Create and simulate a network - netml system, Computer Networking

Assignment Help:

Create and simulate a network similar to the one shown here, using the NetML system.

107_Create and Simulate a Network - NetML System.png

The network is a little more complex, as depicted at the right. There is an extra node which is a lot further away. In the diagram at the right, the labels indicate the propagation delay of each link.

The issue we wish to explore in this assignment is whether a traffic flow can be disadvantaged by passing along a path with larger propagation delay than the other flows which share the network.

In addition, we would like to explore ways in which this performance problem (if it exists) might be alleviated. The methods we wish to explore as follows:

  • replace the default DropTail queue at the congested node, X, by a RED queue;
  • change the parameters of the DropTail queue: in particular, doubling the buffer capacity or halving the buffer capacity;
  • change the parameters of the RED queue: in particular, selecting different values for linterm, minTh, maxTh and gentle;
  • try different values of the propagation delay from Z to X starting at 50ms and going up to 500ms, to see if the problem becomes more serious with delay (and less serious as the delay differential decreases);
  • check if the problem is different depending on which of the two flows (the one with a long delay and the one with a short delay) starts first.

 

Network Setup

All the links in the network should have a data rate of 10 Mbps and a propagation delay of 10 ms except the link from X to Y, which should have a data rate of 2 Mbps, and the link from Z to X, which should have a propagation delay of 50ms initially, and then varying up to 500 ms.

The top and bottom traffic flows should be ftp transfers of 10,000,000 bytes each. The one at the top should start at 1s, and the one below at 4s (although this will be varied during the experiments). Both flows should have a finish time of 10s and the PacketSize parameter of both should be 1000. The other traffic stream should be a UDP Ping flow, with an Interval of 0.01, starting at time 0.9s, and finishing at time 10 and with many packets: 100,000.

 

Criteria

  • A satisfactory assignment document has been prepared, a network has been created and is depicted in a diagram in the assignment document.
  • Graphs which explain the behaviour of the network in its original setup are presented including dropped packets, the congestion window between A and B and between Z and F, and throughput of these two flows.
  • A description of the normal behaviour of the network is included in the assignment document. This should include a comparison of the throughput of the flow with a long delay to the flow with a short delay.
  • A description of the behaviour of the network when the DropTail queue is replaced by a RED queue is provided. This should include plots of key performance indicators such as throughput for both FTP flows.
  • Experiments have been conducted to determine the effect of the delay difference, between the two flows, on the different performance each flow experiences.
  • Experiments have been conducted to determine the effect on performance for the F to Z flow of changes in the buffer size of the DropTail queue at X.
  • Experiments have been conducted to determine the effect on the performance of the F to Z flow of changes in the RED queue parameters.
  • Experiments have been conducted to show if it makes a difference if the flow from A to B starts before or after the flow from Z to F.
  • The assignment includes a discussion section in which the issue of fair access to network resources by flows with different path lengths is discussed.

 


Related Discussions:- Create and simulate a network - netml system

Prepare network schema of a company, Your Case Study must be based on the i...

Your Case Study must be based on the information provided. There will be no additional information. This must be submitted in a .doc, or .pdf format. If you send a few paragraphs i

How network gateway is different from routers, Gateway A device linked...

Gateway A device linked to multiple physical TCP/IP networks capable of routing or delivering IP packets among them. Router It's a layer 3 device that connects 2 diss

Explain the uses of firewall in computer, Explain the uses of Firewall in c...

Explain the uses of Firewall in computer For Intranet developers, restricting access of unauthorised users to the Web site has been the greatest challenge. In addition to preve

Determine 100base-t4 ethernet, 100Base-T4 Utilizing four pairs of c...

100Base-T4 Utilizing four pairs of category 3 (voice grade) UTP to transmit 100 Mbps Two pairs are bidirectional and other two are unidirectional 8B/6T (eight bin

Simple mail transfer protocoland secure sockets layer, Simple Mail Transfer...

Simple Mail Transfer Protocoland Secure Sockets Layer SMTP: Simple Mail Transfer Protocol is a server-to-server protocol for delivering electronic mail. SSL: Secure Sockets

What is routing region, What is routing region? When hierarchical routi...

What is routing region? When hierarchical routing is used, the routers are separated into what we call regions, with each router knowing all the details about how to route pack

Nics and network hardware, NICs AND NETWORK HARDWARE:  NIC is create f...

NICs AND NETWORK HARDWARE:  NIC is create for one kind of physical network. For example Ethernet interface may not be needed with token ring and similar ATM interface cannot b

Wireless access - computer network, Wireless Access Wireless access co...

Wireless Access Wireless access connecting end  systems ( that are often  mobile) into the network. Today there are two broad types  of wireless internet access(1) wireless an

Client server processes - application layer, Client  Server Processes ...

Client  Server Processes A network  application  consist  of pairs  of process that send message to one  another  over a network. For  example  in a web application a client

Ppp authentication chap pap secret, As the system administrator, you type "...

As the system administrator, you type "ppp authentication chap pap secret". Name the authentication method is used first in setting up a session? Ans)  the authentication method

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd