This document discusses key technical goals for network design including scalability, availability, performance, security, manageability, usability, adaptability and affordability. It defines these goals and discusses important considerations for each one. For example, it explains that availability can be expressed as a percentage of uptime or as MTBF and MTTR metrics. It also emphasizes that tradeoffs between these competing goals are usually necessary for effective design.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Switching: means receiving data on a certain port and forwarding it to appropriate port transparently, just care about the next hop, so it is a layer 2 action.
Examples of Layer 2 devices: NIC, Bridge and Switch.
Hierarchical network design with access, distribution and core layers.
The benefits of the hierarchical network design.
Understanding hierarchical network design principles such as network diameter, bandwidth aggregation and redundancy.
The definition converged network.
Understanding different switch features:
1. Form Factors (Fixed, Modular and Stackable)
2. Performance (Port Density)
3. Performance (Forwarding Rates & Link Aggregation)
4. Power over Ethernet
5. L3 Functions
Access Layer Switch Features.
Distribution Layer Switch Features.
Core Layer Switch Features
Features of Cisco Catalyst Switches
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Switching: means receiving data on a certain port and forwarding it to appropriate port transparently, just care about the next hop, so it is a layer 2 action.
Examples of Layer 2 devices: NIC, Bridge and Switch.
Hierarchical network design with access, distribution and core layers.
The benefits of the hierarchical network design.
Understanding hierarchical network design principles such as network diameter, bandwidth aggregation and redundancy.
The definition converged network.
Understanding different switch features:
1. Form Factors (Fixed, Modular and Stackable)
2. Performance (Port Density)
3. Performance (Forwarding Rates & Link Aggregation)
4. Power over Ethernet
5. L3 Functions
Access Layer Switch Features.
Distribution Layer Switch Features.
Core Layer Switch Features
Features of Cisco Catalyst Switches
Techniques of achieving google quality of serviceSatya P. Joshi
Techniques of achieving google quality of service in multimedia and communication, Techniques of achieving google quality of service, Techniques of achieving google quality of service,
Resilience planning and how the empire strikes backBhakti Mehta
t is well said that "The more you sweat on the field, the less you bleed in war". Failures are an inevitable part of complex systems. Accepting that failures happen, will help you design the system's reactions to specific failures.
This talks on best practices for building resilient, stable and predictable services: preventing cascading failures, timeouts pattern, retry pattern,circuit breakers and other techniques which have been pervasively used at Blue Jeans Network. Join me in this talk which ensures that the show must go on in spite of random load, stress or other failures!
Top-Down Network Design
Analyzing Technical Goals and Tradeoffs
Copyright 2010 Cisco Press & Priscilla Oppenheimer
Technical GoalsScalabilityAvailabilityPerformanceSecurityManageabilityUsabilityAdaptabilityAffordability
Scalability: How much growth a network design must support.
Availability: The amount of time a network is available to users, often expressed as a percent uptime, or as a mean time between failure (MTBF) and mean time to repair (MTTR). Availability goals can also document any monetary cost associated with network downtime.
Security: Goals for protecting the organization's ability to conduct business without interference from intruders inappropriately accessing or damaging equipment, data, or operations. Specific security risks should be documented.
Manageability: Goals for fault, configuration, accounting, performance, and security (FCAPS) management
Usability: Goals regarding the ease with which network users can access the network and its services, including goals for simplifying user tasks related to network addressing, naming, and resource discovery.
Adaptability: The ease with which a network design and implementation can adapt to network faults, changing traffic patterns, additional business or technical requirements, new business practices, and other changes.
Affordability: The importance of containing the costs associated with purchasing and operating network equipment and services.
ScalabilityScalability refers to the ability to growSome technologies are more scalableFlat network designs, for example, don’t scale wellTry to learnNumber of sites to be addedWhat will be needed at each of these sitesHow many users will be addedHow many more servers will be added
AvailabilityAvailability can be expressed as a percent uptime per year, month, week, day, or hour, compared to the total time in that periodFor example:24/7 operationNetwork is up for 165 hours in the 168-hour weekAvailability is 98.21%Different applications may require different levelsSome enterprises may want 99.999% or “Five Nines” availability
Availability
Downtime in Minutes
4.32
1.44
.72
.01
30
10
5
.10
1577
99.70%
526
99.90%
263
99.95%
5
99.999%
Per Hour
Per Day
Per Week
Per Year
.18
.06
.03
.0006
.29
2
105
99.98%
.012
99.70% availability sounds pretty good, but it could mean that the network is down for 0.18 minutes every hour. This is 11 seconds. If those 11 seconds were spread out over the hour, nobody would notice possibly. But if there were some bug, for example, that caused the network to fail for 11 seconds every hour on the hour, people would notice. Users these days are very impatient.
Notice that 99.70% availability also could mean one catastrophic problem caused the network to be down for 1577 minutes all at once. That’s 26 hours. If it were on a Saturday and the network was never down for the rest of the year, that might actually be OK. So, you have to consider time frames with percent availability numbers.
Consider t ...
View On-Demand http://ecast.opensystemsmedia.com/403
Repeat Success, Not Mistakes; Use DDS Best Practices to Design Your Complex Distributed Systems
RTI Connext DDS is a powerful tool that lets you efficiently build and integrate complex distributed systems like no other technology – if you use it right. Be aware of how to get the most out of DDS and how to avoid common pitfalls when developing your system. We've developed RTI Connext best practices over the course of hundreds of customer projects and many years. In this webinar, you will learn how to apply the best practices we have developed to use RTI Connext DDS in ways that will enable your system to scale effectively with optimal performance, while avoiding missteps that will cause poor performance, non-determinism and scalability problems.
High performance browser networking ch1,2,3Seung-Bum Lee
Presentation material including summary of "High Performance Browser Networking" by Ilya Grigorik. This book includes very good summary of computer network not only for internet browsing but also multimedia streaming.
Resilience Planning & How the Empire Strikes BackC4Media
Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/1pGpnbd.
Bhakti Mehta approaches best practices for building resilient, stable and predictable services: preventing cascading failures, timeouts pattern, retry pattern, circuit breakers and other techniques which have been pervasively used at Blue Jeans Network. Filmed at qconsf.com.
Bhakti Mehta is the author of "RESTful Java Patterns and Best practices” and "Developing RESTful Services with JAX-RS 2.0, WebSockets, and JSON”. Bhakti is a Senior Software Engineer at Blue Jeans Network. As part of her current role, she works on developing RESTful services that can be consumed by ISV partners and the developer community.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
3. Scalability
• Scalability refers to the ability to grow
• Some technologies are more scalable
– Flat network designs, for example, don’t scale
well
• Try to learn
– Number of sites to be added
– What will be needed at each of these sites
– How many users will be added
– How many more servers will be added
4. Availability
• Availability can be expressed as a percent
uptime per year, month, week, day, or hour,
compared to the total time in that period
– For example:
• 24/7 operation
• Network is up for 165 hours in the 168-hour week
• Availability is 98.21%
• Different applications may require different
levels
• Some enterprises may want 99.999% or
“Five Nines” availability
6. 99.999% Availability May Require Triple
Redundancy
Enterprise
ISP 1 ISP 2 ISP 3
• Can the customer afford this?
7. Availability
• Availability can also be expressed as a
mean time between failure (MTBF) and
mean time to repair (MTTR)
• Availability = MTBF/(MTBF + MTTR)
– For example:
• The network should not fail more than once every
4,000 hours (166 days) and it should be fixed within
one hour
• 4,000/4,001 = 99.98% availability
8. Network Performance
• Common performance factors include
– Bandwidth
– Throughput
– Bandwidth utilization
– Offered load
– Accuracy
– Efficiency
– Delay (latency) and delay variation
– Response time
9. Bandwidth Vs. Throughput
• Bandwidth and throughput are not the same
thing
• Bandwidth is the data carrying capacity of a
circuit
• Usually specified in bits per second
• Throughput is the quantity of error free data
transmitted per unit of time
• Measured in bps, Bps, or packets per second (pps)
11. Other Factors that Affect
Throughput
• The size of packets
• Inter-frame gaps between packets
• Packets-per-second ratings of devices that forward packets
• Client speed (CPU, memory, and HD access speeds)
• Server speed (CPU, memory, and HD access speeds)
• Network design
• Protocols
• Distance
• Errors
• Time of day, etc., etc., etc.
12. Throughput Vs. Goodput
• You need to decide what you mean by
throughput
• Are you referring to bytes per second,
regardless of whether the bytes are user data
bytes or packet header bytes
– Or are you concerned with application-layer
throughput of user bytes, sometimes called
“goodput”
• In that case, you have to consider that bandwidth is
being “wasted” by the headers in every packet
13. Performance (continued)
• Efficiency
– How much overhead is required to deliver an
amount of data?
– How large can packets be?
• Larger better for efficiency (and goodput)
• But too large means too much data is lost if a packet
is damaged
• How many packets can be sent in one bunch without
an acknowledgment?
15. Delay from the User’s Point of View
• Response Time
– A function of the
application and the
equipment the
application is
running on, not just
the network
– Most users expect
to see something on
the screen in 100 to
200 milliseconds
16. Delay from the Engineer’s Point of View
• Propagation delay
– A signal travels in a cable at about 2/3 the
speed of light in a vacuum
• Transmission delay (also known as
serialization delay)
– Time to put digital data onto a transmission line
• For example, it takes about 5 ms to output a 1,024
byte packet on a 1.544 Mbps T1 line
• Packet-switching delay
• Queuing delay
17. Queuing Delay and Bandwidth Utilization
• Number of packets in a queue increases exponentially as
utilization increases
0
3
6
9
12
15
0.5 0.6 0.7 0.8 0.9 1
Average Utilization
AverageQueueDepth
18. Example
• A packet switch has 5 users, each offering
packets at a rate of 10 packets per second
• The average length of the packets is 1,024 bits
• The packet switch needs to transmit this data
over a 56-Kbps WAN circuit
– Load = 5 x 10 x 1,024 = 51,200 bps
– Utilization = 51,200/56,000 = 91.4%
– Average number of packets in queue =
(0.914)/(1-0.914) = 10.63 packets
19. Delay Variation
• The amount of time average delay varies
– Also known as jitter
• Voice, video, and audio are
intolerant of delay variation
• So forget everything we said
about maximizing packet sizes
– There are always tradeoffs
– Efficiency for high-volume applications
versus low and non-varying delay for
multimedia
20. Security
• Focus on requirements first
• Detailed security planning later (Chapter 8)
• Identify network assets
– Including their value and the expected cost associated with losing
them due to a security problem
• Analyze security risks
22. Security Risks
• Hacked network devices
– Data can be intercepted, analyzed, altered, or
deleted
– User passwords can be compromised
– Device configurations can be changed
• Reconnaissance attacks
• Denial-of-service attacks
24. Usability
• Usability: the ease of use with which network users can
access the network and services
• Networks should make users’ jobs easier
• Some design decisions will have a negative affect on
usability:
– Strict security, for example
25. Adaptability
• Avoid incorporating any design elements
that would make it hard to implement new
technologies in the future
• Change can come in the form of new
protocols, new business practices, new
fiscal goals, new legislation
• A flexible design can adapt to changing
traffic patterns and Quality of Service
(QoS) requirements
26. Affordability
• A network should carry the maximum
amount of traffic possible for a given
financial cost
• Affordability is especially important in
campus network designs
• WANs are expected to cost more, but costs
can be reduced with the proper use of
technology
– Quiet routing protocols, for example
28. Making Tradeoffs
• Scalability 20
• Availability 30
• Network performance 15
• Security 5
• Manageability 5
• Usability 5
• Adaptability 5
• Affordability 15
Total (must add up to 100) 100
29. Summary
• Continue to use a systematic, top-down
approach
• Don’t select products until you understand
goals for scalability, availability, performance,
security, manageability, usability,
adaptability, and affordability
• Tradeoffs are almost always necessary
30. Review Questions
• What are some typical technical goals for
organizations today?
• How do bandwidth and throughput differ?
• How can one improve network efficiency?
• What tradeoffs may be necessary in order to improve
network efficiency?
Editor's Notes
Scalability: How much growth a network design must support.
Availability: The amount of time a network is available to users, often expressed as a percent uptime, or as a mean time between failure (MTBF) and mean time to repair (MTTR). Availability goals can also document any monetary cost associated with network downtime.
Security: Goals for protecting the organization's ability to conduct business without interference from intruders inappropriately accessing or damaging equipment, data, or operations. Specific security risks should be documented.
Manageability: Goals for fault, configuration, accounting, performance, and security (FCAPS) management
Usability: Goals regarding the ease with which network users can access the network and its services, including goals for simplifying user tasks related to network addressing, naming, and resource discovery.
Adaptability: The ease with which a network design and implementation can adapt to network faults, changing traffic patterns, additional business or technical requirements, new business practices, and other changes.
Affordability: The importance of containing the costs associated with purchasing and operating network equipment and services.
99.70% availability sounds pretty good, but it could mean that the network is down for 0.18 minutes every hour. This is 11 seconds. If those 11 seconds were spread out over the hour, nobody would notice possibly. But if there were some bug, for example, that caused the network to fail for 11 seconds every hour on the hour, people would notice. Users these days are very impatient.
Notice that 99.70% availability also could mean one catastrophic problem caused the network to be down for 1577 minutes all at once. That’s 26 hours. If it were on a Saturday and the network was never down for the rest of the year, that might actually be OK. So, you have to consider time frames with percent availability numbers.
Consider the holy grail: 99.999% availability. That’s 5 minutes downtime per year! Be sure to explain to the customer that scheduled maintenance and upgrades don’t count! Either that or plan for a network with triple redundancy (that could be extremely expensive to implement and operate).
In the event of failure of the primary router, the secondary becomes the primary and still has a backup. Fix the previous primary and have it become the tertiary.
This helps with maintenance too. Pull out the tertiary and upgrade it. The primary still has a backup. After extensive testing, put the tertiary back in as the primary. Pull out the original primary and upgrade it. Put it back as the secondary. Finally pull out the original secondary and upgrade it.
Of course, the picture brings up all sorts of other questions because it uses an ISP example.
Does the customer have provider independent addressing?
Does the customer have an autonomous system number?
Are the ISPs really independent? Is there true circuit diversity?
Are the speeds the same on the three links to the ISPs so that performance degradation is minimized during upgrades or failures?
Can load balancing be used when all three routers are operational?
What are the routing protocols inside the enterprise network? Can traffic really get to all three routers, regardless of failures inside the enterprise network? Can the routing protocols adjust to changes?
Will traffic flow out the “closest” router? Will traffic come in from the Internet via the “closest” entry?
Instructor note: The slide is not meant to be a design recommendation! It’s just a slide to get a discussion going on the ramifications of 99.999% availability.