SlideShare una empresa de Scribd logo
1 de 30
Copyright 2010 Cisco Press & Priscilla Oppenheimer
1
 Data source: area in a network where application layer data resides.
2
 Traffic flow
 Location of traffic sources and data stores
 Traffic load
 Traffic behavior
 Quality of Service (QoS) requirements
3
 Characterize the behavior of existing networks.
 Plan for network development and expansion.
 Quantify network performance.
 Verify the quality of network service.
 ■ Ascribe network usage to users and applications.
 to measure the number of megabytes per second (MBps) between communicating
entities. To characterize the size, of a flow, use a protocol analyzer or network
management system
4
User
Community
Name
Size of
Community
(Number of
Users)
Location(s) of
Community
Application(s)
Used by
Community
5
Data Store Location Application(s) Used by User
Community(or
Communities)
6
Destination 1 Destination 2 Destination 3 Destination MB/sec MB/sec
MB/sec MB/sec
Source 1
Source 2
Source 3
Source n
7
Administration
Business and
Social Sciences
Math and
Sciences
50 PCs 25 Macs
50 PCs
50 PCs30 PCs
30 Library Patrons (PCs)
30 Macs and 60 PCs in
Computing Center
Library and Computing Center
App 1 108 Kbps
App 2 60 Kbps
App 3 192 Kbps
App 4 48 Kbps
App 7 400 Kbps
Total 808 Kbps
App 1 48 Kbps
App 2 32 Kbps
App 3 96 Kbps
App 4 24 Kbps
App 5 300 Kbps
App 6 200 Kbps
App 8 1200 Kbps
Total 1900 Kbps
App 1 30 Kbps
App 2 20 Kbps
App 3 60 Kbps
App 4 16 Kbps
Total 126 Kbps
App 2 20 Kbps
App 3 96 Kbps
App 4 24 Kbps
App 9 80 Kbps
Total 220 Kbps
Arts and
Humanities
Server Farm
10-Mbps Metro
Ethernet to Internet
8
 Terminal/host: Terminal/host traffic is usually asymmetric. The terminal sends a
few characters and the host sends many characters. Telnet is an example of an
application that generates terminal/host traffic.
 Client/server
 Thin client
 Peer-to-peer
 Server/server
 Distributed computing
9
The flow associated with transmitting the
audio voice is separate from the flows
associated with call setup and teardown.
 The flow for transmitting the digital voice is
essentially peer-to-peer.
 Call setup and teardown is a client/server flow
 A phone needs to talk to a server or phone switch that
understands phone numbers, IP addresses, capabilities
negotiation, and so on.
10
 The audio voice flow between two IP endpoints is carried by the Real-Time
Transport Protocol (RTP), which is a connectionless protocol that runs on top of
UDP.
 The main call setup, teardown, and control protocols in an IP network are H.323,
the Cisco Skinny Client Control Protocol (SCCP), Simple Gateway Control
Protocol (SGCP), Media Gateway Control Protocol (MGCP), and Session Initiation
Protocol (SIP).
 These signaling protocols run between an IP endpoint and a voice-enabled server
and follow the client/server paradigm.
11
 Private branch exchanges (PBX) and circuit switching, and modern VoIP
networks, which use packet switching, must handle two fundamental functions:
call control and call switching.
 Call Control: handles call setup and teardown, addressing and routing, and
informational and supplementary services.
 A fundamental job of call control is to compare the digits dialed by the user
making a call to configured number patterns to determine how to route a call.
 Call switching handles the actual switching of calls. In traditional voice networks,
when a call is placed, a PBX connects the calling phone via a so-called line-side
interface to another phone’s line-side interface.
 If the call is destined for the public switched telephone network (PSTN), the call
switching function connects the line-side interface with the trunk-side interface.
 May have different path from that used by the call control packets
12
Name of
Application
Type of
Traffic
Flow
Protocol(s)
Used by
Application
User
Communities
That Use the
Application
Data Stores
(Servers, Hosts,
and so on)
Approximate
Bandwidth
Requirements
QoS
Requirements
13
 To calculate whether capacity is sufficient, you should know:
 The number of stations
 The average time that a station is idle between sending frames
 The time required to transmit a message once medium access is
gained
 That level of detailed information can be hard to gather,
however
14
 research application-usage patterns, idle times between packets and sessions,
frame sizes, and other traffic behavioral patterns for application and system
protocols.
 Another approach to avoiding bottlenecks is simply to throw large amounts of
bandwidth at the problem (also known as overprovisioning).
15
 identify user communities, the number of users in the communities, and the
applications the users employ.
 To predict the aggregate bandwidth requirement for all users of an application
document the following information:
 The frequency of application sessions (number of sessions per day, week, month, or
whatever time period is appropriate)
 The length of an average application session
 The number of simultaneous users of an application
16
If it is not practical to research these details, you can
make some assumptions:
 The number of users of an application equals the number of
simultaneous users.
 All applications are used all the time, so that your bandwidth
calculation is a worst case (peak) estimate.
 Each user opens just one session, and that session lasts all day
until the user shuts down the application at the end of the day
17
 research the size of data objects:
 Sent by applications
 The overhead caused by protocol layers
 Any additional load caused by application initialization. (Some applications send much
more traffic during initialization than during steady-state operation.)
 hard to accurately estimate the average size of data objects that users transfer to
each other and to servers; it depends
 it’s difficult to make any generalizations about the average size of objects sent on a
network.
 which protocols an application uses
18
19
 Terminal screen: 4 Kbytes
 Simple e-mail: 10 Kbytes
 Simple web page: 50 Kbytes
 High-quality image: 50,000 Kbytes
 Database backup: 1,000,000 Kbytes or more
20
 Address Resolution Protocol (ARP)
 ■ Dynamic Host Configuration Protocol (DHCP)
 ■ Internet Control Message Protocol (ICMP), version 4 and 6
 ■ Internet Group Management Protocol (IGMP), version 4 and 6
 ■ Domain Name System (DNS)
 ■ Multicast DNS (mDNS)
 ■ NetBIOS name queries
 ■ Network Time Protocol (NTP)
 ■ Simple Service Discovery Protocol (SSDP)
 ■ Service Location Protocol (SLP)
 ■ Simple Network Management Protocol (SNMP)
21
 Router with large-distance vector routing table uses significant amount of WAN
bandwidth
 RIP
 Each route in the packet uses 20 bytes
 25 routes per packet
 Sends one or more 532-byte packets every 30 seconds depending on the size of the
routing table.
 Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing
Protocol (EIGRP), use little bandwidth.
22
 Broadcasts
 All ones data-link layer destination address
 FF: FF: FF: FF: FF: FF
 Doesn’t necessarily use huge amounts of bandwidth
 But does disturb every CPU in the broadcast domain
 Multicasts
 First bit sent is a one
 01:00:0C:CC:CC:CC (Cisco Discovery Protocol)
 Should just disturb NICs that have registered to
receive it
 Requires multicast routing protocol on internetworks
23
 Scalability problem
 Use of routers
 Use of VLANs
 Too many broadcast frames can overwhelm end stations, switches, and routers.
 broadcast radiation: to describe the effect of broadcasts spreading from the sender
to all other devices in a broadcast domain.
 Broadcast radiation can degrade performance at network endpoints
24
 Efficiency refers to whether applications and protocols use bandwidth effectively
 Frame size
 use the largest possible maximum transmission unit (MTU).
 MTU can be configured for some applications
 avoid fragmentation and reassembly of frames in IP environments; degrades
performance
 MTU discovery
 Protocol interaction
 Windowing and flow control
 Send window
 Receive window
 CPU power and memory
 Some IP-based applications run on top of UDP, not TCP; no flow control, no handling
 Ping pong protocols
 Error-recovery mechanisms
 Retransmission without ack.
 SAck
25
 ATM service specifications
 Constant bit rate (CBR)
 Realtime variable bit rate (rt-VBR)
 Non-realtime variable bit rate (nrt-VBR)
 Unspecified bit rate (UBR)
 Available bit rate (ABR)
 Guaranteed frame rate (GFR)
26
 IETF integrated services working group specifications
 Controlled load service
 Provides client data flow with a QoS closely approximating the QoS that same flow would receive
on an unloaded network
 Guaranteed service
 Provides firm (mathematically provable) bounds on end-to-end packet-queuing delays
27
 IETF differentiated services working group specifications
 RFC 2475
 IP packets can be marked with a differentiated services codepoint (DSCP) to influence
queuing and packet-dropping decisions for IP datagrams on an output interface of a
router
28
 Continue to use a systematic, top-down approach
 Don’t select products until you understand network traffic in
terms of:
 Flow
 Load
 Behavior
 QoS requirements
29
List and describe six different types of traffic
flows.
What makes traffic flow in voice over IP
networks challenging to characterize and plan
for?
Why should you be concerned about broadcast
traffic?
How do ATM and IETF specifications for QoS
differ?
30

Más contenido relacionado

La actualidad más candente

Network management
Network managementNetwork management
Network management
Mohd Arif
 

La actualidad más candente (20)

CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
Chapter02
Chapter02Chapter02
Chapter02
 
08. networking
08. networking08. networking
08. networking
 
Network management
Network managementNetwork management
Network management
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slides
 
Cloud Architecture
Cloud ArchitectureCloud Architecture
Cloud Architecture
 
07. datacenters
07. datacenters07. datacenters
07. datacenters
 
10. compute-part-1
10. compute-part-110. compute-part-1
10. compute-part-1
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
Configuring Network Clients
Configuring Network ClientsConfiguring Network Clients
Configuring Network Clients
 
Network Troubleshooting - Part 2
Network Troubleshooting - Part 2Network Troubleshooting - Part 2
Network Troubleshooting - Part 2
 
E Snet Raf Essc Jan2005
E Snet Raf Essc Jan2005E Snet Raf Essc Jan2005
E Snet Raf Essc Jan2005
 
Software Define Networking (SDN)
Software Define Networking (SDN)Software Define Networking (SDN)
Software Define Networking (SDN)
 
03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Control
 
10. compute-part-2
10. compute-part-210. compute-part-2
10. compute-part-2
 
Software defined network
Software defined network Software defined network
Software defined network
 
11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2
 

Destacado (8)

Chapter01
Chapter01Chapter01
Chapter01
 
05. performance-concepts
05. performance-concepts05. performance-concepts
05. performance-concepts
 
06. security concept
06. security concept06. security concept
06. security concept
 
09. storage-part-1
09. storage-part-109. storage-part-1
09. storage-part-1
 
Chapter14
Chapter14Chapter14
Chapter14
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1
 
Artificial Intelligence
Artificial Intelligence Artificial Intelligence
Artificial Intelligence
 

Similar a Chapter04

Protocol For Streaming Media
Protocol For Streaming MediaProtocol For Streaming Media
Protocol For Streaming Media
Kaniska Mandal
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
Angel Garcia
 
ETE405-lec9.ppt
ETE405-lec9.pptETE405-lec9.ppt
ETE405-lec9.ppt
mashiur
 

Similar a Chapter04 (20)

Protocol For Streaming Media
Protocol For Streaming MediaProtocol For Streaming Media
Protocol For Streaming Media
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principle
 
Transport layer
Transport layer Transport layer
Transport layer
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Mcse question
Mcse questionMcse question
Mcse question
 
5 maximazing networkcapacity_v4-jorge_alvarado
5 maximazing networkcapacity_v4-jorge_alvarado5 maximazing networkcapacity_v4-jorge_alvarado
5 maximazing networkcapacity_v4-jorge_alvarado
 
Packet Guide SONET/SDH
Packet Guide SONET/SDHPacket Guide SONET/SDH
Packet Guide SONET/SDH
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answers
 
NUVX Technologies general solutions
NUVX Technologies general solutionsNUVX Technologies general solutions
NUVX Technologies general solutions
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
CN Unit-1 PPT.pptx
CN Unit-1 PPT.pptxCN Unit-1 PPT.pptx
CN Unit-1 PPT.pptx
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 
CN PPT
CN PPTCN PPT
CN PPT
 
ETE405-lec9.ppt
ETE405-lec9.pptETE405-lec9.ppt
ETE405-lec9.ppt
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Chapter04

  • 1. Copyright 2010 Cisco Press & Priscilla Oppenheimer 1
  • 2.  Data source: area in a network where application layer data resides. 2
  • 3.  Traffic flow  Location of traffic sources and data stores  Traffic load  Traffic behavior  Quality of Service (QoS) requirements 3
  • 4.  Characterize the behavior of existing networks.  Plan for network development and expansion.  Quantify network performance.  Verify the quality of network service.  ■ Ascribe network usage to users and applications.  to measure the number of megabytes per second (MBps) between communicating entities. To characterize the size, of a flow, use a protocol analyzer or network management system 4
  • 5. User Community Name Size of Community (Number of Users) Location(s) of Community Application(s) Used by Community 5
  • 6. Data Store Location Application(s) Used by User Community(or Communities) 6
  • 7. Destination 1 Destination 2 Destination 3 Destination MB/sec MB/sec MB/sec MB/sec Source 1 Source 2 Source 3 Source n 7
  • 8. Administration Business and Social Sciences Math and Sciences 50 PCs 25 Macs 50 PCs 50 PCs30 PCs 30 Library Patrons (PCs) 30 Macs and 60 PCs in Computing Center Library and Computing Center App 1 108 Kbps App 2 60 Kbps App 3 192 Kbps App 4 48 Kbps App 7 400 Kbps Total 808 Kbps App 1 48 Kbps App 2 32 Kbps App 3 96 Kbps App 4 24 Kbps App 5 300 Kbps App 6 200 Kbps App 8 1200 Kbps Total 1900 Kbps App 1 30 Kbps App 2 20 Kbps App 3 60 Kbps App 4 16 Kbps Total 126 Kbps App 2 20 Kbps App 3 96 Kbps App 4 24 Kbps App 9 80 Kbps Total 220 Kbps Arts and Humanities Server Farm 10-Mbps Metro Ethernet to Internet 8
  • 9.  Terminal/host: Terminal/host traffic is usually asymmetric. The terminal sends a few characters and the host sends many characters. Telnet is an example of an application that generates terminal/host traffic.  Client/server  Thin client  Peer-to-peer  Server/server  Distributed computing 9
  • 10. The flow associated with transmitting the audio voice is separate from the flows associated with call setup and teardown.  The flow for transmitting the digital voice is essentially peer-to-peer.  Call setup and teardown is a client/server flow  A phone needs to talk to a server or phone switch that understands phone numbers, IP addresses, capabilities negotiation, and so on. 10
  • 11.  The audio voice flow between two IP endpoints is carried by the Real-Time Transport Protocol (RTP), which is a connectionless protocol that runs on top of UDP.  The main call setup, teardown, and control protocols in an IP network are H.323, the Cisco Skinny Client Control Protocol (SCCP), Simple Gateway Control Protocol (SGCP), Media Gateway Control Protocol (MGCP), and Session Initiation Protocol (SIP).  These signaling protocols run between an IP endpoint and a voice-enabled server and follow the client/server paradigm. 11
  • 12.  Private branch exchanges (PBX) and circuit switching, and modern VoIP networks, which use packet switching, must handle two fundamental functions: call control and call switching.  Call Control: handles call setup and teardown, addressing and routing, and informational and supplementary services.  A fundamental job of call control is to compare the digits dialed by the user making a call to configured number patterns to determine how to route a call.  Call switching handles the actual switching of calls. In traditional voice networks, when a call is placed, a PBX connects the calling phone via a so-called line-side interface to another phone’s line-side interface.  If the call is destined for the public switched telephone network (PSTN), the call switching function connects the line-side interface with the trunk-side interface.  May have different path from that used by the call control packets 12
  • 13. Name of Application Type of Traffic Flow Protocol(s) Used by Application User Communities That Use the Application Data Stores (Servers, Hosts, and so on) Approximate Bandwidth Requirements QoS Requirements 13
  • 14.  To calculate whether capacity is sufficient, you should know:  The number of stations  The average time that a station is idle between sending frames  The time required to transmit a message once medium access is gained  That level of detailed information can be hard to gather, however 14
  • 15.  research application-usage patterns, idle times between packets and sessions, frame sizes, and other traffic behavioral patterns for application and system protocols.  Another approach to avoiding bottlenecks is simply to throw large amounts of bandwidth at the problem (also known as overprovisioning). 15
  • 16.  identify user communities, the number of users in the communities, and the applications the users employ.  To predict the aggregate bandwidth requirement for all users of an application document the following information:  The frequency of application sessions (number of sessions per day, week, month, or whatever time period is appropriate)  The length of an average application session  The number of simultaneous users of an application 16
  • 17. If it is not practical to research these details, you can make some assumptions:  The number of users of an application equals the number of simultaneous users.  All applications are used all the time, so that your bandwidth calculation is a worst case (peak) estimate.  Each user opens just one session, and that session lasts all day until the user shuts down the application at the end of the day 17
  • 18.  research the size of data objects:  Sent by applications  The overhead caused by protocol layers  Any additional load caused by application initialization. (Some applications send much more traffic during initialization than during steady-state operation.)  hard to accurately estimate the average size of data objects that users transfer to each other and to servers; it depends  it’s difficult to make any generalizations about the average size of objects sent on a network.  which protocols an application uses 18
  • 19. 19
  • 20.  Terminal screen: 4 Kbytes  Simple e-mail: 10 Kbytes  Simple web page: 50 Kbytes  High-quality image: 50,000 Kbytes  Database backup: 1,000,000 Kbytes or more 20
  • 21.  Address Resolution Protocol (ARP)  ■ Dynamic Host Configuration Protocol (DHCP)  ■ Internet Control Message Protocol (ICMP), version 4 and 6  ■ Internet Group Management Protocol (IGMP), version 4 and 6  ■ Domain Name System (DNS)  ■ Multicast DNS (mDNS)  ■ NetBIOS name queries  ■ Network Time Protocol (NTP)  ■ Simple Service Discovery Protocol (SSDP)  ■ Service Location Protocol (SLP)  ■ Simple Network Management Protocol (SNMP) 21
  • 22.  Router with large-distance vector routing table uses significant amount of WAN bandwidth  RIP  Each route in the packet uses 20 bytes  25 routes per packet  Sends one or more 532-byte packets every 30 seconds depending on the size of the routing table.  Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP), use little bandwidth. 22
  • 23.  Broadcasts  All ones data-link layer destination address  FF: FF: FF: FF: FF: FF  Doesn’t necessarily use huge amounts of bandwidth  But does disturb every CPU in the broadcast domain  Multicasts  First bit sent is a one  01:00:0C:CC:CC:CC (Cisco Discovery Protocol)  Should just disturb NICs that have registered to receive it  Requires multicast routing protocol on internetworks 23
  • 24.  Scalability problem  Use of routers  Use of VLANs  Too many broadcast frames can overwhelm end stations, switches, and routers.  broadcast radiation: to describe the effect of broadcasts spreading from the sender to all other devices in a broadcast domain.  Broadcast radiation can degrade performance at network endpoints 24
  • 25.  Efficiency refers to whether applications and protocols use bandwidth effectively  Frame size  use the largest possible maximum transmission unit (MTU).  MTU can be configured for some applications  avoid fragmentation and reassembly of frames in IP environments; degrades performance  MTU discovery  Protocol interaction  Windowing and flow control  Send window  Receive window  CPU power and memory  Some IP-based applications run on top of UDP, not TCP; no flow control, no handling  Ping pong protocols  Error-recovery mechanisms  Retransmission without ack.  SAck 25
  • 26.  ATM service specifications  Constant bit rate (CBR)  Realtime variable bit rate (rt-VBR)  Non-realtime variable bit rate (nrt-VBR)  Unspecified bit rate (UBR)  Available bit rate (ABR)  Guaranteed frame rate (GFR) 26
  • 27.  IETF integrated services working group specifications  Controlled load service  Provides client data flow with a QoS closely approximating the QoS that same flow would receive on an unloaded network  Guaranteed service  Provides firm (mathematically provable) bounds on end-to-end packet-queuing delays 27
  • 28.  IETF differentiated services working group specifications  RFC 2475  IP packets can be marked with a differentiated services codepoint (DSCP) to influence queuing and packet-dropping decisions for IP datagrams on an output interface of a router 28
  • 29.  Continue to use a systematic, top-down approach  Don’t select products until you understand network traffic in terms of:  Flow  Load  Behavior  QoS requirements 29
  • 30. List and describe six different types of traffic flows. What makes traffic flow in voice over IP networks challenging to characterize and plan for? Why should you be concerned about broadcast traffic? How do ATM and IETF specifications for QoS differ? 30