Flow analysis overview
-
Upload
csk-selva -
Category
Engineering
-
view
19 -
download
0
Transcript of Flow analysis overview
![Page 1: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/1.jpg)
UNIT - III
![Page 2: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/2.jpg)
OBJECTIVES:
This chapter introduces flows andflow concepts, data sources anddata sinks, and flow models will helpus to identify, size, and describeflows.
![Page 3: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/3.jpg)
FLOWS: Flows also known as network flowsor traffic flows or data flows.
It provides the traffic movement inthe network.
A sequence of packets sent from aparticular source to a particular(unicast or multicast) destination.
![Page 4: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/4.jpg)
FLOWS ANALYSIS: Flow analysis is the process of describing/characterizing traffic flows for anetwork.
Where they are likely 2take place/occur. What levels of performance they willrequire.
![Page 5: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/5.jpg)
BENEFITS: Provides hierarchy (arrangement) levels. In choosing interconnection strategiessuch as (switching, routing and hybrid)mechanisms.
Flows are represented as Unidirectional or Bidirectional performance.
Bidirectional :
Unidirectional:
![Page 6: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/6.jpg)
It is represented as single anddouble sided arrows.
Most flows are Bi-Directionalarrows.
Flows are important in analysis,architecture and design process.
![Page 7: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/7.jpg)
TRAFFIC FLOW:
Traffic flow is the study ofinteractions between trafficcontrol devices and minimaltraffic congestion(packet loss)problems.
![Page 8: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/8.jpg)
Flow attributes, such as Source/Destination address, Type of information, PORT numbers like,
▪ 21 FTP (File Transfer Protocol)▪ 25 SMTP (Send Mail Transfer Protocol)▪ 68 DHCP (Dynamic Host Control Protocol)▪ 80 HTTP (Hyper-Text Transfer Protocol)▪ 161 SNMP (Simple Network Management Protocol)
▪ 8080 HTTP
![Page 9: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/9.jpg)
![Page 10: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/10.jpg)
![Page 11: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/11.jpg)
Composite
flows
Individual
flows
Flows
![Page 12: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/12.jpg)
It is an One-Way delay/application requirement for a single session.
Requirements are left with individual flowand not consolidated with otherrequirements.
Uni-directional (UPSTREAM).
Single applications of flows that share acommon link, path or network.
It has guaranteed requirements.
![Page 13: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/13.jpg)
![Page 14: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/14.jpg)
The combination of requirementsfrom multiple applications ofindividual flows that share acommon link, path or network.
Bi-directional (UPSTREAM/DOWNSTREAM).
Most flows in a network arecomposites.
![Page 15: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/15.jpg)
![Page 16: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/16.jpg)
It requires high or guaranteedperformance that are operate/control the architecture and design.
Example: Mission critical(MTBF,MTBCF) Rate critical(PDR,SDR) Real critical.
![Page 17: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/17.jpg)
An activity, device, service or systemwhose failure or problems whichinterrupt an event will cause afailure in business operations.
For example, an online business'smission critical.
![Page 18: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/18.jpg)
Mission critical refers to any factor of a system like,
equipment, process, procedure, Software whose failure will result in the failure of business operations.
![Page 19: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/19.jpg)
Critical rate is an attribute of your character that determines how often you make a critical attack.
For example, if your critical rate is 40% then on average 4 out of every 10 attacks will be a critical attack.
![Page 20: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/20.jpg)
Focusing on particular application Developing a profile Choosing the top N applications
![Page 21: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/21.jpg)
Focusing on an application Application group Device / functions.
![Page 22: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/22.jpg)
Profile or template can be developed for applications.
Each flow fits the profile identified with profile tag.
Profiles are used to simplify information.
![Page 23: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/23.jpg)
Top 5 Applications Web browsing E-mail File Transfer Word processing DB transaction The purpose, determine which application represent the most important requirements for the network.
![Page 24: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/24.jpg)
Data sources: It is used to generate the data flow. Represented as circle with cross(star/asterisk).
Two dimensional plane, arrow coming out.
Data sinks: It is used to terminate the data flow.
![Page 25: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/25.jpg)
The group of flows publicly display the consistent behavior characteristics is called as ‘flow models’.
Useful to identify and categorize flows in an Environment peer-to-peer client-server hierarchical client-server and distributed computing.
![Page 26: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/26.jpg)
FLOW PRIORITIZATION Flows can be prioritized according to
importance, based on the characteristics. To determine which flows get the most
resources or which flows get resources first. Some prioritizations include:
▪ Business objectives▪ Political objectives▪ RMA and QoS▪ Security Requirements▪ The numbers of users, applications and devices.
![Page 27: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/27.jpg)
It is a mechanism to combine these performance requirements (capacity, delay and RMA).
To describe the optimal composite performance for that flow or group of flows.
![Page 28: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/28.jpg)
Example: Building and device locations ▪ Requirement analysis▪ Flow models▪ Flow map
![Page 29: Flow analysis overview](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a96ee01a28ab30508b4711/html5/thumbnails/29.jpg)
THANK YOU