35
Lecture 4: Introduction to Computer Network Design Hussein Al Osman CEG4190 4-1 Instructor: Hussein Al Osman Based on Slides by: Prof. Shervin Shirmohammadi

Lecture 4: Introduction to Computer Network Design

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Lecture 4: Introduction to Computer Network Design

Lecture 4:Introduction to

Computer Network Design

Hussein Al Osman CEG4190 4-1

Computer Network Design

Instructor: Hussein Al Osman

Based on Slides by: Prof. Shervin Shirmohammadi

Page 2: Lecture 4: Introduction to Computer Network Design

Computer Networks

Hussein Al Osman CEG4190 4-2

Page 3: Lecture 4: Introduction to Computer Network Design

Background

• Network design has generally been considered an art consisting of a set of rules acquired through experience.– For example the 80/20rule where 80% of a network’s

traffic is local and 20% is remote.

Hussein Al Osman CEG4190 4-3

– “Bridge when you can, route when you must”. Based on an antiquated view that bridging was easier and cheaper.

• Network technologies and requirements have increased tremendously. There are many options available now.

Page 4: Lecture 4: Introduction to Computer Network Design

Factors that affect Network Design

• Capacity planning(a major factor in the design of the network).– Generally the solution to a problem will be “throw bandwidth to

the problem”. Sometimes and especially recently it offers some relief but it is does not solve all problems.

• Delay performance

Hussein Al Osman CEG4190 4-4

• Delay performance– Has become very important in real-time services and needs to

be optimized.

• Network Reliability, Maintainability, and Availability(RMA).– A factor that is really important for customer satisfaction.

Page 5: Lecture 4: Introduction to Computer Network Design

• A “Network” really can be thought of as of three things and they all need to be considered when working on a network design project– Connections

– Communications

– Services

The Technical View

Hussein Al Osman CEG4190 4-5

– Services

• Connections:provided by Hardware that ties things together– Wire/Fiber Transport Mechanisms

– Routers

– Switches/Hubs

– Computers

Page 6: Lecture 4: Introduction to Computer Network Design

• Communications: provided by Software– A common language for 2 systems to communicate

with each other.

– Interoperability Protocols• TCP/IP (Internet/Windows NT), IPX / SPX (Novell Netware

4), AppleTalk, etc.

The Technical View (…)

Hussein Al Osman CEG4190 4-6

4), AppleTalk, etc.

• Services: the Heart of Networking -specially important today: the Internet in particular is moving quickly from a connectionemphasis to a serviceoriented network.

• Cooperation between 2 or more systems to perform some function – Applications driven– telnet, ftp, http, SNMP, UDP, etc.

Page 7: Lecture 4: Introduction to Computer Network Design

High Level View of Network Design

Analysis Architecture

Section 1(Conceptual Model)

Section 2(Logical Model)

Section 3(Physical Model)

Hussein Al Osman CEG4190 4-7

Analysis Architecture Design

Requirements, Flows, Risks

Relationships within and between Network

FunctionsTechnology, Equipment Choices, Connectivity

Choices

Page 8: Lecture 4: Introduction to Computer Network Design

Overview of Network Analysis

• State of existing network• Problems with existing network• Network goals• Requirements from users, applications, devices

Hussein Al Osman CEG4190 4-8

Network Analysis

• Description for requirements for the network• Descriptions of traffic flows• Mappings of applications and devices to network

Page 9: Lecture 4: Introduction to Computer Network Design

Overview of Network Architecture

NetworkArchitecture

• Description for requirements for network• Descriptions of traffic flows• Mappings of applicationsand devices to network

Hussein Al Osman CEG4190 4-9

• Reference architecture for network (end to end structure).• Relationships between functions (routing, management, performance, security).• Descriptions of interactions, trade-offs, dependencies, and constraints.

Architecture

Page 10: Lecture 4: Introduction to Computer Network Design

Overview of Network Design

• Reference architecturefor network• Relationships between network functions• Descriptions of interactions, trade-offs, dependencies, and constraints.

Hussein Al Osman CEG4190 4-10

Network Design

• Physical details, evaluate and choose technologies.• Strategies for interoperability.• Evaluation criteria.

Page 11: Lecture 4: Introduction to Computer Network Design

HierarchyLevels of Hierarchy

Core

Levels of Diversity

Hussein Al Osman CEG4190 4-11

… … … … … … … … …End Users

Access

Page 12: Lecture 4: Introduction to Computer Network Design

Network - 1 Level

Hussein Al Osman CEG4190 4-12

Broadcast Domain

Flat Bridged or Switched Network: what is the problem with this?

Page 13: Lecture 4: Introduction to Computer Network Design

Network - 2 Levels

Broadcast DomainBroadcast Domain

Hussein Al Osman CEG4190 4-13

Broadcast Domain

What is the hierarchy degree?

Page 14: Lecture 4: Introduction to Computer Network Design

The Need for Diversity

Network

Flows are forced through hierarchy

Hussein Al Osman CEG4190 4-14

Network Network Network Network

NetworkNetwork

Page 15: Lecture 4: Introduction to Computer Network Design

Flows Improvement with a CDN

NetworkNetwork

Network

Hussein Al Osman CEG4190 4-15

Network Network Network Network

Content Delivery Network provides direct connectivity

CDN

Diversity (aka, Interconnectivity, akaRedundancy): interconnecting the network at different levelsto achieve desired performance.

Page 16: Lecture 4: Introduction to Computer Network Design

Network & System Complexity

4th Generation – Decision-making

3rd Generation – Services

Inte

ract

ions

Com

plex

ity Interactions

Hussein Al Osman CEG4190 4-16

2nd Generation – Interoperability

1st Generation – Connectivity

Inte

ract

ions

Com

plex

ity Interactions

Where are we today?

Page 17: Lecture 4: Introduction to Computer Network Design

Architecture & Design Defensibility• Very important and often overlooked part of network analysis and

design.– During analysis you are gathering dataand making decisions.– Details about how one got to those decisions is generally lost.– It is important to keep an audit trail.

• A set of documents, data, and decisions for the architecture and design.– This audit would answer questions like:

• Why did you choose this technology?

Hussein Al Osman CEG4190 4-17

• Why did you choose this technology?• Why does it cost this amount?

• Time spent at this phase can savelarge amount of time and resources later.

• What type of information? (Time stamp it)– Requirements(What type of Network Requirements would you expect?)– Problem definitions(There is no end to these).– Goals, Decisions– Data(What type of data?)

Page 18: Lecture 4: Introduction to Computer Network Design

A Systems Methodology• The idea is to view the network and a subset of its environment

(what it impacts or interacts with) as a system.– This primarily implies looking at the services associated with the network

(3rd generation networks).

– Interactions and dependencies between the network its users, applications, and devices arises from this analysis.

Device Device• Traditional view of a

Hussein Al Osman CEG4190 4-18

Network

Device Deviceview of a system

Network

User

Application

Device

User

Application

Device

• Better generic components of a system

Page 19: Lecture 4: Introduction to Computer Network Design

• Components help identify interfaces

User

Application

User

Application

User-Application Interface(Displays, UI)

A Systems Methodology (granularity)

Network

Application

Device

Application

Device

Application-Device Interface(API, QoS)

Device-Network Interface(Device Drivers)

Page 20: Lecture 4: Introduction to Computer Network Design

Comparison to OSI

Transport

Application

PresentationSession

User

Application

Hussein Al Osman CEG4190 4-20

Transport

Network

Data LinkPhysical

OSI System Levels

Network

Device

Page 21: Lecture 4: Introduction to Computer Network Design

Service Characteristics• Service Characteristics: individual network performance and

functional parameters that are used to describe the services.– These can be considered as requirements for the network.– E.g.:

• Providing 1.5 Mb/s peak capacity to a user• Guaranteeing a maximum RTT of 100 msec• Defining a specific security level for a group of users

User-server

Hussein Al Osman CEG4190 4-21

WAN

User-server

WAN service

LAN-WAN

Page 22: Lecture 4: Introduction to Computer Network Design

Service Metrics• Services must also be configurable, measureable, and

verifiable within the system to ensure that applications, users and devices are getting the services requested– Leads to accountingand billing

• How: using service metrics.• Service Metrics: measurements of characteristics in the actual

network to monitor, verify, and manage services.

Hussein Al Osman CEG4190 4-22

network to monitor, verify, and manage services.• Services must be described and provisioned end-to-end at all

network components between well-defined demarcationpoints.– Otherwise some components might not be capable of supporting the

services.

Page 23: Lecture 4: Introduction to Computer Network Design

Service Levels

• Service Levels: grouping of a number of service characteristics.• E.g., combining capacity (1.5 Mb/s) and reliability (99.99%

uptime).• Can be offered by service providers to customers, in packages:

– Basic (No Priority)– Gold (High Capacity)

Hussein Al Osman CEG4190 4-23

– Gold (High Capacity)– Platinum (High Capacity, Reliability, Low Delay)

Page 24: Lecture 4: Introduction to Computer Network Design

Item Examples

Characteristics Delay (100 ms)

Capacity (10 Mb/s)

RMA (99.999% Uptime)

Security (Encryption)

Grouping Characteristics into Services

Service Metrics End-to-End delay, Round-Trip delay, capacity, throughput, Buffer/Queue Utilization, priority levels.

Service Levels Basic (No Priority)

Gold (High Capacity)

Platinum (High Capacity, Reliability, Low Delay)

Page 25: Lecture 4: Introduction to Computer Network Design

System Components & Network Services (1)

Servers(4)

POS/OC-48

GigESwitch

GigESwitch

Router RouterUser PCs

(100)

GigE GigEOC-48 OC-48 FEGigE

Possible Demarcation Points

Hussein Al Osman CEG4190 4-25

Distance along transmission path

Pot

enti

al a

ggre

gate

ca

paci

ty (G

b/s)

0.1

1

10 Possible Demarcation Points

Page 26: Lecture 4: Introduction to Computer Network Design

Servers(4)

POS/OC-48

GigESwitch

GigESwitchRouter

Router UserPCs

(100)

GigE GigEOC-48 OC-48 FEGigE FEFE

Firewall FESwitch

System Components & Network Services (2)

Hussein Al Osman CEG4190 4-26

Distance along transmission path

Pot

enti

al a

ggre

gate

ca

paci

ty (G

b/s)

0.1

1

10

Page 27: Lecture 4: Introduction to Computer Network Design

Types of Network Service

• Best-effortservice– No control how the network will satisfy the service request.

Unpredictable and unreliable service with variable performance.

• Guaranteedservice– Opposite of best-effort service. Predictable and reliable.

Hussein Al Osman CEG4190 4-27

– Opposite of best-effort service. Predictable and reliable. Implies a contract between the user and the service provider.

• Predictableservice– Some degree of predictability without accountability.

Service requirements must be configurable, measurable, and verifiable. Control of the system is required.

Page 28: Lecture 4: Introduction to Computer Network Design

Best Effort Performance

• Fast Ethernet

Cap

acit

y F

ast

Eth

erne

t (M

b/s)

0

5

0

1

00ResourceLoading

CapacityAvailable

Congestion begins to load network

Hussein Al Osman CEG4190 4-28

Number of Concurrent Traffic Flows

Cap

acit

y F

ast

Eth

erne

t (M

b/s)

0

5

0

1

00

Throughput

Page 29: Lecture 4: Introduction to Computer Network Design

Guaranteed Performance

• Telephony network, with Call Admission Control (CAC)

Cap

acit

y F

ast

Eth

erne

t (M

b/s)

0

5

0

1

00

System Resources are fully loaded at this

point

ResourceLoading

Hussein Al Osman CEG4190 4-29

Number of Concurrent Traffic Flows (Calls)

Cap

acit

y F

ast

Eth

erne

t (M

b/s)

0

5

0

1

00

As calls are added resource

loading increases

No more calls allowed until resource are available

Page 30: Lecture 4: Introduction to Computer Network Design

Best Effort vs. Guaranteed

• Best Effort: allows maximum number of traffic flows, but performance degradation likely.

• Guaranteed: performance will be met, but fewer traffic flows can be accepted.

• Many applications need a hybrid of the two

Hussein Al Osman CEG4190 4-30

• Many applications need a hybrid of the two (PredictableEffort).– E.g., VoIP requires characteristics of CAC while operating

on top of best-effort Internet.

Page 31: Lecture 4: Introduction to Computer Network Design

Performance Characteristics

• Capacity– is a measure of the system’s ability to transfer information (voice, data, video, etc).

• Delay– is a measure of the time difference in the transmission of information across the system.

Hussein Al Osman CEG4190 4-31

transmission of information across the system.

• RMA – refers to Reliability, Maintainability, and Availability

Page 32: Lecture 4: Introduction to Computer Network Design

Capacity

• Bandwidth: theoretical capacity of one or more network devices or communication links in the system.– Raw capacity does not take into account overhead from higher-layer

protocols or performance loss due to device inefficiencies.

• Throughput: is the realizable capacity of the system or its network devices.

• E.g., theoretical SONET OC-3c link capacity (bandwidth) is

Hussein Al Osman CEG4190 4-32

• E.g., theoretical SONET OC-3c link capacity (bandwidth) is 155.52 Mb/s– This does not include data-link, network, or transport-layer protocol

overhead.

– Performing at line rate when T=155.52 Mb/s

• In reality, when tested with TCP, SONET OC-3c link capacity (throughput) is 80 to 128 Mb/s– Where does the majority of this overhead coming from?

Page 33: Lecture 4: Introduction to Computer Network Design

Delay

• Sources:– Propagation, transmission, queuing, and processing

• There are several ways to measure delay– Direction (end-to-end, round-trip)

– Latency– time it takes to process information and reply. E.g., response time of a network device.

Hussein Al Osman CEG4190 4-33

E.g., response time of a network device.

– Jitteror delay variation – change in delay over time. Real-time and near real-time require strict delay variation.

• Jitter is NOT delay

Page 34: Lecture 4: Introduction to Computer Network Design

RMA• Reliability: a statistical indicator of the frequency of failure of the

network.– Represents un-scheduled outages of services.– Predictable behavior – delivery of information must occur within well-

known time boundaries.

• Maintainability: a statistical measure of the time to restore the system to fully operational status after it has experienced a fault.– It is generally expressed as a mean-time-to-repair (MTTR).

Hussein Al Osman CEG4190 4-34

– It is generally expressed as a mean-time-to-repair (MTTR).

• Availability: relationship between the frequency of mission-critical failures and the time to restore the service. – Defined as the mean time between failures divided by the sum of mean time

to repair and mean time between failures:

A = (MTBF) / (MTBF + MTTR)

Page 35: Lecture 4: Introduction to Computer Network Design

Thank You!

Hussein Al Osman CEG 4190 3-35