SlideShare a Scribd company logo
Top-Down Network Design
Chapter Two
Analyzing Technical Goals and Tradeoffs
Copyright 2010 Cisco Press & Priscilla Oppenheimer
Technical Goals
• Scalability
• Availability
• Performance
• Security
• Manageability
• Usability
• Adaptability
• Affordability
Scalability
• Scalability refers to the ability to grow
• Some technologies are more scalable
– Flat network designs, for example, don’t scale
well
• Try to learn
– Number of sites to be added
– What will be needed at each of these sites
– How many users will be added
– How many more servers will be added
Availability
• Availability can be expressed as a percent
uptime per year, month, week, day, or hour,
compared to the total time in that period
– For example:
• 24/7 operation
• Network is up for 165 hours in the 168-hour week
• Availability is 98.21%
• Different applications may require different
levels
• Some enterprises may want 99.999% or
“Five Nines” availability
Availability
Downtime in Minutes
4.32
1.44
.72
.01
30
10
5
.10
157799.70%
52699.90%
26399.95%
599.999%
Per Hour Per Day Per Week Per Year
.18
.06
.03
.0006
.29 2 10599.98% .012
99.999% Availability May Require Triple
Redundancy
Enterprise
ISP 1 ISP 2 ISP 3
• Can the customer afford this?
Availability
• Availability can also be expressed as a
mean time between failure (MTBF) and
mean time to repair (MTTR)
• Availability = MTBF/(MTBF + MTTR)
– For example:
• The network should not fail more than once every
4,000 hours (166 days) and it should be fixed within
one hour
• 4,000/4,001 = 99.98% availability
Network Performance
• Common performance factors include
– Bandwidth
– Throughput
– Bandwidth utilization
– Offered load
– Accuracy
– Efficiency
– Delay (latency) and delay variation
– Response time
Bandwidth Vs. Throughput
• Bandwidth and throughput are not the same
thing
• Bandwidth is the data carrying capacity of a
circuit
• Usually specified in bits per second
• Throughput is the quantity of error free data
transmitted per unit of time
• Measured in bps, Bps, or packets per second (pps)
Bandwidth, Throughput, Load
Offered Load
T
h
r
o
u
g
h
p
u
t
Actual
Ideal
100 % of Capacity
100 % of Capacity
Other Factors that Affect
Throughput
• The size of packets
• Inter-frame gaps between packets
• Packets-per-second ratings of devices that forward packets
• Client speed (CPU, memory, and HD access speeds)
• Server speed (CPU, memory, and HD access speeds)
• Network design
• Protocols
• Distance
• Errors
• Time of day, etc., etc., etc.
Throughput Vs. Goodput
• You need to decide what you mean by
throughput
• Are you referring to bytes per second,
regardless of whether the bytes are user data
bytes or packet header bytes
– Or are you concerned with application-layer
throughput of user bytes, sometimes called
“goodput”
• In that case, you have to consider that bandwidth is
being “wasted” by the headers in every packet
Performance (continued)
• Efficiency
– How much overhead is required to deliver an
amount of data?
– How large can packets be?
• Larger better for efficiency (and goodput)
• But too large means too much data is lost if a packet
is damaged
• How many packets can be sent in one bunch without
an acknowledgment?
Efficiency
Small Frames (Less Efficient)
Large Frames (More Efficient)
Delay from the User’s Point of View
• Response Time
– A function of the
application and the
equipment the
application is
running on, not just
the network
– Most users expect
to see something on
the screen in 100 to
200 milliseconds
Delay from the Engineer’s Point of View
• Propagation delay
– A signal travels in a cable at about 2/3 the
speed of light in a vacuum
• Transmission delay (also known as
serialization delay)
– Time to put digital data onto a transmission line
• For example, it takes about 5 ms to output a 1,024
byte packet on a 1.544 Mbps T1 line
• Packet-switching delay
• Queuing delay
Queuing Delay and Bandwidth Utilization
• Number of packets in a queue increases exponentially as
utilization increases
0
3
6
9
12
15
0.5 0.6 0.7 0.8 0.9 1
Average Utilization
AverageQueueDepth
Example
• A packet switch has 5 users, each offering
packets at a rate of 10 packets per second
• The average length of the packets is 1,024 bits
• The packet switch needs to transmit this data
over a 56-Kbps WAN circuit
– Load = 5 x 10 x 1,024 = 51,200 bps
– Utilization = 51,200/56,000 = 91.4%
– Average number of packets in queue =
(0.914)/(1-0.914) = 10.63 packets
Delay Variation
• The amount of time average delay varies
– Also known as jitter
• Voice, video, and audio are
intolerant of delay variation
• So forget everything we said
about maximizing packet sizes
– There are always tradeoffs
– Efficiency for high-volume applications
versus low and non-varying delay for
multimedia
Security
• Focus on requirements first
• Detailed security planning later (Chapter 8)
• Identify network assets
– Including their value and the expected cost associated with losing
them due to a security problem
• Analyze security risks
Network Assets
• Hardware
• Software
• Applications
• Data
• Intellectual property
• Trade secrets
• Company’s reputation
Security Risks
• Hacked network devices
– Data can be intercepted, analyzed, altered, or
deleted
– User passwords can be compromised
– Device configurations can be changed
• Reconnaissance attacks
• Denial-of-service attacks
Manageability
• Fault management
• Configuration management
• Accounting management
• Performance management
• Security management
Usability
• Usability: the ease of use with which network users can
access the network and services
• Networks should make users’ jobs easier
• Some design decisions will have a negative affect on
usability:
– Strict security, for example
Adaptability
• Avoid incorporating any design elements
that would make it hard to implement new
technologies in the future
• Change can come in the form of new
protocols, new business practices, new
fiscal goals, new legislation
• A flexible design can adapt to changing
traffic patterns and Quality of Service
(QoS) requirements
Affordability
• A network should carry the maximum
amount of traffic possible for a given
financial cost
• Affordability is especially important in
campus network designs
• WANs are expected to cost more, but costs
can be reduced with the proper use of
technology
– Quiet routing protocols, for example
Network Applications
Technical Requirements
Name of
Application
Cost of
Downtime
Acceptable
MTBF
Acceptable
MTTR
Throughput
Goal
Delay Must be
Less Than:
Delay
Variation
Must be Less
Than:
Making Tradeoffs
• Scalability 20
• Availability 30
• Network performance 15
• Security 5
• Manageability 5
• Usability 5
• Adaptability 5
• Affordability 15
Total (must add up to 100) 100
Summary
• Continue to use a systematic, top-down
approach
• Don’t select products until you understand
goals for scalability, availability, performance,
security, manageability, usability,
adaptability, and affordability
• Tradeoffs are almost always necessary
Review Questions
• What are some typical technical goals for
organizations today?
• How do bandwidth and throughput differ?
• How can one improve network efficiency?
• What tradeoffs may be necessary in order to improve
network efficiency?

More Related Content

What's hot

Chapter14
Chapter14Chapter14
Chapter14
Muhammad Ahad
 
Chapter10
Chapter10Chapter10
Chapter10
Muhammad Ahad
 
Chapter08
Chapter08Chapter08
Chapter08
Muhammad Ahad
 
Chapter13
Chapter13Chapter13
Chapter13
Muhammad Ahad
 
03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides
Muhammad Ahad
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2
Muhammad Ahad
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
FellowBuddy.com
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
Alan Mark
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
Uc Man
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
Network architecture
Network architectureNetwork architecture
Network architecture
Online
 
enterprise network design architecture
enterprise network design architectureenterprise network design architecture
enterprise network design architecture
Amir Hossain
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
Abdelkhalik Mosa
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)
Milson Munakami
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
lavanya marichamy
 
12. End user devices.pptx
12. End user devices.pptx12. End user devices.pptx
12. End user devices.pptx
Sibghatullah585075
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1
Aman Jaiswal
 

What's hot (20)

Chapter14
Chapter14Chapter14
Chapter14
 
Chapter10
Chapter10Chapter10
Chapter10
 
Chapter08
Chapter08Chapter08
Chapter08
 
Chapter13
Chapter13Chapter13
Chapter13
 
03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2
 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide show
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Network management
Network managementNetwork management
Network management
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
enterprise network design architecture
enterprise network design architectureenterprise network design architecture
enterprise network design architecture
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
 
Chapter03
Chapter03Chapter03
Chapter03
 
12. End user devices.pptx
12. End user devices.pptx12. End user devices.pptx
12. End user devices.pptx
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1
 

Viewers also liked

06. security concept
06. security concept06. security concept
06. security concept
Muhammad Ahad
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)
Muhammad Ahad
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
Muhammad Ahad
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1
Muhammad Ahad
 
Chapter04
Chapter04Chapter04
Chapter04
Muhammad Ahad
 
08. networking
08. networking08. networking
08. networking
Muhammad Ahad
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slides
Muhammad Ahad
 
10. compute-part-2
10. compute-part-210. compute-part-2
10. compute-part-2
Muhammad Ahad
 
07. datacenters
07. datacenters07. datacenters
07. datacenters
Muhammad Ahad
 
05. performance-concepts
05. performance-concepts05. performance-concepts
05. performance-concepts
Muhammad Ahad
 
11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2
Muhammad Ahad
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
Muhammad Ahad
 
10. compute-part-1
10. compute-part-110. compute-part-1
10. compute-part-1
Muhammad Ahad
 
09. storage-part-1
09. storage-part-109. storage-part-1
09. storage-part-1
Muhammad Ahad
 
Artificial Intelligence
Artificial Intelligence Artificial Intelligence
Artificial Intelligence
Muhammad Ahad
 

Viewers also liked (15)

06. security concept
06. security concept06. security concept
06. security concept
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1
 
Chapter04
Chapter04Chapter04
Chapter04
 
08. networking
08. networking08. networking
08. networking
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slides
 
10. compute-part-2
10. compute-part-210. compute-part-2
10. compute-part-2
 
07. datacenters
07. datacenters07. datacenters
07. datacenters
 
05. performance-concepts
05. performance-concepts05. performance-concepts
05. performance-concepts
 
11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
 
10. compute-part-1
10. compute-part-110. compute-part-1
10. compute-part-1
 
09. storage-part-1
09. storage-part-109. storage-part-1
09. storage-part-1
 
Artificial Intelligence
Artificial Intelligence Artificial Intelligence
Artificial Intelligence
 

Similar to Chapter02

Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
Pawan Sharma
 
Techniques of achieving google quality of service
Techniques of achieving google quality of serviceTechniques of achieving google quality of service
Techniques of achieving google quality of service
Satya P. Joshi
 
Performance & Monitoring Performance.pdf
Performance & Monitoring Performance.pdfPerformance & Monitoring Performance.pdf
Performance & Monitoring Performance.pdf
Phcng785014
 
6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdf
yohansurya2
 
Week 3
Week 3Week 3
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
Samit Singh
 
network basics
network basicsnetwork basics
network basics
Avin Ash
 
Introduction(2)
Introduction(2)Introduction(2)
Introduction(2)
trayyoo
 
Designing_QoS_enabled_networks_YIC_March20_2011.ppt
Designing_QoS_enabled_networks_YIC_March20_2011.pptDesigning_QoS_enabled_networks_YIC_March20_2011.ppt
Designing_QoS_enabled_networks_YIC_March20_2011.ppt
rmatmti
 
Resilience planning and how the empire strikes back
Resilience planning and how the empire strikes backResilience planning and how the empire strikes back
Resilience planning and how the empire strikes back
Bhakti Mehta
 
Top-Down Network DesignAnalyzing Technical Goals.docx
Top-Down Network DesignAnalyzing Technical Goals.docxTop-Down Network DesignAnalyzing Technical Goals.docx
Top-Down Network DesignAnalyzing Technical Goals.docx
juliennehar
 
Best Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDSBest Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDS
Real-Time Innovations (RTI)
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
payal445263
 
Computer Networks: Quality of service
Computer Networks: Quality of serviceComputer Networks: Quality of service
Computer Networks: Quality of service
Kongu Engineering College, Perundurai, Erode
 
3 - Grid Computing.pptx
3 - Grid Computing.pptx3 - Grid Computing.pptx
3 - Grid Computing.pptx
RiazSalim1
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3
Seung-Bum Lee
 
CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdf
MayankRaj687571
 
Resilience Planning & How the Empire Strikes Back
Resilience Planning & How the Empire Strikes BackResilience Planning & How the Empire Strikes Back
Resilience Planning & How the Empire Strikes Back
C4Media
 

Similar to Chapter02 (20)

Chapter02
Chapter02Chapter02
Chapter02
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
 
Techniques of achieving google quality of service
Techniques of achieving google quality of serviceTechniques of achieving google quality of service
Techniques of achieving google quality of service
 
Performance & Monitoring Performance.pdf
Performance & Monitoring Performance.pdfPerformance & Monitoring Performance.pdf
Performance & Monitoring Performance.pdf
 
6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdf
 
Week 3
Week 3Week 3
Week 3
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
network basics
network basicsnetwork basics
network basics
 
Introduction(2)
Introduction(2)Introduction(2)
Introduction(2)
 
Designing_QoS_enabled_networks_YIC_March20_2011.ppt
Designing_QoS_enabled_networks_YIC_March20_2011.pptDesigning_QoS_enabled_networks_YIC_March20_2011.ppt
Designing_QoS_enabled_networks_YIC_March20_2011.ppt
 
Resilience planning and how the empire strikes back
Resilience planning and how the empire strikes backResilience planning and how the empire strikes back
Resilience planning and how the empire strikes back
 
Top-Down Network DesignAnalyzing Technical Goals.docx
Top-Down Network DesignAnalyzing Technical Goals.docxTop-Down Network DesignAnalyzing Technical Goals.docx
Top-Down Network DesignAnalyzing Technical Goals.docx
 
Network
NetworkNetwork
Network
 
Best Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDSBest Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDS
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
 
Computer Networks: Quality of service
Computer Networks: Quality of serviceComputer Networks: Quality of service
Computer Networks: Quality of service
 
3 - Grid Computing.pptx
3 - Grid Computing.pptx3 - Grid Computing.pptx
3 - Grid Computing.pptx
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3
 
CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdf
 
Resilience Planning & How the Empire Strikes Back
Resilience Planning & How the Empire Strikes BackResilience Planning & How the Empire Strikes Back
Resilience Planning & How the Empire Strikes Back
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Chapter02

  • 1. Top-Down Network Design Chapter Two Analyzing Technical Goals and Tradeoffs Copyright 2010 Cisco Press & Priscilla Oppenheimer
  • 2. Technical Goals • Scalability • Availability • Performance • Security • Manageability • Usability • Adaptability • Affordability
  • 3. Scalability • Scalability refers to the ability to grow • Some technologies are more scalable – Flat network designs, for example, don’t scale well • Try to learn – Number of sites to be added – What will be needed at each of these sites – How many users will be added – How many more servers will be added
  • 4. Availability • Availability can be expressed as a percent uptime per year, month, week, day, or hour, compared to the total time in that period – For example: • 24/7 operation • Network is up for 165 hours in the 168-hour week • Availability is 98.21% • Different applications may require different levels • Some enterprises may want 99.999% or “Five Nines” availability
  • 5. Availability Downtime in Minutes 4.32 1.44 .72 .01 30 10 5 .10 157799.70% 52699.90% 26399.95% 599.999% Per Hour Per Day Per Week Per Year .18 .06 .03 .0006 .29 2 10599.98% .012
  • 6. 99.999% Availability May Require Triple Redundancy Enterprise ISP 1 ISP 2 ISP 3 • Can the customer afford this?
  • 7. Availability • Availability can also be expressed as a mean time between failure (MTBF) and mean time to repair (MTTR) • Availability = MTBF/(MTBF + MTTR) – For example: • The network should not fail more than once every 4,000 hours (166 days) and it should be fixed within one hour • 4,000/4,001 = 99.98% availability
  • 8. Network Performance • Common performance factors include – Bandwidth – Throughput – Bandwidth utilization – Offered load – Accuracy – Efficiency – Delay (latency) and delay variation – Response time
  • 9. Bandwidth Vs. Throughput • Bandwidth and throughput are not the same thing • Bandwidth is the data carrying capacity of a circuit • Usually specified in bits per second • Throughput is the quantity of error free data transmitted per unit of time • Measured in bps, Bps, or packets per second (pps)
  • 10. Bandwidth, Throughput, Load Offered Load T h r o u g h p u t Actual Ideal 100 % of Capacity 100 % of Capacity
  • 11. Other Factors that Affect Throughput • The size of packets • Inter-frame gaps between packets • Packets-per-second ratings of devices that forward packets • Client speed (CPU, memory, and HD access speeds) • Server speed (CPU, memory, and HD access speeds) • Network design • Protocols • Distance • Errors • Time of day, etc., etc., etc.
  • 12. Throughput Vs. Goodput • You need to decide what you mean by throughput • Are you referring to bytes per second, regardless of whether the bytes are user data bytes or packet header bytes – Or are you concerned with application-layer throughput of user bytes, sometimes called “goodput” • In that case, you have to consider that bandwidth is being “wasted” by the headers in every packet
  • 13. Performance (continued) • Efficiency – How much overhead is required to deliver an amount of data? – How large can packets be? • Larger better for efficiency (and goodput) • But too large means too much data is lost if a packet is damaged • How many packets can be sent in one bunch without an acknowledgment?
  • 14. Efficiency Small Frames (Less Efficient) Large Frames (More Efficient)
  • 15. Delay from the User’s Point of View • Response Time – A function of the application and the equipment the application is running on, not just the network – Most users expect to see something on the screen in 100 to 200 milliseconds
  • 16. Delay from the Engineer’s Point of View • Propagation delay – A signal travels in a cable at about 2/3 the speed of light in a vacuum • Transmission delay (also known as serialization delay) – Time to put digital data onto a transmission line • For example, it takes about 5 ms to output a 1,024 byte packet on a 1.544 Mbps T1 line • Packet-switching delay • Queuing delay
  • 17. Queuing Delay and Bandwidth Utilization • Number of packets in a queue increases exponentially as utilization increases 0 3 6 9 12 15 0.5 0.6 0.7 0.8 0.9 1 Average Utilization AverageQueueDepth
  • 18. Example • A packet switch has 5 users, each offering packets at a rate of 10 packets per second • The average length of the packets is 1,024 bits • The packet switch needs to transmit this data over a 56-Kbps WAN circuit – Load = 5 x 10 x 1,024 = 51,200 bps – Utilization = 51,200/56,000 = 91.4% – Average number of packets in queue = (0.914)/(1-0.914) = 10.63 packets
  • 19. Delay Variation • The amount of time average delay varies – Also known as jitter • Voice, video, and audio are intolerant of delay variation • So forget everything we said about maximizing packet sizes – There are always tradeoffs – Efficiency for high-volume applications versus low and non-varying delay for multimedia
  • 20. Security • Focus on requirements first • Detailed security planning later (Chapter 8) • Identify network assets – Including their value and the expected cost associated with losing them due to a security problem • Analyze security risks
  • 21. Network Assets • Hardware • Software • Applications • Data • Intellectual property • Trade secrets • Company’s reputation
  • 22. Security Risks • Hacked network devices – Data can be intercepted, analyzed, altered, or deleted – User passwords can be compromised – Device configurations can be changed • Reconnaissance attacks • Denial-of-service attacks
  • 23. Manageability • Fault management • Configuration management • Accounting management • Performance management • Security management
  • 24. Usability • Usability: the ease of use with which network users can access the network and services • Networks should make users’ jobs easier • Some design decisions will have a negative affect on usability: – Strict security, for example
  • 25. Adaptability • Avoid incorporating any design elements that would make it hard to implement new technologies in the future • Change can come in the form of new protocols, new business practices, new fiscal goals, new legislation • A flexible design can adapt to changing traffic patterns and Quality of Service (QoS) requirements
  • 26. Affordability • A network should carry the maximum amount of traffic possible for a given financial cost • Affordability is especially important in campus network designs • WANs are expected to cost more, but costs can be reduced with the proper use of technology – Quiet routing protocols, for example
  • 27. Network Applications Technical Requirements Name of Application Cost of Downtime Acceptable MTBF Acceptable MTTR Throughput Goal Delay Must be Less Than: Delay Variation Must be Less Than:
  • 28. Making Tradeoffs • Scalability 20 • Availability 30 • Network performance 15 • Security 5 • Manageability 5 • Usability 5 • Adaptability 5 • Affordability 15 Total (must add up to 100) 100
  • 29. Summary • Continue to use a systematic, top-down approach • Don’t select products until you understand goals for scalability, availability, performance, security, manageability, usability, adaptability, and affordability • Tradeoffs are almost always necessary
  • 30. Review Questions • What are some typical technical goals for organizations today? • How do bandwidth and throughput differ? • How can one improve network efficiency? • What tradeoffs may be necessary in order to improve network efficiency?

Editor's Notes

  1. Scalability: How much growth a network design must support. Availability: The amount of time a network is available to users, often expressed as a percent uptime, or as a mean time between failure (MTBF) and mean time to repair (MTTR). Availability goals can also document any monetary cost associated with network downtime. Security: Goals for protecting the organization's ability to conduct business without interference from intruders inappropriately accessing or damaging equipment, data, or operations. Specific security risks should be documented. Manageability: Goals for fault, configuration, accounting, performance, and security (FCAPS) management Usability: Goals regarding the ease with which network users can access the network and its services, including goals for simplifying user tasks related to network addressing, naming, and resource discovery. Adaptability: The ease with which a network design and implementation can adapt to network faults, changing traffic patterns, additional business or technical requirements, new business practices, and other changes. Affordability: The importance of containing the costs associated with purchasing and operating network equipment and services.
  2. 99.70% availability sounds pretty good, but it could mean that the network is down for 0.18 minutes every hour. This is 11 seconds. If those 11 seconds were spread out over the hour, nobody would notice possibly. But if there were some bug, for example, that caused the network to fail for 11 seconds every hour on the hour, people would notice. Users these days are very impatient. Notice that 99.70% availability also could mean one catastrophic problem caused the network to be down for 1577 minutes all at once. That’s 26 hours. If it were on a Saturday and the network was never down for the rest of the year, that might actually be OK. So, you have to consider time frames with percent availability numbers. Consider the holy grail: 99.999% availability. That’s 5 minutes downtime per year! Be sure to explain to the customer that scheduled maintenance and upgrades don’t count! Either that or plan for a network with triple redundancy (that could be extremely expensive to implement and operate).
  3. In the event of failure of the primary router, the secondary becomes the primary and still has a backup. Fix the previous primary and have it become the tertiary. This helps with maintenance too. Pull out the tertiary and upgrade it. The primary still has a backup. After extensive testing, put the tertiary back in as the primary. Pull out the original primary and upgrade it. Put it back as the secondary. Finally pull out the original secondary and upgrade it. Of course, the picture brings up all sorts of other questions because it uses an ISP example. Does the customer have provider independent addressing? Does the customer have an autonomous system number? Are the ISPs really independent? Is there true circuit diversity? Are the speeds the same on the three links to the ISPs so that performance degradation is minimized during upgrades or failures? Can load balancing be used when all three routers are operational? What are the routing protocols inside the enterprise network? Can traffic really get to all three routers, regardless of failures inside the enterprise network? Can the routing protocols adjust to changes? Will traffic flow out the “closest” router? Will traffic come in from the Internet via the “closest” entry? Instructor note: The slide is not meant to be a design recommendation! It’s just a slide to get a discussion going on the ramifications of 99.999% availability.