A Network Simulation Experiment of WAN Based on OPNET

Size: px
Start display at page:

Download "A Network Simulation Experiment of WAN Based on OPNET"

Transcription

1 A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2 College of Engineering, Bohai University, Jinzhou, Liaoning, China, jzhzhb@sina.com 3, Department of Computer Science, Eastern Michigan University, US, puyuliu@gmail.com Abstract With the development of the computer technology, simulation plays an important role in analyzing and designing complex systems, such as network. In this paper, we use the OPNET into computer network experimental and design WAN simulation experiment. Through the process of simulation modeling study of WAN, we can intuitively understand WAN performance, and it also showed that the OPNET in the computer network experimental teaching has a good application prospect. Keywords: OPNET, Computer Network, Simulation, WAN 1. Introduction Along with the development of the social informatization, computer network technology used more widely[1]. With the continues expanding of network application field, network technical personnel who not only master network foundation but also have practical ability are needed in social industries. The computer network course is available in many universities, through higher education university can cultivate professional talents of network to meet the requirements of social development. The computer network is a very practical and theoretical course, but in actual teaching, theoretical teaching is greater proportion; In addition, the experimental teaching environment need high input and platform build difficulty, so it is difficult to be beneficial supplement of theoretical teaching[2-3].reform network teaching is one of the most urgently problem should be solved in order to improve the weak experiment teaching. Therefore, OPNET can be used in computer network experiment teaching, through the software simulation to improve the students' practical ability. Students not only understand course better, but also master a research tool, at the same time by using this the problem of high input about the experimental platform can be solved. WAN covers a broad area; the related experiments cannot be doing in laboratories, so use OPNET network simulation software to design the experiment of WAN[4]. 2. The summary and technical features of OPNET OPNET company was founded by two doctors of Massachusetts in 1986,and found that the network simulation are very valuable, so in 1987 established commercial OPNET. The OPNET published the first commercial network simulation software since 1987, after that the OPNET developed quickly and steadily. As a high-tech network planning, simulation and analysis tools, OPNET has been widely recognized and adoption in communication, national defense and computer network domain. Tens of thousands of organization use OPNET software to optimize the performance of the networks, maximize communication network and application of usability [5]. Its product line include Modeler, IT Guru, SP Guru, OPNET Development Kit and WDM Guru, etc. OPNET has the outstanding characteristic of below, which can meet the need of large and complex network simulation[6-7]: (1)Provide three layer modeling mechanism. The Bottom is Process model, use the state machine to describe the protocol; followed is Node model, consist of the corresponding protocol model, which reflect the characteristics of equipment; the top is network model. Three layer models corresponding to the actual network, the equipment and the protocol hierarchy, comprehensively reflect the network related characteristics. International Journal of Digital Content Technology and its Applications(JDCTA) Volume7,Number7,April 2013 doi: /jdcta.vol7.issue

2 (2)Provide a relatively complete library of the basic model, including: router, switch, server, client, ATM equipment, DSL equipment, ISDN equipment and so on. (3)Using the discrete event to drive simulation mechanism, its efficiency is greatly improved than using the time to drive. (4) The hybrid modeling mechanism combine the analysis method based on package with the mathematical modeling method based on statistic, by using this OPNET can get more detailed result of simulation and improve the simulated efficiency. (5) OPNET has rich statistics collection and analysis capabilities. It can directly collect performance statistical parameters of each commonly used network levels, and it is convenient to prepare and output simulation report. (6) Provide the interface of network management system and flow monitoring system, it can set up the simulation model conveniently with the existing topology and the flow of data, at the same time it can verify the simulation results. OPNET has some shortcomings such as limited model library and inefficient when the simulation network scale and flow is very big, etc. But the network simulation can construct virtual environment in computer to reflect the reality of the network environment, through the mathematical method to simulate the reality of the network behavior. OPNET effectively improve the reliability and accuracy of network planning and design, it obviously reduce the network investment risk and unnecessary investment waste. 3. WAN Overview 3.1. WAN Definition and Classification The wide area network (WAN) also called remote network, a kind of network used to interconnect LAN or MAN in different regions, it provide computer communication among different regions, cities and countries[8]. It s distribution range up to hundreds of kilometers or even farther, it can cover an area, a country even around the world. WAN can be divided into public transport network, dedicated transmission network and wireless transmission network. (1)Public Transport Network Generally the telecom sector of government establish, manage and control the public transport network, transmit and exchange devices within network can be provided (or rented) to any department or unit to use. Public transport network can be divided into two categories[9]: 1Circuit-switched networks, including the Public Switched Telephone Network (PSTN) and the Integrated Services Digital Network (ISDN). 2Packet-switched networks, including x.25 packet switching network, frame relay and switched multi-megabit data service (SMDS). (2) Dedicated Transmission Network An organization or group build, use, control and maintenance of a private communications network. Dedicated transmission network is digital data network (DDN). (3) Wireless Transmission Network The main is mobile wireless networks[10]. The typical wireless transmission network use GSM and GPRS technologies The Main Features of WAN (1)Mainly provides the service for communication, and support the user to use the computer for long-distance exchange of information; (2)Covering a wide range of communication distance, more factors need to be considered, such as the cost of the media, the cable redundancy, the utilization of media bandwidth and error handling, etc.; (3) The telecom sector or company is responsible for building, management and maintenance, and provide paid services, traffic statistics and billing to all users of the whole society. 4. The simulation experiment of WAN 432

3 4.1. Experiment Purpose and overview This experiment Constructs a LAN which is designed for a company, through a T1 line to research the company s actual performance. Also plans to add redundant links to the design of the network between LAN and ISP. This company s LAN includes 20 users of PCs, three shared printers and a local file and mail server. These users run different online applications including , web browser, video fluid and FTP, at the same time still run local service program, such as , printer and database access in the intranet. The purpose of the design is to research the response time of the two mission-critical, FTP download and Web Page download, and to analyze the link between LAN and ISP. Through the initial assessment, the LAN is divided into two smaller parts, and adds a T1 link between the LAN and ISP increased the available capacity up to twice, two T1 links can equal to use after load balancing Experimental Design and Procedures Figure 1. Network Structure Design of the Company Step 1: Start the IT Guru, open Lab1. The company shares the local and File server. As an experiment, add an server from the Object Palette, and configure the sharing application about and file. Illustrate how many objects configured to change network model. Step 2: Open Object Palette to add a local server. Step 3: Configure the local server to support and file sharing. Configure a new server to support and file sharing applications. Step 4: Configure and run the simulation. Through the above steps, the local and file sharing servers have been configured successfully; next assess the performance of network in a busy hour within a single day. Step 5: Observe the results. Observe variety of statistics such as response time of Web Application (HTTP page), FTP download response time and WAN link utilization. Experimental results and conclusions: Download the link utilization averaged 92%. Web Application (HTTP page) response time close to 1.3 seconds. FTP downloads response time close to 2.5 seconds. 433

4 Such high download link utilization can t give available bandwidth to potential user. Figure 2. Download link utilization curves of simulation Figure 3.The result of HTTP page and FTP Download response time 434

5 Design another experiment, add a new T1 link to expand capacity up to twice, load balancing to ensure that two links traffic distribute balance, analyze the advantages of adding new link. Step 6: Switch to next scheme. Figure 4. Add another T1 link and load-balancing The company's network is divided into two small parts each connected to a switch. The LAN connected to the Internet through two T1 lines. The EIGRP used to load balance between them. Step 7: Configure and run the simulation. Re-run the previous simulation, compare two links and observe whether the load balance. Set the simulation duration and run the simulation as mentioned steps Step 8: Compare the results. Compare the response time of link utilization, the Web Application and FTP download. Expect the new link to ISP can reduce the application response time and these two links should be calculated the link utilization separately. 435

6 Figure 5. The contrast of tow simulation results Experimental results and conclusions: As expected, the utilization of the lower link decreased from 92% to 55%, the new link utilization close to 40.8%. Therefore, the load balancing worked. The response time of Web Application reduce from about 1.1 seconds to 0.45 seconds. 436

7 The response time of FTP download reduce from 1.25 seconds to 0.45 seconds. This is very important improvement in two aspects of link utilization and response time. The advantage of add a new T1line appear when one of router or link breakdown. 5. Conclusions We design simulation and analysis results by using the OPNET to simulate experiment of WAN, and get a real and profound understanding of theoretical knowledge of the WAN. At present network experiment equipment is expensive, so expanding the network laboratories cost larger. Using OPNET, just through establish the OPNET simulation in computer without additional network hardware, to realize all aspects of simulations about network. By design of the simulation test, teachers can study computer network in-depth and optimize the teaching. So it s practicability and effectiveness is obvious. 6. References [1] L.Zhao, C.Fan. Enhancement of QOS Differentiation over IEEE WLAN, IEEE Commun Lett, no. 8, pp , [2] Chen Min, Network Simulation of OPNET. Beijing: Tsinghua University Press,China,2004. [3] Yang Yinghui, Li Jianhua, Ma Chuang, Wang Gang. Design and analysis of region comprehensive communication network based on OPNET, Computer Engineering and Design, vol. 33, no. 6, pp ,2012. [4] Wu Junhong, Yang Yang, Li Huijie, LIN Xiaokang. Network Simulation Method and OPNET s Simulation Technology, Computer Engineering, vol. 30, no. 5, pp , [5] Wang Xiaofeng, Sun Jiyin. Network Simulation Technology based on OPNET,Ordnance Automation, vol. 28, no. 4, pp.64-71, [6] Jungang Yang, Li Liang, Guangliang Zhu, Yanfeng Yang, "A Network Security Risk Assessment Method Based on Real-time Security Warning", JCIT, Vol. 8, No. 2, pp , [7] Shi Huiwei, Wang Hua, Zhang Nianjun. Analysis of OPNET Simulation Technology and its Application, Computer Engineering and Design, vol. 27, no. 17, pp , [8] Xuchang Lin, "Model for Evaluating the Computer Network Security in Uncertain Linguistic Environment", IJACT, Vol. 4, No. 4, pp , [9] Han Jing, Huang Jiangguo, Ren Maohua. Design and simulation of underwater acoustic communication network based on OPNET, Journal of System Simulation, vol. 21, no.17, pp , [10] Guangyuan Song, "Computer Network Security and Precaution Evaluation based on Incremental Relevance Vector Machine Algorithm and ACO", AISS, Vol. 5, No. 1, pp ,

Lab 3: Evaluating Application Performance across a WAN

Lab 3: Evaluating Application Performance across a WAN Lab 3: Evaluating Application Performance across a WAN Objective In this lab, we have a small LAN with 20 users for a startup company named Deltasoft Technologies. We investigate the application performance

More information

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Objective This lab teaches the basics of using OPNET IT Guru. We investigate application performance and capacity planning, by

More information

Home Networking Evaluating Internet Connection Choices for a Small Home PC Network

Home Networking Evaluating Internet Connection Choices for a Small Home PC Network Laboratory 2 Home Networking Evaluating Internet Connection Choices for a Small Home PC Network Objetive This lab teaches the basics of using OPNET IT Guru. OPNET IT Guru s user-friendly interface with

More information

Networking Systems (10102)

Networking Systems (10102) Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career

More information

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN

More information

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network

LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network This lab has been originally designed as supplemental material for Prof. Panko s textbook Business Data Networks and Telecommunications.

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

The Analysis and Simulation of VoIP

The Analysis and Simulation of VoIP ENSC 427 Communication Networks Spring 2013 Final Project The Analysis and Simulation of VoIP http://www.sfu.ca/~cjw11/427project.html Group #3 Demet Dilekci ddilekci@sfu.ca Conrad Wang cw11@sfu.ca Jiang

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

1.1. Abstract. 1.2. VPN Overview

1.1. Abstract. 1.2. VPN Overview 1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making

More information

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA ssharma5@ncsu.edu Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------

More information

Intranet Security Solution

Intranet Security Solution Intranet Security Solution 1. Introduction With the increase in information and economic exchange, there are more and more enterprises need to communicate with their partners, suppliers, customers or their

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol

Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol International Journal of Networks and Communications 2015, 5(2): 23-30 DOI: 10.5923/j.ijnc.20150502.01 Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol Francisca O. Oladipo

More information

University Network Engineering Professional Teaching Model Han You-qian 1,a, Xuxiu 2,a

University Network Engineering Professional Teaching Model Han You-qian 1,a, Xuxiu 2,a University Network Engineering Professional Teaching Model Han You-qian 1,a, Xuxiu 2,a Dept. of China mining university college of computer science and technology(cumt), Jiangsu Xuzhou, 221116 (xuxiu@cumt.edu.cn)

More information

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009 Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009 Conceitos de Redes e Arquitecturas - Networks and Architectures

More information

Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications

Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications Sarhan M. Musa Mahamadou Tembely Matthew N. O. Sadiku Pamela H. Obiomon

More information

OPNET - Network Simulator

OPNET - Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET - Network Simulator Jarmo Prokkola Project Manager, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks Res. Lett. Inf. Math. Sci., 2005, Vol. 7, pp 19-27 19 Available online at http://iims.massey.ac.nz/research/letters/ Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN

Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN ENSC 427 Communication Networks Final Project Report Spring 2014 Analysis and Simulation of VoIP Team #: 2 Kadkhodayan Anita (akadkhod@sfu.ca, 301129632) Majdi Yalda (ymajdi@sfu.ca, 301137361) Namvar Darya

More information

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

USING OPNET TO SIMULATE THE COMPUTER SYSTEM THAT GIVES SUPPORT TO AN ON-LINE UNIVERSITY INTRANET

USING OPNET TO SIMULATE THE COMPUTER SYSTEM THAT GIVES SUPPORT TO AN ON-LINE UNIVERSITY INTRANET USING OPNET TO SIMULATE THE COMPUTER SYSTEM THAT GIVES SUPPORT TO AN ON-LINE UNIVERSITY INTRANET Norbert Martínez 1, Angel A. Juan 2, Joan M. Marquès 3, Javier Faulin 4 {1, 3, 5} [ norbertm@uoc.edu, jmarquesp@uoc.edu

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network. Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

Lesson 24 Network Fundamentals

Lesson 24 Network Fundamentals Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Describe a network. Explain the benefits of a network. Identify the risks of network computing. Describe

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia

Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia 22nd EUROPEAN CONFERENCE ON OPERATIONAL RESEARCH Prague, July 8 11, 2007 Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia

More information

Construction and Implementation of Innovation Computer Network Practical Teaching System

Construction and Implementation of Innovation Computer Network Practical Teaching System I.J. Education and Management Engineering 2011, 2, 30-35 Published Online August 2011 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2011.02.05 Available online at http://www.mecs-press.net/ijeme

More information

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

Network Design and Architecture

Network Design and Architecture Architectures For Convergence Gary Audin Gary Audin is president of Delphi, Inc. consultancy. He has been an independent communications and security consultant for 25 years. Which definition of Convergence

More information

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.

More information

Enlarge Bandwidth of Multimedia Server with Network Attached Storage System

Enlarge Bandwidth of Multimedia Server with Network Attached Storage System Enlarge Bandwidth of Multimedia Server with Network Attached Storage System Dan Feng, Yuhui Deng, Ke Zhou, Fang Wang Key Laboratory of Data Storage System, Ministry of Education College of Computer, Huazhong

More information

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

Keywords Wimax,Voip,Mobility Patterns, Codes,opnet

Keywords Wimax,Voip,Mobility Patterns, Codes,opnet Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effect of Mobility

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

CCNA. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included) Course Duration: 5 Days

CCNA. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included) Course Duration: 5 Days CCNA The Cisco Certified Network Associate (CCNA) course consists of days 1 to 5 of the Cisco Networking Academy Programme. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included)

More information

Lab 4.5.4 Diagramming External Traffic Flows

Lab 4.5.4 Diagramming External Traffic Flows Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1

More information

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

Connection Services. Hakim S. ADICHE, MSc

Connection Services. Hakim S. ADICHE, MSc Connection Services Hakim S. ADICHE, MSc adiche@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Connection Services Different connectivity

More information

WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska

WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska WANs and Routers M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska 1 Introduction to WANs A WAN is a data communications network that spans a large geographic area such as a state, province, or country.

More information

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

DEVELOPMENT OF A WEB-BASED WIRELESS TELEMONITORING SYSTEM FOR AGRO- ENVIRONMENT

DEVELOPMENT OF A WEB-BASED WIRELESS TELEMONITORING SYSTEM FOR AGRO- ENVIRONMENT DEVELOPMENT OF A WEB-BASED WIRELESS TELEMONITORING SYSTEM FOR AGRO- ENVIRONMENT Keming Du 1, Zhongfu Sun 1,*, Huafeng Han 1, Shuang Liu 1 1 Institute of Environment and Sustainable Development in Agriculture(IEDA),

More information

Wireless LAN Services for Hot-Spot

Wireless LAN Services for Hot-Spot Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute wychoi53@etri.re.kr ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol

More information

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 Chengcheng.li@uc.edu ABSTRACT

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2662 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Voice Over IP CTS 2655 and CNT 2102 with grade

More information

ENSC 427: COMMUNICATION NETWORKS Simulation and Analysis of Wi-Fi Performance in campus network

ENSC 427: COMMUNICATION NETWORKS Simulation and Analysis of Wi-Fi Performance in campus network ENSC 427: COMMUNICATION NETWORKS Simulation and Analysis of Wi-Fi Performance in campus network Group No. 1 Chang, Zheng (Matt) zchang@sfu.ca Tao, Yigang (Yi Gang) ygt@sfu.ca Wen, Haoxian (Colman) cwen@sfu.ca

More information

The Research on Industrial Information Monitoring System Based on B/S Structure Xuexuan ZHU1, a

The Research on Industrial Information Monitoring System Based on B/S Structure Xuexuan ZHU1, a 4th National Conference on Electrical, Electronics and Computer Engineering (NCEECE 2015) The Research on Industrial Information Monitoring System Based on B/S Structure Xuexuan ZHU1, a 1 College of Electrical

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

Computer Networks CCNA Module 1

Computer Networks CCNA Module 1 Chapter 1: Quiz 1 Q1: Which statement describes a network that supports QoS? The fewest possible devices are affected by a failure. The network should be able to expand to keep up with user demand. The

More information

Lab 4.5.2 Diagramming Intranet Traffic Flows

Lab 4.5.2 Diagramming Intranet Traffic Flows Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1

More information

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,

More information

Network support for tele-education

Network support for tele-education Network support for tele-education Aiko Pras Centre for Telematics and Information Technology University of Twente (UT) http://wwwtios.cs.utwente.nl/~pras This paper discusses the state of the art in networking,

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

51-10-50 Circuit-Switched Router Connections Nathan J. Muller

51-10-50 Circuit-Switched Router Connections Nathan J. Muller Previous screen 51-10-50 Circuit-Switched Router Connections Nathan J. Muller Payoff LAN managers will find that routers supporting dial backup, bandwidth-on-demand, and dial-on-demand enable more flexible

More information

Available online at www.sciencedirect.com Available online at www.sciencedirect.com

Available online at www.sciencedirect.com Available online at www.sciencedirect.com Available online at www.sciencedirect.com Available online at www.sciencedirect.com Physics Physics Procedia Procedia 00 (2011) 24 (2012) 000 000 2293 2297 Physics Procedia www.elsevier.com/locate/procedia

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

WIDE AREA NETWORKS: A COMPARISON OF DIFFERENT APPROACHES FOR HANDS-ON LABS

WIDE AREA NETWORKS: A COMPARISON OF DIFFERENT APPROACHES FOR HANDS-ON LABS WIDE AREA NETWORKS: A COMPARISON OF DIFFERENT APPROACHES FOR HANDS-ON LABS Dr. Rami Khasawneh, Chair, Department of Information Technology Management, Lewis University, khasawra@lewisu.edu Dr. Rad Alrifai,

More information

Specialized Programme on Internetworking Design and LAN WAN Administration

Specialized Programme on Internetworking Design and LAN WAN Administration Specialized Programme on Internetworking Design and LAN WAN Administration A. NAME OF INSTITUTE Centre For Development of Advanced Computing B. NAME/TITLE OF THE COURSE C. COURSE DATES WITH DURATION IN

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CET 2600 COURSE TITLE: Network Fundamentals PREREQUISITE(S): CTS 1131 and CTS 1133 COREQUISITE(S): STUDENT

More information

Virtual Server in SP883

Virtual Server in SP883 Virtual Server in SP883 1 Introduction: 1.1 Micronet SP883 is a hard QoS broadband router, means its guaranteed service can provide absolute reservation of resource (bandwidth) for specific traffic;not

More information

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009 Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their

More information

Service Level Analysis of Video Conferencing over Wireless Local Area Network

Service Level Analysis of Video Conferencing over Wireless Local Area Network Service Level Analysis of Video Conferencing over Wireless Local Area Network B.O. Sadiq, E. Obi, A.S. Abubakar, Y. Ibrahim & S. Saidu Department of Electrical and Computer Engineering Ahmadu Bello Unicersity

More information

COURSE NUMBER: CTS 2371

COURSE NUMBER: CTS 2371 Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2371 COURSE TITLE: Virtual Infrastructure: Deployment, Security, and Analysis PREREQUISITE(S): CTS

More information

270125 - TXC - Computer Network Technology

270125 - TXC - Computer Network Technology Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 701 - AC - Department of Computer Architecture Academic year: Degree: 2015 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

Network Attack Platform

Network Attack Platform Design and Implementation of a Network Attack Platform Based on Plug-in Technology Li Gen, Wang Bailing *, Liu Yang, Bai Xuefeng and Yuan Xinling Department of Computer Science & Technology Harbin Institute

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

Technology Brief. Implementing DSL Service for ISPs with the SMS. The DSL Opportunity. DSL is Different from Dial

Technology Brief. Implementing DSL Service for ISPs with the SMS. The DSL Opportunity. DSL is Different from Dial Technology Brief Implementing DSL Service for ISPs with the SMS The DSL Opportunity Digital Subscriber Line (DSL) services represent a major opportunity for dialup-based Internet Service Providers (ISPs)

More information

NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT

NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT 1 MOHD NAZRI ISMAIL, 2 ABDULLAH MOHD ZIN 1 Faculty of MIIT, University of Kuala Lumpur (UniKL), Malaysia 2 Faculty of FTSM, University

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Cisco Networking Professional-6Months Project Based Training

Cisco Networking Professional-6Months Project Based Training Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH

More information

Management Information Systems

Management Information Systems Management Information Systems Basics of the Internet Dr. Shankar Sundaresan (Adapted from Introduction to IS, Rainer and Turban) Internet Basics Outline Internet History Internet Structure Switching Methods

More information

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private

More information

VOICE OVER IP AND NETWORK CONVERGENCE

VOICE OVER IP AND NETWORK CONVERGENCE POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE

NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE RIVIER ACADEMIC JOURNAL, VOLUME 3, NUMBER 1, SPRING 2007 NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE Arti Sood * Graduate Student, M.S. in Computer Science Program, Rivier College Abstract

More information