Enterprise Bandwidth Management - PowerPoint PPT Presentation

1 / 10
About This Presentation
Title:

Enterprise Bandwidth Management

Description:

ERP applications, Desktop Multimedia tools, X tools , Networked ... Prioritizing/Coloring and metering. Token bucket scheme. Shaping (contd....) r. b. data ... – PowerPoint PPT presentation

Number of Views:39
Avg rating:3.0/5.0
Slides: 11
Provided by: senth
Category:

less

Transcript and Presenter's Notes

Title: Enterprise Bandwidth Management


1
Enterprise Bandwidth Management
  • Bandwidth Management in the enterprise network.
  • -Senthil Rajasekharan

2
Why we need Bandwidth Management ?
  • Growing Bandwidth Hungry Applications in the
    enterprise !
  • ERP applications, Desktop Multimedia tools, X
    tools , Networked Storage devices.
  • Bursty nature of traffic causes Gateway clogs ,
    increasing packet delay and loss hence decreased
    throughput
  • SNMP does it really manage the network ?

3
Possible Approaches to Bandwidth Management
  • Essentially avoiding n/w congestion.
  • Increasing Network bandwidth and removing network
    bottlenecks
  • Queuing Schemes
  • Traffic Shaping leaky token buckets
  • TCP Rate Control
  • Admission Control

4
Class based Queuing
  • Traffic classes divided into a hierarchy of
    classes.
  • Classification based on any combination of IP
    address, protocols, application types.
  • Applies to both TCP and UDP traffic flows.

5
Traffic Shaping
  • Leaky bucket scheme.
  • Prioritizing/Coloring and metering.
  • Token bucket scheme.

6
Shaping (contd.)
data
  • Designed for cell traffic but can also be applied
    for datagrams.
  • Bursts are smoothed
  • r determines the output data rate
  • b sets the delay bound of the cell or packet

b
r
A Simple Leaky Bucket Scheme
7
Shaping (contd .)
  • Marking/Tagging
  • Packets or cells can be tagged /marked with a
    priority code.
  • All nodes should be able to understand the
    tag/mark !!

Token Bucket
r
b
8
TCP Rate Control
TCP Sender
TCP Receiver
  • Shaping TCP traffic by pruning receiver
    advertised window.
  • Changes in the TCP end-end semantics.

Data 20000 - 21000
ACK 21000 Win 4000
ACK 20000 Win 2000
Traffic Shaper
Data 21000-22000
ACK 21000 Win 2000
Data 22000-23000
9
Policy Networking
To Policy repository via LDAP
To authentication servers
  • Common Open Policy Server COPS
  • Policies State who has access to what, how and
    when ??

PDP
PEP sends policy elements with request
COPS
PDP returns decision (possibly inability to
enforce policy)
PEP
Connections secured through IPSec
10
Future Trends
  • VPNs and SLAs.
  • Traffic Engineering in the Core
  • More Fiber Backbones !!
Write a Comment
User Comments (0)
About PowerShow.com