SlideShare a Scribd company logo
1 of 18
Top-Down Network Design

            Chapter Four

     Characterizing Network Traffic



     Copyright 2010 Cisco Press & Priscilla Oppenheimer
Network Traffic Factors

•   Traffic flow
•   Location of traffic sources and data stores
•   Traffic load
•   Traffic behavior
•   Quality of Service (QoS) requirements
User Communities
User        Size of      Location(s) of   Application(s)
Community   Community    Community        Used by
Name        (Number of                    Community
            Users)
Data Stores
Data Store   Location   Application(s) Used by User
                                       Community(or
                                       Communities)
Traffic Flow

           Destination 1   Destination 2   Destination 3   Destination
           MB/sec          MB/sec          MB/sec          MB/sec


Source 1


Source 2


Source 3


Source n
Library and Computing Center
Traffic Flow                               30 Library Patrons (PCs)          10-Mbps Metro

 Example                                   30 Macs and 60 PCs in
                                           Computing Center
                                                                            Ethernet to Internet

                                                 Server Farm                App 1   108   Kbps
      App 2    20   Kbps                                                    App 2    60   Kbps
      App 3    96   Kbps                                                    App 3   192   Kbps
      App 4    24   Kbps                                                    App 4    48   Kbps
      App 9    80   Kbps                                                    App 7   400   Kbps
      Total   220   Kbps                                                    Total   808   Kbps




         50 PCs                                                                               25 Macs
                                                                                              50 PCs

  Administration                                                                      Arts and
                           App 1     30   Kbps
                                                                                     Humanities
                           App 2     20   Kbps            App 1   48 Kbps
                           App 3     60   Kbps            App 2   32 Kbps
                           App 4     16   Kbps            App 3   96 Kbps
                           Total    126   Kbps            App 4   24 Kbps
                                                          App 5 300 Kbps                    Math and
                                                          App 6 200 Kbps
                                                          App 8 1200 Kbps                   Sciences
              30 PCs                                      Total 1900 Kbps      50 PCs

       Business and
      Social Sciences
Types of Traffic Flow

•   Terminal/host
•   Client/server
•   Thin client
•   Peer-to-peer
•   Server/server
•   Distributed computing
Traffic Flow for Voice over IP
• The flow associated with transmitting
  the audio voice is separate from the
  flows associated with call setup and
  teardown.
   – The flow for transmitting the digital voice
     is essentially peer-to-peer.
   – Call setup and teardown is a client/server
     flow
      • A phone needs to talk to a server or phone
        switch that understands phone numbers, IP
        addresses, capabilities negotiation, and so on.
Network Applications
                      Traffic Characteristics

Name of     Type of    Protocol(s)   User           Data Stores      Approximate    QoS
Application Traffic    Used by       Communities    (Servers, Hosts, Bandwidth      Requirements
            Flow       Application   That Use the   and so on)       Requirements
                                     Application
Traffic Load
• To calculate whether capacity is sufficient,
  you should know:
  – The number of stations
  – The average time that a station is idle between
    sending frames
  – The time required to transmit a message once
    medium access is gained
• That level of detailed information can be
  hard to gather, however
Size of Objects on Networks

•   Terminal screen: 4 Kbytes
•   Simple e-mail: 10 Kbytes
•   Simple web page: 50 Kbytes
•   High-quality image: 50,000 Kbytes
•   Database backup: 1,000,000 Kbytes or
    more
Traffic Behavior
• Broadcasts
   – All ones data-link layer destination address
       • FF: FF: FF: FF: FF: FF
   – Doesn’t necessarily use huge amounts of bandwidth
   – But does disturb every CPU in the broadcast domain
• Multicasts
   – First bit sent is a one
       • 01:00:0C:CC:CC:CC (Cisco Discovery Protocol)
   – Should just disturb NICs that have registered to receive
     it
   – Requires multicast routing protocol on internetworks
Network Efficiency

•   Frame size
•   Protocol interaction
•   Windowing and flow control
•   Error-recovery mechanisms
QoS Requirements

• ATM service specifications
  –   Constant bit rate (CBR)
  –   Realtime variable bit rate (rt-VBR)
  –   Non-realtime variable bit rate (nrt-VBR)
  –   Unspecified bit rate (UBR)
  –   Available bit rate (ABR)
  –   Guaranteed frame rate (GFR)
QoS Requirements per IETF

• IETF integrated services working group
  specifications
  – Controlled load service
     • Provides client data flow with a QoS closely
       approximating the QoS that same flow would
       receive on an unloaded network
  – Guaranteed service
     • Provides firm (mathematically provable) bounds on
       end-to-end packet-queuing delays
QoS Requirements per IETF

• IETF differentiated services working group
  specifications
  – RFC 2475
  – IP packets can be marked with a differentiated
    services codepoint (DSCP) to influence
    queuing and packet-dropping decisions for IP
    datagrams on an output interface of a router
Summary

• Continue to use a systematic, top-down
  approach
• Don’t select products until you understand
  network traffic in terms of:
  –   Flow
  –   Load
  –   Behavior
  –   QoS requirements
Review Questions
• List and describe six different types of traffic flows.
• What makes traffic flow in voice over IP networks
  challenging to characterize and plan for?
• Why should you be concerned about broadcast
  traffic?
• How do ATM and IETF specifications for QoS
  differ?

More Related Content

What's hot (20)

Chapter07
Chapter07Chapter07
Chapter07
 
Active Directory 2019 v2.pptx
Active Directory 2019 v2.pptxActive Directory 2019 v2.pptx
Active Directory 2019 v2.pptx
 
SNMP
SNMPSNMP
SNMP
 
Chapter01
Chapter01Chapter01
Chapter01
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
 
Snmp
SnmpSnmp
Snmp
 
Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
 
Subentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationSubentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentation
 
IPv6
IPv6IPv6
IPv6
 
Chapter05
Chapter05Chapter05
Chapter05
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
Cisco ASA Firewalls
Cisco ASA FirewallsCisco ASA Firewalls
Cisco ASA Firewalls
 
DNS & DNSSEC
DNS & DNSSECDNS & DNSSEC
DNS & DNSSEC
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
DDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDNDDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDN
 
Network Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using WiresharkNetwork Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using Wireshark
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
DNS (Domain Name System)
DNS (Domain Name System)DNS (Domain Name System)
DNS (Domain Name System)
 

Similar to Characterizing Network Traffic Flow

Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Delivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demandDelivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demandAmazon Web Services
 
Web Services for the Internet of Things
Web Services for the Internet of ThingsWeb Services for the Internet of Things
Web Services for the Internet of ThingsMarkku Laine
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)Nitesh Singh
 
Zigbee intro v5
Zigbee intro v5Zigbee intro v5
Zigbee intro v5rajrayala
 
7.) convergence (w automation)
7.) convergence (w automation)7.) convergence (w automation)
7.) convergence (w automation)Jeff Green
 
Continuum pcap-oem
Continuum pcap-oemContinuum pcap-oem
Continuum pcap-oemblabadini
 
NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP)
NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP) NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP)
NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP) Christian Esteve Rothenberg
 
Networking - TCP/IP stack introduction and IPv6
Networking - TCP/IP stack introduction and IPv6Networking - TCP/IP stack introduction and IPv6
Networking - TCP/IP stack introduction and IPv6Rodolfo Kohn
 
Hp aspera-big data cloud-v2
Hp aspera-big data cloud-v2Hp aspera-big data cloud-v2
Hp aspera-big data cloud-v2dkumiaspera
 
Keystone - ApacheCon 2016
Keystone - ApacheCon 2016Keystone - ApacheCon 2016
Keystone - ApacheCon 2016Peter Bakas
 
Platforms for Accelerating the Software Defined and Virtual Infrastructure
Platforms for Accelerating the Software Defined and Virtual InfrastructurePlatforms for Accelerating the Software Defined and Virtual Infrastructure
Platforms for Accelerating the Software Defined and Virtual Infrastructure6WIND
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.comULLPTT
 

Similar to Characterizing Network Traffic Flow (20)

Chapter03
Chapter03Chapter03
Chapter03
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Chapter04
Chapter04Chapter04
Chapter04
 
Delivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demandDelivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demand
 
Web Services for the Internet of Things
Web Services for the Internet of ThingsWeb Services for the Internet of Things
Web Services for the Internet of Things
 
New tcp-ip model
New tcp-ip modelNew tcp-ip model
New tcp-ip model
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)
 
Zigbee intro v5
Zigbee intro v5Zigbee intro v5
Zigbee intro v5
 
7.) convergence (w automation)
7.) convergence (w automation)7.) convergence (w automation)
7.) convergence (w automation)
 
Continuum pcap-oem
Continuum pcap-oemContinuum pcap-oem
Continuum pcap-oem
 
NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP)
NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP) NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP)
NECOS Industrial Workshop lightning talk by Prof. Nelson Fonseca (UNICAMP)
 
Networking - TCP/IP stack introduction and IPv6
Networking - TCP/IP stack introduction and IPv6Networking - TCP/IP stack introduction and IPv6
Networking - TCP/IP stack introduction and IPv6
 
To Infiniband and Beyond
To Infiniband and BeyondTo Infiniband and Beyond
To Infiniband and Beyond
 
goldman11.ppt
goldman11.pptgoldman11.ppt
goldman11.ppt
 
goldman11.ppt
goldman11.pptgoldman11.ppt
goldman11.ppt
 
Chapter4 Network
Chapter4 NetworkChapter4 Network
Chapter4 Network
 
Hp aspera-big data cloud-v2
Hp aspera-big data cloud-v2Hp aspera-big data cloud-v2
Hp aspera-big data cloud-v2
 
Keystone - ApacheCon 2016
Keystone - ApacheCon 2016Keystone - ApacheCon 2016
Keystone - ApacheCon 2016
 
Platforms for Accelerating the Software Defined and Virtual Infrastructure
Platforms for Accelerating the Software Defined and Virtual InfrastructurePlatforms for Accelerating the Software Defined and Virtual Infrastructure
Platforms for Accelerating the Software Defined and Virtual Infrastructure
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.com
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Characterizing Network Traffic Flow

  • 1. Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer
  • 2. Network Traffic Factors • Traffic flow • Location of traffic sources and data stores • Traffic load • Traffic behavior • Quality of Service (QoS) requirements
  • 3. User Communities User Size of Location(s) of Application(s) Community Community Community Used by Name (Number of Community Users)
  • 4. Data Stores Data Store Location Application(s) Used by User Community(or Communities)
  • 5. Traffic Flow Destination 1 Destination 2 Destination 3 Destination MB/sec MB/sec MB/sec MB/sec Source 1 Source 2 Source 3 Source n
  • 6. Library and Computing Center Traffic Flow 30 Library Patrons (PCs) 10-Mbps Metro Example 30 Macs and 60 PCs in Computing Center Ethernet to Internet Server Farm App 1 108 Kbps App 2 20 Kbps App 2 60 Kbps App 3 96 Kbps App 3 192 Kbps App 4 24 Kbps App 4 48 Kbps App 9 80 Kbps App 7 400 Kbps Total 220 Kbps Total 808 Kbps 50 PCs 25 Macs 50 PCs Administration Arts and App 1 30 Kbps Humanities App 2 20 Kbps App 1 48 Kbps App 3 60 Kbps App 2 32 Kbps App 4 16 Kbps App 3 96 Kbps Total 126 Kbps App 4 24 Kbps App 5 300 Kbps Math and App 6 200 Kbps App 8 1200 Kbps Sciences 30 PCs Total 1900 Kbps 50 PCs Business and Social Sciences
  • 7. Types of Traffic Flow • Terminal/host • Client/server • Thin client • Peer-to-peer • Server/server • Distributed computing
  • 8. Traffic Flow for Voice over IP • The flow associated with transmitting the audio voice is separate from the flows associated with call setup and teardown. – The flow for transmitting the digital voice is essentially peer-to-peer. – Call setup and teardown is a client/server flow • A phone needs to talk to a server or phone switch that understands phone numbers, IP addresses, capabilities negotiation, and so on.
  • 9. Network Applications Traffic Characteristics Name of Type of Protocol(s) User Data Stores Approximate QoS Application Traffic Used by Communities (Servers, Hosts, Bandwidth Requirements Flow Application That Use the and so on) Requirements Application
  • 10. Traffic Load • To calculate whether capacity is sufficient, you should know: – The number of stations – The average time that a station is idle between sending frames – The time required to transmit a message once medium access is gained • That level of detailed information can be hard to gather, however
  • 11. Size of Objects on Networks • Terminal screen: 4 Kbytes • Simple e-mail: 10 Kbytes • Simple web page: 50 Kbytes • High-quality image: 50,000 Kbytes • Database backup: 1,000,000 Kbytes or more
  • 12. Traffic Behavior • Broadcasts – All ones data-link layer destination address • FF: FF: FF: FF: FF: FF – Doesn’t necessarily use huge amounts of bandwidth – But does disturb every CPU in the broadcast domain • Multicasts – First bit sent is a one • 01:00:0C:CC:CC:CC (Cisco Discovery Protocol) – Should just disturb NICs that have registered to receive it – Requires multicast routing protocol on internetworks
  • 13. Network Efficiency • Frame size • Protocol interaction • Windowing and flow control • Error-recovery mechanisms
  • 14. QoS Requirements • ATM service specifications – Constant bit rate (CBR) – Realtime variable bit rate (rt-VBR) – Non-realtime variable bit rate (nrt-VBR) – Unspecified bit rate (UBR) – Available bit rate (ABR) – Guaranteed frame rate (GFR)
  • 15. QoS Requirements per IETF • IETF integrated services working group specifications – Controlled load service • Provides client data flow with a QoS closely approximating the QoS that same flow would receive on an unloaded network – Guaranteed service • Provides firm (mathematically provable) bounds on end-to-end packet-queuing delays
  • 16. QoS Requirements per IETF • IETF differentiated services working group specifications – RFC 2475 – IP packets can be marked with a differentiated services codepoint (DSCP) to influence queuing and packet-dropping decisions for IP datagrams on an output interface of a router
  • 17. Summary • Continue to use a systematic, top-down approach • Don’t select products until you understand network traffic in terms of: – Flow – Load – Behavior – QoS requirements
  • 18. Review Questions • List and describe six different types of traffic flows. • What makes traffic flow in voice over IP networks challenging to characterize and plan for? • Why should you be concerned about broadcast traffic? • How do ATM and IETF specifications for QoS differ?