Advance Network Technology Analyzing Switched Ethernet Using OPNET
CONTENTS:
1. Introduction 2. Traffic details of the network. 3. Simulation and Results 4. Characteristics and tables 5. Justification 6. Conclusion 7. References
Introduction: OPNET is a network simulation tool which stands for Optimized Network Engineering Tools. It is not only a network application tool that is used to design a simulation network but also manages the network tools. OPNET comes with some of the toolsets listed below 1. Protocols defined in packet format 2. Network topology and link connections defined by project window. 3. Interface of a network component specified by node model. OPNET is a simulator that is built on top of every discrete event system. The system behavior is simulated by modeling each and every event that is happening in the system and processed by user defined system. To organize all the models to be built in the network it uses hierarchy models. This software is mainly used to test and design the performance of network characteristics, db entry, ftp, db query, accounts , Ethernet , average response time etc where we have the capability of changing the predefined networks and edit the attributes. OPNET controls the traffic by modeling network and application users. Now let us consider a company network where I am going to describe my course work in detail. In this company network we will be having mainly two blocks Profile definitions and Application definitions. In Profile definitions we are going to describe about the users. There are several types of applications that are predefined in the Application definition block. In this course work we need to initiate and simulate an office network and check the network performances of the servers. This network consists of four switches, of which one switch is used as central switched and remaining three switches 1; switch 2 and switch 3 are located in different rooms. These switches S1, S2, S3 are connected with 100Base T links. These three switches are then in turn connected to server with 10BaseT links. The first switch S1 is now connected to development
server, switch S2 in connected to human recourses, receptionist, accounting and switch S3 is connected to Sales server. Staff
Working hours 8am to 6pm
Receptionist
Departments
Applications
Switches
Email(heavy) General
Human resource
9am to 5 pm
General
Recruiting
9 am to 5 pm General
Accounts
10am to 4pm General
Sales
8 am to 8 pm Sales
Development
11 am to 7 pm
Development
S2 Email(light), Web browsing(light), file print(light) Email(light), Web browsing(light), file print(light) Database (heavy) and file printing (heavy) Database (light), e-mail (heavy), FTP (light) Web browsing (heavy), Database (heavy), FTP (heavy) and e-mail (light)
S2
S2 S2 S3
S1
Here we need to design and prepare four scenarios. So let us discuss about them now. 1. In the First scenario, all servers in the company network will support all applications where as only the client applications will be allowed to access any server.
2. In the second scenario, only one client application will be supported by each server and runs on the local machines and the staff will have access to only that server of that particular department. 3. In the Third scenario we need to remind the first scenario case and do the same process by adding additional networks to the given network. We are adding additional networks as these applications use 10Base T links and 100BaseT links. And the process is same as equal to first scenario i.e. (1=3). 4. In the last fourth scenario, we do repeat the process same as second scenario, again by adding additional networks as we have done in third scenario. The process is again same as second case i.e. (2=4).
In our company network, all servers will support all client applications. Hence we need to edit and design the attributes of those applications. Here we have to add 6 new applications in the application definition and name
them as receptionist, human resources, accounting, sales, recruiting and development. For each application we need to provide with valid start time and end time. From the above we can notice that all staff in the network starts the work at different timings. Here I assumed that all the staff of the company starts the work 1 hr earlier to their start time i.e. for receptionist they start at 7 am. Sales staffs are going to leave the office late as they work till 8pm. So the average duration of time they work is 12 hrs, but we assumed that the office starts running from 7 am, so the average working duration of the network is 13hours. We can see this, we run the program and is shown below.
For each profile we have to assign applications. We can do this by assigning attributes to every profile. For example, by selecting an
Email (heavy) application in the first profile and doing same procedure for remaining profiles. And the operation mode must be kept in simultaneous mode as we run all applications at the same time and the end time (Repeatability) must me once at start time. These calculations are shown in the table shown below.
Applications
Start Time in Sec Duration in Sec
Operation Mode
Receptionist
3600
36000
Simultaneous
Human Resource
7200
7200
Simultaneous
Recruiting
7200
7200
Simultaneous
Accounts
10800
21600
Simultaneous
Sales
3600
43200
Simultaneous
Development
14400
28800
Simultaneous
Thus from the above table we had calculated the start time and total duration of the work in seconds. And the operation mode is kept in simultaneous mode for all applications as all the applications run simultaneously. Basing on the calculations we save the save the network and run the program. As soon as we click the run Option, the program runs and if it is successful, a window will appear show shown below.
RESULTS: Thus from the above discussion, we can analyze the performance characteristics of all the four scenario simulations. Comparisons have been made for each selected parameters and their corresponding results are known. All these parameters are listed in the given table below, to make the comparison easy between the scenarios. With the help of these parameters the performance of the network can be made easy. As we have created six applications, we are going to compare the parameters for the four scenarios.
Global Characteristics: 1. Db Entry: Parameter
Scenario1
Scenario2
Scenario3
Scenario4
Response time (sec) Traffic received(Bytes/sec ) Traffic received( Packets/s ec) Traffic sent( Bytes/sec)
0.026576
0.015767
0.042650
0.015462
5986.284
6128.342
17563.27
3726.437
0.549242
0.534532
0.781624
0.345345
5986.284
6128.342
17563.27
3726.437
Traffic sent(Packets/sec)
0.549242
0.534532
0.781624
0.345345
Graph:
Db Query: Parameter
Scenario1
Scenario2
Scenario3
Scenario4
Response time (sec) Traffic received(Bytes/sec) Traffic received( Packets/s ec) Traffic sent( Bytes/sec)
0.026865
0.015345
0.276384
0.015875
6023.192
6452.043
9876.276
3778.284
0.543484
0.534532
0.776353
0.352895
6023.192
6452.043
9876.276
3778.284
Traffic sent(Packets/sec)
0.127363
0.1498547
0.867363
0.773463
3. EMAIL: Parameter
Scenario1
Scenario2
Scenario3
Scenario4
Response time (sec) Traffic received(Bytes/sec) Traffic received( Packets/s ec) Traffic sent( Bytes/sec)
0.11256
0.014728
0.012281
0.015256
327.1429
287.3476
294.6473
287.3563
0.223765
0.136547
0.245322
0.134589
327.1429
287.3476
294.6473
287.3563
Traffic sent(Packets/sec)
0.223765
0.136547
0.245322
0.134589
FTP: Parameter
Scenario1
Scenario2
Scenario3
Scenario4
Response time (sec)
0.5329
0.035738
0.52378
0.0274536
Traffic received(Bytes/sec)
321.1345
286.3487
398.45634 273.4536
Traffic received( Packets/sec
0.015648
0.12456
0.012454
Traffic sent( Bytes/sec)
321.1345
286.3487
398.45634 273.4536
Traffic sent( Bytes/sec)
0.042367
0.026743
0.038463
0.023443
Upload response time
0.46524
0.024674
0.065983
0.024532
HTTP:
0.013432
Parameter
Scenario1
Scenario2
Scenario3
Scenario4
Object Response time (sec) Page Response time Sec Traffic received( Bytes/sec ) Traffic Received( Packets/ sec) Traffic sent(Bytes /sec)
0.00673
0.00635
0.0046372
0.001254
0.008763
0.002361
0.0126734
0.002732
520.3428
420.0938
490.5673
409.4326
0.67382
0.47262
0.590363
0.398723
520.3428
420.0938
490.5673
409.4326
Traffic sent(Packets/sec)
0.673532
0.467292
0.62539
0.438272
Scenario1
Scenario2
Scenario3
Scenario4
Traffic 375.4532 received(Bytes/sec) Traffic 0.067362 received( Packets/s ec) Traffic 375.1429 sent( Bytes/sec)
178.0392
367.9182
189.3723
0.023637
0.078367
0.037465
178.0392
373.6473
189.3723
Traffic sent(Packets/sec)
0.023637
0.078367
0.037465
Print: Parameter
0.067362
Graph:
Justification: Let Us review and justify our observations and descriptions. In the given company network, we will not make any changes or modifications in the application definition as they already have well predefined applications. Only in Profile definitions we have to change the applications in each and every profile. Only the client has access and performs same applications in all the scenarios. Hence we have created six profiles in all the scenarios. In the first scenario, at every server we should select ‘All’ for supported services, as they support all the applications. All the applications must me mentioned at every server in the second scenario. Profile name also must me mentioned at each and every node.
And the same process should be repeated for second and third scenarios and back ground traffic of 10Baset links and 100Base T links should be added to the network. Hence, finally the duration of the simulation time must be 13hrs as the network runs from morning 7 am to 8 pm. Thus the network performance can be found with the help of these profiles and applications. Conclusion: I am going to conclude my calculations and observations made in this course work. This helped me a lot in order to know the simulation tools being used in present technologies. With the help of this back ground load we will be able to distinguish the difference in the network. On the other hand, they will be so many negative factors affecting the performances of the network while we run the network. In order to rectify and analyze these problems, we must provide better network and different scenarios. If we do the first scenario perfectly, I think we can do remaining scenarios perfectly according to my observations and calculations I made this conclusion. Reference: 1. Teach Mat 2. www.opnet.com 3. https://cms1.gre.ac.uk/teachmat0809/COMP1266/course/schedule.asp? banner=COMP1266