Vous êtes sur la page 1sur 16

Managing Networks and Telecommunications Module 5

Backbone Network Design

Copyright Regulations
COMMONWEALTH OF AUSTRALIA Copyright Regulations 1969
WARNING This material has been reproduced and communicated to you by or on behalf of University of South Australia pursuant to Part VB of the Copyright Act 1968 (the Act). The material in this communication may be subject to copyright under the Act. Any further reproduction or communication of this material by you may be the subject of copyright protection under the Act. Do not remove this notice.
The School of Computer & Information Science

Module 5 - Objectives
At the end of this module the student will be able to:
1. 2. 3. 4. 5. List the general requirements of a backbone Describe the concept of windowing. List typical backbone topologies. Discuss the concept of backbones within backbones. Describe the impact of various window sizes on throughput.

The School of Computer & Information Science

Trends since the year 2000


Customers building VPN networks across the Internet use tunnelling and encryption such as IPSec versus using VPNs such as it FR and ATM. The move from traditional FR and ATM networks to MPLS-based services. Network security has become a critical element of network design due to the dependence on the Internet for extranets and e-commerce applications. The move of legacy voice, to voice over packet (and VoIP).

The School of Computer & Information Science

Backbone Topologies

Star Loop Meshed and fully Meshed Daisy chained Backbones within backbones

The School of Computer & Information Science

Backbone Requirements
Traffic consolidation and convergence Reliability, redundancy and re-routing capabilities Economies of scale Sharing of equipment and facilities by multiple locations Dynamic bandwidth resource allocation Flexible topologies Distributed or centralised network management Bandwidth and CPE flexibility
The School of Computer & Information Science

Traffic Patterns (1)


Most or all traffic that enters a node leaves the same note and does not transmit to any other backbone node.

Backbone Node

0% Access Node Access Node 100%


The School of Computer & Information Science

Traffic Patterns (2)


Traffic originating on a backbone node is transmitted symmetrically to every other backbone node.

Backbone Node

Access Node Access Node

The School of Computer & Information Science

Traffic Patterns (3)


All traffic patterns are asymmetrical and a divided into user classes such as terminal to host and LAN to LAN (IP) communications

Backbone Node

Access Node Access Node

The School of Computer & Information Science

Traffic Patterns (4)


Users never send the data to nodes on the same backbone. (eg a public peering protocol).

Backbone Node

100% Access Node Access Node 0%


The School of Computer & Information Science

WAN Services Comparison


FR
Protocol Efficiency QoS Ubiquitous Access Price Components Security Price

ATM

IP Service
56Kb OC n Worst Most Countries

Private Lines
56Kb OC n Best Most Countries

56Kb 45Mb1.5Mb STM4 Good Poor

Many major Some Major cities Cities Port, local loop, VC Moderate Medium Port, local loop, VC Moderate Medium

Port, local loopLocal Loop, Distance Dependant Worst Best

Medium to low High

The School of Computer & Information Science

What is MPLS ?
MPLS stands for "Multiprotocol Label Switching". In an MPLS network, incoming packets are assigned a "label" by a "label edge router (LER)". Packets are forwarded along a "label switch path (LSP)" where each "label switch router (LSR)" makes forwarding decisions based solely on the contents of the label. At each hop, the LSR strips off the existing label and applies a new label which tells the next hop how to forward the packet.

Ref: http://www.mplsrc.com/faq1.shtml#MPLS%20History
The School of Computer & Information Science

Label Switch Paths


Label Switch Paths (LSPs) are established by network operators for a variety of purposes, such as to guarantee a certain level of performance, to route around network congestion, or to create IP tunnels for network-based virtual private networks. In many ways, LSPs are no different than circuit-switched paths in ATM or Frame Relay networks, except that they are not dependent on a particular Layer 2 technology.

http://www.mplsrc.com/faq1.shtml#MPLS%20History

The School of Computer & Information Science

MPLS Continued
An LSP can be established that crosses multiple Layer 2 transports such as ATM, Frame Relay or Ethernet. Thus, one of the true promises of MPLS is the ability to create end-to-end circuits, with specific performance characteristics, across any type of transport medium, eliminating the need for overlay networks or Layer 2 only control mechanisms. For further information on "MPLS refer to RFC 3031 - Multiprotocol Label Switching Architecture

http://www.mplsrc.com/faq1.shtml#MPLS%20History
The School of Computer & Information Science

Protocol Windowing
Windowing is utilised to reduce latency and increase efficiencies in connection-oriented services. Windowing provides the ability to send ahead a number of packets and then receive a singular reply. The sliding window concept can vary the number of sendahead packets based on previous replies. The goal of windowing is to transmit the greatest number of packets with the smallest number of replies.

The School of Computer & Information Science

Providing Future Capacity


Local loops from carriers take weeks and sometimes months to get installed. Increasing bandwidth on an existing services can take a number of days on average. Increasing PVC CIR bandwidth can be done on demand. Using standard protocols allows changing vendors more easily.

The School of Computer & Information Science

Vous aimerez peut-être aussi