OPNET SP GURU TRANSPORT PLANNER GRADUATE PROJECT WAN/ LAN PLANNIG AND DESIGN
|
|
|
- Jasmine Neal
- 9 years ago
- Views:
Transcription
1 OPNET SP GURU TRANSPORT PLANNER GRADUATE PROJECT WAN/ LAN PLANNIG AND DESIGN ROHIT KARHU DATE 04/29/2013
2 TABLE OF CONTENTS 1. INTRODUCTION SCENARIO'S DESIGN TOPOLOGIES (UNPROTECTED) TOPOLOGIES (PROTECTED) SCENARIO COMPARISON TOOL CONCLUSION REFERENCES... 60
3 1. INTRODUCTION "OPNET was Alain Cohen's (co founder and current CTO & President) graduate project for a networking course while he was at MIT. OPNET stood for Optimized Network Engineering Tools. Alain, along with brother Marc (co founder and current CEO & Chairman) and classmate Steven Baraniuk, decided to commercialize the software [1] ". The goal of this graduate project is to explore and learn OPNET SP Guru Transport Planner which is used to simulate optical networks. This report shows design and simulation of different topologies using OPNET and how OPNET is used to compare the performance characteristics of optical network, thereby one can figure out most effective or least costly network. Now to learn this tool in great detail, various topologies are designed and simulated and compared / analyzed and for the purpose of this exercise following example is considered: Bank of America wants to expand their business internationally as well as they want major cities within United States to be connected to international cities and form a network. They have approached Time Warner for the solution and proposed that they should design various network topologies and respective performance of each topology so that it will be easier for Bank of America to decide most effective network. Now, the network engineer from Time Warner will make use of OPNET to design the Network and will show the results of designed networks to the Bank based on the results he will get from OPNET. The following cities needs to be connected: Cities within USA: a) Los Angeles b) Dallas c) Miami d) Minneapolis e) Denver f) Raleigh International Cities: a) Mexico City b) Havana c) Vancouver d) Ottawa
4 2. SCENARIO'S Considering main goal of this graduate project, there are two scenario's defined in this project: Unprotected Protected (1 + 1 Path Protection) And in each category various topologies are defined i.e. In Unprotected, Star, Multilink and Fully Meshed topologies are designed. In Protected, Multilink i.e. Hybrid topology and Totally Meshed topology. The topologies which are considered are as below: I. Star Topology II. Totally Meshed Topology
5 III. Multilink Topology 3. DESIGN Once the topology is designed in OPNET, following network properties and other aspects are defined for each topology. SONET systems and optical transparency in Opaque mode is considered while designing each topology. All distances are in miles : 3.1 Topology A) Network Properties I) Network Topology II) Link Design III) Link Threshold IV) Delay Settings V) Network Availability B) Traffic I) Traffic Matrix II) Traffic Dimensioning III) Routing Results IV) Traffic Variation C) Network Cost I) Node and Link Cost
6 D) Web Reports E) Failure Analysis I) Link failure II) Node failure 3.2 Scenario Comparison A) Between Unprotected and Protected Totally meshed topologies B) Between Unprotected and Protected Multilink topologies C) Between all topologies 4. TOPOLOGIES (UNPROTECTED) For the purpose of this project following topologies are designed. All are designed in unprotected mode: 4.1 Star Topology For star topology, Dallas is selected as central node Network Diagram
7 4.1.2 Topology Info The topology info states that there are total 10 nodes, 9 links and connectivity is 20% and some aspects like link capacity and cable length info can be learnt from the screen above Network Availability
8 The network availability is set to % for cables, line systems and nodes, including optical amplifiers, regenerators, patch panel and OTS, OMS nodes Delay Settings Global delay settings is set to ms/mile.
9 4.1.5 Network Properties SONET technology is selected. For OCH layer Opaque mode is chosen. The default bit rate for DCL link is set to OC 192 since its common bit rate in use. Network properties are set as following screen:
10 4.1.6 Link Usage Threshold The link usage threshold is set to 50% considering 50% link utilization criteria, the most important aspect while designing links for a network Traffic Matrix While designing traffic matrix random traffic utility of OPNET is selected and traffic is generated from 15 to 50.
11 4.1.8 Link Design Please see below the details of link design results, It gives information about number of regenerators used, OA sites added and cable length per link.
12 4.1.9 Traffic Dimensioning Since topology is designed for unprotected network, Unprotected is selected. Optical node & link utilization is set to 50%. The settings for dimensioning the network are as shown & selecting generate web report creates a web report and displays results of dimensioning:
13 Routing Results We got link utilization at OCH layer as 48.62%. The mean hop is Traffic Variations
14 Under traffic variation, 20% increase in traffic is added and analyzed the results. For star topology link utilization is increased from 48.6% to 49.9% but being a star topology not 100% but 85.8% traffic is routed Network Cost Network cost is calculated separately for link, node and total cost of the network. Also bill report generator utility is also tested which gives very detailed information about each and every aspect of the network. Please refer to the screens below (To avoid redundancy all screens related to cost are not posted): Link Failure Analysis For link failure analysis, two links are failed between Dallas to Minneapolis and Dallas to Los Angeles and the number of wavelengths that are failed are calculated. For this scenario out of 1513, 482 wavelengths are lost i.e % and none are recovered as the network is unprotected. Please refer the screens below:
15
16 Node Failure Analysis Especially for node analysis of star topology two types of node failures are carried out 1) Central node failure 2) Other nodes failure. Similar to link failure the percentage loss for case 1 is 100%, as the traffic cant flow if the central node fails and for second case wavelength loss is (526 are lost out of 1513). Please refer to the screenshots below. Also a screenshot of network topology at OCH layer view is included which represent optical line systems and cross connects, as it shows failed lines in orange color. 1) Mid node failure:
17 2) Other Node Failure ( Ottawa and Vancouver)
18 OCH Layer View 4.2 Totally Meshed Topology In this topology all the nodes are connected to each other. There are total 10 sites in this network which means the total number of links present are 10*9 / 2 =45 links. In this topology we'll see the network settings, traffic parameters and failure analysis of links as well as of nodes Network Diagram The network diagram for totally meshed network is shown below, which shows how each and every node is connected to each other, meaning there are 9 links from each and every node of the network.
19 4.2.2 Topology Info The topology info states that there are total 10 nodes, 45 links and connectivity is 100% (due to totally meshed network) and some aspects like link capacity and cable length info can be learnt from the screen below.
20 4.2.3 Network Availability The network availability is set to % for cables, line systems and nodes, including optical amplifiers, regenerators, patch panel and OTS, OMS nodes.
21 4.2.4 Delay Settings Global delay settings is set to ms/mile Network Properties SONET technology is selected. For OCH layer Opaque mode is chosen. Regenerate via DXS is checked. The default bit rate for DCL link is set to OC 192 since its common bit rate in use. Network properties are set as following screen
22 4.2.6 Link Usage Threshold The link usage threshold is set to 50% considering 50% link utilization criteria, the most important aspect while designing links for a network.
23 4.2.7 Traffic Matrix While designing traffic matrix random traffic utility of OPNET is selected and traffic is generated from 15 to Link Design Please see below the details of link design results, It gives related information about number of regenerators used, OA sites added and cable length per link. These are the settings used for designing the link, OTS links are chosen and regeneration locations is set to Mid Span.
24
25 4.2.9 Traffic Dimensioning Since topology is designed for unprotected network, Unprotected is selected. Optical node & link utilization is set to 50%. The settings for dimensioning the network are as shown & selecting generate web report creates a web report and displays results of dimensioning
26 Routing Results Please see below screen shot of routing results. We got link utilization at OCH layer as 48.33%. The mean hop is 1.1.
27 Traffic Variations Under traffic variation, 20% increase in traffic is added and analyzed the results. For totally meshed topology link utilization is increased from 48.3% to 50% and 84.7% traffic is routed Network Cost Network cost is calculated separately for link, node and total cost of the network. Also bill report generator utility is also tested which gives very detailed information about each and every aspect of the network. Please refer to the screens below:
28 Link Failure Analysis For link failure analysis, six links are failed as shown in topology below and the number of wavelengths that are failed are calculated. For this scenario out of 1562, 257 wavelengths are lost i.e % and none are recovered as the network is unprotected. Please refer the screens below:
29
30 Node Failure Analysis Similar to link failure 3 nodes are failed and out of 1562, 973 wavelengths are lost (62.29% loss) and none are recovered due to unprotected topology. Please refer to the screenshots below. Also a screenshot of network topology at OCH layer view is included which represent optical line systems and cross connects, it shows failed lines in orange color. Lots of links are failed as from each node there are 9 links that go to other sites.
31 OCH Layer view 4.3 Multilink Topology Multilink network is nothing but a hybrid network showing characteristics of two or more networks. The following topology is composed of ring and star topology. In this topology we'll first define the network parameters, define traffic on links, calculating cost and both node and link analysis is performed Network Diagram The network diagram for Multilink network is shown below. It consists of 10 sites out of which 8 sites form a ring from outer side and two sites inside the ring is forming a star network with adjacent sites.
32 4.3.2 Topology Info The topology info states that there are total 10 nodes, 19 links and connectivity is 42% (due to totally meshed network) and some aspects like link capacity and cable length info can be learnt from the screen below:
33 4.3.3 Network Availability The network availability is set to % for cables, line systems and nodes, including optical amplifiers, regenerators, patch panel and OTS, OMS nodes.
34 4.3.4 Delay Settings Global delay settings is set to ms/mile Network Properties SONET technology is selected. For OCH layer Opaque mode is chosen. Regenerate via DXS is checked. The default bit rate for DCL link is set to OC 192 since its common bit rate in use. Network properties are set as following screen
35 4.3.6 Link Usage Threshold The link usage threshold is set to 50% considering 50% link utilization criteria, the most important aspect while designing links for a network Traffic Matrix While designing traffic matrix random traffic utility of OPNET is selected and traffic is generated from 15 to 50.
36 4.3.8 Link Design Please see below the details of link design results, It gives information about number of regenerators used, OA sites added and cable length per link.
37 4.3.9 Traffic Dimensioning Since topology is designed for unprotected network, Unprotected is selected. Optical node & link utilization is set to 50%. The settings for dimensioning the network are as shown & selecting generate web report creates a web report and displays results of dimensioning Routing Results We got link utilization at OCH layer as 48.75%. The mean hop is 1.7
38 Traffic Variations Under traffic variation, 20% increase in traffic is added and analyzed the results. For star topology link utilization is increased from 48.8% to 49.9% and 85.9% traffic is routed Network Cost Network cost is calculated separately for link, node and total cost of the network. Also bill report generator utility is also tested which gives very detailed information about each and every aspect of the network. Please refer to the screens below:
39 Link Failure Analysis For link failure analysis, three links are failed as shown in topology below and the number of wavelengths that are failed are calculated. For this scenario out of 1418, 380 wavelengths are lost i.e % and none are recovered as the network is unprotected. Please refer the screens below:
40 Node Failure Analysis Similar to link failure 2 nodes are failed and out of 1418, 965 wavelengths are lost (68.05% loss) and none are recovered due to unprotected topology. Please refer to the screenshots below. Also a screenshot of network topology at OCH layer view is included which represent optical line systems and cross connects, it shows failed lines in orange color, so it becomes easy to analyze.
41 OCH Layer View
42 5. TOPOLOGIES (PROTECTED) For protected scenario two topologies are considered: 1) Multilink network 2) Fully Meshed network This topology is designed in the similar fashion as It's been done for unprotected scenario, the only difference is while dimensioning the traffic 1+1 protection path is selected. Now some of the network parameter's settings done while designing these topologies are similar to the topologies designed in unprotected multilink network. So please refer to section 4.3 for following network parameters: Network Diagram, Topology Info, Network Availability, Delay Settings, Network Properties, Link Usage Threshold. We will show only those aspects of network which are different than unprotected network and those are as follows: 5.1 Multilink Topology Traffic Matrix While designing traffic matrix random traffic utility of OPNET is selected and traffic is generated from 15 to 50.
43 5.1.2 Traffic Dimensioning Since topology is designed for protected network, 1+1 path protection is selected. Optical node & link utilization is set to 50%. The settings for dimensioning the network are as shown & selecting generate web report creates a web report and displays results of dimensioning: Routing Results
44 We got link utilization at OCH layer as 49.12%. The mean hop is 1.7 & in protecting mode its Ring Browser This topology is designed taking into consideration the advantages of both star and ring topology and therefore the advantage we get is if a link fails there always will be another link which can take care of traffic. This is because there are small rings formed inside the network and using ring browser we can analyze that. Please refer the screen shot below:
45 5.1.5 Traffic Variations Under traffic variation, 20% increase in traffic is added and analyzed the results. For star topology link utilization is increased from 49.1% to 49.5% And 84% traffic is routed.
46 5.1.6 Network Cost Network cost is calculated separately for link, node and total cost of the network. Also bill report generator utility is also tested which gives very detailed information about each and every aspect of the network. Please refer to the screens below:
47 5.1.7 Link Failure Analysis For link failure analysis, three links are failed as shown in topology below and the number of wavelengths that are failed are calculated. For this scenario out of 1493, 86 wavelengths are lost and 253 are recovered due to 1+1 Path restoration so the loss is only 5.76% which is much less than the loss occurred in unprotected network. Please refer the screens below: Node Failure Analysis Similar to link failure 2 nodes are failed and out of 1493, 741 wavelengths are lost (49.63% loss) and 283 are recovered due to protected topology. Please refer to the screenshots below.
48 5.2 Totally Meshed Topology This topology is designed in the similar fashion as It's been done for unprotected scenario, the only difference is while dimensioning the traffic 1+1 protection path is selected. Now some of the network parameter's settings done while designing these topologies are similar to the topology designed in unprotected totally meshed network. So please refer to section 4.2 for following network parameters: Network Diagram, Topology Info, Network Availability, Delay Settings, Network Properties, Link Usage Threshold. We will show only those aspects of network which are different than unprotected network and those are as follows: Traffic Matrix While designing traffic matrix random traffic utility of OPNET is selected and traffic is generated from 15 to 50.
49 5.2.2 Traffic Dimensioning Since topology is designed for protected network, 1+1 path protection is selected. Optical node & link utilization is set to 50%. The settings for dimensioning the network are as shown & selecting generate web report creates a web report and displays results of dimensioning:
50 5.2.3 Routing Results We got link utilization at OCH layer as 49.26%. The mean hop is 1 and in protecting mode its 2.
51 5.2.4 Traffic Variations Under traffic variation, 20% increase in traffic is added and analyzed the results. For star topology link utilization is increased from 49.3% to 49.5% 83.8% traffic is routed Network Cost Network cost is calculated separately for link, node and total cost of the network. Also bill report generator utility is also tested which gives very detailed information about each and every aspect of the network. Please refer to the screens below:
52 5.2.6 Link Failure Analysis For link failure analysis, five links are failed as shown in topology below and the number of wavelengths that are failed are calculated. For this scenario out of 1533, 66 wavelengths are lost and 143 are recovered due to 1+1 Path restoration so the loss is only 4.305% which is much less than the loss occurred in unprotected network. Please refer the screens below:
53 5.2.7 Node Failure Analysis Similar to link failure 2 nodes are failed and out of 1533, 548 wavelengths are lost (35.74% loss) and 8 are recovered due to protected topology. Please refer to the screenshots below.
54 Also a screenshot of network topology at OCH layer view is included which represent optical line systems and cross connects, it shows failed lines in orange color, so it becomes easy to analyze.
55 6. SCENARIO COMPARISON TOOL Scenario comparison tool is used to compare scenarios of user's choice. Once the user Inputs the scenario he wishes to compare, a graphical representation of those scenarios is shown in terms of bar graph. This is a very simple to use and understand tool and gives clear idea about the network performance parameters and therefore it becomes easy to pick most effective network. For the purpose of this project we'll show comparison between protected and unprotected network of each topology and in at the last we will have comparison of all the topologies we have covered so far. 6.1) Comparison between unprotected and protected Totally meshed network We will cover cost comparison in terms of link cost, node cost and link cost. For performance we'll see Utilization chart at OCH level. Please refer to relevant screens below:
56 From these figures we can easily figure out the cost of each and every small aspects and equipments that are involved in the network cost and hence becomes easy to improvise if reduced cost network needs to be designed. For performance it's clear that protected totally meshed network will stand out as utilization as well as few other aspects are higher that unprotected totally meshed topology. 6.2) Comparison between unprotected and protected Multilink network We will cover cost comparison in terms of link cost, node cost and link cost. For performance we'll see Utilization chart at OCH level. Please refer to relevant screens below:
57
58 From these figures we can easily figure out the cost of each and every small aspects and equipments that are involved in the network cost and hence becomes easy to improvise if reduced cost network needs to be designed. For performance it's clear that protected multilink network will stand out as utilization as well as few other aspects are higher that unprotected multilink network. 6.3) Comparison between all networks covered so far For comparison between all networks we will cover the network cost of all then we'll see number of links, connectivity, utilization, capacity and capacity*distance protected parameter for all topologies. Please refer to the corresponding screenshots below:
59 From the above comparison it can be easily seen that, every network profile have its own advantages and disadvantages. e.g. Connectivity and utilization for totally meshed protected network is good but it's the most expensive network amongst all. Multilink
60 unprotected network is low but so is its connectivity. The only profile which stands has better network performance characteristics and also is cost effective is Multilink Protected network. 7. CONCLUSION From this graduate project, we designed different topologies and learnt how to set the network parameters, define traffic and calculate the cost and performance parameters that profile. We increased the traffic by 20% to see what it affects on network performance and OPNET is a great tool to do failure analysis of the network which gives a brief idea of what will be the consequences in case of node or link failure and that's one great advantage of using OPNET. After designing 5 different topologies we learnt that every topology has its own advantages and disadvantages. unprotected networks sure are cheap but it decreases the reliability of the network, whereas protected i.e. 1+1 path protected networks sure are better than others in terms of reliability, link utilization and capacity but that too comes with a great price. However in the failure analysis is performed for protected networks it is clear that due to an additional path ( 1+1 path restoration) not much wavelengths were affected and few of them were able to recover also so the % loss of wavelengths in protected networks was much more less than that of unprotected networks. The comparison tool within the OPNET is also a great way of learning and comparing the network parameters and we conclude that Time Warner should suggest Multilink Protected network to Bank of America as it turned out to be most effective network amongst all as it gives great network performance in exchange of a reasonable cost. 8. REFERENCES 1) 2) /lecture12.pdf 3)
SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
Computer Networks. By Hardeep Singh
Computer Networks Contents Introduction Basic Elements of communication systemnetwork Topologies Network types Introduction A Computer network is a network of computers that are geographically distributed,
Network Topologies. Network Topologies
Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical
How to Configure a Stress Test Project for Microsoft Office SharePoint Server 2007 using Visual Studio Team Suite 2008.
How to Configure a Stress Test Project for Microsoft Office SharePoint Server 2007 using Visual Studio Team Suite 2008. 1 By Steve Smith, MVP SharePoint Server, MCT And Penny Coventry, MVP SharePoint Server,
Course 12 Synchronous transmission multiplexing systems used in digital telephone networks
Course 12 Synchronous transmission multiplexing systems used in digital telephone networks o Disadvantages of the PDH transmission multiplexing system PDH: no unitary international standardization of the
EXINDA NETWORKS. Deployment Topologies
EXINDA NETWORKS Deployment Topologies September 2005 :: Award Winning Application Traffic Management Solutions :: :: www.exinda.com :: Exinda Networks :: [email protected] :: 2005 Exinda Networks Pty Ltd.
SONET and DWDM: Competing Yet Complementary Technologies for The Metro Network
and : Competing Yet Complementary Technologies for The Metro Network Introduction The next generation of equipment has been well accepted by service providers and is being usefully deployed into networks
Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks
Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Mohammed A. Abdala & Alaa Mohammed Salih Department of Networks, College of Information Engineering, University
LOGICAL TOPOLOGY DESIGN Practical tools to configure networks
LOGICAL TOPOLOGY DESIGN Practical tools to configure networks Guido. A. Gavilanes February, 2010 1 Introduction to LTD " Design a topology for specific requirements " A service provider must optimize its
SDH and WDM: a look at the physical layer
SDH and WDM: a look at the physical SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group [email protected] http://www.telematica.polito.it/ Network management and
Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch
Network Infrastructure or building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
SDH and WDM A look at the physical layer
SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group [email protected] http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Copyright This
Lab 3: Evaluating Application Performance across a WAN
Lab 3: Evaluating Application Performance across a WAN Objective In this lab, we have a small LAN with 20 users for a startup company named Deltasoft Technologies. We investigate the application performance
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
John Ragan Director of Product Management. Billy Wise Communications Specialist
John Ragan Director of Product Management Billy Wise Communications Specialist Current Substation Communications Physical Infrastructure Twisted Pair, 4 Wire, COAX, Cat5 & Cat6, 9 Pin Serial Cable, Single-mode
Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network
Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Objective This lab teaches the basics of using OPNET IT Guru. We investigate application performance and capacity planning, by
ASON for Optical Networks
1/287 01-FGC1010609 Rev B ASON for Optical Networks Ericsson Control Plane for DWDM Optically Switched Networks ASON for MHL3000 Introduction The growing demand for multiple service is changing the network
Performance Management and Fault Management. 1 Dept. of ECE, SRM University
Performance Management and Fault Management 1 Dept. of ECE, SRM University Performance Management Performance management requires monitoring of the performance parameters for all the connections supported
Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)
School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit
VoIP technology employs several network protocols such as MGCP, SDP, H323, SIP.
1 VoIP support configuration First used in the mid-1990s, VoIP is an emerging technology for telephone calls and other data transfer. The concept is relatively simple: Use the multiple networks that comprise
RIP: Routing Information Protocol
Laboratory 6 RIP: Routing Information Protocol A Routing Protocol Based on the Distance-Vector Algorithm Objective The objective of this lab is to configure and analyze the performance of the Routing Information
Ring Protection: Wrapping vs. Steering
Ring Protection: Wrapping vs. Steering Necdet Uzun and Pinar Yilmaz March 13, 2001 Contents Objectives What are wrapping and steering Single/dual fiber cut Comparison of wrapping and steering Simulation
Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN
ENSC 427 Communication Networks Final Project Report Spring 2014 Analysis and Simulation of VoIP Team #: 2 Kadkhodayan Anita ([email protected], 301129632) Majdi Yalda ([email protected], 301137361) Namvar Darya
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
Fiber Characterization Service
About JDSU JDSU s verifies the integrity and capacity of your fiber plant through the measurement of key fundamental properties, such as attenuation, reflectance, and dispersion. Comprehensive testing,
Agenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
Networks. The two main network types are: Peer networks
Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among
How To Define Hfc Technology
Cable network topologies and implications for evolutionary approaches 33 rd International conference and Exhibition PIKE 2008, Zakopane, 14 October 2008 Bart Brusse, ReDeSign Project Manager Pressure on
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
Network Structure or Topology
Volume 1, Issue 2, July 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Network Structure or Topology Kartik
Server Monitoring Reports for Matrix IT
Server Monitoring Reports for Matrix IT Matrix IT Solutions Limited October 2013 Table of Contents 1 Introduction...1 1.1 Overview...1 1.2 All Sites...1 1.3 Percentage Good Analysis...1 1.4 Outage Analysis...1
Network Design. Yiannos Mylonas
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
BGP: Border Gateway Protocol
LAB 8 BGP: Border Gateway Protocol An Interdomain Routing Protocol OBJECTIVES The objective of this lab is to simulate and study the basic features of an interdomain routing protocol called Border Gateway
Introduction to Computer
PDHonline Course E175 (8 PDH) Introduction to Computer Instructor: Dale W. Callahan, Ph.D., P.E. and Lea B. Callahan, P.E. 2012 PDH Online PDH Center 5272 Meadow Estates Drive Fairfax, VA 22030-6658 Phone
Flexible SDN Transport Networks With Optical Circuit Switching
Flexible SDN Transport Networks With Optical Circuit Switching Multi-Layer, Multi-Vendor, Multi-Domain SDN Transport Optimization SDN AT LIGHT SPEED TM 2015 CALIENT Technologies 1 INTRODUCTION The economic
Technical White Paper for Multi-Layer Network Planning
Technical White Paper for Multi-Layer Network Planning Technical White Paper for Multi-Layer Network Planning 1 Overview...1 2 Requirement Scenarios...2 2.1 Sharp Increase in Network Construction CapEx...3
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
analysis needs be met at the push of a button?
can all of your traffic analysis needs be met at the push of a button? A SOLUTION FOR ALL TRAFFIC ANALYSIS NEEDS How do you conduct traffic studies, evaluate new development impacts, and time your signals
Level 2 Routing: LAN Bridges and Switches
Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense
A Software Architecture for a Photonic Network Planning Tool
A Software Architecture for a Photonic Network Planning Tool Volker Feil, Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering Pfaffenwaldring 47, D-70569 Stuttgart
Home Networking Evaluating Internet Connection Choices for a Small Home PC Network
Laboratory 2 Home Networking Evaluating Internet Connection Choices for a Small Home PC Network Objetive This lab teaches the basics of using OPNET IT Guru. OPNET IT Guru s user-friendly interface with
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
Lecture 23: Interconnection Networks. Topics: communication latency, centralized and decentralized switches (Appendix E)
Lecture 23: Interconnection Networks Topics: communication latency, centralized and decentralized switches (Appendix E) 1 Topologies Internet topologies are not very regular they grew incrementally Supercomputers
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and
NETWORK By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: [email protected] Network A network is a group of devices (Nodes) connected by media
IXP Member connection Best Practice. Kittinan Sriprasert BKNIX [email protected]
IXP Member connection Best Practice Kittinan Sriprasert BKNIX [email protected] Agenda Prerequisites How to Connect to BKNIX Topology Overview Logical Connection Physical Connection Best Connection
Astaro Deployment Guide High Availability Options Clustering and Hot Standby
Connect With Confidence Astaro Deployment Guide Clustering and Hot Standby Table of Contents Introduction... 2 Active/Passive HA (Hot Standby)... 2 Active/Active HA (Cluster)... 2 Astaro s HA Act as One...
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Background While IP protocols are widely spread over broadband wireline and wireless communication means, transferring
Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console
Contents Introduction... 3 What is a Remote Console?... 3 What is the Server Service?... 3 A Remote Control Enabled (RCE) Console... 3 Differences Between the Server Service and an RCE Console... 4 Configuring
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
Optimization of Computer Network for Efficient Performance
International Journal of Computer Networks and Communications Security VOL. 3, NO. 10, OCTOBER 2015, 396 402 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Optimization
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
Advanced BGP Policy. Advanced Topics
Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections
The Economics of Cisco s nlight Multilayer Control Plane Architecture
The Economics of Cisco s nlight Multilayer Control Plane Architecture Executive Summary Networks are becoming more difficult to plan and optimize because of high traffic growth, volatile traffic patterns,
1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class
1.264 Lecture 34 Telecom: Connecting wired LAN, WAN Next class: Green chapter 17. Exercise due before class 1 Exercise Your transportation brokerage company also handles billing for freight shipments,
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK
CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK DEFINTION & APPLICATIONS DEFINTION: A computer network is defined as the interconnection of two or more computers. It is done
Computer Networking: A Survey
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: [email protected] Local Area Network LANs connect computers and peripheral
Policy-Based Fault Management for Integrating IP over Optical Networks
Policy-Based Fault Management for Integrating IP over Optical Networks Cláudio Carvalho 1, Edmundo Madeira 1, Fábio Verdi 2, and Maurício Magalhães 2 1 Institute of Computing (IC-UNICAMP) 13084-971 Campinas,
FALCO. Broadband Groomer. F-330 Series. Applications. Access system for:
Broadband Groomer F-330 Series Falco is the industry first Access Unit designed to offer access to SDH/SONET/PDH backbones by different. extends the usefulness of WAN/LAN to and GbE backbones. Falco combines
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Workshop - New Paradigms for Routing in Optical Networks
Workshop - New Paradigms for Routing in Optical Networks Efficient routing for high capacity, flexible optical networks with different classes of service Douglas Aguiar July 2015 padtec.com Summary 1.
Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.
Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote
Mixed-Criticality Systems Based on Time- Triggered Ethernet with Multiple Ring Topologies. University of Siegen Mohammed Abuteir, Roman Obermaisser
Mixed-Criticality s Based on Time- Triggered Ethernet with Multiple Ring Topologies University of Siegen Mohammed Abuteir, Roman Obermaisser Mixed-Criticality s Need for mixed-criticality systems due to
Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26
Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
The Next Generation Internet Program. Mari Maeda ITO
The Next Generation Internet Program Mari Maeda ITO Today s Internet Traffic Makeup other ICMP HTTP Today s Internet Flow Size Distribution Comparison of 97 to 99 20000 Number of transfers 18000 16000
Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide
Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate
Enhancing Network Monitoring with Route Analytics
with Route Analytics Executive Summary IP networks are critical infrastructure, transporting application and service traffic that powers productivity and customer revenue. Yet most network operations departments
Backbone Capacity Planning Methodology and Process
Backbone Capacity Planning Methodology and Process A Technical Paper prepared for the Society of Cable Telecommunications Engineers By Leon Zhao Senior Planner, Capacity Time Warner Cable 13820 Sunrise
Contents. Connection Guide. What is Dante?... 2. Connections... 4. Network Set Up... 6. System Examples... 9. Copyright 2015 ROLAND CORPORATION
Contents What is Dante?............................................. 2 Outline.................................................. 2 Fundamental............................................ 3 Required Network
How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On
Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Traffic Engineering & Network Planning Tool for MPLS Networks
Traffic Engineering & Network Planning Tool for MPLS Networks Dr. Associate Professor, Department of Electrical Engineering Indian Institute of Technology Bombay, Powai, Mumbai 76 Founder & Director, Vegayan
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,
Lab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
Topological Properties
Advanced Computer Architecture Topological Properties Routing Distance: Number of links on route Node degree: Number of channels per node Network diameter: Longest minimum routing distance between any
diversifeye Application Note
diversifeye Application Note Test Performance of IGMP based Multicast Services with emulated IPTV STBs Shenick Network Systems Test Performance of IGMP based Multicast Services with emulated IPTV STBs
Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
10GbE Implementation Architectures
10GbE Implementation Architectures A View of Where and How 10GbE Will Be Used And the Fiber Facilities Support Needed Roy Bynum Optical and Data Network Technology Development MCI WorldCom, Richardson,
CSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
End-to-End Dedicated Protection in Multi-Segment Optical Networks
End-to-End Dedicated Protection in Multi-Segment Optical Networks Srinivasan Seetharaman, Admela Jukan and Mostafa Ammar Georgia Institute of Technology, Atlanta, GA Email: {srini, ajukan, ammar}@cc.gatech.edu
Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia
22nd EUROPEAN CONFERENCE ON OPERATIONAL RESEARCH Prague, July 8 11, 2007 Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia
