Identifying and developing flows modified

Preview:

Citation preview

Focusing on particular Application, Device, Network, Function.

Developing a profileChoosing the top ‘N’ applications

Identifying and developing flows

The process for identifying and developing flows

Flows can be identified and developed from the User, Application, Device, and network requirements.

Flow analysis process, have set of requirements and mappings of application and device locations.

Devices that generate flow (data source) or terminate flow (data sink) each traffic flow.

Flows identification consists of identifying one or more applications and/or devices.

Flow identification

Based on how & where each application and device is used.

It is able to determine which devices generate flows and which device terminate flows (data source and data sinks).

Identified each flow and determined its composition (parts of elements)

Flow identification

Some common approaches to identifying flows include:

Focusing on a particular application, application group, device, or function.

Developing a “profile” of common or selected applications that can be applied across a user population.

Choosing the top ‘N’ applications to be applied across the entire network.

Flows Identification

Shows flows between devicesShows flows between buildingsShows flows between central campus

Focusing on a particular application in

a Network

A map of device locations for a network

Use location information to develop a map.

Using Location information on the user & the application behavior Determine/Estimate where the flows will occur.

Location information can be between the networks or device groups or individual devices.

Focusing on a particular application

Flows estimated between devices for applocation.

Application : 1(primary(RAM,ROM))Flows from user devices to

temporary storage server.Application : 2(Secondary

Storage(pen drive, DVD,CD))Flows from audio/video device to

storage server.Application : 3(tertiary(tape libraries

and optical jukeboxesIt will work Without human operator.

Flows from 22 devices to tertiary storage server.

Flows estimated between devices for applocation.

Performance information added to centralcampus flows for application-1

central campus flows for application 1 expanded with building C

It introduces flow aggregation point.It allows us to show multiple flows

being consolidated at a location.It is useful in design process,

technologies and interconnection strategies for such locations in the networks.

central campus flows for application 1 expanded with building C

Consolidating flows using a flow aggregation point.

Figure shows that flows will look like between buildings

(A, B, and C) with a flow aggregation point and without a flow aggregation point.

Consolidating flows using a flow aggregation point.

Profile/template can be developed for applications.

Each flow fits to the profile. And Its identified with profile tag.Ex: profile one(P1)Using the profile, it saving time and

effort.Profiles are used to simplify

information.Profile helps to reduce duplication of

information on map.

Developing a profile

A performance profile(P1) applied to multiple flows with same performance.

P1 tag, associates with performance requirementsCapacity = 100kb/sReliability = 100%

6 flows tagged with profile P1Flow F4 has different performance requirementsCapacity = 500kb/sReliability = 100%

Flow 5 combines the performance requirements of 51 users and 2 servers.

Flow 6 performance requirement of 14 users digital view Flow 7 combine performance requirement 88 users and

2 compute servers.

A performance profile(P1) applied to multiple flows with same performance.

Choosing the top N applications is a combination of the first two approaches.Focusing on particular applicationDeveloping a profile

It is conclude by Degree of usageNo of users and no of devices/ servers or

performance requirements

Chossing the top 'N' applications

Web browsingE-mailFile TransferWord processing/spread sheet.DB transactionThe purpose, determine which application represent the most important requirements for the network.

Example of Top 5 applications

This approach reduces the set of possible applications.

Example :DB Transactions into ERP:Flow compositions.Location information.Usage of development of events.Uses different approaches for diff

part of network.

Example of Top 5 applications

Example of Top 5 applications

THANK YOU

Recommended