NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT
|
|
|
- Ashlee Marianna Black
- 10 years ago
- Views:
Transcription
1 NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT 1 MOHD NAZRI ISMAIL, 2 ABDULLAH MOHD ZIN 1 Faculty of MIIT, University of Kuala Lumpur (UniKL), Malaysia 2 Faculty of FTSM, University of Kebangsaan Malaysia (UKM), Malaysia [email protected], [email protected] ABSTRACT This paper presents a complete network analyzer development for network delay in campus environment. The purpose of this study is to define the accuracy of network analyzer development with independent data, real network and OPNET simulation tool. The network delay will measure based on transmission delay and propagation delay. This network analyzer software will test on delay generated by the several services. The reliability of this network analyzer will test with , text messaging and instant messaging over web service. The results show that network analyzer software has accuracy and same trend delay with independent data, real network and OPNET simulation tool. Finally, this software is able to measure the network delay during preparation, proposal and planning phases. Keywords: Accuracy, Traffic, Analyzer, OPNET 1. INTRODUCTION This study focuses on the accuracy of network delay using heterogeneous services. This study does not intend to perform a comprehensive test the functionality of all simulator and analyzer features. OPNET has originally been developed for network simulation and it is fully usable as a robust and reliability simulation tool with higher investment. This network analyzer development process has discussed detail in [1], [2], [3]. Table 1.1 shows service performance requirement for several services. Service performance requirement consists of delay, capacity (bandwidth) and reliability [4]. Reliability is a measure of the network/system ability to provide deterministic and accurate delivery of information [5], [6]. Delay is a time difference in transmitting a single unit of information (bit, byte, cell, frame, and packet) from source to destination. Table 1.1 Service Performance Requirements 2. DEFINITION OF NETWORK ANALYZER A network analyzer also called a "packet analyzer," "traffic analyzer" and "protocol analyzer," [7]. analyzers functionality such as [8]: i) provide detailed statistics for current and recent activity on the network; ii) detect unusual levels of network traffic; iii) detect unusual packet characteristics; iv) identify packet sources or destinations; v) configure alar for defined threats; vi) and vii) monitor bandwidth utilization. Management: management consists of a variety of tasks, for example, monitoring, configuration, troubleshooting and planning that are performed by users and network administrators [9]. element is a component of the network that can be managed. This includes hosts, routers, switches, hubs and server that can be measured. Examples of end-toend characteristics for network elements and network traffic are capacity (bandwidth), availability, delay, jitter, throughput, network utilization and error rates [10], [11]. 3. METHODOLOGY Figure 3.1 shows network life cycle approach for technologies and services implementation in the future [12]. life cycle approach consists 9
2 of six phases such as prepare, plan, design, implement, operate and optimize. This network analyzer development concentrates more on preparation, planning and proposal areas. Figure 3.1: Comparison of Analyzer, OPNET and Real analyzer development is based on mathematical model. We use queuing theory M/M/1 to build this software [13], [14]. This software was developed to measure and plan network activities such as predict usage of network delay. (refer to Figure 3.2). The reliability test will only concentrate on network delay. Figure 3.3: Analyzer Accuracy Testing Process Figure 3.4: Input Parameters for Analyzer, OPNET and Real 4. ANALYSIS AND RESULTS Figure 3.2: Analyzer Modules Development Figure 3.3 shows network delay reliability test. The independent data output is generated based on number of distance input, number of nodes input, size of bandwidth input and size of services input. These inputs will use in OPNET, real network and network analyzer software (refer to Figure 3.4). We conduct three experiments to confirm the reliability of network delay via independent data, OPNET application and real network. In our experiments, we will test , instant messaging and text messaging over web service. The network delay will measure based on transmission delay and propagation delay. Other delay will not consider in network analyzer development. Figure 4.1 show the network delay measurement performance via network analyzer software design, OPNET application design and 10
3 real network design. Table 4.1 shows input for independent data for single user that will be used in network analyzer software, OPNET application and real network [15]. The following diagram output shows network delay over different packet size for single user (refer to Figure 4.2, Figure 4.3 and Figure 4.4). Figure 4.1: Design for Reliability Test Table 4.1: Inputs for Independent Data to Evaluate Delay Figure 4.2: Delay for 100 Bytes Types of Services (Low) Instant Messaging (Low) Text Messaging (Low) Size of Services Estimation 1000 Bytes 500 Bytes 100 Bytes 4.1 Independent Data Delay In our network delay experiment, independent data is used to measure network delay (transmission and propagation delay) reliability between network analyzer development, OPNET application and real network. Project conducted by David Grangier, Institut Eurecom, France, is selected to use as independent data [16] (refer to Figure 4.1 and Table 4.2). Figure 4.3: Delay for 500 Bytes Figure 4.4: Delay for 1000 Bytes Figure 4.1: Sample of Independent Data Input Table 4.2: Independent Data Input Input to Measure Delay Length Rate (KM) (Mbps) and Delay (Propagation and Transmission Delay) Packet size (Bytes) 4.2 OPNET Application Delay Figure 4.3 shows OPNET design via different of packet size over local area network. Only one user will test on the reliability of network analyzer development with OPNET application and independent data. Size of , instant messaging and text messaging over web service will configure in OPNET application (refer to Figure 4.4, Figure 4.5 and Figure 4.6) then it will simulate the scenario and measure the network delay performance. 11
4 The results show that OPNET application generates as follow network delay: i) 100 bytes sec/ to sec/0.1; ii) 500 bytes sec/0.05 to sec/0.15; and iii) 1000 bytes sec/0.075 to sec/0.17 (refer to Figure 4.7, Figure 4.8 and Figure 4.9). Figure 4.3: OPNET Application: Delay Design Figure 4.4: Size of Text Messaging Configuration over Web Service Figure 4.7: Delay for Text Messaging Figure 4.5: Size of Instant Messaging Configuration over Web Service Figure 4.8: Delay for Instant Messaging (500 bytes) Figure 4.6: Size of Configuration over Web Service Figure 4.9: Delay for (1000 bytes) 12
5 4.3 Analyzer Development Delay Then, network analyzer development will configure using the same input from independent data and OPNET application. First experiment will configure 5 km and second experiments will configure 10 km. The network analyzer development shows network delay results for 5 km (refer to Figure 4.10) and 10 km (refer to Figure 4.11). Real network environment has configured to enable network delay over LAN. The , text messaging and instant messaging traffic will pump using fluke network analyzer to the server. management tool such as ColaSoft Capsa and Visualware application are used to capture network delay. Figure 4.12 shows real network traffic for 100 bytes use by text messaging service that has received by the client. Table 4.3, Table 4.4 and Table 4.5 show network delay results generate by Visualware as follow: i) 100 bytes 0; ii) 500 bytes 0 to 1 ; and iii) 1000 bytes 0 to 2. Figure 4.10: Delay for 5 KM Figure 4.14: Real Delay for 100 Bytes (Text Messaging) 4.4 Real Delay Figure 4.11: Delay for 10 KM Table 4.3: Delay Text Messaging (100 Bytes) 13
6 Hops Loss IP Name Avg Min Max lect-mohdnazri.unikl.edu.my [Local ] MIIT-ADIDAHLAJI [Local ] Table 4.4: Delay Instant Messaging (500 Bytes) Hops Loss IP Name Avg Min Max lect-mohdnazri.unikl.edu.my [Local ] [Local ] [Local ] Table 4.5: Delay (1000 Bytes) Hops Loss IP Name Avg Min Max lect-mohdnazri.unikl.edu.my [Local ] [Local ] [Local ] We conclude all our findings in Table 4.6 and Table 4.7. The results generate from network analyzer is closely resemble with OPNET application, real network and independent data. Again, it is confirm and proof that network analyzer development is able to predict and plan network delay usage for heterogeneous services. Table 4.6: Delay - Reliability of Analyzer Development between Opnet, Independent Data and Real Table 4.7: Delay - Reliability of Analyzer Development between Opnet, Independent Data and Real 5. CONCLUSION Today's networking environment has become very complex. s have been growing in size rapidly and support complex applications. Even, our network analyzer development can determine and solve proble for homogenous and heterogeneous services in LAN and WAN. The results show that network analyzer development is able to measure and analyze 14
7 approximately same as OPNET simulation tool, independent data and real network for network delay. This network analyzer development can use to measure and analyze network delay behavior for preparation and planning purposes. In addition, it is easy to use and provide a userfriendly graphical and text interface. REFRENCES: [1] M. Fleury, G. Flores Lucio, and M. J. Reed. Clarification of the OPNET NS-2 Comparison Paper with. regards to OPNET Modeler. ET-NS2_Comparison.pdf, accessed 9/9/2008. [2] Brown K, Christianson L, OPNET Lab Manual to Accompany Data and Computer Communications 7th ed. And Computer ing with Internet Protocols and Technology 4th ed. by William Stallings, Pearson Prentice Hall, Upper Saddle River, NJ, [3] Xinjie Chang Simulations With OPNET. Proceedings of the 1999 Winter Simulation Conference P. A. Farrington, H. B. Nembhard, D. T. Sturrock, and G. W. Evans, eds. [4] James D. McCabe. Practical Computer Analysis and Design, pp , 1998, Morgan Kaufmann Publishers. [5] Michael R. Lyu. Software Reliability Engineering: A Roadmap, International Conference on Software Engineering, pp , [6] Abdullah Konak. Combining network reductions and simulation to estimate network reliability, Proceedings of the 39th conference on Winter simulation, pp , [Oktober 11, 2009] [7] Victor A. Clincy & Nael Abu-Halaweh A Taxonomy of free Sniffers for teaching and research, Source Journal of Computing Sciences in Colleges Vol. 21(1), pp [8] J. P. Talledo Design and Implementation of an Ethernet Frame Analyzer for High Speed s, Proceedings of the 15th International Conference on Electronics, Communications and Computers, Publisher IEEE Computer Society pp [9] Jairo A. Gutiérrez. A connectionless approach to integrated network management, International Journal of Management Vol. 8(4), pp , 1998, John Wiley & Sons, Inc. New York, NY, USA [10] Faouzi Kamoun. Toward best maintenance practices in communications network management, International Journal of Management,Vol. 15(5), pp , 2005, John Wiley & Sons, Inc. New York, NY, USA [11] A.S. Sethi. Bibliography on network management, ACM SIGCOMM Computer Communication Review, Vol. 19(3), pp , [12] Cisco s Cisco s Life Cycle Services Approach, Cisco ers Conference 07, Januari 2007, Sunway Pyramid, Malaysia. [13] Mohd Nazri Ismail, Abdullah Mohd Zin, "Comparing the Accuracy of End-to-End Performance Measurement Testbed and Simulation Model for Data Transfers in Heterogeneous Environment," a, pp , IEEE, Second Asia International Conference on Modelling & Simulation (AMS), [14] Mohd Nazri Ismail and Abdullah Mohd Zin. Development of Simulation Model in Heterogeneous Environment: Comparing the Accuracy of Simulation Model for Data Transfers Measurement over Wide Area. Asian for Scientific Information. Information Technology Journal, pp. 2448, ISSN: (Print). Pakistan. [15] Hans Lohninger. Wireless ing in the Developing World, January 2007, [Online access], wndw_05_07.html [16] David Grangier. Transmission versus Propagation Delay, Eurecom Institute, [Online access], ~liu/kebin/applet1/delay.htm 15
NETWORK DELAY: NETWORK ANALYZER AND OPNET SIMULATION TOOL
NETWORK DELAY: NETWORK ANALYZER AND OPNET SIMULATION TOOL SANDHYARANI.S CHANDRASEKHAR.G Department of Computer Science and Engineering Joginpally B.R Engineering college Moinabad 500075 Abstract This paper
CHARACTERISTICS AND FUNCTIONALITY OF EMULATION NETWORK ANALYZER AND HARDWARE NETWORK ANALYZER
CHARACTERISTICS AND FUNCTIONALITY OF EMULATION NETWORK ANALYZER AND HARDWARE NETWORK ANALYZER 1 Mohd Nazri Ismail and 2 Abdullah Mohd Zin 1 Faculty of MIIT, University of Kuala Lumpur, Malaysia 2 Faculty
Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone
The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010 343 Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone Mohd Ismail Department
Evaluating the Performance and Accuracy of Network Traffic Management via Simulation Modelling in Heterogeneous Environment
30 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.3, March 2008 Evaluating the Performance and Accuracy of Network Traffic Management via Simulation Modelling in Heterogeneous
Implementation of Video Voice over IP in Local Area Network Campus Environment
Implementation of Video Voice over IP in Local Area Network Campus Environment Mohd Nazri Ismail Abstract--In this research, we propose an architectural solution to integrate the video voice over IP (V2oIP)
Optimization of Computer Network for Efficient Performance
International Journal of Computer Networks and Communications Security VOL. 3, NO. 10, OCTOBER 2015, 396 402 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Optimization
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
VoIP Performance Over different service Classes Under Various Scheduling Techniques
Australian Journal of Basic and Applied Sciences, 5(11): 1416-1422-CC, 211 ISSN 1991-8178 VoIP Performance Over different service Classes Under Various Scheduling Techniques Ahmad Karim Bahauddin Zakariya
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications
Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications Sarhan M. Musa Mahamadou Tembely Matthew N. O. Sadiku Pamela H. Obiomon
Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN
ENSC 427 Communication Networks Final Project Report Spring 2014 Analysis and Simulation of VoIP Team #: 2 Kadkhodayan Anita ([email protected], 301129632) Majdi Yalda ([email protected], 301137361) Namvar Darya
EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP
Scientific Bulletin of the Electrical Engineering Faculty Year 11 No. 2 (16) ISSN 1843-6188 EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Emil DIACONU 1, Gabriel PREDUŞCĂ 2, Denisa CÎRCIUMĂRESCU
Measuring the Performance of VoIP over Wireless LAN
Measuring the Performance of VoIP over Wireless LAN Keshav Neupane, Student Victor Kulgachev, Student Department of Computer Science Northern Kentucky University Highland Heights, KY, USA, 41099 [email protected]
Keywords Wimax,Voip,Mobility Patterns, Codes,opnet
Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effect of Mobility
Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks
Res. Lett. Inf. Math. Sci., 2005, Vol. 7, pp 19-27 19 Available online at http://iims.massey.ac.nz/research/letters/ Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks
The Analysis and Simulation of VoIP
ENSC 427 Communication Networks Spring 2013 Final Project The Analysis and Simulation of VoIP http://www.sfu.ca/~cjw11/427project.html Group #3 Demet Dilekci [email protected] Conrad Wang [email protected] Jiang
USING OPNET TO SIMULATE THE COMPUTER SYSTEM THAT GIVES SUPPORT TO AN ON-LINE UNIVERSITY INTRANET
USING OPNET TO SIMULATE THE COMPUTER SYSTEM THAT GIVES SUPPORT TO AN ON-LINE UNIVERSITY INTRANET Norbert Martínez 1, Angel A. Juan 2, Joan M. Marquès 3, Javier Faulin 4 {1, 3, 5} [ [email protected], [email protected]
Simulation of SIP-Based VoIP for Mosul University Communication Network
Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems http://dx.doi.org/10.12785/ijcds/020205 Simulation of SIP-Based VoIP for Mosul University Communication
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
A Policy-Based Admission Control Scheme for Voice over IP Networks
Journal of Computer Science 5 (11): 817-821, 2009 ISSN 1549-3636 2009 Science Publications A Policy-Based Admission Control Scheme for Voice over IP Networks Sami Alwakeel and Agung Prasetijo Department
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security
Comparative Analysis of Congestion Control Algorithms Using ns-2
www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,
Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements
Outline Lecture 8 Performance Measurements and Metrics Performance Metrics Performance Measurements Kurose-Ross: 1.2-1.4 (Hassan-Jain: Chapter 3 Performance Measurement of TCP/IP Networks ) 2010-02-17
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simulation Environment
International Journal of Research in Electronics ISSN : 2348-9065 (Online) Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simulation Environment I Dhobale J V, II Dr. Kalyankar
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
Application Performance Analysis and Troubleshooting
Exam : 1T6-520 Title : Application Performance Analysis and Troubleshooting Version : DEMO 1 / 6 1. When optimizing application efficiency, an improvement in efficiency from the current 90% to an efficiency
SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
In this paper we compared the performance of VPN using
Study the Best Approach for Virtual Private Network Implementation: CPU and Memory Usage Performance Mohd Nazri Ismail Department of MIIT, University of Kuala Lumpur (UniKL), Malaysia [email protected]
Performance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Recovery Modeling in MPLS Networks
Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
QoS (Quality of Service)
QoS (Quality of Service) QoS function helps you to control your network traffic for each application from LAN (Ethernet and/or Wireless) to WAN (Internet). It facilitates you to control the different quality
Traffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE. M. Amir Mehmood
Traffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE M. Amir Mehmood Outline Background Pakistan Internet Exchange - PIE Motivation Preliminaries Our Work
H.323 Traffic Characterization Test Plan Draft Paul Schopis, [email protected]
H.323 Traffic Characterization Test Plan Draft Paul Schopis, [email protected] I. Introduction Recent attempts at providing Quality of Service in the Internet2 community have focused primarily on Expedited
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Measure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
Performance Analysis Of Active Queue Management (AQM) In VOIP Using Different Voice Encoder Scheme
Performance Analysis Of Active Queue Management (AQM) In VOIP Using Different Voice Encoder Scheme Samir Eid Mohammed, Mohamed H. M. Nerma Abstract: Voice over Internet Protocol (VoIP) is a rapidly growing
Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks
ENSC 427: Communication Network Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks Simon Fraser University - Spring 2012 Claire Liu Alan Fang Linda Zhao Team 3 csl12 at sfu.ca
Performance Evaluation for VOIP over IP and MPLS
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 3, 110-114, 2012 Performance Evaluation for VOIP over IP and MPLS Dr. Reyadh Shaker Naoum Computer Information
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
VOIP under: WLAN 802.11g. VS Telephone Landline. ENSC 427 Team 1 Luke Dang [email protected] Jason Tsai [email protected] Jeffrey Tam jta6@sfu.
VOIP under: WLAN 802.11g and Ethernet connection VS Telephone Landline ENSC 427 Team 1 Luke Dang [email protected] Jason Tsai [email protected] Jeffrey Tam [email protected] Project Website: www.sfu.ca/~kta2 2 Introduction
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
Home Networking Evaluating Internet Connection Choices for a Small Home PC Network
Laboratory 2 Home Networking Evaluating Internet Connection Choices for a Small Home PC Network Objetive This lab teaches the basics of using OPNET IT Guru. OPNET IT Guru s user-friendly interface with
When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING. www.pecb.com
When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING www.pecb.com Imagine a working environment comprised of a number of switches, routers, some terminals and file servers. Network
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University
ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks
ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi ([email protected]) Ehsan Arman ([email protected]) http://www.sfu.ca/~faa6
The Impact of QoS Changes towards Network Performance
International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48 53 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) The Impact
Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
THE ANALYSIS AND SIMULATION OF VOIP
ENSC 427 Communication Networks Spring 2013 Final Project Presentation THE ANALYSIS AND SIMULATION OF VOIP Presented by Team #3: Demet Dilekci Conrad Wang Jiang Feng Xu [email protected] [email protected] [email protected]
Service Level Analysis of Video Conferencing over Wireless Local Area Network
Service Level Analysis of Video Conferencing over Wireless Local Area Network B.O. Sadiq, E. Obi, A.S. Abubakar, Y. Ibrahim & S. Saidu Department of Electrical and Computer Engineering Ahmadu Bello Unicersity
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
COMPARISON BASED ON VARIOUS PERFORMANCE PARAMETERS BETWEEN WIMAX AND LTE USING NS2
COMPARISON BASED ON VARIOUS PERFORMANCE PARAMETERS BETWEEN WIMAX AND LTE USING NS2 Prof. Tilottama Dhake 1, Pratik Gala 2, Keval Jain 3, Bhavesh Mayekar 4, Priyal Shah 5 Abstract: In telecommunications,
How To Compare Available Bandwidth On A Network With A Powerline To A Network On A Testbed On A Computer Or Network On An Ipad Or Ipad On A 2Mbb (Or Ipad) On A 4Ghz Network On The
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Path-F3: Improving Accuracy and Network Load in Available Estimation
Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network
Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Objective This lab teaches the basics of using OPNET IT Guru. We investigate application performance and capacity planning, by
Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is
CS326e Quiz 3 The first correct 10 answers will be worth 1 point each. Each subsequent correct answer will be worth 0.2 points. Circle the correct answer. UTEID In the following 7 problems, we are sending
Latency on a Switched Ethernet Network
Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency
MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY
MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY Nadher M. A. Al_Safwani, Suhaidi Hassan, and Mohammed M. Kadhum Universiti Utara Malaysia, Malaysia, {suhaidi, khadum}@uum.edu.my, [email protected]
Analysis of Mobile IP in Wireless LANs
ENSC 835: COMMUNICATION NETWORKS FINAL PROJECT PRESENTATIONS Spring 2011 Analysis of Mobile IP in Wireless LANs www.sfu.ca/~bshahabi Babak Shahabi ([email protected]( [email protected]) 301102998 Shaoyun Yang
Analysis of Performance of VoIP
ENSC 427 Communication Networks Analysis of Performance of VoIP Over various scenarios OPNET 14.0 Spring 2012 Final Report Group 11 Yue Pan Jeffery Chung ZiYue Zhang Website : http://www.sfu.ca/~ypa11/ensc%20427/427.html
The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET
The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET Abstract: Dr. Hussein A. Mohammed*, Dr. Adnan Hussein Ali**, Hawraa Jassim Mohammed* * Iraqi Commission
NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE
RIVIER ACADEMIC JOURNAL, VOLUME 3, NUMBER 1, SPRING 2007 NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE Arti Sood * Graduate Student, M.S. in Computer Science Program, Rivier College Abstract
Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547
Unit title: Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547 UNIT AIM AND PURPOSE Learners will gain an understanding
ITL Lab 5 - Performance Measurements and SNMP Monitoring 1. Purpose
Lab 5 - Performance Measurements and SNMP Monitoring 1 Purpose Before the Lab Measure the performance (throughput) of TCP connections Measure the performance of UDP connections; observe an RTP flow Examine
Bandwidth Measurement in xdsl Networks
Bandwidth Measurement in xdsl Networks Liang Cheng and Ivan Marsic Center for Advanced Information Processing (CAIP) Rutgers The State University of New Jersey Piscataway, NJ 08854-8088, USA {chengl,marsic}@caip.rutgers.edu
Performance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for Real-time Applications
Middle-East Journal of Scientific Research 12 (11): 1502-1508, 2012 ISSN 1990-9233 IDOSI Publications, 2012 DOI: 10.5829/idosi.mejsr.2012.12.11.144 Performance Comparison of Mixed Protocols Based on EIGRP,
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Department of MIIT, University of Kuala Lumpur (UniKL), Malaysia [email protected]
Analyzing of MOS and Codec Selection for Voice over IP Technology Mohd Nazri Ismail Department of MIIT, University of Kuala Lumpur (UniKL), Malaysia [email protected] ABSTRACT. In this research,
Java Based VoIP Performance Monitoring Tool
, October 20-22, 2010, San Francisco, USA Java Based VoIP Performance Monitoring Tool Husna Zainol Abidin, Mohd Ameer Yuslan Razmi, Farah Yasmin Abdul Rahman, Ihsan Mohd Yassin Abstract This paper describes
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Exam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
The Advantages of Using EIGRP on an Enterprise Network
The Advantages of Using EIGRP on an Enterprise Network By Randy Patrick Submitted to the Faculty of the Information Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor
Chapter Thirteen. Network Design and Management. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Thirteen Network Design and Management Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Recognize the systems
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Simulation Study on Internet Applications over DSL Access Network: KFUPM Campus as an Example
Simulation Study on Internet Applications over DSL Access Network: KFUPM Campus as an Example Uthman Baroudi, Saeed Bawazir and Wael Hamri Computer Engineering Department KFUPM, Dhahran Saudi Arabia Email:
A Test-Bed for Network Performance Evaluation Of IPv4 and IPv6 in Network Layer Protocol
A Test-Bed for Network Performance Evaluation Of IPv4 and IPv6 in Network Layer Protocol Mohamed Salah ahmed Department of Networking, Faculty of Creative Media and Innovative Technology, Infrastructure
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
A Network Simulation Experiment of WAN Based on OPNET
A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,[email protected] *2
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
