Top-Down Network Design
Download
Report
Transcript Top-Down Network Design
NETWORK DESIGN AND
IMPLEMENTATION
EEB_7_876
For MSc TeCNE and EDS
1
Website:
http://eent3.lsbu.ac.uk/staff/baoyb/NDI
http://www.lsbu.ac.uk/bb/
Methods of Teaching and Learning : Lectures
and Workshops
Assessment of the Module :
2-hour written examination -- 50%
Two laboratory work reports -- 50%
Lecturer: Ya Bao and Perry Xiao.
2
Top-Down Network
Design, 3rd Edition
Priscilla Oppenheimer
Designing and
Supporting Computer
Networks (CCNA)
3
BACKGROUND READING
Networking Systems Design and
Development
4
TEACHING CALENDAR
Network Programming (Week 1 – 6)
Network Design (Week 7 – 12)
Week 7, 8 Identifying Your Customer’s Needs and Goals
Week 8, 9 Logical Network Design
Week 10 Physical Network Design
Week 11 Testing, Optimizing and Documenting
Week 12 Review
Christmas vacation (3 weeks)
Revision (week 13)
Examination (week 14-15)
5
PART 1
IDENTIFYING YOUR
CUSTOMER’S NEEDS
AND GOALS
Analyzing Business Goals and Constraints
6
Analyzing Technical Goals and Tradeoffs
Characterizing the Existing Internetwork
Characterizing Network Traffic
CHAPTER ONE
ANALYZING BUSINESS GOALS
AND CONSTRAINTS
Systematic, Top-down network
design methodology
Analysing your customer’s
business objectives
Analysing the business constrains;
budgets, timeframes, workplace
politics.
7
NETWORK DESIGN
Good
network design must recognizes
customer’s requirements.
Network design choices and tradeoffs must
be made when designing the logic network
before any physical devices are selected.
8
STRUCTURED NETWORK DESIGN
Four fundamental network design goals:
Scalability
Availability
Security
Manageability
9
HOW A STRUCTURED NETWORK DESIGN CREATES A
STABLE, RELIABLE, SCALABLE NETWORK
Network requirements:
Ease
of management
Fast recovery
Application response time
Fast troubleshooting
10
STRUCTURED NETWORK DESIGN
Core
Layer: connects Distribution Layer devices
Distribution Layer: interconnects smaller LANs
Access Layer: provides connections for hosts and
end devices
11
STRUCTURED NETWORK DESIGN
Steps in network design projects:
Identify the network requirements
Characterize the existing network (for network
upgrading only)
Design the network topology and solutions
Testing, optimizing and documenting
12
START FROM THE TOP
Layer 7
Application
Layer 6
Presentation
Layer 5
Session
Layer 4
Transport
Layer 3
Network
Layer 2
Data Link
Layer 1
Physical
13
14
SYSTEMS DEVELOPMENT LIFE CYCLES
(SDLC)
Typical
systems are developed and
continue to exist over a period of time,
often called a systems development life
cycle (SDLC).
15
TOP-DOWN NETWORK DESIGN STEPS
systems
development life
cycle (SDLC).
Analyze
requirements
Monitor and
optimize
network
performance
Develop
logical
design
Develop
physical
design
Implement
and test
network
Test, optimize,
and document
design
16
THE PDIOO NETWORK LIFE CYCLE
Plan
Design
Implement
Operate
Optimize
Plan
Design
Retire
Optimize
Implement
Operate
17
NETWORK DESIGN STEPS
Phase
Today’s
topic
1 – Analyze Requirements
Analyze business goals and constraints
Analyze technical goals and tradeoffs
Characterize the existing network
Characterize network traffic
18
NETWORK DESIGN STEPS
Phase
2 – Logical Network Design
Design a network topology
Design models for addressing and naming
Select switching and routing protocols
Develop network security strategies
Develop network management strategies
19
NETWORK DESIGN STEPS
Phase
3 – Physical Network Design
Select technologies and devices for campus
networks
Select technologies and devices for enterprise
networks
20
NETWORK DESIGN STEPS
Phase
4 – Testing, Optimizing, and
Documenting the Network Design
Test the network design
Optimize the network design
Document the network design
21
BUSINESS GOALS
Increase
revenue
Reduce operating costs
Improve communications
Shorten product development cycle
Expand into worldwide markets
Build partnerships with other companies
Offer better customer support or new
customer services
22
RECENT BUSINESS PRIORITIES
Mobility
Security
Resiliency
(fault tolerance)
Business continuity after a disaster
Network projects must be prioritized based
on fiscal goals
Networks must offer the low delay required
for real-time applications such as VoIP
23
BUSINESS CONSTRAINTS
Budget
Staffing
Schedule
Politics
and policies
24
COLLECT INFORMATION BEFORE THE
FIRST MEETING
Before
meeting with the client, whether
internal or external, collect some basic
business-related information
Such as
Products produced/Services supplied
Financial viability
Customers, suppliers, competitors
Competitive advantage
25
MEET WITH THE CUSTOMER
Try
to get
A concise statement of the goals of the
project
What problem are they trying to solve?
How will new technology help them be more
successful in their business?
What must happen for the project to
succeed?
26
MEET WITH THE CUSTOMER
Get a copy of the organization chart
This will show the general structure of the organization
It will suggest users to account for
It will suggest geographical locations to account for
27
MEET WITH THE CUSTOMER
Get a copy of the security policy
How does the policy affect the new design?
How does the new design affect the policy?
Is the policy so strict that you (the network designer)
won’t be able to do your job?
Start cataloging network assets that security
should protect
Hardware, software, applications, and data
Less obvious, but still important, intellectual property,
trade secrets, and a company's reputation
28
THE SCOPE OF THE DESIGN PROJECT
Small
Allow sales people to access network via a VPN
Large
in scope?
An entire redesign of an enterprise network
Use
in scope?
the OSI model to clarify the scope
New financial reporting application versus new routing
protocol versus new data link (wireless, for example)
Does
the scope fit the budget, capabilities of staff
and consultants, schedule?
29
GATHER MORE DETAILED INFORMATION
Applications
Now and after the project is completed
Include both productivity applications and
system management applications
User
communities
Data stores
Protocols
Current logical and physical architecture
Current performance
30
SUMMARY
Systematic
approach
Focus first on business requirements and
constraints, and applications
Gain an understanding of the customer’s
corporate structure
Gain an understanding of the customer’s
business style
31
REVIEW QUESTIONS
What
are the main phases of network design
per the top-down network design approach?
What are the main phases of network design
per the PDIOO approach?
Why is it important to understand your
customer’s business style?
What are some typical business goals for
organizations today?
32
CHAPTER TWO
ANALYZING TECHNICAL GOALS
AND TRADEOFFS
33
Copyright 2010 Cisco Press & Priscilla Oppenheimer
TECHNICAL GOALS
Scalability
Availability
Performance
Security
Manageability
Usability
Your lab report should
reflect some of these goals
of your own designed
network.
Adaptability
Affordability
34
SCALABILITY
Scalability
refers to the ability to grow
Some technologies are more scalable
Flat network designs, for example, don’t scale
well
Try
to learn
Number of sites to be added
What will be needed at each of these sites
How many users will be added
How many more servers will be added
35
36
37
AVAILABILITY
Availability
can be expressed as a percent
uptime per year, month, week, day, or hour,
compared to the total time in that period
For example:
24/7 operation
Network is up for 165 hours in the 168-hour week
Availability is 98.21%
Different
applications may require different
levels
Some enterprises may want 99.999% or
“Five Nines” availability
38
AVAILABILITY
Availability
can also be expressed as a
mean time between failure (MTBF) and
mean time to repair (MTTR)
Availability = MTBF/(MTBF + MTTR)
For example:
The network should not fail more than once
every 4,000 hours (166 days) and it should be
fixed within one hour
4,000/4,001 = 99.98% availability
39
AVAILABILITY
DOWNTIME IN MINUTES
Per Hour
Per Day
Per Week
Per Year
99.999%
.0006
.01
.10
5
99.98%
.012
.29
2
105
99.95%
.03
.72
5
263
99.90%
.06
1.44
10
526
99.70%
.18
4.32
30
1577(26
H)
99.999% AVAILABILITY MAY
REQUIRE TRIPLE REDUNDANCY
ISP 1
ISP 2
ISP 3
Enterprise
Can
the customer afford this?
41
SERVER FARMS
Many enterprise networks provide users with Internetaccessible services, such as email and e-commerce.
The availability and security of these services are
crucial to the success of a business.
Managing and securing numerous distributed servers at
various locations within a business network is difficult.
Recommended practice centralised servers in server
farms. Server farms are typically located in computer
rooms and data centres.
42
43
44
BENEFITS OF CREATING A SERVER FARM
1. Network traffic enters and leaves the server farm at a
defined point. This arrangement makes it easier to
secure, filter and prioritise traffic.
2. Redundant, high-capacity links can be installed to the
servers and between the server farm network and the
main LAN. This configuration is more cost-effective
than attempting to provide a similar level of connectivity
to servers distributed throughout the network.
3. Load balancing and failover can be provided between
servers and between networking devices.
4. The number of high-capacity switches and security
devices is reduced, helping to lower the cost of providing
45
services.
NETWORK PERFORMANCE
Common
performance factors include
Bandwidth
Throughput
Bandwidth utilization
Offered load
Accuracy
Efficiency
Delay (latency) and delay variation
Response time
46
BANDWIDTH VS. THROUGHPUT
Bandwidth
and throughput are not the
same
Bandwidth is the data carrying capacity of a
circuit, fixed.
Usually specified in bits per second-bps
Throughput
is the quantity of error free
data transmitted per unit of time
Measured in bps, Bps, or packets per second (pps)
Depend on offered load, access method and error rate
Throughput < Bandwidth
47
BANDWIDTH, THROUGHPUT, LOAD
100 % of Capacity
T
h
r
o
u
g
h
p
u
t
Actual
100 % of Capacity
Offered Load
48
OTHER FACTORS THAT AFFECT THROUGHPUT
The size of packets
Inter-frame gaps between packets
Packets-per-second ratings of devices that forward
packets
Client speed (CPU, memory, and HD access speeds)
Server speed (CPU, memory, and HD access speeds)
Network design
MAC Protocols (ALOHA 18.4%)
Distance
Errors
Time of day, etc., etc., etc.
49
THROUGHPUT VS. GOODPUT
Are
you referring to bytes per second,
regardless of whether the bytes are user
data bytes or packet header bytes
Or are you concerned with application-layer
throughput of user bytes, sometimes called
“goodput”
In that case, you have to consider that bandwidth is
being “wasted” by the headers in every packet
50
PERFORMANCE (CONTINUED)
Efficiency
How much overhead is required to deliver an
amount of data?
How large can packets be?
Larger better for efficiency (and goodput)
But too large means too much data is lost if a packet is
damaged
How many packets can be sent in one bunch without an
acknowledgment?
51
EFFICIENCY
Small Frames (Less Efficient)
Large Frames (More Efficient)
52
DELAY FROM THE USER’S POINT OF
VIEW
Response
Time
A function of the
application and the
equipment the
application is
running on, not just
the network
Most users expect to
see something on the
screen in 100 to 200
milliseconds
53
DELAY FROM THE ENGINEER’S POINT
OF VIEW
Propagation
delay
A signal travels in a cable at about 2/3 the speed
of light in a vacuum (3×108 m/s)
Transmission
delay (also known as
serialization delay)
Time to put digital data onto a transmission line
For example, it takes about 5 ms to output a 1,024 byte
packet on a 1.544 Mbps T1 line
Packet-switching
Queuing
delay
delay
54
Average Queue Depth
QUEUING DELAY AND BANDWIDTH UTILIZATION
15
12
9
6
3
0
0.5
0.6
0.7
0.8
0.9
Average Utilization
Number of packets in a queue increases exponentially
as utilization increases
Queue depth = utilization/(1- utilization)
1
EXAMPLE
A
packet switch has 5 users, each offering
packets at a rate of 10 packets per second
The average length of the packets is 1,024 bits
The packet switch needs to transmit this data
over a 56-Kbps WAN circuit
Load = 5 x 10 x 1,024 = 51,200 bps
Utilization = 51,200/56,000 = 91.4%
Average number of packets in queue =
(0.914)/(1-0.914) = 10.63 packets
56
SECURITY
Focus
on requirements first
Detailed security planning later (Chapter
8)
Identify network assets
Including their value and the expected cost
associated with losing them due to a security
problem
Analyze
security risks
57
MANAGEABILITY
Fault
management
Configuration management
Accounting management
Performance management
Security management
58
USABILITY
Usability:
the ease of use with which
network users can access the network and
services
Networks should make users’ jobs easier
Some design decisions will have a
negative affect on usability:
Strict security, for example
59
ADAPTABILITY
Avoid
incorporating any design elements
that would make it hard to implement new
technologies in the future
Change can come in the form of new
protocols, new business practices, new fiscal
goals, new legislation
A flexible design can adapt to changing
traffic patterns and Quality of Service (QoS)
requirements
60
AFFORDABILITY
A
network should carry the maximum
amount of traffic possible for a given
financial cost
Affordability is especially important in
campus network designs
WANs are expected to cost more, but costs
can be reduced with the proper use of
technology
Quiet routing protocols, for example
61
MAKING TRADEOFFS (EXAMPLE)
Scalability
Availability
Network
performance
Security
Manageability
Usability
Adaptability
Affordability
Total (must add up to 100)
20
30
15
5
5
5
5
15
100
62
SUMMARY
Continue
to use a systematic, top-down
approach
Don’t select products until you understand
goals for scalability, availability, performance,
security, manageability, usability,
adaptability, and affordability
Tradeoffs are almost always necessary
63
REVIEW QUESTIONS
What
are some typical technical goals for
organizations today?
How do bandwidth and throughput differ?
How can one improve network efficiency?
What tradeoffs may be necessary in order to
improve network efficiency?
64
CHAPTER THREE
CHARACTERIZING THE
EXISTING INTERNETWORK
65
Copyright 2010 Cisco Press & Priscilla Oppenheimer
WHAT’S THE STARTING POINT?
According
to Abraham Lincoln:
“If we could first know where we are and whither
we are tending, we could better judge what to do
and how to do it.”
66
WHERE ARE WE?
Characterize
the exiting internetwork in
terms of:
Its infrastructure
Logical structure (modularity, hierarchy, topology)
Physical structure
Addressing and naming
Wiring and media
Architectural and environmental constraints
Health
67
DIAGRAM A PHYSICAL NETWORK AND
DOCUMENT THE EXISTING NETWORK
Network documentation:
Logical and physical diagrams
Floor plans
Complete lists for equipments and
applications
Current network configuration files
GET A NETWORK MAP (PHYSICAL)
Medford
Fast Ethernet
50 users
Roseburg
Fast Ethernet
30 users
Frame Relay
CIR = 56 Kbps
DLCI = 5
Frame Relay
CIR = 56 Kbps
DLCI = 4
Grants Pass
HQ
Gigabit
Ethernet
Gigabit
Ethernet
Grants Pass
HQ
Fast Ethernet
75 users
FEP
(Front End
Processor)
IBM
Mainframe
T1
Web/FTP server
Eugene
Ethernet
20 users
T1
Internet
69
DIAGRAM A PHYSICAL NETWORK AND
DOCUMENT THE EXISTING NETWORK
Identify
and document the strengths and
weaknesses of the existing network
Focus on finding ways to overcome
weaknesses
71
CHARACTERIZE ADDRESSING
NAMING
AND
IP
addressing for major devices, client
networks, server networks, and so on
Any addressing oddities, such as
discontiguous subnets?
Any strategies for addressing and naming?
For example, sites may be named using airport
codes
San Francisco = SFO, Oakland = OAK
In LSBU, T-tower block; K-keyworth building; BBorough road building; L- london road building
72
DISCONTINUOUS SUBNETS – make
problems for some routing protocols
Area 0
Network
192.168.49.0
Router A
Area 1
Subnets 10.108.16.0 10.108.31.0
Router B
Area 2
Subnets 10.108.32.0 10.108.47.0
73
CHARACTERIZE THE WIRING AND MEDIA
Single-mode
fiber
Multi-mode fiber
Shielded twisted pair (STP) copper
Unshielded-twisted-pair (UTP) copper
Coaxial cable
Microwave
Laser
Radio
Infra-red
74
ARCHITECTURAL CONSTRAINTS
Make
sure the following are sufficient
Air conditioning
Heating
Ventilation
Power
Protection from electromagnetic interference
Doors that can lock
75
ARCHITECTURAL CONSTRAINTS
Make
sure there’s space for:
Cabling conduits
Patch panels
Equipment racks
Work areas for technicians installing and
troubleshooting equipment
76
77
CHECK THE HEALTH OF THE
EXISTING INTERNETWORK
Performance
Availability
Bandwidth
utilization
Accuracy
Efficiency
Response
time
Status of major routers, switches, and
firewalls
78
CHARACTERIZE AVAILABILITY
MTBF
MTTR
Date and Duration
of Last Major
Downtime
Cause of Last
Major
Downtime
Fix for Last
Major
Downtime
Enterprise
Segment 1
Segment 2
Segment n
Mean time between failures (MTBF)
Mean time to recovery (MTTR)
79
NETWORK UTILIZATION IN MINUTE
INTERVALS
Network Utilization
16:40:00
16:43:00
16:46:00
16:49:00
Time
16:52:00
16:55:00
Series1
16:58:00
17:01:00
17:04:00
17:07:00
17:10:00
0
1
2
3
4
Utilization
5
6
7
80
NETWORK UTILIZATION IN HOUR
INTERVALS
Network Utilization
13:00:00
Time
14:00:00
15:00:00
Series1
16:00:00
17:00:00
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
Utilization
81
BANDWIDTH UTILIZATION BY
PROTOCOL
Relative
Network
Utilization
Absolute
Network
Utilization
Broadcast
Rate
Multicast
Rate
Protocol 1
Protocol 2
Protocol 3
Protocol n
82
CHARACTERIZE PACKET SIZES
83
CHARACTERIZE RESPONSE TIME
Node A
Node A
Node B
Node C
Node D
Node B
Node C
Node D
X
X
X
X
84
CHECK THE STATUS OF MAJOR ROUTERS,
SWITCHES, AND FIREWALLS
show
buffers
show environment
show interfaces
show memory
show processes
show running-config
show version
Use Cisco
IOS show
command
85
TOOLS
Protocol
analyzers
Multi Router Traffic Grapher (MRTG)
Remote monitoring (RMON) probes
Cisco Discovery Protocol (CDP)
Cisco IOS NetFlow technology
CiscoWorks
86
SUMMARY
Characterize
the exiting internetwork before
designing enhancements
Helps you verify that a customer’s design
goals are realistic
Helps you locate where new equipment will go
Helps you cover yourself if the new network
has problems due to unresolved problems in
the old network
87
REVIEW QUESTIONS
What
factors will help you decide if the
existing internetwork is in good enough shape
to support new enhancements?
When considering protocol behavior, what is
the difference between relative network
utilization and absolute network utilization?
Why should you characterize the logical
structure of an internetwork and not just the
physical structure?
What architectural and environmental factors
should you consider for a new wireless
88
installation?
CHAPTER FOUR
CHARACTERIZING NETWORK
TRAFFIC
89
Copyright 2010 Cisco Press & Priscilla Oppenheimer
NETWORK TRAFFIC FACTORS
Traffic
flow
Location of traffic sources and data stores
Traffic load
Traffic behavior
Quality of Service (QoS) requirements
90
USER COMMUNITIES, a set of worker who use
a particular application or set of applications.
User
Community
Name
Size of
Community
(Number of
Users)
Location(s) of
Community
Application(s)
Used by
Community
91
DATA STORES (SINKS), an area in a network
where application layer data resides. Server, or any
device where large quantities of data are stored.
Data Store
Location
Application(s) Used by User
Community(or
Communities)
92
TRAFFIC FLOW, involves identifying and
characterizing individual traffic flows between
traffic source and stores.
Destination 1
MB/sec
Destination 2
MB/sec
Destination 3
MB/sec
Destination
MB/sec
Source 1
Source 2
Source 3
Source n
93
TRAFFIC FLOW
EXAMPLE
App 2
App 3
App 4
App 9
Total
20
96
24
80
220
Library and Computing Center
30 Library Patrons (PCs)
30 Macs and 60 PCs in
Computing Center
Server Farm
Kbps
Kbps
Kbps
Kbps
Kbps
10-Mbps Metro
Ethernet to Internet
App 1
App 2
App 3
App 4
App 7
Total
108
60
192
48
400
808
25 Macs
50 PCs
50 PCs
Arts and
Humanities
Administration
App 1
App 2
App 3
App 4
Total
30 PCs
Business and
Social Sciences
Kbps
Kbps
Kbps
Kbps
Kbps
Kbps
30
20
60
16
126
Kbps
Kbps
Kbps
Kbps
Kbps
App 1
48 Kbps
App 2
32 Kbps
App 3
96 Kbps
App 4
24 Kbps
App 5 300 Kbps
App 6 200 Kbps
App 8 1200 Kbps
Total 1900 Kbps
Math and
Sciences
50 PCs
94
TYPES OF TRAFFIC FLOW
Terminal/host
Client/server
Thin
client
Peer-to-peer
Server/server
Distributed computing
95
TRAFFIC FLOW FOR VOICE OVER IP
The
flow associated with
transmitting the audio voice is
separate from the flows
associated with call setup and
teardown.
The flow for transmitting the digital
voice is essentially peer-to-peer.
Call setup and teardown is a
client/server flow
A phone needs to talk to a server or phone
switch that understands phone numbers,
IP addresses, capabilities negotiation, and
so on.
96
IDENTIFYING APPLICATION IMPACTS
ON NETWORK DESIGN
File transfer and email applications:
Unpredictable bandwidth usage
Large packet size
Centralization of file and mail servers in a
secure location
Redundancy to ensure reliable service
IDENTIFYING APPLICATION IMPACTS
ON NETWORK DESIGN
HTTP and web traffic:
Network media
Redundancy
Security
NETWORK APPLICATIONS
TRAFFIC CHARACTERISTICS
Name of
Type of
Application Traffic
Flow
Protocol(s)
Used by
Application
User
Communities
That Use the
Application
Data Stores
Approximate
(Servers, Hosts, Bandwidth
and so on)
Requirements
QoS
Requirements
99
TRAFFIC LOAD
To
calculate whether capacity is sufficient,
you should know:
The number of stations
The average time that a station is idle between
sending frames
The time required to transmit a message once
medium access is gained
That
level of detailed information can be
hard to gather, however
100
SIZE OF OBJECTS ON NETWORKS
Terminal
screen: 4 Kbytes
Simple e-mail: 10 Kbytes
Simple web page: 50 Kbytes
High-quality image: 50Mbytes
Database backup: 1Gbytes or more
101
TRAFFIC BEHAVIOR
Broadcasts
All ones data-link layer destination address
FF: FF: FF: FF: FF: FF
Doesn’t necessarily use huge amounts of bandwidth
But does disturb every CPU in the broadcast domain
Multicasts
First bit sent is a one
01:00:0C:CC:CC:CC (Cisco Discovery Protocol)
Should just disturb NICs that have registered to
receive it
Requires multicast routing protocol on internetworks
102
NETWORK EFFICIENCY
Frame
size
Protocol interaction
Windowing and flow control
Error-recovery mechanisms
103
QOS REQUIREMENTS
ATM
service specifications
Constant bit rate (CBR)
Realtime variable bit rate (rt-VBR)
Non-realtime variable bit rate (nrt-VBR)
Unspecified bit rate (UBR)
Available bit rate (ABR)
Guaranteed frame rate (GFR)
104
QOS REQUIREMENTS
PER
IETF
(Internet Engineering Task Force, develops and
promotes Internet standards, It is an open
standards organization, with no formal
membership or membership requirements.)
IETF
integrated services working group
specifications
Controlled load service
Provides client data flow with a QoS closely
approximating the QoS that same flow would receive
on an unloaded network
Guaranteed service
Provides firm (mathematically provable) bounds on
end-to-end packet-queuing delays
105
QOS REQUIREMENTS
PER
IETF
IETF
differentiated services working
group specifications
RFC 2475
IP packets can be marked with a differentiated
services codepoint (DSCP) to influence queuing
and packet-dropping decisions for IP
datagrams on an output interface of a router
106
HOW QUALITY OF SERVICE IS
IMPLEMENTED ON THE LAN/WAN
Where QoS can be implemented to affect
traffic flow:
Layer 2 devices
Layer 3 devices
DOCUMENT THE NETWORK
REQUIREMENTS OF SPECIFIC
CATEGORIES OF APPLICATIONS
Estimate
the volume of application traffic
during the initial design phase.
Document projected applications and
associated hardware in a network diagram.
SUMMARY
Continue
to use a systematic, top-down
approach
Don’t select products until you understand
network traffic in terms of:
Flow
Load
Behavior
QoS requirements
109
REVIEW QUESTIONS
List
and describe six different types of traffic
flows.
What makes traffic flow in voice over IP
networks challenging to characterize and plan
for?
Why should you be concerned about broadcast
traffic?
How do ATM and IETF specifications for QoS
differ?
110
OF
PART 1
111