Architectural Considerations. Lecture 16: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG
|
|
- Hugo Warren
- 5 years ago
- Views:
Transcription
1 Lecture 16: Architectural Considerations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG
2 Network Architecture Architecture: high-level, end-to-end structure for the network. Relationships between major architectural components of the network. Addressing and routing Network management Performance Security It is key in integrating requirements and flows into the structure of the a network. You can think of it as the blue print that encompasses all the important components of the network, from a highlevel perspective. Prof. Shervin Shirmohammadi CEG
3 Network Architecture vs. Design Architecture describes relationships, which are generally location independent. Design specifies technologies, protocols, and network devices. Locations play an important role in network design Even the most experienced network designer must first conceptualize a big picture of the network before developing a more detailed design of the components. Architecture Design Broad Generalized Scope Level of Detail Focused In Depth Relationships Description Technologies Independent Location Dependant Prof. Shervin Shirmohammadi CEG
4 Component Architecture Function Capability Mechanism Addressing / Routing Network Management Performance Security Provides robust and flexible connectivity between devices Provides monitoring, configuring, and troubleshooting Provides resources to support capacity, delay, and RMA Restricts unauthorized access, usage, and visibility within the network. Addressing, Routing NMS, NM protocols QoS, SLA, Policies Firewalls, Security policies, filters, Access Control List (ACL). Prof. Shervin Shirmohammadi CEG
5 Reference Architecture Goal Our objective is to get to a reference architecture that is influenced by our requirements, flows, and goals, as well as the component architectures. Requirements, Flows, and Goals Security Architecture Net Mgmt Architecture Performance Architecture Routing Architecture Other Architecture Reference Architecture Prof. Shervin Shirmohammadi CEG
6 Balancing the Reference Architecture Depending on the requirements, traffic flows, and goals the reference architecture is either balanced or favored to particular functions. This is an informed decision that is important in the documented part of the network architecture. Example: Consider a network where low delay and jitter performance are a requirement. Routing, Security and N.M. affect these values, so some of them must be sacrificed to meet performance. In this approach each function is developed as its own composite architecture and delay and jitter can be optimized in the performance component architecture and can be prioritized over the other architectures. Prof. Shervin Shirmohammadi CEG
7 Optimizing the Reference Architecture Numerous trade-offs occur between addressing/routing, N.M., performance, security. High security => low performance Security may have to take low profile in parts of the network. N.M. => low security When management is a high priority a separate security component architecture for N.M. may be required. High Resolution N.M. => low Performance Out-of-band N.M. a solution. What about security? Simplicity in addressing/routing => low performance Several performance protocols like DiffServ and RSVP are tightly coupled to the addressing scheme. Prof. Shervin Shirmohammadi CEG
8 Architectural Models Three types of architectural models make a good starting point: Topological maps Concentrate mostly on geographical or topological arrangement. LAN/MAN/WAN Access/Distribution/Core Flow-based maps Take advantage of flow information Peer-to-peer Client-server Hierarchical client-server Distributed computing Functional models Focus on one or more functions or features of the network. Service-provider Intranet/extranet single-/multi-tier end-to-end Prof. Shervin Shirmohammadi CEG
9 Network Regions Characterizing regions by traffic flows allows each region to be applied in a similar fashion to all functions. Common regions Access (edge) Most traffic is generated and terminated here. Access control & traffic shaping Distribution Traffic flows are aggregated and terminated for common services, applications & storage servers Core (backbone) Transits for aggregates of traffic flows Differentiated services External Interfaces, and DMZ (demilitarized zone) Aggregation points for traffic flows external to the network. Prof. Shervin Shirmohammadi CEG
10 Topological Models There are 2 popular topological maps LAN/MAN/WAN model Access/distribution/core model LAN / MAN / WAN Concentrates on the boundaries between the WAN / MAN / LAN Access/distribution/core focuses on function rather than location. Focuses on the behaviour of these interface points. Access is closer to the user this is where most traffic flows are sourced and/or sinked. Distribution is where flows are consolidated Core is used for bulk transport WAN Core MAN Dist. MAN Dist. Access LAN Access LAN Access LAN Access LAN Prof. Shervin Shirmohammadi CEG
11 Flow-based Models These are based on the flow models that were developed during analysis. Like before there are 4 flow models Peer-to-peer No obvious location for peers closer to the core model Client-server Functions, features, and services are focused on the servers therefore architectural features are at these interfaces Hierarchical client-server Similar to client-server Distributed computing Data sources and sinks are obvious locations for architectural features. Prof. Shervin Shirmohammadi CEG
12 Functional Models Focus on particular functions in the network. Service-provider Focuses on privacy and security, service delivery, and billing. Intranet/extranet Typical enterprise model focusing on security and privacy. Single-tier/multitier Identifies parts of the network as having single-tier or multi-tier performance End-to-end models Are the most difficult to apply because one has to understand where each function will be located. These models will generally be fairly closely related to the requirements. Prof. Shervin Shirmohammadi CEG
13 Using the Architectural Models It is generally easier to start from the topological model because they can easily cover the larger scope of the network. On the other hand functional and flow-based models are better for focusing on a particular area of the network. Prof. Shervin Shirmohammadi CEG
14 Combining Models (1/2) Where client-server or hierarchical client-server models may overlap with the access/distribution/core model. Prof. Shervin Shirmohammadi CEG
15 Combining Models (2/2) Core Distributed Computing Model Client- Server Model Hierarchical Client-Server Model Dist. Service- Provider Model Intranet/ Extranet Model End-toend Model Access Prof. Shervin Shirmohammadi CEG
16 Example Recall from lecture Central Campus LAN P1 P1 45 P1 Servers (4) F4 North Campus LAN 51 Servers (2) F5 F6 P1 P P1 14 South Campus LAN 2 Storage Servers (2) 2 F Prof. Shervin Shirmohammadi CEG
17 Access/Distribution/Code areas Topological Model Central Campus LAN Access Core North Campus LAN Servers (2) Servers (4) 60 Access South Campus LAN 2 Storage Servers (2) Prof. Shervin Shirmohammadi CEG
18 Distributed Computing Model Flow-Based Model Central Campus LAN North Campus LAN Distributed Computing Distributed Computing P1 P1 45 P1 Servers (4) F4 51 Servers (2) F5 F6 P1 P P1 14 Distributed Computing 2 Storage Servers (2) 2 F South Campus LAN Prof. Shervin Shirmohammadi CEG
19 Architectural Considerations: Security Evaluate potential security mechanisms Consider where they apply within the network Determine external and internal relationships. Start simple and work toward more complex solutions: The access / distribution / core architectural model we discussed before can be used as a starting point to apply security points. Security can be added at different points in the architecture. Security is increased from access to distribution to core areas. External Relationships: Security & Addressing NAT is an addressing scheme that helps security. Dynamic addressing interferes with address specific filtering. Security & Network Management Security depends on Network Management Security & Performance These 2 are nearly always at odds. Security zones will affect the performance of that zone Prof. Shervin Shirmohammadi CEG
20 Access / Dist / Core & Security Level 3 Firewall Core Packet Filters Level 2 Firewall Distribution Distribution Encryption Level 1 Firewall Access Access Access Intrusion Detection Firewalls User A User B User C Prof. Shervin Shirmohammadi CEG
21 Security Zones Security Level 1: Lowest Core Security Level 3: Highest Security Level 2: Medium Distribution Distribution Access Access Access User Devices User Devices User Devices Prof. Shervin Shirmohammadi CEG
22 Developing Security Zones More realistically you will need to define security level zones for user devices, services and the network. Security Level 4: Groups A and B Network A Network B Security Level 5: Servers Network E Security Level 1: General Network G Network C Network F Security Level 2: External Network D Security Level 3: Group D External Network / Internet Prof. Shervin Shirmohammadi CEG
23 Architectural Considerations: Performance Start simple BestEffort -> DiffServ -> IntServ From the flow analysis maps you know where performance requirements need to be applied in the network. Recall that the access/distribution/core architectural model separates network based on function. Core -> bulk traffic -> aggregated Distribution -> flows to and from servers and aggregate traffic. Access -> most traffic is sources and sinked here. Performance mechanisms that operate on individual flows (admission control, resource allocation, IntServ, ATM QoS) should be considered for access. Performance mechanisms that operate on aggregated flows (DiffServ, WFQ RED/WRED, and MPLS all fit in here) should be considered for core and distribution. External Relationships: Performance and Addressing Performance is closely coupled with routing through mechanisms like DiffServ & IntServ, and RSVP. These are not simple protocols. Performance and NM Performance relies on NM to configure, monitor, manage, verify, and bill. Performance and Security Security mechanisms will affect negatively performance, especially those security mechanisms that are intrusive. If security mechanisms interrupt, terminate, or regenerate a traffic flow they seriously affect the ability to provide end-to-end QoS. Prof. Shervin Shirmohammadi CEG
24 Architectural Considerations: NM Centralized/distributed monitoring Centralized: all monitoring data are sent from one monitoring node using either in-band or out-ofband-monitoring Distributed: local monitoring nodes Less NM traffic In-band/out-of band For a LAN start with one monitoring device per IP subnet. Estimate: Number of user and network devices to be polled Average number of interfaces / device, and the number of parameters to be collected Frequency of polling This combined rate should not be more than 10% of the capacity of the line. For Ethernet keep this at 5%. For a WAN start with a monitoring device per WAN/LAN interface. Local storage vs. archival Data usually kept locally, cached for easy retrieval (within hours). If not used this quickly then archive it. Selective copying of data Consider saving only every N iteration of data. N can range from 100 to Data Migration Usually occurs at night time from local to archive Metadata Additional information about the data is very useful. Data types time stamps etc. Prof. Shervin Shirmohammadi CEG
25 Trade-offs Internal: In-band management cheaper than out-of-band but affects the traffic flow performance. Out-of-band is more reliable and allows access to remote devices. Out-of-band can be more secure. Centralized manager is simpler but is a single point of failure. External: Network Management and Addressing Management domain needs to be considered in the network architecture design. Network Management and Performance This is discussed before: how network data affects traffic flow and capacity. Network Management and Security Network management relies on a particular level of security to get access to the managed objects. Prof. Shervin Shirmohammadi CEG
Lecture 16: Architectural Considerations
Lecture 16: Architectural Considerations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 16-1 Network : high-level, end-to-end structure for the network. Relationships
More informationLecture 8: Flow Analysis
Lecture 8: Flow Analysis Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 8-1 Network Analysis Requirement Analysis Gather Requirements Develop Service Metrics
More informationLecture 14: Performance Architecture
Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance
More informationCSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service
CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have
More informationLecture 4: Introduction to Computer Network Design
Lecture 4: Introduction to Computer Network Design Instructor: Hussein Al Osman Based on Slides by: Prof. Shervin Shirmohammadi Hussein Al Osman CEG4190 4-1 Computer Networks Hussein Al Osman CEG4190 4-2
More informationIPv4 Firewall Rule configuration on Cisco SA540 Security Appliance
IPv4 Firewall Rule configuration on Cisco SA540 Security Appliance Objective The objective of this document to explain how to configure IPv4 firewall rules on Cisco SA540 Security Appliance. Firewall provide
More informationLecture 5: Foundation of Network Management
Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information
More informationTypes of Network Support for Service Quality p. 62 Capacity reservation p. 64 Differentiated treatment p. 65 Differentiation of service quality
Preface p. xi Acknowledgements p. xv List of Figures p. xvii List of Tables p. xxi Abbreviations p. xxiii Drivers for the Adoption of Multi-service Networks p. 1 Customer Perspective p. 2 Network Operator
More informationIntroduction to Computer Science (I1100) Networks. Chapter 6
Networks Chapter 6 501 Outline How does Networks and Internet Work? Networking devices Physical Network topology Types of Network Intranets - extranets Copper Media IP Address 502 How does Networks and
More informationCAS CS 556. What to expect? Background? Abraham Matta. Advanced Computer Networks. Increase understanding of fundamentals and design tradeoffs
CAS CS 556 Abraham Matta Advanced Computer Networks What to expect? Increase understanding of fundamentals and design tradeoffs Discuss latest developments and research issues Naming & addressing, routing,
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationPLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT
Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2010-2011 Arquitecturas de Redes 2 - Network Architectures 2 1
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Network Analysis: Process Part 1. Lecture 6: Prof. Shervin Shirmohammadi CEG
Lecture 6: Network Analysis: Process Part 1 Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 6-1 Overview The principles, guidelines, and procedures for requirements
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG
Lecture 17: Design Technologies Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 17-1 Design Goals From the architecture and its components and simulation, we
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG
Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data
More informationSD-WAN Transform Your Agency
Federal SD-WAN Transform Your Agency 1 Overview Is your agency facing network traffic challenges? Is migration to the secured cloud hogging scarce bandwidth? How about increased mobile computing that is
More informationCisco EXAM Designing for Cisco Internetwork Solutions. Buy Full Product.
Cisco EXAM - 640-864 Designing for Cisco Internetwork Solutions Buy Full Product http://www.examskey.com/640-864.html Examskey Cisco 640-864 exam demo product is here for you to test the quality of the
More informationChapter 8. Network Troubleshooting. Part II
Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.
More informationData Center Interconnect Solution Overview
CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility
More informationHands-On Metro Ethernet Carrier Class Networks
Hands-On Carrier Class Networks Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However customers now use Ethernet as the interface
More informationBasics (cont.) Characteristics of data communication technologies OSI-Model
48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49
More informationPassTorrent. Pass your actual test with our latest and valid practice torrent at once
PassTorrent http://www.passtorrent.com Pass your actual test with our latest and valid practice torrent at once Exam : 352-011 Title : Cisco Certified Design Expert Practical Exam Vendor : Cisco Version
More informationRSVP Scalability Enhancements
This document describes the Cisco Resource Reservation Protocol (RSVP) scalability enhancements. It identifies the supported platforms, provides configuration examples, and lists related IOS command line
More informationExpected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy
CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design
More informationEnterprise Network Design
Chapter 4 Enterprise Network Design Topics covered: Enterprise Network Design Model. Backbone design concepts. Network security and firewalls. Structured cabling systems. Case studies. Definition An enterprise
More informationS Network service provisioning
S-38.3192 Network service provisioning Initial details for S-38.3192, Jan. 18th, 2007 Mika Ilvesmäki Networking laboratory Course contents Course consists of Lectures (14), given two at a time in S3 on
More informationChapter 1. Cisco SONA and the Cisco Enterprise Architecture
Chapter 1. Cisco SONA and the Cisco Enterprise Architecture After completing this chapter, you will be able to: Explain the Cisco Service-Oriented Network Architecture (SONA) framework Describe how the
More informationTHE MPLS JOURNEY FROM CONNECTIVITY TO FULL SERVICE NETWORKS. Sangeeta Anand Vice President Product Management Cisco Systems.
THE MPLS JOURNEY FROM CONNECTIVITY TO FULL SERVICE NETWORKS Sangeeta Anand Vice President Product Management Cisco Systems October 20, 2003 1 Agenda Introducing the Full Service Network The MPLS Journey
More informationAdvanced Computer Networks
Advanced Computer Networks Ibrahim Matta What to expect? Increase understanding of fundamentals and design tradeoffs Discuss latest developments and research issues Naming & addressing, routing, connection
More informationConfiguration and Management of Networks
Configuration and Management of Networks 2013/2014 tele1.dee.fct.unl/cgr Programa Arquitecturas de Redes empresariais: Revisão dos principais tipos de rede e tecnologia associada Comutação: Domínios de
More informationQuality of Service in the Internet
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationJURUMANI MERAKI CLOUD MANAGED SECURITY & SD-WAN
JURUMANI CLOUD MANAGED SECURITY & SD-WAN SECURITY BY DESIGN OVERVIEW Cisco Meraki MX Security Appliances are ideal for organizations considering a Unified Threat Managment (UTM) solution, for distributed
More informationWAN Technology & Design. Dr. Nawaporn Wisitpongphan
WAN Technology & Design Dr. Nawaporn Wisitpongphan 1 WAN Connection Modules 2 WAN Comparison 3 Integrated Services Digital Network (ISDN) All-digital phone line connection Technology since 1980s Allow
More informationPrinciples behind data link layer services
Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!
More informationLecture 6: Network Analysis: Process Part 1
Lecture 6: Network Analysis: Process Part 1 Instructor: Hussein Al Osman Based on Slides by: Profs Makrakis and Shirmohammadi Hussein Al Osman CEG4190 6-1 Overview The principles, guidelines, and procedures
More informationPLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT
Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2010-2011 Metodologia de Projecto 4 - Project Methodology 4 1 Hierarchical
More information31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers
31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network
More informationMetro Ethernet Design and Engineering for CO
Hands-On Metro Ethernet Design and Engineering for CO Designing Carrier Networks that Deliver Metro Ethernet Services Course Description Carriers have offered connectivity services based on traditional
More informationLecture 9. Quality of Service in ad hoc wireless networks
Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement
More informationUnifying the Distributed Enterprise with MPLS Mesh
Unifying the Distributed Enterprise with MPLS Mesh Technical Whitepaper January 2015 Copyright 2015 AireSpring Introduction Today s modern enterprises employ IT technologies that deliver higher value,
More informationPrinciples behind data link layer services:
Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example
More informationPrinciples behind data link layer services:
Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example
More information1.264 Lecture 23. Telecom Enterprise networks MANs, WANs
1.264 Lecture 23 Telecom Enterprise networks MANs, WANs Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners
More informationEnterprise Network Design
Chapter 4 Enterprise Network Design Topics covered: Enterprise Network Design Model. Backbone design concepts. Network security and firewalls. Structured cabling systems. Case studies. Definition An enterprise
More informationNETWORK ARCHITECTURE
GLOBAL MPLS NETWORK ARCHITECTURE The IP backbone is designed to service connectivity for IP and IP VPN services. The backbone network provides IP connectivity between Points of Presence (POPs). The design
More informationISP and IXP Design. Point of Presence Topologies. ISP Network Design. PoP Topologies. Modular PoP Design. PoP Design INET 2000 NTW
ISP Network Design PoP Topologies and Design ISP and IXP Design Backbone Design Addressing INET 2000 NTW Routing Protocols Security Out of Band Management IXP/IXP Workshops 1999, Cisco Systems, Inc. 1
More informationFlow-Based Routing: Towards New QoS Models Dr. Riad Hartani Caspian Networks
Flow-Based Routing: Towards New QoS Models Dr. Riad Hartani Caspian Networks Agenda MPLS: status and ongoing work items Flow-based routing the technology Flow-based routing benefits Overall technology
More informationWAN Edge MPLSoL2 Service
4 CHAPTER While Layer 3 VPN services are becoming increasing popular as a primary connection for the WAN, there are a much larger percentage of customers still using Layer 2 services such Frame-Relay (FR).
More informationTDDD82 Secure Mobile Systems Lecture 6: Quality of Service
TDDD82 Secure Mobile Systems Lecture 6: Quality of Service Mikael Asplund Real-time Systems Laboratory Department of Computer and Information Science Linköping University Based on slides by Simin Nadjm-Tehrani
More informationTelecommunication Services Engineering Lab. Roch H. Glitho
1 Quality of Services 1. Terminology 2. Technologies 2 Terminology Quality of service Ability to control network performance in order to meet application and/or end-user requirements Examples of parameters
More informationTop-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined
More informationConfiguring a Zone-Based Firewall on the Cisco ISA500 Security Appliance
Application Note Configuring a Zone-Based Firewall on the Cisco ISA500 Security Appliance This application note describes how to configure a zone-based firewall on the Cisco ISA500 security appliance.
More informationTraffic Management and. QoS Issues for Large High-Speed Networks
Traffic Management and QoS Issues for Large High-Speed Networks Columbus, OH 43210 Jain@CIS.Ohio-State.Edu This presentation is available on-line: http://www.cis.ohio-state.edu/~jain/talks/nas_ipg.htm
More informationMPLS SOLUTION How to Make the Best Choice for Your Business
HOW-TO GUIDE Choosing the Right MPLS SOLUTION How to Make the Best Choice for Your Business TABLE OF CONTENTS Introduction 3 CH. 1 Why Organizations Choose MPLS 4 CH. 2 What Types of MPLS Solutions Will
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationQuality of Service In Data Networks
Quality of Service In Data Networks The Ohio State University Columbus, OH 43210 Jain@CIS.Ohio-State.Edu These slides are available on-line at http://www.cis.ohio-state.edu/~jain/cis788-99/ 1 Overview
More informationHands-On IP Multicasting for Multimedia Distribution Networks
Hands-On for Multimedia Distribution Networks Course Description This Hands-On course provides an in-depth look how IP multicasting works, its advantages and limitations and how it can be deployed to provide
More informationQuality of Service in Ultrabroadband models
Quality of Service in Ultrabroadband models Elias Aravantinos ICT Consultant, CITI Managing Director, Exelixisnet earavantinos@exelixisnet.com April 4, 2008 TELECOM ParisTech Contents 1 2 3 4 UBB & QoS
More informationTOC: Switching & Forwarding
TOC: Switching & Forwarding Why? Switching Techniques Switch Characteristics Switch Examples Switch Architectures Summary Why? Direct vs. Switched Networks: Single link Switches Direct Network Limitations:
More informationTOC: Switching & Forwarding
TOC: Switching & Forwarding Why? Switching Techniques Switch Characteristics Switch Examples Switch Architectures Summary TOC Switching Why? Direct vs. Switched Networks: n links Single link Direct Network
More informationSERVICE DESCRIPTION SD-WAN. from NTT Communications
SERVICE DESCRIPTION SD-WAN from NTT Communications 1 NTT SD-WAN Service Portfolio NTT Communications, (NTT Com s), SD-WAN service offers a new approach for deploying enterprise grade Wide Area Networks
More informationCISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)
Our Learning Exclusive Custom exam prep software and materials Exam delivery in classroom with 98% success Course specific thinqtank Learning publications to promote fun exciting learning Extended hours
More informationDifferentiated services code point (DSCP) Source or destination address
Classification is the process of identifying traffic and categorizing that traffic into classes. Classification uses a traffic descriptor to categorize a packet within a specific group to define that packet.
More informationExam Questions
Exam Questions 200-310 DESGN Designing for Cisco Internetwork Solutions https://www.2passeasy.com/dumps/200-310/ 1. What is the recommended spanning tree protocol to use for all Layer 2 deployments in
More informationBW Protection. 2002, Cisco Systems, Inc. All rights reserved.
BW Protection 2002, Cisco Systems, Inc. All rights reserved. 1 Cisco MPLS - Traffic Engineering for VPNs Amrit Hanspal Sr. Product Manager MPLS & QoS Internet Technologies Division 2 Agenda MPLS Fundamentals
More informationQuality of Service in the Internet
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationLecture 4: Basic Internet Operations
Lecture 4: Basic Internet Operations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 4-1 LAN View A LAN 2 B Hub 2 Gateway to Internet Hub 1 Z (Gateway) LAN 1
More informationCOPYRIGHTED MATERIAL. Introduction. Noman Muhammad, Davide Chiavelli, David Soldani and Man Li. 1.1 QoE value chain
1 Introduction Noman Muhammad, Davide Chiavelli, David Soldani and Man Li Browsing through the literature, one may find many different definitions for quality of end-user experience (QoE) and quality of
More informationMPLS in the DCN. Introduction CHAPTER
CHAPTER 5 First Published: January 3, 2008 Last Updated: January 3, 2008 Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images Use Cisco Feature Navigator to find information
More informationImplementing Cisco Quality of Service 2.5 (QOS)
Implementing Cisco Quality of Service 2.5 (QOS) COURSE OVERVIEW: Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as
More informationDifferentiated Services
Diff-Serv 1 Differentiated Services QoS Problem Diffserv Architecture Per hop behaviors Diff-Serv 2 Problem: QoS Need a mechanism for QoS in the Internet Issues to be resolved: Indication of desired service
More informationMulticast and Quality of Service. Internet Technologies and Applications
Multicast and Quality of Service Internet Technologies and Applications Aims and Contents Aims Introduce the multicast and the benefits it offers Explain quality of service and basic techniques for delivering
More information"Charting the Course... Implementing Cisco Quality of Service (QOS) Course Summary
Course Summary Description v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as best effort, IntServ, and DiffServ, and the implementation of QoS on Cisco platforms.
More informationQoS for Real Time Applications over Next Generation Data Networks
QoS for Real Time Applications over Next Generation Data Networks Final Project Presentation December 8, 2000 http://www.engr.udayton.edu/faculty/matiquzz/pres/qos-final.pdf University of Dayton Mohammed
More informationCredit-based Network Management
Credit-based Network Management 2009-01-06 Outline The problem of Network Management The Idea of Credit-based Network Management An Implementation in Campus Network Conclusions Network management headaches
More informationVirtual Communications Express VCE over LTE User Guide
Version 1.17 Last Updated: May 2017 2017 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon s products and services are trademarks and service
More informationEthernet Wide Area Networking, Routers or Switches and Making the Right Choice
Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice The Road To Ethernet WAN Various industry sources show trends in globalization and distribution, of employees moving towards
More informationNetworking Issues in LAN Telephony. Brian Yang
Networking Issues in LAN Telephony Brian Yang 5-3-00 Topics Some background Flow Based QoS Class Based QoS and popular algorithms Strict Priority (SP) Round-Robin (RR), Weighted Round Robin (WRR) and Weighted
More informationITTC High-Performance Networking The University of Kansas EECS 881 Architecture and Topology
High-Performance Networking The University of Kansas EECS 881 Architecture and Topology James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications
More informationLecture 10: Protocol Design
Lecture 10: Protocol Design Prof. Shervin Shirmohammadi SITE, University of Ottawa Fall 2005 CEG 4183 10-1 Introduction TCP and UDP are generic protocols: They fulfill the needs of a wide range of applications
More informationCSE 461 Quality of Service. David Wetherall
CSE 461 Quality of Service David Wetherall djw@cs.washington.edu QOS Focus: How to provide better than best effort Fair queueing Application Application needs Transport Traffic shaping Guarantees IntServ
More informationFundamentals of Windows Server 2008 Network and Applications Infrastructure
COURSE OVERVIEW This five-day instructor-led course introduces students to network and applications infrastructure concepts and configurations provided by Window Server 2008. Students will be able to acquire
More informationChapter 8: Subnetting IP Networks CCENT Routing and Switching Introduction to Networks v6.0
Chapter 8: Subnetting IP Networks CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 13 Chapter 8 - Sections & Objectives 8.1 Subnetting an IPv4 Network Explain how subnetting segments
More informationEnterprise SD-WAN Financial Profile (Hybrid WAN, Segmentation, Quality of Service, Centralized Policies)
CVP CVP Enterprise SD-WAN Financial Profile (Hybrid WAN, Segmentation, Quality of Service, Centralized Policies) 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
More informationProblems with IntServ. EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) DiffServ (cont d)
Problems with IntServ EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,
More informationQUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to a Layer 3 VPN service. In your des
Vendor: Cisco Exam Code: 352-001 Exam Name: ADVDESIGN Version: Demo www.dumpspdf.com QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to
More information"Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary
Description Course Summary The Cisco CCNA curriculum includes a third course, Interconnecting Cisco Networking Devices: Accelerated (CCNAX), consisting of Interconnecting Cisco Networking Devices, Part
More informationDifferentiated Services
1 Differentiated Services QoS Problem Diffserv Architecture Per hop behaviors 2 Problem: QoS Need a mechanism for QoS in the Internet Issues to be resolved: Indication of desired service Definition of
More informationUnderstanding VLANs. Existing Shared LAN Configurations CHAPTER
CHAPTER 1 Understanding VLANs This chapter provides an introduction to VLANs and switched internetworking, compares traditional shared LAN configurations with switched LAN configurations, and discusses
More informationMCI April Service Requirements for Layer 3 Provider Provisioned Virtual Private Networks (PPVPNs)
Network Working Group Request for Comments: 4031 Category: Informational M. Carugi, Ed. Nortel Networks D. McDysan, Ed. MCI April 2005 Service Requirements for Layer 3 Provider Provisioned Virtual Private
More information90 % of WAN decision makers cite their
WHITEPAPER So many ways to WAN How the most essential technology for distributed enterprises has evolved and where it s headed One of the most critical components to the success of any growth-oriented
More informationChapter 8: Subnetting IP Networks
Chapter 8: Subnetting IP Networks Designing, implementing and managing an effective IP addressing plan ensures that networks can operate effectively and efficiently. This is especially true as the number
More informationIntroducing Campus Networks
Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching
More informationIntroduction to Wireless Networking ECE 401WN Spring 2008
Introduction to Wireless Networking ECE 401WN Spring 2008 Lecture 2: Communication Networks The first major topic we will study will be WLANs. But before that, we need to consider a few basics of networking.
More informationChapter 5. The Network Layer. Network Layer Design Isues. Store-and-Forward Packet Switching 10/7/2010. Implementation of Connectionless Service
Network Layer Design Isues Chapter 5 The Network Layer Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented
More informationChapter 5. The Network Layer
Chapter 5 The Network Layer 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented
More informationProf. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service
Multimedia Communications Multimedia Technologies & Applications Prof. Dr. Abdulmotaleb El Saddik Multimedia Communications Research Laboratory School of Information Technology and Engineering University
More informationCOURSE PROJECT SEM ATTENTION ALL ADVANCED DIPLOMA & BACHELOR STUDENTS
COURSE PROJECT SEM 2 2014 2015 ATTENTION ALL ADVANCED DIPLOMA & BACHELOR STUDENTS The students who have pre registered for Networking Course Project are required to submit your project proposal. The titles
More informationQuality of Service Basics
Quality of Service Basics Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Content QoS requirements QoS in networks Basic QoS mechanisms QoS in IP networks IntServ
More information