A Framework for High-Speed Networking

A Framework for High-Speed Networking

Abid Al Ajeeli (University of Bahrain, Bahrain)
DOI: 10.4018/978-1-60566-148-3.ch004
OnDemand PDF Download:


This chapter describes a detailed framework configuration infrastructure design for a high performance network. The configuration is described based on the new setup and migration requirements and it indicates how the design satisfies those requirements. The chapter explains the detailed configuration of the design process of the distribution layer switches and shows how these switches can be configured in the final implementation. The chapter also discusses the modifications that occurred during the implementation/ migration phase.The design of the framework incorporates resiliency into the network core in order to manage problems effectively. This will enable user access points to remain connected to the network even in the event of a failure. This incorporation aims to provide services and benefits to users without impediments.
Chapter Preview


A computer network is simply a system of interconnected computers. This chapter emphasizes on the design and implementation of one type of computer networks, which is the local area network (LAN). It is a group of computers and associated devices that share a common communication line or wireless link and typically share the resources of a single processor or server within a limited geographic area. Usually, the server has applications and data storage that are shared by multiple computer users to optimize network traffic.

Network traffic has increased dramatically during the last few years due to the confluence of several factors (Regnier et.al, 2004). These factors are:

  • Businesses are using networks to access resources, such as enterprise storage, that were previously directly connected.

  • Web services and the World Wide Web have moved increasing amounts of business activity to a networked paradigm.

  • Messaging is becoming a prevalent means of sharing data and services.

  • Clusters-rather than large server systems-are becoming the default means of creating large computing resources.

  • The sheer volume of data has risen dramatically due to the increased use of audio and video resources, and real-time data acquisition, including, especially, radio frequency identification (RFID) tag tracking.

Major local area network technologies include Ethernet, Token Ring, and Fiber Distributed Data Interface (FDDI). Ethernet is by far the most commonly used LAN technology. A number of corporations use the Token Ring technology. FDDI is sometimes used as a backbone LAN interconnecting Ethernet or Token Ring LANs. Another LAN technology, ARCNET, was the most commonly installed LAN technology, and is still used in the automation industry.

The Framework composed of a suite of application programs, which is kept on the LAN server. Users who need an application frequently can download it once and then run it on their local hard disk. Users, in each department, can order printing and other services as needed through applications run on the LAN server. A user can share files with others at the LAN server and a LAN administrator maintains read and write access. A LAN server may also be used as a Web server.

The proposed network design has a wireless LAN that is sometimes preferable to a wired LAN because it is cheaper to install and maintain. The implementation supports a Resilient Packet Ring (RPR), which is a network topology, developed as a new standard for fibre optic rings. The Institute of Electrical and Electronic Engineers (IEEE) began the RPR standards (IEEE 802.17) development project in December 2000 with the intention of creating a new Media Access Control layer for fibre optic rings (Ward, 2002).

In order to provide readers with more information on network models, we sketch the interfaces, which identify seven layers of communication types as in Figure 1.

Figure 1.

The OSI network mode

Each layer depends on the services provided by the layer below it down to the physical layers, which define network hardware such as the network interface cards and the wires that connect the cards together.

The network model shown in Figure 1 can be used as a background for the layered of hardware and software that handles packet processing. When a network interface card (NIC) receives a data packet, it initiates a series of interactions with the system processor to handle the data payload and deliver it to the appropriate application as in Figure 2.

Figure 2.

Layered stack of applications

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Indranil Bose
Chapter 1
Varadharajan Sridhar
Telecom operators have a wide variety of functions to perform including marketing of telecom products and services, managing their networks... Sample PDF
Strategic Outsourcing: Opportunities and Challenges for Telecom Operators
Chapter 2
Sami J. Habib
This article presents a computer-aided integration tool, iCAD, that can predict a network evolution. We have used the term a network evolution to... Sample PDF
Empirical Prediction of Computer-Network Evolution
Chapter 3
Hak Ju Kim
This article seeks to develop a richer understanding of the suitability of IP telephony in the Public Switched Telephony Network (PSTN) with an... Sample PDF
Suitability of IP Telephony in the Public Switched Telephone Network (PSTN): A Case Study
Chapter 4
Abid Al Ajeeli
This chapter describes a detailed framework configuration infrastructure design for a high performance network. The configuration is described based... Sample PDF
A Framework for High-Speed Networking
Chapter 5
Nurul I. Sarkar, Catherine Byrne, Nabeel A.Y. Al-Qirim
Ethernet network technology is still one of the most popular LAN technologies in use today by many organizations and educational institutions... Sample PDF
Updating on Gigabit Ethernet Implementation: The Case of a Large New Zealand Organization
Chapter 6
M. Chandrasekaran, R. S.D. Wahida Banu
This chapter introduces and analyses a class of non-linear congestion control algorithms called polynomial congestion control algorithms. These... Sample PDF
Interaction Between MIMD-Poly & PIPD-Poly Algorithms and other TCP Variants in Multiple Bottleneck TCP Networks
Chapter 7
Xabiel G. Pañeda
This chapter presents a method for performance analysis and configuration of audio/video-on-demand services. These kind of services makes use of an... Sample PDF
A Systematic Approach to the Analysis and Configuration of Audio/Video-on-Demand Services
Chapter 8
Say Ying Lim
As more and more servers appearing in the wireless environment provide accesses to mobile users, more and more demand and expectation is required by... Sample PDF
Mobile Information Processing Involving Multiple Non-Collaborative Sources
Chapter 9
Vilmos Simon
In the next generation IP-based mobile networks, one of the most important QoS parameters are the delay and the delay variation. The cell handover... Sample PDF
Network Planning Algorithms for Optimizing Signalling Load in Mobile Networks
Chapter 10
Joon-Yeoul Oh, John P. Mullen
This chapter proposes a very effective heuristic algorithm to address a variation of the cellular network expansion problem and discusses each... Sample PDF
A Heuristic Solution to the Large Scale Cellular Telecommunication Network Expansion Problem
Chapter 11
Manuel Vilas
This article introduces a distributed system, called wireless proxy, to mitigate the effects of user mobility over streaming services on IEEE 802.11... Sample PDF
Wireless Proxy: Distributed System to Mitigate the Effects of User Mobility Over Streaming Services on IEEE 802.11 Wireless LANs
Chapter 12
R. Radhakrishnan, K. R. Shankarkumar, A. Ebenezer Jeyakumar
In this chapter, we propose a new scheme for Multi User Detection (MUD) using Parallel Interference Cancellation (PIC) technique. This technique... Sample PDF
Soft Decision Parallel Interference Cancellation for Multi-Carrier DS-CDMA
Chapter 13
Ghassan Kbar
This chapter introduces a new radio resource management technique based on distributed dynamic channel assignment, and sharing load among Access... Sample PDF
Distributed Resources Management in Wireless LANs that Support Fault Tolerance
Chapter 14
Mieso K. Denko
This article proposes a cooperative data caching and prefetching scheme for Mobile Ad Hoc Networks (MANETs). In this scheme, multiple hosts... Sample PDF
Cooperative Data Caching and Prefetching in Wireless Ad Hoc Networks
Chapter 15
Essam Natsheh
The challenge in creating a routing protocol for ad-hoc networks is to design a single protocol that can adapt to the wide variety of conditions... Sample PDF
A Survey on Fuzzy Reasoning Applications for Routing Protocols in Wireless Ad-Hoc Networks
Chapter 16
Essam Natsheh
Mobile ad-hoc network is a network without infrastructure, where every node has its own protocols and services for powerful cooperation in the... Sample PDF
Fuzzy Linguistic Knowledge for Active Queue Management in Wireless Ad-Hoc Networks
Chapter 17
Yun Wang, Lee Seidman
The use of network traffic audit data for retrieving anomaly intrusion information and profiling user behavior has been studied previously, but the... Sample PDF
Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior
Chapter 18
Rania Wehbi
In Inter-Vehicle Communication (IVC) networks, the high mobility and lack of infrastructure pose major challenges in designing secure routing... Sample PDF
Network Setup for Secure Routing in Inter-Vehicle Communication Networks
Chapter 19
Antonios Alexiou, Christos Bouras, John Papagiannopoulos, Dimitrios Primpas
This chapter presents the design principles that cover the implementation of broadband infrastructure in the region of Western Greece, by examining... Sample PDF
Metropolitan Broadband Networks: Design and Implementation Aspects, and Business Models
About the Contributors