Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Traffic Load Characterization: - It Involves The Analysis of

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 36

Traffic Load Characterization

It involves the analysis of


traffic ________, traffic __________, and protocol ___________.

Its hard to characterize traffic load Traffic _______ estimation is critical in network design.
1

Concept of Flow
An ______________ connection with
Constant addressing __________ requirements

Preliminary concept
Data ________ and _________ Flow ________s Flow ______________
2

Flows
A set of application and protocol information that has some _________ attribute, such as
Source address Destination address Information type Options, ________, or Other end-to-end information

Flows are end-to-end transmitted during a single _________.


Can be directly linked to an application, host, or network, or associated with an end user.
3

Flow Analysis
Is an integral part of the overall analysis process. Provide an _____________ perspective on requirements Show where requirements ______ and _______. Provide insight into the degrees of ________ and redundancy needed in the network design Provide information useful in choosing an ____________ strategy, such as switching, routing.
4

Types of Flows
An __________ flow, A __________ flow, and A __________ flow

Individual Flow
The basic unit of traffic The flow for a _______ session of an application Flows derived directly from the ___________ spec., or __________ from our best knowledge about the applications and users. Considered either an individual flow or combined into a ______________ flow
6

Composite Flow
Combination of individual (________ delivery) flows that share the same _____, link, or network. Used in the __________ planning for the network.

Individual and Composite Flows


Composite Flow Individual Flows ____________ Characteristics _______ characteristics

Network

Backbone Flow
Formed by composite flows when the network achieves a certain degree of ____________. Useful to indicate where in the network a ___________ planning is needed. Useful for developing _______ and addressing plans at a given network hierarchy.
9

Backbone Flow
_________ flow Network Network _________ flow

Network

network

10

An example of flows

Application A and B

11

Data Sources and Sinks


Data source:
A device or group of devices that primarily produces _______ to network

Data sink
________ data from the network, acting as a data repository.

Indicate about where flows are consolidated and ________.


12

Example of Flows

Primary storage

Primary storage

Backup storage Server

Backup storage

13

Flow Models
Characterized by directionality and hierarchy
Directionality: traffic flow requirement in each _________ (symmetric or asymmetric) Hierarchy:
Degree of ____________ of flows Result of the logical ________ of users, hosts, network, names, addresses, and so on.
14

Flow Model types


_______-to-peer _____________ Cooperative computing _________ computing
Loosely coupled Closely coupled

15

Peer-to-Peer
Describe flows when all users in a group need __________ to each other for an application.
Example: video conferences

Both ends can act as a data ____ or _____. Most likely to be best-effort Specify _____ hierarchy or directionality
16

Peer-to-peer Model
Flows

17

Client-server Flow Model


Flows occur in both directions in the form of ________ and __________. __________ flow: Requests tend to be small relative to responses. __________ flows are from servers to clients.
A flow is critical if it is more important in determining where __________ flows are likely to be found.

Example: Web
18

Client-Server Flow Model


Potential Data source Server

response request Client

Potential Data sink

19

Cooperative-computing Model
Used when
Multiple ________ work together and share information to accomplish a task, or Multiple client-server applications are managed by a _________-level application.

Flows are between


clients and ____________ servers, and Between __________ and from servers to managers.

Critical flows depend on application behavior.


Server-to-server, in client/server case Server-to-server and server-to-_________ when applications are ___________
20

Climate Modeling Problem


Atmospheric Systems

Earth Systems Earth Systems

Ocean Systems
21

Cooperative-Computing Model for Scientific Visualization


Atmosphere Model
Ocean model

Data passing Between models scientist

Land Model

22

Distributed Computing Model


Flows are between _________ and computing nodes or between computing nodes. Depends on __________ between task manager and computing nodes:
__________ coupled
Computing cluster

__________ coupled
Parallel Processing
23

Distributed-Computing Flow Model


__________

Computing node

24

Distributed-Computing Model for a Computing Cluster


Task manager 1) Finance 2) DB transaction 3) Weekly payroll
Computing Result files Task Initialization Files

Potential Data Sources

Computing node

25

Parallel Processing
Task manager Tasks: Node 1 variables Node 2 variables .. Task Initialization Files

Computing node

Data exchanges Between iterations

Critical flow 26

Flow Boundary
________ between large portions of the system. Used to separate geographical _____ of the design environment between
LAN/WAN LAN/MAN ______________ Campus/Campus Building/building Floor/Floor
27

Flow Boundary (cont)


Provide a logical separation of the design environment based on where user traffic are __________ or are likely to have __________ requirements. Separate between
___________, where several flows transit an area of the design environment. Flow ___________ points, where several flows converge to one area. WANs, where service providers are likely to be used. ____________ areas, those that have specific service 28 requirements.

Flow Distributions
Show when flows _____ in one region of the network, or ________ one or more regions of the network. Regions may be _______-, metropolitan-, WANs. Traditional flow distributions is the __________.
80% stays _______ a LAN 20% is _______ the WAN.

80/20 rule was a good rule of thumb for sizing ______ in relation to the numbers and sizes of the ________s in the network.
29

80/20 Flow Distribution


LAN

Flow _______

WAN

LAN

LAN

_____% of traffic

____% of traffic
30

80/20 Rule Modification


Distance-____________ computing or resource use may cause different distribution, e.g. Web. ___________ of physical and logical networks.
Provide an infrastructure for overall connectivity Grouping of users with resources as _______ network. Example: VLAN

Distribution may changes

31

Flow Specification
__________ of the requirements for each flow Take one or three forms
____-part flowspec., used for _______ planning of best-effort flows when there are no specified flows. _____-part flowspec., containing both best-effort and ________ flows. Multipart flowspec., providing more detail on individual components of the specified flows.

32

Flowspec Algorithm
Only capacity requirements are used in _________ calculations For _________ flows, use all characteristics in the calculation. When guaranteed delay and/or reliability requirements are indicated, use _________ in calculating the flowspec. Capacities generated by the unitary, two-part, and multipart flowspecs are ________ capacity, and do not reflect any performance modifiers.
33

Unitary Flowspec

Capacity Best effort environment

SUM (Cbe)

34

Two-Part Flowspec
Capacity and ________ planning

Specified environment Capacity

SUM (CDET)

Best effort environment

SUM (Cbe)

35

Multipart Flowspec
Capacity and service planning

Guaranteed environment Specified environment

C, R, D

Capacity

SUM (CDET)

Best effort environment

SUM (Cbe)

36

You might also like