SlideShare a Scribd company logo
1 of 24
CP7101 – DESIGN AND MANAGEMENT OF 
COMPUTER NETWORKS 
CSK / OXFORD ENGINEERING COLLEGE 
Department of Information Technology
Course content 
 Service methodology 
 System description 
 Service description 
 Service characteristics 
 Performance Characteristics 
 Network supportability
Service methodology 
 It is the activity of planning and organizing people, communication and 
material components of a service in order to improve its quality and the 
interaction between service provider and customers. 
 we can explain our service methodology simply with the steps given 
below 
 information gathering : collecting information. 
 problem analysis: finding solutions to problems. 
 planning & designing: network planning(long-term and medium-term 
short-term) an iterative process, composing( topological design) 
 defining service level targets(1 year/ 3 year / 5 year) 
 responsibilities and other specific requirements to manage the service. 
 service level requirements(slr) : from a customer to a service provider 
describing their service expectations. 
 a service provider prepares a service level agreement (sla) based on 
the requirements from the customer. 
 Development & testing. 
 maintenance and modification.
system descriptions 
 A system is a set of components that work together to 
provide connectivity, services and communications to 
users. 
Components of system includes: 
 Users, hosts (PCs, laptops, handhelds). 
 Devices : routers & switches. 
 Links (wired, wireless). 
 Protocols (IP, TCP,FTP,SNMP). 
 Applications (E-mail, Remote login (Telnet) ,P2P file sharing, 
Client/Server.
Service description 
The organization has been developing service 
descriptions for IP networks. 
 IP networks : communication protocol. 
 Encapsulated packet structures.(sends packet) 
 Responsible for addressing hosts(source to destination). 
 Version: (IPv4) – decimal (192.168.2.253) 
 subnet mask: 255 255 255 0(class D) 
 IP ranges: Cla s s A, Cla s s B, Cla s s C, Cla s s D.
Service description 
We can look at this from two perspectives: 
 Le ve ls o f p e rfo rm a nc e a nd 
 Functions in the network. 
 Levels of performance are described as 
RMA (, Reliability, Maintainability, and Availability) 
 s y s te m d e s ig n a ttribute s . 
Re lia bility : to perform its required functions under stated conditions for 
a specified period of time.(work simultaneously) 
Ma inta ina bility : is us e d to m a inte na nc e the s y s te m s uch a s , repair or 
replace faulty, prevent unexpected breakdowns. 
Ava ila bility : to describe the amount of period that the system 
resources is available.
Service description 
 Functions are described as 
 Accounting: to provide information about users 
and their network resource usage(user accounts-login 
details). 
 Billing: Creating an invoice related to the use of 
infrastructure and services(inbound/ outbound). 
 Scheduling: processes or data flows are given 
access to system resources (e.g. processor time, 
communications) 
 Management: coordinates the efforts of system to 
accomplish goals and objectives. 
 Security: give protection.
Service description 
 Network services in most of today’s networks 
are based on best-effort (unpredictable) 
delivery. 
 Network services are (hierarchical service 
characteristics, and individual service 
characteristics) can be grouped together to 
form higher-level descriptions of a service.
Service characteristics 
 One of the goals of network analysis is to be 
able to characterize(give better) services so 
that they can be designed into the network 
and purchased from vendors and service 
providers. 
 Se rvic e cha ra c te ris tic s a re ind ividua l network 
performance and functional parameters that 
are used to describe services.
Service characteristics 
 Service characteristics contains: 
 Service levels 
 System Components and Network 
Services 
 Service Requests & Requirements 
 Performance Characteristics 
 Service levels 
 System Components and Network Services. 
 Service Requests & Requirements.(user requirements, 
application requirements, device requirements, and network 
requirements.) 
 Service offerings(Service offerings map to service requests and 
thus can also be categorized as best effort, predictable, or 
guaranteed.) 
 Service metrics/activities.
Service levels 
 Service characteristics can be grouped together 
to form one or more service levels for the 
network. 
 There are many ways to describe service levels, 
including: 
 committed information rates (CIRs); 
 levels of capacity; 
 classes of service (CoSs); 
 delay and capacity characteristics; 
 types of service (ToSs); 
 qualities of service (QoSs);
Service Requests & Requirements 
 Service requests and requirements are, in part, 
distinguished by the degree of predictability 
needed from the service by the user, 
application, or device making the request. 
 Based on their predictability, service requests 
are categorized as best effort, predictable, or 
guaranteed. 
 Best-effort service means that there is no 
control over how the network will satisfy the 
service request—that there are no guarantees 
associated with this service.
Service Requests & 
Requirements 
 Guaranteed service: 
 provides an assured level of bandwidth, with a firm end-to-end 
delay bound and no queuing loss for conforming packets 
of a data flow. 
 predictable services: 
 can provide services of predictable communication to 
applications 
 makes the development of new ones like an expensive and risky
Service Requests & 
Requirements 
 For service performance requirements and characteristics to be 
useful, they must be configurable, measurable, and verifiable within 
the system. 
 Therefore, performance requirements and characteristics were 
described in terms of service metrics(measurements), which are 
intended to be: 
 configurable, set a value for threshold/doorstep and limit 
 measurable, by monitoring current state value.
Performance Characteristics 
 Services may include one or more of the performance 
characteristics: 
 Capacity: is used as a label for the class of 
characteristics that involves moving information from 
place to place, including bandwidth, throughput, and so 
forth. 
 Delay: is a label for the class of characteristics that 
includes end-to-end delay, round-trip delay, and delay 
variation. 
 RMA: is a label for the class of characteristics that 
includes reliability, maintainability, and availability
Performance Characteristics 
 Performance requirements can be combined 
to describe a performance range for the system. 
 A performance envelope is a combination of 
two or more performance requirements, with 
thresholds and upper and/or lower limits for each. 
 Availability: Deals with the duration of up-time for operations and is 
a measure of how often the system is alive and well. 
 Throughput: 
 the amount of work that a computer can do in a given time period 
 the amount of processed data in communication networks. 
 throughput is the rate at which a system achieves its goal. 
 Utilization : Network utilization is the ratio of current network traffic 
to the maximum traffic that the port can handle. 
 Delay: the period or amount of time during which something 
is delayed
Network Supportability 
 Good network architects/designers take into 
account the major factors that affect operability 
and supportability as they make their decisions. 
 The post-implementation phases of a network’s 
life cycle can be broken into three elements: 
 operations, 
 maintenance, and 
 human knowledge.
Network Supportability 
 Key characteristics of a network architecture 
and design that affect the post-implementation 
costs include: 
 Network and system reliability 
 Network and system maintainability 
 Training of the operators to stay within operational 
 constraints 
 Quality of the staff required to perform maintenance 
actions
THANK 
YOU

More Related Content

What's hot

Object Oriented Design in Software Engineering SE12
Object Oriented Design in Software Engineering SE12Object Oriented Design in Software Engineering SE12
Object Oriented Design in Software Engineering SE12koolkampus
 
Ch:2 The Physical Layer
Ch:2 The Physical LayerCh:2 The Physical Layer
Ch:2 The Physical LayerMubashir Yasin
 
Network design
Network designNetwork design
Network designcsk selva
 
Lecture11 use case sequence diagram
Lecture11 use case sequence diagramLecture11 use case sequence diagram
Lecture11 use case sequence diagramShahid Riaz
 
Lecture 9 understanding requirements
Lecture 9   understanding requirementsLecture 9   understanding requirements
Lecture 9 understanding requirementsIIUI
 
Basic Structural Modeling
Basic Structural ModelingBasic Structural Modeling
Basic Structural ModelingAMITJain879
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureManoj Kumar
 
enterprise network design architecture
enterprise network design architectureenterprise network design architecture
enterprise network design architectureAmir Hossain
 
Communication diagram Introduction
Communication diagram IntroductionCommunication diagram Introduction
Communication diagram IntroductionDineesha Suraweera
 
Quality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design PatternsQuality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design PatternsGatte Ravindranath
 
10 component diagram
10 component diagram10 component diagram
10 component diagramBaskarkncet
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer NetworksGhaffar Khan
 
Unified modelling language (UML)
Unified modelling language (UML)Unified modelling language (UML)
Unified modelling language (UML)Hirra Sultan
 
Architectural Patterns - Interactive and Event Handling Patterns
Architectural Patterns  - Interactive and Event Handling PatternsArchitectural Patterns  - Interactive and Event Handling Patterns
Architectural Patterns - Interactive and Event Handling Patternsassinha
 

What's hot (20)

Object Oriented Design in Software Engineering SE12
Object Oriented Design in Software Engineering SE12Object Oriented Design in Software Engineering SE12
Object Oriented Design in Software Engineering SE12
 
Ch:2 The Physical Layer
Ch:2 The Physical LayerCh:2 The Physical Layer
Ch:2 The Physical Layer
 
Network design
Network designNetwork design
Network design
 
Lecture11 use case sequence diagram
Lecture11 use case sequence diagramLecture11 use case sequence diagram
Lecture11 use case sequence diagram
 
5 architecture
5 architecture5 architecture
5 architecture
 
Intruders
IntrudersIntruders
Intruders
 
Network software
Network softwareNetwork software
Network software
 
Lecture 9 understanding requirements
Lecture 9   understanding requirementsLecture 9   understanding requirements
Lecture 9 understanding requirements
 
Basic Structural Modeling
Basic Structural ModelingBasic Structural Modeling
Basic Structural Modeling
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Types and roles
Types and rolesTypes and roles
Types and roles
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
enterprise network design architecture
enterprise network design architectureenterprise network design architecture
enterprise network design architecture
 
Communication diagram Introduction
Communication diagram IntroductionCommunication diagram Introduction
Communication diagram Introduction
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Quality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design PatternsQuality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design Patterns
 
10 component diagram
10 component diagram10 component diagram
10 component diagram
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Unified modelling language (UML)
Unified modelling language (UML)Unified modelling language (UML)
Unified modelling language (UML)
 
Architectural Patterns - Interactive and Event Handling Patterns
Architectural Patterns  - Interactive and Event Handling PatternsArchitectural Patterns  - Interactive and Event Handling Patterns
Architectural Patterns - Interactive and Event Handling Patterns
 

Similar to service methodology, service description, service characteristics, performance characteristics, network supportability

16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSNDhaya kanthavel
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementscsk selva
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirementscsk selva
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysiscsk selva
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White PaperBrian Hedstrom
 
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsApplications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsTal Lavian Ph.D.
 
Other requirements, requirement specification and map
Other requirements, requirement specification and mapOther requirements, requirement specification and map
Other requirements, requirement specification and mapcsk selva
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Nir Cohen
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Nir Cohen
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
 
Odca interop across_clouds_standard units of measurement for iaa_s
Odca interop across_clouds_standard units of measurement for iaa_sOdca interop across_clouds_standard units of measurement for iaa_s
Odca interop across_clouds_standard units of measurement for iaa_sSeanscs
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkDr Geetha Mohan
 
Infrastructure of E- commerce and Issues of e-commerce infrastructure
Infrastructure of E- commerce and Issues of e-commerce infrastructureInfrastructure of E- commerce and Issues of e-commerce infrastructure
Infrastructure of E- commerce and Issues of e-commerce infrastructurePrince Sharma
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptxEbukaChikodi
 
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES ijwscjournal
 
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES ijwscjournal
 
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES ijwscjournal
 
Developing service metrics
Developing service metricsDeveloping service metrics
Developing service metricscsk selva
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET Journal
 

Similar to service methodology, service description, service characteristics, performance characteristics, network supportability (20)

16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirements
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysis
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White Paper
 
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsApplications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
 
Other requirements, requirement specification and map
Other requirements, requirement specification and mapOther requirements, requirement specification and map
Other requirements, requirement specification and map
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
 
Odca interop across_clouds_standard units of measurement for iaa_s
Odca interop across_clouds_standard units of measurement for iaa_sOdca interop across_clouds_standard units of measurement for iaa_s
Odca interop across_clouds_standard units of measurement for iaa_s
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
 
Infrastructure of E- commerce and Issues of e-commerce infrastructure
Infrastructure of E- commerce and Issues of e-commerce infrastructureInfrastructure of E- commerce and Issues of e-commerce infrastructure
Infrastructure of E- commerce and Issues of e-commerce infrastructure
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptx
 
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
 
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
 
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
 
In
InIn
In
 
Developing service metrics
Developing service metricsDeveloping service metrics
Developing service metrics
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
 

More from csk selva

Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architecturescsk selva
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-Icsk selva
 
Identifying and developing flows modified
Identifying and developing flows modifiedIdentifying and developing flows modified
Identifying and developing flows modifiedcsk selva
 
Flow spec algorithm
Flow spec algorithmFlow spec algorithm
Flow spec algorithmcsk selva
 
Thresholds and limits
Thresholds and limitsThresholds and limits
Thresholds and limitscsk selva
 
Requirements mapping
Requirements mappingRequirements mapping
Requirements mappingcsk selva
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysiscsk selva
 
Developing supplemental performance requirements
Developing supplemental performance requirementsDeveloping supplemental performance requirements
Developing supplemental performance requirementscsk selva
 
Developing rma requirements
Developing rma requirementsDeveloping rma requirements
Developing rma requirementscsk selva
 
Developing requirements specification
Developing requirements specificationDeveloping requirements specification
Developing requirements specificationcsk selva
 
Developing delay requirements
Developing delay requirementsDeveloping delay requirements
Developing delay requirementscsk selva
 
Developing capacity requirements
Developing capacity requirementsDeveloping capacity requirements
Developing capacity requirementscsk selva
 
CHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURCHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURcsk selva
 

More from csk selva (14)

Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architectures
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
Identifying and developing flows modified
Identifying and developing flows modifiedIdentifying and developing flows modified
Identifying and developing flows modified
 
Flow spec algorithm
Flow spec algorithmFlow spec algorithm
Flow spec algorithm
 
Flow models
Flow modelsFlow models
Flow models
 
Thresholds and limits
Thresholds and limitsThresholds and limits
Thresholds and limits
 
Requirements mapping
Requirements mappingRequirements mapping
Requirements mapping
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
 
Developing supplemental performance requirements
Developing supplemental performance requirementsDeveloping supplemental performance requirements
Developing supplemental performance requirements
 
Developing rma requirements
Developing rma requirementsDeveloping rma requirements
Developing rma requirements
 
Developing requirements specification
Developing requirements specificationDeveloping requirements specification
Developing requirements specification
 
Developing delay requirements
Developing delay requirementsDeveloping delay requirements
Developing delay requirements
 
Developing capacity requirements
Developing capacity requirementsDeveloping capacity requirements
Developing capacity requirements
 
CHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURCHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOUR
 

Recently uploaded

LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNtntlai16
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityHung Le
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxlionnarsimharajumjf
 
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiCall Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiPriya Reddy
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxthusosetemere
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESfuthumetsaneliswa
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.thamaeteboho94
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...ZurliaSoop
 
Lions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptxLions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptxlionnarsimharajumjf
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathphntsoaki
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20rejz122017
 

Recently uploaded (20)

LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptx
 
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiCall Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
Lions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptxLions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptx
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth death
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20
 

service methodology, service description, service characteristics, performance characteristics, network supportability

  • 1. CP7101 – DESIGN AND MANAGEMENT OF COMPUTER NETWORKS CSK / OXFORD ENGINEERING COLLEGE Department of Information Technology
  • 2. Course content  Service methodology  System description  Service description  Service characteristics  Performance Characteristics  Network supportability
  • 3. Service methodology  It is the activity of planning and organizing people, communication and material components of a service in order to improve its quality and the interaction between service provider and customers.  we can explain our service methodology simply with the steps given below  information gathering : collecting information.  problem analysis: finding solutions to problems.  planning & designing: network planning(long-term and medium-term short-term) an iterative process, composing( topological design)  defining service level targets(1 year/ 3 year / 5 year)  responsibilities and other specific requirements to manage the service.  service level requirements(slr) : from a customer to a service provider describing their service expectations.  a service provider prepares a service level agreement (sla) based on the requirements from the customer.  Development & testing.  maintenance and modification.
  • 4.
  • 5. system descriptions  A system is a set of components that work together to provide connectivity, services and communications to users. Components of system includes:  Users, hosts (PCs, laptops, handhelds).  Devices : routers & switches.  Links (wired, wireless).  Protocols (IP, TCP,FTP,SNMP).  Applications (E-mail, Remote login (Telnet) ,P2P file sharing, Client/Server.
  • 6.
  • 7. Service description The organization has been developing service descriptions for IP networks.  IP networks : communication protocol.  Encapsulated packet structures.(sends packet)  Responsible for addressing hosts(source to destination).  Version: (IPv4) – decimal (192.168.2.253)  subnet mask: 255 255 255 0(class D)  IP ranges: Cla s s A, Cla s s B, Cla s s C, Cla s s D.
  • 8. Service description We can look at this from two perspectives:  Le ve ls o f p e rfo rm a nc e a nd  Functions in the network.  Levels of performance are described as RMA (, Reliability, Maintainability, and Availability)  s y s te m d e s ig n a ttribute s . Re lia bility : to perform its required functions under stated conditions for a specified period of time.(work simultaneously) Ma inta ina bility : is us e d to m a inte na nc e the s y s te m s uch a s , repair or replace faulty, prevent unexpected breakdowns. Ava ila bility : to describe the amount of period that the system resources is available.
  • 9. Service description  Functions are described as  Accounting: to provide information about users and their network resource usage(user accounts-login details).  Billing: Creating an invoice related to the use of infrastructure and services(inbound/ outbound).  Scheduling: processes or data flows are given access to system resources (e.g. processor time, communications)  Management: coordinates the efforts of system to accomplish goals and objectives.  Security: give protection.
  • 10. Service description  Network services in most of today’s networks are based on best-effort (unpredictable) delivery.  Network services are (hierarchical service characteristics, and individual service characteristics) can be grouped together to form higher-level descriptions of a service.
  • 11.
  • 12. Service characteristics  One of the goals of network analysis is to be able to characterize(give better) services so that they can be designed into the network and purchased from vendors and service providers.  Se rvic e cha ra c te ris tic s a re ind ividua l network performance and functional parameters that are used to describe services.
  • 13. Service characteristics  Service characteristics contains:  Service levels  System Components and Network Services  Service Requests & Requirements  Performance Characteristics  Service levels  System Components and Network Services.  Service Requests & Requirements.(user requirements, application requirements, device requirements, and network requirements.)  Service offerings(Service offerings map to service requests and thus can also be categorized as best effort, predictable, or guaranteed.)  Service metrics/activities.
  • 14. Service levels  Service characteristics can be grouped together to form one or more service levels for the network.  There are many ways to describe service levels, including:  committed information rates (CIRs);  levels of capacity;  classes of service (CoSs);  delay and capacity characteristics;  types of service (ToSs);  qualities of service (QoSs);
  • 15.
  • 16. Service Requests & Requirements  Service requests and requirements are, in part, distinguished by the degree of predictability needed from the service by the user, application, or device making the request.  Based on their predictability, service requests are categorized as best effort, predictable, or guaranteed.  Best-effort service means that there is no control over how the network will satisfy the service request—that there are no guarantees associated with this service.
  • 17. Service Requests & Requirements  Guaranteed service:  provides an assured level of bandwidth, with a firm end-to-end delay bound and no queuing loss for conforming packets of a data flow.  predictable services:  can provide services of predictable communication to applications  makes the development of new ones like an expensive and risky
  • 18. Service Requests & Requirements  For service performance requirements and characteristics to be useful, they must be configurable, measurable, and verifiable within the system.  Therefore, performance requirements and characteristics were described in terms of service metrics(measurements), which are intended to be:  configurable, set a value for threshold/doorstep and limit  measurable, by monitoring current state value.
  • 19. Performance Characteristics  Services may include one or more of the performance characteristics:  Capacity: is used as a label for the class of characteristics that involves moving information from place to place, including bandwidth, throughput, and so forth.  Delay: is a label for the class of characteristics that includes end-to-end delay, round-trip delay, and delay variation.  RMA: is a label for the class of characteristics that includes reliability, maintainability, and availability
  • 20. Performance Characteristics  Performance requirements can be combined to describe a performance range for the system.  A performance envelope is a combination of two or more performance requirements, with thresholds and upper and/or lower limits for each.  Availability: Deals with the duration of up-time for operations and is a measure of how often the system is alive and well.  Throughput:  the amount of work that a computer can do in a given time period  the amount of processed data in communication networks.  throughput is the rate at which a system achieves its goal.  Utilization : Network utilization is the ratio of current network traffic to the maximum traffic that the port can handle.  Delay: the period or amount of time during which something is delayed
  • 21.
  • 22. Network Supportability  Good network architects/designers take into account the major factors that affect operability and supportability as they make their decisions.  The post-implementation phases of a network’s life cycle can be broken into three elements:  operations,  maintenance, and  human knowledge.
  • 23. Network Supportability  Key characteristics of a network architecture and design that affect the post-implementation costs include:  Network and system reliability  Network and system maintainability  Training of the operators to stay within operational  constraints  Quality of the staff required to perform maintenance actions