You are on page 1of 35

NETWORK DESIGN AND

PERFORMANCE
EVALUATION– EC 4421
Charith Sucharitharathna
Msc. (TEE),BSc. Spec (Hons) in IT Specializing in CSN (SLIIT)
Department of Electrical and Computer Engineering
Syllabus Overview
Week Lecture

Week 1 Introduction

Week 2 Requirements Analysis Concepts

Week 3 Requirements Analysis Process

Week 4 Flow Analysis

Week 5 Addressing Architecture

Week 6 Routing Architecture

Week 7 Revision

Week 8 MID TERM EXAMINATION

Week 9 Security and Private Architecture

Week 10 Network Management Architecture

Week 11 Performance Architecture

Week 12 Network Design

Week 13 Revision
Method of delivery
Lecture 2 hours/week
Tutorial 1 hour/week
Lab practical 2 hours/week

Important

Do not miss any lecture, lab session or tutorial as both the


mid-term and semester end examination will be based on
all 3 components of delivery.
Assessment Criteria
Mid-term examination 20%
Labs 20%
Semester end examination 60%

Important

To pass the unit, a student is required to obtain a minimum


of 45% out of the 100% calculated above. (For CA and
Final Exam)
Learning Resources
▪ Network Analysis Architecture & Design – James D. McCabe
▪ Top Down Network Design – 3rd Edition (Cisco)
LECTURE 1
INTRODUCTION
Model for Network Analysis, Architecture
and Design
Network analysis, architecture and design are similar to
other engineering process. They address the following
areas ;

• Defining the problem to be addressed


• Managing customer expectations
• Monitoring the existing network, system
• Analyzing data
• Developing set of options to solve problems
• Evaluating and optimizing options
• Selecting one or more options
• Planning the implementation
Addressing and Routing Architecture
• Discus some fundamental concepts about addressing and
routing for IP networks.
Network Management Architecture
• Learn about network management and the network
management architecture.
Performance Architecture
• You will learn how to improve the performance of
architecture.
Network Design
• You will learn how to design a Network.
• Evaluating vendors and service providers based on their
products and services
• Diagramming the design.
• Developing detailed blueprints that provide the physical
layout
Performance Characteristics
Capacity –
Capacity is measure of the systems ability to transfer
information. Several terms are associated with capacity,
such as Bandwidth, throughput

Delay –
Delay is the time difference in transmitting a single unit of
information from source to destination.
• May be measured in one direction (end-to-end) and both
directions (round-trip)
• Round trip delay can be measure with the use of ping
message
Performance Characteristics
• Availability is the relationship between the frequency of
mission-critical failures and the time to restore services.

A = (MTBF) / (MTBF + MTTR)

MTTR – Mean time to repair


MTBF – Mean time between failures
ISO-OSI Layers
ISO-OSI Layers
Classes of IP Addresses

Class Net ID Host ID


A 1 Byte 3 Bytes
B 2 Bytes 2 Bytes
C 3 Bytes 1 Byte
Public IP Addresses
• Internet is a Public Computer Network which is
spread over the world.
• IP addresses cannot be duplicated.
• Allocations of IP addresses are controlled by the
Internet Assigned Number Authority (IANA)
• They have already allocated different IP address
ranges to countries.
• CINTEC assigns different range of IP address to
Internet Service Providers (ISPs)
• The ISPs allocate IP addresses to their customers
Private IP Address
• If we have a network which is not connected to Internet,
any IP address range can be used without obtaining any
permission
• It is not advisable to use any arbitrary IP address since
the network may be connected to Internet in future
• In order to avoid such problems, IANA reserved some IP
address ranges for private use

Class Private Network Address No. of Networks


A 10.0.0.0 1
B 172.16.0.0 to 172.31.0.0 16
C 192.168.0.0 to 256
192.168.255.0
SH

IP Special Address
Net ID Host ID Remarks

Network Address Specific All 0’s None


Direct Broadcast Address Specific All 1’s Destination Address
Limited Broadcast Address All 1’s All 1’s Destination Address

This Host on this Network All 0’s All 0’s Source Address

Specific host on this network All 0’s Specific Destination Address

Loopback Address 127 Any Destination Address


e.g. 127.0.0.0
127.255.255.255
127.0.0.1
Classless Addressing
• The important points to be noticed here is original Net ID number
of bits is not changed.
• Part of “Host ID” is allocated as the “Subnet ID”.
• In the above example 150.100 (i.e. first 16 bits) is not changed.
• In the remaining 16 bits the most significant bits are allocated as
Subnet ID.
• Since we need three subnets at least two bits are required for
Subnet ID. (22 = 4) : 00, 01, 10 and 11

XXXX XXXX. XXXX XXXX. XXXX XXXX. XXXX XXXX


Net ID Subnet ID Host ID
Network Management
• Network management is the process of controlling a
complex data network to maximize its efficiency and
productivity.
SH

Network Management
• The International Organization for Standardization (ISO)
Network Management Forum divided network
management into five areas.
• Faulty Management
• Configuration Management
• Security Management
• Performance Management
• Accounting Management
SH

Fault Management
• Is the process of locating problems, or faults, on the data
network

• It involves the following steps:


• Discover the problem
• Isolate the problem
• Fix the problem (if possible)
Configuration Management
• The configuration of certain network devices controls the
behaviour of the data network.

• Configuration management is the process of finding and


setting up (configuration) these critical devices.
Security Management
• Is the process of controlling access to information on the
data network.

• Provides a way to monitor access points and records


information on a periodic basis
Performance Management
• Involves measuring the performance of the network
hardware, software and media.

• Example of measured activities are:


• Overall throughput
• Percentage utilization
• Error rates
• Response time
SNMP Objectives
• A framework for managing devices in an internet using
TCP/IP.

• An application level protocol allows it to monitor devices


made by different manufactures installed on different
physical networks.
SNMP Components
Agent
• A router or host that runs the SNMP client program
• Keep performance information in a database
• Can send a trap to the manager if something unusual
occurs.
Manager
• A host that runs the SNMP Manager program

• Has access to values in the agent database


SNMP
SNMP Trap
• Traps are unrequested event reports that are sent to a
management system by an SNMP agent

• A trap will contain


• Network device name
• Time the event happen
• Type of event
SNMP Traps
• Many events can be configured to signal a trap,

• Like a network cable fault


• Failing NIC or Hard Drive
• General Protection Fault
• Power supply failure

• Traps can also be throttled – You can limit the number of


traps sent per second from the agent

• Traps have a priority associated with them – Critical,


Major, Minor, Warning, Marginal, Informational, Normal,
Unknown
SNMP polling
• The network management systems periodically queries
the network device for information.

• The disadvantage is the amount of delay from when an


event occurs to when it’s noticed

• Short interval, network bandwidth is wasted


• Long interval, response to events is too slow
SH

You might also like