SlideShare a Scribd company logo
CP7101-Design and Management
of Computer Networks
Dr.G.Geetha
Professor /CSE
Jerusalem College of Engineering
Flow Analysis
learn how to identify and
characterize traffic flows
Flows
• Flows (also known as traffic flows or data flows) are
sets of network traffic (application, protocol, and
control information) that have common attributes,
such as source/destination address, type of
information, directionality, or other end-to-end
information.
Figure 4.1
Flow Characteristics
• Performance Requirements
• Capacity (e.g., Bandwidth)
• Delay (e.g., Latency)
• Reliability (e.g., Availability)
• Quality of Service Levels
• Importance/ Priority Levels
• Business/Enterprise/Provider
• Political
• Other
• Directionality
• Common Sets of Users, Applications, Devices
• Scheduling (e.g., Time-of-Day)
• Protocols Used
• Addresses/Ports
• Security/Privacy Requirements
FIGURE 4.2, FIGURE 4.3
Two types of flows
• Individual
An individual flow is the flow for a single session of
an application
• Composite
A composite flow is a combination of requirements
from multiple applications, or of individual flows,
that share a common link, path, or network
Individual flow
• An individual flow is the basic unit of traffic flows
• When an individual flow has guaranteed requirements,
those requirements are usually left with the individual
flow and are not consolidated with other requirements
or flows into a composite flow
• Individual flows are derived directly from the
requirements specification, or are estimated from our
best knowledge about the application, users, devices,
and their locations.
FIGURE 4.4
• Most flows in a network are composites Figure 4.5
Presentation of Flows
upstream- downstream
• Upstream indicates the direction toward the
source and downstream is the direction
toward the destination.
• Upstream is often toward the core of the
network, while downstream is often toward
the edge of the network, particularly in
service provider networks
FIGURE 4.6
Critical Flows
• Critical flows can be considered more
important than others, in that they are higher
in performance or have strict requirements
(e.g., Mission-critical, rate-critical, real time,
interactive, high-performance).
• Critical flows may serve more important users,
their applications, and devices
Identifying and Developing Flows
• Identified and developed from information in
the requirements specification:
• User, application, device, and network
requirements
• User and application behavior (usage patterns,
models)
• User, application, and device location
information
• Performance requirements.
Identifying and Developing Flows
• Flows are determined based on the requirements
and locations of the applications and devices that
generate (source) or terminate (sink) each traffic
flow.
Process for identifying and developing
flows
1. Identifying one or more applications and/or
devices that you believe will generate and/or
terminate traffic flows
2. Use their requirements from the requirements
specification and their locations from the
requirements map
3. Based on how and where each application and
device is used, you may be able to determine
which devices generate flows and which devices
terminate flows (flow sources and sinks)
FIGURE 4.7
Flows: Application Perspective
1. Focusing on a particular application, application
group, device, or function(e.g., videoconferencing
or storage)
2. Developing a “profile” of common or selected
applications that can be applied across a user
population
3. Choosing the top N (e.g., 3, 5, 10, etc.) applications
to be applied across the entire network
1.Focusing on a Particular Application
Example: Data Migration
From requirements specification, for a single session of each
application:
• Application 1: Staging data from user devices
Capacity 100Kb/s; Delay Unknown; Reliability 100%
• Application 1: Migrating data between servers
Capacity 500Kb/s; Delay Unknown; Reliability 100%
• Application 2: Migration to remote (tertiary) storage
Capacity 10Mb/s; Delay N/A; Reliability 100%
FIGURE 4.8- 4.12
2.Developing a Profile
• Profile or template can be developed for set of
common applications apply to a group of
users or to the entire set of users
• Each flow that fits the profile is identified with
that profile’s tag
• Saving time and effort
3.Choosing the Top N Applications
• a combination of the first two approaches
Example: Top 5 Applications
1. Web Browsing
2. Email
3. File Transfer
4. Word Processing
5. Database Transactions
FIGURE 4.14
Data Sources and Sinks
• A data source generates a traffic flow, and a
data sink terminates a traffic flow
• Help provide directionality to flows
• Data sources are represented as a circle
with a dot in the center, and a data sink is
represented as a circle with a cross (i.e., star
or asterisk) in the center.
FIGURE 4.15 - 4.18
Flow Models
• Method to help describe flows in the network
• Flow models are groups of flows that exhibit
specific, consistent behavior characteristic
• Flow model apply to a single application.
• Directionality, hierarchy, and diversity are the
primary characteristics of flow models
• Directionality describes the preference to
have more requirements in one direction than
another.
Flow models
1. Peer-to-peer
2. Client–server
3. Hierarchical client–server
4. Distributed computing
Peer-to-Peer
• Peer-to-peer, is one where the users and
applications are fairly consistent in their flow
behaviors throughout the network
• They act at the same level in the hierarchy
• This has two important implications:
• cannot distinguish between flows in this model.
Therefore, either all of the flows or none of the
flows is critical
• Since the flows are equivalent, they can be
described by a single specification(e.g., Profile)
Client–Server
Flow Prioritization
• The purpose for prioritizing flows is to
determine which flows get the most resources
or which flows get resources first.
• primary resource is funding.
FIGURE 4.33-4.35
The Flow Specification
• results of identifying, defining, and describing
flows are combined into a flow specification,
or flowspec .
• Flow specifications can take one of three
types:
1. One-part, or unitary;
2. Two-part;
3. Multi-part.
Flowspec
• A one-part flowspec
– Describes flows that have only best-effort
requirements.
• A two-part flowspec
– Describes flows that have predictable requirements
and may include flows that have best-effort
requirements.
• A multipart flowspec
– Describes flows that have guaranteed requirements
and may include flows that have predictable and/or
best-effort requirements
Flowspec Algorithm
• Flowspecs are used to combine performance
requirements of multiple applications for a
composite flow or multiple flows in a section of a
path
• The flowspec algorithm is a mechanism to
combine these performance requirements
(e.g.,capacity, delay, and RMA) for flows in such a
way as to describe the optimal composite
erformance for that flow or group of flows.
• The flowspec algorithm applies the following rules:
1.Best-effort flows consist only of capacity requirements,
so only capacities are used in best-effort Calculations.
2.For flows with predictable requirements, we will use all
available performance requirements (Capacity, delay,
and RMA) in the calculations. Performance
requirements will be combined for Each characteristic
to maximize the overall performance of each flow
3.For flows with guaranteed requirements, we will list
each requirement (as an individual flow), not
Combining them with other requirements.
Ad

More Related Content

What's hot (20)

Apache flume - an Introduction
Apache flume - an IntroductionApache flume - an Introduction
Apache flume - an Introduction
Erik Schmiegelow
 
Unlocking the Power of Lakehouse Architectures with Apache Pulsar and Apache ...
Unlocking the Power of Lakehouse Architectures with Apache Pulsar and Apache ...Unlocking the Power of Lakehouse Architectures with Apache Pulsar and Apache ...
Unlocking the Power of Lakehouse Architectures with Apache Pulsar and Apache ...
StreamNative
 
Developing rma requirements
Developing rma requirementsDeveloping rma requirements
Developing rma requirements
csk selva
 
SOA
SOASOA
SOA
Indeevari Ramanayake
 
Meetup 23 - 02 - OVN - The future of networking in OpenStack
Meetup 23 - 02 - OVN - The future of networking in OpenStackMeetup 23 - 02 - OVN - The future of networking in OpenStack
Meetup 23 - 02 - OVN - The future of networking in OpenStack
Vietnam Open Infrastructure User Group
 
SOA (Service Oriented Architecture)
SOA (Service Oriented Architecture)SOA (Service Oriented Architecture)
SOA (Service Oriented Architecture)
Annie Comp
 
Apache Storm
Apache StormApache Storm
Apache Storm
Edureka!
 
Unit 5-apache hive
Unit 5-apache hiveUnit 5-apache hive
Unit 5-apache hive
vishal choudhary
 
Scaling Apache Pulsar to 10 Petabytes/Day - Pulsar Summit NA 2021 Keynote
Scaling Apache Pulsar to 10 Petabytes/Day - Pulsar Summit NA 2021 KeynoteScaling Apache Pulsar to 10 Petabytes/Day - Pulsar Summit NA 2021 Keynote
Scaling Apache Pulsar to 10 Petabytes/Day - Pulsar Summit NA 2021 Keynote
StreamNative
 
Data Pipelines with Kafka Connect
Data Pipelines with Kafka ConnectData Pipelines with Kafka Connect
Data Pipelines with Kafka Connect
Kaufman Ng
 
Apache Storm
Apache StormApache Storm
Apache Storm
masifqadri
 
SOA PRINCIPLES :2. Service Reusability
SOA PRINCIPLES :2. Service ReusabilitySOA PRINCIPLES :2. Service Reusability
SOA PRINCIPLES :2. Service Reusability
Mohamed Zakarya Abdelgawad
 
Dataflow with Apache NiFi
Dataflow with Apache NiFiDataflow with Apache NiFi
Dataflow with Apache NiFi
DataWorks Summit/Hadoop Summit
 
Cloud Computing: Hadoop
Cloud Computing: HadoopCloud Computing: Hadoop
Cloud Computing: Hadoop
darugar
 
Service-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA)Service-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA)
WSO2
 
Service level agreement in cloud computing an overview
Service level agreement in cloud computing  an overviewService level agreement in cloud computing  an overview
Service level agreement in cloud computing an overview
Dr Neelesh Jain
 
Kafka Connect - debezium
Kafka Connect - debeziumKafka Connect - debezium
Kafka Connect - debezium
Kasun Don
 
Kafka Streams for Java enthusiasts
Kafka Streams for Java enthusiastsKafka Streams for Java enthusiasts
Kafka Streams for Java enthusiasts
Slim Baltagi
 
Apache kafka performance(throughput) - without data loss and guaranteeing dat...
Apache kafka performance(throughput) - without data loss and guaranteeing dat...Apache kafka performance(throughput) - without data loss and guaranteeing dat...
Apache kafka performance(throughput) - without data loss and guaranteeing dat...
SANG WON PARK
 
Google file system GFS
Google file system GFSGoogle file system GFS
Google file system GFS
zihad164
 
Apache flume - an Introduction
Apache flume - an IntroductionApache flume - an Introduction
Apache flume - an Introduction
Erik Schmiegelow
 
Unlocking the Power of Lakehouse Architectures with Apache Pulsar and Apache ...
Unlocking the Power of Lakehouse Architectures with Apache Pulsar and Apache ...Unlocking the Power of Lakehouse Architectures with Apache Pulsar and Apache ...
Unlocking the Power of Lakehouse Architectures with Apache Pulsar and Apache ...
StreamNative
 
Developing rma requirements
Developing rma requirementsDeveloping rma requirements
Developing rma requirements
csk selva
 
SOA (Service Oriented Architecture)
SOA (Service Oriented Architecture)SOA (Service Oriented Architecture)
SOA (Service Oriented Architecture)
Annie Comp
 
Apache Storm
Apache StormApache Storm
Apache Storm
Edureka!
 
Scaling Apache Pulsar to 10 Petabytes/Day - Pulsar Summit NA 2021 Keynote
Scaling Apache Pulsar to 10 Petabytes/Day - Pulsar Summit NA 2021 KeynoteScaling Apache Pulsar to 10 Petabytes/Day - Pulsar Summit NA 2021 Keynote
Scaling Apache Pulsar to 10 Petabytes/Day - Pulsar Summit NA 2021 Keynote
StreamNative
 
Data Pipelines with Kafka Connect
Data Pipelines with Kafka ConnectData Pipelines with Kafka Connect
Data Pipelines with Kafka Connect
Kaufman Ng
 
Cloud Computing: Hadoop
Cloud Computing: HadoopCloud Computing: Hadoop
Cloud Computing: Hadoop
darugar
 
Service-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA)Service-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA)
WSO2
 
Service level agreement in cloud computing an overview
Service level agreement in cloud computing  an overviewService level agreement in cloud computing  an overview
Service level agreement in cloud computing an overview
Dr Neelesh Jain
 
Kafka Connect - debezium
Kafka Connect - debeziumKafka Connect - debezium
Kafka Connect - debezium
Kasun Don
 
Kafka Streams for Java enthusiasts
Kafka Streams for Java enthusiastsKafka Streams for Java enthusiasts
Kafka Streams for Java enthusiasts
Slim Baltagi
 
Apache kafka performance(throughput) - without data loss and guaranteeing dat...
Apache kafka performance(throughput) - without data loss and guaranteeing dat...Apache kafka performance(throughput) - without data loss and guaranteeing dat...
Apache kafka performance(throughput) - without data loss and guaranteeing dat...
SANG WON PARK
 
Google file system GFS
Google file system GFSGoogle file system GFS
Google file system GFS
zihad164
 

Viewers also liked (16)

Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysis
Dr Geetha Mohan
 
Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2 Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2
Dr Geetha Mohan
 
Microprocessors-based systems (under graduate course) Lecture 5 of 9
Microprocessors-based systems (under graduate course) Lecture 5 of 9 Microprocessors-based systems (under graduate course) Lecture 5 of 9
Microprocessors-based systems (under graduate course) Lecture 5 of 9
Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 9 of 9
Microprocessors-based systems (under graduate course) Lecture 9 of 9 Microprocessors-based systems (under graduate course) Lecture 9 of 9
Microprocessors-based systems (under graduate course) Lecture 9 of 9
Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 7 of 9
Microprocessors-based systems (under graduate course) Lecture 7 of 9 Microprocessors-based systems (under graduate course) Lecture 7 of 9
Microprocessors-based systems (under graduate course) Lecture 7 of 9
Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 8 of 9
Microprocessors-based systems (under graduate course) Lecture 8 of 9 Microprocessors-based systems (under graduate course) Lecture 8 of 9
Microprocessors-based systems (under graduate course) Lecture 8 of 9
Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 4 of 9
Microprocessors-based systems (under graduate course) Lecture 4 of 9 Microprocessors-based systems (under graduate course) Lecture 4 of 9
Microprocessors-based systems (under graduate course) Lecture 4 of 9
Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 2 of 9
Microprocessors-based systems (under graduate course) Lecture 2 of 9 Microprocessors-based systems (under graduate course) Lecture 2 of 9
Microprocessors-based systems (under graduate course) Lecture 2 of 9
Randa Elanwar
 
Cp7101 design and management of computer networks-design concepts
Cp7101 design and management of computer networks-design conceptsCp7101 design and management of computer networks-design concepts
Cp7101 design and management of computer networks-design concepts
Dr Geetha Mohan
 
Microprocessors-based systems (under graduate course) Lecture 6 of 9
Microprocessors-based systems (under graduate course) Lecture 6 of 9 Microprocessors-based systems (under graduate course) Lecture 6 of 9
Microprocessors-based systems (under graduate course) Lecture 6 of 9
Randa Elanwar
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
Dr Geetha Mohan
 
Microprocessors-based systems (under graduate course) Lecture 3 of 9
Microprocessors-based systems (under graduate course) Lecture 3 of 9 Microprocessors-based systems (under graduate course) Lecture 3 of 9
Microprocessors-based systems (under graduate course) Lecture 3 of 9
Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 1 of 9
Microprocessors-based systems (under graduate course) Lecture 1 of 9 Microprocessors-based systems (under graduate course) Lecture 1 of 9
Microprocessors-based systems (under graduate course) Lecture 1 of 9
Randa Elanwar
 
1327 Addressing Modes Of 8086
1327 Addressing Modes Of 80861327 Addressing Modes Of 8086
1327 Addressing Modes Of 8086
techbed
 
8086 microprocessor instruction set by Er. Swapnil Kaware
8086 microprocessor instruction set by Er. Swapnil Kaware8086 microprocessor instruction set by Er. Swapnil Kaware
8086 microprocessor instruction set by Er. Swapnil Kaware
Prof. Swapnil V. Kaware
 
Lead Generation on SlideShare: A How-to Guide
Lead Generation on SlideShare: A How-to GuideLead Generation on SlideShare: A How-to Guide
Lead Generation on SlideShare: A How-to Guide
SlideShare
 
Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysis
Dr Geetha Mohan
 
Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2 Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2
Dr Geetha Mohan
 
Microprocessors-based systems (under graduate course) Lecture 5 of 9
Microprocessors-based systems (under graduate course) Lecture 5 of 9 Microprocessors-based systems (under graduate course) Lecture 5 of 9
Microprocessors-based systems (under graduate course) Lecture 5 of 9
Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 9 of 9
Microprocessors-based systems (under graduate course) Lecture 9 of 9 Microprocessors-based systems (under graduate course) Lecture 9 of 9
Microprocessors-based systems (under graduate course) Lecture 9 of 9
Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 7 of 9
Microprocessors-based systems (under graduate course) Lecture 7 of 9 Microprocessors-based systems (under graduate course) Lecture 7 of 9
Microprocessors-based systems (under graduate course) Lecture 7 of 9
Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 8 of 9
Microprocessors-based systems (under graduate course) Lecture 8 of 9 Microprocessors-based systems (under graduate course) Lecture 8 of 9
Microprocessors-based systems (under graduate course) Lecture 8 of 9
Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 4 of 9
Microprocessors-based systems (under graduate course) Lecture 4 of 9 Microprocessors-based systems (under graduate course) Lecture 4 of 9
Microprocessors-based systems (under graduate course) Lecture 4 of 9
Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 2 of 9
Microprocessors-based systems (under graduate course) Lecture 2 of 9 Microprocessors-based systems (under graduate course) Lecture 2 of 9
Microprocessors-based systems (under graduate course) Lecture 2 of 9
Randa Elanwar
 
Cp7101 design and management of computer networks-design concepts
Cp7101 design and management of computer networks-design conceptsCp7101 design and management of computer networks-design concepts
Cp7101 design and management of computer networks-design concepts
Dr Geetha Mohan
 
Microprocessors-based systems (under graduate course) Lecture 6 of 9
Microprocessors-based systems (under graduate course) Lecture 6 of 9 Microprocessors-based systems (under graduate course) Lecture 6 of 9
Microprocessors-based systems (under graduate course) Lecture 6 of 9
Randa Elanwar
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
Dr Geetha Mohan
 
Microprocessors-based systems (under graduate course) Lecture 3 of 9
Microprocessors-based systems (under graduate course) Lecture 3 of 9 Microprocessors-based systems (under graduate course) Lecture 3 of 9
Microprocessors-based systems (under graduate course) Lecture 3 of 9
Randa Elanwar
 
Microprocessors-based systems (under graduate course) Lecture 1 of 9
Microprocessors-based systems (under graduate course) Lecture 1 of 9 Microprocessors-based systems (under graduate course) Lecture 1 of 9
Microprocessors-based systems (under graduate course) Lecture 1 of 9
Randa Elanwar
 
1327 Addressing Modes Of 8086
1327 Addressing Modes Of 80861327 Addressing Modes Of 8086
1327 Addressing Modes Of 8086
techbed
 
8086 microprocessor instruction set by Er. Swapnil Kaware
8086 microprocessor instruction set by Er. Swapnil Kaware8086 microprocessor instruction set by Er. Swapnil Kaware
8086 microprocessor instruction set by Er. Swapnil Kaware
Prof. Swapnil V. Kaware
 
Lead Generation on SlideShare: A How-to Guide
Lead Generation on SlideShare: A How-to GuideLead Generation on SlideShare: A How-to Guide
Lead Generation on SlideShare: A How-to Guide
SlideShare
 
Ad

Similar to Cp7101 design and management of computer networks-flow analysis (20)

network design 5.pptx
network design 5.pptxnetwork design 5.pptx
network design 5.pptx
aida alsamawi
 
Unit iii for PG PAWSN
Unit iii for PG PAWSNUnit iii for PG PAWSN
Unit iii for PG PAWSN
Dhaya kanthavel
 
Flow analysis overview
Flow analysis overviewFlow analysis overview
Flow analysis overview
csk selva
 
Identifying and developing flows modified
Identifying and developing flows modifiedIdentifying and developing flows modified
Identifying and developing flows modified
csk selva
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
Dr. Shivashankar
 
network design 6.pptx
network design 6.pptxnetwork design 6.pptx
network design 6.pptx
aida alsamawi
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
csk selva
 
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURESOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
AnyaForger34
 
Resource Sharing and Challenges - Distributed Computing
Resource Sharing and Challenges - Distributed ComputingResource Sharing and Challenges - Distributed Computing
Resource Sharing and Challenges - Distributed Computing
nirmalanr2
 
Software requirement engineering
Software requirement engineeringSoftware requirement engineering
Software requirement engineering
Syed Zaid Irshad
 
Data Streaming For Big Data
Data Streaming For Big DataData Streaming For Big Data
Data Streaming For Big Data
Seval Çapraz
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
csk selva
 
Introduction to Web Services - Architecture
Introduction to Web Services - ArchitectureIntroduction to Web Services - Architecture
Introduction to Web Services - Architecture
Matrix823409
 
02 Interface Design and Definition Document Template.pptx
02 Interface Design and Definition Document Template.pptx02 Interface Design and Definition Document Template.pptx
02 Interface Design and Definition Document Template.pptx
Orest Swystun
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architectures
csk selva
 
architectural design
 architectural design architectural design
architectural design
Preeti Mishra
 
Diksha sda presentation
Diksha sda presentationDiksha sda presentation
Diksha sda presentation
dikshagupta111
 
MODULE-5_CCN.pptx
MODULE-5_CCN.pptxMODULE-5_CCN.pptx
MODULE-5_CCN.pptx
Dr. Shivashankar
 
Architectural patterns part 1
Architectural patterns part 1Architectural patterns part 1
Architectural patterns part 1
assinha
 
Building Continuously Curated Ingestion Pipelines
Building Continuously Curated Ingestion PipelinesBuilding Continuously Curated Ingestion Pipelines
Building Continuously Curated Ingestion Pipelines
Arvind Prabhakar
 
network design 5.pptx
network design 5.pptxnetwork design 5.pptx
network design 5.pptx
aida alsamawi
 
Flow analysis overview
Flow analysis overviewFlow analysis overview
Flow analysis overview
csk selva
 
Identifying and developing flows modified
Identifying and developing flows modifiedIdentifying and developing flows modified
Identifying and developing flows modified
csk selva
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
Dr. Shivashankar
 
network design 6.pptx
network design 6.pptxnetwork design 6.pptx
network design 6.pptx
aida alsamawi
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
csk selva
 
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURESOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
AnyaForger34
 
Resource Sharing and Challenges - Distributed Computing
Resource Sharing and Challenges - Distributed ComputingResource Sharing and Challenges - Distributed Computing
Resource Sharing and Challenges - Distributed Computing
nirmalanr2
 
Software requirement engineering
Software requirement engineeringSoftware requirement engineering
Software requirement engineering
Syed Zaid Irshad
 
Data Streaming For Big Data
Data Streaming For Big DataData Streaming For Big Data
Data Streaming For Big Data
Seval Çapraz
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
csk selva
 
Introduction to Web Services - Architecture
Introduction to Web Services - ArchitectureIntroduction to Web Services - Architecture
Introduction to Web Services - Architecture
Matrix823409
 
02 Interface Design and Definition Document Template.pptx
02 Interface Design and Definition Document Template.pptx02 Interface Design and Definition Document Template.pptx
02 Interface Design and Definition Document Template.pptx
Orest Swystun
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architectures
csk selva
 
architectural design
 architectural design architectural design
architectural design
Preeti Mishra
 
Diksha sda presentation
Diksha sda presentationDiksha sda presentation
Diksha sda presentation
dikshagupta111
 
Architectural patterns part 1
Architectural patterns part 1Architectural patterns part 1
Architectural patterns part 1
assinha
 
Building Continuously Curated Ingestion Pipelines
Building Continuously Curated Ingestion PipelinesBuilding Continuously Curated Ingestion Pipelines
Building Continuously Curated Ingestion Pipelines
Arvind Prabhakar
 
Ad

More from Dr Geetha Mohan (9)

INTRODUCTION TO BIG DATA AND HADOOP
INTRODUCTION TO BIG DATA AND HADOOPINTRODUCTION TO BIG DATA AND HADOOP
INTRODUCTION TO BIG DATA AND HADOOP
Dr Geetha Mohan
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptx
Dr Geetha Mohan
 
CLOUD ENABLING TECHNOLOGIES.pptx
 CLOUD ENABLING TECHNOLOGIES.pptx CLOUD ENABLING TECHNOLOGIES.pptx
CLOUD ENABLING TECHNOLOGIES.pptx
Dr Geetha Mohan
 
IPR in Academic Research:Dr G Geetha
IPR in Academic Research:Dr G GeethaIPR in Academic Research:Dr G Geetha
IPR in Academic Research:Dr G Geetha
Dr Geetha Mohan
 
How to file a patent
How to file a patentHow to file a patent
How to file a patent
Dr Geetha Mohan
 
Design and analysis of algorithms
Design and analysis of algorithmsDesign and analysis of algorithms
Design and analysis of algorithms
Dr Geetha Mohan
 
Machine learning
Machine learningMachine learning
Machine learning
Dr Geetha Mohan
 
Resource management techniques
Resource management techniquesResource management techniques
Resource management techniques
Dr Geetha Mohan
 
Ge6075 professional ethics in engineering unit 1
Ge6075 professional ethics in engineering  unit 1Ge6075 professional ethics in engineering  unit 1
Ge6075 professional ethics in engineering unit 1
Dr Geetha Mohan
 
INTRODUCTION TO BIG DATA AND HADOOP
INTRODUCTION TO BIG DATA AND HADOOPINTRODUCTION TO BIG DATA AND HADOOP
INTRODUCTION TO BIG DATA AND HADOOP
Dr Geetha Mohan
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptx
Dr Geetha Mohan
 
CLOUD ENABLING TECHNOLOGIES.pptx
 CLOUD ENABLING TECHNOLOGIES.pptx CLOUD ENABLING TECHNOLOGIES.pptx
CLOUD ENABLING TECHNOLOGIES.pptx
Dr Geetha Mohan
 
IPR in Academic Research:Dr G Geetha
IPR in Academic Research:Dr G GeethaIPR in Academic Research:Dr G Geetha
IPR in Academic Research:Dr G Geetha
Dr Geetha Mohan
 
Design and analysis of algorithms
Design and analysis of algorithmsDesign and analysis of algorithms
Design and analysis of algorithms
Dr Geetha Mohan
 
Resource management techniques
Resource management techniquesResource management techniques
Resource management techniques
Dr Geetha Mohan
 
Ge6075 professional ethics in engineering unit 1
Ge6075 professional ethics in engineering  unit 1Ge6075 professional ethics in engineering  unit 1
Ge6075 professional ethics in engineering unit 1
Dr Geetha Mohan
 

Recently uploaded (20)

five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
The Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLabThe Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLab
Journal of Soft Computing in Civil Engineering
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 

Cp7101 design and management of computer networks-flow analysis

  • 1. CP7101-Design and Management of Computer Networks Dr.G.Geetha Professor /CSE Jerusalem College of Engineering
  • 2. Flow Analysis learn how to identify and characterize traffic flows
  • 3. Flows • Flows (also known as traffic flows or data flows) are sets of network traffic (application, protocol, and control information) that have common attributes, such as source/destination address, type of information, directionality, or other end-to-end information. Figure 4.1
  • 4. Flow Characteristics • Performance Requirements • Capacity (e.g., Bandwidth) • Delay (e.g., Latency) • Reliability (e.g., Availability) • Quality of Service Levels • Importance/ Priority Levels • Business/Enterprise/Provider • Political • Other • Directionality • Common Sets of Users, Applications, Devices • Scheduling (e.g., Time-of-Day) • Protocols Used • Addresses/Ports • Security/Privacy Requirements FIGURE 4.2, FIGURE 4.3
  • 5. Two types of flows • Individual An individual flow is the flow for a single session of an application • Composite A composite flow is a combination of requirements from multiple applications, or of individual flows, that share a common link, path, or network
  • 6. Individual flow • An individual flow is the basic unit of traffic flows • When an individual flow has guaranteed requirements, those requirements are usually left with the individual flow and are not consolidated with other requirements or flows into a composite flow • Individual flows are derived directly from the requirements specification, or are estimated from our best knowledge about the application, users, devices, and their locations. FIGURE 4.4 • Most flows in a network are composites Figure 4.5
  • 7. Presentation of Flows upstream- downstream • Upstream indicates the direction toward the source and downstream is the direction toward the destination. • Upstream is often toward the core of the network, while downstream is often toward the edge of the network, particularly in service provider networks FIGURE 4.6
  • 8. Critical Flows • Critical flows can be considered more important than others, in that they are higher in performance or have strict requirements (e.g., Mission-critical, rate-critical, real time, interactive, high-performance). • Critical flows may serve more important users, their applications, and devices
  • 9. Identifying and Developing Flows • Identified and developed from information in the requirements specification: • User, application, device, and network requirements • User and application behavior (usage patterns, models) • User, application, and device location information • Performance requirements.
  • 10. Identifying and Developing Flows • Flows are determined based on the requirements and locations of the applications and devices that generate (source) or terminate (sink) each traffic flow.
  • 11. Process for identifying and developing flows 1. Identifying one or more applications and/or devices that you believe will generate and/or terminate traffic flows 2. Use their requirements from the requirements specification and their locations from the requirements map 3. Based on how and where each application and device is used, you may be able to determine which devices generate flows and which devices terminate flows (flow sources and sinks) FIGURE 4.7
  • 12. Flows: Application Perspective 1. Focusing on a particular application, application group, device, or function(e.g., videoconferencing or storage) 2. Developing a “profile” of common or selected applications that can be applied across a user population 3. Choosing the top N (e.g., 3, 5, 10, etc.) applications to be applied across the entire network
  • 13. 1.Focusing on a Particular Application Example: Data Migration From requirements specification, for a single session of each application: • Application 1: Staging data from user devices Capacity 100Kb/s; Delay Unknown; Reliability 100% • Application 1: Migrating data between servers Capacity 500Kb/s; Delay Unknown; Reliability 100% • Application 2: Migration to remote (tertiary) storage Capacity 10Mb/s; Delay N/A; Reliability 100% FIGURE 4.8- 4.12
  • 14. 2.Developing a Profile • Profile or template can be developed for set of common applications apply to a group of users or to the entire set of users • Each flow that fits the profile is identified with that profile’s tag • Saving time and effort
  • 15. 3.Choosing the Top N Applications • a combination of the first two approaches Example: Top 5 Applications 1. Web Browsing 2. Email 3. File Transfer 4. Word Processing 5. Database Transactions FIGURE 4.14
  • 16. Data Sources and Sinks • A data source generates a traffic flow, and a data sink terminates a traffic flow • Help provide directionality to flows • Data sources are represented as a circle with a dot in the center, and a data sink is represented as a circle with a cross (i.e., star or asterisk) in the center. FIGURE 4.15 - 4.18
  • 17. Flow Models • Method to help describe flows in the network • Flow models are groups of flows that exhibit specific, consistent behavior characteristic • Flow model apply to a single application. • Directionality, hierarchy, and diversity are the primary characteristics of flow models • Directionality describes the preference to have more requirements in one direction than another.
  • 18. Flow models 1. Peer-to-peer 2. Client–server 3. Hierarchical client–server 4. Distributed computing
  • 19. Peer-to-Peer • Peer-to-peer, is one where the users and applications are fairly consistent in their flow behaviors throughout the network • They act at the same level in the hierarchy • This has two important implications: • cannot distinguish between flows in this model. Therefore, either all of the flows or none of the flows is critical • Since the flows are equivalent, they can be described by a single specification(e.g., Profile)
  • 21. Flow Prioritization • The purpose for prioritizing flows is to determine which flows get the most resources or which flows get resources first. • primary resource is funding. FIGURE 4.33-4.35
  • 22. The Flow Specification • results of identifying, defining, and describing flows are combined into a flow specification, or flowspec . • Flow specifications can take one of three types: 1. One-part, or unitary; 2. Two-part; 3. Multi-part.
  • 23. Flowspec • A one-part flowspec – Describes flows that have only best-effort requirements. • A two-part flowspec – Describes flows that have predictable requirements and may include flows that have best-effort requirements. • A multipart flowspec – Describes flows that have guaranteed requirements and may include flows that have predictable and/or best-effort requirements
  • 24. Flowspec Algorithm • Flowspecs are used to combine performance requirements of multiple applications for a composite flow or multiple flows in a section of a path • The flowspec algorithm is a mechanism to combine these performance requirements (e.g.,capacity, delay, and RMA) for flows in such a way as to describe the optimal composite erformance for that flow or group of flows.
  • 25. • The flowspec algorithm applies the following rules: 1.Best-effort flows consist only of capacity requirements, so only capacities are used in best-effort Calculations. 2.For flows with predictable requirements, we will use all available performance requirements (Capacity, delay, and RMA) in the calculations. Performance requirements will be combined for Each characteristic to maximize the overall performance of each flow 3.For flows with guaranteed requirements, we will list each requirement (as an individual flow), not Combining them with other requirements.