A Network Simulation Experiment of WAN Based on OPNET

Size: px
Start display at page:

Download "A Network Simulation Experiment of WAN Based on OPNET"

Transcription

1 A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, *2 College of Engineering, Bohai University, Jinzhou, Liaoning, China, 3, Department of Computer Science, Eastern Michigan University, US, Abstract With the development of the computer technology, simulation plays an important role in analyzing and designing complex systems, such as network. In this paper, we use the OPNET into computer network experimental and design WAN simulation experiment. Through the process of simulation modeling study of WAN, we can intuitively understand WAN performance, and it also showed that the OPNET in the computer network experimental teaching has a good application prospect. Keywords: OPNET, Computer Network, Simulation, WAN 1. Introduction Along with the development of the social informatization, computer network technology used more widely[1]. With the continues expanding of network application field, network technical personnel who not only master network foundation but also have practical ability are needed in social industries. The computer network course is available in many universities, through higher education university can cultivate professional talents of network to meet the requirements of social development. The computer network is a very practical and theoretical course, but in actual teaching, theoretical teaching is greater proportion; In addition, the experimental teaching environment need high input and platform build difficulty, so it is difficult to be beneficial supplement of theoretical teaching[2-3].reform network teaching is one of the most urgently problem should be solved in order to improve the weak experiment teaching. Therefore, OPNET can be used in computer network experiment teaching, through the software simulation to improve the students' practical ability. Students not only understand course better, but also master a research tool, at the same time by using this the problem of high input about the experimental platform can be solved. WAN covers a broad area; the related experiments cannot be doing in laboratories, so use OPNET network simulation software to design the experiment of WAN[4]. 2. The summary and technical features of OPNET OPNET company was founded by two doctors of Massachusetts in 1986,and found that the network simulation are very valuable, so in 1987 established commercial OPNET. The OPNET published the first commercial network simulation software since 1987, after that the OPNET developed quickly and steadily. As a high-tech network planning, simulation and analysis tools, OPNET has been widely recognized and adoption in communication, national defense and computer network domain. Tens of thousands of organization use OPNET software to optimize the performance of the networks, maximize communication network and application of usability [5]. Its product line include Modeler, IT Guru, SP Guru, OPNET Development Kit and WDM Guru, etc. OPNET has the outstanding characteristic of below, which can meet the need of large and complex network simulation[6-7]: (1)Provide three layer modeling mechanism. The Bottom is Process model, use the state machine to describe the protocol; followed is Node model, consist of the corresponding protocol model, which reflect the characteristics of equipment; the top is network model. Three layer models corresponding to the actual network, the equipment and the protocol hierarchy, comprehensively reflect the network related characteristics. International Journal of Digital Content Technology and its Applications(JDCTA) Volume7,Number7,April 2013 doi: /jdcta.vol7.issue

2 (2)Provide a relatively complete library of the basic model, including: router, switch, server, client, ATM equipment, DSL equipment, ISDN equipment and so on. (3)Using the discrete event to drive simulation mechanism, its efficiency is greatly improved than using the time to drive. (4) The hybrid modeling mechanism combine the analysis method based on package with the mathematical modeling method based on statistic, by using this OPNET can get more detailed result of simulation and improve the simulated efficiency. (5) OPNET has rich statistics collection and analysis capabilities. It can directly collect performance statistical parameters of each commonly used network levels, and it is convenient to prepare and output simulation report. (6) Provide the interface of network management system and flow monitoring system, it can set up the simulation model conveniently with the existing topology and the flow of data, at the same time it can verify the simulation results. OPNET has some shortcomings such as limited model library and inefficient when the simulation network scale and flow is very big, etc. But the network simulation can construct virtual environment in computer to reflect the reality of the network environment, through the mathematical method to simulate the reality of the network behavior. OPNET effectively improve the reliability and accuracy of network planning and design, it obviously reduce the network investment risk and unnecessary investment waste. 3. WAN Overview 3.1. WAN Definition and Classification The wide area network (WAN) also called remote network, a kind of network used to interconnect LAN or MAN in different regions, it provide computer communication among different regions, cities and countries[8]. It s distribution range up to hundreds of kilometers or even farther, it can cover an area, a country even around the world. WAN can be divided into public transport network, dedicated transmission network and wireless transmission network. (1)Public Transport Network Generally the telecom sector of government establish, manage and control the public transport network, transmit and exchange devices within network can be provided (or rented) to any department or unit to use. Public transport network can be divided into two categories[9]: 1Circuit-switched networks, including the Public Switched Telephone Network (PSTN) and the Integrated Services Digital Network (ISDN). 2Packet-switched networks, including x.25 packet switching network, frame relay and switched multi-megabit data service (SMDS). (2) Dedicated Transmission Network An organization or group build, use, control and maintenance of a private communications network. Dedicated transmission network is digital data network (DDN). (3) Wireless Transmission Network The main is mobile wireless networks[10]. The typical wireless transmission network use GSM and GPRS technologies The Main Features of WAN (1)Mainly provides the service for communication, and support the user to use the computer for long-distance exchange of information; (2)Covering a wide range of communication distance, more factors need to be considered, such as the cost of the media, the cable redundancy, the utilization of media bandwidth and error handling, etc.; (3) The telecom sector or company is responsible for building, management and maintenance, and provide paid services, traffic statistics and billing to all users of the whole society. 4. The simulation experiment of WAN 432

3 4.1. Experiment Purpose and overview This experiment Constructs a LAN which is designed for a company, through a T1 line to research the company s actual performance. Also plans to add redundant links to the design of the network between LAN and ISP. This company s LAN includes 20 users of PCs, three shared printers and a local file and mail server. These users run different online applications including , web browser, video fluid and FTP, at the same time still run local service program, such as , printer and database access in the intranet. The purpose of the design is to research the response time of the two mission-critical, FTP download and Web Page download, and to analyze the link between LAN and ISP. Through the initial assessment, the LAN is divided into two smaller parts, and adds a T1 link between the LAN and ISP increased the available capacity up to twice, two T1 links can equal to use after load balancing Experimental Design and Procedures Figure 1. Network Structure Design of the Company Step 1: Start the IT Guru, open Lab1. The company shares the local and File server. As an experiment, add an server from the Object Palette, and configure the sharing application about and file. Illustrate how many objects configured to change network model. Step 2: Open Object Palette to add a local server. Step 3: Configure the local server to support and file sharing. Configure a new server to support and file sharing applications. Step 4: Configure and run the simulation. Through the above steps, the local and file sharing servers have been configured successfully; next assess the performance of network in a busy hour within a single day. Step 5: Observe the results. Observe variety of statistics such as response time of Web Application (HTTP page), FTP download response time and WAN link utilization. Experimental results and conclusions: Download the link utilization averaged 92%. Web Application (HTTP page) response time close to 1.3 seconds. FTP downloads response time close to 2.5 seconds. 433

4 Such high download link utilization can t give available bandwidth to potential user. Figure 2. Download link utilization curves of simulation Figure 3.The result of HTTP page and FTP Download response time 434

5 Design another experiment, add a new T1 link to expand capacity up to twice, load balancing to ensure that two links traffic distribute balance, analyze the advantages of adding new link. Step 6: Switch to next scheme. Figure 4. Add another T1 link and load-balancing The company's network is divided into two small parts each connected to a switch. The LAN connected to the Internet through two T1 lines. The EIGRP used to load balance between them. Step 7: Configure and run the simulation. Re-run the previous simulation, compare two links and observe whether the load balance. Set the simulation duration and run the simulation as mentioned steps Step 8: Compare the results. Compare the response time of link utilization, the Web Application and FTP download. Expect the new link to ISP can reduce the application response time and these two links should be calculated the link utilization separately. 435

6 Figure 5. The contrast of tow simulation results Experimental results and conclusions: As expected, the utilization of the lower link decreased from 92% to 55%, the new link utilization close to 40.8%. Therefore, the load balancing worked. The response time of Web Application reduce from about 1.1 seconds to 0.45 seconds. 436

7 The response time of FTP download reduce from 1.25 seconds to 0.45 seconds. This is very important improvement in two aspects of link utilization and response time. The advantage of add a new T1line appear when one of router or link breakdown. 5. Conclusions We design simulation and analysis results by using the OPNET to simulate experiment of WAN, and get a real and profound understanding of theoretical knowledge of the WAN. At present network experiment equipment is expensive, so expanding the network laboratories cost larger. Using OPNET, just through establish the OPNET simulation in computer without additional network hardware, to realize all aspects of simulations about network. By design of the simulation test, teachers can study computer network in-depth and optimize the teaching. So it s practicability and effectiveness is obvious. 6. References [1] L.Zhao, C.Fan. Enhancement of QOS Differentiation over IEEE WLAN, IEEE Commun Lett, no. 8, pp , [2] Chen Min, Network Simulation of OPNET. Beijing: Tsinghua University Press,China,2004. [3] Yang Yinghui, Li Jianhua, Ma Chuang, Wang Gang. Design and analysis of region comprehensive communication network based on OPNET, Computer Engineering and Design, vol. 33, no. 6, pp ,2012. [4] Wu Junhong, Yang Yang, Li Huijie, LIN Xiaokang. Network Simulation Method and OPNET s Simulation Technology, Computer Engineering, vol. 30, no. 5, pp , [5] Wang Xiaofeng, Sun Jiyin. Network Simulation Technology based on OPNET,Ordnance Automation, vol. 28, no. 4, pp.64-71, [6] Jungang Yang, Li Liang, Guangliang Zhu, Yanfeng Yang, "A Network Security Risk Assessment Method Based on Real-time Security Warning", JCIT, Vol. 8, No. 2, pp , [7] Shi Huiwei, Wang Hua, Zhang Nianjun. Analysis of OPNET Simulation Technology and its Application, Computer Engineering and Design, vol. 27, no. 17, pp , [8] Xuchang Lin, "Model for Evaluating the Computer Network Security in Uncertain Linguistic Environment", IJACT, Vol. 4, No. 4, pp , [9] Han Jing, Huang Jiangguo, Ren Maohua. Design and simulation of underwater acoustic communication network based on OPNET, Journal of System Simulation, vol. 21, no.17, pp , [10] Guangyuan Song, "Computer Network Security and Precaution Evaluation based on Incremental Relevance Vector Machine Algorithm and ACO", AISS, Vol. 5, No. 1, pp ,

Lab 3: Evaluating Application Performance across a WAN

Lab 3: Evaluating Application Performance across a WAN Lab 3: Evaluating Application Performance across a WAN Objective In this lab, we have a small LAN with 20 users for a startup company named Deltasoft Technologies. We investigate the application performance

More information

Home Networking Evaluating Internet Connection Choices for a Small Home PC Network

Home Networking Evaluating Internet Connection Choices for a Small Home PC Network Laboratory 2 Home Networking Evaluating Internet Connection Choices for a Small Home PC Network Objetive This lab teaches the basics of using OPNET IT Guru. OPNET IT Guru s user-friendly interface with

More information

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Objective This lab teaches the basics of using OPNET IT Guru. We investigate application performance and capacity planning, by

More information

This course has been retired. View the schedule of current networking

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses

More information

Networking Systems (10102)

Networking Systems (10102) Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network

LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network This lab has been originally designed as supplemental material for Prof. Panko s textbook Business Data Networks and Telecommunications.

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN

More information

Intranet Security Solution

Intranet Security Solution Intranet Security Solution 1. Introduction With the increase in information and economic exchange, there are more and more enterprises need to communicate with their partners, suppliers, customers or their

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

1.1. Abstract. 1.2. VPN Overview

1.1. Abstract. 1.2. VPN Overview 1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making

More information

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA ssharma5@ncsu.edu Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------

More information

The Analysis and Simulation of VoIP

The Analysis and Simulation of VoIP ENSC 427 Communication Networks Spring 2013 Final Project The Analysis and Simulation of VoIP http://www.sfu.ca/~cjw11/427project.html Group #3 Demet Dilekci ddilekci@sfu.ca Conrad Wang cw11@sfu.ca Jiang

More information

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009 Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009 Conceitos de Redes e Arquitecturas - Networks and Architectures

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

Routing and Data Compression in SONET

Routing and Data Compression in SONET Routing and Data Compression in SONET Bhuvnesh yadav Electronics and Communication dept. Maharishi Markandeshwar Engg. College, Ambala, India. Email: raobhuvnesh20@gmail.com Vinay verma Electronics and

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol

Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol International Journal of Networks and Communications 2015, 5(2): 23-30 DOI: 10.5923/j.ijnc.20150502.01 Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol Francisca O. Oladipo

More information

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network. Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote

More information

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks Res. Lett. Inf. Math. Sci., 2005, Vol. 7, pp 19-27 19 Available online at http://iims.massey.ac.nz/research/letters/ Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

More information

Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN

Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN ENSC 427 Communication Networks Final Project Report Spring 2014 Analysis and Simulation of VoIP Team #: 2 Kadkhodayan Anita (akadkhod@sfu.ca, 301129632) Majdi Yalda (ymajdi@sfu.ca, 301137361) Namvar Darya

More information

University Network Engineering Professional Teaching Model Han You-qian 1,a, Xuxiu 2,a

University Network Engineering Professional Teaching Model Han You-qian 1,a, Xuxiu 2,a University Network Engineering Professional Teaching Model Han You-qian 1,a, Xuxiu 2,a Dept. of China mining university college of computer science and technology(cumt), Jiangsu Xuzhou, 221116 (xuxiu@cumt.edu.cn)

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Analysis and Design of Instant Message System Based on P2P

Analysis and Design of Instant Message System Based on P2P Analysis and Design of Instant Message System Based on P2P Shen Zhiwei Ma Shaowu China Netcom Group Labs Beijing 100032 Abstract By analyzing current development conditions of mainstream Instant Message

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia

Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia 22nd EUROPEAN CONFERENCE ON OPERATIONAL RESEARCH Prague, July 8 11, 2007 Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia

More information

Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications

Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications Sarhan M. Musa Mahamadou Tembely Matthew N. O. Sadiku Pamela H. Obiomon

More information

USING OPNET TO SIMULATE THE COMPUTER SYSTEM THAT GIVES SUPPORT TO AN ON-LINE UNIVERSITY INTRANET

USING OPNET TO SIMULATE THE COMPUTER SYSTEM THAT GIVES SUPPORT TO AN ON-LINE UNIVERSITY INTRANET USING OPNET TO SIMULATE THE COMPUTER SYSTEM THAT GIVES SUPPORT TO AN ON-LINE UNIVERSITY INTRANET Norbert Martínez 1, Angel A. Juan 2, Joan M. Marquès 3, Javier Faulin 4 {1, 3, 5} [ norbertm@uoc.edu, jmarquesp@uoc.edu

More information

OPNET - Network Simulator

OPNET - Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET - Network Simulator Jarmo Prokkola Project Manager, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

Virtual Server in SP883

Virtual Server in SP883 Virtual Server in SP883 1 Introduction: 1.1 Micronet SP883 is a hard QoS broadband router, means its guaranteed service can provide absolute reservation of resource (bandwidth) for specific traffic;not

More information

Construction and Implementation of Innovation Computer Network Practical Teaching System

Construction and Implementation of Innovation Computer Network Practical Teaching System I.J. Education and Management Engineering 2011, 2, 30-35 Published Online August 2011 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2011.02.05 Available online at http://www.mecs-press.net/ijeme

More information

Connection Services. Hakim S. ADICHE, MSc

Connection Services. Hakim S. ADICHE, MSc Connection Services Hakim S. ADICHE, MSc adiche@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Connection Services Different connectivity

More information

WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska

WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska WANs and Routers M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska 1 Introduction to WANs A WAN is a data communications network that spans a large geographic area such as a state, province, or country.

More information

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Lesson 24 Network Fundamentals

Lesson 24 Network Fundamentals Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Describe a network. Explain the benefits of a network. Identify the risks of network computing. Describe

More information

Enlarge Bandwidth of Multimedia Server with Network Attached Storage System

Enlarge Bandwidth of Multimedia Server with Network Attached Storage System Enlarge Bandwidth of Multimedia Server with Network Attached Storage System Dan Feng, Yuhui Deng, Ke Zhou, Fang Wang Key Laboratory of Data Storage System, Ministry of Education College of Computer, Huazhong

More information

CCNA. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included) Course Duration: 5 Days

CCNA. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included) Course Duration: 5 Days CCNA The Cisco Certified Network Associate (CCNA) course consists of days 1 to 5 of the Cisco Networking Academy Programme. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included)

More information

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of

More information

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

Which definition of Convergence do

Which definition of Convergence do Architectures For Convergence Gary Audin Gary Audin is president of Delphi, Inc. consultancy. He has been an independent communications and security consultant for 25 years. Which definition of Convergence

More information

Lab 4.5.4 Diagramming External Traffic Flows

Lab 4.5.4 Diagramming External Traffic Flows Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1

More information

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 Chengcheng.li@uc.edu ABSTRACT

More information

Computer Networks CCNA Module 1

Computer Networks CCNA Module 1 Chapter 1: Quiz 1 Q1: Which statement describes a network that supports QoS? The fewest possible devices are affected by a failure. The network should be able to expand to keep up with user demand. The

More information

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

Network+ Guide to Networks, Fourth Edition. Chapter 7 WANs, Internet Access, and Remote Connectivity. Objectives

Network+ Guide to Networks, Fourth Edition. Chapter 7 WANs, Internet Access, and Remote Connectivity. Objectives Network+ Guide to Networks, Fourth Edition Chapter 7 WANs, Internet Access, and Remote Connectivity Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages

More information

Network support for tele-education

Network support for tele-education Network support for tele-education Aiko Pras Centre for Telematics and Information Technology University of Twente (UT) http://wwwtios.cs.utwente.nl/~pras This paper discusses the state of the art in networking,

More information

Why your own server space? Why should you set it up?

Why your own server space? Why should you set it up? Lab 5 servers Why your own server space? Why should you set it up? -Control factors -Demystifying how things get on the internet -Project from start to finish What is the Difference Between a Digital Art

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

Available online at www.sciencedirect.com Available online at www.sciencedirect.com

Available online at www.sciencedirect.com Available online at www.sciencedirect.com Available online at www.sciencedirect.com Available online at www.sciencedirect.com Physics Physics Procedia Procedia 00 (2011) 24 (2012) 000 000 2293 2297 Physics Procedia www.elsevier.com/locate/procedia

More information

Keywords Wimax,Voip,Mobility Patterns, Codes,opnet

Keywords Wimax,Voip,Mobility Patterns, Codes,opnet Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effect of Mobility

More information

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks Network+ Guide to Networks 6 th Edition Chapter 7 Wide Area Networks Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages and disadvantages Compare

More information

Lab 4.5.2 Diagramming Intranet Traffic Flows

Lab 4.5.2 Diagramming Intranet Traffic Flows Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1

More information

Enhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses.

Enhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses. Enhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses. Veeramani Shanmugam s.veeramani@curtin.edu.my Lenin Gopal lenin@curtin.edu.my Zeya

More information

Management Information Systems

Management Information Systems Management Information Systems Basics of the Internet Dr. Shankar Sundaresan (Adapted from Introduction to IS, Rainer and Turban) Internet Basics Outline Internet History Internet Structure Switching Methods

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

The Research on Industrial Information Monitoring System Based on B/S Structure Xuexuan ZHU1, a

The Research on Industrial Information Monitoring System Based on B/S Structure Xuexuan ZHU1, a 4th National Conference on Electrical, Electronics and Computer Engineering (NCEECE 2015) The Research on Industrial Information Monitoring System Based on B/S Structure Xuexuan ZHU1, a 1 College of Electrical

More information

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts

More information

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2) What is a computer network? Introduction Chapter 1 A number of separate but interconnected computers A collection of autonomous computers interconnected by a single technology COURSE FOCUS: design and

More information

Technology Brief. Implementing DSL Service for ISPs with the SMS. The DSL Opportunity. DSL is Different from Dial

Technology Brief. Implementing DSL Service for ISPs with the SMS. The DSL Opportunity. DSL is Different from Dial Technology Brief Implementing DSL Service for ISPs with the SMS The DSL Opportunity Digital Subscriber Line (DSL) services represent a major opportunity for dialup-based Internet Service Providers (ISPs)

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

Specialized Programme on Internetworking Design and LAN WAN Administration

Specialized Programme on Internetworking Design and LAN WAN Administration Specialized Programme on Internetworking Design and LAN WAN Administration A. NAME OF INSTITUTE Centre For Development of Advanced Computing B. NAME/TITLE OF THE COURSE C. COURSE DATES WITH DURATION IN

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

51-10-50 Circuit-Switched Router Connections Nathan J. Muller

51-10-50 Circuit-Switched Router Connections Nathan J. Muller Previous screen 51-10-50 Circuit-Switched Router Connections Nathan J. Muller Payoff LAN managers will find that routers supporting dial backup, bandwidth-on-demand, and dial-on-demand enable more flexible

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Integrated Management System Job Management Partner 1 (JP1), Version6i for Broadband Networks

Integrated Management System Job Management Partner 1 (JP1), Version6i for Broadband Networks Hitachi Review Vol. 51 (2002), No. 2 65 Integrated Management System Job Management Partner 1 (JP1), Version6i for Broadband Networks Yoshiyuki Kurosaki Toshio Sato Kiminori Sugauchi Tokuji Tamada OVERVIEW:

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

270125 - TXC - Computer Network Technology

270125 - TXC - Computer Network Technology Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 701 - AC - Department of Computer Architecture Academic year: Degree: 2015 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus

More information

DEVELOPMENT OF A WEB-BASED WIRELESS TELEMONITORING SYSTEM FOR AGRO- ENVIRONMENT

DEVELOPMENT OF A WEB-BASED WIRELESS TELEMONITORING SYSTEM FOR AGRO- ENVIRONMENT DEVELOPMENT OF A WEB-BASED WIRELESS TELEMONITORING SYSTEM FOR AGRO- ENVIRONMENT Keming Du 1, Zhongfu Sun 1,*, Huafeng Han 1, Shuang Liu 1 1 Institute of Environment and Sustainable Development in Agriculture(IEDA),

More information

NetFlow-Based Approach to Compare the Load Balancing Algorithms

NetFlow-Based Approach to Compare the Load Balancing Algorithms 6 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, October 8 NetFlow-Based Approach to Compare the Load Balancing Algorithms Chin-Yu Yang 1, and Jian-Bo Chen 3 1 Dept.

More information

Wireless LAN Services for Hot-Spot

Wireless LAN Services for Hot-Spot Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute wychoi53@etri.re.kr ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol

More information

COURSE NUMBER: CTS 2371

COURSE NUMBER: CTS 2371 Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2371 COURSE TITLE: Virtual Infrastructure: Deployment, Security, and Analysis PREREQUISITE(S): CTS

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

Cisco Networking Professional-6Months Project Based Training

Cisco Networking Professional-6Months Project Based Training Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH

More information

NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT

NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT 1 MOHD NAZRI ISMAIL, 2 ABDULLAH MOHD ZIN 1 Faculty of MIIT, University of Kuala Lumpur (UniKL), Malaysia 2 Faculty of FTSM, University

More information

Design and Implementation of a Network Attack Platform Based on Plug-in Technology

Design and Implementation of a Network Attack Platform Based on Plug-in Technology Design and Implementation of a Network Attack Platform Based on Plug-in Technology Li Gen, Wang Bailing *, Liu Yang, Bai Xuefeng and Yuan Xinling Department of Computer Science & Technology Harbin Institute

More information

Secure Network Design: Designing a DMZ & VPN

Secure Network Design: Designing a DMZ & VPN Secure Network Design: Designing a DMZ & VPN DMZ : VPN : pet.ece.iisc.ernet.in/chetan/.../vpn- PPTfinal.PPT 1 IT352 Network Security Najwa AlGhamdi Introduction DMZ stands for DeMilitarized Zone. A network

More information

Lab 9.1.1 Organizing CCENT Objectives by OSI Layer

Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of

More information

VOICE OVER IP AND NETWORK CONVERGENCE

VOICE OVER IP AND NETWORK CONVERGENCE POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it

More information