SlideShare a Scribd company logo
1 of 29
UNIT – 4
 It is a conceptual model that defines the structure,
behavior, and more views of a system.
 Also known as ‘Enterprise Architecture’
 It is a superset of network architecture.
 It consists of following functions:
 Clients
 Applications
 Storage
 Network
 Servers
 Databases.
relationships
clients
application
s
storage
network
Servers
Database
s
 Network architecture is an identifier used to locate a
device(host) on the network.
 IP address  dotted decimal notation.
 Example :
 192.168.155.0
 192.168.155.0
addresses
Local
Global
Private
Public
Tempor
ary
Perman
ent/
persiste
nt
Address Type Meaning
Local Address Identify locally – LAN/ SUBNET/ETHERNET
Global Address Identify Globally/World Wide – WAN network
Private Address Used in NAT – Network Address Translation(individual)
Public Address Used in Public Internet(static/dynamic)
Temporary Address Assigned for short term duration of time.
Persistent Address Assigned for long term duration of time.
 Routing is the process of selecting best paths in a
network.
 the process of moving a packet of data from source
to destination
 Example :
 Routing Protocols:
 RIP – Routing Information Protocol
 RIP v2 - Routing Information Protocol Version 2.0
 OSPF – Open Shortest Path – First
 BGP – Border Gateway Protocol.
 Sub-netting & Super-netting,
 Variable-length Sub-netting,
 Dynamic Addressing,
 Private Addressing,
 Virtual Lans (Vlans),
 Ipv6, And
 Network Address Translation (Nat).
 Switching And Routing,
 Classless Inter-Domain Routing (CIDR):
 Multicasts,
 Mobile IP,
 Route Filtering/Peering/Routing/policies
 Confederations( IGP, EGP)
 CLASSFULL ADDRESSING :
 Class A,B,C,D,E.
 To Scale the network Addressing we will use the
number of
 Functional areas within the network.
 Workgroups within each function area
 Subnets within each workgroup
 Total numbers of subnets(current & future) Organization
 Total Number of Devices(current & future)
 Routing strategies Such as
 Process of times
 Protocol overheads: (Static And Dynamic protocol)
 In terms of capacity(bandwidth)
 CPU – Utilization
 Memory - Utilization
 Stability.
 Some Recommendations for choosing and applying
routing protocols for the network.
These recommendations are:
Minimize the number of routing protocols used in
the network.
Start with the routing mechanism/ protocol.
Routing choices of routing protocols increase.
Revaluated the previous decisions.
 NETWORK MANAGEMENT MECHANISMS:
 There are two major network management
protocols:
 The Simple Network Management Protocol(SNMP).
 The Common Management Information
Protocol(CMIP).
 These two protocols provide the mechanism for
 RETRIEVING , CHANGING(MODIFY) AND
TRANSPORT the network management data across the
network.
Monitoring is obtaining values for
• End to End.
• Per Link
• Per Element.
Monitoring process involves
• Collecting data.
• Processing data.
• Storing data.
 Instrumentation is the set of tools and utilities needed
to monitor and management the data.
 Instrumentation mechanisms are:
 Access to network management data VIA SNMP(MIB).
 Monitoring tools(Ping, Traceroute, TCPdump)(remote)
 Direct Access(TelNet,FTP)
 Instrumentation can be coupled with MONITORING,
DISPLAY, PROCESSING AND STORAGE to form a
complete management system.
• Configuration is setting parameters in a network device.
• Used to Operation and control the element.
• Configuration mechanisms:
• Includes
• DIRECT ACCESS to devices,
• REMOTE ACCESS to devices,
• DOWNLOADING configuration files.
• Downloading Configuration Files:
• Use of FTP to download configuration files.
• SNMP set commands.
• Telnet and command line interface (CLI) Access.
• Access via HTTP.
• Access Via CORBA(Common Object Request Architecture)
 Telnet is a network protocol
 used on the Internet or Local Area Networks.
 To provide a bidirectional interactive text-oriented
communication facility using a virtual terminal connection.
 PERFORMANCE ARCHITECTURE:
 To provide
 single – Tier performance.
 Multi – Tier performance in a network.
These mechanisms provide the means
• to identify traffic flows, groups of flows.
• Measure temporal characteristics.
 It is the overall performance of a computer network,
particularly the performance seen by the users of the
network.
 QoS, is determining, setting, and acting upon priority l
Quality Of Service:
 (SLAs) are informal or formal contracts
between a Service - provider and Service –
Requester.
 Policies are sets (formal or informal) of high-
level statements about how network
Resources / Services /Access Permissions are
to be allocated among users.
 The heart of providing performance in a network.
 These mechanisms are usually implemented in network
devices such as ROUTERS AND SWITCHES
 It is process of determining which user , application,
device, flow or connection gets service.
 Or Gets a higher level of service.
 It begins during the requirements and flow analysis
process.
 It consists of two mechanisms:
 admission control:
 Ability to refuse/restrict access to network resources.
 traffic conditioning:
 It is a set of mechanisms that modify(increase/decrease)
performance to traffic flows.
VOIP : voice over IP
SIP : Session Initiation protocol.
 Scheduling is the mechanism
 Determines the order in which traffic is processed for
transmission.
 It is applied at network devices throughout a network.
 Network Devices such as : Switches/ Routers.
 Algorithms:
 Weighted Fair Queuing(WFQ)
 Class Based Queuing(CBQ)
 Sorting IP packets within a network device while they
waif for processing.
 The queuing mechanisms are:
 First In First Out(FIFO)- packets stored in a single queue.
 Weighted Fair Queuing(WFQ)-Assigns priorities to
queues.
 Class Based Queuing(CBQ) - multiple queues with
differing priorities are maintained.
 Random early detect(RED)- Drop packets early.
 Weighted RED(WRED)- supports multiple levels for
dropping packets.
THANK YOU

More Related Content

What's hot

What is network architecture
What is network architecture What is network architecture
What is network architecture Sorcia D'Arceuil
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networksSweta Kumari Barnwal
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)sarmad ali
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Introduction to computer Networks
Introduction to computer NetworksIntroduction to computer Networks
Introduction to computer NetworksShohanaakterKakon
 
Network architecture
Network architectureNetwork architecture
Network architectureOnline
 
Network design consideration
Network design considerationNetwork design consideration
Network design considerationlavanya marichamy
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkAtika Zaimi
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksamudha arul
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise NetworksVisualBee.com
 
Wide Area Network
Wide Area NetworkWide Area Network
Wide Area Networkzaisahil
 

What's hot (20)

Presentation5
Presentation5Presentation5
Presentation5
 
Chapter10
Chapter10Chapter10
Chapter10
 
What is network architecture
What is network architecture What is network architecture
What is network architecture
 
01 overview[1]r
01 overview[1]r01 overview[1]r
01 overview[1]r
 
Wireless ethernet
Wireless ethernetWireless ethernet
Wireless ethernet
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Introduction to computer Networks
Introduction to computer NetworksIntroduction to computer Networks
Introduction to computer Networks
 
2. network elements
2. network elements2. network elements
2. network elements
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Introduction to computer networks
 Introduction to computer networks Introduction to computer networks
Introduction to computer networks
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise Networks
 
Wide Area Network
Wide Area NetworkWide Area Network
Wide Area Network
 

Viewers also liked

Developing capacity requirements
Developing capacity requirementsDeveloping capacity requirements
Developing capacity requirementscsk selva
 
Developing requirements specification
Developing requirements specificationDeveloping requirements specification
Developing requirements specificationcsk selva
 
Flow analysis overview
Flow analysis overviewFlow analysis overview
Flow analysis overviewcsk selva
 
Audience responses
Audience responsesAudience responses
Audience responsesTom-Brett
 
Identifying and developing flows modified
Identifying and developing flows modifiedIdentifying and developing flows modified
Identifying and developing flows modifiedcsk selva
 
Requirements mapping
Requirements mappingRequirements mapping
Requirements mappingcsk selva
 
Development pro forma
Development pro formaDevelopment pro forma
Development pro formaTom-Brett
 
Developing delay requirements
Developing delay requirementsDeveloping delay requirements
Developing delay requirementscsk selva
 
CHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURCHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURcsk selva
 
overview of analysis, architecture and design process
overview of analysis, architecture and design processoverview of analysis, architecture and design process
overview of analysis, architecture and design processcsk selva
 
service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...csk selva
 
Other requirements, requirement specification and map
Other requirements, requirement specification and mapOther requirements, requirement specification and map
Other requirements, requirement specification and mapcsk selva
 
Flow spec algorithm
Flow spec algorithmFlow spec algorithm
Flow spec algorithmcsk selva
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysiscsk selva
 

Viewers also liked (16)

Developing capacity requirements
Developing capacity requirementsDeveloping capacity requirements
Developing capacity requirements
 
Developing requirements specification
Developing requirements specificationDeveloping requirements specification
Developing requirements specification
 
Flow analysis overview
Flow analysis overviewFlow analysis overview
Flow analysis overview
 
Audience responses
Audience responsesAudience responses
Audience responses
 
Identifying and developing flows modified
Identifying and developing flows modifiedIdentifying and developing flows modified
Identifying and developing flows modified
 
สรุปการเรียนรู้ Lego
สรุปการเรียนรู้ Legoสรุปการเรียนรู้ Lego
สรุปการเรียนรู้ Lego
 
Requirements mapping
Requirements mappingRequirements mapping
Requirements mapping
 
Development pro forma
Development pro formaDevelopment pro forma
Development pro forma
 
Developing delay requirements
Developing delay requirementsDeveloping delay requirements
Developing delay requirements
 
Flow models
Flow modelsFlow models
Flow models
 
CHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURCHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOUR
 
overview of analysis, architecture and design process
overview of analysis, architecture and design processoverview of analysis, architecture and design process
overview of analysis, architecture and design process
 
service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...
 
Other requirements, requirement specification and map
Other requirements, requirement specification and mapOther requirements, requirement specification and map
Other requirements, requirement specification and map
 
Flow spec algorithm
Flow spec algorithmFlow spec algorithm
Flow spec algorithm
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
 

Similar to Systems and network architectures

Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementscsk selva
 
Chapter 7 - Resource Monitoring & Management.ppt
Chapter 7 - Resource Monitoring & Management.pptChapter 7 - Resource Monitoring & Management.ppt
Chapter 7 - Resource Monitoring & Management.pptgadisaAdamu
 
client server protocol
client server protocolclient server protocol
client server protocolbmuhire
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpiMohammed Abdallah
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptxtahaazad2
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptxTadeseBeyene
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSNDhaya kanthavel
 
Well_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdfWell_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdfHari Prasetyo Utomo
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
 
Cloud data management
Cloud data managementCloud data management
Cloud data managementambitlick
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkDr Geetha Mohan
 
Ccna exploration network fundamentals
Ccna exploration  network fundamentalsCcna exploration  network fundamentals
Ccna exploration network fundamentalsIT Tech
 
Software defined network-- SDN
Software defined network-- SDNSoftware defined network-- SDN
Software defined network-- SDNAadarsh Sharma
 

Similar to Systems and network architectures (20)

CN PPT
CN PPTCN PPT
CN PPT
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
 
Chapter 7 - Resource Monitoring & Management.ppt
Chapter 7 - Resource Monitoring & Management.pptChapter 7 - Resource Monitoring & Management.ppt
Chapter 7 - Resource Monitoring & Management.ppt
 
Unit 4 for PG PAWSN
Unit 4 for PG PAWSNUnit 4 for PG PAWSN
Unit 4 for PG PAWSN
 
client server protocol
client server protocolclient server protocol
client server protocol
 
Network management
Network managementNetwork management
Network management
 
SDN Introduction
SDN IntroductionSDN Introduction
SDN Introduction
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpi
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Well_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdfWell_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdf
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Chapter04
Chapter04Chapter04
Chapter04
 
Cloud data management
Cloud data managementCloud data management
Cloud data management
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
 
Ccna exploration network fundamentals
Ccna exploration  network fundamentalsCcna exploration  network fundamentals
Ccna exploration network fundamentals
 
Software defined network-- SDN
Software defined network-- SDNSoftware defined network-- SDN
Software defined network-- SDN
 

More from csk selva

Network design
Network designNetwork design
Network designcsk selva
 
Thresholds and limits
Thresholds and limitsThresholds and limits
Thresholds and limitscsk selva
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysiscsk selva
 
Developing supplemental performance requirements
Developing supplemental performance requirementsDeveloping supplemental performance requirements
Developing supplemental performance requirementscsk selva
 
Developing service metrics
Developing service metricsDeveloping service metrics
Developing service metricscsk selva
 
Developing rma requirements
Developing rma requirementsDeveloping rma requirements
Developing rma requirementscsk selva
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirementscsk selva
 

More from csk selva (7)

Network design
Network designNetwork design
Network design
 
Thresholds and limits
Thresholds and limitsThresholds and limits
Thresholds and limits
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysis
 
Developing supplemental performance requirements
Developing supplemental performance requirementsDeveloping supplemental performance requirements
Developing supplemental performance requirements
 
Developing service metrics
Developing service metricsDeveloping service metrics
Developing service metrics
 
Developing rma requirements
Developing rma requirementsDeveloping rma requirements
Developing rma requirements
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirements
 

Recently uploaded

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 

Recently uploaded (20)

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 

Systems and network architectures

  • 2.  It is a conceptual model that defines the structure, behavior, and more views of a system.  Also known as ‘Enterprise Architecture’  It is a superset of network architecture.  It consists of following functions:  Clients  Applications  Storage  Network  Servers  Databases.
  • 4.  Network architecture is an identifier used to locate a device(host) on the network.  IP address  dotted decimal notation.  Example :  192.168.155.0  192.168.155.0
  • 6. Address Type Meaning Local Address Identify locally – LAN/ SUBNET/ETHERNET Global Address Identify Globally/World Wide – WAN network Private Address Used in NAT – Network Address Translation(individual) Public Address Used in Public Internet(static/dynamic) Temporary Address Assigned for short term duration of time. Persistent Address Assigned for long term duration of time.
  • 7.  Routing is the process of selecting best paths in a network.  the process of moving a packet of data from source to destination  Example :  Routing Protocols:  RIP – Routing Information Protocol  RIP v2 - Routing Information Protocol Version 2.0  OSPF – Open Shortest Path – First  BGP – Border Gateway Protocol.
  • 8.
  • 9.  Sub-netting & Super-netting,  Variable-length Sub-netting,  Dynamic Addressing,  Private Addressing,  Virtual Lans (Vlans),  Ipv6, And  Network Address Translation (Nat).
  • 10.  Switching And Routing,  Classless Inter-Domain Routing (CIDR):  Multicasts,  Mobile IP,  Route Filtering/Peering/Routing/policies  Confederations( IGP, EGP)
  • 11.  CLASSFULL ADDRESSING :  Class A,B,C,D,E.
  • 12.
  • 13.  To Scale the network Addressing we will use the number of  Functional areas within the network.  Workgroups within each function area  Subnets within each workgroup  Total numbers of subnets(current & future) Organization  Total Number of Devices(current & future)
  • 14.  Routing strategies Such as  Process of times  Protocol overheads: (Static And Dynamic protocol)  In terms of capacity(bandwidth)  CPU – Utilization  Memory - Utilization  Stability.
  • 15.  Some Recommendations for choosing and applying routing protocols for the network. These recommendations are: Minimize the number of routing protocols used in the network. Start with the routing mechanism/ protocol. Routing choices of routing protocols increase. Revaluated the previous decisions.
  • 16.  NETWORK MANAGEMENT MECHANISMS:  There are two major network management protocols:  The Simple Network Management Protocol(SNMP).  The Common Management Information Protocol(CMIP).  These two protocols provide the mechanism for  RETRIEVING , CHANGING(MODIFY) AND TRANSPORT the network management data across the network.
  • 17. Monitoring is obtaining values for • End to End. • Per Link • Per Element. Monitoring process involves • Collecting data. • Processing data. • Storing data.
  • 18.  Instrumentation is the set of tools and utilities needed to monitor and management the data.  Instrumentation mechanisms are:  Access to network management data VIA SNMP(MIB).  Monitoring tools(Ping, Traceroute, TCPdump)(remote)  Direct Access(TelNet,FTP)  Instrumentation can be coupled with MONITORING, DISPLAY, PROCESSING AND STORAGE to form a complete management system.
  • 19. • Configuration is setting parameters in a network device. • Used to Operation and control the element. • Configuration mechanisms: • Includes • DIRECT ACCESS to devices, • REMOTE ACCESS to devices, • DOWNLOADING configuration files.
  • 20. • Downloading Configuration Files: • Use of FTP to download configuration files. • SNMP set commands. • Telnet and command line interface (CLI) Access. • Access via HTTP. • Access Via CORBA(Common Object Request Architecture)  Telnet is a network protocol  used on the Internet or Local Area Networks.  To provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.
  • 21.  PERFORMANCE ARCHITECTURE:  To provide  single – Tier performance.  Multi – Tier performance in a network. These mechanisms provide the means • to identify traffic flows, groups of flows. • Measure temporal characteristics.
  • 22.  It is the overall performance of a computer network, particularly the performance seen by the users of the network.  QoS, is determining, setting, and acting upon priority l Quality Of Service:
  • 23.  (SLAs) are informal or formal contracts between a Service - provider and Service – Requester.  Policies are sets (formal or informal) of high- level statements about how network Resources / Services /Access Permissions are to be allocated among users.
  • 24.  The heart of providing performance in a network.  These mechanisms are usually implemented in network devices such as ROUTERS AND SWITCHES
  • 25.  It is process of determining which user , application, device, flow or connection gets service.  Or Gets a higher level of service.  It begins during the requirements and flow analysis process.
  • 26.  It consists of two mechanisms:  admission control:  Ability to refuse/restrict access to network resources.  traffic conditioning:  It is a set of mechanisms that modify(increase/decrease) performance to traffic flows. VOIP : voice over IP SIP : Session Initiation protocol.
  • 27.  Scheduling is the mechanism  Determines the order in which traffic is processed for transmission.  It is applied at network devices throughout a network.  Network Devices such as : Switches/ Routers.  Algorithms:  Weighted Fair Queuing(WFQ)  Class Based Queuing(CBQ)
  • 28.  Sorting IP packets within a network device while they waif for processing.  The queuing mechanisms are:  First In First Out(FIFO)- packets stored in a single queue.  Weighted Fair Queuing(WFQ)-Assigns priorities to queues.  Class Based Queuing(CBQ) - multiple queues with differing priorities are maintained.  Random early detect(RED)- Drop packets early.  Weighted RED(WRED)- supports multiple levels for dropping packets.