SlideShare a Scribd company logo
1 of 29
UNIT - III
 OBJECTIVES:
 This chapter introduces flows and
flow concepts, data sources and
data sinks, and flow models will help
us to identify, size, and describe
flows.
 FLOWS:
 Flows also known as network flows
or traffic flows or data flows.
 It provides the traffic movement in
the network.
 A sequence of packets sent from a
particular source to a particular
(unicast or multicast) destination.
 FLOWS ANALYSIS:
 Flow analysis is the process of describing
/characterizing traffic flows for a
network.
 Where they are likely 2take place/occur.
 What levels of performance they will
require.
BENEFITS:
 Provides hierarchy (arrangement) levels.
 In choosing interconnection strategies
such as (switching, routing and hybrid)
mechanisms.
 Flows are represented as Unidirectional
or Bidirectional performance.
 Bidirectional :
 Unidirectional:
 It is represented as single and
double sided arrows.
 Most flows are Bi-Directional
arrows.
 Flows are important in analysis,
architecture and design process.
 TRAFFIC FLOW:
 Traffic flow is the study of
interactions between traffic
control devices and minimal
traffic congestion(packet loss)
problems.
 Flow attributes, such as
 Source/Destination address,
 Type of information,
 PORT numbers like,
▪ 21 FTP (File Transfer Protocol)
▪ 25 SMTP (Send Mail Transfer Protocol)
▪ 68 DHCP (Dynamic Host Control Protocol)
▪ 80 HTTP (Hyper-Text Transfer Protocol)
▪ 161 SNMP (Simple Network Management Protocol)
▪ 8080 HTTP
Composite
flows
Individual
flows
Flows
 It is an One-Way delay/application
requirement for a single session.
 Requirements are left with individual flow
and not consolidated with other
requirements.
 Uni-directional (UPSTREAM).
 Single applications of flows that share a
common link, path or network.
 It has guaranteed requirements.
 The combination of requirements
from multiple applications of
individual flows that share a
common link, path or network.
 Bi-directional (UPSTREAM/DOWNSTREAM).
 Most flows in a network are
composites.
 It requires high or guaranteed
performance that are operate
/control the architecture and design.
 Example:
 Mission critical(MTBF,MTBCF)
 Rate critical(PDR,SDR)
 Real critical.
 An activity, device, service or system
whose failure or problems which
interrupt an event will cause a
failure in business operations.
 For example, an online business's
mission critical.
 Mission critical refers to any factor
of a system like,
 equipment,
 process,
 procedure,
 Software
 whose failure will result in the
failure of business operations.
 Critical rate is an attribute of your
character that determines how
often you make a critical attack.
 For example,
 if your critical rate is 40% then on
average 4 out of every 10 attacks
will be a critical attack.
 Focusing on particular application
 Developing a profile
 Choosing the top N applications
 Focusing on an application
 Application group
 Device / functions.
 Profile or template can be developed
for applications.
 Each flow fits the profile identified
with profile tag.
 Profiles are used to simplify
information.
 Top 5 Applications
 Web browsing
 E-mail
 File Transfer
 Word processing
 DB transaction
 The purpose, determine which
application represent the most
important requirements for the
network.
 Data sources:
 It is used to generate the data flow.
 Represented as circle with
cross(star/asterisk).
 Two dimensional plane, arrow coming
out.
 Data sinks:
 It is used to terminate the data flow.
 The group of flows publicly display the
consistent behavior characteristics is
called as ‘flow models’.
 Useful to identify and categorize flows
in an
 Environment
 peer-to-peer
 client-server
 hierarchical client-server and
 distributed computing.
 FLOW PRIORITIZATION
 Flows can be prioritized according to
importance, based on the characteristics.
 To determine which flows get the most
resources or which flows get resources first.
 Some prioritizations include:
▪ Business objectives
▪ Political objectives
▪ RMA and QoS
▪ Security Requirements
▪ The numbers of users, applications and devices.
 It is a mechanism to combine these
performance requirements (capacity,
delay and RMA).
 To describe the optimal composite
performance for that flow or group
of flows.
 Example:
 Building and device locations
▪ Requirement analysis
▪ Flow models
▪ Flow map
THANK YOU

More Related Content

What's hot

Metadata: a library perspective
Metadata: a library perspectiveMetadata: a library perspective
Metadata: a library perspectivejody perkins
 
Interoperability Protocols and Standards in LIS
Interoperability Protocols and Standards in LISInteroperability Protocols and Standards in LIS
Interoperability Protocols and Standards in LISADINET Ahmedabad
 
Configuration Management
Configuration Management Configuration Management
Configuration Management hdicapitalarea
 
Indexing languages (2)
Indexing languages (2)Indexing languages (2)
Indexing languages (2)yhen06
 
FRSAD Functional Requirements for Subject Authority Data model
FRSAD Functional Requirements for Subject Authority Data modelFRSAD Functional Requirements for Subject Authority Data model
FRSAD Functional Requirements for Subject Authority Data modelMarcia Zeng
 
Introduction to Cataloging and Classification
Introduction to Cataloging and ClassificationIntroduction to Cataloging and Classification
Introduction to Cataloging and ClassificationIme Amor Mortel
 
Encoded Archival Description (EAD)
Encoded Archival Description (EAD) Encoded Archival Description (EAD)
Encoded Archival Description (EAD) Farris Wahbeh
 
American Libraries Live: Raise Your Data Analytics Aptitude (September 2019)
American Libraries Live: Raise Your Data Analytics Aptitude (September 2019)American Libraries Live: Raise Your Data Analytics Aptitude (September 2019)
American Libraries Live: Raise Your Data Analytics Aptitude (September 2019)ALAeLearningSolutions
 
Archival Science - Provenance, Original Order and Respect des Fonds
Archival Science - Provenance, Original Order and Respect des FondsArchival Science - Provenance, Original Order and Respect des Fonds
Archival Science - Provenance, Original Order and Respect des FondsRoxanne Peña
 
One Data Lake, Many Uses: Enabling Multi-Tenant Analytics with Amazon EMR (AN...
One Data Lake, Many Uses: Enabling Multi-Tenant Analytics with Amazon EMR (AN...One Data Lake, Many Uses: Enabling Multi-Tenant Analytics with Amazon EMR (AN...
One Data Lake, Many Uses: Enabling Multi-Tenant Analytics with Amazon EMR (AN...Amazon Web Services
 
Metadata and Tagging
Metadata and TaggingMetadata and Tagging
Metadata and Taggingpauloshea
 
SKMS - Knowledge Management - ITSM Academy Webinar
SKMS - Knowledge Management - ITSM Academy WebinarSKMS - Knowledge Management - ITSM Academy Webinar
SKMS - Knowledge Management - ITSM Academy WebinarITSM Academy, Inc.
 
Inside open metadata—the deep dive
Inside open metadata—the deep diveInside open metadata—the deep dive
Inside open metadata—the deep diveDataWorks Summit
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise AnalyticsDATAVERSITY
 
Marketing and Public Relations in an Academic Library
Marketing and Public Relations in an Academic LibraryMarketing and Public Relations in an Academic Library
Marketing and Public Relations in an Academic LibraryShanish Asuncion
 

What's hot (20)

Temporal database
Temporal databaseTemporal database
Temporal database
 
Metadata: a library perspective
Metadata: a library perspectiveMetadata: a library perspective
Metadata: a library perspective
 
Interoperability Protocols and Standards in LIS
Interoperability Protocols and Standards in LISInteroperability Protocols and Standards in LIS
Interoperability Protocols and Standards in LIS
 
Configuration Management
Configuration Management Configuration Management
Configuration Management
 
Indexing languages (2)
Indexing languages (2)Indexing languages (2)
Indexing languages (2)
 
FRSAD Functional Requirements for Subject Authority Data model
FRSAD Functional Requirements for Subject Authority Data modelFRSAD Functional Requirements for Subject Authority Data model
FRSAD Functional Requirements for Subject Authority Data model
 
Metadata
MetadataMetadata
Metadata
 
Introduction to Cataloging and Classification
Introduction to Cataloging and ClassificationIntroduction to Cataloging and Classification
Introduction to Cataloging and Classification
 
Encoded Archival Description (EAD)
Encoded Archival Description (EAD) Encoded Archival Description (EAD)
Encoded Archival Description (EAD)
 
American Libraries Live: Raise Your Data Analytics Aptitude (September 2019)
American Libraries Live: Raise Your Data Analytics Aptitude (September 2019)American Libraries Live: Raise Your Data Analytics Aptitude (September 2019)
American Libraries Live: Raise Your Data Analytics Aptitude (September 2019)
 
Archival Science - Provenance, Original Order and Respect des Fonds
Archival Science - Provenance, Original Order and Respect des FondsArchival Science - Provenance, Original Order and Respect des Fonds
Archival Science - Provenance, Original Order and Respect des Fonds
 
International Standard Bibliographic Description: background and recent devel...
International Standard Bibliographic Description: background and recent devel...International Standard Bibliographic Description: background and recent devel...
International Standard Bibliographic Description: background and recent devel...
 
One Data Lake, Many Uses: Enabling Multi-Tenant Analytics with Amazon EMR (AN...
One Data Lake, Many Uses: Enabling Multi-Tenant Analytics with Amazon EMR (AN...One Data Lake, Many Uses: Enabling Multi-Tenant Analytics with Amazon EMR (AN...
One Data Lake, Many Uses: Enabling Multi-Tenant Analytics with Amazon EMR (AN...
 
Metadata and Tagging
Metadata and TaggingMetadata and Tagging
Metadata and Tagging
 
SKMS - Knowledge Management - ITSM Academy Webinar
SKMS - Knowledge Management - ITSM Academy WebinarSKMS - Knowledge Management - ITSM Academy Webinar
SKMS - Knowledge Management - ITSM Academy Webinar
 
Reference Queries
Reference QueriesReference Queries
Reference Queries
 
Inside open metadata—the deep dive
Inside open metadata—the deep diveInside open metadata—the deep dive
Inside open metadata—the deep dive
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics
 
Marketing and Public Relations in an Academic Library
Marketing and Public Relations in an Academic LibraryMarketing and Public Relations in an Academic Library
Marketing and Public Relations in an Academic Library
 
Taxonomy Governance and Iteration
Taxonomy Governance and IterationTaxonomy Governance and Iteration
Taxonomy Governance and Iteration
 

Similar to Flow analysis overview

Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementscsk selva
 
Identifying and developing flows modified
Identifying and developing flows modifiedIdentifying and developing flows modified
Identifying and developing flows modifiedcsk selva
 
Cp7101 design and management of computer networks-flow analysis
Cp7101 design and management of computer networks-flow analysisCp7101 design and management of computer networks-flow analysis
Cp7101 design and management of computer networks-flow analysisDr Geetha Mohan
 
Software architecture unit 4
Software architecture unit 4Software architecture unit 4
Software architecture unit 4yawani05
 
Data Flow Architecture_UNIT_2.pptx
Data Flow Architecture_UNIT_2.pptxData Flow Architecture_UNIT_2.pptx
Data Flow Architecture_UNIT_2.pptxKartiksoni81
 
Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...Jennifer Daniel
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architecturescsk selva
 
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...IOSR Journals
 
SW Architecture Monolithic to SOA
SW Architecture Monolithic to SOASW Architecture Monolithic to SOA
SW Architecture Monolithic to SOARaman Kannan
 
Introduction to SOFTWARE ARCHITECTURE
Introduction to SOFTWARE ARCHITECTUREIntroduction to SOFTWARE ARCHITECTURE
Introduction to SOFTWARE ARCHITECTUREIvano Malavolta
 
Traffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie LiuTraffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie LiuMyNOG
 
9-1 Final Project Submission Network Analysis and Archit.docx
9-1 Final Project Submission Network Analysis and Archit.docx9-1 Final Project Submission Network Analysis and Archit.docx
9-1 Final Project Submission Network Analysis and Archit.docxsleeperharwell
 
2005-03-29 Web Services: ES Rationale and Assertions
2005-03-29 Web Services: ES Rationale and Assertions2005-03-29 Web Services: ES Rationale and Assertions
2005-03-29 Web Services: ES Rationale and AssertionsRudolf Husar
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSNDhaya kanthavel
 
IRJET- Adopting Encryption for Intranet File Communication System
IRJET- Adopting Encryption for Intranet File Communication SystemIRJET- Adopting Encryption for Intranet File Communication System
IRJET- Adopting Encryption for Intranet File Communication SystemIRJET Journal
 

Similar to Flow analysis overview (20)

Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
 
Identifying and developing flows modified
Identifying and developing flows modifiedIdentifying and developing flows modified
Identifying and developing flows modified
 
Cp7101 design and management of computer networks-flow analysis
Cp7101 design and management of computer networks-flow analysisCp7101 design and management of computer networks-flow analysis
Cp7101 design and management of computer networks-flow analysis
 
Software architecture unit 4
Software architecture unit 4Software architecture unit 4
Software architecture unit 4
 
Data Flow Architecture_UNIT_2.pptx
Data Flow Architecture_UNIT_2.pptxData Flow Architecture_UNIT_2.pptx
Data Flow Architecture_UNIT_2.pptx
 
Unit iii for PG PAWSN
Unit iii for PG PAWSNUnit iii for PG PAWSN
Unit iii for PG PAWSN
 
Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...
 
lec-01-WP.pdf
lec-01-WP.pdflec-01-WP.pdf
lec-01-WP.pdf
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architectures
 
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
 
SW Architecture Monolithic to SOA
SW Architecture Monolithic to SOASW Architecture Monolithic to SOA
SW Architecture Monolithic to SOA
 
Introduction to SOFTWARE ARCHITECTURE
Introduction to SOFTWARE ARCHITECTUREIntroduction to SOFTWARE ARCHITECTURE
Introduction to SOFTWARE ARCHITECTURE
 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
 
Traffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie LiuTraffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie Liu
 
Flow models
Flow modelsFlow models
Flow models
 
9-1 Final Project Submission Network Analysis and Archit.docx
9-1 Final Project Submission Network Analysis and Archit.docx9-1 Final Project Submission Network Analysis and Archit.docx
9-1 Final Project Submission Network Analysis and Archit.docx
 
2005-03-29 Web Services: ES Rationale and Assertions
2005-03-29 Web Services: ES Rationale and Assertions2005-03-29 Web Services: ES Rationale and Assertions
2005-03-29 Web Services: ES Rationale and Assertions
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
 
Ws For Aqm
Ws For AqmWs For Aqm
Ws For Aqm
 
IRJET- Adopting Encryption for Intranet File Communication System
IRJET- Adopting Encryption for Intranet File Communication SystemIRJET- Adopting Encryption for Intranet File Communication System
IRJET- Adopting Encryption for Intranet File Communication System
 

More from csk selva

Network design
Network designNetwork design
Network designcsk selva
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-Icsk selva
 
Network architecture
Network architectureNetwork architecture
Network architecturecsk selva
 
Flow spec algorithm
Flow spec algorithmFlow spec algorithm
Flow spec algorithmcsk selva
 
Thresholds and limits
Thresholds and limitsThresholds and limits
Thresholds and limitscsk selva
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysiscsk selva
 
Requirements mapping
Requirements mappingRequirements mapping
Requirements mappingcsk selva
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysiscsk selva
 
Developing supplemental performance requirements
Developing supplemental performance requirementsDeveloping supplemental performance requirements
Developing supplemental performance requirementscsk selva
 
Developing service metrics
Developing service metricsDeveloping service metrics
Developing service metricscsk selva
 
Developing rma requirements
Developing rma requirementsDeveloping rma requirements
Developing rma requirementscsk selva
 
Developing requirements specification
Developing requirements specificationDeveloping requirements specification
Developing requirements specificationcsk selva
 
Developing delay requirements
Developing delay requirementsDeveloping delay requirements
Developing delay requirementscsk selva
 
Developing capacity requirements
Developing capacity requirementsDeveloping capacity requirements
Developing capacity requirementscsk selva
 
CHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURCHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURcsk selva
 
Other requirements, requirement specification and map
Other requirements, requirement specification and mapOther requirements, requirement specification and map
Other requirements, requirement specification and mapcsk selva
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirementscsk selva
 
overview of analysis, architecture and design process
overview of analysis, architecture and design processoverview of analysis, architecture and design process
overview of analysis, architecture and design processcsk selva
 
service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...csk selva
 

More from csk selva (19)

Network design
Network designNetwork design
Network design
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Flow spec algorithm
Flow spec algorithmFlow spec algorithm
Flow spec algorithm
 
Thresholds and limits
Thresholds and limitsThresholds and limits
Thresholds and limits
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysis
 
Requirements mapping
Requirements mappingRequirements mapping
Requirements mapping
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
 
Developing supplemental performance requirements
Developing supplemental performance requirementsDeveloping supplemental performance requirements
Developing supplemental performance requirements
 
Developing service metrics
Developing service metricsDeveloping service metrics
Developing service metrics
 
Developing rma requirements
Developing rma requirementsDeveloping rma requirements
Developing rma requirements
 
Developing requirements specification
Developing requirements specificationDeveloping requirements specification
Developing requirements specification
 
Developing delay requirements
Developing delay requirementsDeveloping delay requirements
Developing delay requirements
 
Developing capacity requirements
Developing capacity requirementsDeveloping capacity requirements
Developing capacity requirements
 
CHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURCHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOUR
 
Other requirements, requirement specification and map
Other requirements, requirement specification and mapOther requirements, requirement specification and map
Other requirements, requirement specification and map
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirements
 
overview of analysis, architecture and design process
overview of analysis, architecture and design processoverview of analysis, architecture and design process
overview of analysis, architecture and design process
 
service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...
 

Recently uploaded

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

Flow analysis overview

  • 2.  OBJECTIVES:  This chapter introduces flows and flow concepts, data sources and data sinks, and flow models will help us to identify, size, and describe flows.
  • 3.  FLOWS:  Flows also known as network flows or traffic flows or data flows.  It provides the traffic movement in the network.  A sequence of packets sent from a particular source to a particular (unicast or multicast) destination.
  • 4.  FLOWS ANALYSIS:  Flow analysis is the process of describing /characterizing traffic flows for a network.  Where they are likely 2take place/occur.  What levels of performance they will require.
  • 5. BENEFITS:  Provides hierarchy (arrangement) levels.  In choosing interconnection strategies such as (switching, routing and hybrid) mechanisms.  Flows are represented as Unidirectional or Bidirectional performance.  Bidirectional :  Unidirectional:
  • 6.  It is represented as single and double sided arrows.  Most flows are Bi-Directional arrows.  Flows are important in analysis, architecture and design process.
  • 7.  TRAFFIC FLOW:  Traffic flow is the study of interactions between traffic control devices and minimal traffic congestion(packet loss) problems.
  • 8.  Flow attributes, such as  Source/Destination address,  Type of information,  PORT numbers like, ▪ 21 FTP (File Transfer Protocol) ▪ 25 SMTP (Send Mail Transfer Protocol) ▪ 68 DHCP (Dynamic Host Control Protocol) ▪ 80 HTTP (Hyper-Text Transfer Protocol) ▪ 161 SNMP (Simple Network Management Protocol) ▪ 8080 HTTP
  • 9.
  • 10.
  • 12.  It is an One-Way delay/application requirement for a single session.  Requirements are left with individual flow and not consolidated with other requirements.  Uni-directional (UPSTREAM).  Single applications of flows that share a common link, path or network.  It has guaranteed requirements.
  • 13.
  • 14.  The combination of requirements from multiple applications of individual flows that share a common link, path or network.  Bi-directional (UPSTREAM/DOWNSTREAM).  Most flows in a network are composites.
  • 15.
  • 16.  It requires high or guaranteed performance that are operate /control the architecture and design.  Example:  Mission critical(MTBF,MTBCF)  Rate critical(PDR,SDR)  Real critical.
  • 17.  An activity, device, service or system whose failure or problems which interrupt an event will cause a failure in business operations.  For example, an online business's mission critical.
  • 18.  Mission critical refers to any factor of a system like,  equipment,  process,  procedure,  Software  whose failure will result in the failure of business operations.
  • 19.  Critical rate is an attribute of your character that determines how often you make a critical attack.  For example,  if your critical rate is 40% then on average 4 out of every 10 attacks will be a critical attack.
  • 20.  Focusing on particular application  Developing a profile  Choosing the top N applications
  • 21.  Focusing on an application  Application group  Device / functions.
  • 22.  Profile or template can be developed for applications.  Each flow fits the profile identified with profile tag.  Profiles are used to simplify information.
  • 23.  Top 5 Applications  Web browsing  E-mail  File Transfer  Word processing  DB transaction  The purpose, determine which application represent the most important requirements for the network.
  • 24.  Data sources:  It is used to generate the data flow.  Represented as circle with cross(star/asterisk).  Two dimensional plane, arrow coming out.  Data sinks:  It is used to terminate the data flow.
  • 25.  The group of flows publicly display the consistent behavior characteristics is called as ‘flow models’.  Useful to identify and categorize flows in an  Environment  peer-to-peer  client-server  hierarchical client-server and  distributed computing.
  • 26.  FLOW PRIORITIZATION  Flows can be prioritized according to importance, based on the characteristics.  To determine which flows get the most resources or which flows get resources first.  Some prioritizations include: ▪ Business objectives ▪ Political objectives ▪ RMA and QoS ▪ Security Requirements ▪ The numbers of users, applications and devices.
  • 27.  It is a mechanism to combine these performance requirements (capacity, delay and RMA).  To describe the optimal composite performance for that flow or group of flows.
  • 28.  Example:  Building and device locations ▪ Requirement analysis ▪ Flow models ▪ Flow map