SlideShare a Scribd company logo
1 of 18
Top-Down Network Design

            Chapter Four

     Characterizing Network Traffic



     Copyright 2010 Cisco Press & Priscilla Oppenheimer
Network Traffic Factors

•   Traffic flow
•   Location of traffic sources and data stores
•   Traffic load
•   Traffic behavior
•   Quality of Service (QoS) requirements
User Communities
User        Size of      Location(s) of   Application(s)
Community   Community    Community        Used by
Name        (Number of                    Community
            Users)
Data Stores
Data Store   Location   Application(s) Used by User
                                       Community(or
                                       Communities)
Traffic Flow

           Destination 1   Destination 2   Destination 3   Destination
           MB/sec          MB/sec          MB/sec          MB/sec


Source 1


Source 2


Source 3


Source n
Library and Computing Center
Traffic Flow                               30 Library Patrons (PCs)          10-Mbps Metro

 Example                                   30 Macs and 60 PCs in
                                           Computing Center
                                                                            Ethernet to Internet

                                                 Server Farm                App 1   108   Kbps
      App 2    20   Kbps                                                    App 2    60   Kbps
      App 3    96   Kbps                                                    App 3   192   Kbps
      App 4    24   Kbps                                                    App 4    48   Kbps
      App 9    80   Kbps                                                    App 7   400   Kbps
      Total   220   Kbps                                                    Total   808   Kbps




         50 PCs                                                                               25 Macs
                                                                                              50 PCs

  Administration                                                                      Arts and
                           App 1     30   Kbps
                                                                                     Humanities
                           App 2     20   Kbps            App 1   48 Kbps
                           App 3     60   Kbps            App 2   32 Kbps
                           App 4     16   Kbps            App 3   96 Kbps
                           Total    126   Kbps            App 4   24 Kbps
                                                          App 5 300 Kbps                    Math and
                                                          App 6 200 Kbps
                                                          App 8 1200 Kbps                   Sciences
              30 PCs                                      Total 1900 Kbps      50 PCs

       Business and
      Social Sciences
Types of Traffic Flow

•   Terminal/host
•   Client/server
•   Thin client
•   Peer-to-peer
•   Server/server
•   Distributed computing
Traffic Flow for Voice over IP
• The flow associated with transmitting
  the audio voice is separate from the
  flows associated with call setup and
  teardown.
   – The flow for transmitting the digital voice
     is essentially peer-to-peer.
   – Call setup and teardown is a client/server
     flow
      • A phone needs to talk to a server or phone
        switch that understands phone numbers, IP
        addresses, capabilities negotiation, and so on.
Network Applications
                      Traffic Characteristics

Name of     Type of    Protocol(s)   User           Data Stores      Approximate    QoS
Application Traffic    Used by       Communities    (Servers, Hosts, Bandwidth      Requirements
            Flow       Application   That Use the   and so on)       Requirements
                                     Application
Traffic Load
• To calculate whether capacity is sufficient,
  you should know:
  – The number of stations
  – The average time that a station is idle between
    sending frames
  – The time required to transmit a message once
    medium access is gained
• That level of detailed information can be
  hard to gather, however
Size of Objects on Networks

•   Terminal screen: 4 Kbytes
•   Simple e-mail: 10 Kbytes
•   Simple web page: 50 Kbytes
•   High-quality image: 50,000 Kbytes
•   Database backup: 1,000,000 Kbytes or
    more
Traffic Behavior
• Broadcasts
   – All ones data-link layer destination address
       • FF: FF: FF: FF: FF: FF
   – Doesn’t necessarily use huge amounts of bandwidth
   – But does disturb every CPU in the broadcast domain
• Multicasts
   – First bit sent is a one
       • 01:00:0C:CC:CC:CC (Cisco Discovery Protocol)
   – Should just disturb NICs that have registered to receive
     it
   – Requires multicast routing protocol on internetworks
Network Efficiency

•   Frame size
•   Protocol interaction
•   Windowing and flow control
•   Error-recovery mechanisms
QoS Requirements

• ATM service specifications
  –   Constant bit rate (CBR)
  –   Realtime variable bit rate (rt-VBR)
  –   Non-realtime variable bit rate (nrt-VBR)
  –   Unspecified bit rate (UBR)
  –   Available bit rate (ABR)
  –   Guaranteed frame rate (GFR)
QoS Requirements per IETF

• IETF integrated services working group
  specifications
  – Controlled load service
     • Provides client data flow with a QoS closely
       approximating the QoS that same flow would
       receive on an unloaded network
  – Guaranteed service
     • Provides firm (mathematically provable) bounds on
       end-to-end packet-queuing delays
QoS Requirements per IETF

• IETF differentiated services working group
  specifications
  – RFC 2475
  – IP packets can be marked with a differentiated
    services codepoint (DSCP) to influence
    queuing and packet-dropping decisions for IP
    datagrams on an output interface of a router
Summary

• Continue to use a systematic, top-down
  approach
• Don’t select products until you understand
  network traffic in terms of:
  –   Flow
  –   Load
  –   Behavior
  –   QoS requirements
Review Questions
• List and describe six different types of traffic flows.
• What makes traffic flow in voice over IP networks
  challenging to characterize and plan for?
• Why should you be concerned about broadcast
  traffic?
• How do ATM and IETF specifications for QoS
  differ?

More Related Content

What's hot

Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
Ghaffar Khan
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
Ismail Mukiibi
 

What's hot (20)

Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application Performance
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Evolution of network - computer networks
Evolution of network - computer networksEvolution of network - computer networks
Evolution of network - computer networks
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Common air protocol
Common air protocolCommon air protocol
Common air protocol
 
Datalinklayer tanenbaum
Datalinklayer tanenbaumDatalinklayer tanenbaum
Datalinklayer tanenbaum
 
IP classes
IP classesIP classes
IP classes
 
Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Domain name system
Domain name systemDomain name system
Domain name system
 
6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdf
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 
Isdn
IsdnIsdn
Isdn
 
Ch 26
Ch 26Ch 26
Ch 26
 

Similar to Chapter04

Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
Piero Fraternali
 
Delivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demandDelivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demand
Amazon Web Services
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)
Nitesh Singh
 
Zigbee intro v5
Zigbee intro v5Zigbee intro v5
Zigbee intro v5
rajrayala
 
7.) convergence (w automation)
7.) convergence (w automation)7.) convergence (w automation)
7.) convergence (w automation)
Jeff Green
 
Hp aspera-big data cloud-v2
Hp aspera-big data cloud-v2Hp aspera-big data cloud-v2
Hp aspera-big data cloud-v2
dkumiaspera
 

Similar to Chapter04 (20)

Chapter03
Chapter03Chapter03
Chapter03
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Chapter04
Chapter04Chapter04
Chapter04
 
Delivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demandDelivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demand
 
Web Services for the Internet of Things
Web Services for the Internet of ThingsWeb Services for the Internet of Things
Web Services for the Internet of Things
 
New tcp-ip model
New tcp-ip modelNew tcp-ip model
New tcp-ip model
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)
 
Zigbee intro v5
Zigbee intro v5Zigbee intro v5
Zigbee intro v5
 
7.) convergence (w automation)
7.) convergence (w automation)7.) convergence (w automation)
7.) convergence (w automation)
 
Continuum pcap-oem
Continuum pcap-oemContinuum pcap-oem
Continuum pcap-oem
 
NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP)
NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP) NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP)
NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP)
 
Networking - TCP/IP stack introduction and IPv6
Networking - TCP/IP stack introduction and IPv6Networking - TCP/IP stack introduction and IPv6
Networking - TCP/IP stack introduction and IPv6
 
To Infiniband and Beyond
To Infiniband and BeyondTo Infiniband and Beyond
To Infiniband and Beyond
 
goldman11.ppt
goldman11.pptgoldman11.ppt
goldman11.ppt
 
goldman11.ppt
goldman11.pptgoldman11.ppt
goldman11.ppt
 
Chapter4 Network
Chapter4 NetworkChapter4 Network
Chapter4 Network
 
Hp aspera-big data cloud-v2
Hp aspera-big data cloud-v2Hp aspera-big data cloud-v2
Hp aspera-big data cloud-v2
 
Keystone - ApacheCon 2016
Keystone - ApacheCon 2016Keystone - ApacheCon 2016
Keystone - ApacheCon 2016
 
Platforms for Accelerating the Software Defined and Virtual Infrastructure
Platforms for Accelerating the Software Defined and Virtual InfrastructurePlatforms for Accelerating the Software Defined and Virtual Infrastructure
Platforms for Accelerating the Software Defined and Virtual Infrastructure
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.com
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Chapter04

  • 1. Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer
  • 2. Network Traffic Factors • Traffic flow • Location of traffic sources and data stores • Traffic load • Traffic behavior • Quality of Service (QoS) requirements
  • 3. User Communities User Size of Location(s) of Application(s) Community Community Community Used by Name (Number of Community Users)
  • 4. Data Stores Data Store Location Application(s) Used by User Community(or Communities)
  • 5. Traffic Flow Destination 1 Destination 2 Destination 3 Destination MB/sec MB/sec MB/sec MB/sec Source 1 Source 2 Source 3 Source n
  • 6. Library and Computing Center Traffic Flow 30 Library Patrons (PCs) 10-Mbps Metro Example 30 Macs and 60 PCs in Computing Center Ethernet to Internet Server Farm App 1 108 Kbps App 2 20 Kbps App 2 60 Kbps App 3 96 Kbps App 3 192 Kbps App 4 24 Kbps App 4 48 Kbps App 9 80 Kbps App 7 400 Kbps Total 220 Kbps Total 808 Kbps 50 PCs 25 Macs 50 PCs Administration Arts and App 1 30 Kbps Humanities App 2 20 Kbps App 1 48 Kbps App 3 60 Kbps App 2 32 Kbps App 4 16 Kbps App 3 96 Kbps Total 126 Kbps App 4 24 Kbps App 5 300 Kbps Math and App 6 200 Kbps App 8 1200 Kbps Sciences 30 PCs Total 1900 Kbps 50 PCs Business and Social Sciences
  • 7. Types of Traffic Flow • Terminal/host • Client/server • Thin client • Peer-to-peer • Server/server • Distributed computing
  • 8. Traffic Flow for Voice over IP • The flow associated with transmitting the audio voice is separate from the flows associated with call setup and teardown. – The flow for transmitting the digital voice is essentially peer-to-peer. – Call setup and teardown is a client/server flow • A phone needs to talk to a server or phone switch that understands phone numbers, IP addresses, capabilities negotiation, and so on.
  • 9. Network Applications Traffic Characteristics Name of Type of Protocol(s) User Data Stores Approximate QoS Application Traffic Used by Communities (Servers, Hosts, Bandwidth Requirements Flow Application That Use the and so on) Requirements Application
  • 10. Traffic Load • To calculate whether capacity is sufficient, you should know: – The number of stations – The average time that a station is idle between sending frames – The time required to transmit a message once medium access is gained • That level of detailed information can be hard to gather, however
  • 11. Size of Objects on Networks • Terminal screen: 4 Kbytes • Simple e-mail: 10 Kbytes • Simple web page: 50 Kbytes • High-quality image: 50,000 Kbytes • Database backup: 1,000,000 Kbytes or more
  • 12. Traffic Behavior • Broadcasts – All ones data-link layer destination address • FF: FF: FF: FF: FF: FF – Doesn’t necessarily use huge amounts of bandwidth – But does disturb every CPU in the broadcast domain • Multicasts – First bit sent is a one • 01:00:0C:CC:CC:CC (Cisco Discovery Protocol) – Should just disturb NICs that have registered to receive it – Requires multicast routing protocol on internetworks
  • 13. Network Efficiency • Frame size • Protocol interaction • Windowing and flow control • Error-recovery mechanisms
  • 14. QoS Requirements • ATM service specifications – Constant bit rate (CBR) – Realtime variable bit rate (rt-VBR) – Non-realtime variable bit rate (nrt-VBR) – Unspecified bit rate (UBR) – Available bit rate (ABR) – Guaranteed frame rate (GFR)
  • 15. QoS Requirements per IETF • IETF integrated services working group specifications – Controlled load service • Provides client data flow with a QoS closely approximating the QoS that same flow would receive on an unloaded network – Guaranteed service • Provides firm (mathematically provable) bounds on end-to-end packet-queuing delays
  • 16. QoS Requirements per IETF • IETF differentiated services working group specifications – RFC 2475 – IP packets can be marked with a differentiated services codepoint (DSCP) to influence queuing and packet-dropping decisions for IP datagrams on an output interface of a router
  • 17. Summary • Continue to use a systematic, top-down approach • Don’t select products until you understand network traffic in terms of: – Flow – Load – Behavior – QoS requirements
  • 18. Review Questions • List and describe six different types of traffic flows. • What makes traffic flow in voice over IP networks challenging to characterize and plan for? • Why should you be concerned about broadcast traffic? • How do ATM and IETF specifications for QoS differ?