30
TOP-DOWN NETWORK DESIGN CHAPTER FOUR CHARACTERIZING NETWORK TRAFFIC Copyright 2010 Cisco Press & Priscilla Oppenheimer 1

Chapter04

Embed Size (px)

Citation preview

Page 1: Chapter04

TOP-DOWN NETWORK DESIGNCHAPTER FOURCHARACTERIZING NETWORK TRAFFIC

Copyright 2010 Cisco Press & Priscilla Oppenheimer

1

Page 2: Chapter04

Data source: area in a network where application layer data resides.

2

Page 3: Chapter04

NETWORK TRAFFIC FACTORS Traffic flow Location of traffic sources and data stores Traffic load Traffic behavior Quality of Service (QoS) requirements

3

Page 4: Chapter04

Characterize the behavior of existing networks. Plan for network development and expansion. Quantify network performance. Verify the quality of network service. ■ Ascribe network usage to users and applications. to measure the number of megabytes per second (MBps) between

communicating entities. To characterize the size, of a flow, use a protocol analyzer or network management system

4

Page 5: Chapter04

USER COMMUNITIESUser Community Name

Size of Community (Number of Users)

Location(s) of Community

Application(s) Used by Community

5

Page 6: Chapter04

DATA STORESData Store Location Application(s) Used by User

Community(or Communities)

6

Page 7: Chapter04

TRAFFIC FLOWDestination 1 Destination 2 Destination 3Destination MB/sec MB/secMB/sec MB/sec

Source 1

Source 2

Source 3

Source n

7

Page 8: Chapter04

TRAFFIC FLOW EXAMPLE

Administration

Business and Social Sciences

Math and Sciences

50 PCs 25 Macs50 PCs

50 PCs30 PCs

30 Library Patrons (PCs) 30 Macs and 60 PCs in Computing Center

Library and Computing Center

App 1 108 KbpsApp 2 60 KbpsApp 3 192 KbpsApp 4 48 KbpsApp 7 400 KbpsTotal 808 Kbps

App 1 48 KbpsApp 2 32 KbpsApp 3 96 KbpsApp 4 24 KbpsApp 5 300 KbpsApp 6 200 KbpsApp 8 1200 KbpsTotal 1900 Kbps

App 1 30 KbpsApp 2 20 KbpsApp 3 60 KbpsApp 4 16 KbpsTotal 126 Kbps

App 2 20 KbpsApp 3 96 KbpsApp 4 24 KbpsApp 9 80 KbpsTotal 220 Kbps

Arts and Humanities

Server Farm

10-Mbps Metro Ethernet to Internet

8

Page 9: Chapter04

TYPES OF TRAFFIC FLOW Terminal/host: Terminal/host traffic is usually asymmetric. The terminal

sends a few characters and the host sends many characters. Telnet is an example of an application that generates terminal/host traffic.

Client/server Thin client Peer-to-peer Server/server Distributed computing

9

Page 10: Chapter04

TRAFFIC FLOW FOR VOICE OVER IP

The flow associated with transmitting the audio voice is separate from the flows associated with call setup and teardown. The flow for transmitting the digital voice is essentially peer-to-peer.

Call setup and teardown is a client/server flow A phone needs to talk to a server or phone switch that

understands phone numbers, IP addresses, capabilities negotiation, and so on.

10

Page 11: Chapter04

VOIP TRAFFIC The audio voice flow between two IP endpoints is carried by the Real-Time

Transport Protocol (RTP), which is a connectionless protocol that runs on top of UDP.

The main call setup, teardown, and control protocols in an IP network are H.323, the Cisco Skinny Client Control Protocol (SCCP), Simple Gateway Control Protocol (SGCP), Media Gateway Control Protocol (MGCP), and Session Initiation Protocol (SIP).

These signaling protocols run between an IP endpoint and a voice-enabled server and follow the client/server paradigm.

11

Page 12: Chapter04

Private branch exchanges (PBX) and circuit switching, and modern VoIP networks, which use packet switching, must handle two fundamental functions: call control and call switching.

Call Control: handles call setup and teardown, addressing and routing, and informational and supplementary services.

A fundamental job of call control is to compare the digits dialed by the user making a call to configured number patterns to determine how to route a call.

Call switching handles the actual switching of calls. In traditional voice networks, when a call is placed, a PBX connects the calling phone via a so-called line-side interface to another phone’s line-side interface.

If the call is destined for the public switched telephone network (PSTN), the call switching function connects the line-side interface with the trunk-side interface.

May have different path from that used by the call control packets

12

Page 13: Chapter04

NETWORK APPLICATIONSTRAFFIC CHARACTERISTICS

Name of Application

Type of Traffic Flow

Protocol(s) Used by Application

User Communities That Use the Application

Data Stores (Servers, Hosts, and so on)

Approximate Bandwidth Requirements

QoS Requirements

13

Page 14: Chapter04

TRAFFIC LOAD To calculate whether capacity is sufficient, you should

know: The number of stations The average time that a station is idle between sending

frames The time required to transmit a message once medium

access is gained That level of detailed information can be hard to gather,

however

14

Page 15: Chapter04

HOW TO AVOID BOTTLENECKS research application-usage patterns, idle times between packets and

sessions, frame sizes, and other traffic behavioral patterns for application and system protocols.

Another approach to avoiding bottlenecks is simply to throw large amounts of bandwidth at the problem (also known as overprovisioning).

15

Page 16: Chapter04

DOCUMENTING APPLICATION-USAGE PATTERNS identify user communities, the number of users in the communities, and

the applications the users employ. To predict the aggregate bandwidth requirement for all users of an

application document the following information: The frequency of application sessions (number of sessions per day, week,

month, or whatever time period is appropriate) The length of an average application session The number of simultaneous users of an application

16

Page 17: Chapter04

DOCUMENTING APPLICATION-USAGE PATTERNS If it is not practical to research these details, you can make some assumptions: The number of users of an application equals the number of simultaneous users.

All applications are used all the time, so that your bandwidth calculation is a worst case (peak) estimate.

Each user opens just one session, and that session lasts all day until the user shuts down the application at the end of the day

17

Page 18: Chapter04

REFINING ESTIMATES OF TRAFFIC LOAD CAUSED BY APPLICATIONS research the size of data objects:

Sent by applications The overhead caused by protocol layers Any additional load caused by application initialization. (Some applications send

much more traffic during initialization than during steady-state operation.) hard to accurately estimate the average size of data objects that users

transfer to each other and to servers; it depends it’s difficult to make any generalizations about the average size of objects

sent on a network. which protocols an application uses

18

Page 19: Chapter04

19

Page 20: Chapter04

SIZE OF OBJECTS ON NETWORKS Terminal screen: 4 Kbytes Simple e-mail: 10 Kbytes Simple web page: 50 Kbytes High-quality image: 50,000 Kbytes Database backup: 1,000,000 Kbytes or more

20

Page 21: Chapter04

IN ADDITION TO APPLICATIONS THAT ARE SET TO START UPONBOOTUP, THE FOLLOWING SYSTEM-LEVEL PROTOCOLS SEND PACKETS AS A WORKSTATION INITIALIZES:Address Resolution Protocol (ARP)■ Dynamic Host Configuration Protocol (DHCP)■ Internet Control Message Protocol (ICMP), version 4 and 6■ Internet Group Management Protocol (IGMP), version 4 and 6■ Domain Name System (DNS)■ Multicast DNS (mDNS)■ NetBIOS name queries■ Network Time Protocol (NTP)■ Simple Service Discovery Protocol (SSDP)■ Service Location Protocol (SLP)■ Simple Network Management Protocol (SNMP)

21

Page 22: Chapter04

ESTIMATING TRAFFIC LOAD CAUSED BY ROUTING PROTOCOLS Router with large-distance vector routing table uses significant amount of

WAN bandwidth RIP

Each route in the packet uses 20 bytes 25 routes per packet Sends one or more 532-byte packets every 30 seconds depending on the size of

the routing table. Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing

Protocol (EIGRP), use little bandwidth.

22

Page 23: Chapter04

TRAFFIC BEHAVIOR Broadcasts

All ones data-link layer destination address FF: FF: FF: FF: FF: FF

Doesn’t necessarily use huge amounts of bandwidth But does disturb every CPU in the broadcast domain

Multicasts First bit sent is a one

01:00:0C:CC:CC:CC (Cisco Discovery Protocol) Should just disturb NICs that have registered to

receive it Requires multicast routing protocol on internetworks

23

Page 24: Chapter04

BROADCASTING Scalability problem Use of routers Use of VLANs Too many broadcast frames can overwhelm end stations, switches, and

routers. broadcast radiation: to describe the effect of broadcasts spreading from

the sender to all other devices in a broadcast domain. Broadcast radiation can degrade performance at network endpoints

24

Page 25: Chapter04

NETWORK EFFICIENCY Efficiency refers to whether applications and protocols use bandwidth

effectively Frame size

use the largest possible maximum transmission unit (MTU). MTU can be configured for some applications avoid fragmentation and reassembly of frames in IP environments; degrades

performance MTU discovery

Protocol interaction Windowing and flow control

Send window Receive window CPU power and memory Some IP-based applications run on top of UDP, not TCP; no flow control, no

handling Ping pong protocols

Error-recovery mechanisms Retransmission without ack. SAck

25

Page 26: Chapter04

QOS REQUIREMENTS ATM service specifications

Constant bit rate (CBR) Realtime variable bit rate (rt-VBR) Non-realtime variable bit rate (nrt-VBR) Unspecified bit rate (UBR) Available bit rate (ABR) Guaranteed frame rate (GFR)

26

Page 27: Chapter04

QOS REQUIREMENTS PER IETF IETF integrated services working group specifications

Controlled load service Provides client data flow with a QoS closely approximating the QoS that same flow would

receive on an unloaded network Guaranteed service

Provides firm (mathematically provable) bounds on end-to-end packet-queuing delays

27

Page 28: Chapter04

QOS REQUIREMENTS PER IETF IETF differentiated services working group specifications

RFC 2475 IP packets can be marked with a differentiated services codepoint (DSCP) to

influence queuing and packet-dropping decisions for IP datagrams on an output interface of a router

28

Page 29: Chapter04

SUMMARY Continue to use a systematic, top-down approach Don’t select products until you understand network traffic in

terms of: Flow Load Behavior QoS requirements

29

Page 30: Chapter04

REVIEW QUESTIONSList and describe six different types of traffic flows.

What makes traffic flow in voice over IP networks challenging to characterize and plan for?

Why should you be concerned about broadcast traffic?

How do ATM and IETF specifications for QoS differ?

30