Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

The link capacities are all 10 Mbps except for the middle link, which has capacity 2 Mbps. The top traffic stream and bottom traffic stream are both bulk ftp transfers of 10 Mbytes and the other traffic stream is a UDP flow of 100000 packets with an interval between packets of 0.1 second.

The issue we wish to explore in this problem is whether a traffic flow can be disadvantaged by passing along a path with larger propagation delay than the other flows which share the network.

In addition, we would like to explore ways in which this performance problem (if it exists) might be alleviated. The methods we wish to explore as follows:

• replace the default DropTail queue at the congested node, X, by a RED queue;

• try different values of the propagation delay from Z to X starting at 50ms and going up to 500ms (including at least, 100ms), to see if the problem becomes more serious with delay (and less serious as the delay differential decreases);

• check if the problem is different depending on which of the two flows (the one with a long delay and the one with a short delay) starts first.

Network Setup

All the links in the network should have a data rate of 10 Mbps and a propagation delay of 10 ms except the link from X to Y, which should have a data rate of 2 Mbps, and the link from Z to X, which should have a propagation delay of 50ms initially, and then varying up to 500 ms.

The top and bottom traffic flows should be ftp transfers of 10,000,000 bytes each. The one at the top should start at 1s, and the one below at 4s (although this will be varied during the experiments). Both flows should have a finish time of 10s and the PacketSize parameter of both should be 1000. The other traffic stream should be a UDP Ping flow, with an Interval of 0.1, starting at time 0.9s, and finishing at time 10 and with many packets: 100,000.

The criteria for this assignment are as follows:

Aspect 1
A satisfactory assignment document has been prepared; a network has been created and is depicted in a diagram in the assignment document.

Aspect 2
Graphs which explain the behavior of the network in its original setup are presented including the throughput of the three flows.

Aspect 3
Graphs of dropped packets, and the congestion window between A and B and between Z and F, are included.

Aspect 4
A description of the normal behavior of the network is included in the assignment document. This should include a comparison of the throughput of the flow with a long delay to the flow with a short delay.

Aspect 5
A description of the behavior of the network when the DropTail queue is replaced by a RED queue is provided. This should include plots of key performance indicators such as throughput for both FTP flows.

Aspect 6
Experiments have been conducted to determine the effect of the delay difference (increasing the delay from 50ms to 500ms), between the two ftp flows, on the different performance each flow experiences.

Aspect 7
Experiments have been conducted to show if it makes a difference if the flow from A to B starts before or after the flow from Z to F.

Aspect 8
The assignment includes a discussion section in which the issue of fair access to network resources by flows with different path lengths and different start times is discussed.

1418_Simulate the network using netml.png

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9308437

Have any Question?


Related Questions in Computer Network & Security

Objectivespart 1 researching network attacks- research

Objectives Part 1: Researching Network Attacks - Research network attacks that have occurred. - Select a network attack and develop a report for presentation to the class. Part 2: Researching Network Security Audit Tools ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Recent tariff actions by president trump include raising

Recent tariff actions by President Trump include raising tariffs and quotas on imports of both manufactured goods like televisions and automobiles and intermediate goods like steel and aluminum sheets. How will the econo ...

Question calculate the total time required to transfer a

Question: Calculate the total time required to transfer a 1.5-MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1 KB data, and an initial 2 × RTT of "handshaking" before data is sent: (a) The ban ...

What are three ways that even every forecast model should

What are three ways that even every forecast model should be evaluated to obtain the best forecast result.

There are standards in network communication through which

There are standards in network communication through which data is transferred from one system to another. Discuss why these standards are important. Do you think it would be easier to purchase different equipment and so ...

Question explain the meaning of computer networkingexplain

Question: Explain the meaning of computer networking. Explain the meaning of Information and give at least three examples of it. The response must be typed, single spaced, must be in times new roman font (size 12) and mu ...

Suppose after collecting data on an existing firms actual

Suppose, after collecting data on an existing firm's actual short-run ouput, the following production function is found to match the data: TP = Q = 5*L + 0.6*L2 - 0.01*L3 1. Using the equation above, find the following e ...

Case study network design for ezy-booksezy-books is a

Case Study: Network Design for EZY-Books EZY-Books is a specialised publisher for customised book publication services based in Brisbane. The company has recently purchased a two-story building in a Brisbane suburb as it ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As