The link capacities are all 10 mbps except for the middle

Assignment Help Computer Networking
Reference no: EM13370161

The link capacities are all 10 Mbps except for the middle link, which has capacity 2 Mbps. The top traffic stream and bottom traffic stream are both bulk ftp transfers of 10 Mbytes and the other traffic stream is a UDP flow of 100000 packets with an interval between packets of 0.1 second.

The issue we wish to explore in this problem is whether a traffic flow can be disadvantaged by passing along a path with larger propagation delay than the other flows which share the network.

In addition, we would like to explore ways in which this performance problem (if it exists) might be alleviated. The methods we wish to explore as follows:

• replace the default DropTail queue at the congested node, X, by a RED queue;

• try different values of the propagation delay from Z to X starting at 50ms and going up to 500ms (including at least, 100ms), to see if the problem becomes more serious with delay (and less serious as the delay differential decreases);

• check if the problem is different depending on which of the two flows (the one with a long delay and the one with a short delay) starts first.

Network Setup

All the links in the network should have a data rate of 10 Mbps and a propagation delay of 10 ms except the link from X to Y, which should have a data rate of 2 Mbps, and the link from Z to X, which should have a propagation delay of 50ms initially, and then varying up to 500 ms.

The top and bottom traffic flows should be ftp transfers of 10,000,000 bytes each. The one at the top should start at 1s, and the one below at 4s (although this will be varied during the experiments). Both flows should have a finish time of 10s and the PacketSize parameter of both should be 1000. The other traffic stream should be a UDP Ping flow, with an Interval of 0.1, starting at time 0.9s, and finishing at time 10 and with many packets: 100,000.

The criteria for this assignment are as follows:

Aspect 1
A satisfactory assignment document has been prepared; a network has been created and is depicted in a diagram in the assignment document.

Aspect 2
Graphs which explain the behavior of the network in its original setup are presented including the throughput of the three flows.

Aspect 3
Graphs of dropped packets, and the congestion window between A and B and between Z and F, are included.

Aspect 4
A description of the normal behavior of the network is included in the assignment document. This should include a comparison of the throughput of the flow with a long delay to the flow with a short delay.

Aspect 5
A description of the behavior of the network when the DropTail queue is replaced by a RED queue is provided. This should include plots of key performance indicators such as throughput for both FTP flows.

Aspect 6
Experiments have been conducted to determine the effect of the delay difference (increasing the delay from 50ms to 500ms), between the two ftp flows, on the different performance each flow experiences.

Aspect 7
Experiments have been conducted to show if it makes a difference if the flow from A to B starts before or after the flow from Z to F.

Aspect 8
The assignment includes a discussion section in which the issue of fair access to network resources by flows with different path lengths and different start times is discussed.

1418_Simulate the network using netml.png

Reference no: EM13370161

Questions Cloud

Us retailer case study and discuss the issueshere is a : us retailer case study and discuss the issueshere is a suggested guideline for this case study and other case
Describe breifly about critical evaluation of adam smiths : describe breifly about critical evaluation of adam smiths theory.outline of its purest form and what is its critism
Traditional herbal medicinal used in the management of : traditional herbal medicinal used in the management of sexual importance in marakwet east.1. the project summarythis
Question 1 what do you mean by a social welfare function if : question 1 what do you mean by a social welfare function? if you suppose that such a function exists what properties of
The link capacities are all 10 mbps except for the middle : the link capacities are all 10 mbps except for the middle link which has capacity 2 mbps. the top traffic stream and
Asset cost allocation straight line depreciationin january : asset cost allocation straight line depreciationin january 2013 mitzu co. pays 2600000 for a tract of land with two
1this question is about the theory of money demandaconsider : 1.this question is about the theory of money demand.aconsider two financial assets a and b which could be quite
Questions1analyze and discuss the different ways that : questions1.analyze and discuss the different ways that quality can be defined and applied within the operations
Business help risk managementdefine the following corporate : business help risk managementdefine the following corporate risk terms and describe their relevance to your

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain how to retrieve certificates from directory

Retrieving certificates from the directory, having no directory but having each principal responsible for keping its own certificate, and sending it to someone who needs to talk to it?"

  Find ip subnet mask and gateway-choosing unused address

After choosing unused address from the range given in d for the IP address for a device on the LAN, what would the IP subnet mask and gateway be set to? Explain why these settings would be used.

  Explain relationship between privacy and it

Explain the relationship between privacy and IT. Describe some of the threats to information security and some of the measures you can take to protect information resources.

  Solving networking and security issues

Assume you have been hired through a big restaurant called Habibi's. Habibi's has a small network of 20 consumer workstations and a Windows Server 2003.

  Design an ethernet network to connect a single client pc

Design an Ethernet network to connect a single client PC to a single server.  The two devices are 410 feet apart.  They need to communicate at 800 Mbps.  Your design will specify the locations of switches and the transmission line between the switche..

  Describe how signal and signal management calls are used

Describe how signal and signal management calls are used in creating a process and terminating it after certain interval. Give a simple example to illustrate this routine.

  Describe what is meant by cybersecurity architecture

Describe what is meant by Cybersecurity Architecture. List and describe the principles that must be supported.

  How long does b takes to acknowledge

Assume that no packet or acknowledgement are dropped. Assume that A sends a packet to C and waits for its acknowledgement to come back from C. How long does it take until A gets that acknowledgement?

  Explaining social networking in knowledge management

Social Networking is one of the hottest topics in knowledge management. Is it knowledge management?

  Find x and y such that 401x + 34y = 1. show all calculation

1. Find x and y such that 401x + 34y = 1. Show all calculation 2. Find all primes p for which (4 1 5 5) is not invertible mod p. (this is supposed to be a matrix).

  Determine different subnets exist in ip network-subnet mask

Write all IP addresses on same subnet as this one. Determine maximum number of hosts in this subnet? How many different subnets exist in IP network by using this subnet mask.

  Determining entropy of ciphertext message

A crypto device encrypts each message into 20 bits of ciphertext.What is the entropy of the plaintext message? What is the entropy of the ciphertext message?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd