📡Systems Approach to Computer Networks Unit 19 – Network Management & QoS

Network management is crucial for maintaining optimal performance and availability of computer networks. It involves monitoring, controlling, and maintaining networks using various tools and protocols. This unit covers the basics of network management, including protocols, standards, and quality of service fundamentals. Quality of Service (QoS) ensures critical applications receive priority during network congestion. The unit explores QoS mechanisms, network monitoring, performance metrics, and traffic shaping techniques. It also covers network security, troubleshooting, and emerging trends like Software-Defined Networking and AIOps.

Network Management Basics

  • Network management involves monitoring, controlling, and maintaining computer networks to ensure optimal performance and availability
  • Encompasses a wide range of tasks such as configuration management, fault management, performance management, and security management
  • Utilizes various tools and protocols to collect and analyze network data (SNMP, NetFlow)
  • Enables network administrators to proactively identify and resolve issues before they impact end-users
  • Facilitates capacity planning and resource allocation based on network usage patterns and trends
  • Helps organizations meet service level agreements (SLAs) by ensuring network reliability and performance
  • Reduces downtime and improves overall network efficiency through automated monitoring and alerting

Network Protocols and Standards

  • Network protocols define the rules and conventions for communication between devices on a network
  • Standardized protocols ensure interoperability between different vendors' equipment and software
  • OSI model provides a framework for understanding how network protocols operate at different layers
    • Physical layer protocols (Ethernet, Wi-Fi) define how data is transmitted over physical media
    • Data link layer protocols (MAC, LLC) handle error detection and correction, and frame synchronization
    • Network layer protocols (IP, ICMP) handle logical addressing and routing of packets between networks
  • TCP/IP is the most widely used protocol suite for internet communication
    • Transmission Control Protocol (TCP) provides reliable, connection-oriented data delivery
    • User Datagram Protocol (UDP) offers a lightweight, connectionless alternative for real-time applications
  • Application layer protocols (HTTP, FTP, SMTP) define how specific applications communicate over the network
  • Network management protocols (SNMP, RMON) enable monitoring and control of network devices

Quality of Service (QoS) Fundamentals

  • QoS refers to the ability of a network to provide differentiated treatment to different types of traffic
  • Ensures that critical applications receive priority over less important traffic during periods of congestion
  • Helps to minimize latency, jitter, and packet loss for sensitive applications (VoIP, video conferencing)
  • QoS mechanisms include:
    • Classification: Identifying and categorizing traffic based on predefined criteria (port numbers, IP addresses)
    • Marking: Assigning priority levels to packets using fields in the IP header (ToS, DSCP)
    • Queuing: Placing packets into different queues based on their priority level (priority queuing, weighted fair queuing)
    • Policing and shaping: Limiting the rate at which traffic enters or leaves the network to prevent congestion
  • QoS policies can be implemented at various points in the network (edge routers, core switches)
  • Requires careful planning and configuration to ensure optimal performance without starving lower-priority traffic

Network Monitoring and Performance Metrics

  • Network monitoring involves collecting and analyzing data to assess the health and performance of the network
  • Key performance metrics include:
    • Bandwidth utilization: Measuring the amount of data transmitted over the network per unit of time
    • Latency: The time taken for a packet to travel from source to destination
    • Jitter: The variation in latency between packets
    • Packet loss: The percentage of packets that fail to reach their destination
    • Throughput: The actual amount of data transferred over the network per unit of time
  • Network monitoring tools (Nagios, Zabbix) collect data from various sources (SNMP, NetFlow) and provide visualizations and alerts
  • Baseline measurements help establish normal performance levels and detect anomalies
  • Capacity planning involves analyzing trends in network usage to predict future requirements and avoid bottlenecks

Traffic Shaping and Congestion Control

  • Traffic shaping involves controlling the rate at which traffic is sent over the network to prevent congestion
  • Leaky bucket algorithm: Packets are placed into a buffer (bucket) and released at a constant rate, smoothing out bursts of traffic
  • Token bucket algorithm: Tokens are generated at a constant rate and stored in a bucket, allowing for bursts of traffic up to the size of the bucket
  • Congestion control mechanisms help prevent network overload by adjusting the transmission rate of senders
  • TCP congestion control algorithms (slow start, congestion avoidance) dynamically adjust the sender's window size based on network conditions
  • Random Early Detection (RED) drops packets probabilistically before the queue becomes full, signaling senders to reduce their transmission rate
  • Weighted Random Early Detection (WRED) extends RED by applying different drop probabilities to different classes of traffic

Network Security and Access Control

  • Network security involves protecting the confidentiality, integrity, and availability of network resources and data
  • Access control mechanisms ensure that only authorized users and devices can access network resources
    • Authentication: Verifying the identity of users or devices (usernames, passwords, certificates)
    • Authorization: Granting or denying access to resources based on the user's privileges
    • Accounting: Tracking and logging user activities for auditing and compliance purposes
  • Firewalls filter traffic based on predefined rules, blocking unauthorized access and potential threats
    • Stateful firewalls track the state of network connections and allow only expected traffic
    • Next-generation firewalls (NGFW) incorporate additional features (intrusion prevention, application awareness)
  • Virtual Private Networks (VPNs) provide secure, encrypted connections over untrusted networks (internet)
  • Network segmentation isolates different parts of the network to limit the impact of security breaches

Troubleshooting and Optimization

  • Troubleshooting involves identifying and resolving issues that affect network performance or availability
  • Systematic approach: Gather information, isolate the problem, test hypotheses, implement and verify the solution
  • Common troubleshooting tools:
    • Ping: Tests connectivity between devices by sending ICMP echo requests
    • Traceroute: Identifies the path taken by packets from source to destination, helping to locate routing issues
    • Packet analyzers (Wireshark): Capture and analyze network traffic to identify protocol or application issues
  • Performance optimization techniques:
    • Load balancing: Distributing traffic across multiple servers or links to improve performance and reliability
    • Caching: Storing frequently accessed content closer to the user to reduce latency and bandwidth usage
    • Compression: Reducing the size of transmitted data to minimize bandwidth usage and improve response times
  • Continuous monitoring and analysis of network performance metrics help identify opportunities for optimization
  • Software-Defined Networking (SDN): Separates the control plane from the data plane, enabling centralized, programmable network management
    • OpenFlow protocol allows SDN controllers to manage network devices from different vendors
    • Enables dynamic, application-aware network configuration and optimization
  • Network Functions Virtualization (NFV): Decouples network functions (firewalls, load balancers) from proprietary hardware, running them as virtual instances on commodity servers
    • Reduces costs and increases flexibility by allowing network functions to be instantiated and scaled on-demand
  • Intent-Based Networking (IBN): Allows administrators to define high-level business policies, which are then translated into low-level network configurations
    • Uses machine learning and automation to continuously monitor and adapt the network to ensure compliance with the desired state
  • AIOps (Artificial Intelligence for IT Operations): Applies machine learning and big data analytics to automate network management tasks
    • Anomaly detection: Identifying unusual patterns in network behavior that may indicate issues or threats
    • Root cause analysis: Correlating events from multiple sources to quickly identify the underlying cause of problems
    • Predictive maintenance: Analyzing historical data to predict and prevent potential failures before they occur


© 2024 Fiveable Inc. All rights reserved.
AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.

© 2024 Fiveable Inc. All rights reserved.
AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.