SlideShare a Scribd company logo
UNIT – 4
 It is a conceptual model that defines the structure,
behavior, and more views of a system.
 Also known as ‘Enterprise Architecture’
 It is a superset of network architecture.
 It consists of following functions:
 Clients
 Applications
 Storage
 Network
 Servers
 Databases.
relationships
clients
application
s
storage
network
Servers
Database
s
 Network architecture is an identifier used to locate a
device(host) on the network.
 IP address  dotted decimal notation.
 Example :
 192.168.155.0
 192.168.155.0
addresses
Local
Global
Private
Public
Tempor
ary
Perman
ent/
persiste
nt
Address Type Meaning
Local Address Identify locally – LAN/ SUBNET/ETHERNET
Global Address Identify Globally/World Wide – WAN network
Private Address Used in NAT – Network Address Translation(individual)
Public Address Used in Public Internet(static/dynamic)
Temporary Address Assigned for short term duration of time.
Persistent Address Assigned for long term duration of time.
 Routing is the process of selecting best paths in a
network.
 the process of moving a packet of data from source
to destination
 Example :
 Routing Protocols:
 RIP – Routing Information Protocol
 RIP v2 - Routing Information Protocol Version 2.0
 OSPF – Open Shortest Path – First
 BGP – Border Gateway Protocol.
Systems and network architectures
 Sub-netting & Super-netting,
 Variable-length Sub-netting,
 Dynamic Addressing,
 Private Addressing,
 Virtual Lans (Vlans),
 Ipv6, And
 Network Address Translation (Nat).
 Switching And Routing,
 Classless Inter-Domain Routing (CIDR):
 Multicasts,
 Mobile IP,
 Route Filtering/Peering/Routing/policies
 Confederations( IGP, EGP)
 CLASSFULL ADDRESSING :
 Class A,B,C,D,E.
Systems and network architectures
 To Scale the network Addressing we will use the
number of
 Functional areas within the network.
 Workgroups within each function area
 Subnets within each workgroup
 Total numbers of subnets(current & future) Organization
 Total Number of Devices(current & future)
 Routing strategies Such as
 Process of times
 Protocol overheads: (Static And Dynamic protocol)
 In terms of capacity(bandwidth)
 CPU – Utilization
 Memory - Utilization
 Stability.
 Some Recommendations for choosing and applying
routing protocols for the network.
These recommendations are:
Minimize the number of routing protocols used in
the network.
Start with the routing mechanism/ protocol.
Routing choices of routing protocols increase.
Revaluated the previous decisions.
 NETWORK MANAGEMENT MECHANISMS:
 There are two major network management
protocols:
 The Simple Network Management Protocol(SNMP).
 The Common Management Information
Protocol(CMIP).
 These two protocols provide the mechanism for
 RETRIEVING , CHANGING(MODIFY) AND
TRANSPORT the network management data across the
network.
Monitoring is obtaining values for
• End to End.
• Per Link
• Per Element.
Monitoring process involves
• Collecting data.
• Processing data.
• Storing data.
 Instrumentation is the set of tools and utilities needed
to monitor and management the data.
 Instrumentation mechanisms are:
 Access to network management data VIA SNMP(MIB).
 Monitoring tools(Ping, Traceroute, TCPdump)(remote)
 Direct Access(TelNet,FTP)
 Instrumentation can be coupled with MONITORING,
DISPLAY, PROCESSING AND STORAGE to form a
complete management system.
• Configuration is setting parameters in a network device.
• Used to Operation and control the element.
• Configuration mechanisms:
• Includes
• DIRECT ACCESS to devices,
• REMOTE ACCESS to devices,
• DOWNLOADING configuration files.
• Downloading Configuration Files:
• Use of FTP to download configuration files.
• SNMP set commands.
• Telnet and command line interface (CLI) Access.
• Access via HTTP.
• Access Via CORBA(Common Object Request Architecture)
 Telnet is a network protocol
 used on the Internet or Local Area Networks.
 To provide a bidirectional interactive text-oriented
communication facility using a virtual terminal connection.
 PERFORMANCE ARCHITECTURE:
 To provide
 single – Tier performance.
 Multi – Tier performance in a network.
These mechanisms provide the means
• to identify traffic flows, groups of flows.
• Measure temporal characteristics.
 It is the overall performance of a computer network,
particularly the performance seen by the users of the
network.
 QoS, is determining, setting, and acting upon priority l
Quality Of Service:
 (SLAs) are informal or formal contracts
between a Service - provider and Service –
Requester.
 Policies are sets (formal or informal) of high-
level statements about how network
Resources / Services /Access Permissions are
to be allocated among users.
 The heart of providing performance in a network.
 These mechanisms are usually implemented in network
devices such as ROUTERS AND SWITCHES
 It is process of determining which user , application,
device, flow or connection gets service.
 Or Gets a higher level of service.
 It begins during the requirements and flow analysis
process.
 It consists of two mechanisms:
 admission control:
 Ability to refuse/restrict access to network resources.
 traffic conditioning:
 It is a set of mechanisms that modify(increase/decrease)
performance to traffic flows.
VOIP : voice over IP
SIP : Session Initiation protocol.
 Scheduling is the mechanism
 Determines the order in which traffic is processed for
transmission.
 It is applied at network devices throughout a network.
 Network Devices such as : Switches/ Routers.
 Algorithms:
 Weighted Fair Queuing(WFQ)
 Class Based Queuing(CBQ)
 Sorting IP packets within a network device while they
waif for processing.
 The queuing mechanisms are:
 First In First Out(FIFO)- packets stored in a single queue.
 Weighted Fair Queuing(WFQ)-Assigns priorities to
queues.
 Class Based Queuing(CBQ) - multiple queues with
differing priorities are maintained.
 Random early detect(RED)- Drop packets early.
 Weighted RED(WRED)- supports multiple levels for
dropping packets.
THANK YOU
Ad

More Related Content

What's hot (20)

Presentation5
Presentation5Presentation5
Presentation5
Mohd Yusak
 
Chapter10
Chapter10Chapter10
Chapter10
Muhammad Ahad
 
What is network architecture
What is network architecture What is network architecture
What is network architecture
Sorcia D'Arceuil
 
01 overview[1]r
01 overview[1]r01 overview[1]r
01 overview[1]r
Orbay Yeşil
 
Wireless ethernet
Wireless ethernetWireless ethernet
Wireless ethernet
JaviTorres13
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
University of Hertfordshire, School of Electronic Communications and Electrical Engineering
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
Sweta Kumari Barnwal
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
icanhasfay
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)
sarmad ali
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
Parvesh Taneja
 
Introduction to computer Networks
Introduction to computer NetworksIntroduction to computer Networks
Introduction to computer Networks
ShohanaakterKakon
 
2. network elements
2. network elements2. network elements
2. network elements
Shyam Nagarajan
 
Network architecture
Network architectureNetwork architecture
Network architecture
Online
 
Introduction to computer networks
 Introduction to computer networks Introduction to computer networks
Introduction to computer networks
Aequitas Information Technology Pvt. Ltd.
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
lavanya marichamy
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Atika Zaimi
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
amudha arul
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
Dinuak Jayawardena
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise Networks
VisualBee.com
 
Wide Area Network
Wide Area NetworkWide Area Network
Wide Area Network
zaisahil
 
What is network architecture
What is network architecture What is network architecture
What is network architecture
Sorcia D'Arceuil
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
Sweta Kumari Barnwal
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
icanhasfay
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)
sarmad ali
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
Parvesh Taneja
 
Introduction to computer Networks
Introduction to computer NetworksIntroduction to computer Networks
Introduction to computer Networks
ShohanaakterKakon
 
Network architecture
Network architectureNetwork architecture
Network architecture
Online
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
lavanya marichamy
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Atika Zaimi
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
amudha arul
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise Networks
VisualBee.com
 
Wide Area Network
Wide Area NetworkWide Area Network
Wide Area Network
zaisahil
 

Viewers also liked (16)

Developing capacity requirements
Developing capacity requirementsDeveloping capacity requirements
Developing capacity requirements
csk selva
 
Developing requirements specification
Developing requirements specificationDeveloping requirements specification
Developing requirements specification
csk selva
 
Flow analysis overview
Flow analysis overviewFlow analysis overview
Flow analysis overview
csk selva
 
Audience responses
Audience responsesAudience responses
Audience responses
Tom-Brett
 
Identifying and developing flows modified
Identifying and developing flows modifiedIdentifying and developing flows modified
Identifying and developing flows modified
csk selva
 
Requirements mapping
Requirements mappingRequirements mapping
Requirements mapping
csk selva
 
Development pro forma
Development pro formaDevelopment pro forma
Development pro forma
Tom-Brett
 
Developing delay requirements
Developing delay requirementsDeveloping delay requirements
Developing delay requirements
csk selva
 
Flow models
Flow modelsFlow models
Flow models
csk selva
 
CHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURCHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOUR
csk selva
 
overview of analysis, architecture and design process
overview of analysis, architecture and design processoverview of analysis, architecture and design process
overview of analysis, architecture and design process
csk selva
 
service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...
csk selva
 
Other requirements, requirement specification and map
Other requirements, requirement specification and mapOther requirements, requirement specification and map
Other requirements, requirement specification and map
csk selva
 
Flow spec algorithm
Flow spec algorithmFlow spec algorithm
Flow spec algorithm
csk selva
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
csk selva
 
Developing capacity requirements
Developing capacity requirementsDeveloping capacity requirements
Developing capacity requirements
csk selva
 
Developing requirements specification
Developing requirements specificationDeveloping requirements specification
Developing requirements specification
csk selva
 
Flow analysis overview
Flow analysis overviewFlow analysis overview
Flow analysis overview
csk selva
 
Audience responses
Audience responsesAudience responses
Audience responses
Tom-Brett
 
Identifying and developing flows modified
Identifying and developing flows modifiedIdentifying and developing flows modified
Identifying and developing flows modified
csk selva
 
Requirements mapping
Requirements mappingRequirements mapping
Requirements mapping
csk selva
 
Development pro forma
Development pro formaDevelopment pro forma
Development pro forma
Tom-Brett
 
Developing delay requirements
Developing delay requirementsDeveloping delay requirements
Developing delay requirements
csk selva
 
CHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURCHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOUR
csk selva
 
overview of analysis, architecture and design process
overview of analysis, architecture and design processoverview of analysis, architecture and design process
overview of analysis, architecture and design process
csk selva
 
service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...
csk selva
 
Other requirements, requirement specification and map
Other requirements, requirement specification and mapOther requirements, requirement specification and map
Other requirements, requirement specification and map
csk selva
 
Flow spec algorithm
Flow spec algorithmFlow spec algorithm
Flow spec algorithm
csk selva
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
csk selva
 
Ad

Similar to Systems and network architectures (20)

CN PPT
CN PPTCN PPT
CN PPT
ATHARVANIKHARE
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
csk selva
 
Chapter 7 - Resource Monitoring & Management.ppt
Chapter 7 - Resource Monitoring & Management.pptChapter 7 - Resource Monitoring & Management.ppt
Chapter 7 - Resource Monitoring & Management.ppt
gadisaAdamu
 
Unit 4 for PG PAWSN
Unit 4 for PG PAWSNUnit 4 for PG PAWSN
Unit 4 for PG PAWSN
Dhaya kanthavel
 
client server protocol
client server protocolclient server protocol
client server protocol
bmuhire
 
Network management
Network managementNetwork management
Network management
Nitesh Saitwal
 
SDN Introduction
SDN IntroductionSDN Introduction
SDN Introduction
Yoppy Yunhasnawa
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpi
Mohammed Abdallah
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
tahaazad2
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
TadeseBeyene
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
Dhaya kanthavel
 
nv.ppt
nv.pptnv.ppt
nv.ppt
tahaniali27
 
Well_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdfWell_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdf
Hari Prasetyo Utomo
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
NguyenLong773850
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
Prof Ansari
 
Chapter04
Chapter04Chapter04
Chapter04
Muhammad Ahad
 
Cloud data management
Cloud data managementCloud data management
Cloud data management
ambitlick
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
Dr Geetha Mohan
 
IoT sysstem management.pptx for btech students
IoT sysstem management.pptx for btech studentsIoT sysstem management.pptx for btech students
IoT sysstem management.pptx for btech students
saritanayak23
 
Ccna exploration network fundamentals
Ccna exploration  network fundamentalsCcna exploration  network fundamentals
Ccna exploration network fundamentals
IT Tech
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
csk selva
 
Chapter 7 - Resource Monitoring & Management.ppt
Chapter 7 - Resource Monitoring & Management.pptChapter 7 - Resource Monitoring & Management.ppt
Chapter 7 - Resource Monitoring & Management.ppt
gadisaAdamu
 
client server protocol
client server protocolclient server protocol
client server protocol
bmuhire
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpi
Mohammed Abdallah
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
tahaazad2
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
TadeseBeyene
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
Dhaya kanthavel
 
Well_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdfWell_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdf
Hari Prasetyo Utomo
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
Prof Ansari
 
Cloud data management
Cloud data managementCloud data management
Cloud data management
ambitlick
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
Dr Geetha Mohan
 
IoT sysstem management.pptx for btech students
IoT sysstem management.pptx for btech studentsIoT sysstem management.pptx for btech students
IoT sysstem management.pptx for btech students
saritanayak23
 
Ccna exploration network fundamentals
Ccna exploration  network fundamentalsCcna exploration  network fundamentals
Ccna exploration network fundamentals
IT Tech
 
Ad

More from csk selva (7)

Network design
Network designNetwork design
Network design
csk selva
 
Thresholds and limits
Thresholds and limitsThresholds and limits
Thresholds and limits
csk selva
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysis
csk selva
 
Developing supplemental performance requirements
Developing supplemental performance requirementsDeveloping supplemental performance requirements
Developing supplemental performance requirements
csk selva
 
Developing service metrics
Developing service metricsDeveloping service metrics
Developing service metrics
csk selva
 
Developing rma requirements
Developing rma requirementsDeveloping rma requirements
Developing rma requirements
csk selva
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirements
csk selva
 
Network design
Network designNetwork design
Network design
csk selva
 
Thresholds and limits
Thresholds and limitsThresholds and limits
Thresholds and limits
csk selva
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysis
csk selva
 
Developing supplemental performance requirements
Developing supplemental performance requirementsDeveloping supplemental performance requirements
Developing supplemental performance requirements
csk selva
 
Developing service metrics
Developing service metricsDeveloping service metrics
Developing service metrics
csk selva
 
Developing rma requirements
Developing rma requirementsDeveloping rma requirements
Developing rma requirements
csk selva
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirements
csk selva
 

Recently uploaded (20)

Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 

Systems and network architectures

  • 2.  It is a conceptual model that defines the structure, behavior, and more views of a system.  Also known as ‘Enterprise Architecture’  It is a superset of network architecture.  It consists of following functions:  Clients  Applications  Storage  Network  Servers  Databases.
  • 4.  Network architecture is an identifier used to locate a device(host) on the network.  IP address  dotted decimal notation.  Example :  192.168.155.0  192.168.155.0
  • 6. Address Type Meaning Local Address Identify locally – LAN/ SUBNET/ETHERNET Global Address Identify Globally/World Wide – WAN network Private Address Used in NAT – Network Address Translation(individual) Public Address Used in Public Internet(static/dynamic) Temporary Address Assigned for short term duration of time. Persistent Address Assigned for long term duration of time.
  • 7.  Routing is the process of selecting best paths in a network.  the process of moving a packet of data from source to destination  Example :  Routing Protocols:  RIP – Routing Information Protocol  RIP v2 - Routing Information Protocol Version 2.0  OSPF – Open Shortest Path – First  BGP – Border Gateway Protocol.
  • 9.  Sub-netting & Super-netting,  Variable-length Sub-netting,  Dynamic Addressing,  Private Addressing,  Virtual Lans (Vlans),  Ipv6, And  Network Address Translation (Nat).
  • 10.  Switching And Routing,  Classless Inter-Domain Routing (CIDR):  Multicasts,  Mobile IP,  Route Filtering/Peering/Routing/policies  Confederations( IGP, EGP)
  • 11.  CLASSFULL ADDRESSING :  Class A,B,C,D,E.
  • 13.  To Scale the network Addressing we will use the number of  Functional areas within the network.  Workgroups within each function area  Subnets within each workgroup  Total numbers of subnets(current & future) Organization  Total Number of Devices(current & future)
  • 14.  Routing strategies Such as  Process of times  Protocol overheads: (Static And Dynamic protocol)  In terms of capacity(bandwidth)  CPU – Utilization  Memory - Utilization  Stability.
  • 15.  Some Recommendations for choosing and applying routing protocols for the network. These recommendations are: Minimize the number of routing protocols used in the network. Start with the routing mechanism/ protocol. Routing choices of routing protocols increase. Revaluated the previous decisions.
  • 16.  NETWORK MANAGEMENT MECHANISMS:  There are two major network management protocols:  The Simple Network Management Protocol(SNMP).  The Common Management Information Protocol(CMIP).  These two protocols provide the mechanism for  RETRIEVING , CHANGING(MODIFY) AND TRANSPORT the network management data across the network.
  • 17. Monitoring is obtaining values for • End to End. • Per Link • Per Element. Monitoring process involves • Collecting data. • Processing data. • Storing data.
  • 18.  Instrumentation is the set of tools and utilities needed to monitor and management the data.  Instrumentation mechanisms are:  Access to network management data VIA SNMP(MIB).  Monitoring tools(Ping, Traceroute, TCPdump)(remote)  Direct Access(TelNet,FTP)  Instrumentation can be coupled with MONITORING, DISPLAY, PROCESSING AND STORAGE to form a complete management system.
  • 19. • Configuration is setting parameters in a network device. • Used to Operation and control the element. • Configuration mechanisms: • Includes • DIRECT ACCESS to devices, • REMOTE ACCESS to devices, • DOWNLOADING configuration files.
  • 20. • Downloading Configuration Files: • Use of FTP to download configuration files. • SNMP set commands. • Telnet and command line interface (CLI) Access. • Access via HTTP. • Access Via CORBA(Common Object Request Architecture)  Telnet is a network protocol  used on the Internet or Local Area Networks.  To provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.
  • 21.  PERFORMANCE ARCHITECTURE:  To provide  single – Tier performance.  Multi – Tier performance in a network. These mechanisms provide the means • to identify traffic flows, groups of flows. • Measure temporal characteristics.
  • 22.  It is the overall performance of a computer network, particularly the performance seen by the users of the network.  QoS, is determining, setting, and acting upon priority l Quality Of Service:
  • 23.  (SLAs) are informal or formal contracts between a Service - provider and Service – Requester.  Policies are sets (formal or informal) of high- level statements about how network Resources / Services /Access Permissions are to be allocated among users.
  • 24.  The heart of providing performance in a network.  These mechanisms are usually implemented in network devices such as ROUTERS AND SWITCHES
  • 25.  It is process of determining which user , application, device, flow or connection gets service.  Or Gets a higher level of service.  It begins during the requirements and flow analysis process.
  • 26.  It consists of two mechanisms:  admission control:  Ability to refuse/restrict access to network resources.  traffic conditioning:  It is a set of mechanisms that modify(increase/decrease) performance to traffic flows. VOIP : voice over IP SIP : Session Initiation protocol.
  • 27.  Scheduling is the mechanism  Determines the order in which traffic is processed for transmission.  It is applied at network devices throughout a network.  Network Devices such as : Switches/ Routers.  Algorithms:  Weighted Fair Queuing(WFQ)  Class Based Queuing(CBQ)
  • 28.  Sorting IP packets within a network device while they waif for processing.  The queuing mechanisms are:  First In First Out(FIFO)- packets stored in a single queue.  Weighted Fair Queuing(WFQ)-Assigns priorities to queues.  Class Based Queuing(CBQ) - multiple queues with differing priorities are maintained.  Random early detect(RED)- Drop packets early.  Weighted RED(WRED)- supports multiple levels for dropping packets.