Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Assignment

Task 1

Create and simulate a network similar to the one shown here, using the Netml system.

Links

The links from A (node_0) to X (node_1), C to X, Y (node_3) to B (node_2), and Y to D (node_5) should have a capacity of 10 (in Mbit/sec), and the link from X to Y should have a capacity of 2.

Traffic

The traffic from C to D represents UDP traffic which sends a series of ping packets at regular intervals. This trafficstream should have the following parameters set:

Type udp

Start 1

Finish 9

PacketSize 1000

MaxPackets 10000

Interval 0.1

• The traffic from A to B and also from C to D represent bulk ftp transfers and they should have the following parameters set:
type bulkftp

Start 1

Finish 9

MaxBytes 10000000

• The Output

• When we run the simulation, we want to collection information about what is happening. There are many ways to do this, so if we are not careful we will collect so much information that we will not be able to make sense of it. For example, we can turn on logging of events relating to different modules in the simulation by making appropriate selections in the ns3 dialog box. It is a good idea to do this, to make sure that the simulation is working as expected. It is a requirement of this assignment that you do this and report on the information in the simulation log which tells you whether the simulation is working as you expect

• In this case, the main interest is on the middle link, which can easily be overloaded, because the links which feed into it have higher capacity than it. We therefore would like to know the behaviour of the buffer, at the head of the link from X to Y. To observe this turn on tracing of this buffer, which you can do using the menu of the link from X to Y. The graphs which are produced in this way should be included in your report and explanations provided of what they tell us about the simulation.

Task 2

This task builds on the previous one. The network is a little more complex, as depicted at the right. There is an extra node which is a lot further away. In the diagram at the right, the labels indicate the propagation delay of each link.

• The link capacities are all 10 Mbps except for the middle link, which has capacity 2 Mbps. The top traffic stream and bottom traffic stream are both bulk ftp transfers of 10 Mbytes and the other traffic stream is a UDP flow of 100000 packets with an interval between packets of 0.1 second.

• The issue we wish to explore in this assignment is whether a traffic flow can be disadvantaged by passing along a path with larger propagation delay than the other flows which share the network.

• In addition, we would like to explore ways in which this performance problem (if it exists) might be alleviated. The methods we wish to explore as follows:

o replace the default DropTail queue at the congested node, X, by a RED queue;

o try different values of the propagation delay from Z to X starting at 50ms and going up to 500ms (including at least, 100ms), to see if the problem becomes more serious with delay (and less serious as the delay differential decreases);

o check if the problem is different depending on which of the two flows (the one with a long delay and the one with a short delay) starts first.

Network Setup

All the links in the network should have a data rate of 10 Mbps and a propagation delay of 10 ms except the link from X to Y, which should have a data rate of 2 Mbps, and the link from Z to X, which should have a propagation delay of 50ms initially, and then varying up to 500 ms.
The top and bottom traffic flows should be ftp transfers of 10,000,000 bytes each. The one at the top should start at 1s, and the one below at 4s (although this will be varied during the experiments). Both flows should have a finish time of 10s and the PacketSize parameter of both should be 1000. The other traffic stream should be a UDP Ping flow, with an Interval of 0.1, starting at time 0.9s, and finishing at time 10 and with many packets: 100,000.

The criteria for this assignment are as follows:

Aspect 1

A satisfactory assignment document has been prepared, a network has been created and is depicted in a diagram in the assignment document.

Aspect 2

Graphs which explain the behaviour of the network in its original setup are presented including the throughput of the three flows.

Aspect 3

Graphs of dropped packets, and the congestion window between A and B and between Z and F, are included.

Aspect 4

A description of the normal behaviour of the network is included in the assignment document. This should include a comparison of the throughput of the flow with a long delay to the flow with a short delay.

Aspect 5

A description of the behaviour of the network when the DropTail queue is replaced by a RED queue is provided. This should include plots of key performance indicators such as throughput for both FTP flows.

Aspect 6

Experiments have been conducted to determine the effect of the delay difference (increasing the delay from 50ms to 500ms), between the two ftp flows, on the different performance each flow experiences.

Aspect 7

Experiments have been conducted to show if it makes a difference if the flow from A to B starts before or after the flow from Z to F.

Aspect 8

The assignment includes a discussion section in which the issue of fair access to network resources by flows with different path lengths and different start times is discussed.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91408998
  • Price:- $60

Priced at Now at $60, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Question suppose you work in a network security company and

Question: Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have ...

Wireless networks and security assignment - design and

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wirele ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of theoretical and practical material. - To encourage students to use content analysis summaries to pr ...

Data model development and implementationpurpose of the

Data model development and implementation Purpose of the assessment The purpose of this assignment is to develop data models and map Database System into a standard development environment to gain understanding of data m ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

Objectives-to learn about more advanced network security

Objectives -To learn about more advanced network security and vulnerability scanning tools Lab Outcome: · To complete the lab procedures & correctly answer the questions in the Blackboard quiz. Lab Deliverables · Answer ...

A wall street journal article noted that a study by us

A Wall Street Journal article noted that a study by U.S. Congressional Budget Office "estimated raising the minimum wage to $10.10 per hour reduced U.S employment by 500,000 but lift 900,000 Americans out of poverty". Wh ...

Part - athe assignmentwrite a critique review of the

Part - A The assignment Write a critique / review of the following paper: Mark Pollitt Eoghan Casey David-Olivier Jaquet-Chiffelle Pavel Gladyshev, "A Framework for Harmonizing Forensic Science Practices and Digital/Mult ...

There are standards in network communication through which

There are standards in network communication through which data is transferred from one system to another. Discuss why these standards are important. Do you think it would be easier to purchase different equipment and so ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As