Lecture 16: Architectural Considerations

Size: px
Start display at page:

Download "Lecture 16: Architectural Considerations"

Transcription

1 Lecture 16: Architectural Considerations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG Network : high-level, end-to-end structure for the network. Relationships between major architectural components of the network. Addressing and routing Network management Performance Security It is key in integrating requirements and flows into the structure of the a network. You can think of it as the blue print that encompasses all the important components of the network, from a highlevel perspective. Prof. Shervin Shirmohammadi CEG

2 Network vs. Design describes relationships, which are generally location independent. Design specifies technologies, protocols, and network devices. Locations play an important role in network design Even the most experienced network designer must first conceptualize a big picture of the network before developing a more detailed design of the components. Broad Generalized Relationships Independent Scope Level of Detail Description Location Design Focused In Depth Technologies Dependant Prof. Shervin Shirmohammadi CEG Component Function Addressing / Routing Network Management Performance Security Capability Provides robust and flexible connectivity between devices Provides monitoring, configuring, and troubleshooting Provides resources to support capacity, delay, and RMA Restricts unauthorized access, usage, and visibility within the network. Mechanism Addressing, Routing NMS, NM protocols QoS, SLA, Policies Firewalls, Security policies, filters, Access Control List (ACL). Prof. Shervin Shirmohammadi CEG

3 Reference Goal Our objective is to get to a reference architecture that is influenced by our requirements, flows, and goals, as well as the component architectures. Requirements, Flows, and Goals Security Net Mgmt Performance Routing Other Reference Prof. Shervin Shirmohammadi CEG Balancing the Reference Depending on the requirements, traffic flows, and goals the reference architecture is either balanced or favored to particular functions. This is an informed decision that is important in the documented part of the network architecture. Example: Consider a network where low delay and jitter performance are a requirement. Routing, Security and N.M. affect these values, so some of them must be sacrificed to meet performance. In this approach each function is developed as its own composite architecture and delay and jitter can be optimized in the performance component architecture and can be prioritized over the other architectures. Prof. Shervin Shirmohammadi CEG

4 Optimizing the Reference Numerous trade-offs occur between addressing/routing, N.M., performance, security. High security => low performance Security may have to take low profile in parts of the network. N.M. => low security When management is a high priority a separate security component architecture for N.M. may be required. High Resolution N.M. => low Performance Out-of-band N.M. a solution. What about security? Simplicity in addressing/routing => low performance Several performance protocols like DiffServ and RSVP are tightly coupled to the addressing scheme. Prof. Shervin Shirmohammadi CEG Architectural Models Three types of architectural models make a good starting point: Topological maps Concentrate mostly on geographical or topological arrangement. LAN/MAN/WAN Access/Distribution/Core Flow-based maps Take advantage of flow information Peer-to-peer Client-server Hierarchical client-server Distributed computing Functional models Focus on one or more functions or features of the network. Service-provider Intranet/extranet single-/multi-tier end-to-end Prof. Shervin Shirmohammadi CEG

5 Network Regions Characterizing regions by traffic flows allows each region to be applied in a similar fashion to all functions. Common regions Access (edge) Most traffic is generated and terminated here. Access control & traffic shaping Distribution Traffic flows are aggregated and terminated for common services, applications & storage servers Core (backbone) Transits for aggregates of traffic flows Differentiated services External Interfaces, and DMZ (demilitarized zone) Aggregation points for traffic flows external to the network. Prof. Shervin Shirmohammadi CEG Topological Models There are popular topological maps LAN/MAN/WAN model Access/distribution/core model LAN / MAN / WAN Concentrates on the boundaries between the WAN / MAN / LAN Access/distribution/core focuses on function rather than location. Focuses on the behaviour of these interface points. Access is closer to the user this is where most traffic flows are sourced and/or sinked. Distribution is where flows are consolidated Core is used for bulk transport WAN Core MAN Dist. MAN Dist. Access LAN Access LAN Access LAN Access LAN Prof. Shervin Shirmohammadi CEG

6 Flow-based Models These are based on the flow models that were developed during analysis. Like before there are 4 flow models Peer-to-peer No obvious location for peers closer to the core model Client-server Functions, features, and services are focused on the servers therefore architectural features are at these interfaces Hierarchical client-server Similar to client-server Distributed computing Data sources and sinks are obvious locations for architectural features. Prof. Shervin Shirmohammadi CEG Functional Models Focus on particular functions in the network. Service-provider Focuses on privacy and security, service delivery, and billing. Intranet/extranet Typical enterprise model focusing on security and privacy. Single-tier/multitier Identifies parts of the network as having single-tier or multi-tier performance End-to-end models Are the most difficult to apply because one has to understand where each function will be located. These models will generally be fairly closely related to the requirements. Prof. Shervin Shirmohammadi CEG

7 Using the Architectural Models It is generally easier to start from the topological model because they can easily cover the larger scope of the network. On the other hand functional and flow-based models are better for focusing on a particular area of the network. Prof. Shervin Shirmohammadi CEG Combining Models (1/) Where client-server or hierarchical client-server models may overlap with the access/distribution/core model. Prof. Shervin Shirmohammadi CEG

8 Combining Models (/) Core Distributed Computing Model Client- Server Model Hierarchical Client-Server Model Dist. Service- Provider Model Intranet/ Extranet Model End-toend Model Access Prof. Shervin Shirmohammadi CEG Recall from lecture 8 Example Central Campus LAN North Campus LAN F4 Servers (4) 51 Servers () F5 F South Campus LAN Storage Servers () F Prof. Shervin Shirmohammadi CEG

9 Access/Distribution/Code areas Topological Model Central Campus LAN Access Core North Campus LAN Servers () 67 Access Servers (4) South Campus LAN Storage Servers () Prof. Shervin Shirmohammadi CEG Distributed Computing Model Flow-Based Model Central Campus LAN North Campus LAN Distributed Computing Distributed Computing Servers () 67 F4 Servers (4) 51 F5 F Distributed Computing Storage Servers () F South Campus LAN Prof. Shervin Shirmohammadi CEG

10 Architectural Considerations: Security Evaluate potential security mechanisms Consider where they apply within the network Determine external and internal relationships. Start simple and work toward more complex solutions: The access / distribution / core architectural model we discussed before can be used as a starting point to apply security points. Security can be added at different points in the architecture. Security is increased from access to distribution to core areas. External Relationships: Security & Addressing NAT is an addressing scheme that helps security. Dynamic addressing interferes with address specific filtering. Security & Network Management Security depends on Network Management Security & Performance These are nearly always at odds. Security zones will affect the performance of that zone Prof. Shervin Shirmohammadi CEG Access / Dist / Core & Security Level 3 Firewall Core Packet Filters Level Firewall Distribution Distribution Encryption Level 1 Firewall Access Access Access Intrusion Detection Firewalls User A User B User C Prof. Shervin Shirmohammadi CEG

11 Security Zones Security Level 1: Lowest Core Security Level 3: Highest Security Level : Medium Distribution Distribution Access Access Access User Devices User Devices User Devices Prof. Shervin Shirmohammadi CEG Developing Security Zones More realistically you will need to define security level zones for user devices, services and the network. Security Level 4: Groups A and B Network A Network B Security Level 5: Servers Network E Security Level 1: General Network G Network C Network F Security Level : External Network D Security Level 3: Group D External Network / Internet Prof. Shervin Shirmohammadi CEG

12 Architectural Considerations: Performance Start simple BestEffort -> DiffServ -> IntServ From the flow analysis maps you know where performance requirements need to be applied in the network. Recall that the access/distribution/core architectural model separates network based on function. Core -> bulk traffic -> aggregated Distribution -> flows to and from servers and aggregate traffic. Access -> most traffic is sources and sinked here. Performance mechanisms that operate on individual flows (admission control, resource allocation, IntServ, ATM QoS) should be considered for access. Performance mechanisms that operate on aggregated flows (DiffServ, WFQ RED/WRED, and MPLS all fit in here) should be considered for core and distribution. External Relationships: Performance and Addressing Performance is closely coupled with routing through mechanisms like DiffServ & IntServ, and RSVP. These are not simple protocols. Performance and NM Performance relies on NM to configure, monitor, manage, verify, and bill. Performance and Security Security mechanisms will affect negatively performance, especially those security mechanisms that are intrusive. If security mechanisms interrupt, terminate, or regenerate a traffic flow they seriously affect the ability to provide end-to-end QoS. Prof. Shervin Shirmohammadi CEG Architectural Considerations: NM Centralized/distributed monitoring Centralized: all monitoring data are sent from one monitoring node using either in-band or out-ofband-monitoring Distributed: local monitoring nodes Less NM traffic In-band/out-of band For a LAN start with one monitoring device per IP subnet. Estimate: Number of user and network devices to be polled Average number of interfaces / device, and the number of parameters to be collected Frequency of polling This combined rate should not be more than 10% of the capacity of the line. For Ethernet keep this at 5%. For a WAN start with a monitoring device per WAN/LAN interface. Local storage vs. archival Data usually kept locally, cached for easy retrieval (within hours). If not used this quickly then archive it. Selective copying of data Consider saving only every N iteration of data. N can range from 100 to Data Migration Usually occurs at night time from local to archive Metadata Additional information about the data is very useful. Data types time stamps etc. Prof. Shervin Shirmohammadi CEG

13 Trade-offs Internal: In-band management cheaper than out-of-band but affects the traffic flow performance. Out-of-band is more reliable and allows access to remote devices. Out-of-band can be more secure. Centralized manager is simpler but is a single point of failure. External: Network Management and Addressing Management domain needs to be considered in the network architecture design. Network Management and Performance This is discussed before: how network data affects traffic flow and capacity. Network Management and Security Network management relies on a particular level of security to get access to the managed objects. Prof. Shervin Shirmohammadi CEG

Architectural Considerations. Lecture 16: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG

Architectural Considerations. Lecture 16: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG Lecture 16: Architectural Considerations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 16-1 Network Architecture Architecture: high-level, end-to-end structure

More information

Lecture 8: Flow Analysis

Lecture 8: Flow Analysis Lecture 8: Flow Analysis Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 8-1 Network Analysis Requirement Analysis Gather Requirements Develop Service Metrics

More information

Lecture 14: Performance Architecture

Lecture 14: Performance Architecture Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance

More information

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have

More information

Lecture 4: Introduction to Computer Network Design

Lecture 4: Introduction to Computer Network Design Lecture 4: Introduction to Computer Network Design Instructor: Hussein Al Osman Based on Slides by: Prof. Shervin Shirmohammadi Hussein Al Osman CEG4190 4-1 Computer Networks Hussein Al Osman CEG4190 4-2

More information

IPv4 Firewall Rule configuration on Cisco SA540 Security Appliance

IPv4 Firewall Rule configuration on Cisco SA540 Security Appliance IPv4 Firewall Rule configuration on Cisco SA540 Security Appliance Objective The objective of this document to explain how to configure IPv4 firewall rules on Cisco SA540 Security Appliance. Firewall provide

More information

Lecture 5: Foundation of Network Management

Lecture 5: Foundation of Network Management Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information

More information

Types of Network Support for Service Quality p. 62 Capacity reservation p. 64 Differentiated treatment p. 65 Differentiation of service quality

Types of Network Support for Service Quality p. 62 Capacity reservation p. 64 Differentiated treatment p. 65 Differentiation of service quality Preface p. xi Acknowledgements p. xv List of Figures p. xvii List of Tables p. xxi Abbreviations p. xxiii Drivers for the Adoption of Multi-service Networks p. 1 Customer Perspective p. 2 Network Operator

More information

Introduction to Computer Science (I1100) Networks. Chapter 6

Introduction to Computer Science (I1100) Networks. Chapter 6 Networks Chapter 6 501 Outline How does Networks and Internet Work? Networking devices Physical Network topology Types of Network Intranets - extranets Copper Media IP Address 502 How does Networks and

More information

CAS CS 556. What to expect? Background? Abraham Matta. Advanced Computer Networks. Increase understanding of fundamentals and design tradeoffs

CAS CS 556. What to expect? Background? Abraham Matta. Advanced Computer Networks. Increase understanding of fundamentals and design tradeoffs CAS CS 556 Abraham Matta Advanced Computer Networks What to expect? Increase understanding of fundamentals and design tradeoffs Discuss latest developments and research issues Naming & addressing, routing,

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2010-2011 Arquitecturas de Redes 2 - Network Architectures 2 1

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Network Analysis: Process Part 1. Lecture 6: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Network Analysis: Process Part 1. Lecture 6: Prof. Shervin Shirmohammadi CEG Lecture 6: Network Analysis: Process Part 1 Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 6-1 Overview The principles, guidelines, and procedures for requirements

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG Lecture 17: Design Technologies Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 17-1 Design Goals From the architecture and its components and simulation, we

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data

More information

SD-WAN Transform Your Agency

SD-WAN Transform Your Agency Federal SD-WAN Transform Your Agency 1 Overview Is your agency facing network traffic challenges? Is migration to the secured cloud hogging scarce bandwidth? How about increased mobile computing that is

More information

Cisco EXAM Designing for Cisco Internetwork Solutions. Buy Full Product.

Cisco EXAM Designing for Cisco Internetwork Solutions. Buy Full Product. Cisco EXAM - 640-864 Designing for Cisco Internetwork Solutions Buy Full Product http://www.examskey.com/640-864.html Examskey Cisco 640-864 exam demo product is here for you to test the quality of the

More information

Chapter 8. Network Troubleshooting. Part II

Chapter 8. Network Troubleshooting. Part II Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.

More information

Data Center Interconnect Solution Overview

Data Center Interconnect Solution Overview CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility

More information

Hands-On Metro Ethernet Carrier Class Networks

Hands-On Metro Ethernet Carrier Class Networks Hands-On Carrier Class Networks Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However customers now use Ethernet as the interface

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

PassTorrent. Pass your actual test with our latest and valid practice torrent at once

PassTorrent.   Pass your actual test with our latest and valid practice torrent at once PassTorrent http://www.passtorrent.com Pass your actual test with our latest and valid practice torrent at once Exam : 352-011 Title : Cisco Certified Design Expert Practical Exam Vendor : Cisco Version

More information

RSVP Scalability Enhancements

RSVP Scalability Enhancements This document describes the Cisco Resource Reservation Protocol (RSVP) scalability enhancements. It identifies the supported platforms, provides configuration examples, and lists related IOS command line

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

Enterprise Network Design

Enterprise Network Design Chapter 4 Enterprise Network Design Topics covered: Enterprise Network Design Model. Backbone design concepts. Network security and firewalls. Structured cabling systems. Case studies. Definition An enterprise

More information

S Network service provisioning

S Network service provisioning S-38.3192 Network service provisioning Initial details for S-38.3192, Jan. 18th, 2007 Mika Ilvesmäki Networking laboratory Course contents Course consists of Lectures (14), given two at a time in S3 on

More information

Chapter 1. Cisco SONA and the Cisco Enterprise Architecture

Chapter 1. Cisco SONA and the Cisco Enterprise Architecture Chapter 1. Cisco SONA and the Cisco Enterprise Architecture After completing this chapter, you will be able to: Explain the Cisco Service-Oriented Network Architecture (SONA) framework Describe how the

More information

THE MPLS JOURNEY FROM CONNECTIVITY TO FULL SERVICE NETWORKS. Sangeeta Anand Vice President Product Management Cisco Systems.

THE MPLS JOURNEY FROM CONNECTIVITY TO FULL SERVICE NETWORKS. Sangeeta Anand Vice President Product Management Cisco Systems. THE MPLS JOURNEY FROM CONNECTIVITY TO FULL SERVICE NETWORKS Sangeeta Anand Vice President Product Management Cisco Systems October 20, 2003 1 Agenda Introducing the Full Service Network The MPLS Journey

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks Ibrahim Matta What to expect? Increase understanding of fundamentals and design tradeoffs Discuss latest developments and research issues Naming & addressing, routing, connection

More information

Configuration and Management of Networks

Configuration and Management of Networks Configuration and Management of Networks 2013/2014 tele1.dee.fct.unl/cgr Programa Arquitecturas de Redes empresariais: Revisão dos principais tipos de rede e tecnologia associada Comutação: Domínios de

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

JURUMANI MERAKI CLOUD MANAGED SECURITY & SD-WAN

JURUMANI MERAKI CLOUD MANAGED SECURITY & SD-WAN JURUMANI CLOUD MANAGED SECURITY & SD-WAN SECURITY BY DESIGN OVERVIEW Cisco Meraki MX Security Appliances are ideal for organizations considering a Unified Threat Managment (UTM) solution, for distributed

More information

WAN Technology & Design. Dr. Nawaporn Wisitpongphan

WAN Technology & Design. Dr. Nawaporn Wisitpongphan WAN Technology & Design Dr. Nawaporn Wisitpongphan 1 WAN Connection Modules 2 WAN Comparison 3 Integrated Services Digital Network (ISDN) All-digital phone line connection Technology since 1980s Allow

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Lecture 6: Network Analysis: Process Part 1

Lecture 6: Network Analysis: Process Part 1 Lecture 6: Network Analysis: Process Part 1 Instructor: Hussein Al Osman Based on Slides by: Profs Makrakis and Shirmohammadi Hussein Al Osman CEG4190 6-1 Overview The principles, guidelines, and procedures

More information

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2010-2011 Metodologia de Projecto 4 - Project Methodology 4 1 Hierarchical

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

Metro Ethernet Design and Engineering for CO

Metro Ethernet Design and Engineering for CO Hands-On Metro Ethernet Design and Engineering for CO Designing Carrier Networks that Deliver Metro Ethernet Services Course Description Carriers have offered connectivity services based on traditional

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

Unifying the Distributed Enterprise with MPLS Mesh

Unifying the Distributed Enterprise with MPLS Mesh Unifying the Distributed Enterprise with MPLS Mesh Technical Whitepaper January 2015 Copyright 2015 AireSpring Introduction Today s modern enterprises employ IT technologies that deliver higher value,

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

1.264 Lecture 23. Telecom Enterprise networks MANs, WANs

1.264 Lecture 23. Telecom Enterprise networks MANs, WANs 1.264 Lecture 23 Telecom Enterprise networks MANs, WANs Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners

More information

Enterprise Network Design

Enterprise Network Design Chapter 4 Enterprise Network Design Topics covered: Enterprise Network Design Model. Backbone design concepts. Network security and firewalls. Structured cabling systems. Case studies. Definition An enterprise

More information

NETWORK ARCHITECTURE

NETWORK ARCHITECTURE GLOBAL MPLS NETWORK ARCHITECTURE The IP backbone is designed to service connectivity for IP and IP VPN services. The backbone network provides IP connectivity between Points of Presence (POPs). The design

More information

ISP and IXP Design. Point of Presence Topologies. ISP Network Design. PoP Topologies. Modular PoP Design. PoP Design INET 2000 NTW

ISP and IXP Design. Point of Presence Topologies. ISP Network Design. PoP Topologies. Modular PoP Design. PoP Design INET 2000 NTW ISP Network Design PoP Topologies and Design ISP and IXP Design Backbone Design Addressing INET 2000 NTW Routing Protocols Security Out of Band Management IXP/IXP Workshops 1999, Cisco Systems, Inc. 1

More information

Flow-Based Routing: Towards New QoS Models Dr. Riad Hartani Caspian Networks

Flow-Based Routing: Towards New QoS Models Dr. Riad Hartani Caspian Networks Flow-Based Routing: Towards New QoS Models Dr. Riad Hartani Caspian Networks Agenda MPLS: status and ongoing work items Flow-based routing the technology Flow-based routing benefits Overall technology

More information

WAN Edge MPLSoL2 Service

WAN Edge MPLSoL2 Service 4 CHAPTER While Layer 3 VPN services are becoming increasing popular as a primary connection for the WAN, there are a much larger percentage of customers still using Layer 2 services such Frame-Relay (FR).

More information

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service TDDD82 Secure Mobile Systems Lecture 6: Quality of Service Mikael Asplund Real-time Systems Laboratory Department of Computer and Information Science Linköping University Based on slides by Simin Nadjm-Tehrani

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Quality of Services 1. Terminology 2. Technologies 2 Terminology Quality of service Ability to control network performance in order to meet application and/or end-user requirements Examples of parameters

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined

More information

Configuring a Zone-Based Firewall on the Cisco ISA500 Security Appliance

Configuring a Zone-Based Firewall on the Cisco ISA500 Security Appliance Application Note Configuring a Zone-Based Firewall on the Cisco ISA500 Security Appliance This application note describes how to configure a zone-based firewall on the Cisco ISA500 security appliance.

More information

Traffic Management and. QoS Issues for Large High-Speed Networks

Traffic Management and. QoS Issues for Large High-Speed Networks Traffic Management and QoS Issues for Large High-Speed Networks Columbus, OH 43210 Jain@CIS.Ohio-State.Edu This presentation is available on-line: http://www.cis.ohio-state.edu/~jain/talks/nas_ipg.htm

More information

MPLS SOLUTION How to Make the Best Choice for Your Business

MPLS SOLUTION How to Make the Best Choice for Your Business HOW-TO GUIDE Choosing the Right MPLS SOLUTION How to Make the Best Choice for Your Business TABLE OF CONTENTS Introduction 3 CH. 1 Why Organizations Choose MPLS 4 CH. 2 What Types of MPLS Solutions Will

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Quality of Service In Data Networks

Quality of Service In Data Networks Quality of Service In Data Networks The Ohio State University Columbus, OH 43210 Jain@CIS.Ohio-State.Edu These slides are available on-line at http://www.cis.ohio-state.edu/~jain/cis788-99/ 1 Overview

More information

Hands-On IP Multicasting for Multimedia Distribution Networks

Hands-On IP Multicasting for Multimedia Distribution Networks Hands-On for Multimedia Distribution Networks Course Description This Hands-On course provides an in-depth look how IP multicasting works, its advantages and limitations and how it can be deployed to provide

More information

Quality of Service in Ultrabroadband models

Quality of Service in Ultrabroadband models Quality of Service in Ultrabroadband models Elias Aravantinos ICT Consultant, CITI Managing Director, Exelixisnet earavantinos@exelixisnet.com April 4, 2008 TELECOM ParisTech Contents 1 2 3 4 UBB & QoS

More information

TOC: Switching & Forwarding

TOC: Switching & Forwarding TOC: Switching & Forwarding Why? Switching Techniques Switch Characteristics Switch Examples Switch Architectures Summary Why? Direct vs. Switched Networks: Single link Switches Direct Network Limitations:

More information

TOC: Switching & Forwarding

TOC: Switching & Forwarding TOC: Switching & Forwarding Why? Switching Techniques Switch Characteristics Switch Examples Switch Architectures Summary TOC Switching Why? Direct vs. Switched Networks: n links Single link Direct Network

More information

SERVICE DESCRIPTION SD-WAN. from NTT Communications

SERVICE DESCRIPTION SD-WAN. from NTT Communications SERVICE DESCRIPTION SD-WAN from NTT Communications 1 NTT SD-WAN Service Portfolio NTT Communications, (NTT Com s), SD-WAN service offers a new approach for deploying enterprise grade Wide Area Networks

More information

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD) Our Learning Exclusive Custom exam prep software and materials Exam delivery in classroom with 98% success Course specific thinqtank Learning publications to promote fun exciting learning Extended hours

More information

Differentiated services code point (DSCP) Source or destination address

Differentiated services code point (DSCP) Source or destination address Classification is the process of identifying traffic and categorizing that traffic into classes. Classification uses a traffic descriptor to categorize a packet within a specific group to define that packet.

More information

Exam Questions

Exam Questions Exam Questions 200-310 DESGN Designing for Cisco Internetwork Solutions https://www.2passeasy.com/dumps/200-310/ 1. What is the recommended spanning tree protocol to use for all Layer 2 deployments in

More information

BW Protection. 2002, Cisco Systems, Inc. All rights reserved.

BW Protection. 2002, Cisco Systems, Inc. All rights reserved. BW Protection 2002, Cisco Systems, Inc. All rights reserved. 1 Cisco MPLS - Traffic Engineering for VPNs Amrit Hanspal Sr. Product Manager MPLS & QoS Internet Technologies Division 2 Agenda MPLS Fundamentals

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Lecture 4: Basic Internet Operations

Lecture 4: Basic Internet Operations Lecture 4: Basic Internet Operations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 4-1 LAN View A LAN 2 B Hub 2 Gateway to Internet Hub 1 Z (Gateway) LAN 1

More information

COPYRIGHTED MATERIAL. Introduction. Noman Muhammad, Davide Chiavelli, David Soldani and Man Li. 1.1 QoE value chain

COPYRIGHTED MATERIAL. Introduction. Noman Muhammad, Davide Chiavelli, David Soldani and Man Li. 1.1 QoE value chain 1 Introduction Noman Muhammad, Davide Chiavelli, David Soldani and Man Li Browsing through the literature, one may find many different definitions for quality of end-user experience (QoE) and quality of

More information

MPLS in the DCN. Introduction CHAPTER

MPLS in the DCN. Introduction CHAPTER CHAPTER 5 First Published: January 3, 2008 Last Updated: January 3, 2008 Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images Use Cisco Feature Navigator to find information

More information

Implementing Cisco Quality of Service 2.5 (QOS)

Implementing Cisco Quality of Service 2.5 (QOS) Implementing Cisco Quality of Service 2.5 (QOS) COURSE OVERVIEW: Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as

More information

Differentiated Services

Differentiated Services Diff-Serv 1 Differentiated Services QoS Problem Diffserv Architecture Per hop behaviors Diff-Serv 2 Problem: QoS Need a mechanism for QoS in the Internet Issues to be resolved: Indication of desired service

More information

Multicast and Quality of Service. Internet Technologies and Applications

Multicast and Quality of Service. Internet Technologies and Applications Multicast and Quality of Service Internet Technologies and Applications Aims and Contents Aims Introduce the multicast and the benefits it offers Explain quality of service and basic techniques for delivering

More information

"Charting the Course... Implementing Cisco Quality of Service (QOS) Course Summary

Charting the Course... Implementing Cisco Quality of Service (QOS) Course Summary Course Summary Description v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as best effort, IntServ, and DiffServ, and the implementation of QoS on Cisco platforms.

More information

QoS for Real Time Applications over Next Generation Data Networks

QoS for Real Time Applications over Next Generation Data Networks QoS for Real Time Applications over Next Generation Data Networks Final Project Presentation December 8, 2000 http://www.engr.udayton.edu/faculty/matiquzz/pres/qos-final.pdf University of Dayton Mohammed

More information

Credit-based Network Management

Credit-based Network Management Credit-based Network Management 2009-01-06 Outline The problem of Network Management The Idea of Credit-based Network Management An Implementation in Campus Network Conclusions Network management headaches

More information

Virtual Communications Express VCE over LTE User Guide

Virtual Communications Express VCE over LTE User Guide Version 1.17 Last Updated: May 2017 2017 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon s products and services are trademarks and service

More information

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice The Road To Ethernet WAN Various industry sources show trends in globalization and distribution, of employees moving towards

More information

Networking Issues in LAN Telephony. Brian Yang

Networking Issues in LAN Telephony. Brian Yang Networking Issues in LAN Telephony Brian Yang 5-3-00 Topics Some background Flow Based QoS Class Based QoS and popular algorithms Strict Priority (SP) Round-Robin (RR), Weighted Round Robin (WRR) and Weighted

More information

ITTC High-Performance Networking The University of Kansas EECS 881 Architecture and Topology

ITTC High-Performance Networking The University of Kansas EECS 881 Architecture and Topology High-Performance Networking The University of Kansas EECS 881 Architecture and Topology James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

Lecture 10: Protocol Design

Lecture 10: Protocol Design Lecture 10: Protocol Design Prof. Shervin Shirmohammadi SITE, University of Ottawa Fall 2005 CEG 4183 10-1 Introduction TCP and UDP are generic protocols: They fulfill the needs of a wide range of applications

More information

CSE 461 Quality of Service. David Wetherall

CSE 461 Quality of Service. David Wetherall CSE 461 Quality of Service David Wetherall djw@cs.washington.edu QOS Focus: How to provide better than best effort Fair queueing Application Application needs Transport Traffic shaping Guarantees IntServ

More information

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure COURSE OVERVIEW This five-day instructor-led course introduces students to network and applications infrastructure concepts and configurations provided by Window Server 2008. Students will be able to acquire

More information

Chapter 8: Subnetting IP Networks CCENT Routing and Switching Introduction to Networks v6.0

Chapter 8: Subnetting IP Networks CCENT Routing and Switching Introduction to Networks v6.0 Chapter 8: Subnetting IP Networks CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 13 Chapter 8 - Sections & Objectives 8.1 Subnetting an IPv4 Network Explain how subnetting segments

More information

Enterprise SD-WAN Financial Profile (Hybrid WAN, Segmentation, Quality of Service, Centralized Policies)

Enterprise SD-WAN Financial Profile (Hybrid WAN, Segmentation, Quality of Service, Centralized Policies) CVP CVP Enterprise SD-WAN Financial Profile (Hybrid WAN, Segmentation, Quality of Service, Centralized Policies) 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

More information

Problems with IntServ. EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) DiffServ (cont d)

Problems with IntServ. EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) DiffServ (cont d) Problems with IntServ EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to a Layer 3 VPN service. In your des

QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to a Layer 3 VPN service. In your des Vendor: Cisco Exam Code: 352-001 Exam Name: ADVDESIGN Version: Demo www.dumpspdf.com QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to

More information

"Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary

Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary Description Course Summary The Cisco CCNA curriculum includes a third course, Interconnecting Cisco Networking Devices: Accelerated (CCNAX), consisting of Interconnecting Cisco Networking Devices, Part

More information

Differentiated Services

Differentiated Services 1 Differentiated Services QoS Problem Diffserv Architecture Per hop behaviors 2 Problem: QoS Need a mechanism for QoS in the Internet Issues to be resolved: Indication of desired service Definition of

More information

MCI April Service Requirements for Layer 3 Provider Provisioned Virtual Private Networks (PPVPNs)

MCI April Service Requirements for Layer 3 Provider Provisioned Virtual Private Networks (PPVPNs) Network Working Group Request for Comments: 4031 Category: Informational M. Carugi, Ed. Nortel Networks D. McDysan, Ed. MCI April 2005 Service Requirements for Layer 3 Provider Provisioned Virtual Private

More information

Understanding VLANs. Existing Shared LAN Configurations CHAPTER

Understanding VLANs. Existing Shared LAN Configurations CHAPTER CHAPTER 1 Understanding VLANs This chapter provides an introduction to VLANs and switched internetworking, compares traditional shared LAN configurations with switched LAN configurations, and discusses

More information

90 % of WAN decision makers cite their

90 % of WAN decision makers cite their WHITEPAPER So many ways to WAN How the most essential technology for distributed enterprises has evolved and where it s headed One of the most critical components to the success of any growth-oriented

More information

Chapter 8: Subnetting IP Networks

Chapter 8: Subnetting IP Networks Chapter 8: Subnetting IP Networks Designing, implementing and managing an effective IP addressing plan ensures that networks can operate effectively and efficiently. This is especially true as the number

More information

Introducing Campus Networks

Introducing Campus Networks Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching

More information

Introduction to Wireless Networking ECE 401WN Spring 2008

Introduction to Wireless Networking ECE 401WN Spring 2008 Introduction to Wireless Networking ECE 401WN Spring 2008 Lecture 2: Communication Networks The first major topic we will study will be WLANs. But before that, we need to consider a few basics of networking.

More information

Chapter 5. The Network Layer. Network Layer Design Isues. Store-and-Forward Packet Switching 10/7/2010. Implementation of Connectionless Service

Chapter 5. The Network Layer. Network Layer Design Isues. Store-and-Forward Packet Switching 10/7/2010. Implementation of Connectionless Service Network Layer Design Isues Chapter 5 The Network Layer Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information

Chapter 5. The Network Layer

Chapter 5. The Network Layer Chapter 5 The Network Layer 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information

Prof. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service

Prof. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service Multimedia Communications Multimedia Technologies & Applications Prof. Dr. Abdulmotaleb El Saddik Multimedia Communications Research Laboratory School of Information Technology and Engineering University

More information

COURSE PROJECT SEM ATTENTION ALL ADVANCED DIPLOMA & BACHELOR STUDENTS

COURSE PROJECT SEM ATTENTION ALL ADVANCED DIPLOMA & BACHELOR STUDENTS COURSE PROJECT SEM 2 2014 2015 ATTENTION ALL ADVANCED DIPLOMA & BACHELOR STUDENTS The students who have pre registered for Networking Course Project are required to submit your project proposal. The titles

More information

Quality of Service Basics

Quality of Service Basics Quality of Service Basics Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Content QoS requirements QoS in networks Basic QoS mechanisms QoS in IP networks IntServ

More information