CSE 550 Computer Network Design
Download
Report
Transcript CSE 550 Computer Network Design
CSE 550
Computer Network Design
Dr. Mohammed H. Sqalli
COE, KFUPM
Spring 2012 (Term 112)
Introduction
What is a Network?
What is “Network Design”?
Top-Down Network Design
Network Development Life Cycle (NDLC)
Network Analysis and Design Methodology
Types of Network Design
And Then What?
CSE-550-T112
Lecture Notes - 1
2
What is a Network?
Management view
Technical view
CSE-550-T112
Lecture Notes - 1
3
The Management View (1/3)
A network is a utility
Computers and their users are customers of the network
utility
The network must accommodate the needs of
customers
As computer usage increases so does the requirements
of the network utility
Resources will be used to manage the network
The Network Utility is NOT free!
Someone must pay the cost of installing and maintaining
the network
Manpower is required to support the network utility
CSE-550-T112
Lecture Notes - 1
4
The Management View (2/3)
Utilities don’t bring money into the organization
Expense item to the Corporation
Cannot justify Network based on “Productivity
Improvements”
As a network designer, you need to explain to
management how the network design, even with the
high expense, can save money or improve the
company’s business
If users cannot log on to your commerce site, they will try
your competitor, and you have lost sales
If you cannot get the information your customers are
asking about due to a network that is down, they may go
to your competitor
CSE-550-T112
Lecture Notes - 1
5
The Management View (3/3)
You need to understand how the network assists the
company in making money and play on that strength
when you are developing the network design proposal
Try to show a direct correlation between the network
design project and the company’s business
“Because you want a faster network” is not good enough,
the question that management sends back is WHY DO I
NEED A FASTER ONE?
CSE-550-T112
Lecture Notes - 1
6
The Technical View (1/2)
A “Network” really can be thought of as three parts and they
all need to be considered when working on a network design
project:
Connections
Communications/Protocols
Services
Connections
Provided by Hardware that ties things together
Wire/Fiber/Wireless Transport Mechanisms
Routers
Switches/Hubs
Computers
CSE-550-T112
Lecture Notes - 1
7
The Technical View (2/2)
Communications/Protocols
Provided by Software
A common language for 2 systems to communicate with each other
TCP/IP (Internet/Windows NT)
IPX / SPX (Novell Netware 4)
AppleTalk
Other Network OS
Services
The Heart of Networking
Cooperation between 2 or more systems to perform some function Applications
telnet
FTP
HTTP
SMTP
CSE-550-T112
Lecture Notes - 1
8
Traditional Network Design
Based on a set of general rules
“80/20”
“Bridge when you can, route when you must”
Can’t deal with scalability & complexity
Focused on capacity planning
Throw more bandwidth at the problem
No consideration to delay optimization
No guarantee of service quality
Less importance given to network RMA (Reliability,
Maintainability, and Availability) compared to throughput
CSE-550-T112
Lecture Notes - 1
9
Application Characteristics
Applications
Message
Length
Message
arrival rate
Delay need
Reliability
need
Interactive
terminals
Short
Low
Moderate
Very high
File transfer
Very long
Very low
Very low
Very high
Hi-resolution
graphics
Very long
Low to
moderate
High
Low
Packetized
voice
Very short
Very high
High
Low
CSE-550-T112
Lecture Notes - 1
10
Application Bandwidths
Transaction
Processing
100 Bytes
Few Kbps
Word Processing
100s Kbps
Few Mbps
File Transfers
Few Mbps
10s Mbps
Real-Time Imaging
10s Mbps
100s Mbps
CSE-550-T112
Lecture Notes - 1
11
A Look on Multimedia Networking
Video standard
Bandwidth per
user
WAN services
Digital video
interactive
1.2 Mbps
DS1 lines ISDN
H11, Frame
Relay, ATM
Motion JPEG
10 to 240 Mbps
ATM 155 or 622
Mbps
MPEG-1
1.5 Mbps
DS1 lines ISDN
H11, Frame
Relay, ATM
MPEG-2
4~6 Mbps
DS2, DS3, ATM
at DS3 rate
CSE-550-T112
Lecture Notes - 1
12
Some Networking Issues
LAN, MAN and WAN
Switching and routing
Technologies: Ethernet, FDDI, ATM …
Wireless/Mobile networking
Internetworking
Applications
Service quality
Security concerns
CSE-550-T112
Lecture Notes - 1
13
Network Design: Achievable?
Response Time
Cost
Business Growth
Reliability
CSE-550-T112
Lecture Notes - 1
14
Where to begin?
Traffic
WWW
Addressing
Patterns
Access
Campus
Security
CSE-550-T112
Users
WAN
Lecture Notes - 1
Dial in
Users
Network
Management
15
Traditional Network Design Methodology
Many network design tools and methodologies that
have been used resemble the “connect-the-dots”
game
These tools let you place internetworking devices on
a palette and connect them with LAN or WAN media
Problem with this methodology:
It skips the steps of analyzing a customer's
requirements, and selecting devices and media based
on those requirements
CSE-550-T112
Lecture Notes - 1
16
Top-Down Network Design Methodology (1/2)
Good network design
Recognizes that a customer’s requirements embody
many business and technical goals
May specify a required level of network performance,
i.e., service level
Includes difficult network design choices and tradeoffs
that must be made when designing the logical network
before any physical devices or media are selected
When a customer expects a quick response to a
network design request
A bottom-up (connect-the-dots) network design
methodology can be used, if the customer’s
applications and goals are well known
CSE-550-T112
Lecture Notes - 1
17
Top-Down Network Design Methodology (2/2)
Network designers often think they understand a
customer’s applications and requirements.
However, after the network installation, they may
discover that:
They did not capture the customer's most important
needs
Unexpected scalability and performance problems
appear as the number of network users increases
CSE-550-T112
Lecture Notes - 1
18
Top-Down Network Design Process (1/2)
Begins at the upper layers of the OSI reference
model before moving to the lower layers
Focuses on applications, sessions, and data transport
before the selection of routers, switches, and media
that operate at the lower layers
Explores divisional structures to find the people:
For whom the network will provide services, and
From whom to get valuable information to make the
design succeed
CSE-550-T112
Lecture Notes - 1
19
Top-Down Network Design Process (2/2)
It is an iterative process:
It is important to first get an overall view of a
customer's requirements
More detail can be gathered later on protocol behavior,
scalability requirements, technology preferences, etc.
Recognizes that the logical model and the physical
design may change as more information is gathered
A top-down approach lets a network designer get
“the big picture” first and then spiral downward into
detailed technical requirements and specifications
CSE-550-T112
Lecture Notes - 1
20
Network Development Life Cycle
Analysis
Management
Design
Simulation/
Prototyping
Monitoring
Implementation
CSE-550-T112
Lecture Notes - 1
21
Network Design and Implementation Cycle
CSE-550-T112
Lecture Notes - 1
22
Network Design and Implementation Cycle (1/3)
Analyze requirements:
Interviews with users and technical personnel
Understand business and technical goals for a
new or enhanced system
Characterize the existing network: logical and
physical topology, and network performance
Analyze current and future network traffic,
including traffic flow and load, protocol
behavior, and QoS requirements
CSE-550-T112
Lecture Notes - 1
23
Network Design and Implementation Cycle (2/3)
Develop the logical design:
Deals with a logical topology for the new or
enhanced network
Network layer addressing and naming
Switching and routing protocols
Security planning
Network management design
Initial investigation into which service
providers can meet WAN and remote access
requirements
CSE-550-T112
Lecture Notes - 1
24
Network Design and Implementation Cycle (3/3)
Develop the physical design:
Specific technologies and products to realize the
logical design are selected
The investigation into service providers must be
completed during this phase
Test, optimize, and document the design:
Write and implement a test plan
Build a prototype or pilot
Optimize the network design
Document your work with a network design proposal
CSE-550-T112
Lecture Notes - 1
25
Another Perspective
Data collection
Traffic
Costs
Constraints
Design process
Performance analysis
Fine tuning
A painstaking iterative process
CSE-550-T112
Lecture Notes - 1
26
PDIOO Network Life Cycle (1/3)
(Cisco)
Plan:
Network requirements are identified in this phase
Analysis of areas where the network will be installed
Identification of users who will require network services
Design:
Accomplish the logical and physical design, according
to requirements gathered during the Plan phase
Implement:
Network is built according to the Design specifications
Implementation also serves to verify the design
CSE-550-T112
Lecture Notes - 1
27
PDIOO Network Life Cycle (2/3)
(Cisco)
Operate:
Operation is the final test of the effectiveness of the design
The network is monitored during this phase for performance
problems and any faults, to provide input into the Optimize
phase
Optimize:
Based on proactive network management which identifies
and resolves problems before network disruptions arise
The optimize phase may lead to a network redesign
if too many problems arise due to design errors, or
as network performance degrades over time as actual
use and capabilities diverge
Redesign may also be required when requirements change
significantly
CSE-550-T112
Lecture Notes - 1
28
PDIOO Network Life Cycle (3/3)
(Cisco)
Retire:
When the network, or a part of the network, is out-of-date, it
may be taken out of production
Although Retire is not incorporated into the name of the life
cycle (PDIOO), it is nonetheless an important phase
CSE-550-T112
Lecture Notes - 1
29
One More Look
Business
Planning
Network
Design
Implement
Network
Operations
Define Objectives
and Requirements
Develop
Architecture
Create
Implementation Plan
Develop Operations
Policies and
Capabilities
Create Initial
Solution
Develop Detailed
Design
Procure Resources
and Facilities
Fault
Management
Define Deployment
Strategy
Create Build
Documentation
Stage and Install
Configuration
Management
Review and
Approve
Review and Verify
Design
Certify and Hand-off
to Operations
Change
Management
Performance
Management
CSE-550-T112
Lecture Notes - 1
30
Information Flows between Network
Analysis, Architecture, and Design
CSE-550-T112
Lecture Notes - 1
31
Network Analysis and Design Methodology
- Overall Characteristics Requirements (business, application, and data)
definition is required prior to network design activities
Expected compliance with requirements in a Request
For Proposal (RFP) by both in-house personnel and
outside consultants
Activities from various stages often take place
simultaneously and backtrack to previous activities is
sometimes needed
This methodology is an overall guideline to the
network development process rather than “cookbook”
instructions
CSE-550-T112
Lecture Notes - 1
32
Network Analysis and Design Methodology
- Critical Success Factors of the NDLC (1/3) Identification of all potential customers and
constituencies
All groups must be consulted
Political awareness:
Corporate culture: hierarchical, distributed, or open
Backroom politics can play a role in systems design
Find ways to ensure objectivity of the analysis and design
process (e.g., measurable goals)
Buy-in:
Reach consensus on the acceptability of results of each stage
Approved results of one stage become the foundation or
starting point for the next stage
Makes the final presentation smoother
CSE-550-T112
Lecture Notes - 1
33
Network Analysis and Design Methodology
- Critical Success Factors of the NDLC (2/3) Communication:
With all groups
Write memos, communicate with key people in person,
etc.
Detailed project documentation:
Prepare agendas
Take meeting minutes
Action items
Use a project binder for all the above
CSE-550-T112
Lecture Notes - 1
34
Network Analysis and Design Methodology
- Critical Success Factors of the NDLC (3/3) Process/Product awareness:
Stay focused: what is the process/product at each
stage?
Keep meeting on track: no off-subject discussions
Be honest with yourself:
Be your own harshest critic (no one else knows the
potential weaknesses or areas for improvement in your
proposal better than you)
Use peer reviews
Not all weaknesses can be corrected (e.g., financial or
time constraints)
CSE-550-T112
Lecture Notes - 1
35
Network Analysis and Design Methodology
- Overall Guidelines Start with a clearly defined problem:
Identify affected parties and representatives
Held brainstorming sessions to define problems and
requirements of a solution
Understand strategic business objectives defined by
senior management
Collect baseline data from customer groups about
the current status of the system and network
This is used to measure eventual impact of the
installed network
Perform a feasibility study: problem definition and
associated alternative recommendations for further
study
CSE-550-T112
Lecture Notes - 1
36
Customer’s Requirements
- Understanding the Customer A good network design must recognize the customer’s
requirements - need to make sure your design meets
THEIR needs and not just YOURS!
The “Customer” may be your own firm, the “who” you are
designing the network for
Need an overview of a customer’s requirements
The best designed network will fail miserably without
the support of people
CSE-550-T112
Lecture Notes - 1
37
Customer’s Requirements
- Users’ Needs What do the users want?
Services
What do the users need?
What don’t they know but they need?
Organize and Prioritize Requirement
CSE-550-T112
Lecture Notes - 1
38
Customer’s Requirements
- How they are used User Requirements
Performance Requirements
• Timeliness
• Interactivity
• Reliability
• Quality
• Security
• Affordability
• User Numbers
• User Locations
• User Growth
CSE-550-T112
Delay
Reliability
Capacity
Lecture Notes - 1
39
Analysis and Design Processes
Set and achieve goals
Maximizing performance
Minimizing cost
Optimization with trade-offs
Recognizing trade-offs
No single ‘best’ answer
Hierarchies
Provide structure in the network
Redundancy
Provides availability & reliability
CSE-550-T112
Lecture Notes - 1
40
Approaches Used for Design
Heuristic – by using various algorithms
Exact – by working out mathematical
solutions based on linear programming, etc.,
minimizing certain cost functions
Simulation – often used when no exact
analytical form exists. Experiments are
conducted on simplified models to see the
performance of a network
CSE-550-T112
Lecture Notes - 1
41
Design and Study of a System
CSE-550-T112
Lecture Notes - 1
42
Art or Science?
The Art of Network Design
• Technology choices
• Relations to business goals
The Science of Network Design
Understanding of network technologies
Analysis of capacity, redundancy, delay …
CSE-550-T112
Lecture Notes - 1
43
Types of Network Design
New network design
Re-engineering a network design
Network expansion design
CSE-550-T112
Lecture Notes - 1
44
New Network Design
Actually starting from scratch
No legacy networks to accommodate
Major driver is the budget, no compatibility
issues to worry about
Getting harder to find these situations
CSE-550-T112
Lecture Notes - 1
45
Re-engineering a Network Design
Modifications to an existing network to
compensate for original design problems
Sometimes required when network users
change existing applications or functionality
More of the type of problems seen today
CSE-550-T112
Lecture Notes - 1
46
Network Expansion Design
Network designs that expand network
capacity
Technology upgrades
Adding more users or networked equipment
CSE-550-T112
Lecture Notes - 1
47
This Whole Thing is Messy
This Whole Thing is Messy
Ambiguous Requirements
The network will only transport IP
The application requires Novell IPX
CSE-550-T112
Lecture Notes - 1
49
This Whole Thing is Messy
Conflicting Requirements
Keep costs down
High performance costs money
CSE-550-T112
Lecture Notes - 1
50
This Whole Thing is Messy
Lack of Design Tools
Lack of Management Tools
Lack of Vendor Interoperability
CSE-550-T112
Lecture Notes - 1
51
This Whole Thing is Messy
Lack of Documentation
Existing network
How things should be done (e.g., wiring)
Vendor information
CSE-550-T112
Lecture Notes - 1
52
This Whole Thing is Messy
Network Management
More management uses more bandwidth
Every vendor has their own management tools
Vendor tools may conflict with each other
CSE-550-T112
Lecture Notes - 1
53
This Whole Thing is Messy
Security
What is enough security?
What is too much security?
Security and management can not be dealt
with as ‘afterthoughts’. It is not an add-on
feature, it has to be integrated within.
Firewall
200Kbs
10Mb/s
Ethernet
CSE-550-T112
T1 1.5Mb/s
Lecture Notes - 1
10Mb/s
Ethernet
54
This Whole Thing is Messy
Evolving Network Technologies
Everything is a moving target
Products are put onto the market before
standards are approved
Everyone is a computer “expert”
CSE-550-T112
Lecture Notes - 1
55
OAM&P
Operations, Administration, Maintenance, Provisioning
Network
Management
Network
Provisioning
Network
Operations
Network
Maintenance
Planning
Fault Management / Service Restoration
Fault Management
Design
Configuration Management
Trouble Ticket
Administration
Performance Management / Traffic Management
Network Installation
Security Management
Network Repairs
Accounting Management
Reports Management
Facilities Installation
& Maintenance
Inventory Management
Routine Network
Tests
Data Gathering & Analyses
Figure 1.21 Network Management Functional Groupings
CSE-550-T112
Lecture Notes - 1
56
Functional Flow Chart
Network
Users
Configuration Data
Management
Decision
New
Technology
Performance & Traffic Data
Engineering Group
- Network Planning &
Design
TT Restoration
Operations Group
NOC
I & M Group
-Network Installation &
Maintenance
- Network Operations
Fault TT
Installation
Figure 1.22. Network Management Functional Flow Chart
CSE-550-T112
Lecture Notes - 1
57
References
Dr. Khalid Salah (ICS, KFUPM), CSE 550 Lecture Slides, Term
032
Dr. Marwan Abu-Amara (COE, KFUPM), CSE 550 Lecture
Slides, Term 052
P. Oppenheimer, “Top-Down Network Design,” Cisco Press, 3rd
edition, 2010
J. McCabe, “Network Analysis, Architecture, and Design”
Morgan Kaufmann Publishers, Inc., 3rd edition, 2007
J. E. Goldman, “Applied Data Communications - A BusinessOriented Approach”, 1998
Mani Subramanian, “Network Management – Principles and
Practice” by, Pearson, Second Edition, 2010.
CSE-550-T112
Lecture Notes - 1
58