Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
P. 1
Bandwidth Management

Bandwidth Management

Ratings: (0)|Views: 396|Likes:
Published by Pavan Kumar

More info:

Published by: Pavan Kumar on Jun 27, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/29/2012

pdf

text

original

 
Bandwidth Management for Corporate Intranets
By Chuck Semeria
Chuck Semeria is a marketing engineer in the network systems division at 3Com. He previouslydeveloped classroom and independent study courses for the education services department in thecustomer services organization.Prior to joining 3Com, Chuck was the senior course developer and instructor for Adept, arobotics and vision systems company. Before that, he taught mathematics and computer sciencein California high schools and junior colleges. Chuck is a graduate of the University of California at Davis.
Contents
Corporate IntranetsEmergence of TCP/IPExplosion of Corporate IntranetsChallenges for Network ManagersSupporting Intranet ApplicationsMonitoring Intranet Traffic Flows with RMON/RMON2Remote Monitoring (RMON)RMON MIBRMON2 MIBMonitoring LAN Traffic with RMON and RMON2RMON and RMON2Monitoring Switched EnvironmentsMonitoring WAN Environments with RMON2Optimizing LAN PerformanceSwitching at the Edge of the LANIntelligent Switching at the LAN CoreFast IP for 3D NetworkingOptimizing WAN PerformanceWANs Are Different from LANsThe WAN Is the Network Bottleneck 
 
Router Software Features Preserve WAN BandwidthDemand CircuitsCompressionBandwidth AggregationData PrioritizationProtocol ReservationSession FairnessPacket RankingMulticast TechnologiesResource Reservation Protocol (RSVP)Server AccessSummaryAppendix A: Remote Network Monitoring MIB (RFC 1757)Appendix B: Token Ring Extensions to the Remote Network Monitoring MIB (RFC 1513)Appendix C: Remote Network Monitoring MIB Version 2 (RFC 2021)Acronyms and AbbreviationsFor More Information
The task of managing bandwidth has become increasingly complex as enterprises have evolved  from highly structured SNA and X.25 networks, to interconnected LANs supporting client/server computing, and most recently to the corporate intranet model. The deployment of newapplications such as Netscape Navigator, Microsoft Internet Explorer, and PointCast onenterprise networks can have a significant impact on network support requirements. Theseapplications dramatically alter traffic and usage patterns while requiring additional bandwidth,reduced latency, and less jitter. This paper describes the emergence of corporate intranets, thenew demands that intranets place on the computing environment, and what can be done to proactively ensure that intranet applications will have an adaptive environment that permitsthem to coexist with legacy applications and computing models.
Corporate Intranets
Whole generations of applications have been developed around various computing models, eachwith its own requirements for network support (Figure 1). In the “good old days” of host
 
computing, applications required minimal bandwidth and were relatively time sensitive, andtraffic flows were deterministic between dumb terminals and the mainframe. Capacity planninginvolved designing efficient topologies, scaling switches, and sizing trunk lines. These wererelatively straightforward problems, since the application environment was stable and userrequirements were well understood.
Terminal-HostClient-ServerCorporateIntranetTextBursty FilesMixed + MultimediaNetwareGroupwareSAPTransactionNetscapeNavigatorInternetExplorerPointCastOS/400CICSIMSPROFS
Figure 1. Evolution of Corporate NetworksAs networks evolved toward interconnected LANs supporting the client/server model, planningbecame more difficult. Client/server applications were much more bandwidth intensive andextremely time sensitive. Traffic flows were distributed across the entire network, although theywere relatively deterministic. Network managers were faced with the more complex challenge of defining a hierarchy and ensuring that traffic flowed across it, but deterministic traffic flowsaided in the development of applications that successfully addressed business needs.The intranet model is the latest step in the evolution of enterprise networks to a peer-to-peercomputing paradigm. The advent of the corporate intranet is replacing traditional client/serverapplications with new concepts of information sharing and Web navigation. Emerging intranetapplications are both bandwidth intensive and time sensitive, often requiring support for voice,video, and data multimedia applications across a common infrastructure. To make things evenmore challenging, these applications can be deployed by individual workgroups in anunstructured manner without centralized planning. This results in peer-to-peer flows that aremuch less deterministic than traditional client/server applications while consuming unpredictableamounts of bandwidth.The corporate intranet model places new demands on the networking infrastructure:

Activity (13)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
taitiong liked this
amibubun liked this
maxcreations liked this
kaywale1 liked this
dzikwiadler liked this
Kolawole Ajayi liked this
Sajid Hussain liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->