This document summarizes a presentation on data center network architectures. It begins with an analysis of different data center architectures including definitions, classifications of architectures as electronic/optical and switch-centric/server-centric. Example architectures like Fat-Tree, BCube and DCell are described. Metrics for evaluating energy consumption and communication latency are presented. Results show different architectures impact energy costs and communication differently. Current scheduling approaches are discussed and directions for communication-aware scheduling criteria are proposed.
Reference Architecture-Validated & Tested Approach to Define Network DesignDataWorks Summit
This document provides a reference network architecture and validation results for a 96-node Hadoop cluster in an enterprise environment. It describes the goals of providing a reference network architecture for Hadoop, characterizing the Hadoop application's impact on the network, and validating the network with Hadoop workloads. The network architecture is based on a three-tier design using Nexus 7000/5000 core switches, Nexus 3000 top-of-rack switches, and Cisco UCS blade servers running Hadoop on each rack. Network validation testing was performed using a 96-node Hadoop cluster running Yahoo TeraSort benchmark workloads, which are very network intensive for extract, transform, and load (ETL) type applications.
Virtualization in 4-4 1-4 Data Center Network.Ankita Mahajan
4-4 1-4 delivers great performance guarantees in traditional (non-virtualized) setting, due to location based static IP address allocation to all network elements.
Download this ppt first and then open in powerpoint to view without merged figures and with animations.
VL2: A scalable and flexible Data Center NetworkAnkita Mahajan
This Data Center Network Architecture introduces a virtual layer 2.5 in the protocol stack of hosts and uses a directory service to achieve efficient forwarding. It uses separate location/identifier IPs
The document discusses data center network architectures. It begins by describing the goals of data center networks including availability, scalability, low cost, throughput and load balancing. It then discusses conventional network architectures and challenges. It describes fat-tree based networks that provide full bisection bandwidth and commodity switches. Recursive network architectures are also summarized that are highly scalable using commodity networks. Modular data centers and virtualized data center networks are briefly introduced. An example of a 4-4 1-4 data center network architecture is provided and references are listed.
Class lecture by Prof. Raj Jain on Data Center Network Topologies. The talk covers Google’s Data Center, Cooling Plant, Modular Data Centers, Containerized Data Center, Unstructured Cabling, Structured Cabling, Data Center Equipment Cabinets, Data Center Physical Layout, ANSI/TIA-942-2005 Standard, ANSI/TIA-942-2005 Standard, Data Center Network Topologies, Data Center Networks, Switch Locations, ToR vs EoR, Hierarchical Network Design, Access Aggregation Connections, Data Center Networking Issues, DCN Requirements, 4-Post Architecture at Facebook, Clos Networks, Fat-Tree DCN Example. Video recording available on You
The document discusses various aspects of mobile transport and application layers including Mobile TCP, WAP architecture, Wireless Datagram Protocol (WDP), Wireless Transport Layer Security (WTLS), Wireless Transaction Protocol (WTP), Wireless Session Protocol (WSP), Wireless Application Environment (WAE), and WTA architecture. Mobile TCP aims to avoid packet loss over wireless links. The WAP architecture defines layers for transport, security, transactions, and applications to enable wireless internet access. Protocols like WDP, WTLS, WTP and WSP operate at different layers to provide services like transport, security, transactions and sessions. WAE and WTA provide frameworks for mobile applications and access to telephony functions.
Reference Architecture-Validated & Tested Approach to Define Network DesignDataWorks Summit
This document provides a reference network architecture and validation results for a 96-node Hadoop cluster in an enterprise environment. It describes the goals of providing a reference network architecture for Hadoop, characterizing the Hadoop application's impact on the network, and validating the network with Hadoop workloads. The network architecture is based on a three-tier design using Nexus 7000/5000 core switches, Nexus 3000 top-of-rack switches, and Cisco UCS blade servers running Hadoop on each rack. Network validation testing was performed using a 96-node Hadoop cluster running Yahoo TeraSort benchmark workloads, which are very network intensive for extract, transform, and load (ETL) type applications.
Virtualization in 4-4 1-4 Data Center Network.Ankita Mahajan
4-4 1-4 delivers great performance guarantees in traditional (non-virtualized) setting, due to location based static IP address allocation to all network elements.
Download this ppt first and then open in powerpoint to view without merged figures and with animations.
VL2: A scalable and flexible Data Center NetworkAnkita Mahajan
This Data Center Network Architecture introduces a virtual layer 2.5 in the protocol stack of hosts and uses a directory service to achieve efficient forwarding. It uses separate location/identifier IPs
The document discusses data center network architectures. It begins by describing the goals of data center networks including availability, scalability, low cost, throughput and load balancing. It then discusses conventional network architectures and challenges. It describes fat-tree based networks that provide full bisection bandwidth and commodity switches. Recursive network architectures are also summarized that are highly scalable using commodity networks. Modular data centers and virtualized data center networks are briefly introduced. An example of a 4-4 1-4 data center network architecture is provided and references are listed.
Class lecture by Prof. Raj Jain on Data Center Network Topologies. The talk covers Google’s Data Center, Cooling Plant, Modular Data Centers, Containerized Data Center, Unstructured Cabling, Structured Cabling, Data Center Equipment Cabinets, Data Center Physical Layout, ANSI/TIA-942-2005 Standard, ANSI/TIA-942-2005 Standard, Data Center Network Topologies, Data Center Networks, Switch Locations, ToR vs EoR, Hierarchical Network Design, Access Aggregation Connections, Data Center Networking Issues, DCN Requirements, 4-Post Architecture at Facebook, Clos Networks, Fat-Tree DCN Example. Video recording available on You
The document discusses various aspects of mobile transport and application layers including Mobile TCP, WAP architecture, Wireless Datagram Protocol (WDP), Wireless Transport Layer Security (WTLS), Wireless Transaction Protocol (WTP), Wireless Session Protocol (WSP), Wireless Application Environment (WAE), and WTA architecture. Mobile TCP aims to avoid packet loss over wireless links. The WAP architecture defines layers for transport, security, transactions, and applications to enable wireless internet access. Protocols like WDP, WTLS, WTP and WSP operate at different layers to provide services like transport, security, transactions and sessions. WAE and WTA provide frameworks for mobile applications and access to telephony functions.
The document discusses how application architects traditionally focused on solving IO bottlenecks in servers by offloading processing to intelligent network interface cards. With modern distributed applications spanning thousands of servers, application architects now must consider network topology, segmentation, and control plane protocols to optimize latency and bandwidth. The rise of virtualization and cloud computing has changed traffic patterns in datacenters from north-south traffic to dominant east-west traffic between servers. This requires new datacenter fabric designs beyond the traditional three-tiered topology.
This document discusses selecting technologies and devices for campus network designs. It covers considerations for the physical cabling plant design including centralized vs distributed topologies. Common media types are discussed such as copper, optical fiber, and wireless. Specific technologies like Ethernet variants and their characteristics are outlined. Selection criteria for internetworking devices that will make up the campus network are presented, including processing power, port counts, latency, throughput and support/quality factors. The document provides guidance on evaluating options for building out the physical implementation of a previously designed logical campus network.
Robert Franklin has over 20 years of experience as a senior network engineer and systems administrator. He is currently a senior network engineer at Shutterstock where he leads the design and operation of their network including datacenters, security, and performance monitoring. Previously he held senior roles at Catalyst Systems Repository, WildBlue Communications/ViaSat, and other startups where he designed and implemented large ISP and datacenter networks.
This document discusses various methods for optimizing network design and performance, including using IP multicast to efficiently deliver multimedia streams, reducing serialization delay through link fragmentation and compressed RTP, and supporting quality of service through techniques like IP precedence, differentiated services, 802.1p prioritization, advanced switching and queuing methods, RED, CAR, and traffic shaping.
Checksum is a simple and commonly used error detection technique that involves calculating the sum of all words in a transmission and sending the result. The receiver performs the same calculation and compares its result to the received checksum. A mismatch indicates an error occurred during transmission.
Basics of Network Layer and Transport LayerRubal Sagwal
This document provides an overview of computer networks, focusing on the network, transport, and application layers. It discusses IPv4 and IPv6 packet structure, addressing, and protocols like ICMP, IGMP, TCP, and UDP. Specifically, it examines IPv4 and IPv6 addressing schemes, packet headers, classes of addresses, subnetting, and IPv6 advantages over IPv4. It also describes functions of protocols like ICMP for error reporting and queries, and IGMP for multicast group management.
Structured models for addressing and naming make networks easier to operate and manage. Addressing and naming schemes should be assigned hierarchically from a central or distributed authority. Public IP addresses are assigned by regional internet registries, while private addresses like 10.0.0.0/8 and 172.16.0.0/12 are non-routable and used internally. The choice of static versus dynamic addressing depends on factors like network size, availability needs, and whether additional configuration is required.
The document discusses network layer concepts including packet switching, IPv4 addressing, routing, and performance metrics. It covers key topics like datagram and virtual circuit networks, routing table mechanisms, IPv4 address structure, and factors that impact network performance such as delay, throughput, packet loss, and congestion control techniques. The document is a lecture on network layer services and protocols from a computer networks course.
These slides cover a topic on Multiplexing in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
The document discusses different methods of switching in computer networks, including circuit switching, packet switching, and message switching. It provides details on circuit-switched networks, packet-switched networks, and virtual circuit networks. For circuit switching, it describes the setup, data transfer, and teardown phases required to establish and terminate connections. For packet switching, it compares datagram and virtual circuit approaches.
Networking Essentials Lesson 01 - Eric VanderburgEric Vanderburg
This document provides an introduction to a networking essentials class, including information about the instructor, class times and structure, textbook, and course outline. It also summarizes key topics that will be covered in the class, such as networking history, types of networks, network operating systems, networking terminology, roles of servers, skills required of network professionals, and certifications.
Network devices such as repeaters, hubs, bridges, switches, routers, and gateways are used to extend and segment computer networks. Repeaters regenerate signals to increase network distance while hubs connect multiple cables but do not segment traffic. Bridges and switches segment networks into broadcast domains to reduce collisions. Routers connect different network types, choose optimal paths, and prevent broadcast traffic between segments. Gateways translate between different network protocols.
Circuit switching directly connects the sender and receiver through a dedicated physical path. Message switching transmits entire messages from node to node without establishing a dedicated path. Packet switching breaks messages into packets that can take different routes to the destination and are reassembled, allowing for more efficient use of bandwidth but introducing complexity.
This document discusses various networking devices used to connect local area networks (LANs) and backbone networks. It describes repeaters, hubs, bridges, switches, routers, and gateways. Repeaters and hubs operate at the physical layer, while bridges and switches operate at the data link layer. Routers operate at the network layer and are used to connect different LANs and wide area networks. The document provides details on how each device functions, including how switches learn MAC addresses to filter traffic and prevent loops using spanning tree protocols.
Layer 3 provides services to exchange the individual pieces of data over the network between identified end devices.
Understanding L3 addressing, encapsulation, routing and decapsulation.
Routed protocols, routing protocols and other supporting protocols such as ICMP and ARP.
IP v4 Characteristics:
1. Connectionless
2. Media independent
3. Best effort
IP v4 Header:
1. Packet length
2. Type of Service
3. Time to Live
4. Protocol
5. Header checksum
6. Source address
7. Destination address
8. Fragment offset.
9. IHL
10. Type of Service
This document provides an overview of the transport layer and transport layer protocols. It begins with an introduction to the transport layer, describing its location and functions such as providing process-to-process communication between hosts using logical connections. It then discusses transport layer services including addressing with port numbers, encapsulation/decapsulation, multiplexing/demultiplexing, flow control, error control, congestion control. Finally it describes some common transport layer protocols like UDP, TCP and their mechanisms.
The document summarizes various application layer protocols including DNS, DHCP, HTTP, HTTPS, FTP, SMTP, POP, IMAP. It describes the functions of DNS in translating domain names to IP addresses. It explains the DHCP client-server model and the exchange of request and response packets. It provides an overview of HTTP and HTTPS for accessing web pages and securing communications. It also briefly outlines other protocols like FTP for file transfer, SMTP for email transmission, and POP and IMAP for retrieving emails from servers.
Inter-networking Device
Is the practice of connecting a computer network with other network through the use of gateways that provide a common method of routing information packets between the networks.
This document defines packet switching and discusses several packet switching technologies. It begins by defining packet switching as dividing messages into packets that can follow different routes to the destination, where they are then recompiled. It then discusses three main packet switching technologies: TCP/IP, X.25, and Frame Relay. It provides details on each technology and notes that Frame Relay was implemented in Malaysia and replaced X.25 for connections within wide area networks.
This document provides an overview of the evolution of the internet and key technologies enabling it, including internet of things (IoT), 5G, cloud computing, data centers, and network virtualization. It discusses how IoT and cloud computing produce big data stored in data centers, and how 5G, data centers, and network virtualization technologies will act as the backbone for cloud services and IoT applications. It also outlines some of the applications, requirements, and trends related to these technologies.
This document summarizes a presentation on analyzing network traffic characteristics of data centers. Some key findings include:
- 75% of traffic stays within a single rack, showing applications are not uniformly placed;
- Half of all packets are small (<200B), indicating keep-alive traffic is important for applications;
- At most 25% of core network links are highly utilized, suggesting better routing could reduce utilization;
- Assumptions about needing more bandwidth between network switches (bisection) or that traffic is unpredictable may not always hold true.
The document discusses how application architects traditionally focused on solving IO bottlenecks in servers by offloading processing to intelligent network interface cards. With modern distributed applications spanning thousands of servers, application architects now must consider network topology, segmentation, and control plane protocols to optimize latency and bandwidth. The rise of virtualization and cloud computing has changed traffic patterns in datacenters from north-south traffic to dominant east-west traffic between servers. This requires new datacenter fabric designs beyond the traditional three-tiered topology.
This document discusses selecting technologies and devices for campus network designs. It covers considerations for the physical cabling plant design including centralized vs distributed topologies. Common media types are discussed such as copper, optical fiber, and wireless. Specific technologies like Ethernet variants and their characteristics are outlined. Selection criteria for internetworking devices that will make up the campus network are presented, including processing power, port counts, latency, throughput and support/quality factors. The document provides guidance on evaluating options for building out the physical implementation of a previously designed logical campus network.
Robert Franklin has over 20 years of experience as a senior network engineer and systems administrator. He is currently a senior network engineer at Shutterstock where he leads the design and operation of their network including datacenters, security, and performance monitoring. Previously he held senior roles at Catalyst Systems Repository, WildBlue Communications/ViaSat, and other startups where he designed and implemented large ISP and datacenter networks.
This document discusses various methods for optimizing network design and performance, including using IP multicast to efficiently deliver multimedia streams, reducing serialization delay through link fragmentation and compressed RTP, and supporting quality of service through techniques like IP precedence, differentiated services, 802.1p prioritization, advanced switching and queuing methods, RED, CAR, and traffic shaping.
Checksum is a simple and commonly used error detection technique that involves calculating the sum of all words in a transmission and sending the result. The receiver performs the same calculation and compares its result to the received checksum. A mismatch indicates an error occurred during transmission.
Basics of Network Layer and Transport LayerRubal Sagwal
This document provides an overview of computer networks, focusing on the network, transport, and application layers. It discusses IPv4 and IPv6 packet structure, addressing, and protocols like ICMP, IGMP, TCP, and UDP. Specifically, it examines IPv4 and IPv6 addressing schemes, packet headers, classes of addresses, subnetting, and IPv6 advantages over IPv4. It also describes functions of protocols like ICMP for error reporting and queries, and IGMP for multicast group management.
Structured models for addressing and naming make networks easier to operate and manage. Addressing and naming schemes should be assigned hierarchically from a central or distributed authority. Public IP addresses are assigned by regional internet registries, while private addresses like 10.0.0.0/8 and 172.16.0.0/12 are non-routable and used internally. The choice of static versus dynamic addressing depends on factors like network size, availability needs, and whether additional configuration is required.
The document discusses network layer concepts including packet switching, IPv4 addressing, routing, and performance metrics. It covers key topics like datagram and virtual circuit networks, routing table mechanisms, IPv4 address structure, and factors that impact network performance such as delay, throughput, packet loss, and congestion control techniques. The document is a lecture on network layer services and protocols from a computer networks course.
These slides cover a topic on Multiplexing in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
The document discusses different methods of switching in computer networks, including circuit switching, packet switching, and message switching. It provides details on circuit-switched networks, packet-switched networks, and virtual circuit networks. For circuit switching, it describes the setup, data transfer, and teardown phases required to establish and terminate connections. For packet switching, it compares datagram and virtual circuit approaches.
Networking Essentials Lesson 01 - Eric VanderburgEric Vanderburg
This document provides an introduction to a networking essentials class, including information about the instructor, class times and structure, textbook, and course outline. It also summarizes key topics that will be covered in the class, such as networking history, types of networks, network operating systems, networking terminology, roles of servers, skills required of network professionals, and certifications.
Network devices such as repeaters, hubs, bridges, switches, routers, and gateways are used to extend and segment computer networks. Repeaters regenerate signals to increase network distance while hubs connect multiple cables but do not segment traffic. Bridges and switches segment networks into broadcast domains to reduce collisions. Routers connect different network types, choose optimal paths, and prevent broadcast traffic between segments. Gateways translate between different network protocols.
Circuit switching directly connects the sender and receiver through a dedicated physical path. Message switching transmits entire messages from node to node without establishing a dedicated path. Packet switching breaks messages into packets that can take different routes to the destination and are reassembled, allowing for more efficient use of bandwidth but introducing complexity.
This document discusses various networking devices used to connect local area networks (LANs) and backbone networks. It describes repeaters, hubs, bridges, switches, routers, and gateways. Repeaters and hubs operate at the physical layer, while bridges and switches operate at the data link layer. Routers operate at the network layer and are used to connect different LANs and wide area networks. The document provides details on how each device functions, including how switches learn MAC addresses to filter traffic and prevent loops using spanning tree protocols.
Layer 3 provides services to exchange the individual pieces of data over the network between identified end devices.
Understanding L3 addressing, encapsulation, routing and decapsulation.
Routed protocols, routing protocols and other supporting protocols such as ICMP and ARP.
IP v4 Characteristics:
1. Connectionless
2. Media independent
3. Best effort
IP v4 Header:
1. Packet length
2. Type of Service
3. Time to Live
4. Protocol
5. Header checksum
6. Source address
7. Destination address
8. Fragment offset.
9. IHL
10. Type of Service
This document provides an overview of the transport layer and transport layer protocols. It begins with an introduction to the transport layer, describing its location and functions such as providing process-to-process communication between hosts using logical connections. It then discusses transport layer services including addressing with port numbers, encapsulation/decapsulation, multiplexing/demultiplexing, flow control, error control, congestion control. Finally it describes some common transport layer protocols like UDP, TCP and their mechanisms.
The document summarizes various application layer protocols including DNS, DHCP, HTTP, HTTPS, FTP, SMTP, POP, IMAP. It describes the functions of DNS in translating domain names to IP addresses. It explains the DHCP client-server model and the exchange of request and response packets. It provides an overview of HTTP and HTTPS for accessing web pages and securing communications. It also briefly outlines other protocols like FTP for file transfer, SMTP for email transmission, and POP and IMAP for retrieving emails from servers.
Inter-networking Device
Is the practice of connecting a computer network with other network through the use of gateways that provide a common method of routing information packets between the networks.
This document defines packet switching and discusses several packet switching technologies. It begins by defining packet switching as dividing messages into packets that can follow different routes to the destination, where they are then recompiled. It then discusses three main packet switching technologies: TCP/IP, X.25, and Frame Relay. It provides details on each technology and notes that Frame Relay was implemented in Malaysia and replaced X.25 for connections within wide area networks.
This document provides an overview of the evolution of the internet and key technologies enabling it, including internet of things (IoT), 5G, cloud computing, data centers, and network virtualization. It discusses how IoT and cloud computing produce big data stored in data centers, and how 5G, data centers, and network virtualization technologies will act as the backbone for cloud services and IoT applications. It also outlines some of the applications, requirements, and trends related to these technologies.
This document summarizes a presentation on analyzing network traffic characteristics of data centers. Some key findings include:
- 75% of traffic stays within a single rack, showing applications are not uniformly placed;
- Half of all packets are small (<200B), indicating keep-alive traffic is important for applications;
- At most 25% of core network links are highly utilized, suggesting better routing could reduce utilization;
- Assumptions about needing more bandwidth between network switches (bisection) or that traffic is unpredictable may not always hold true.
eBook: Guide to Data Center Cabling Infrastructure
In This Free 36-page eBook:
*10 Gb/s Data Center Solutions
*Best Practices for Data Center Infrastructure Design
*Comparing Copper and Fiber Options in the Data Center
*The Hidden Costs of 10 Gb/s UTP Systems
*Light it Up: Fiber *Transmissions and Applications
*Cabling Infrastructure and Green Building Initiatives
About the Author:
Carrie Higbie has been involved in the computing and networking for 25+ years in executive and consultant roles. She is Siemon’s Global Network Applications Manager supporting end-users and active electronics manufacturers. She publishes columns and speaks at industry events globally. Carrie is an expert on TechTarget’s SearchNetworking, SearchVoIP, and SearchDataCenters and authors columns for these and SearchCIO and SearchMobile forums and is on the board of advisors. She is on the BOD and former President of the BladeSystems Alliance. She participates in IEEE, the Ethernet Alliance and IDC Enterprise Expert Panels. She has one telecommunications patent and one pending.
A DHT Chord-like mannered overlay-network to store and retrieve dataAndrea Tino
The document describes a distributed data backup and recovery system implemented as a distributed hash table on a ring topology overlay network. Servers in the network store and retrieve data units which are addressed and routed through the network based on their content hashes. The system was designed for scalability, flexibility, and extensibility through a library of reusable "proto-services" that can connect to each other to enable various functionality and behaviors.
Software defined networking introductionEktaSoni20
The document outlines the key concepts of conventional networking and SDN. It discusses the limitations of conventional networking where control and data planes are tightly coupled within network devices. SDN is presented as a new networking paradigm that separates the control and data planes, allowing the network to be centrally controlled by a software-based controller. The SDN architecture has three layers - the application, control and infrastructure layers. Several network applications of SDN and issues related to data centers and SDN deployment are also highlighted. Potential research problems in SDN scalability, load balancing and controller performance are identified for future work.
This document provides an overview of networks and telecommunications for an information systems course. It discusses the key components of telecommunications networks, including terminals, processors, channels, computers and software. It describes different network topologies like star, ring and bus configurations. The document also covers telecommunications protocols like OSI and TCP/IP, trends in telecommunications, and popular business uses of the internet like email, e-commerce and overcoming barriers.
This document discusses addressing signal integrity challenges in radar and electronic warfare systems due to increasing data bus rates. It describes how high speeds can lead to signal degradation through various effects. Measurement and characterization tools are needed to help designers avoid problems and ensure signals are transmitted and received correctly. Simulation and testing of high-speed digital designs is important from early stages of development through compliance testing.
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESijcsit
This document summarizes a research paper on scheduling flows in hybrid optical and electrical networks for cloud data centers. The paper proposes a strategy for selecting which flows are suitable to switch from the electrical packet network to the optical circuit network. It presents techniques for detecting bottlenecks in the packet network and selecting flows to offload. Simulation results showed improved network performance from this flow selection approach, including higher average throughput, lower configuration delay, and more stable offloaded flows.
This document provides an overview of designing basic campus and data center networks. It discusses key considerations for enterprise network design including network application characteristics, environmental characteristics, and infrastructure device characteristics. Specifically, it covers different network application types, campus network geography including intrabuilding and interbuilding structures, transmission media options, and the role of switches in campus network design. The goal is to enhance productivity by providing network services to users based on organizational requirements and application needs.
The document discusses implementing a hybrid SDN network at RAF Company by introducing SDN functionality into the wireless network segment. A Floodlight controller was installed on a virtual machine to optimize traffic forwarding and provide flexible allocation of wireless resources. Applications were developed to dynamically manage network security and control user throughput. The benefits of SDN for enterprises include network programmability, simplified management, reduced costs, and the ability to accelerate services to meet business needs.
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSijcsit
Nowadays, Fog architecture or Edge architecture is becoming a popular research trend to distribute a
substantial amount of computing resources, data processing and resource management at the extreme edge
of the wireless sensor networks (WSNs). Industrial communication is a research track in next generation
wireless sensor networks for the fourth revolution in the industrial process. Adopting fog architecture into
Industrial communication systems is a promising technology within sensor networks architecture. With
Software Defined Network (SDN) architecture, in this paper, we address edge controller placement as an
optimization problem with the objective of more robustness while minimizing the delay of network
management and the associated synchronization overhead. The optimization problem is provided and
modelled as submodular function. Two algorithms are provided to find the optimal solution using a real
wireless network to get more realistic results. Greedy Algorithm and Connectivity Ranking Algorithm are
provided. Greedy algorithm outperforms connectivity ranking algorithm to find the optimum balance
between the different metrics. Also, based on the network operator preference, the number of edge
controllers to be placed will be provided. This research paper plays a great role in standardization of
softwarization into Industrial communication systems for next generation wireless sensor networks.
Nowadays, Fog architecture or Edge architecture is becoming a popular research trend to distribute a
substantial amount of computing resources, data processing and resource management at the extreme edge
of the wireless sensor networks (WSNs). Industrial communication is a research track in next generation
wireless sensor networks for the fourth revolution in the industrial process. Adopting fog architecture into
Industrial communication systems is a promising technology within sensor networks architecture. With
Software Defined Network (SDN) architecture, in this paper, we address edge controller placement as an
optimization problem with the objective of more robustness while minimizing the delay of network
management and the associated synchronization overhead. The optimization problem is provided and
modelled as submodular function. Two algorithms are provided to find the optimal solution using a real
wireless network to get more realistic results. Greedy Algorithm and Connectivity Ranking Algorithm are
provided. Greedy algorithm outperforms connectivity ranking algorithm to find the optimum balance
between the different metrics. Also, based on the network operator preference, the number of edge
controllers to be placed will be provided. This research paper plays a great role in standardization of
softwarization into Industrial communication systems for next generation wireless sensor networks.
https://technoelectronics44.blogspot.com/
GDI TECHNOLOGY, here you get GDI implementation and design of GDI based gates AND, OR, XOR, and Adders like CLA, CIA, CSKA, performance analysis of CMOS And GDI
This document discusses data center network optimization. It begins with background on data centers and their increasing importance due to cloud computing. It then discusses challenges with current hierarchical data center network architectures, including network congestion, latency issues, and inefficient east-west traffic management. The author proposes a new "Hybrid Flow based Packet filtering, forwarding, and MEMS based all Optical Switching" architecture using OpenFlow and SDN control to help address these challenges by improving performance, scalability, and resource utilization while reducing costs.
Advanced Computer Architecture – An IntroductionDilum Bandara
Introduction to advanced computer architecture, including classes of computers,
Instruction set architecture, Trends, Technology, Power and energy
Cost
Principles of computer design
Software defined networking (SDN) separates the network control plane from the forwarding plane, allowing a single, centralized control plane to control multiple forwarding devices. SDN gives network administrators the ability to abstract the underlying network infrastructure and program how network traffic is handled. This allows SDN to simplify network management and make the network more flexible, programmable, and adaptable to changing needs. However, implementing SDN also presents challenges related to changing traditional network architectures, security, and specialized technical knowledge requirements.
Business Sustainability is becoming increasingly important with the need to wisely consume the scarce resources such as water, energy etc.
IT industry is not an exception and IT professionals are obliged to think about ways and means to maintain a sustainable IT business while helping other businesses be more sustainable by developing innovative IT solutionsfor these businesses.
This lesson will discuss sustainability issues resulting from usage of IT solutions and how such issues can be addressed. We will also investigate some of ICT innovative ways of helping business sustainability
Green IT is another term used to refer to IT sustainability
Similar to Data center architectures and their relevance in cloud processes (20)
Data center architectures and their relevance in cloud processes
1. University of Luxembourg
Data center architectures and their relevance in
cloud processes
Claudio Fiandrino
claudio.fiandrino@uni.lu
December 18, 2014
2. Agenda
Analysis of data center architectures
Communication-aware scheduling criteria
Claudio Fiandrino | Agenda - 1 of 17
3. Outline
Analysis of data center architectures
Definition and Classifications
Architectures Analysis
Energy Consumption and Communication Latency Evaluation
Communication-aware scheduling criteria
Claudio Fiandrino | Analysis of data center architectures - Definition and Classifications 1 of 17
4. Data Center: Definitions
Data Center Infrastructure
The data center is home to the computational power, storage,
management and dissemination of data and information necessary to a
particular body of knowledge or pertaining to a particular business.
Data Center Network Architecture
The data center network architecture is the set of network nodes and
links that characterize the interconnectivity among the computing
servers and to the external world.
Claudio Fiandrino | Analysis of data center architectures - Definition and Classifications 2 of 17
5. A brief list of Architectures
Fat-Tree
“Al-Fares”
Portland
Hedera
Clos (VL2)
Hypercube
BCube
DCell
DPillar
FiConn
FlatNet
Helios
C-Through
Petabit
GreenCloud (Not the Simulator)
[1] Ali Hammadi, Lotfi Mhamdi, A survey on architectures and energy efficiency in Data Center
Networks, Computer Communications, Volume 40, 1 March 2014, Pages 1-21, ISSN 0140-3664,
http://dx.doi.org/10.1016/j.comcom.2013.11.005.
(http://www.sciencedirect.com/science/article/pii/S0140366413002727)
[2] Bari, M.F.; Boutaba, R.; Esteves, R.; Granville, L.Z.; Podlesny, M.; Rabbani, M.G.; Qi Zhang; Zhani,
M.F., “Data Center Network Virtualization: A Survey," IEEE Communications Surveys & Tutorials, vol.15,
no.2, pp.909,928, Second Quarter 2013 doi: 10.1109/SURV.2012.090512.00043
Claudio Fiandrino | Analysis of data center architectures - Definition and Classifications 3 of 17
6. Classifications
Electronic/Optical
Which technology is used in the forwarding?
Switch/Server Centric
Who performs the forwarding?
Ali Hammadi, Lotfi Mhamdi, A survey on architectures and energy efficiency in Data Center Net-
works, Computer Communications, Volume 40, 1 March 2014, Pages 1-21, ISSN 0140-3664,
http://dx.doi.org/10.1016/j.comcom.2013.11.005.
(http://www.sciencedirect.com/science/article/pii/S0140366413002727)
Claudio Fiandrino | Analysis of data center architectures - Definition and Classifications 4 of 17
7. Electronic vs Optical
Fully electronic
Fully optical
Hybrid
Claudio Fiandrino | Analysis of data center architectures - Definition and Classifications 5 of 17
8. Swich Centric vs Server Centric
Switch Centric: switches are the key components in forwarding
Switches are complex
Servers no forwarding functionalities
Bandwidth oversubscription
Server Centric: servers are the key components in forwarding
Switches are very simple
Servers with forwarding functionalities
No bandwidth oversubscription
Trade off
Servers devoted to computational purposes only
Exploiting full link capacity
Claudio Fiandrino | Analysis of data center architectures - Definition and Classifications 6 of 17
9. Outline
Analysis of data center architectures
Definition and Classifications
Architectures Analysis
Energy Consumption and Communication Latency Evaluation
Communication-aware scheduling criteria
Claudio Fiandrino | Analysis of data center architectures - Architectures Analysis 6 of 17
12. BCube
Main parameters:
n: number of ports per switch
k + 1: number of ports per server
Number of servers: nk+1
Number of switches: (k + 1) · nk
Example with n = 4 and k = 1
Internet
Computing Servers
Commodity Switches
Level 0
Commodity Switches
Level k + 1
Load Balancers
Gateway Router
Claudio Fiandrino | Analysis of data center architectures - Architectures Analysis 9 of 17
13. DCell
Main parameters:
n: number of servers per DCell0
k: number of DCell levels, server
degree of connectivity (k + 1)
Number of servers:
tj+1 = tj · (tj + 1), t0 = n
Number of switches (#DCell0):
gj = tj−1 + 1 or #servers/n
Example with n = 3 and k = 1
Internet
Computing Servers
Commodity Switches
Load Balancers
Gateway Router
Claudio Fiandrino | Analysis of data center architectures - Architectures Analysis 10 of 17
14. Outline
Analysis of data center architectures
Definition and Classifications
Architectures Analysis
Energy Consumption and Communication Latency Evaluation
Communication-aware scheduling criteria
Claudio Fiandrino | Analysis of data center architectures - Energy Consumption and Communication Latency Evaluation 10 of 17
15. Evaluation Criteria: Computing Servers
Power consumption (DVFS)
P(l) = Pidle +
Ppeak − Pidle
2
· (1 + l − e−( l
τ ))
l server load
τ in the range [0.5, 0.8]
Key idea:
Load= 0
Servers
Access Layer
Aggregation Layer
Core Layer
→ →
Increasing Load
→ →
Load= 1
Idle link; Active link; Idle device; Active device;
Number of computing servers: 4096
Idle and peak power from Dell PowerEdge R720, Huawei Tecal
RH2288H V2 and IBM System x3500 M4
Claudio Fiandrino | Analysis of data center architectures - Energy Consumption and Communication Latency Evaluation 11 of 17
16. Energy: Results
0 0.2 0.4 0.6 0.8 1
0
1
2
3
4
·105
Load (l)
PowerConsumption(W)
Dcell Three-tier BCube
Claudio Fiandrino | Analysis of data center architectures - Energy Consumption and Communication Latency Evaluation 12 of 17
17. Evaluation Criteria: Network
Three-tier:
128 racks
16 aggregation switches
8 core switches
BCube:
n = 8, k = 3
2048 switches
DCell:
n = 8
2 < k < 3
Other parameters:
1 Gbits link (Three-Tier, BCube and
DCell)
10 Gbits link (Three-Tier)
Test packets of 40 B and 1500 B
Methodology
One way delay
Transmission and Propagation
Claudio Fiandrino | Analysis of data center architectures - Energy Consumption and Communication Latency Evaluation 13 of 17
18. Communication: Results
PERFORMANCE INDEX
ARCHITECTURES
Three-tier BCube DCell
Latency (40 B) 1.98 µs 3.93 µs 4.73 µs
Latency (1500 B) 28.34 µs 73.72 µs 93.92 µs
Hop distance 5.78 7.00 8.94
Server Degree Connectivity 1 4 2.79
Beware: we counted as 2 the number of links between any pair of servers within a DCell0 and in BCube.
Claudio Fiandrino | Analysis of data center architectures - Energy Consumption and Communication Latency Evaluation 14 of 17
19. Take-home messages
Data Center Network Architectures
Different Architectures have:
Different impact on energy costs
Different impact on communication processes
Claudio Fiandrino | Analysis of data center architectures - Energy Consumption and Communication Latency Evaluation 15 of 17
20. Outline
Analysis of data center architectures
Communication-aware scheduling criteria
Current state of the art
Design directions
Claudio Fiandrino | Communication-aware scheduling criteria - Current state of the art 15 of 17
21. Objectives of existing solutions
Communication-unaware
policies
Job distribution
Energy efficiency
Thermal efficiency
Communication-aware
policies
Load balancing
Energy efficiency
[1] D. Kliazovich, P. Bouvry, and Samee U. Khan, DENS: Data Center Energy-Efficient Network-Aware
Scheduling Cluster Computing, special issue on Green Networks, vol. 16, no. 1, pp. 65-75, 2013
Claudio Fiandrino | Communication-aware scheduling criteria - Current state of the art 16 of 17
22. Outline
Analysis of data center architectures
Communication-aware scheduling criteria
Current state of the art
Design directions
Claudio Fiandrino | Communication-aware scheduling criteria - Design directions 16 of 17
23. What to consider?
Claudio Fiandrino | Communication-aware scheduling criteria - Design directions 17 of 17