Text
Network analysis, architecture, and design
NETWORK ANALYSIS, ARCHITECTURE, AND DESIGN SECOND EDITION
JAMES D. MCCABE
1 Introduction
1.1 Objectives 1
1.2 Preparation 1
1.3 Background 2
1.4 Overview of Analysis, Architecture, and Design Processes 4
1.4.1 Hierarchy and Interconnectivity 7
1.4.2 Importance of Network Analysis 8
1.4.3 Model for Network Analysis, Architecture and Design 16
1.5 A Systems Methodology 19
1.6 System Description 20
1.7 Service Description 25
1.8 Service Characteristics 26
1.8.1 Service Levels 28
1.8.2 System Components and Network Services 30
1.8.3 Service Requests and Requirements 33
1.8.4 Service Offerings 37
1.8.5 Service Metrics 39
1.9 Performance Characteristics 41
1.9.1 Capacity 41
1.9.2 Delay 42
1.9.3 RMA 42
1.9.4 Performance Envelopes 44
1.10 Network Supportability 45
1.11 Conclusion 47
1.12 Exercises 48
2 Requirements Analysis: Concepts
2.1 Objectives 53
2.2 Preparation 53
2.3 Background 54
2.3.1 Requirement and Features 54
2.3.2 The Need for Requirements Analysis 56
2.4 User Requirements 58
2.5 Application Requirements 62
2.5.1 Application Types 62
2.5.2 Application Groups 68
2.5.3 Application Locations 70
2.6 Device Requirements 71
2.6.1 Device Types 72
2.6.2 Performance Characteristics 74
2.6.3 Device Locations 76
2.7 Network Requirements 78
2.7.1 Existing Networks and Migration 78
2.7.2 Network Management and Security 80
2.8 Other Requirements 83
2.8.1 Supplemental Performance Requirements 83
2.8.2 Financial Requirements 84
2.8.3 Enterprise Requirements 85
2.9 The Requirements Specification and Map 85
2.10 Conclusion 89
2.11 Exercises 90
3 Requirements Analysis: Process
3.1 Objectives 95
3.2 Preparation 95
3.3 Gathering and Listing Requirements 96
3.3.1 Determining Initial Conditions 96
3.3.2 Setting Customer Expectations 100
3.3.3 Working with Users 100
3.3.4 Taking Performance Measurements 102
3.3.5 Tracking and Managing Requirements 103
3.3.6 Mapping Location Information 104
3.4 Developing Service Metrics 105
3.4.1 Measurement Tools 107
3.4.2 Where to Apply Service Metrics 108
3.5 Characterizing Behavior 108
3.5.1 Modeling and Simulation 109
3.5.2 User Behavior 110
3.5.3 Application Behavior 112
3.6 Developing RMA Requirements 113
3.6.1 Reliability 113
3.6.2 Maintainability 113
3.6.3 Availibility 114
3.6.4 Thresholds and Limits 119
3.7 Developing Delay Requirements 121
3.7.1 End-to-Endt and Round-Trip Delays 124
3.7.2 Delay Variation 125
3.8 Developing Capacity Requirements 126
3.8.1 Estimating Data Rates 126
3.9 Developing Supplemental Performance Requirements 129
3.9.1 Operational Suitability 130
3.9.2 Supportablility 130
3.9.3 Confidence 138
3.10 Environment-Specific Thresholds and Limits 140
3.10.1 Comparing Application Requirements 141
3.11 Requirements for Predictable and Guaranteed Performance 143
3.11.1 Requirements for Predictable Performance 143
3.11.2 Requirements for Guaranteed Performance 144
3.12 Requirements Mapping 145
3.13 Developing the Requirements Specification 146
3.14 Conclusion 148
3.15 Exercises 151
4 Flow Analysis
4.1 Objectives 157
4.2 Preparation 158
4.3 Background 158
4.4 Flows 158
4.4.1 Individual and Composite Flows 161
4.4.2 Critical Flows 163
4.5 Identifying and Developing Flows 164
4.5.1 Focusing on a Particular Application 165
4.5.2 Developing a Profile 169
4.5.3 Choosing the Top N Applications 170
4.6 Data Sources and SInks 171
4.7 Flow Models 177
4.7.1 Peer-to-Peer 178
4.7.2 Client-Server 180
4.7.3 Hierarchical Client-Server 182
4.7.4 Distributed Computing 186
4.8 Flow Prioritization 189
4.9 The Flow Specification 191
4.9.1 Flowspec Algorithm 192
4.9.2 Capacity and Service Planning 195
4.10 Example Application of Flow Analysis 195
4.11 Conclusion 202
4.12 Exercises 205
5 Network Architecture
5.1 Objectives 209
5.2 Preparation 209
5.3 Background 210
5.3.1 Architecture and Design 211
5.4 Component Architectures 214
5.4.1 Addressing/Routing Component Architecture 219
5.4.2 Network Management Component Architecture 221
5.4.3 Performance Component Architecture 222
5.4.4 Security Component Architecture 223
5.4.5 Optimizing Component Architecture 224
5.5 Reference Architecture 225
5.5.1 External Relationships 227
5.5.2 Optimizing the Reference Architecture 228
5.6 Architectural Models 229
5.6.1 Topological Models 231
5.6.2 Flow-Based Models 233
5.6.3 Functional Models 235
5.6.4 Using the Architectural Models 237
5.7 Systems and Network Architectures 243
5.8 Conclusion 244
5.9 Exercises 245
6 Addressing and Routing Architecture
6.1 Objectives 247
6.2 Preparation 247
6.3 Background 247
6.3.1 Addressing Fundamentals 248
6.3.2 Routing Fundamentals 249
6.4 Addressing Mechanisms 251
6.4.1 Classful Addressing 255
6.4.2 Subnetting 255
6.4.3 Variable-Length Subnetting 258
6.4.4 Supernetting 260
6.4.5 Private Addressing and NAT 262
6.5 Routing Mechanisms 267
6.5.1 Establishing Routing Flows 268
6.5.2 Identifying and Classifying Routing Boundaries 269
6.5.3 Manipulating Routing Flows 272
6.6 Addressing Strategies 277
6.7 Routing Strategies 280
6.7.1 Evaluating Routing Protocols 282
6.7.2 Choosing and Applying Routing Protocols 286
6.8 Architectural Considerations 290
6.8.1 Internal Relationships 290
6.8.2 External Relationships 290
6.9 Conclusion 292
6.10 Exercises 292
7 Network Management Architecture
7.1 Objectives 297
7.2 Preparation 298
7.3 Background 299
7.4 Defining Network Management 301
7.5 Network Management Mechanisms 302
7.5.1 Monitoring Mechanisms 302
7.5.2 Instrumentation Mechanisms 306
7.5.3 Configuration Mechanisms 308
7.6 Architectural Considerations 309
7.6.1 In-Band and Out-of-Band Management 310
7.6.2 Centralized, Distributed, and Hierarchical Management 313
7.6.3 Scaling of Network Management Traffic 316
7.6.4 Checks and Balances 317
7.6.5 Management of Network Management Data 318
7.6.6 MIB Selection 320
7.6.7 Integration into OSS 321
7.6.8 Internal Relationships 322
7.6.9 External Relationships 325
7.7 Conclusion 326
7.8 Exercises 327
8 Performance Architecture
8.1 Objectives 331
8.2 Preparation 331
8.3 Background 332
8.4 Developing Goals for Performance 333
8.5 Performance Mechanisms 336
8.5.1 Quality of Service 336
8.5.2 Prioritization, Traffic Management, Scheduling, and Queuing 340
8.5.3 Service-Level Agreements 346
8.5.4 Policies 348
8.6 Architectural Considerations 350
8.6.1 Evaluation of Performance Mechanisms 350
8.6.2 Internal Relationship 352
8.6.3 External Relationships 352
8.7 Conclusion 353
8.8 Exercises 354
9 Security and Privacy Architecture
9.1 Objectives 357
9.2 Preparation 357
9.3 Background 358
9.4 Developing a Security and Privacy Plan 358
9.5 Security and Privacy Administration 359
9.5.1 Threat Analysis 360
9.5.2 Policies and Procedures 360
9.6 Security and Privacy Mechanisms 363
9.6.1 Physical Security and Awareness 365
9.6.2 Protocol and Application Security 366
9.6.3 Encryption/Decryption 367
9.6.4 Network Perimeter Security 369
9.6.5 Remote Access Security 371
9.7 Architectural Considerations 372
9.7.1 Evaluation of Security Mechanisms 375
9.7.2 Internal Relationships 378
9.7.3 External Relationships 379
9.8 Conclusion 380
9.9 Exercises 381
10 Selecting Technologies for the Network Design
10.1 Objectives 385
10.2 Preparation 385
10.3 Background 386
10.4 Developing Goals for the Network Design 387
10.5 Developing Criteria for Technology Evaluation 392
10.5.1 Broadcast and Nonbroadcast Multiple-Access Methods 394
10.5.2 Technology Functions and Features 400
10.5.3 Performance Upgrade Paths 402
10.5.4 Flow Considerations 405
10.6 Guidelines and Constraints on Technology Evaluations 406
10.6.1 Constraints on Candidate Technologies 411
10.7 Making Technology Choices for the Network Design 412
10.7.1 Segmenting the Network 413
10.7.2 Isolating Areas-The Black-Box Method 418
10.7.3 Applying Evaluation Criteria and Guidelines 420
10.8 Conclusion 421
10.9 Exercises 421
11 Interconnecting Technologies within the Network Design
11.1 Objectives 425
11.2 Preparation 425
11.3 Background 426
11.4 Shared Medium (No Interconnection) 429
11.5 Switching 431
11.5.1 ATM Switching 434
11.6 Routing 443
11.7 Hybrid Mechanisms 445
11.7.1 NHRP 445
11.7.2 MPOA 446
11.7.3 Service Switching 447
11.8 Applying Interconnection Mechanisms to the Design 449
11.8.1 Hierarchy 449
11.8.2 Redundancy 450
11.9 Where to Go from Here 453
11.10 Conclusion 454
11.11 Exercises 455
No other version available