Create and simulate a network - netml system, Computer Networking

Assignment Help:

Create and simulate a network similar to the one shown here, using the NetML system.

107_Create and Simulate a Network - NetML System.png

The network is a little more complex, as depicted at the right. There is an extra node which is a lot further away. In the diagram at the right, the labels indicate the propagation delay of each link.

The issue we wish to explore in this assignment is whether a traffic flow can be disadvantaged by passing along a path with larger propagation delay than the other flows which share the network.

In addition, we would like to explore ways in which this performance problem (if it exists) might be alleviated. The methods we wish to explore as follows:

  • replace the default DropTail queue at the congested node, X, by a RED queue;
  • change the parameters of the DropTail queue: in particular, doubling the buffer capacity or halving the buffer capacity;
  • change the parameters of the RED queue: in particular, selecting different values for linterm, minTh, maxTh and gentle;
  • try different values of the propagation delay from Z to X starting at 50ms and going up to 500ms, to see if the problem becomes more serious with delay (and less serious as the delay differential decreases);
  • check if the problem is different depending on which of the two flows (the one with a long delay and the one with a short delay) starts first.

 

Network Setup

All the links in the network should have a data rate of 10 Mbps and a propagation delay of 10 ms except the link from X to Y, which should have a data rate of 2 Mbps, and the link from Z to X, which should have a propagation delay of 50ms initially, and then varying up to 500 ms.

The top and bottom traffic flows should be ftp transfers of 10,000,000 bytes each. The one at the top should start at 1s, and the one below at 4s (although this will be varied during the experiments). Both flows should have a finish time of 10s and the PacketSize parameter of both should be 1000. The other traffic stream should be a UDP Ping flow, with an Interval of 0.01, starting at time 0.9s, and finishing at time 10 and with many packets: 100,000.

 

Criteria

  • A satisfactory assignment document has been prepared, a network has been created and is depicted in a diagram in the assignment document.
  • Graphs which explain the behaviour of the network in its original setup are presented including dropped packets, the congestion window between A and B and between Z and F, and throughput of these two flows.
  • A description of the normal behaviour of the network is included in the assignment document. This should include a comparison of the throughput of the flow with a long delay to the flow with a short delay.
  • A description of the behaviour of the network when the DropTail queue is replaced by a RED queue is provided. This should include plots of key performance indicators such as throughput for both FTP flows.
  • Experiments have been conducted to determine the effect of the delay difference, between the two flows, on the different performance each flow experiences.
  • Experiments have been conducted to determine the effect on performance for the F to Z flow of changes in the buffer size of the DropTail queue at X.
  • Experiments have been conducted to determine the effect on the performance of the F to Z flow of changes in the RED queue parameters.
  • Experiments have been conducted to show if it makes a difference if the flow from A to B starts before or after the flow from Z to F.
  • The assignment includes a discussion section in which the issue of fair access to network resources by flows with different path lengths is discussed.

 


Related Discussions:- Create and simulate a network - netml system

Show the class A addresses, Q. Show the Class A Addresses? Class A Add...

Q. Show the Class A Addresses? Class A Addresses Numerically the lowest Use merely one byte to identify the class type and netid Three bytes are obtainable

Networking & computer architecture long question, Write discussion on Assoc...

Write discussion on Associative mapping - computer architecture.

How to protect computer hardware by threats, How to protect computer Hardwa...

How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.

Layer, what is end to end and host to host?

what is end to end and host to host?

Network design, Get the network design for a company

Get the network design for a company

Explain how contract net works, Question 1 Contract Net Protocol is the...

Question 1 Contract Net Protocol is the best known and most widely used cooperation protocol Explain how contract net works Discuss the benefits and limitations of con

What is multiplexing, What is Multiplexing? Multiplexing is the set of ...

What is Multiplexing? Multiplexing is the set of techniques that permits the simultaneous transmission of multiple signals across a single data link.

Hierarchy of dns servers application layer , Hierarchy of DNS Servers ...

Hierarchy of DNS Servers DNS uses a large number of server organized in hierarchical  fashion  and distribution  around the world. No single DNS server has all  of the  mappin

Connection-oriented protocol, TCP is connection-oriented. Connection-orient...

TCP is connection-oriented. Connection-oriented is a kind of connection established between the source & destination machines before any data is sent that means a connection is est

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd