, Frame relay and ATMTopic :  X.25, Frame relay and ATM
Topic : X.25, Frame relay and ATM
 
Object Oriented Dbms
Object Oriented DbmsObject Oriented Dbms
Object Oriented Dbms
 
Application layer
Application layerApplication layer
Application layer
 
Data dictionary
Data dictionaryData dictionary
Data dictionary
 
Access Control List & its Types
Access Control List & its TypesAccess Control List & its Types
Access Control List & its Types
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoT
 
FAST ETHERNET
FAST ETHERNET FAST ETHERNET
FAST ETHERNET
 
TCP Model
TCP ModelTCP Model
TCP Model
 
Packets never lie: An in-depth overview of 802.11 frames
Packets never lie: An in-depth overview of 802.11 framesPackets never lie: An in-depth overview of 802.11 frames
Packets never lie: An in-depth overview of 802.11 frames
 

Destacado

Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisDr Geetha Mohan
 
Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2 Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2 Dr Geetha Mohan
 
Microprocessors-based systems (under graduate course) Lecture 5 of 9
Microprocessors-based systems (under graduate course) Lecture 5 of 9 Microprocessors-based systems (under graduate course) Lecture 5 of 9
Microprocessors-based systems (under graduate course) Lecture 5 of 9 Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 9 of 9
Microprocessors-based systems (under graduate course) Lecture 9 of 9 Microprocessors-based systems (under graduate course) Lecture 9 of 9
Microprocessors-based systems (under graduate course) Lecture 9 of 9 Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 7 of 9
Microprocessors-based systems (under graduate course) Lecture 7 of 9 Microprocessors-based systems (under graduate course) Lecture 7 of 9
Microprocessors-based systems (under graduate course) Lecture 7 of 9 Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 8 of 9
Microprocessors-based systems (under graduate course) Lecture 8 of 9 Microprocessors-based systems (under graduate course) Lecture 8 of 9
Microprocessors-based systems (under graduate course) Lecture 8 of 9 Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 4 of 9
Microprocessors-based systems (under graduate course) Lecture 4 of 9 Microprocessors-based systems (under graduate course) Lecture 4 of 9
Microprocessors-based systems (under graduate course) Lecture 4 of 9 Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 2 of 9
Microprocessors-based systems (under graduate course) Lecture 2 of 9 Microprocessors-based systems (under graduate course) Lecture 2 of 9
Microprocessors-based systems (under graduate course) Lecture 2 of 9 Randa Elanwar
 
Cp7101 design and management of computer networks-design concepts
Cp7101 design and management of computer networks-design conceptsCp7101 design and management of computer networks-design concepts
Cp7101 design and management of computer networks-design conceptsDr Geetha Mohan
 
Microprocessors-based systems (under graduate course) Lecture 6 of 9
Microprocessors-based systems (under graduate course) Lecture 6 of 9 Microprocessors-based systems (under graduate course) Lecture 6 of 9
Microprocessors-based systems (under graduate course) Lecture 6 of 9 Randa Elanwar
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkDr Geetha Mohan
 
Microprocessors-based systems (under graduate course) Lecture 3 of 9
Microprocessors-based systems (under graduate course) Lecture 3 of 9 Microprocessors-based systems (under graduate course) Lecture 3 of 9
Microprocessors-based systems (under graduate course) Lecture 3 of 9 Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 1 of 9
Microprocessors-based systems (under graduate course) Lecture 1 of 9 Microprocessors-based systems (under graduate course) Lecture 1 of 9
Microprocessors-based systems (under graduate course) Lecture 1 of 9 Randa Elanwar
 
1327 Addressing Modes Of 8086
1327 Addressing Modes Of 80861327 Addressing Modes Of 8086
1327 Addressing Modes Of 8086techbed
 
8086 microprocessor instruction set by Er. Swapnil Kaware
8086 microprocessor instruction set by Er. Swapnil Kaware8086 microprocessor instruction set by Er. Swapnil Kaware
8086 microprocessor instruction set by Er. Swapnil KawareProf. Swapnil V. Kaware
 
Lead Generation on SlideShare: A How-to Guide
Lead Generation on SlideShare: A How-to GuideLead Generation on SlideShare: A How-to Guide
Lead Generation on SlideShare: A How-to GuideSlideShare
 

Destacado (16)

Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysis
 
Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2 Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2
 
Microprocessors-based systems (under graduate course) Lecture 5 of 9
Microprocessors-based systems (under graduate course) Lecture 5 of 9 Microprocessors-based systems (under graduate course) Lecture 5 of 9
Microprocessors-based systems (under graduate course) Lecture 5 of 9
 
Microprocessors-based systems (under graduate course) Lecture 9 of 9
Microprocessors-based systems (under graduate course) Lecture 9 of 9 Microprocessors-based systems (under graduate course) Lecture 9 of 9
Microprocessors-based systems (under graduate course) Lecture 9 of 9
 
Microprocessors-based systems (under graduate course) Lecture 7 of 9
Microprocessors-based systems (under graduate course) Lecture 7 of 9 Microprocessors-based systems (under graduate course) Lecture 7 of 9
Microprocessors-based systems (under graduate course) Lecture 7 of 9
 
Microprocessors-based systems (under graduate course) Lecture 8 of 9
Microprocessors-based systems (under graduate course) Lecture 8 of 9 Microprocessors-based systems (under graduate course) Lecture 8 of 9
Microprocessors-based systems (under graduate course) Lecture 8 of 9
 
Microprocessors-based systems (under graduate course) Lecture 4 of 9
Microprocessors-based systems (under graduate course) Lecture 4 of 9 Microprocessors-based systems (under graduate course) Lecture 4 of 9
Microprocessors-based systems (under graduate course) Lecture 4 of 9
 
Microprocessors-based systems (under graduate course) Lecture 2 of 9
Microprocessors-based systems (under graduate course) Lecture 2 of 9 Microprocessors-based systems (under graduate course) Lecture 2 of 9
Microprocessors-based systems (under graduate course) Lecture 2 of 9
 
Cp7101 design and management of computer networks-design concepts
Cp7101 design and management of computer networks-design conceptsCp7101 design and management of computer networks-design concepts
Cp7101 design and management of computer networks-design concepts
 
Microprocessors-based systems (under graduate course) Lecture 6 of 9
Microprocessors-based systems (under graduate course) Lecture 6 of 9 Microprocessors-based systems (under graduate course) Lecture 6 of 9
Microprocessors-based systems (under graduate course) Lecture 6 of 9
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
 
Microprocessors-based systems (under graduate course) Lecture 3 of 9
Microprocessors-based systems (under graduate course) Lecture 3 of 9 Microprocessors-based systems (under graduate course) Lecture 3 of 9
Microprocessors-based systems (under graduate course) Lecture 3 of 9
 
Microprocessors-based systems (under graduate course) Lecture 1 of 9
Microprocessors-based systems (under graduate course) Lecture 1 of 9 Microprocessors-based systems (under graduate course) Lecture 1 of 9
Microprocessors-based systems (under graduate course) Lecture 1 of 9
 
1327 Addressing Modes Of 8086
1327 Addressing Modes Of 80861327 Addressing Modes Of 8086
1327 Addressing Modes Of 8086
 
8086 microprocessor instruction set by Er. Swapnil Kaware
8086 microprocessor instruction set by Er. Swapnil Kaware8086 microprocessor instruction set by Er. Swapnil Kaware
8086 microprocessor instruction set by Er. Swapnil Kaware
 
Lead Generation on SlideShare: A How-to Guide
Lead Generation on SlideShare: A How-to GuideLead Generation on SlideShare: A How-to Guide
Lead Generation on SlideShare: A How-to Guide
 

Similar a Cp7101 design and management of computer networks-flow analysis

network design 5.pptx
network design 5.pptxnetwork design 5.pptx
network design 5.pptxaida alsamawi
 
Flow analysis overview
Flow analysis overviewFlow analysis overview
Flow analysis overviewcsk selva
 
Identifying and developing flows modified
Identifying and developing flows modifiedIdentifying and developing flows modified
Identifying and developing flows modifiedcsk selva
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaSDr. Shivashankar
 
network design 6.pptx
network design 6.pptxnetwork design 6.pptx
network design 6.pptxaida alsamawi
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementscsk selva
 
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURESOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTUREAnyaForger34
 
Software requirement engineering
Software requirement engineeringSoftware requirement engineering
Software requirement engineeringSyed Zaid Irshad
 
Data Streaming For Big Data
Data Streaming For Big DataData Streaming For Big Data
Data Streaming For Big DataSeval Çapraz
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysiscsk selva
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architecturescsk selva
 
architectural design
 architectural design architectural design
architectural designPreeti Mishra
 
Diksha sda presentation
Diksha sda presentationDiksha sda presentation
Diksha sda presentationdikshagupta111
 
Architectural patterns part 1
Architectural patterns part 1Architectural patterns part 1
Architectural patterns part 1assinha
 
Building Continuously Curated Ingestion Pipelines
Building Continuously Curated Ingestion PipelinesBuilding Continuously Curated Ingestion Pipelines
Building Continuously Curated Ingestion PipelinesArvind Prabhakar
 
A Deep Dive into RESTful API Design Part 1
A Deep Dive into RESTful API Design Part 1A Deep Dive into RESTful API Design Part 1
A Deep Dive into RESTful API Design Part 1VivekKrishna34
 
A sdn based application aware and network provisioning
A sdn based application aware and network provisioningA sdn based application aware and network provisioning
A sdn based application aware and network provisioningStanley Wang
 

Similar a Cp7101 design and management of computer networks-flow analysis (20)

network design 5.pptx
network design 5.pptxnetwork design 5.pptx
network design 5.pptx
 
Unit iii for PG PAWSN
Unit iii for PG PAWSNUnit iii for PG PAWSN
Unit iii for PG PAWSN
 
Flow analysis overview
Flow analysis overviewFlow analysis overview
Flow analysis overview
 
Identifying and developing flows modified
Identifying and developing flows modifiedIdentifying and developing flows modified
Identifying and developing flows modified
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
 
network design 6.pptx
network design 6.pptxnetwork design 6.pptx
network design 6.pptx
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
 
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURESOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
 
Software requirement engineering
Software requirement engineeringSoftware requirement engineering
Software requirement engineering
 
Data Streaming For Big Data
Data Streaming For Big DataData Streaming For Big Data
Data Streaming For Big Data
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architectures
 
architectural design
 architectural design architectural design
architectural design
 
Diksha sda presentation
Diksha sda presentationDiksha sda presentation
Diksha sda presentation
 
MODULE-5_CCN.pptx
MODULE-5_CCN.pptxMODULE-5_CCN.pptx
MODULE-5_CCN.pptx
 
Architectural patterns part 1
Architectural patterns part 1Architectural patterns part 1
Architectural patterns part 1
 
Building Continuously Curated Ingestion Pipelines
Building Continuously Curated Ingestion PipelinesBuilding Continuously Curated Ingestion Pipelines
Building Continuously Curated Ingestion Pipelines
 
A Deep Dive into RESTful API Design Part 1
A Deep Dive into RESTful API Design Part 1A Deep Dive into RESTful API Design Part 1
A Deep Dive into RESTful API Design Part 1
 
Soft requirement
Soft requirementSoft requirement
Soft requirement
 
A sdn based application aware and network provisioning
A sdn based application aware and network provisioningA sdn based application aware and network provisioning
A sdn based application aware and network provisioning
 

Más de Dr Geetha Mohan

INTRODUCTION TO BIG DATA AND HADOOP
INTRODUCTION TO BIG DATA AND HADOOPINTRODUCTION TO BIG DATA AND HADOOP
INTRODUCTION TO BIG DATA AND HADOOPDr Geetha Mohan
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxDr Geetha Mohan
 
CLOUD ENABLING TECHNOLOGIES.pptx
 CLOUD ENABLING TECHNOLOGIES.pptx CLOUD ENABLING TECHNOLOGIES.pptx
CLOUD ENABLING TECHNOLOGIES.pptxDr Geetha Mohan
 
IPR in Academic Research:Dr G Geetha
IPR in Academic Research:Dr G GeethaIPR in Academic Research:Dr G Geetha
IPR in Academic Research:Dr G GeethaDr Geetha Mohan
 
Design and analysis of algorithms
Design and analysis of algorithmsDesign and analysis of algorithms
Design and analysis of algorithmsDr Geetha Mohan
 
Resource management techniques
Resource management techniquesResource management techniques
Resource management techniquesDr Geetha Mohan
 
Ge6075 professional ethics in engineering unit 1
Ge6075 professional ethics in engineering  unit 1Ge6075 professional ethics in engineering  unit 1
Ge6075 professional ethics in engineering unit 1Dr Geetha Mohan
 

Más de Dr Geetha Mohan (9)

INTRODUCTION TO BIG DATA AND HADOOP
INTRODUCTION TO BIG DATA AND HADOOPINTRODUCTION TO BIG DATA AND HADOOP
INTRODUCTION TO BIG DATA AND HADOOP
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptx
 
CLOUD ENABLING TECHNOLOGIES.pptx
 CLOUD ENABLING TECHNOLOGIES.pptx CLOUD ENABLING TECHNOLOGIES.pptx
CLOUD ENABLING TECHNOLOGIES.pptx
 
IPR in Academic Research:Dr G Geetha
IPR in Academic Research:Dr G GeethaIPR in Academic Research:Dr G Geetha
IPR in Academic Research:Dr G Geetha
 
How to file a patent
How to file a patentHow to file a patent
How to file a patent
 
Design and analysis of algorithms
Design and analysis of algorithmsDesign and analysis of algorithms
Design and analysis of algorithms
 
Machine learning
Machine learningMachine learning
Machine learning
 
Resource management techniques
Resource management techniquesResource management techniques
Resource management techniques
 
Ge6075 professional ethics in engineering unit 1
Ge6075 professional ethics in engineering  unit 1Ge6075 professional ethics in engineering  unit 1
Ge6075 professional ethics in engineering unit 1
 

Último

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Último (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

Cp7101 design and management of computer networks-flow analysis

  • 1. CP7101-Design and Management of Computer Networks Dr.G.Geetha Professor /CSE Jerusalem College of Engineering
  • 2. Flow Analysis learn how to identify and characterize traffic flows
  • 3. Flows • Flows (also known as traffic flows or data flows) are sets of network traffic (application, protocol, and control information) that have common attributes, such as source/destination address, type of information, directionality, or other end-to-end information. Figure 4.1
  • 4. Flow Characteristics • Performance Requirements • Capacity (e.g., Bandwidth) • Delay (e.g., Latency) • Reliability (e.g., Availability) • Quality of Service Levels • Importance/ Priority Levels • Business/Enterprise/Provider • Political • Other • Directionality • Common Sets of Users, Applications, Devices • Scheduling (e.g., Time-of-Day) • Protocols Used • Addresses/Ports • Security/Privacy Requirements FIGURE 4.2, FIGURE 4.3
  • 5. Two types of flows • Individual An individual flow is the flow for a single session of an application • Composite A composite flow is a combination of requirements from multiple applications, or of individual flows, that share a common link, path, or network
  • 6. Individual flow • An individual flow is the basic unit of traffic flows • When an individual flow has guaranteed requirements, those requirements are usually left with the individual flow and are not consolidated with other requirements or flows into a composite flow • Individual flows are derived directly from the requirements specification, or are estimated from our best knowledge about the application, users, devices, and their locations. FIGURE 4.4 • Most flows in a network are composites Figure 4.5
  • 7. Presentation of Flows upstream- downstream • Upstream indicates the direction toward the source and downstream is the direction toward the destination. • Upstream is often toward the core of the network, while downstream is often toward the edge of the network, particularly in service provider networks FIGURE 4.6
  • 8. Critical Flows • Critical flows can be considered more important than others, in that they are higher in performance or have strict requirements (e.g., Mission-critical, rate-critical, real time, interactive, high-performance). • Critical flows may serve more important users, their applications, and devices
  • 9. Identifying and Developing Flows • Identified and developed from information in the requirements specification: • User, application, device, and network requirements • User and application behavior (usage patterns, models) • User, application, and device location information • Performance requirements.
  • 10. Identifying and Developing Flows • Flows are determined based on the requirements and locations of the applications and devices that generate (source) or terminate (sink) each traffic flow.
  • 11. Process for identifying and developing flows 1. Identifying one or more applications and/or devices that you believe will generate and/or terminate traffic flows 2. Use their requirements from the requirements specification and their locations from the requirements map 3. Based on how and where each application and device is used, you may be able to determine which devices generate flows and which devices terminate flows (flow sources and sinks) FIGURE 4.7
  • 12. Flows: Application Perspective 1. Focusing on a particular application, application group, device, or function(e.g., videoconferencing or storage) 2. Developing a “profile” of common or selected applications that can be applied across a user population 3. Choosing the top N (e.g., 3, 5, 10, etc.) applications to be applied across the entire network
  • 13. 1.Focusing on a Particular Application Example: Data Migration From requirements specification, for a single session of each application: • Application 1: Staging data from user devices Capacity 100Kb/s; Delay Unknown; Reliability 100% • Application 1: Migrating data between servers Capacity 500Kb/s; Delay Unknown; Reliability 100% • Application 2: Migration to remote (tertiary) storage Capacity 10Mb/s; Delay N/A; Reliability 100% FIGURE 4.8- 4.12
  • 14. 2.Developing a Profile • Profile or template can be developed for set of common applications apply to a group of users or to the entire set of users • Each flow that fits the profile is identified with that profile’s tag • Saving time and effort
  • 15. 3.Choosing the Top N Applications • a combination of the first two approaches Example: Top 5 Applications 1. Web Browsing 2. Email 3. File Transfer 4. Word Processing 5. Database Transactions FIGURE 4.14
  • 16. Data Sources and Sinks • A data source generates a traffic flow, and a data sink terminates a traffic flow • Help provide directionality to flows • Data sources are represented as a circle with a dot in the center, and a data sink is represented as a circle with a cross (i.e., star or asterisk) in the center. FIGURE 4.15 - 4.18
  • 17. Flow Models • Method to help describe flows in the network • Flow models are groups of flows that exhibit specific, consistent behavior characteristic • Flow model apply to a single application. • Directionality, hierarchy, and diversity are the primary characteristics of flow models • Directionality describes the preference to have more requirements in one direction than another.
  • 18. Flow models 1. Peer-to-peer 2. Client–server 3. Hierarchical client–server 4. Distributed computing
  • 19. Peer-to-Peer • Peer-to-peer, is one where the users and applications are fairly consistent in their flow behaviors throughout the network • They act at the same level in the hierarchy • This has two important implications: • cannot distinguish between flows in this model. Therefore, either all of the flows or none of the flows is critical • Since the flows are equivalent, they can be described by a single specification(e.g., Profile)
  • 21. Flow Prioritization • The purpose for prioritizing flows is to determine which flows get the most resources or which flows get resources first. • primary resource is funding. FIGURE 4.33-4.35
  • 22. The Flow Specification • results of identifying, defining, and describing flows are combined into a flow specification, or flowspec . • Flow specifications can take one of three types: 1. One-part, or unitary; 2. Two-part; 3. Multi-part.
  • 23. Flowspec • A one-part flowspec – Describes flows that have only best-effort requirements. • A two-part flowspec – Describes flows that have predictable requirements and may include flows that have best-effort requirements. • A multipart flowspec – Describes flows that have guaranteed requirements and may include flows that have predictable and/or best-effort requirements
  • 24. Flowspec Algorithm • Flowspecs are used to combine performance requirements of multiple applications for a composite flow or multiple flows in a section of a path • The flowspec algorithm is a mechanism to combine these performance requirements (e.g.,capacity, delay, and RMA) for flows in such a way as to describe the optimal composite erformance for that flow or group of flows.
  • 25. • The flowspec algorithm applies the following rules: 1.Best-effort flows consist only of capacity requirements, so only capacities are used in best-effort Calculations. 2.For flows with predictable requirements, we will use all available performance requirements (Capacity, delay, and RMA) in the calculations. Performance requirements will be combined for Each characteristic to maximize the overall performance of each flow 3.For flows with guaranteed requirements, we will list each requirement (as an individual flow), not Combining them with other requirements.