You are on page 1of 98

Pertemuan 1 / Sesi 1

Motivation dan Introduction


to Telecommunication & Computer Networks

Deff Arnaldy, M.Si


Courtesy:
Email: deff_arnaldy@yahoo.com Bagian Net-Centric Computing
Faskultas Sains dan Teknologi
Universitas Islam Negeri Jakarta (UIN)
Agenda

Overview dan Klasifikasi Jaringan


Overview OSI dan TCP/IP
Manajemen, Desain, dan Kinerja Tradisional
(“How not to manage a network”)
Kinerja, Disain, dan Manajemen
Metode-metode Analisis Kinerja
Contoh-contoh
Diharapkan Anda dapat…1)
menjelaskan
 klasifikasi jaringan komputer/telekomunikasi

 skema mode komunikasi


 cara kerja ethernet (CSMA/CD)
 cara kerja perangkat intermediate system
 arsitektur lapisan OSI dan TCP/IP
Diharapkan Anda dapat…2)
menyebutkan landasan teori dan motivasi
Evaluasi Kinerja (Performance evaluation)

Teknik Disain Sistematis (Systematic design

techniques)
Manajemen Jaringan (Network management)

menggambarkan dan menyebutkan contoh 3 model


sistem jaringan
Resource sharing networks

Process networks

Switching networks
Diharapkan Anda dapat…3)
mendaftarkan dan menggambarkan 3 tipe
metode studi kinerja jaringan dan
karakteristiknya
Analytical
Simulation
Measurements

Mendaftarkan langkah-langkah dasar dalam


studi kinerja jaringan
Menerapkan langkah-langkah tersebut untuk
merumuskan sebuah studi kinerja jaringan pada
sistem dan tujuan yang telah diberikan
Mendefinisikan perbedaan antara Validasi dan
Verifikasi
Perkembangan TIK (Bagian I) Ganjil - November 2007/2008 6
Klasifikasi Jaringan
Communication
Network

Switched Broadcast
Communication Communication
Network Network
Ethernet, Token Ring,
FDDI, etc.

Circuit-Switched Packet-Switched
Communication Communication
Network Network
PSTN, ISDN

Datagram Virtual Circuit Network


Network ATM, Frame Relay,
IP X.25, etc.
Klasifikasi Jaringan


Jaringan telekomunikasi dapat diklasifikasikan berdasarkan
bagaimana sinyal ditransmisikan dan diterima

broadcast

switched

•Jaringan broadcast
sinyal yg ditransmisikan oleh satu peralatan end-user secara

otomatis didengar oleh semua peralatan end-user lainnya

•Switched networks

sinyal harus dirutekan melalui node jaringan atau di-switch ke
rute yg diinginkan
Klasifikasi Jaringan


Node jaringan mempunyai berbagai nama yg berbeda:

Data Circuit Terminating equipment (DTE) - ITU-T

Interface Message Processor (IMP) - ARPANET

Switch - jaringan telepon

Router - LAN

dsb

Peralatan user biasa disebut Data Terminal Equipment (DTE) -
ITU-T :

terminal

telepon set

host

PC

workstation, dll
Klasifikasi Jaringan

•Hybrid

Tipe jaringan telekomunikasi ini merupakan gabungan
dari broadcast dan switched network

misalnya: segment Ethernet (broadcast) dihubungkan
dengan Router
Broadcast vs Switched Networks

Broadcast

Hybrid

Switch
Klasifikasi Jaringan

Jaringan juga dapat diklasifikasikan berdasarkan


cakupan geografisnya:
Local Area Network (LAN) :
dibatasi beberapa Km, kantor atau kampus
Metropolitan Area Network (MAN)
puluhan Km, kota
Wide Area Network (WAN)
ratusan - ribuan Km
Terrestrial radio networks
Wireless communications
Satellite networks - internasional
Klasifikasi Jaringan Lainnya

Cara Pengontrolan: Centralized vs. Distributed


Kepemilikan: Publik, Private
Tipe Transmisi: Voice, data, video
Teknik Transmisi: Analog, digital, radio, satelit
Topologi: Mesh (mata jala), bus, ring, star, tree
Laju Data/Kecepatan Respon: Broadband / Narrowband
Media: Single media (seperti: Telepon) , Multi media (seperti:
Broadband ISDN)
Perkembangan TIK (Bagian I) Ganjil - November 2007/2008 14
Skema Pengiriman Data

Routing merupakan proses pemilihan jalur (path) dalam


sebuah jaringan selama pengiriman data atau lalu-lintas
(trafik) fisik.
Jaringan (network) di sini meliputi jenis jaringan apa
saja termasuk telephone network, Internet, dan
transport networks.
Routing | Rute | Skema Pengiriman Data:
Unicast
Broadcast
Multicast
Anycast
Perkembangan TIK (Bagian I) Ganjil - November 2007/2008 15
Unicast

unicast adalah proses pengiriman paket informasi ke


sebuah tujuan tunggal
disebut juga komunikasi point-to-point.

Perkembangan TIK (Bagian I) Ganjil - November 2007/2008 16


Broadcast

broadcasting adalah proses pengiriman paket


informasi ke segala tujuan (node, peralatan) dalam
sebuah jaringan

Perkembangan TIK (Bagian I) Ganjil - November 2007/2008 17


Multicast (atau Multiplexed
Broadcast)
Multicast merupakan sebuah mekanisme pengiriman informasi
ke sebuah grup dalam sebuah jaringan,
Biasanya pesan hanya dikirim sekali pada setiap link jaringan
dan dicopy (gandakan) ketika link tujuan terbagi (split)

Perkembangan TIK (Bagian I) Ganjil - November 2007/2008 18


Anycast

Anycast merupakan sebuah skema pengalamatan dan


perutean is a network addressing and routing scheme di
mana data dirutekan ke tujuan terdekat (terbaik)

Perkembangan TIK (Bagian I) Ganjil - November 2007/2008 19


Tambahan: Komunikasi Broadcast

Broadcast address, an IP address allowing


information to be sent to all machines on a given
subnet
Broadcasting (computing), transmitting a
packet that will be received by every device on
the network
Broadcast domain, a logical area where any
computer connected to the network can directly
transmit to any other
Perkembangan TIK (Bagian I) Ganjil - November 2007/2008 20
Ethernet
History

"The diagram ... was drawn by Dr. Robert M. Metcalfe in 1976 to


present Ethernet ... to the National Computer Conference in June
of that year. On the drawing are the original terms for describing
Ethernet. Since then other terms have come into usage among
Ethernet enthusiasts."
Just as a reminder: in 1976, INTEL had just developed the 8080,
which was running at an unbelievable speed of 4.77 MHz !!!
Perkembangan TIK (Bagian I) Ganjil - November 2007/2008 21
Broadcast Networks

Computer Network Analysis - Review ICT Sabtu, 7 April 2007 22


Protokol IEEE 802.3: Ethernet

CSMA/CD

Carrier Sense Multiple Access / Collision Detection
Carrier Sense

Sebelum sistem memulai pengiriman data ke network

Cek kabel (media transmisi), apakah ada sinyal carrier (ada
pengiriman data lain)? *)

YES: tunggu sampai pengiriman selesai

NO: sistem langsung mulai mengirimkan data
*)
mirip seperti kita saat mengangkat telepon dan mendengarkan suara dial-tone

Computer Network Analysis - Review ICT Sabtu, 7 April 2007 23


Protokol IEEE 802.3: Ethernet

CSMA/CD
Carrier Sense Multiple Access / Collision Detection

Multiple Access

Selama tidak ada ‘sinyal sibuk (carrier)’ pada kabel, semua node yang
terkoneksi ke network dapat segera memulai mengirimkan data
Collision Detection

Jika ada ≥ 2 node mengirimkan data bersamaan  Signal Collision

Protokol mendeteksi collision  sinyal saling mengganggu satu sama lain

stop pengiriman  memaksa semua node untuk back-off

Tunggu beberapa saat (secara random)  back-off algorithm

Lakukan mekanisme CSMA lagi

Computer Network Analysis - Review ICT Sabtu, 7 April 2007 24


Mekanisme CSMA
Mekanisme CSMA/CD
Signal Collision

≥ 2 signal carrier bertemu dan saling


menginterferensi

Computer Network Analysis - Review ICT Sabtu, 7 April 2007 27


Repeater, Hub, Bridge, Switch

Hub, Repeater

LAN based

Works based on Ethernet (IEEE 802.3) protocol
CSMA/CD mechanism


Non-intelligent (Stupid) Device ;)

Inexpensive

Easy to install
Unconfigurable, unmanageable


1 domain collision

works on Layer 1
Computer Network Analysis - Review ICT Sabtu, 7 April 2007 28
Repeater, Hub, Bridge, Switch

Bridge

LAN based

Works based on Ethernet (IEEE 802.3) protocol
CSMA/CD mechanism


Intelligent (Smart) Device ;)

More expensive

Easy to install
configurable, unmanageable


> 1 domain collision

works on Layer 2
Computer Network Analysis - Review ICT Sabtu, 7 April 2007 29
Repeater, Hub, Bridge, Switch

Switch

LAN based, Internet Based

Works based on Ethernet (IEEE 802.3) protocol
CSMA/CD mechanism


Intelligent (Smarter) Device than Bridge ;)

More expensive than Bridge

Easy to install
configurable, manageable


> 1 domain collision (each port has domain collision)

works on Layer 2

Computer Network Analysis - Review ICT Sabtu, 7 April 2007 30


Switched Networks

Computer Network Analysis - Review ICT Sabtu, 7 April 2007 31


Perkembangan TIK (Bagian I) Ganjil - November 2007/2008 32
Konsep Model OSI

Service - menyatakan apa yang dilakukan suatu layer


Interface – menyatakan bagaimana mengakses service
Protokol - menyatakan bagaimana service diimplementasikan
Protokol - satu set aturan yang mengatur komunikasi di antara peers yang

berkomunikasi

Syntax: menentukan format informasi yang dikomunikasikan

Semantic: arti dari sinyal yang dipertukarkan

Timing: kapan data ditransmisikan/dilihat, ururtan informasi, matching kecepatan, dll.

Protocol diperlukan untuk interaksi diantara peers
Protocol stack: satu set protocol layers

Tiap layer menggunakan layer di bawahnya dan menyediakan service ke
layer di atasnya

Computer Network Analysis - Review ICT Sabtu, 7 April 2007 33


Fungsi Setiap Layer OSI

Application Presents the interface to the user to access the


provided functionality.

Presentation Formats the data

Controls a communications link between two hosts


Session (open, manipulate, and close)
Provides data transfer services (either reliable or
Transport unreliable)
Higher layers

Provides an addressing mechanism between hosts


Network and also routes packets
Controls the physical communication link between
Data link two hosts. Also responsible for shaping the data for
transmittal on the physical medium.
The physical medium responsible for sending data as
Physical a series of electrical transmissions.
Lower layers

Computer Network Analysis - Review ICT Sabtu, 7 April 2007 34


Open System Interconnection
(OSI)
Skenario komunikasi dan fungsi utama masing-
masing layer
Application Application User service

Presentation Presentation Transformation of encoding

Session Session Dialog control

Transport Transport End-to-end reliability


Higher

Network Network Network Route set-up

Datalink Datalink Datalink Error control, access control

Physical Physical Physical Interface to medium


Lower

Physical medium

Computer Network Analysis - Review ICT Sabtu, 7 April 2007 35


Encapsulation, MTU, Fragmentation,
Reassembly, Datagram Size

Proses pembentukan dan pembuangan protocol


headers  Encapsulation, Fragmentation, Reassembly

data data

data data

data data

data data

data data

data data

data data
Computer Network Analysis - Review ICT Sabtu, 7 April 2007 36
IP Internet

Network 1 (Ethernet)

Concatenation of Networks H7 R3 H8

H1 H2 H3
Network 4
Network 2 (Ethernet) (point-to-point)
R1
R2

H4
Network 3 (FDDI)

Protocol Stack H5 H6

H1 H8

TCP R1 R2 R3 TCP

IP IP IP IP IP

ETH ETH FDDI FDDI PPP PPP ETH ETH

Computer Network Analysis - Review ICT Sabtu, 7 April 2007 37


MTU ~ Maximum Transmission Unit

Maksimum jumlah data yang dapat di’bawa’


oleh teknologi hardware network
Karakteristik Network Hardware

Tidak dirancang untuk menerima/mengirim frame
‘melebihi’ MTU

Ukuran Data ≤ MTU

Jika Ukuran Data > MTU

Datagram tidak dapat dienkapsulasi

Datagram tidak akan dikirim
Computer Network Analysis - Review ICT Sabtu, 7 April 2007 38
Header overhead for Various
Protocol Information Frames
Overhead Max Frame Size
Protocol (bytes) (bytes)
Description
Ethernet 18 1518 6 source, 6 destination 2 type, 4 CRC

IEEE 802.3 21 1521 6 source, 6 destination 2 length, 3 LLC, 4 CRC

IEEE 802.5 Token 6 source, 6 destination 4 misc., 3 LLC, 5 802.2


28 4472 & 7900 SAP, 4 CRC Up to 16 source-routing octets may
Ring be added
3 802.2 LLC, 5 802.2 SNAP, 4 source, 4 dest, 4
FDDI (RFC 1390) 28 4500 misc., 8 FCS. The source and dest addr may be
12 bytes
4 CRC, 2 length, 1 CPI, 1 CPCS-UU. For AAL-5
ATM (RFC 1483) 8 53 multiprotocol encapsulation. The ATM cell header
is only 5 bytes
2 flags, 2 Q.922 addr, 1 control, 1 NLPID, 2 FCS.
FR (RFC 1490) 8 NA For multi protocol encapsulation.

PPP (RFC 1662) 10 NA 8 HDLC framing, 2 PPP protocol itself

HDLC 8 NA 1 flag, 1 addr, 1 control, 4 CRC, 1 flag


8 seq number, 4 ports, 2 win, 6 other. RFC 1106
TCP (RFC 793) 20 65535 extends the win size to over 1 GB

IP (RFC 791) 20 65535 8 IP addr, 12 other

Perkembangan TIK (Bagian I) Ganjil - November 2007/2008 39


Ilustrasi MTU

1500
H1 Net 1 Net 2 H1
(MTU=1500)
R (MTU=1000)

H1 terhubung ke jaringan yang memiliki


MTU=1500 octets (bytes)
H2 terhubung ke jaringan yang memiliki
MTU=1000 octets (bytes)
H1  R X H2
H2  R  H1
Computer Network Analysis - Review ICT Sabtu, 7 April 2007 40
Bagaimana Jika Data > MTU

Solusi: Fragmentation & Reassembly


Setiap network punya harga MTU
Strategi

fragment jika diperlukan (MTU < Datagram)

Usahakan mencegah fragmentation pada source host

re-fragmentation dimungkinkan

fragments adalah self-contained datagrams

tunda reassembly sampai destination host

Tidak melakukan recover dari fragments hilang

Computer Network Analysis - Review ICT Sabtu, 7 April 2007 41


Ilustrasi MTU

1500 500 1000


H1 Net 1 Net 2 H1
(MTU=1500)
R (MTU=1000)

H1 terhubung ke jaringan yang memiliki


MTU=1500 octets (bytes)
H2 terhubung ke jaringan yang memiliki
MTU=1000 octets (bytes)
H1  R mem-fragment data ke H2
H2  R  H1

Computer Network Analysis - Review ICT Sabtu, 7 April 2007 42


Observasi

Dengan kemajuan dlm kecepatan transmisi, total delay didominasi oleh


delay propagasi dg batas atas kecepatan cahaya



Circuit switching menambahkan ekstra roundtrip delay dibandingkan
datagram packet switching, tetapi menghilangkan delay store-and-
forward

Ada dua kasus:

jika link lambat bottleneck ada pada kecepatan transmisi link. Delay
store-and-forward cukup berarti. Penambahan ekstra roundtrip delay
tidak berarti  circuit switching (total delay )

Jika link cepat bottleneck ada pada delay propagasi. Penambahan
roundtrip cukup berarti. Delay store-and-forward delay tidak cukup
berarti  packet switching (total delay )
Pertemuan 1 / Sesi 2
Motivation dan Introduction
to Telecommunication & Computer Networks

Deff Arnaldy, M.Si


Courtesy:
Email: deff_arnaldy@yahoo.com Bagian Net-Centric Computing
Fakultas Sains dan Teknologi
Universitas Islam Negeri Jakarta (UIN)
Algorithm untuk Kerja Jaringan1)

Contoh kerja sebuah LAN untuk Aplikasi Intranet


Klien/Server
1. deploy LAN based on current technology
and constrained by budget;
2. do {
3. while (no complaints) { surf the web }
4. surf to a trade magazine site;
5. buy latest technology constrained by
budget;
6. deploy latest technology;
7. if (key users not happy) { increase budget
Algorithm untuk Kerja Jaringan2)

Kendati pendekatan tadi sangat jauh dari


optimalisasi kerja sebuah jaringan, namun
terdapat relasi antara evaluasi, disain, dan
manajemen:
Management: Note the lack of user complaints
Evaluation: Ascertain the reason for the whining

Design: Buy some stuff and make it work

Masalah-masalah:
Likelyto spend too much
Excessive periods of poor performance

Problem may not be fixed


Algorithm untuk Kerja Jaringan1)

Contoh kerja sebuah LAN untuk Aplikasi Intranet


Klien/Server
1. deploy LAN based on current technology
Evaluation
and constrained by budget;
2. do {
3. while (no complaints) { surf the web }
4. surf to a trade magazine site;
5. buy latest technology constrained by
budget;
6. deploy latest technology;
7. if (key users not happy) { increase budget
Relasi antara Kinerja, Disain, dan
Manajemen Jaringan

Evaluasi/Analisis
Kinerja

Disain Manajemen
Jaringan Jaringan
Evaluasi/Analisis Kinerja
We can predict the behavior of networks “using pencil,
paper, the poetry of mathematics and the number-
crunching ability of computers.”(T. Robertazzi)
Peralatan Evaluasi/Analisis Kinerja
TeoriPeluang dan Teori Antrian
Model-model Trafik

Simulasi
Disain
“A network design is a blueprint for building a network.
The designer has to create the structure of the network
[and] decide how to allocate resources and spend
money.”
(R. Cahn)
Peralatan Disain:
Teknik-teknik Pekerjaan berkaitan dg Kapasitas
Teori
Graph
Computer-aided design tools (e.g.: AutoCAD, Visio, etc.)
Manajemen
“… our only real option is to use the network to manage
the network. This means we need a protocol that allows
us to read, and possibly write, various pieces of state
information on different nodes.” (L. Peterson & B. Davie)
Peralatan Manajemen
Protokol-protokol
Manajemen, e.g.: SNMP
Management tools, e.g.: netstat

Eksperimen (Percobaan)
Model-model Jaringan
Apa yang sedang kita modelkan?
Secara umum, kita memodelkan jaringan untuk 3
kategori berikut:
Resource sharing networks
Process networks

Switching networks
Resource sharing networks1)
USER 1

Shared
Resources
USER N

Time-shared computer (Programs : CPU/Disk/IO)


Statistical multiplexer/concentrator
Packet-based (Packets : Links)
Channel-based (Calls : Channels)
Multiple-Access and random access networks (Packets: Shared Medium)
Resource sharing networks2)
Kinerja Jaringan yang diukur (metrics):
Waktu tunggu (Waiting time)
Peluang Blocking (Blocking probability)

Pertanyaan kita sekarang adalah:


Bagaimana hubungan antara User, Pola Penggunaan, Jumlah
Kebutuhan Resources dan Kinerja Jaringan?
Apakah setiap User menggunakan Resources secara “ADIL”?
Process Networks1)
Input 1
Process 1

Input 2 Process 2
Input 3

Input 4 Process 5 Output

Multi-stage switch
Distributed simulation system
Manufacturing process
Process Networks2)

Kinerja Jaringan yang diukur (metrics):


Waktu Penyelesaian (Time to complete ~ delay)
Throughput (completions per unit time)

Pertanyaan kita sekarang adalah:


Bagaimana kinerja dapat dipengaruhi oleh Pola-pola Penggunaan
yang berbeda?
Proses-proses mana yang merupakan “bottlenecks” yang merupakan

Batasan Kinerja Jaringan?


Apakah input yang berbeda diperlakukan secara ADIL berkenaan

dengan Kinerja Jaringan?


Switching Networks1)
Endpoint Switch
Endpoint
Switch
Endpoint
Switch
Process 5
Endpoint

Telephone network (Phones : Circuit Switches)


Telephone signaling network (Switches : STPs)
X.25 packet network (Computers : Packet
Switches)
Switching Networks2)

Kinerja Jaringan yang diukur (metrics):


Delay (endpoint to endpoint)
Throughput

Utilization

Blocking probability

Losses

Pertanyaan kita sekarang adalah:


Bagaimana Topologi yang terbaik?
Bagaimana kita melakukan perutean?

Bagaimana kita menjamin QoS?


Analisis Kinerja1)
Why?
Bottleneck atau analisis kapasitas
Sensitivitas (Kepekaan) dari kinerja parameter-parameter

Mendeteksi lingkup masalah untuk memandu system tuning

Perencanaan konfigurasi dan trade-offs

Benchmarking

When?
Arsitektur
atau Desain Sistem
Desain dan Implementasi Detail

Operasional
Analisis Kinerja2)
How?
Analytical models, e.g., queuing models with closed form or
numerical solutions
Simulation experiments, e.g., discrete-event simulation with

statistical results
Empirical measurements, e.g., instrumented code and network

monitoring
Pendekatan Sistematis1)
Sebutkan ‘goals’ dari studi dan definisikan sistem
yang akan dianalisis
Sket batasan-batasan sistem
‘Goals’ akan menentukan batasan-batasan yang
sesuai
Daftarkan layanan/fungsi dan hasil dari layanan
tersebut
Pilih ukuran/satuan (metrics) yang akan
dianalisis
Contoh: throughput, latency, availability, etc.
Buat daftar parameter-parameter yang
mempengaruhi kinerja (performance)
Pendekatan Sistematis2)
Pilih faktor-faktor yang menjadi studi (akan diteliti)
Faktor-faktor
merupakan parameter-parameter yang mungkin akan bervariasi
Parameter-parameter lainnya akan ditetapkan

Pilih teknik evaluasi


(Analytical) -> Formula Erlang’s Blocking
Analitik

Simulasi (Simulation) -> Simulasi dengan NS2

Pengukuran (Measurement) -> Worst-case Analysis

Pilih beban kerja (workload) atau daftar permintaan layanan


Probability distributions for analytical study
Trace or distribution for simulation study

Scripts for measurements

Next
Contoh Teknik Evaluasi Analitik
:: Traffic intensity ::
In telephone networks:
Traffic ↔ Calls
The amount of traffic is described by the traffic intensity a
Definition: the traffic intensity a is the product of the arrival rate 
and the mean holding time h:

a = h
Note that the traffic intensity is a dimensionless quantity. However, to
emphasize the context, the “unit” of the traffic intensity a is called
erlang (erl)
By Little’s formula: the traffic intensity tells the number of ongoing
calls in the corresponding (hypothetical) infinite system.
Back
Example
Consider a local exchange. Assume that,
on the average, there are 1800 new calls in an hour,
and
the mean holding time is 3 minutes
a = 1800 ∗ 3/60 = 90 erlang
ItIf the
follows that the
mean holding traffic
time intensity
increases is
from 3 minutes to 10
minutes, then
a = 1800 ∗ 10/60 = 300 erlang

Back
Traffic characteristic

Here are typical characteristic traffics for some


subscriber categories (of ordinary telephone
users):
private subscriber: 0.01 - 0.04 erlang
business subscriber: 0.03 - 0.06 erlang
private branch exchange (PBX): 0.10 - 0.60 erlang
pay phone: 0.07 erlang
This means that, for example,
a typical private subscriber uses from 1% to 4% of her
time in the telephone (during a “busy hour”)Back
Referring to the previous example, note that
Contoh Teknik Evaluasi
Analitik :: Erlang’s formula ::
Then the quantitive relation between the three factors (system capacity, traffic
load and quality of service) is given by the Erlang’s formula

Note: n! = n (n-1) (n-2) … (2) (1), 0! = 1


Other names:
Erlang’s blocking formula
Erlang’s B-formula

Erlang’s loss formula

Erlang’s first formula

Back
Example
Assume that there are n = 4 channels on a link and the offered traffic is a = 2.0
erlang. Then the call blocking probability Bc is

If the link capacity is raised to n = 6 channels, then Bc reduces to

Back
Simulasi :: Network Simulator
2 ::
Parameter: kapasitas = 2 Mbps, delay = 10 ms
Protokol: TCP; Layanan: FTP
Performance
Layer 4:
Metric: Throughput, Connection-oriented Protocol
TCP Reno

Aplikasi FTP

C = 2 Mbps, Delay = 10 ms

Komputer A Komputer B
(Sender) (Receiver)
Script Program

Back
Contoh Teknik Evaluasi Measurement
:: Document Retrieval over FR Network ::

Network Properties and Time Budget


Document size = 800 Kbyte
To be copied from a file server at the hub site to
a workstation at a spoke site
Document transfer over Frame Relay Network
We have initial speed:
1,544 Kbps port speed at the Hub site
56 KbpsAnalysis
Worst-case port speed
example at the Spoke site

Lets vary the hub port speed! Back


Pendekatan Sistematis3)

Desain percobaan/eksperimen
Phase 1: Large number of factors, few values
Phase 2: Small number of factors, many values

Analisa dan interpretasikan hasilnya


Results are random
Statistical techniques needed to compare results

Presentasi Hasil
Graphicaltechniques
Refinement and iteration may be needed
Teknik-teknik Evaluasi
Criterion Analytical Simulation Measurement

Stage Any Any Post-prototype

Time required Small Medium Varies

Accuracy Low Moderate Varies

Trade-off Easy Moderate Difficult


Evaluation
Cost Low Medium High

“Sale ability” Low Medium High


Contoh: ISP1)

Sebuah ISP menyediakan akses circuit-switched


(saluran telepon PSTN) ke Internet
Berapa banyak saluran (koneksi aktif simultan
maksimum) yang harus kita sediakan?
Kepuasan Pelanggan  Large number of lines to
reduce probability of blocking (busy)
Biaya Operasi  Small number of lines to reduce

equipment, line, maintenance, and power costs


Kapan saluran baru harus disediakan?
Apa toleransi terhadap Kepuasan Pelanggan dan
biaya operasi?
Contoh: ISP2)

Kebijakan apa yang harus dibuat untuk


memaksimumkan keuntungan/profit?
Charge a flat fee or charge for connect time?
Limit sessions to X hours?

Automatically disconnect inactive users after Y

minutes?
Differentiate service based on price?

Pertanyaan-pertanyaan berikut mendefinisikan


TUJUAN dan SISTEM untuk studi kinerja
jaringan:
Management information needed for the study
Contoh: ISP3)

Evaluasi/Analisis
Kinerja
Effect of Workload
number of lines characteristics
and polices on and current
performance performance

Optimized modem
pool and polices
Disain Manajemen
Jaringan Jaringan
Contoh: ISP4)

Ingat bahwa model ini merupakan sebuah


“resource sharing network”
Users must share a limited number of lines
Number of users exceeds the number of lines

If number of active users equals the number of lines,


USER 1
further use attempts by other users will be blocked
Shared
Resources
USER N
Contoh: ISP5)
Metrics
Blocking probability
Wait time (until a line is free)

System parameters
Number of lines
Workload parameters
Number of calls (arrival or attempt rate)
Length of call (holding or service time)

Time until retry attempt if blocked

Factors to vary for the study


Number of lines
Number of users (attempt rate)
Contoh: ISP6)

Evaluation techniques
Analytical (Erlang model)
Measurement of specific configuration(s) to validate

analytical results
Select workloads
Assumptions

Holding time
Probability of an attempt from a user
Retry characteristics
Assumptions can be developed by monitoring use
patterns
Requires network management (monitoring)
Contoh: ISP7)

Design and conduct experiments


Easy for analytical study
More difficult for measurements

Analyze and interpret results


Again,
easy for analytical study and more difficult for
measurements
Present results
Validationof analytical results using measurements
increases confidence in results
Validasi vs. Verifikasi

Verification (usually easy to do)


Isthe model properly constructed?
Analytical model: “Is the math right?”

Simulation model: “Is the model properly coded?”

Validation (often hard to do)


Does the model accurately represent the behavior of
the system of interest?
Analytical model: “Is the model ‘correct’?”

Simulation model: “Is this an accurate simulation for

the questions of interest?”


Contoh: Layanan Backbone1)

A carrier provides backbone services to


companies and lower-tier ISPs
Internet access to companies and ISPs
Virtual private network (VPN) service for corporate

networks
Contoh: Layanan Backbone2)

This is a “switching network”


Customer networks are endpoints
IP routers in the backbone are switches

Backbone network defines system boundary


Contoh: Layanan Backbone3)

Throughput objectives – relatively simple


Maximize network throughput given a maximum cost
constraint
Minimize cost given a minimum throughput constraint

Throughput factors
Network topology
Link capacity

Router capacity

Routing algorithm (efficiency)

Workload (characteristics of traffic leaving customer

networks)
Contoh: Layanan Backbone4)
Network management
Identify problems
Bottlenecks
Routing problems
Misbehaved customer networks
Link and router failures
Monitor traffic to model workload
Performance evaluation
Study affects of network design changes
Study affects of workload changes
Identify bottlenecks
Proactive planning for network grown
Contoh: Layanan Backbone5)

Network design
Adjustlink capacity, router capacity, and topology
Optimize routing
Evaluasi/Analisis
Kinerja

? ?

?
Disain Manajemen
Jaringan Jaringan
Contoh: Layanan Backbone6)

Quality of service (QoS) or service level


agreement (SLA) objectives – relatively complex
Guaranteed throughput over some period of time
Maximum delay

Maximum delay variation

Availability

Customer network issues imply need for network


management
Monitoring service level agreements
Policing traffic
Contoh: Layanan Backbone7)

Backbone network issues


To what set of SLAs can a carrier commit with a given
set of network resources?
How to optimize the network for a given set of SLAs?

How much to charge for a given SLA?

How to optimize revenue?

Management, performance evaluation, and


design must be considered to optimize the
network operation (and revenues)
Contoh: Packet Switch Design1)

An equipment vendor is designing a high-


performance Layer 3 IP switch
Contoh: Packet Switch Design2)

This system is a “process network” if


implemented as a multi-stage switch
Contoh: Packet Switch Design3)

This system is a “resource sharing network” if


implemented as a TDMA bus
Contoh: Packet Switch Design4)
There are many performance issues
Aggregate and per port throughput
Input-to-output delay

Introduced delay variation (jitter)

Blocking probability

Packet loss due to queue overflow

Reliability
Contoh: Packet Switch Design5)
There is not an operational system to manage (monitor),
so the process involves just …
Design

Performance (and cost) evaluation

Disain Evaluasi
Sistem Kinerja
Contoh: MAC Protocol Design1)
A researcher is developing a new multiaccess control
protocol for a wireless ad hoc network
This is a “resource sharing network”
Stations(e.g., A, B, and C) are the users
Radio spectrum is the shared resource (medium)
Contoh: MAC Protocol Design2)

There are many performance issues


System throughput
Packet delay

Allocation of system throughput (fairness)

Channel utilization

Probability of collision

There are a number of factors affecting


performance
Offered
traffic
Number of stations (and placement)

Channel characteristics
Contoh: MAC Protocol Design3)

And, there are many design issues …


How to share the spectrum?
Circuit-switched schemes
Frequency division multiple access (FDMA)
Time division multiple access (TDMA)
Code division multiple access (CDMA)
Packet-switched time division multiplexed (TDM)
schemes
Reservation-based TDM schemes, e.g., packet reservation
multiple access (PRMA)
Contention-based TDM schemes, e.g., carrier sense multiple
access (CSMA)
Contoh: MAC Protocol Design4)

Optimizing or “tuning” a basic scheme


How many channels to allocate in a circuit-switched
system?
Effectiveness of collision avoidance schemes in a

contention-based system?
Efficiency of scheduling schemes in a reservation-

based system?
Specifying system performance
How many users?
How much capacity per user?

Physical layer requirements?


::: Referensi :::
•Stallings, W. 1998. High Speed Networks: TCP/IP and ATM Design
Principles, Prentice-Hall.
•McDysan, D. 2000. QoS and Traffic Management in IP and ATM
Networks. McGraw-Hill, Corp. New Jersey.
•Bloomers, J. 1996. Practical Planning for Network Growth. Prentice
Hall, Inc. New Jersey.
•R. Jain, The Art of Computer Systems Performance Analysis: Techniques
for Experimental Design, Measurement, Simulation, and Modeling, John
Wiley and Sons, 1991.
•M. H. MacDougall, Simulating Computer Systems: Techniques and Tools,
MIT Press, 1987.
•D. W. Petr, Course Notes, The University of Kansas, 1999.
Referensi

(1)Leon, A. and Indra W. 2000. Communication Networks: Fundamental Concepts and


Key Architectures. Int'l Ed. McGraw Hill Inc. Singapore. ISBN 0-07-022839-6.
(2)Internet Software Consortium. Internet at http://www.isc.org
(3)NGN. Seminar NGN di ITB & Jakarta
(4)ZTE telecom, Next Generation Network, Huawei Technologies, ANJA 2003
(5) _______, ‘Next Generation Network’, paper, Nusantara 2001, TELKOM
(6)NEC Corp. , NGN Scenario for broadband services, presentation, 2003
(7)_______, ‘Next Generation Network’, Web Forum Tutorial, International Engineering
Consortium (IEC), www.iec.org.
(8)_______, ‘Next Generation Network’, Web Forum Tutorial, International Engineering
Consortium (IEC), www.iec.org.
(9)_______, ‘Next Generation Network’, paper, iSwitch, www.UTstar.com.
(10) KPSI. 2007. Laporan Program INHERENT dan IMHERE.
(11) KPSI. 2006. Laporan Kegiatan Tahunan KPSI IPB.
(12) KPSI. 2004 – 2006. Laporan Proyek Pengembangan Infrastruktur dan Layanan TIK
IPB.
(13) KPSI. 2004. Panduan Prosedur Standar (SOP) KPSI. IPB.
(14) IPB. 2004. Press Release Pembangunan Jaringan Backbone Kampus Berbasiskan
Serat Optik IPB.
(15) KPSI. 2000. Panduan Singkat IPBNet.
Penutup

You might also like