The document describes a student project using Riverbed Modeler to simulate and analyze the performance of a customized enterprise network. The student modeled a retail company network with multiple LANs and offices. Key steps included designing the network topology, configuring IP addresses, applications and profiles, running simulations to analyze traffic, throughput, delays and the impact of failures. The project provided experience using Riverbed Modeler to simulate and evaluate network performance.
The document provides instructions for setting up a network with 4 PCs connected to 2 switches, with the switches connected to a router. The key steps are:
1. Connect the PCs to the switches using copper cables and assign each PC an IP address from the same private IP range (e.g. 192.168.0.x).
2. Connect the switches to the router using copper cables. Configure the router interfaces with IP addresses from each private range and enable the ports.
3. Configure the default gateway of each PC to be the router IP that corresponds to its private IP range.
4. Add the private IP ranges to the router's RIP configuration to allow routing between the
This document provides an overview of the Domain Name System (DNS). It describes how DNS uses domain names to map to IP addresses in a hierarchical structure. Key points include:
- DNS allows users to use domain names like "example.com" instead of numeric IP addresses for easier identification of internet hosts.
- DNS information is stored across multiple name servers to prevent a single point of failure.
- The domain name space is divided into generic, country code, and inverse domains to organize names by usage and map addresses to names.
- Domain names are read from right to left with the top-level domain at the far right, working left through more specific subdomains.
A computer network connects a group of computers. Networks can be classified in several ways including by scale, connection method, functional relationship, topology, protocols used, and more. Common network types include personal area networks (PANs), local area networks (LANs), campus area networks (CANs), metropolitan area networks (MANs), and wide area networks (WANs). Larger global networks include global area networks (GANs) and internetworks like the Internet.
An incremental mining algorithm for maintaining sequential patterns using pre...Editor IJMTER
Mining useful information and helpful knowledge from large databases has evolved into
an important research area in recent years. Among the classes of knowledge derived, finding
sequential patterns in temporal transaction databases is very important since it can help model
customer behavior. In the past, researchers usually assumed databases were static to simplify datamining problems. In real-world applications, new transactions may be added into databases
frequently. Designing an efficient and effective mining algorithm that can maintain sequential
patterns as a database grows is thus important. In this paper, we propose a novel incremental mining
algorithm for maintaining sequential patterns based on the concept of pre-large sequences to reduce
the need for rescanning original databases.
This document provides an overview of Internet service providers (ISPs), including their typical structure, types, connection options, and internal architecture. It explains that ISPs provide internet access to individuals and companies. It also describes the common components of an ISP's internal architecture, such as modems, remote access servers, SMTP and web servers, and routers.
Modems allow computers to transfer data over telephone or cable lines by converting digital signals to analog and vice versa. They come in internal and external varieties and support different transmission speeds like 56kbps for X2 modems and 64kbps for ISDN. Common modem types are X2, V.90, ISDN, DSL, and cable which use different connection technologies to transmit data at varying speeds over phone lines or cable infrastructure. Proper installation and safety precautions should be followed when installing a modem.
The document provides instructions for setting up a network with 4 PCs connected to 2 switches, with the switches connected to a router. The key steps are:
1. Connect the PCs to the switches using copper cables and assign each PC an IP address from the same private IP range (e.g. 192.168.0.x).
2. Connect the switches to the router using copper cables. Configure the router interfaces with IP addresses from each private range and enable the ports.
3. Configure the default gateway of each PC to be the router IP that corresponds to its private IP range.
4. Add the private IP ranges to the router's RIP configuration to allow routing between the
This document provides an overview of the Domain Name System (DNS). It describes how DNS uses domain names to map to IP addresses in a hierarchical structure. Key points include:
- DNS allows users to use domain names like "example.com" instead of numeric IP addresses for easier identification of internet hosts.
- DNS information is stored across multiple name servers to prevent a single point of failure.
- The domain name space is divided into generic, country code, and inverse domains to organize names by usage and map addresses to names.
- Domain names are read from right to left with the top-level domain at the far right, working left through more specific subdomains.
A computer network connects a group of computers. Networks can be classified in several ways including by scale, connection method, functional relationship, topology, protocols used, and more. Common network types include personal area networks (PANs), local area networks (LANs), campus area networks (CANs), metropolitan area networks (MANs), and wide area networks (WANs). Larger global networks include global area networks (GANs) and internetworks like the Internet.
An incremental mining algorithm for maintaining sequential patterns using pre...Editor IJMTER
Mining useful information and helpful knowledge from large databases has evolved into
an important research area in recent years. Among the classes of knowledge derived, finding
sequential patterns in temporal transaction databases is very important since it can help model
customer behavior. In the past, researchers usually assumed databases were static to simplify datamining problems. In real-world applications, new transactions may be added into databases
frequently. Designing an efficient and effective mining algorithm that can maintain sequential
patterns as a database grows is thus important. In this paper, we propose a novel incremental mining
algorithm for maintaining sequential patterns based on the concept of pre-large sequences to reduce
the need for rescanning original databases.
This document provides an overview of Internet service providers (ISPs), including their typical structure, types, connection options, and internal architecture. It explains that ISPs provide internet access to individuals and companies. It also describes the common components of an ISP's internal architecture, such as modems, remote access servers, SMTP and web servers, and routers.
Modems allow computers to transfer data over telephone or cable lines by converting digital signals to analog and vice versa. They come in internal and external varieties and support different transmission speeds like 56kbps for X2 modems and 64kbps for ISDN. Common modem types are X2, V.90, ISDN, DSL, and cable which use different connection technologies to transmit data at varying speeds over phone lines or cable infrastructure. Proper installation and safety precautions should be followed when installing a modem.
The document discusses DNS (Domain Name System) servers and how they work. It explains that DNS servers translate human-readable domain names to machine-readable IP addresses in 7 steps: 1) A request is made, 2) recursive DNS servers are queried, 3) root nameservers are queried, 4) TLD nameservers are queried, 5) authoritative nameservers are queried, 6) the IP address record is retrieved, and 7) the answer is received. DNS servers act like a phone book to lookup domain names and allow the internet to function by linking names to IP addresses.
Internet and the World Wide Web: What is Internet? Introduction to internet and its applications, E-mail, telnet, FTP, e-commerce, video conferencing, e-business. Internet service providers, domain name server, internet address, World Wide Web (WWW): World Wide Web and its evolution, uniform resource locator (URL), browsers – internet explorer, Netscape navigator, opera, Firefox, chrome, Mozilla. search engine, web saver – apache, IIS, proxy server, HTTP protocol
Domain Name Service (DNS) converts hostnames into IP addresses. It allows users to use easy-to-remember hostnames like "facebook.com" instead of difficult-to-remember IP addresses. DNS works hierarchically, with local DNS servers querying root servers, top-level domain servers like .com, and authoritative name servers to resolve hostnames into IP addresses in an iterative process. This document outlines the key functions and implementation of DNS.
Automating deployments from GitHub using SaltStackLINE Corporation
This document discusses how to automate deployments from GitHub using SaltStack. It provides an overview of SaltStack, including its events system, reactors, and returners. It then describes how to set up a webhook in SaltStack to trigger deployments in response to GitHub webhooks. Specifically, it shows how to configure a reactor to run a Salt state that deploys code from the master branch to Promgen servers when that branch is updated in GitHub.
The document discusses host-to-host communications and the OSI reference model. It describes how the OSI model standardized interfaces to promote interoperability. It then explains each of the seven layers of the OSI model in detail, including their functions, protocols, and example hardware. It discusses why layering is useful and the processes of encapsulation and decapsulation.
The document summarizes the Domain Name System (DNS), which maps domain names to IP addresses. It describes how DNS evolved from a single host file to a hierarchical, decentralized system. DNS uses a tree-like structure with top-level domains like .edu or .com at the top. It assigns authoritative name servers to each domain to answer queries and cache previous responses to improve efficiency.
SMTP (Simple Mail Transfer Protocol) is an Internet standard protocol for electronic mail transmission. It was first defined in 1982 and became widely used in the early 1980s as a complement to UUCP mail. SMTP uses a client-server model where the client initiates a connection and sends messages to the server, which then acknowledges receipt. It allows messages to be transferred between machines that are intermittently connected. Common SMTP commands include HELO, MAIL FROM, RCPT TO, DATA, QUIT, and RSET. SMTP can be secured using SSL/TLS to encrypt the communication channel. The latest developments include supporting real-time dynamic content in emails and internationalized email addresses encoded in UTF-8.
The document discusses various concepts related to computer networks including:
1. A computer network connects multiple computers allowing them to share resources and information. It consists of nodes like computers, printers, and other devices connected by communication channels.
2. Key network components include routers, switches, hubs, bridges and gateways which help connect and direct traffic between nodes and segments.
3. Networks can be classified based on transmission medium (wired vs wireless), size (LAN, MAN, WAN), management method (peer-to-peer, client-server), and topology.
The document discusses the Common Gateway Interface (CGI) which defines how web servers exchange information with custom scripts. CGI allows web servers to execute programs and return their output instead of files when certain files are requested. It requires the web server to be configured to support CGI, with programs stored in a special /cgi-bin directory. When a CGI program is executed, it has access to environment variables provided by the web server.
The document discusses network devices and operating systems, specifically focusing on Cisco's NX-OS operating system designed for Nexus switches and MDS Fibre Channel switches. It also discusses the differences between switches and routers, as well as Cisco's Catalyst brand of switches, their operating systems (CatOS and IOS), interfaces, and models. The document concludes with a brief overview of D-Link Corporation and their position as a leading networking company.
NAT maps private IP addresses to public IP addresses, allowing multiple devices on a private network to share a single public IP address to access the Internet. It is commonly used when there is a shortage of IPv4 addresses. There are different types of NAT, including dynamic NAT which maps private addresses to public addresses on a need basis, and NAPT which allows thousands of devices to share one IP address by also mapping port numbers. NAT solves issues like merging networks with duplicate private addresses and changing ISPs without renumbering an entire network.
The document provides an introduction to the internet and the world wide web for a course on website design and development. It discusses the history of the internet and how it originated as a military network before becoming publicly available. It defines key terms like web browser, website, and homepage. It explains that the internet is the underlying infrastructure of hardware, while the world wide web is the software comprising hyperlinked web pages. The internet connects millions of computers and networks globally through protocols like TCP/IP, while the web is governed by HTTP and links files and documents stored on various computers.
This document provides steps to connect multiple networks in Cisco Packet Tracer using a router:
1. Set up networks and configure IP addresses on end devices and switches.
2. Connect switches to the router using cables and configure the router interface for each network with matching IP addresses.
3. Set the default gateway on all end devices to the router IP so devices on different networks can communicate.
The document discusses various applications in the application layer of the Internet protocol stack, including the Domain Name System (DNS), electronic mail, the World Wide Web, streaming audio and video, and content delivery. It provides details on DNS, describing how domain names are organized hierarchically and mapped to IP addresses, and how name servers function to look up domain names. It also gives overviews of electronic mail/email, noting its widespread use both personally and for business, and the problem of spam.
The World Wide Web was created in 1991 by Tim Berners-Lee as a way to share scientific documents over the Internet. It uses HTML pages that can be accessed via HTTP and linked together through hyperlinks. While often used interchangeably, the Web is actually a subset of the larger Internet, which includes other applications like email and file transfer. The Web evolved from static publishing in its early Web 1.0 stage to include more participation and social features in Web 2.0, and aims to add semantic capabilities in its ongoing development of Web 3.0.
The document discusses the Domain Name System (DNS), which translates domain names to IP addresses and vice versa. It describes the hierarchical structure of DNS with zones, resource records, and name servers. Primary and secondary name servers maintain authoritative data for zones, while caching name servers store previously looked up data to improve performance. The domain name resolution process involves queries to authoritative and caching name servers to map names to addresses.
Web services protocols allow for communication between organizations through shared standards like XML, SOAP, WSDL, and UDDI. Web services involve service providers that make services available through publishing, service registries for discovery, and service consumers that find and use services. Key aspects include describing services with WSDL, registering them in UDDI directories, and communicating requests and responses with SOAP messages over common protocols like HTTP.
Cisco Packet Tracer is a software program that allows users to design and configure network devices in a virtual environment. The document discusses configuring 3 routers within Cisco Packet Tracer, likely setting up basic configurations and connections between the routers to establish a simple virtual network. The goal appears to be learning how to set up and interconnect multiple routers within the Cisco Packet Tracer program.
Design and simulation of wireless local area network for administrative offic...Alexander Decker
1. The document describes the design and simulation of a wireless local area network (WLAN) for an administrative office using the OPNET network simulator. The network consists of 3 subnets connected by a router to an internet service provider.
2. Key performance parameters of the network like delay, throughput, and packet drop were analyzed under normal traffic conditions and with a 50% increase in traffic. Delay and load increased while throughput decreased with higher traffic loads.
3. The simulations showed that increased network traffic led to longer delays, higher loads on access points, and reduced throughput across the three office subnets.
Physical channels carry information over the air interface between the mobile station and base transceiver station. Logical channels map user data and signaling information onto physical channels. There are two main types of logical channels - traffic channels which carry call data, and control channels which communicate service information. Control channels include broadcast channels which transmit cell-wide information, common channels used for paging and access procedures, and dedicated channels for signaling during calls or when not on a call. Logical channels are mapped onto physical channels to effectively transmit information wirelessly between network components in a GSM system.
The document discusses DNS (Domain Name System) servers and how they work. It explains that DNS servers translate human-readable domain names to machine-readable IP addresses in 7 steps: 1) A request is made, 2) recursive DNS servers are queried, 3) root nameservers are queried, 4) TLD nameservers are queried, 5) authoritative nameservers are queried, 6) the IP address record is retrieved, and 7) the answer is received. DNS servers act like a phone book to lookup domain names and allow the internet to function by linking names to IP addresses.
Internet and the World Wide Web: What is Internet? Introduction to internet and its applications, E-mail, telnet, FTP, e-commerce, video conferencing, e-business. Internet service providers, domain name server, internet address, World Wide Web (WWW): World Wide Web and its evolution, uniform resource locator (URL), browsers – internet explorer, Netscape navigator, opera, Firefox, chrome, Mozilla. search engine, web saver – apache, IIS, proxy server, HTTP protocol
Domain Name Service (DNS) converts hostnames into IP addresses. It allows users to use easy-to-remember hostnames like "facebook.com" instead of difficult-to-remember IP addresses. DNS works hierarchically, with local DNS servers querying root servers, top-level domain servers like .com, and authoritative name servers to resolve hostnames into IP addresses in an iterative process. This document outlines the key functions and implementation of DNS.
Automating deployments from GitHub using SaltStackLINE Corporation
This document discusses how to automate deployments from GitHub using SaltStack. It provides an overview of SaltStack, including its events system, reactors, and returners. It then describes how to set up a webhook in SaltStack to trigger deployments in response to GitHub webhooks. Specifically, it shows how to configure a reactor to run a Salt state that deploys code from the master branch to Promgen servers when that branch is updated in GitHub.
The document discusses host-to-host communications and the OSI reference model. It describes how the OSI model standardized interfaces to promote interoperability. It then explains each of the seven layers of the OSI model in detail, including their functions, protocols, and example hardware. It discusses why layering is useful and the processes of encapsulation and decapsulation.
The document summarizes the Domain Name System (DNS), which maps domain names to IP addresses. It describes how DNS evolved from a single host file to a hierarchical, decentralized system. DNS uses a tree-like structure with top-level domains like .edu or .com at the top. It assigns authoritative name servers to each domain to answer queries and cache previous responses to improve efficiency.
SMTP (Simple Mail Transfer Protocol) is an Internet standard protocol for electronic mail transmission. It was first defined in 1982 and became widely used in the early 1980s as a complement to UUCP mail. SMTP uses a client-server model where the client initiates a connection and sends messages to the server, which then acknowledges receipt. It allows messages to be transferred between machines that are intermittently connected. Common SMTP commands include HELO, MAIL FROM, RCPT TO, DATA, QUIT, and RSET. SMTP can be secured using SSL/TLS to encrypt the communication channel. The latest developments include supporting real-time dynamic content in emails and internationalized email addresses encoded in UTF-8.
The document discusses various concepts related to computer networks including:
1. A computer network connects multiple computers allowing them to share resources and information. It consists of nodes like computers, printers, and other devices connected by communication channels.
2. Key network components include routers, switches, hubs, bridges and gateways which help connect and direct traffic between nodes and segments.
3. Networks can be classified based on transmission medium (wired vs wireless), size (LAN, MAN, WAN), management method (peer-to-peer, client-server), and topology.
The document discusses the Common Gateway Interface (CGI) which defines how web servers exchange information with custom scripts. CGI allows web servers to execute programs and return their output instead of files when certain files are requested. It requires the web server to be configured to support CGI, with programs stored in a special /cgi-bin directory. When a CGI program is executed, it has access to environment variables provided by the web server.
The document discusses network devices and operating systems, specifically focusing on Cisco's NX-OS operating system designed for Nexus switches and MDS Fibre Channel switches. It also discusses the differences between switches and routers, as well as Cisco's Catalyst brand of switches, their operating systems (CatOS and IOS), interfaces, and models. The document concludes with a brief overview of D-Link Corporation and their position as a leading networking company.
NAT maps private IP addresses to public IP addresses, allowing multiple devices on a private network to share a single public IP address to access the Internet. It is commonly used when there is a shortage of IPv4 addresses. There are different types of NAT, including dynamic NAT which maps private addresses to public addresses on a need basis, and NAPT which allows thousands of devices to share one IP address by also mapping port numbers. NAT solves issues like merging networks with duplicate private addresses and changing ISPs without renumbering an entire network.
The document provides an introduction to the internet and the world wide web for a course on website design and development. It discusses the history of the internet and how it originated as a military network before becoming publicly available. It defines key terms like web browser, website, and homepage. It explains that the internet is the underlying infrastructure of hardware, while the world wide web is the software comprising hyperlinked web pages. The internet connects millions of computers and networks globally through protocols like TCP/IP, while the web is governed by HTTP and links files and documents stored on various computers.
This document provides steps to connect multiple networks in Cisco Packet Tracer using a router:
1. Set up networks and configure IP addresses on end devices and switches.
2. Connect switches to the router using cables and configure the router interface for each network with matching IP addresses.
3. Set the default gateway on all end devices to the router IP so devices on different networks can communicate.
The document discusses various applications in the application layer of the Internet protocol stack, including the Domain Name System (DNS), electronic mail, the World Wide Web, streaming audio and video, and content delivery. It provides details on DNS, describing how domain names are organized hierarchically and mapped to IP addresses, and how name servers function to look up domain names. It also gives overviews of electronic mail/email, noting its widespread use both personally and for business, and the problem of spam.
The World Wide Web was created in 1991 by Tim Berners-Lee as a way to share scientific documents over the Internet. It uses HTML pages that can be accessed via HTTP and linked together through hyperlinks. While often used interchangeably, the Web is actually a subset of the larger Internet, which includes other applications like email and file transfer. The Web evolved from static publishing in its early Web 1.0 stage to include more participation and social features in Web 2.0, and aims to add semantic capabilities in its ongoing development of Web 3.0.
The document discusses the Domain Name System (DNS), which translates domain names to IP addresses and vice versa. It describes the hierarchical structure of DNS with zones, resource records, and name servers. Primary and secondary name servers maintain authoritative data for zones, while caching name servers store previously looked up data to improve performance. The domain name resolution process involves queries to authoritative and caching name servers to map names to addresses.
Web services protocols allow for communication between organizations through shared standards like XML, SOAP, WSDL, and UDDI. Web services involve service providers that make services available through publishing, service registries for discovery, and service consumers that find and use services. Key aspects include describing services with WSDL, registering them in UDDI directories, and communicating requests and responses with SOAP messages over common protocols like HTTP.
Cisco Packet Tracer is a software program that allows users to design and configure network devices in a virtual environment. The document discusses configuring 3 routers within Cisco Packet Tracer, likely setting up basic configurations and connections between the routers to establish a simple virtual network. The goal appears to be learning how to set up and interconnect multiple routers within the Cisco Packet Tracer program.
Design and simulation of wireless local area network for administrative offic...Alexander Decker
1. The document describes the design and simulation of a wireless local area network (WLAN) for an administrative office using the OPNET network simulator. The network consists of 3 subnets connected by a router to an internet service provider.
2. Key performance parameters of the network like delay, throughput, and packet drop were analyzed under normal traffic conditions and with a 50% increase in traffic. Delay and load increased while throughput decreased with higher traffic loads.
3. The simulations showed that increased network traffic led to longer delays, higher loads on access points, and reduced throughput across the three office subnets.
Physical channels carry information over the air interface between the mobile station and base transceiver station. Logical channels map user data and signaling information onto physical channels. There are two main types of logical channels - traffic channels which carry call data, and control channels which communicate service information. Control channels include broadcast channels which transmit cell-wide information, common channels used for paging and access procedures, and dedicated channels for signaling during calls or when not on a call. Logical channels are mapped onto physical channels to effectively transmit information wirelessly between network components in a GSM system.
Introduction of opnet network simulator ali torabi
this article is in persian language.
opnet network simulator is a product of
OPNET Technologies, Inc.
In October 2012, OPNET was acquired by Riverbed Technology,
Long Term Evolution (LTE) is an all-IP wireless protocol that provides increased data rates and improved user response times compared to previous standards. The LTE model simulates key aspects of LTE including EPS bearers, traffic flow classification, session management, broadcast/multicast traffic using MBMS, and protocol layers like PDCP, RLC, MAC and the physical layer for both FDD and TDD schemes. Configuration and analysis of LTE networks is also supported.
We faced so much difficulties in running Networking Simulators such as NS2, NS3, OPNET, and many more. Increasing Awareness and demand for stable simulator incorporates to other simulators, the OPNET simulator is one of the best solution. With the nays getting louder, the OPNET Modeler (similar to OPNET Simulator) is stronger competitor then other simulators.
The document provides an overview of OPNET Modeler, a network simulation tool. It describes OPNET Modeler's architecture, which includes tools for model specification, data collection and simulation, and analysis. It also discusses how to locate models and components using the model library and its organization. The goal is to help users understand what problems can be solved with OPNET Modeler and how to get started using it.
The document describes two experiments conducted using the OPNET simulation tool. Experiment 1 involves simulating a TCP network using different congestion control mechanisms and analyzing OSPF routing. Experiment 2 compares the bus and star network topologies by creating networks with each in OPNET and collecting statistics on traffic and delay. The objectives are to get familiar with OPNET, study TCP algorithms, simulate OSPF routing, and understand the pros and cons of different topologies. Tasks for each experiment are described in detail, including how to set up the simulations, configure nodes and links, select statistics, and run the simulations.
GSM uses frequency division duplexing with carriers separated by 200 kHz. Each carrier is divided into 8 time slots using TDMA. Logical channels like traffic channels and signaling channels are mapped onto these physical time slots. Traffic channels carry user data at either full rate or half rate, while signaling channels include broadcast, common, and dedicated control channels used for functions like synchronization, paging, call setup, and handover.
This document discusses the history and development of GSM and UMTS mobile communication standards. It is an edited collection of chapters written by various key contributors to GSM and UMTS standardization work.
The first chapter provides an introduction and overview of GSM's achievements, milestones, and success as measured by adoption numbers. It outlines the standardization work done within ETSI and its predecessor groups to develop the GSM specifications from the 1980s through the early 2000s.
Subsequent chapters delve into more specific topics like the technical specifications for GSM Phase 1, evolving GSM services in Phase 2, work on 3G standards within 3GPP, the development of system architecture, radio interfaces,
e2matrix is a leading Web Design and Development Company now in the field of Industrial training. We provide you 6 Month/6 Week Industrial training in PhP,Web Designing, Java, Dot Net, android Applications.
we also provide work for various technoligies with additional facilities-
RESEARCH PAPERS
OBJECTIVES
SYNOPSIS
IMPLEMENTATION
DOCUMENTATION
REPORT WRITING
PAPER PUBLICATION
Address-Opp. Phagwara Bus Stand, Above Bella
Pizza, Handa City Center, Phagwara,punjab
email addres-e2matrixphagwara@gmail.com
jalandhare2matrix@gmail.com
WEBSITE-www.e2matrix.com
CONTACT NUMBER --
09041262727
07508509730
7508509709
This document describes the evolution of 2G and 3G mobile network architectures. It shows:
1) The separation of the control plane and user plane in 3GPP Release 4, with the MSC Server handling signaling and Media Gateways handling transmission.
2) How the MSC Server system provides operational expenditure savings by moving voice and signaling transmission to IP networks and separating equipment for more flexible siting.
3) How the MSC Server system allows investment protection by supporting existing services on GSM, EDGE, 3G and TDM, IP, and ATM transmission networks.
This document outlines the network configuration of three branches - London, Manchester, and Cardiff. It describes setting up subnets, IP schemes, DHCP servers, DNS servers, VPNs, and other network protocols to connect and manage the branches. Key aspects covered include designing the network diagrams, configuring DHCP scopes and relay agents, setting up forward and reverse lookup zones in DNS, installing WINS servers, and configuring VPNs and IPSec policies for secure remote access.
Public Storage is a fortune 500 company that owns 2,200 self-storage locations. The document outlines network designs for Public Storage's Chicago regional office and individual storage unit facilities. For the regional office, a server farm in the basement connects via switches and wiring to employee desktops on floors 1-4. Individual storage facilities will each have a router connecting a computer, printer, and small database/print server to the internet via a 15Mbps connection. The regional office network aims to prevent bottlenecks through the use of multiple servers, standard equipment, and high-speed internet access.
Fast Ethernet cables are uses for interdependent connection; on the other hand, serial cables are used for the connection of central organization router with department routers.
The document describes Cisco Network Academy's CCNA curriculum and Packet Tracer software. The CCNA curriculum validates skills in installing, configuring and troubleshooting medium-sized networks including WAN connections and basic security threats. Packet Tracer is a network simulation program used in the CCNA program to allow students to experiment with networks and troubleshoot issues. It supports simulation of network protocols, devices, and allows creation of network topologies to model real world networks.
ProjectPurposeThe purpose of this project is to provide an o.docxwoodruffeloisa
Project
Purpose
The purpose of this project is to provide an opportunity for students to apply network administration and design competencies gained throughout this course.
Deliverables
Please choose ANY FOUR options from the following five options and complete the report for your chosen four options (OPTION 1 is MANDATORY).
Option 1: Network Design Case (100 points)
Option 2: Windows Security Firewall (33.33 points)
Option 3: Configuring OSPF Routing (33.33 points)
Option 4: Configuring EIGRP Routing (33.33 points)
Option 5: IPv6 Address Configuration (33.33 points)
Option 1: Network Design Case
Scenario
Consider that the prevailing market conditions have made it possible for our firm to expand our current operations. I have presented several options to our board of directors and they are eager to proceed with an expansion except for one condition. The board feels that our current telecommunications infrastructure hinders our business operations and that it is imperative to design a new voice and data infrastructure to facilitate the planned expansion. The board is prepared to advocate any prudent expenditure necessary to implement a new infrastructure at the upcoming stockholder’s meeting.
As you know, our firm is headquartered in San Antonio where we occupy the first and third floor of a large, but somewhat antiquated building. Each floor of the building measures 400 ft. by 250 ft. We currently have 52 Pentium-based PC’s located on the third floor to meet the needs of our accounting, billing, and phone sales departments. The first floor contains 17 Pentium-based computers and six Apple PowerMacs used by management, our receptionist, walk-in sales staff, and our adjusters. We currently have a 10Base2 network that is used to connect some, but not all, of our existing systems. The previous network manager told us the remaining systems could not be networked due to the 10Base2 architecture. We also have smaller offices in Austin, Houston, and Corpus Christi. These offices generally have 4 to 6 Pentium or Apple-based computers. The computers in these locations are not currently networked.
Our immediate expansion plans, if approved by the shareholders, include opening a second office in Houston, two offices in Dallas and an office in El Paso. These offices will be similar to the existing small offices operated in Austin, Houston and Corpus Christi. My vision for the new telecommunications network includes having all of the existing and proposed offices connected together in a seamless, secure manner. All of the computers in all of the offices should be connected.
Deliverables:
· I need to understand whether or not we can continue to build on our current network and why. I also need to know what we should use to replace it if we need to do so.
· I see the network as consisting of two primary parts, the networks within each facility and the network that connects the various facilities together. Please provide diagrams that illustrate h ...
The document is a project report submitted to the Computer Networking Lab at City University summarizing a proposed network design for the Bangladesh Computer Council building. It includes logical and physical diagrams of the proposed network layout, a list of required equipment and their costs, and a total projected budget of 5.3 million taka. The network aims to provide improved security, reliability, and fault tolerance across 8 floors of offices and various rooms through the use of switches, routers, servers, access points, and security cameras connected with CAT6 cables.
This report summarizes the key components of networking, including different types of cables, IP addresses, network protocols, topologies, standards, and cabling categories. It discusses the basic elements used to establish a network, such as switches, routers, and client computers. It also explains concepts like TCP/IP, UDP, DHCP, LANs, WANs, the OSI model and more. Tables and diagrams are provided to illustrate networking concepts and components.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Bangladesh Computer Council Networking ProjectMDMusab
The document summarizes a student project to design the computer network for the Bangladesh Computer Council building. It includes logical and physical network diagrams connecting 8 floors and various rooms using different topologies. A bill of materials is provided listing the required equipment such as switches, routers, servers, and their estimated costs, totaling approximately 39.15 million BDT. Security measures are discussed like encryption, firewalls, and access control. Assembly and disassembly photos demonstrate how to build a computer. The project aimed to provide a reliable, secure, and fault-tolerant network for the government agency.
The document discusses planning, optimizing, and evaluating performance of a TCP/IP network. It describes how to plan TCP/IP addressing structures and subnet configurations. Methods for selecting IP configuration, evaluating network performance using tools, and calculating actual data throughput are presented. Optimizing network performance involves determining if the network is overloaded and monitoring bandwidth utilization.
A network administrator is troubleshooting connectivity issues between a router and a non-Cisco device running Frame Relay. The exhibit shows the router configuration. The likely cause of the Layer 2 connectivity problem is that the ietf keyword is missing when enabling Frame Relay on the serial interface. Adding this keyword should repair the connectivity issue.
The document provides instructions for interpreting debug output on routers. It describes 8 steps to configure interfaces and verify routing table updates using the debug ip routing command on routers R1, R2, and R3. The steps have R1 configure its serial and LAN interfaces, and verify routing table updates are shown in the debug output. It also suggests establishing a separate session for R2 to observe debug output changes made on R1. The goal is to observe how the routing tables are updated as interfaces are configured on both routers.
Networking involves connecting at least two computing devices to share information. TCP/IP is the most widely used communication protocol. It uses IP addresses and ports to identify devices and allow communication. Configuring a DVR for remote access requires setting its IP address and port forwarding on the network router. Troubleshooting starts with checking cables and connections, then using the ping command to test network communication before examining firewall and software issues.
The document is an internship presentation summarizing work done on networking concepts. It discusses how the internship was conducted under Cisco's Networking Academy to learn about network addressing, IP classes, subnetting, and configuring network devices using CLI. Packet Tracer was used as the simulation tool. The presentation covers networking fundamentals and a case study on variable length subnet masking and basic server and switch configuration.
Giridharan has over 6 years of experience in IT networking. He has worked as a network engineer for several companies supporting their Cisco router, switch, and firewall infrastructure. He is proficient in technologies like Cisco IOS, OSPF, BGP, firewall configuration, and network monitoring tools. His experience includes roles supporting large networks for clients such as Vodafone, IBM, and banks.
As a business’s operations start to grow and become complicated it is wise to have a functional IT infrastructure to manage those operations in a much smarter way. Hence upgrading an existing network in a company could make it much easier for that company to manage their operations.
GSM Associates is a financial back office which is situated at Sri Lanka. It is the back office of ASN Partnerships which is located at UK. The main purpose of GSM is meeting all the needs of all growing small and medium sized entity, sole trades or partnerships. As a back office, the accountants who are working at GSM does settlements, clearances, record maintenance of clients and also provide IT services to clients who are working overseas. Purpose of this group project is to create a new network design, that suites the business.
Eng. Abd Elrhman has over 10 years of experience in network administration and seeks a challenging position to further develop his skills. He has extensive experience designing, implementing, and troubleshooting networks and infrastructures. Some of his qualifications include Cisco certifications, experience with Active Directory, WAN/LAN administration, real-time systems, security, and team leadership.
DescriptionYou were selected to design a small peer-to-peer ne.docxdonaldp2
Description
You were selected to design a small peer-to-peer network for a new facility which has six computers and a networked printer. Each desk computer must have a wired network connection. The rooms are to have wireless access for mobile devices.
For this assignment, utilize the Gliffy (Links to an external site.)Links to an external site. software application to create a basic network diagram depicting a star topology with a switch as the central communications node. The focus here is on the network communications equipment for this LAN. Include only that equipment and end node devices on the network diagram. There is no need to draw out the layout of the physical space.
In addition to providing a network diagram, you must also provide a short essay that describes the details of the LAN equipment that is being used and the connections. In the essay, be sure to explain why each device is positioned where it is.
Also, briefly state any assumptions you've made about the kind of work being done, the demands the personnel in the office will put on the network, how they'll use it, and how that influenced your design. For example, if the business that uses the LAN is a small video-based news streaming service, they will probably need more performance from both their network and ISP than a small rental property management office might need.
Recommended reading: Understanding Routers, Switches and Network Hardware (Links to an external site.)Links to an external site.
Requirements
1. Depict a star topology that uses Ethernet.
2. Provide a 'cloud' shape or another symbol for the ISP WAN service. Label the symbol as 'Dial-up,' 'Cable,' or 'Fiber Optic.'
3. Label all network devices in the LAN (brand and model names are acceptable but not required).
4. Connect to the ISP service using a dial-up modem, cable modem, or, if using fiber optic service, an optical network terminal (ONT). Do not use a combination device such as a modem/router.
5. Connect the LAN router (wireless router) to the ISP WAN service device. The LAN router provides many capabilities to include: DHCP (Links to an external site.)Links to an external site., NAT translation (Links to an external site.)Links to an external site., port forwarding (Links to an external site.)Links to an external site., QoS (Links to an external site.)Links to an external site., and software firewall services. Do not use a router/switch combination device, however a router with integrated wireless capabilities is acceptable.
6. Use a managed switch as a centrally-located device to provide wired network connectivity for the seven end nodes (six desktop computers and a printer). Connect the switch directly to the main LAN router.
7. Connect the seven end nodes directly to the central switch.
8. Label the specific type of physical media (cables) being used to connect the LAN router to the ISP service device, the central switch to the LAN router, and the seven end nodes to the central switch.
9. Use a s.
DescriptionYou were selected to design a small peer-to-peer ne.docxcarolinef5
Description
You were selected to design a small peer-to-peer network for a new facility which has six computers and a networked printer. Each desk computer must have a wired network connection. The rooms are to have wireless access for mobile devices.
For this assignment, utilize the Gliffy (Links to an external site.)Links to an external site. software application to create a basic network diagram depicting a star topology with a switch as the central communications node. The focus here is on the network communications equipment for this LAN. Include only that equipment and end node devices on the network diagram. There is no need to draw out the layout of the physical space.
In addition to providing a network diagram, you must also provide a short essay that describes the details of the LAN equipment that is being used and the connections. In the essay, be sure to explain why each device is positioned where it is.
Also, briefly state any assumptions you've made about the kind of work being done, the demands the personnel in the office will put on the network, how they'll use it, and how that influenced your design. For example, if the business that uses the LAN is a small video-based news streaming service, they will probably need more performance from both their network and ISP than a small rental property management office might need.
Recommended reading: Understanding Routers, Switches and Network Hardware (Links to an external site.)Links to an external site.
Requirements
1. Depict a star topology that uses Ethernet.
2. Provide a 'cloud' shape or another symbol for the ISP WAN service. Label the symbol as 'Dial-up,' 'Cable,' or 'Fiber Optic.'
3. Label all network devices in the LAN (brand and model names are acceptable but not required).
4. Connect to the ISP service using a dial-up modem, cable modem, or, if using fiber optic service, an optical network terminal (ONT). Do not use a combination device such as a modem/router.
5. Connect the LAN router (wireless router) to the ISP WAN service device. The LAN router provides many capabilities to include: DHCP (Links to an external site.)Links to an external site., NAT translation (Links to an external site.)Links to an external site., port forwarding (Links to an external site.)Links to an external site., QoS (Links to an external site.)Links to an external site., and software firewall services. Do not use a router/switch combination device, however a router with integrated wireless capabilities is acceptable.
6. Use a managed switch as a centrally-located device to provide wired network connectivity for the seven end nodes (six desktop computers and a printer). Connect the switch directly to the main LAN router.
7. Connect the seven end nodes directly to the central switch.
8. Label the specific type of physical media (cables) being used to connect the LAN router to the ISP service device, the central switch to the LAN router, and the seven end nodes to the central switch.
9. Use a s.
Similar to Modeling, Configuration and Performance Analysis of the customized network using OPNETRIVERBED Modeler (20)
DescriptionYou were selected to design a small peer-to-peer ne.docx
Modeling, Configuration and Performance Analysis of the customized network using OPNETRIVERBED Modeler
1. ECE 636 Computer Networking Laboratory
FALL 2014
Project
Modeling, Configuration and Performance Analysis of the customized
network using OPNET/RIVERBED Modeler
Instructor: ABBAS KIANI
Submitted by: FATEMA ZOHORA
ID# 31256141
Date of Submission: 12/10/14
2. Introduction:
The aim of this project is modelling, configuration and performance analysis of the customized network using
RIVERBED modeler. Modeler provides high-fidelity modeling, scalable simulation, and detailed analysis of
a broad range of wired and wireless networks with application traffics. We are going to present the project
with the network simulation software RIVERBED modeler which is able to efficiently analyze the
performance of the protocols and technologies in network infrastructure models of realistic scale.
Objectives:
To design network using Riverbed Modeler
To configure the appropriate applications and profiles
To obtain and analyze the network's performance statistics via simulation
To study how different design scan respond to the need of services as well as resources provided by a
company
Project Descriptions:
Project is based on the modeling configuration and performance analysis of the customized network which we choose
Enterprise Network to do this project by using the RIVERBED MODELER. The Results will be disclosed by after
configuring the network.
Pre-conditions of Project:
Following are the pre-conditions specified to design the network for a company.
Having more than 3 LANs connecting to the Internet
Having at least 15 nodes in each LAN
Having at least 4 databases, each for one application
Having at least 3-application traffics among nodes in each LAN (intra-LAN connections)
Having at least 3-application traffics among nodes in all LANs (inter-LAN connections)
Having both wired and wireless communications
Having specified connections (between pairs of specified nodes) and general background
connections
Having specified IP addresses for every nodes
Not limiting to TCP networks
Applying a link failure
3. Designand Procedure:
For this project we design an enterprise network. The enterprise we have decided to design is a Retail Store company
SHOPRITEbasedintheUnitedStatesofAmerica.TheRetailstorehasmainofficeinNewJersey,andthree branch offices
inthefollowinglocation:Connecticut,NewYorkandPennsylvania.EachofficeisaLAN.Thereforethissatisfiesourfour
LAN segment requirement. The layout of the network given below:
4. Each office represents a Local Area Network and has various departments pertaining tothe services offered bythe
company.ThelayoutoftheeachLANaregivenbelowwithprojectrequirements:
SHOPRITE
RETAILSTORE
Main Branch
New Jersey
Management
Sales
HR
Server
New York Branch
Management
Sales
HR
Connecticut
Branch
Management
Sales
HR
Pennsylsvania
Branch
Management
Sales
HR
6. Step 3: We select an Enterprise Network with its span and choose the default span.
7. Step 4: After that we choose the network technologies we will be using for our simulation.
Step 5: We can review our selections as shown in the snapshot below.
8. The following tools are used in the creation of network:
1. Ethernet Hub
2. Wireless LAN and Ethernet Router
3. Nodes/Ethernet workstations
4. Ethernet server
5. Link
6. IP Cloud
7. Application Interface
8. Profile Interface
Step 6: After selection every tool that we needed for Enterprise Network creation. We created a four sub
network for the LAN inside the Enterprise which are connected with IP cloud. Thesub-networks areconnectedto
theIPcloudbyusingPPP28linkswhichcanbefoundinthelinkslistintheobjectpalette.Wealsoplaceapplicationdefinition
and profile definition objects which we will configure further on.
9. Step 7: In this step we design each of the sub-networks. By double clicking we can be entered in
the sub-network.
Possible Scenarios for creating the sub network with all the requirements:
Each subnet has a three department –Management, Sales and Human Resource.
All the Department has five workstations.
In Main Branch Human Resource department has a wireless connection.
All the four servers are located in the Main Branch New Jersey.
All the subnet can be connected to servers through the IP Cloud.
Sub network 1: Main Branch New Jersey
The first subnet serves as the main branch. The main office has three department and all the four
servers (HTTP, FTP, EMAIL and DATABASE) as mentioned before.
10. Configuration of all Three Departments and Servers:
We created a LAN for the three departments – Management, Sales and HR of the company and
configured the network elements as described in the table.
Departments IP Address Subnet
Mask
Default Route Workstation Link to
HUB/WLAN
Router
Central node
for each
Department
Management 192.168.1.1
-
192.168.1.5
Class C 192.168.1.254 Ethernet
(fixed mode)
10baseT Ethernet32_hub
Sales 192.168.2.1
-
192.168.2.5
Class C 192.168.2.254 Ethernet
(fixed mode)
10baseT Ethernet32_hub
HR 192.168.3.1
-
192.168.3.5
Class C 192.168.3.254 wlan_wkstn
(fixed mode)
Wireless Link Wlan_ethernet_
router
The following diagram shows the step to configure the IP and default Route:
11. We created a four servers in the Main Branch as follows HTTP, FTP, EMAIL and DATABASE
and configured the network elements of servers as described in the table.
Servers IP Address Subnet
Mask
Default Route Workstation Link to HUB Central node
for each
Department
FTP 192.168.4.1 Class C 192.168.4.254 Ethernet
Server
10baseT Ethernet32_hub
HTTP 192.168.4.2 Class C 192.168.4.254 Ethernet
Server
10baseT Ethernet32_hub
EMAIL 192.168.4.3 Class C 192.168.4.254 Ethernet
Server
10baseT Ethernet32_hub
DATABASE 192.168.4.4 Class C 192.168.4.254 Ethernet
Server
10baseT Ethernet32_hub
The following diagram shows the step to configure the IP and default Route:
12. The CISCO 3640 router is used to router information between two LAN segments and uses store
and forward routing. The router connects to the IP cloud with the help of a PP28 link. The routing
configuration of the Main branch New Jersey is as shown below:
13. Sub network 2: New York Branch
The second subnet serves as the New York branch. The New York office has three department
same as like main branch
Configuration of all Three Departments and Servers:
We created a LAN for the three departments – Management, Sales and HR of the company and
configured the network elements as described in the table.
Departments IP Address Subnet
Mask
Default Route Workstation Link to
HUB/WLAN
Router
Central node
for each
Department
Management 192.168.5.1
-
192.168.5.5
Class C 192.168.5.254 Ethernet
(fixed mode)
10baseT Ethernet32_hub
Sales 192.168.6.1
-
192.168.6.5
Class C 192.168.6.254 Ethernet
(fixed mode)
10baseT Ethernet32_hub
HR 192.168.7.1
-
192.168.7.5
Class C 192.168.7.254 Ethernet
(fixed mode)
10baseT Ethernet32_hub
14. The following diagram shows the step to configure the IP and default Route:
The CISCO 3640 router is used to router information between two LAN segments and uses store
and forward routing. The router connects to the IP cloud with the help of a PP28 link. The routing
configuration of the New York Branch is as shown below:
15. Sub Network 3: Connecticut Branch
The third subnet serves as the Connecticut branch. The Connecticut office has three department
same as like pervious two branches.
Configuration of all Three Departments and Servers:
We created a LAN for the three departments – Management, Sales and HR of the company and
configured the network elements as described in the table.
Departments IP Address Subnet
Mask
Default Route Workstation Link to
HUB/WLAN
Router
Central node
for each
Department
Management 192.168.9.1
-
192.168.9.5
Class C 192.168.9.254 Ethernet
(fixed mode)
10baseT Ethernet32_hub
Sales 192.168.10.1
-
192.168.10.5
Class C 192.168.10.254 Ethernet
(fixed mode)
10baseT Ethernet32_hub
HR 192.168.11.1
-
192.168.11.5
Class C 192.168.11.254 Ethernet
(fixed mode)
10baseT Ethernet32_hub
16. The following diagram shows the step to configure the IP and default Route:
The CISCO 3640 router is used to router information between two LAN segments and uses store
and forward routing. The router connects to the IP cloud with the help of a PP28 link. The routing
configuration of the Connecticut Branch is as shown below:
17. Sub Network 4: Pennsylvania Branch
The fourth subnet serves as the Pennsylvania branch. The Pennsylvania branch office has three
department same as like pervious two branches.
Configuration of all Three Departments and Servers:
We created a LAN for the three departments – Management, Sales and HR of the company and
configured the network elements as described in the table.
Departments IP Address Subnet
Mask
Default Route Workstation Link to
HUB/WLAN
Router
Central node
for each
Department
Management 192.168.13.1
-
192.168.13.5
Class C 192.168.13.254 Ethernet
(fixed mode)
10baseT Ethernet32_hub
Sales 192.168.14.1
-
192.168.14.5
Class C 192.168.14.254 Ethernet
(fixed mode)
10baseT Ethernet32_hub
HR 192.168.15.1
-
192.168.15.5
Class C 192.168.15.254 Ethernet
(fixed mode)
10baseT Ethernet32_hub
18. The following diagram shows the step to configure the IP and default Route:
The CISCO 3640 router is used to router information between two LAN segments and uses store
and forward routing. The router connects to the IP cloud with the help of a PP28 link. The routing
configuration of the Pennsylvania Branch is as shown below:
19. IP Cloud Configuration with all the subnets default gateway
The following diagram shows the step to configure the IP Cloud with all subnets default gateway:
20. Step 8: Once we have configured all the IP addresses we configure the application and user profiles
for the simulated network by using the Application Config and Profile Config
models.
Application Configuration
The first step is to drag an Application Config model from the object palette onto our
project workspace. We begin by defining the applications in the Application Config object.
This can be done by right clicking on the model and selecting: Edit attributes-
Application Definitions. The departments I created for the company requires four
servers for the application namely FTP, HTTP, EMAIL and DATABASE.
From the screen shot below we can see that all the applications that we require have already been
defined. We may choose to change the default properties of the defined applications by expanding
the rows further. For this scenario we choose to leave them as they are.
21. Then we configured the intensity of application usage is selected according to the requirement.
The chosen traffic load are given below for each application:
Application Load
FTP Medium Load
HTTP Heavy Browsing
EMAIL Medium Load
DATABASE Low Load
The selection of load intensity is shown below for one application, FTP:
22. Profile Configuration
Now we configure profiles supported in Profile Config. We added the client profiles and
link it with the corresponding servers as shown. The steps are repeated for the other profiles as
shown in below.
23. Step 9: Now we configure profiles supported by each workstation. We can do this by selecting all
the nodes in each individual department and right clicking and choosing: Edit Attributes-
Application Supported Profiles. For example, we choose all the nodes on in the
Management Department in the Main Branch. We right click on one of the nodes and choose:
edit attributes-Application supported profiles. Now these nodes can use all
the defined applications.
Similarly we define the supported profiles for all the departments in all the sub-networks.
Similarly we define the supported profiles for all the departments in all the sub-networks.
24. Step 10: Now we configure the servers. While the workstation themselves can be configure to act
as a server, for this scenario we chosen to use node model for each server. We place four servers
in the Branch office at New Jersey. These servers are dedicated servers and each of these servers
creates to one application.
FTP SERVER CONFIGURATION
FTP server is configures to run the FTP services by right clicking on the server model and
choosing: Edit attributes-Application Supported Services-FTP server. This is illustrated in the
given figure.
25. HTTP SERVER CONFIGURATION
HTTP server is configures to run the HTTP services by right clicking on the server model and
choosing: Edit attributes-Application Supported Services-HTTP server. This is illustrated in the
given figure.
26. EMAIL SERVER CONFIGURATION
EMAIL server is configures to run the EMAIL services by right clicking on the server model and
choosing: Edit attributes-Application Supported Services-EMAIL server. This is illustrated in the
given figure.
27. DATABASE SERVER CONFIGURATION
DATABASE server is configures to run the DATABASE services by right clicking on the server
model and choosing: Edit attributes-Application Supported Services-DATABASE server. This is
illustrated in the given figure.
28. Step 11: After all configuration Enterprise Network of Shoprite is all set for communication.
29. After all setup we checked the link connection to all nodes subnets and the routers.
Link Connection Check
All links and paths are connected properly.
30. Discrete Event Simulation:
Results and Graphs
We configured everything in the Enterprise Network. Before run the program we choose the
individual statistics we wish to observe. First we choose the global statistics for all servers,
Ethernet and IP with parameters like Traffic sent/received, page response time, download response
time, load and throughput. After that we will choose node statics and link statistics.
1. GLOBAL STATISTICS
31. After that we run the command from toolbox is used to run the network model. The time can be
set for the simulation to be performed.
Then by click the view result we can observe the statistics. Now the graphs for each application
are shown below.
32. Statistics of FTP Application
The traffic sent/received and the download response time of the FTP application is given below.
Statistics of HTTP Application
The traffic sent/received and object/page response time of the HTTP application is given below.
33. Statistics of EMAIL Application
The traffic sent/received and the download response time of the EMAIL application is given
below.
Statistics of DATABASE Application
The traffic sent/received of the DATABASE application is given below.
34. Statistics of ETHERNET:
The traffic delay of Ethernet is given below.
Statistics of IP:
The traffic dropped of IP is given below.
39. Comparison of parameters of different application
FTP,HTTP, EMAIL and DATABASE applications comparison of different parameters like
traffic load, traffic received/sent results are given below:
Ethernet Delay Load requests/sec
Packet Received Packet Sent
From the picture we can observe that all output is high in MAIN BRANCH because all the servers
is located in the MAIN BRANCH.
40. 3. LINK UTILIZATION AND THROUGHPUT
PP28 Link between IP Cloud and Main Branch
44. Comparison of Throughout and Utilization
By overlaying all statistics and comparing we can see that maximum link utilization and
throughput are on the links between the IP cloud and the Main office New Jersey.
45. 4. LINK FAILURE
Fail the link to the EMAIL server by right clicking on the link and choosing –fail this link
46. After running the Discrete Event Simulation again, we got the new results below.
We observe that no Email traffic is sent or received which green color in the figure. Email cannot
be accesses or sent until this link is recovered.
47. Conclusion:
Through this project we have studied, and attained experience about the use of RIVERBED
MODELER a network simulation tool. By using this simulation tool we develop proprietary wired
and wireless protocols and technologies, evaluate the servers in using different applications and
finally test and demonstrate design in realistic scenarios.
We have also learned how to design a small Enterprise Network and comprehended the analyze
the network in a different perspectives.