Lecture3x - 1DV702 Network Administration Lecture 3 FLOW ANALYSIS Flow Analysis Flows Flows are sets of network traffic(application protocol and

Lecture3x - 1DV702 Network Administration Lecture 3...

This preview shows page 1 - 11 out of 42 pages.

1DV702 – Network AdministrationFLOW ANALYSISLecture 3
Flow AnalysisFlows are sets of network traffic (application, protocol, and control information) that have common attributes, such as source/destination address, type of information, directionality, or other end-to-end information.Information within a flow is transmitted during a single session of an application.Flows are end-to-end, between source and destination applications/devices/users.Flows
Flow AnalysisCommon flow characteristicsFlows
Flow AnalysisFlow directionalitiesBidirectional / UnidirectionalUpstream , DownstreamFlows types can be listed as Individualor Composite. In addition, any type of flow can have the property Critical.Flows
Flow AnalysisAn individual flow is the flow for a single session of an application.Is the basic unit of traffic flows.Are derived directly from the requirements specification, or are estimated from our best knowledge about the application, users, devices, and their locations.Individual Flows
A composite flow is a combination of requirements from multiple applications, or of individual flows, that share a common link, path, or network.Most flows in a networkare compositeFlow AnalysisComposite Flows
Flow AnalysisFlows can usually be identified and developed from information in the requirements specification;User, application, device, and network requirements; user and application behavior (usage patterns, models); user, application, and device location information; and performance requirementsWe do not constrain flows to existing networks, topologies, or technologies.The process for identifying and developing flows consists of identifying one or more applications and/or devices that you believe will generate and/or terminate traffic flows.Identifying and Developing Flows
Flow AnalysisBased on how and where each application and device is used, you may be able to determine which devices generate flows and which devices terminate flows (flow sources and sinks)From an application perspective, some common approaches to identifying flows include:Focusing on a particular application, application group, device, or function (e.g., videoconferencing or storage).Developing a “profile” of common or selected applications that can be applied across a user populationChoosing the top N (e.g., 3, 5, 10, etc.) applications to be applied across the entire networkIdentifying and Developing Flows
Flow AnalysisOnce you have identified each flow and determined its composition and location, you combine the performance requirements of flows into a flow specification.Identifying and Developing Flows
Flow AnalysisThe idea here is to consider one or more applications that will likely drive the architecture and designThose that are high performance, mission-critical, rate-critical, real-time, interactive, predictable, and/or guaranteed.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture