Network Applications and Flow Models
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following are common approaches to identifying flows in applications? (Select all that apply)

  • Concentrating solely on network devices
  • Developing a user profile of all users
  • Focusing on a specific application group (correct)
  • Choosing the top N applications to apply across the network (correct)

A data source generates a traffic flow.

True (A)

What is the primary function of a data sink?

To terminate a traffic flow.

Devices like cameras and application servers are examples of data ______.

<p>sources</p> Signup and view all the answers

Match the following terms with their definitions:

<p>Data Source = Generates a traffic flow Data Sink = Terminates a traffic flow Flow Model = Helps categorize flow characteristics Top N Applications = Selected applications for network-wide use</p> Signup and view all the answers

When identifying applications for network-wide application, which tier is most directly involved?

<p>Application Layer (A)</p> Signup and view all the answers

What is one challenge in functional modeling?

<p>Understanding complex interdependencies between applications.</p> Signup and view all the answers

All data sources require substantial computing power to generate traffic flow.

<p>False (B)</p> Signup and view all the answers

Which flow model operates with asymmetric flows and is focused towards the client?

<p>Client–server (D)</p> Signup and view all the answers

In a peer-to-peer flow model, flows among users and applications are distinct and can be individually critical.

<p>False (B)</p> Signup and view all the answers

What is a key characteristic of the distributed-computing flow model?

<p>It can have inverted characteristics of the client-server model or be a hybrid of peer-to-peer and client-server.</p> Signup and view all the answers

The type of flow model that is fairly consistent in user behavior is known as __________.

<p>peer-to-peer</p> Signup and view all the answers

Match the following flow models with their characteristics:

<p>Peer-to-Peer = Consistent flows with no distinction Client–server = Asymmetric bidirectional flows Hierarchical Client–Server = Structured in a tiered hierarchy Distributed Computing = Hybrid of peer-to-peer and client-server</p> Signup and view all the answers

In which flow model are requests and responses typically small for clients compared to the server's responses?

<p>Client–server (A)</p> Signup and view all the answers

Hierarchical client-server models are the least applicable flow model in practice.

<p>False (B)</p> Signup and view all the answers

Describe one implication of flows being equivalent in a peer-to-peer model.

<p>Either all of the flows or none of the flows is critical.</p> Signup and view all the answers

What is the minimum bandwidth requirement per session for the database application (DB1)?

<p>150 Kb/s (C)</p> Signup and view all the answers

The visualization application (VIS1) requires a capacity of only 10 Mb/s.

<p>False (B)</p> Signup and view all the answers

What is the uptime requirement for the payroll application (PAY1)?

<p>100% uptime while in operation</p> Signup and view all the answers

The company requires a minimum of ______________ access to the Internet.

<p>T1</p> Signup and view all the answers

Match the following applications with their specific requirements:

<p>DB1 = 150 Kb/s per session VIS1 = Up to 40 Mb/s capacity PAY1 = 100% uptime General Applications = Mail and word processing</p> Signup and view all the answers

What are flows in the context of network traffic?

<p>Network traffic with common attributes (A)</p> Signup and view all the answers

The current network will be retained with all its requirements.

<p>False (B)</p> Signup and view all the answers

What is the round-trip delay requirement for the visualization application (VIS1)?

<p>100 ms</p> Signup and view all the answers

Flashcards

Peer-to-Peer Flow Model

A flow model where users and applications have similar network behavior, acting as equal peers. Flows are equivalent and can't be distinguished.

Client-Server Flow Model

A common flow model with directionality and hierarchy, where clients request and the server responds. Flows are bidirectional, but generally, requests are smaller than responses.

Hierarchical Client-Server

A specific type of Client-Server model that focuses on the hierarchical structure of a system.

Distributed Computing Flow Model

A specialized flow model that can exhibit characteristics opposite to client-server, or a combination of peer-to-peer and client-server.

Signup and view all the flashcards

Flow Model

A model that represents how data or requests travel through a network.

Signup and view all the flashcards

Equivalent Flows

Flows that are identical in behavior. They cannot be distinguished.

Signup and view all the flashcards

Bidirectional Flows

Flows that travel in both directions, unlike unidirectional.

Signup and view all the flashcards

Asymmetric Flows

Flows where the roles of participants are unequal, like in client-server model.

Signup and view all the flashcards

Identifying network flows

Methods for finding and classifying network traffic patterns.

Signup and view all the flashcards

Application-based flow identification

Identifying network flows by focusing on specific applications or groups of applications.

Signup and view all the flashcards

Application profile

A description of common applications used by users.

Signup and view all the flashcards

Top N applications

Selecting the most important (e.g., top 3, 5, or 10) applications for network analysis.

Signup and view all the flashcards

Data source

A device that generates network traffic.

Signup and view all the flashcards

Computing servers

An example of a data source generating large amounts of information.

Signup and view all the flashcards

Data sink

A device that receives network traffic.

Signup and view all the flashcards

Flow

A set of network traffic with common attributes, such as source/destination address, type of information, and directionality.

Signup and view all the flashcards

Traffic Flow

Another name for a flow, emphasizing the movement of data through a network.

Signup and view all the flashcards

Data Flow

Another name for a flow, focusing on the specific data being transferred.

Signup and view all the flashcards

Flow Characteristics

Attributes that define a flow, such as source and destination addresses, type of information, and direction of data transfer.

Signup and view all the flashcards

Individual Flow

A flow for a single session of an application, representing the data exchange during that specific interaction.

Signup and view all the flashcards

Flow Analysis

The process of examining and understanding the flow of data through a network, identifying patterns and bottlenecks.

Signup and view all the flashcards

Flow Requirements

Specific needs of a particular flow, including bandwidth, latency, and security.

Signup and view all the flashcards

Link-by-Link Flow Analysis

Examining flow requirements on each individual link within a network.

Signup and view all the flashcards

Study Notes

Network Analysis Architecture & Design

  • True collaboration involves team members sharing responsibility for developing quality networks.
  • Internet usage is increasing daily, with applications including research, shopping, travel bookings, news, and weather checks.

Contents

  • Part I: Identifying Customer Needs & Goals
    • Chapter 1: Analyzing Business Goals and Constraints
    • Chapter 2: Analyzing Technical Goals and Tradeoffs
    • Chapter 3: Characterizing the Existing Internetwork
  • Part II: Logical Network Design
    • Chapter 4: Characterizing Network Traffic
    • Chapter 5: Designing a Network Topology
    • Chapter 6: Designing Models for Addressing and Numbering
    • Chapter 7: Selecting Switching and Routing Protocols
    • Chapter 8: Developing Network Security Strategies
    • Chapter 9: Developing Network Management Strategies

Lecture 1

  • Top-down network design principles are based on structured software programming and systems analysis.
  • Structured systems analysis aims to accurately portray user needs, which are often overlooked or inaccurately represented in system designs.
  • The architecture also aims to create manageable designs through modular design, for easier maintenance and modification.
  • The design process is arranged in a top-down sequence.
  • Models are used to characterize the existing system, identify user requirements, and develop a future system structure.
  • Data flow, data types, and processes that access or alter data are significant considerations throughout the process.
  • Understanding user community data accesses/modifications and processes is part of the analysis.
  • Logical and physical models are developed, where the logical model identifies basic building blocks and system structure, while the physical model describes devices, technologies, and implementations.

Lecture 2

  • The model for network analysis, architecture, and design aligns with other engineering processes, involving identifying issues, managing customer expectations, monitoring the existing system/environment, analyzing data, developing solutions, evaluating options based on tradeoffs, selecting options, and planning implementation.

Lecture 3

  • Requirements Analysis: Concepts
    • Requirements describe network functions and performance necessary to support users, applications, and devices.
    • User Requirements:
      • User requirements are the needs gathered from input of end users, system administrators, and management.
      • Application requirements are derived from application data, experience, or testing. These specify what the application needs for successful system operation.
      • Different types of application requirements include real-time and non-real-time requirements. Interactivity is a common feature of applications, with variations in timing relationships between source and destination.
      • Device requirements specify the types of devices, performance characteristics, and location.
      • Network requirements for existing networks include scaling dependencies, location dependencies, performance constraints, and network obsolescence.
    • Other Requirements:
      • Other requirements include supplemental performance requirements, financial requirements, and enterprise requirements. In these areas, detailed analyses of requirements for various types of applications and devices can inform architectural decisions.

Lecture 4

  • Flow Analysis: A flow is a set of network traffic exhibiting common attributes, such as source/destination address, type of information, directionality, or other end-to-end information and is transmitted during a single application session and is end-to-end between source and destination applications.
  • Common Flow Characteristics: Flow characteristics include performance requirements (e.g., bandwidth, latency, reliability, availability), importance/priority levels, business/enterprise considerations, directionality, common sets of users, applications, devices, and scheduling, protocols used, security, and privacy.
  • Types of Flows:
    • Individual Flows: The basic unit of traffic flows, related to individual application sessions, often come with guaranteed requirements (such as those for essential business transactions within an organization).
    • Composite Flows: Composed of multiple application requirements or flows and often share a common link, path, or network.
  • Identifying and Developing Flows: The process of defining and creating flows includes identifying applications, determining flow source and sink locations, applying flow models if needed, and combining flow performance requirements into flow specifications. Techniques for identifying flow requirements from an application perspective include focusing on a specific application, or building a profile of applications common to a user group (for instance, analyzing the top-N applications used by the majority of employees for network design)

Lecture 5

  • Architectural Models
    • Topological Models: LAN/MAN/WAN and Access/Distribution/Core models.
      • LAN/MAN/WAN Model for networks with geographical and/or topological separations.
      • Access/Distribution/Core Model for function-based separation.
    • Flow-Based Models: (peer-to-peer, client-server, hierarchical client-server, distributed computing) Flow-based models relate directly to flow characteristics identified in Chapter 4.
      • Peer-to-Peer Model for scenarios where user and application behavior are fairly consistent across a network.
      • Client-Server Model for scenarios with consistent client-server requests/responses.
      • Hierarchical Client-Server Model for multi-tiered organizational structure.
      • Distributed Computing Model for models with highly varied data sources and sinks, for example, a distributed computing system might employ a task manager coordinating multiple computing devices.
    • Functional Models: Service provider, intranet/extranet, single/multi-tiered performance, end-to-end models.

Lecture 6

  • Performance Architecture: A framework for fulfilling user, application, device, and existing network requirements concerning capacity, delay, and reliability, and availability.
  • Key elements include identifying performance goals for the network, addressing performance issues like response times and throughput, grouping/prioritizing users and applications, changing the network from a cost center to profit-generating entity, merging traffic types, differentiating customers, and addressing QoS (Quality of Service).
    • QoS:
      • QoS implementation mechanisms include prioritization, traffic management (admission control, traffic conditioning, and scheduling), and queuing strategies.
      • Service-level agreements (SLAs) are formal contracts between providers and users setting up specific performance levels and responsibilities. SLAs can be user-level or service-provider level, and they are important for measuring and managing service expectations.

Lecture 7

  • Midterm examination related to the network analysis and design course.

Lecture 8

  • Developing Network Security Strategies
    • Security and Privacy Plan: Creation of strategies addressing threats, policies, and procedures.
    • Security and Privacy Mechanisms: Physical, protocol, application, encryption/decryption, and network perimeter security are crucial aspects as well as remote access security.
    • Architectural Considerations: Internal and external relationships, security mechanism assessment, design factors for security.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge on common approaches to identifying flows in applications and the various flow models used in network environments. This quiz covers definitions, characteristics, and challenges related to data sources, sinks, and functional modeling. Perfect for students studying computer networks and distributed computing.

More Like This

Use Quizgecko on...
Browser
Browser