Home Tekniikka Verkkoliikenne

Verkkoliikenne



IndependentVisitors

UV(IndependentVisitor): nimittäin UniqueVisitor,verkkosivustolla vieraileva tietokoneasiakas on vierailija. Sama asiakas kello 00.00-24.00 lasketaan vain kerran. Suunnittele kampusverkkoliikenteessä.

The"80/20"rule

Intraditionalnetworks,userswhousethesameapplicationaregenerallyplacedinthesameworkgroup,andtheserverstheyfrequentlyusearealsoplacedtogether.TheworkinggroupislocatedinthesamephysicalnetworksegmentorVLAN(virtuallocalareanetwork).Thepurposeofthisistolimitthedatatrafficgeneratedbetweentheclientandtheserveronthenetworkwithinthesamenetworksegment.Inthesamenetworksegment,youcanusearelativelyhigh-bandwidthswitchtoconnecttheclientandserver,insteadofusingarelativelylow-bandwidthrouter.Thisnetworkdesignmodethatcontrolsmostofthenetworktrafficlocallyiscalledthe"80/20rule",thatis,80%ofthenetworktrafficislocaltraffic(usingswitchestoexchangedata)andistransmittedinthesamenetworksegment;only20%Ofthenetworktrafficneedstopassthroughthenetworkbackbone(routerorLayer3switch).

The"80"and"20"inthe"80/20"rulecannotbesimplyunderstoodasnumbers,butshouldbeunderstoodasthewaynetworktrafficisdistributed,thatis,mostnetworktrafficisconfinedtothelocalworkinggroup.Partofthetrafficpassesthroughthenetworkbackbone.Therefore,inactualnetworkdesign,aslongasmostofthenetworktrafficislocalandasmallpartofthenetworktrafficpassesthroughthebackbone,itisconsideredtocomplywiththe"80/20"rule,regardlessoftheactualnumberratio.

Application

Inthecampusnetwork,thesoftware-onlymultimediaelectronicclassroomisasmallnetworkthatconformstothe"80/20"rule.Multimedianetworkclassroomsaremainlyusedinthesameclassroomorteachingbuilding.Multicastandbroadcastmethodsareoftenusedtosendmultimediadatafromtheteachercomputertothestudentcomputer,soalotofdatastreamsaregenerated.Ifnotprocessed,thedatastreamwillforma"broadcaststorm"andspreadtootherpartsofthenetwork.Therefore,thenetworksegmentwherethemultimedianetworkclassroomislocatedneedstobedividedintoanindependentsubnettosuppressthebroadcaststorm.

"20/80"-sääntö

Verkkosovellusten asteittaisen laajentamisen myötä"80/20"-sääntö ei voi enää pidempään täyttää verkon suunnittelun tarpeita. Ja mallia, jota kutsutaan "keskitetyksi tallennustilaksi, hajautetuksi tietojenkäsittelyksi"edistellään asteittain. s, sähköpostijärjestelmät ja yhä suositumpi VOD (videoondemand), multimediaresurssikirjasto, Educationdatacenter (EDC),digitaalinen kirjasto jne.;jakelulaskenta tarkoittaa, että tiedot ladataan jokaiselle työasemalle prosessointia varten, esimerkiksi käyttämällä verkon multimediaresurssien kirjastoa monenmedian kurssiohjelmien tekemiseksi, selaa digitaalista kirjastoa, jne. poikennut suuresti "80/20"-säännöstä, ja uusi sääntö on ilmestynyt, mikä on"20/80"-sääntö.

Inanetworkthatcomplieswiththe"20/80"rule,onlyabout20%ofthenetworktrafficisconfinedtothelocalworkinggroup,andabout80%ofthenetworktrafficistransmittedthroughthenetworkbackbone.Thischangeofnetworktrafficmodehasbroughtagreatloadtothebackboneswitchofthecampusnetwork.Therefore,inanidealstate,thebackboneswitchshouldbeabletoprovideperformancethatmatchesthatofthebackboneswitchesconnectedbelow,thatis,providewire-speedthree-layerswitching,thatistosay,howfastthebackboneswitchbelowcanrun,thebackboneswitchaboveshouldalsobeabletoHowfasttorun.Similarly,iftherearemanyVLANsdividedbyfunction(suchasteaching,scientificresearch,andadministrativemanagement)inthenetwork,theseVLANsarealsodifficulttomanage.Intheprevious"80/20"rule,serverswereoftendistributedinVLANs,soaccesswasfasterforeachworkgroup.However,inthe"20/80"rule,serversareoftenconcentratedinthecenterofthenetwork,soforeachworkinggroup,cross-VLANaccessmustbeimplemented.

Classificationconcept

Manynetworkapplicationshavetheirowncharacteristicsandhavedifferentrequirementsforthenetworkenvironment.Therefore,onlytimelyandaccurateidentificationandclassificationofnetworktrafficcanbeaccuratelyProvideasuitablenetworkenvironmentfordifferentapplications,effectivelyusenetworkresources,andprovideuserswithbetterservicequality.Theresearchonnetworktrafficclassificationisveryextensive,andtherearemanymethodsused,buttheyaremainlybasedonthefollowingthreelevels:(1)Packet-leveltrafficclassification:mainlyfocusesonthecharacteristicsofpacketsAnditsarrivalprocess,suchasthedistributionofdatapacketsize,thedistributionofdatapacketarrivaltimeinterval,etc.;

(2)Virtatason vuoluokittelu:Keskity pääasiassa virta- ja saapumisprosessin ominaisuuksiin, se voi olla TCP-yhteys tai UDP-virta. Niiden joukossa virtaus viittaa yleensä viiteen monikkoon, joka koostuu lähteen IP-osoitteesta, lähdeportista, kohteen IP-osoitteesta, kohdeportista ja sovellusprotokollasta;

(3)Stream-leveltrafficclassification:mainlyfocusesonhostpairsAndtheapplicationtrafficbetweenthem,usuallyreferstoatripletcomposedofsourceIPaddress,destinationIPaddress,andapplicationprotocol,whichissuitableforstudyingthelong-termtrafficstatisticscharacteristicsofthebackbonenetworkonamorecoarse-grainedbasis.

Intheabovethreelevelsoftrafficclassification,themostwidelyusedisFlow-leveltrafficclassification.Thismethodofanalyzingdatatransmittedinthenetworkbystreamisaninevitablerequirementforthedevelopmentofpacketswitchingnetworks.

EvaluationIndex

Akeymetricfortrafficclassificationistheaccuracyofacertainclassificationtechnologyorclassificationmodeltoclassifyunknowndataobjects.Theevaluationcriteriausuallyusedtomeasuretheaccuracyofclassificationmainlyincludethefollowingfouraspects:

True(truepositive,TP):indicatesthenumberofpositivesamplescorrectlypredictedbytheclassificationmodel,thatis,theybelongtocategoryAandareThenumberofsamplespredictedtobecategoryA.

Falsenegative(FN):indicatesthenumberofpositivesamplesthatareincorrectlypredictedbytheclassificationmodelasnegative,thatis,thenumberofsamplesthatbelongtocategoryAbutarepredictedtonotbelongtocategoryA.

Falsepositive(FP):indicatesthenumberofnegativesamplesthatareincorrectlypredictedbytheclassificationmodelaspositive,thatis,thenumberofsamplesthatdonotbelongtocategoryAbutarepredictedtobelongtocategoryA.

Truenegative(TN):indicatesthenumberofnegativesamplescorrectlypredictedbytheclassificationmodel,thatis,thenumberofsamplesthatdonotbelongtocategoryAandarepredictedtonotbelongtocategoryA.

Inaddition,classificationmethodsbasedonmachinelearningusuallyusetwoothermetricstoevaluatetheirclassificationresults,whicharedefinedasfollows:recall:recall=TP/(TP+FN),whichmeansTheproportionofsamplesincategoryAthatarecorrectlypredicted.

Precision(precision):precision=TP/(TP+FP),whichmeansthatamongallthesamplespredictedtobeclassA,theproportionofsamplesthatreallybelongtoclassA.Manytrafficclassificationstudiesuseflowaccuracyorbyteaccuracyasametricfortheirexperimentalresults.Flowaccuracyrepresentstheproportionofcorrectlyclassifiedflows,whilebyteaccuracypaysmoreattentiontothecorrectclassificationofflows.Thenumberofbytescarried.Amongthem,thedefinitionofaccuracyisasfollows:

Tarkkuus:tarkkuus=(TP+TN)/(TP+TN+FP+FN),joka tarkoittaa, että luokitusmallin oikein ennustamien näytteiden määrä muodostaa näytteen kokonaisprosentin.

Switch

Withoutathree-layerswitch,VLANscannotcommunicate.VLANsaresimilartothelogicalpartitionsofharddisksandcanbesimplyunderstoodasdividingthesameharddiskintodifferentharddiskdriveletters.Butunlikelogicaldisks,communicationbetweenVLANsisnotassimpleascopyingfilesfromonelogicaldisktoanotherlogicaldisk.Instead,routersmustrelyonthemtocommunicatebetweenVLANs.

Toiminto

1.Verkon runko on välttämätön kolmikerroksiselle kytkimelle

Tosaythattheroleofthethree-layerswitchinmanynetworkequipment,itisnotdescribedas"mainstay".Fortoomuch.Inthecampusnetworkandmetropolitanareaeducationnetwork,thebackbonenetwork,metropolitanareanetworkbackbone,andconvergencelayerallhavethree-layerswitches.Especiallythecorebackbonenetworkmustusethree-layerswitches,otherwisetheentirenetworkhasthousandsofunits.Allofthecomputersareinthesamesubnet.Notonlyaretherenosecurityatall,butalsothebroadcaststormcannotbeisolatedbecausethebroadcastdomaincannotbedivided.Ifatraditionalrouterisused,althoughthebroadcastcanbeisolated,theperformancecannotbeguaranteed.Theperformanceofthethree-layerswitchisveryhigh,withboththefunctionofthethree-layerroutingandthenetworkspeedofthetwo-layerswitching.Layer2switchingisbasedonMACaddressing,andLayer3switchingistoforwardserviceflowsbasedonLayer3addresses;inadditiontothenecessaryroutingdecisionprocess,mostofthedataforwardingprocessishandledbyLayer2switching,whichimprovestheefficiencyofpacketforwarding..Thethree-layerswitchrealizestheroutingfunctionofIPthroughtheuseofahardwareswitchingmechanism,anditsoptimizedroutingsoftwareimprovestheefficiencyoftheroutingprocessandsolvesthespeedproblemoftraditionalroutersoftwarerouting.Therefore,itcanbesaidthatthethree-layerswitchhas"thefunctionofarouterandtheperformanceofaswitch."

2.Layer3-vaihtoonvälttämätön aliverkkojen yhdistämiseen.

Iftherearemorethanacertainnumberofcomputersonthesamenetwork(usuallyaround200,dependingonthecommunicationprotocol),itislikelytobeBecauseofthelargenumberofbroadcastsonthenetwork,thenetworktransmissionefficiencyislow.Inordertoavoidbroadcastingstormscausedbybroadcastingonlargeswitches,itcanbefurtherdividedintomultiplevirtualnetworks(VLANs).Butdoingsowillcauseaproblem:thecommunicationbetweenVLANsmustbeimplementedthroughrouters.However,traditionalroutersarealsodifficulttohandlethecommunicationtasksbetweenVLANs,becausetheroutingcapabilitiesoftraditionalordinaryroutersaretooweakcomparedtothenetworktrafficofthelocalareanetwork.Andthepriceofgigabitroutersisalsoveryunacceptable.IfyouuseGigabitportsor100MportsonaLayer3switchtoconnecttodifferentsubnetsorVLANs,youcaneconomicallysolvetheproblemofrelyingonroutersforcommunicationbetweensubnetsaftersubnettingwhilemaintainingperformance.Therefore,thethree-layerswitchisanidealdeviceforconnectingsubnets.

Advantages

Inadditiontoexcellentperformance,thethree-layerswitchalsohassomefeaturesthatthetraditionaltwo-layerswitchdoesnothave.Thesefeaturescanbeusedfortheconstructionofcampusnetworksandmetropolitaneducationnetworks.Itbringsmanybenefits,listedasfollows:

1,suuri skaalautuvuus

Whenthethree-layerswitchisconnectedtomultiplesubnets,thesubnetonlyestablishesalogicalconnectionwiththethird-layerswitchmodule,Unliketraditionalexternalroutersthatneedtoincreaseports,therebyprotectingusers'investmentincampusnetworksandmetropolitaneducationnetworks.Andtomeettheneedsoftheschool'srapidgrowthinnetworkapplicationsin3to5years.

2.Suuri kustannustehokkuus

Thethree-layerswitchhastheabilitytoconnecttolarge-scalenetworks,andthefunctioncanbasicallyreplacesometraditionalrouters,butthepriceisclosetothetwo-layerswitch.Thepriceofa100MLayer3switchisonlytensofthousands,whichissimilartothepriceofahigh-endLayer2switch.

3.Sisäänrakennettu turvamekanismi

Thethree-layerswitchcanbethesameasanordinaryrouter,withthefunctionofaccesslist,whichcanrealizeone-wayortwo-waycommunicationbetweendifferentVLANs.Ifyousetitintheaccesslist,youcanrestrictusersfromaccessingspecificIPaddresses,sothattheschoolcanprohibitstudentsfromaccessingunhealthysites.Theaccesslistcanbeusednotonlytoprohibitinternalusersfromaccessingcertainsites,butalsotopreventillegalusersoutsidethecampusnetworkandmetropolitanareaeducationnetworkfromaccessingtheinternalnetworkresourcesofthecampusnetworkandmetropolitanareaeducationnetwork,therebyimprovingnetworksecurity.

4.Sopiva muotomultimedialähetys

Educationnetworkoftenneedstotransmitmultimediainformation,whichisafeatureofeducationnetwork.Thethree-layerswitchhasaQoS(QualityofService)controlfunction,whichcanallocatedifferentbandwidthstodifferentapplications.Forexample,whentransmittingvideostreamsoncampusnetworksandmetropolitaneducationnetworks,acertainamountofdedicatedbandwidthcanbereservedforvideotransmission,whichisequivalenttoopeningupdedicatedchannelsinthenetwork,andotherapplicationscannotoccupythesereservedbandwidths.Bandwidth,soitcanensurethestabilityofvideostreaming.TheordinaryLayer2switchdoesnothavethisfeature,sowhenthevideodataistransmitted,thevideojitterphenomenonwilloccursuddenlyandslowly.

Inaddition,video-on-demand(VOD)isalsoafrequentlyusedserviceineducationnetworks.However,becausesomeVODsystemsusebroadcasttotransmit,andbroadcastpacketscannotbeimplementedacrossnetworksegments,VODcannotbeimplementedacrossnetworksegments;ifVODisimplementedinunicastform,althoughitcanbeimplementedacrossnetworksegments,itsupportsAtthesametime,thenumberofconnectionsisverysmall,generallydozensofconnectionsoccupyallbandwidth.Thethree-layerswitchhasamulticastfunction,andVODdatapacketsaresenttoeachsubnetintheformofmulticast,whichnotonlyrealizescross-networksegmenttransmission,butalsoensurestheperformanceofVOD.5.BillingfunctionIncollegecampusnetworksandmetropolitaneducationnetworksinsomeareas,thereislikelytobebillingrequirements,becausethethree-layerswitchcanidentifytheIPaddressinformationinthedatapacket,soitcancountthedatatrafficofthecomputerinthenetwork,Youcanchargeaccordingtotheflow,youcanalsocountthetimethecomputerisconnectedtothenetwork,andchargeaccordingtothetime.ItisdifficultforordinaryLayer2switchestodobothatthesametime.

Whentheupsurgeofbuildingcampusnetworksandmetropolitanareaeducationnetworksissetoffacrossthecountry,Ibelievethatthethree-layerswitchwithitsexcellentperformanceandmoderatepricewillsurelymakeabigdifferenceinthisupsurge.

Controller

Reasons

NetworktrafficcontrollerbitSaver(alsoknownasapplicationtrafficmanager,bandwidthmanagerorQoSdevice)asearlyas2000Ithasappeared,andwasfirstdevelopedbyPackteerintheUnitedStates.However,sincetheproblemofnetworkbandwidthhasnotyetbeensignificant,enterpriseITdepartmentsarenotpayingenoughattentiontobandwidth.Withtheapplicationofvariousnewnetworktechnologiesandthedevelopmentofnetworkmultimediatechnology,theproblemofnetworkbandwidthshortageisbecomingmoreandmoreobvious.Especiallysince2005,P2Papplicationshavebroughtaseriousthreattobandwidthmanagement,sothebandwidthmanagermarkethasbeengreatlydeveloped.Accordingtoincompletestatistics,thismarkethasexceedednearly2.5billionUSdollars.China'sbandwidthmanagementmarkethasonlygraduallyreceivedattentionsince2004.In2007,China'sbandwidthmanagementmarketsharewasalso200millionyuan.ItisexpectedthatChina'sbandwidthmanagementmarketwillgrowatarateofmorethan20%.InadditiontoforeignPackteerandAllotcompanieswithbandwidthmanagementequipmentproviders,domesticmanufacturerssuchasBeijingYingzhixingda,ChanxunTechnology,etc.,bandwidthmanagementequipmentofforeignmanufacturershavenotyetrealizedthelocalizationoftheinterface,andtheyareallenteredintheformofauthorizedagents.China:Domesticmanufacturershavegonethroughthreetofouryearsofproductresearchanddevelopment,andtheirproductshavebecomeincreasinglystable.Themarket,technology,andproductcompetitionwillbeginin2008.

Basicfunctions

Thebasicfunctionofthebandwidthmanagerisverysimple,whichistoallocateandmonitorbandwidthaccordingtoapplicationsandusers.Becauseitisaseven-layernetworkmanagementdevice,networkmanagerscandirectlyallocatebandwidthtoapplicationsanduserswithouthavinghighnetworkknowledge,whichreducestheinvestmentofnetworkmanagerstoacertainextent.Althoughthefunctionisverysimple,therearemanyapplicationsthatcanbeimplemented,butmostusersdonothaveagoodunderstandingofbandwidthmanagementapplications.ForeignbandwidthmanagementequipmentisexpensiveanddoesnotsupportChinesedisplay.Therefore,theapplicationsofPackteerandAllotaremainlyconcentratedintelecommunicationsandfinance.AlthoughdomesticmanufacturerssuchasBeijingYingzhixingdahavemadegainsineducation,government,energyandmedicalindustries,theirproductseriesIthasonlybeenformedforoneyear,sovendorsdidnotinvesttoomuchinthepromotionofmarketapplications,resultinginusers'applicationofbandwidthmanagementinitsinfancy.

ApplicationScope

BandwidthapplicationsinthetelecommunicationsandfinancialfieldsaremainlymanifestedinSLA(ServiceLevelAgreement),throughbandwidthmanagementequipmenttoprovidedifferentlevelsofbandwidthservicestousersofdifferentlevels,Soastoguaranteethereturnoninvestmentofcorecustomers.

Ineducation,governmentandotherapplications,thebandwidthmanagermainlyfocusesonthemanagementofP2P,especiallythemanagementofBT.Atthesametime,bandwidthmanagementequipmenthasalsobeguntoappearasaQoSguaranteeequipmentforvideoconferencing.AstheclientsofP2Pandotherapplicationsarecontinuouslyupgraded,onlydomesticproductswithindependentresearchanddevelopmentcanrealizetherapidlaunchofmanagementstrategiesaccordingtothenewversion.Inthisapplication,internationalmanufacturershavenoadvantage.

Tietenkin, kuten kaistanleveyden hallinta, siinä on myös enemmän sovelluksia. Esimerkiksiseuraavat sovellukset:

First,thetransparencyofnetworkapplications,throughthebandwidthmanager,thestatusofpreviouslyunknownnetworkapplicationscanbeviewedindetail.

Second,preventsuddensurgeintrafficandattacksfromunknownapplications,suchasDoSattacks,toensurenetworksecurity.

3.Evaluatethevalueofcoreapplications,andunderstandtheutilizationandefficiencyofcoreapplicationsthroughmonitoringofcoreapplicationtraffic.

Neljä. Varmista avainsovellusten (kuten CRM, VPN, langaton verkko, videoneuvottelu, VoIP jne.) vaatima kaistanleveys varmistaaksesi, että avainsovelluksia ei estetä milloin tahansa

5.Accuratelyevaluatetheloadcapacityofthenetworkandtheimpactofnewapplicationsontheoverallnetworkapplicationstoensuretherationalityofthecustomer'sITinvestment.

Six.Realizetheprovisionofdifferentnetworkresourceallocationsaccordingtotheuser'sleveltoensurethenetworkvalueofthecoreusersofthecustomer.

Seven.Reducetherepetitiveoperationsofnetworkmanagersandprovidequantitativedataforapplications,sothatthemanagementcanmakedecisionsbasedontheapplicationstatus.

Theseapplicationsonlyappearinsomespecificcases,andmostusershavenoteffectivelyintegratedbandwidthmanagementwiththeirownnetworkmanagement.Theapplicationprospectsaregreat.

Flowcontrolinthenetwork

Methodstoincreasetheuser'savailableresources:choosethepathreasonably,makethepathlessoptimalwhentheloadislight,andmorediversionwhentheloadisheavy;Increasethenumberofhierarchicalconnectionsandshuntconnectionsunderheavyload;increasechannelloans;increaseinformationrate;appropriatelyincreasebuffers,etc.Waystoreduceusers'demandforresources:rejectcertainservicerequests;requireuserstoreducetheload;reasonablyallocateusers'useofresources,suchasusingreservations,polling,andpriority.Theessenceofreducingtheuser'sdemandforresourcesistoreducetheservicelevelandquality,ortoprovideservicesinareasonablemanner.

Inmanycomputernetworks,thewidelyusedflowcontrolmethodisbasedonreducinguserdemand.Thefollowingisacentralizedflowcontrolmethod:

1.Waitingfortransmissionmethod.Itisalsocalledsuppressedsendingmode.Whenthebufferofthereceivingnodehasbeenoccupiedalotandthenodeentersthedangerousstageofdeadlock,thesendingnodewillsendamessagetosuspendsending,andwhenthedangerousstageislifted,thesendingwillbenotifiedtosuspendsending.Thenode,resumedatatransmission.

2.Reservebuffermode.Beforestartingdatatransmission,thesourcehostmustfirstunderstandtheavailablebuffersofthedestinationhost,reservethebuffer,andthencontrolitsowndatatransmissionaccordingtothebufferallocatedbythedestinationhost.Whenthebufferisusedup,waitfortheotherpartytoallocatethebufferagainbeforecontinuingtosend.

3.Lisenssimenetelmä.

4.Tietoyksikön hylkäämismenetelmä.

This article is from the network, does not represent the position of this station. Please indicate the origin of reprint
TOP