You are on page 1of 13

Advance Network Technology

Analyzing Switched Ethernet Using OPNET

CONTENTS:

1. Introduction

2. Traffic details of the network.

3. Simulation and Results

4. Characteristics and tables

5. Justification

6. Conclusion

7. References
Introduction:

OPNET is a network simulation tool which stands for Optimized Network


Engineering Tools. It is not only a network application tool that is used to
design a simulation network but also manages the network tools. OPNET
comes with some of the toolsets listed below

1. Protocols defined in packet format


2. Network topology and link connections defined by project window.
3. Interface of a network component specified by node model.

OPNET is a simulator that is built on top of


every discrete event system. The system behavior is simulated by modeling
each and every event that is happening in the system and processed by user
defined system. To organize all the models to be built in the network it uses
hierarchy models. This software is mainly used to test and design the
performance of network characteristics, db entry, ftp, db query, accounts ,
Ethernet , average response time etc where we have the capability of
changing the predefined networks and edit the attributes. OPNET controls
the traffic by modeling network and application users. Now let us consider a
company network where I am going to describe my course work in detail. In
this company network we will be having mainly two blocks Profile
definitions and Application definitions. In Profile definitions we are going to
describe about the users. There are several types of applications that are
predefined in the Application definition block.

In this course work we need to initiate and


simulate an office network and check the network performances of the
servers. This network consists of four switches, of which one switch is used
as central switched and remaining three switches 1; switch 2 and switch 3
are located in different rooms. These switches S1, S2, S3 are connected with
100Base T links. These three switches are then in turn connected to server
with 10BaseT links. The first switch S1 is now connected to development
server, switch S2 in connected to human recourses, receptionist, accounting
and switch S3 is connected to Sales server.

Staff Working Departments Applications Switches


hours
8am to 6pm Email(heavy)
Receptionist General S2
Email(light),
Human 9am to 5 pm General Web
resource browsing(light), S2
file print(light)
Email(light),
Recruiting 9 am to 5 pm General Web
browsing(light), S2
file print(light)
Database
Accounts 10am to 4pm General (heavy) and file S2
printing (heavy)
Database
Sales 8 am to 8 pm Sales (light), e-mail S3
(heavy),
FTP (light)
Web browsing
Development 11 am to 7 Development (heavy),
pm Database S1
(heavy), FTP
(heavy) and
e-mail (light)

Here we need to design and prepare four scenarios. So let us discuss about
them now.

1. In the First scenario, all servers in the company network will support all
applications where as only the client applications will be allowed to
access any server.
2. In the second scenario, only one client application will be supported by
each server and runs on the local machines and the staff will have access to
only that server of that particular department.

3. In the Third scenario we need to remind the first scenario case and do the
same process by adding additional networks to the given network. We are
adding additional networks as these applications use 10Base T links and
100BaseT links. And the process is same as equal to first scenario i.e. (1=3).

4. In the last fourth scenario, we do repeat the process same as second


scenario, again by adding additional networks as we have done in third
scenario. The process is again same as second case i.e. (2=4).

In our company network, all servers will support all client applications.
Hence we need to edit and design the attributes of those applications. Here
we have to add 6 new applications in the application definition and name
them as receptionist, human resources, accounting, sales, recruiting and
development. For each application we need to provide with valid start time
and end time.

From the above we can notice that all staff in


the network starts the work at different timings. Here I assumed that all the
staff of the company starts the work 1 hr earlier to their start time i.e. for
receptionist they start at 7 am. Sales staffs are going to leave the office late
as they work till 8pm. So the average duration of time they work is 12 hrs,
but we assumed that the office starts running from 7 am, so the average
working duration of the network is 13hours. We can see this, we run the
program and is shown below.

For each profile we have to assign applications. We can


do this by assigning attributes to every profile. For example, by selecting an
Email (heavy) application in the first profile and doing same procedure for
remaining profiles. And the operation mode must be kept in simultaneous
mode as we run all applications at the same time and the end time
(Repeatability) must me once at start time. These calculations are shown in
the table shown below.

Applications Start Time in Sec Duration in Sec Operation Mode

Receptionist 3600 36000 Simultaneous

Human Resource 7200 7200 Simultaneous

Recruiting 7200 7200 Simultaneous

Accounts 10800 21600 Simultaneous

Sales 3600 43200 Simultaneous

Development 14400 28800 Simultaneous

Thus from the above table we had calculated the start time and
total duration of the work in seconds. And the operation mode is kept in
simultaneous mode for all applications as all the applications run
simultaneously. Basing on the calculations we save the save the network and
run the program. As soon as we click the run Option, the program runs and if
it is successful, a window will appear show shown below.
RESULTS:

Thus from the above discussion, we can analyze the performance


characteristics of all the four scenario simulations. Comparisons have been
made for each selected parameters and their corresponding results are
known. All these parameters are listed in the given table below, to make the
comparison easy between the scenarios. With the help of these parameters
the performance of the network can be made easy.

As we have created six applications, we are going to compare


the parameters for the four scenarios.
Global Characteristics:

1. Db Entry:

Parameter Scenario1 Scenario2 Scenario3 Scenario4


Response time 0.026576 0.015767 0.042650 0.015462
(sec)
Traffic 5986.284 6128.342 17563.27 3726.437
received(Bytes/sec
)
Traffic 0.549242 0.534532 0.781624 0.345345
received( Packets/s
ec)
Traffic 5986.284 6128.342 17563.27 3726.437
sent( Bytes/sec)
Traffic 0.549242 0.534532 0.781624 0.345345
sent(Packets/sec)

Graph:
Db Query:

Parameter Scenario1 Scenario2 Scenario3 Scenario4


Response time 0.026865 0.015345 0.276384 0.015875
(sec)
Traffic 6023.192 6452.043 9876.276 3778.284
received(Bytes/sec)
Traffic 0.543484 0.534532 0.776353 0.352895
received( Packets/s
ec)
Traffic 6023.192 6452.043 9876.276 3778.284
sent( Bytes/sec)
Traffic 0.127363 0.1498547 0.867363 0.773463
sent(Packets/sec)
3. EMAIL:

Parameter Scenario1 Scenario2 Scenario3 Scenario4


Response time 0.11256 0.014728 0.012281 0.015256
(sec)
Traffic 327.1429 287.3476 294.6473 287.3563
received(Bytes/sec)
Traffic 0.223765 0.136547 0.245322 0.134589
received( Packets/s
ec)
Traffic 327.1429 287.3476 294.6473 287.3563
sent( Bytes/sec)

Traffic 0.223765 0.136547 0.245322 0.134589


sent(Packets/sec)

FTP:

Parameter Scenario1 Scenario2 Scenario3 Scenario4

Response time (sec) 0.5329 0.035738 0.52378 0.0274536

Traffic 321.1345 286.3487 398.45634 273.4536


received(Bytes/sec)
Traffic 0.015648 0.12456 0.012454 0.013432
received( Packets/sec
Traffic sent( Bytes/sec) 321.1345 286.3487 398.45634 273.4536

Traffic sent( Bytes/sec) 0.042367 0.026743 0.038463 0.023443

Upload response time 0.46524 0.024674 0.065983 0.024532

HTTP:
Parameter Scenario1 Scenario2 Scenario3 Scenario4
Object Response 0.00673 0.00635 0.0046372 0.001254
time (sec)
Page Response 0.008763 0.002361 0.0126734 0.002732
time Sec
Traffic 520.3428 420.0938 490.5673 409.4326
received( Bytes/sec
)
Traffic 0.67382 0.47262 0.590363 0.398723
Received( Packets/
sec)
Traffic sent(Bytes 520.3428 420.0938 490.5673 409.4326
/sec)

Traffic 0.673532 0.467292 0.62539 0.438272


sent(Packets/sec)

Print:

Parameter Scenario1 Scenario2 Scenario3 Scenario4


Traffic 375.4532 178.0392 367.9182 189.3723
received(Bytes/sec)
Traffic 0.067362 0.023637 0.078367 0.037465
received( Packets/s
ec)
Traffic 375.1429 178.0392 373.6473 189.3723
sent( Bytes/sec)

Traffic 0.067362 0.023637 0.078367 0.037465


sent(Packets/sec)
Graph:

Justification:

Let Us review and justify our observations and descriptions.


In the given company network, we will not make any changes or
modifications in the application definition as they already have well
predefined applications. Only in Profile definitions we have to change the
applications in each and every profile. Only the client has access and
performs same applications in all the scenarios. Hence we have created six
profiles in all the scenarios.
In the first scenario, at every server we should select ‘All’
for supported services, as they support all the applications. All the
applications must me mentioned at every server in the second scenario.
Profile name also must me mentioned at each and every node.
And the same process should be repeated for second and
third scenarios and back ground traffic of 10Baset links and 100Base T links
should be added to the network.
Hence, finally the duration of the simulation time must be 13hrs as the
network runs from morning 7 am to 8 pm. Thus the network performance
can be found with the help of these profiles and applications.

Conclusion:
I am going to conclude my calculations and observations
made in this course work. This helped me a lot in order to know the
simulation tools being used in present technologies. With the help of this
back ground load we will be able to distinguish the difference in the
network. On the other hand, they will be so many negative factors affecting
the performances of the network while we run the network.

In order to rectify and analyze these problems, we


must provide better network and different scenarios. If we do the first
scenario perfectly, I think we can do remaining scenarios perfectly according
to my observations and calculations I made this conclusion.

Reference:

1. Teach Mat

2. www.opnet.com

3.
https://cms1.gre.ac.uk/teachmat0809/COMP1266/course/schedule.asp?
banner=COMP1266

You might also like