Survivability Strategies in Optical Networks Based on Multistory Building LAN.

Similar documents
Introduction to Ethernet

Introduction to Optical Networks

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

IT Data Communication and Networks (Optional)

Local-Area Network -LAN

Bridging the Last Mile California s Wireless Internet Providers

Demystifying Wireless for Real-World Measurement Applications

Telecommunications, Networks, and Wireless Computing

Wireless LAN Concepts

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Computers Are Your Future Prentice-Hall, Inc.

WIRELESS ETHERNET (IEEE )

Appendix A: Basic network architecture

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Wireless LANs vs. Wireless WANs

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

CONNECTING THE WIRELESS TO THE WIRED NETWORK. By: Russ Schomber VP Network Services, Backhaul Services Group

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

Glossary of Telco Terms

Spring Final Project Report

Performance Evaluation of Mobile Wi-Fi-based M2M Data Traffic Multiplexing

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka

CSCI Topics: Internet Programming Fall 2008

Component 4: Introduction to Information and Computer Science

Layer 3 Network + Dedicated Internet Connectivity

Performance Evaluation of Wired and Wireless Local Area Networks

What s so smart about Smart-hopping?

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

1.264 Lecture 35. Telecom: Fiber optics. Next class: Green chapter Exercise due before class


4 122 b. INFORMATION TECHNOLOGY Wide Area Network Idi-astructure (IT 10) POLICY STATEMENT

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0

Figure 1: Bandwidth and coverage of wireless technologies [2].

Introduction, Rate and Latency

Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Computer Networking Networks

CHAPTER 6 NETWORK DESIGN

The Economics of Cisco s nlight Multilayer Control Plane Architecture

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications

Using the Internet Outcome1

Chapter 4 Connecting to the Internet through an ISP

In this section of notes you will learn the rudiments of networking, the components of a network and how to secure a network

Wireless Network Standard

A Rural Broadband Model

SDH and WDM A look at the physical layer

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Communication Networks. MAP-TELE 2011/12 José Ruela

Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY

Network Topologies. Network Topologies

Fiber-Optic Networks: Is Safety Just an Optical Illusion?

Leveraging Embedded Fiber Optic Infrastructures for Scalable Broadband Services

the amount of data will grow. It is projected by the industry that utilities will go from moving and managing 7 terabytes of data to 800 terabytes.

Networks 2. Gabriela Ochoa University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

Cisco Aironet 1520 Series Lightweight Outdoor Access Points

white paper Motorola s Wireless network Indoor/Outdoor Solution

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network

Amplicon.com IT and Instrumentation for industry. Sales: +44 (0) Website:

Home Networking Evaluating Internet Connection Choices for a Small Home PC Network

Migration to 40/100G in the Data Center with OM3 and OM4 Optical Connectivity

Thingsquare Technology

Analysis of Performance of VoIP

Municipal Mesh Network Design

Best Practices for Outdoor Wireless Security

SDH and WDM: a look at the physical layer

RTT 60.5 msec receiver window size: 32 KB

Cabling LANs and WANs

LTE, WLAN, BLUETOOTHB

OPNET - Network Simulator

WDM Passive Optical Networks: Protection and Restoration

better broadband Redundancy White Paper

CMPT 165: The Internet, Part 3

Modeling of Corporate Network Performance and Smoothing Spline Interpolation

Data Center Design for 40/100G

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Alcatel-Lucent In-building Wireless Continuity Solution for Healthcare

Broadband Technology Clinic. Burlington Telecom Advisory Board

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

State of Texas. TEX-AN Next Generation. NNI Plan

White Paper. D-Link International Tel: (65) , Fax: (65) Web:

Development of Network Security Technology ETRI

Mathatma Gandhi University

Chapter 3. Enterprise Campus Network Design


Service Level Analysis of Video Conferencing over Wireless Local Area Network

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

Chapter 5. Data Communication And Internet Technology

MAKING THE RIGHT CONNECTIONS

Designing Reliable IP/MPLS Core Transport Networks

Introduction Chapter 1. Uses of Computer Networks

Application Note Gigabit Ethernet Port Modes

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Profitably Get High Speed, Reliable CE 2.0 Services Out to Small and Medium Business Using EFM over Copper

Honeywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions

Transcription:

Survivability Strategies in Optical Networks Based on Multistory Building LAN. S. Manikanta 1, S. Sathiyabhama 2 1 Research scholar, Department of Telecommunication Networks, SRM University, Chennai, India, 2 Assistant Professor, Department of Telecommunication Networks, SRM University, Chennai, India. Abstract Optical networks have been developed as the solution to accommodate the high bandwidth demands in the domain of communication. In optical networks the network survivability is of prime concern since a single link or node failure will lead to huge amount of data loss and disruption of services. Optical networks are used to pass the information like file, e-mail, audio, video etc., through LAN connecting to the number of switches which are further connected to the number of PCs via a Ethernet-LAN in the Multistory building LAN. This paper tells us about how this information will be passed and is focused on reducing the consumption of the time while passing the information from server to the PCs. This project proposes a framework consisting of two modules in which the application performance and capacity planning are managed using the OPNET IT Guru Software. I. INTRODUCTION In telecommunication networks [11] the optical network is the major aspect for enabling extremely high-speed transport of different forms of data. The provision of network protection mechanisms must be considered in the network design stage itself to protect against various failure scenarios. The physical topology of a network is an important parameter onto which the connection requests are to be mapped since it directly determines the resource requirements and the complexity of the network. The data or information can be sent on multiple wavelengths of an optical fiber, using Dense Wavelength Division Multiplexing (DWDM) [1]. In this project we are using the OPNET IT Guru software, it provides a Virtual Network Environment that models the behavior of networks, including its routers, switches, protocols, servers, and individual applications [2]. The Virtual Network Environment allows IT managers, network and system planners, and operation s staff to more effectively diagnose difficult problems, validate changes before they are implemented, and plan for future scenarios such as traffic growth and network failures. OPNET s Application Characterization Environment (ACE) module for IT Guru enables enterprises to identify the root cause of end-to-end application performance problems. We can do what if analyses (called scenarios in IT Guru) on network designs, just as we can on spreadsheets with financial business models. However, instead of looking at bottom line financial numbers, we will be looking at how response times, latency (delays) and other network performance measures will change under different network design approaches. For creating a network simulation in OPNET IT guru we have to specify the nodes such as switches, computers, and routers etc. in our network and link the nodes to check the application performance. II. OPTICAL FIBER OVER WIRELESS A. Reliability Wireless technologies [3] are constrained by inherent performance limitations that do not apply to fiber optic broadband. Wireless broadband networks, whether licensed by the Federal Communications Commission (e.g., Verizon, AT&T, Sprint Nextel/Clearwire and T-Mobile) or unlicensed by the FCC (e.g., Wi-Fi), use microwave radiation to transmit and receive their signals. Radio signals can be blocked by buildings, trees and other objects, and transmission quality is even subject to atmospheric conditions. Many Wi-Fi networks operate in unlicensed bands of the spectrum and use the same carrier frequency as cordless phones, microwave ovens, and other consumer devices, and are therefore even more subject to interference problems than licensed wireless networks. Fiber optic technology presents none of these problems. In fact, network traffic moves across fiber optic cables in a manner that makes it even less susceptible to interference from other data traveling along the same fiber cables than other wired technologies B. Speed and Capacity Wireless broadband network speeds are significantly slower than fiber optic networks. In addition, the greater the number of users accessing a wireless access point at a given time, the greater is the degradation of service experienced by those users. The current industry standard for fiber optic broadband is 10 Gigabits per second (GB/s or billion bits per second) per fiber optic pair. Bonding multiple 10 GB/s fiber pairs is possible to produce even faster channels. By contrast, the present theoretical maximum speed for an 802.11n dedicated wireless access point is 150 Megabits per second (MB/s or million bits per second). In other words, the standard fiber optic connection for current commercial desktop usage is over 66 times faster than its wireless counterpart. C. Security Wireless networks are more expensive and difficult to secure than wired fiber optic networks and are therefore vulnerable to hacking, identity theft, national security threats, and unauthorized surveillance of users. Unlike wired fiber optic networks, wireless networks can be subject to attack wherever 1281

a signal is present. Although encryption makes such attacks more difficult, encryption methods do not eliminate this problem. For those with the interest and technical ability (e.g., individual hackers, criminal organizations, and national governments, both foreign and domestic), wireless signals are easily intercepted, tapped, eavesdropped upon, and used as platforms to launch malicious attacks on users. III. MULTISTORY BUILDING LAN This project shows the application performance of two different network architectures: Daisy Chain and Collapsed Backbone Network. It shows a collapsed backbone data network in which there is a core switch in the basement equipment room. The core switch is linked directly to a workgroup switch on each floor. Another option is to link the switches in a daisy chain. In this approach, the basement core switch is linked directly to the first floor switch, the first floor switch is linked directly to the second floor switch, and so on. The application latency introduced by connecting building switches in different ways. The SRM tech park building has 10 floors, each having many users connected to a 10Base-T workgroup switch in the floor s telecommunications closet. The users share an Oracle server and seven file and print servers in the basement. This paper is mainly based on 3 types of network designs of the multistory building such as 3 Scenarios where 2 Scenarios comes under Daisy Chain network design and 1 scenario comes under Collapsed Backbone Network design. A. Switches used in multistory building LAN There are two types of switches used in this project core switch and normal switch, the main difference between the core switch and the normal switch is, a normal switch allows all computers to connect together and a core switch allows all switches connect together. The switch which is used in this project implements the spanning tree algorithm to ensure loop free network. Spanning tree algorithm Spanning tree [4] is nothing but a sub graph of the connected undirected graph in which there are no cycles, connected graph means a graph in which every node is reachable from every other node and Undirected graph means a graph where edges do not have an associated direction and the combination of these connected graph and undirected graph is known as connected undirected graph. B. Daisy Chain network Fig (2) Spanning tree Scenario 1 In daisy chain network [5] design approach there are two scenarios. In Scenario 1, the switches on each floor are daisy chained to the core switch in the basement. The daisy chain approach introduces high application latency to users on the highest floor because the core switch is placed in the basement of the network design. Fig (3a) Daisy chain network scenario 1 In this approach the core switch which is the backbone for the network and the core it is one that ties all the communication together is designed in the basement. By this approach there is the application latency and time delay occurs in the top floors. Fig (1) Connected undirected graph 1282

Results for scenario 1 By comparing the Application Response Times for users on every floor. We expect that the network should reduce the application response time for users on top floors, because of the core switch placing in the center of the network design i.e., at the 5 th floor. The results of this approach are shown below. Results for scenario 2 Fig (3b) Results for scenario 1 By observing the results in the first floor the files or any mail can be sent to the first floor in four micro seconds, slowly the time has delayed to 5 micro seconds in the fifth floor and finally when coming to the tenth floor the time has delayed to 6 micro seconds, the goal of this project is to reduce the time delay in the top floors with network protection. Scenario 2 Users on the top floor observe high application response times. So to reduce the number of hops for the users on upper floors in Scenario 2, the daisy chain topology is edited and the core switch is moved to the fifth floor, these all are done without any loss of money because just moving the core switch from one place to other place. Here this reduces latency on the top floors but increases it on the bottom floors. Fig (4b) Comparing results at 10 th floor By comparing results at the 10 th floor for the core switch and server at the basement and the core switch and server at the center we can clearly find the change by seeing in the above result in fig (4b) that the response time decreased in the scenario 2 than in scenario 1. Fig (4c) Comparing results at 5 th floor Fig (4a) Daisy chain network scenario 2 By comparing results at the 5 th floor for the core switch and server at the basement and the core switch and server at the center we can clearly find the change by seeing in the above 1283

result in fig (4c) that the response time decreased in the scenario 2 than in scenario 1. Fig (4d) Comparing results at 1 st floor But when we compare the results at the 1 st floor for the core switch and server at the basement and the core switch and server at the center we can clearly find the change by seeing in the above result in fig (4d) that the response time increased in the scenario 2 than in scenario 1 which is a big drawback for the bottom floor. So when we replace the core switch and the server at the center the response time will increase in the bottom floors. C. Collapsed Backbone Network The Daisy Chain network [6] is changed to the Collapsed Backbone Network hoping to achieve the same application performance for all the users. This network design overcomes all the drawbacks in the daisy chain network. The response time can be same for all the users in this approach, in collapsed backbone data network there is a core switch in the basement equipment room. The core switch is linked directly to a workgroup switch on each floor. The collapsed backbone network is designed as shown below. Fig (5a) Collapsed Backbone Network By observing the network structure the information is expected to be passed to all the floors at a time because the core switch is connected directly to all the floors without using a separate switch for each floor where the delay occurs, the results for this approach are shown below. Fig (5b) Comparison of results at 10 th floor By comparing results at the 10 th floor for the core switch and change by seeing in the above result in fig (5b) that the 1284

Fig (5c) Comparison of results in 5 th floor By comparing results at the 5 th floor for the core switch and change by seeing in the above result in fig (5c) that the IV. CONCLUSION In this paper we investigate the problem of time delay and for reducing the time delay in a multistory building LAN while sending the information (files, emails etc.) from server to the users through switches (core switch and normal switches) and the Ethernet LAN (made by optical fiber) and passing the information securely to all the users at a time is achieved. REFERENCES [1] Manthoko G, Mosenthal TJ and B. Nleya Survivability Strategies in Optical Networks 2009 2 nd IEEE International Conference on Adaptive Science & Technology. [2] Babangida Zubairu Designing of Wireless Distribution System Network (WDSN) Model Academic Journal of Interdisciplinary Studies MCSER Publishing, Rome-Italy Vol 2 No 7 September 2013. [3] Dixon,A. Corning Cable Syst. LLC, Hickory, NC, USA Solving wireless backhaul issues with optical fiber Optical Fiber Communication Conference, 2006 and the 2006 National Fiber Optic Engineers Conference. OFC 2006. [4] Ge Hong-mei ; Dept. of the Inf. Manage., XuZhou Coll. of Ind. Technol., Xuzhou, China ; Xu Chao ; Yu Ben-cheng Design and Analysis of Minimum Spanning Tree in Euclidean Plane Computational and Information Sciences (ICCIS), 2013 Fifth International Conference. [5] Jingxi Jia ; Dept. of Electr. & Comput. Eng., Nat. Univ. of Singapore; Resource Unaware Computing - A Distributed Strategy for Divisible Load Processing on Linear Daisy Chain Networks Networks, 2006. ICON '06. 14th IEEE International Conference on (Volume: 2), sept. 2006. [6] Kartalopoulos, S.V. ; Telecomm. Networking, Univ. of Oklahoma, Norman, OK, USA, Seamless integration of wireless access, free space optical, and fiber-based backbone networks Network Operations and Management Symposium (NOMS), 2012 IEEE April 2012. [7] Kayi Lee and Eytan Modiano. Cross-Layer Survivability in WDM Networks with Multiple Failures. http://web.mit.edu/kylee/www/papers/ofc2008.pdf [8] Eytan Modiano and Aradhana Narula-Tam. Survivable light path routing: A new approach to the design of WDM-based networks. IEEE Journal on Selected Areas in Communications, vol. 20, no. 4, pp. 800-809, May 2002. [9] Ramamurthy and Lu Shen, Connection Management for Wavelength- Routed Optical Networks, Advances in Optical Networks, Kluwer Publishers, 2000. [10] E.Boulillet and J.F Labourdette, Distributed Computation of Shared Backup Path in Mesh Optical Networks Using Probabilistic Methods, IEEE/ACM Transactions, pp 920-930, October 2004. [11] Taskin, C. ; Turk Telekom ; Evirgen, H. ; Ekiz, H. ; Cakir, A.Y. Evolution of the Current Telecommunications Networks and the Next Generation Optical Networks Internet Surveillance and Protection, 2006. ICISP '06. International Conference, Aug 2006. Fig (5d) Comparison of results in 1 st floor By comparing results at the 1 st floor for the core switch and change by seeing in the above result in fig (5d) that the 1285