www.networkbulls.com
Best Institute for CCNA CCNP CCSP CCIP CCIE Training in India
M-44, Old Dlf, Sector-14 Gurgaon, Haryana, India
Call: +91-9654672192
The methodology used when designing the Enterprise Edge is called prepare, plan, design, implement, operate, and optimize (PPDIOO). Some keys to PPDIOO are the processes of analyzing network requirements, characterizing the existing network, and designing the topology:
New network designs should be flexible and adaptable to future technologies and should not limit the customer's options going forward. Voice over IP (VoIP) is an example of a technology that network designs should be able to support if the customer decides to move to a converged network. The customer should not have to undergo major hardware and software upgrades to implement these types of technologies. Another important consideration is the design's cost-effectiveness throughout the design and implementation stages. For example, the support and management of the network should be an important factor.
Response Time
Response time measures the time between the client user request and the response from the server host. The end user will accept a certain level of delay in response time and still be satisfied. However, there is a limit to how long the user will wait. This amount of time can be measured and serves as a basis for future application response times. Users perceive the network communication in terms of how quickly the server returns the requested information and/or how fast the screen updates. Some applications, such as a request for an HTML web page, require short response times. On the other hand, a large FTP transfer may take a while, but this is generally acceptable.
Throughput
In network communications, throughput is the measure of data transferred from one host to another in a given amount of time. Bandwidth-intensive applications have more of an impact on a network's throughput than interactive traffic such as a Telnet session. Most high-throughput applications usually involve some type of file-transfer activity.
Reliability
Reliability is the measure of a given application's availability to its users. Some organizations require rock-solid application reliability; this has a higher price than most other applications. For example, financial and security exchange commissions require nearly 100 percent uptime for their applications. These types of networks are built with a high amount of physical and logical redundancy. It is important to ascertain the level of reliability needed for a network that is being designed. Reliability goes further than availability by measuring not only whether the service is there but whether it is performing as it should.
Bandwidth Considerations
Table 5-4 compares a number of different WAN technologies, along with the speeds and media types associated with them.
| Bandwidth | Less Than 2 Mbps | 2 Mbps to 45 Mbps | 45 Mbps to 100 Mbps | 100 Mbps to 10 Gbps |
|---|---|---|---|---|
| Copper | Serial, ISDN, Frame Relay, TDM, DSL | Frame Relay, Ethernet, DSL, cable, T3 | Fast Ethernet | Gigabit Ethernet |
| Fiber | — | Ethernet | FastEthernet, ATM | Gigabit Ethernet, 10Gigabit Ethernet, ATM, SONET/SDH, POS, dark fiber |
| Wireless | 802.11b | 802.11b, wireless WAN (varies) | 802.11a/g | 802.11n |
The WAN designer must engineer the network with enough bandwidth to support the needs of the users and applications that will use the network. How much bandwidth a network needs depends on the services and applications that will require network bandwidth. For example, more bandwidth is needed for VoIP traffic than interactive SSH traffic. A large number of graphics or CAD drawings require an extensive amount of bandwidth compared to simple text-based information being transferred on the network, such as HTML files.
When designing bandwidth for the WAN, remember that implementation and recurring costs are always important factors. QoS techniques become increasingly important when delay-sensitive traffic such as VoIP is using the limited bandwidth available on the WAN.
LAN bandwidth, on the other hand, is inexpensive and plentiful. To provide connectivity on the LAN, you typically need to be concerned only with hardware and implementation costs.
Window Size
The window size defines the upper limit of frames that can be transmitted without getting a return acknowledgment. Transport protocols such as TCP rely on acknowledgments to provide connection-oriented reliable transport of data segments. For example, if the TCP window size is set to 8192, the source stops sending data after 8192 bytes if no acknowledgment has been received from the destination host. In some cases the window size might need to be modified because of unacceptable delay for larger WAN links. If the window size is not adjusted to coincide with the delay factor, retransmissions can occur, which affects throughput significantly. It is recommended that you adjust the window size to achieve better connectivity conditions.
No comments:
Post a Comment