INTERNATIONAL JOURNAL OF ELECTRICAL, ELECTRONICS AND COMPUTER SYSTEMS, VOLUME 2, ISSUE 1, MAY 2011

Traffic Flows Modeling of a Digital Center at ABU Using OPNET Software Friday Yakubu, Barroon I. Ahmad Abstract— The large number of computers getting connected everyday to the Internet is becoming more and more seamlessly high with the decrease in the price of computers and network devices. The Digital Center attendants wish to better understand the behavior of applications traffic flows and expected merits of network topology before making final decision. To have the idea of the traffic behavior and expected performance of the new topology, simulation and modeling technique offers the best way of examining the optimal network design and applications traffic configurations. The objective of this work is to model a Digital Center at Ahmadu Bello University (ABU), Zaria-Nigeria, its network topology, applications environment and examine the usage of applications. Application and user profiles used in the Digital Center were developed. These applications include FTP clients, e-mail transfer agents, web browsers, VOIP and Video applications. The results obtained with live packet traces using Ethereal were examined and the simulation configuration adjusted accordingly. Finally, the simulation model was developed using the OPNET Modeler software package, and analysis of the traffic flows behavior were studied.

Index Terms— Simulation; Modeling; OPNET; Digital Center; and Traffics Flows

1 INTRODUCTION

T

he decrease in the price of computers and devices is increasing connectivity of large number of computers to the Internet. In the Internet business world, many are changing the topology of the network to support more Internet applications. The needs for better understanding of the anticipated benefits of new network topology cannot be under estimated. To help understand the benefits, simulation and modeling give quick and inexpensive way of studying multiple scenarios and identifying the best possible configuration [1]. Digital Center is a name used to refer to a place in ABU Zaria where students as well as staff browse the Internet for free. Those managing the Digital Centers may want to know if existing network topology and its resources are sufficient to support the new Internet applications services. The inexpensive way to understand the real situation is to create a model of the existing network and study it as surrogate of real system using network simulator. Simulation is an excellent tool for studying performance and identifying the cause of problems in the network [2]. This paper describes the first step in creating a simulation model of a Digital Center at ABU, Zaria-Nigeria which includes modeling its network topology, applications, and user profiles. Finally, describes the simulation model using OPNET Modeler.

2 METHODOLOGY

Network performance evaluation is a critical aspect of network services research that allows the evaluation of new ideas, identification of problems, bottlenecks and optimization of existing systems. There are three general approaches to network evaluation [1]: 1. Prototyping (Measurements): build the system and see how it works. 2. Analytical modeling: derive a mathematical model of the system and use it to analyze the system. 3. Simulation: build a software model of the system. Prototyping is most of the time not viable or time consuming especially for large scale systems. It also provides limited control and observation. In addition, there are many obstacles in the process of performing some studies. The most well known technique among others is building real test-bed for performance analysis. This is often not feasible because of the cost involved. Similarly, analytical modeling cannot capture highly complex systems [3]. For these reasons, simulation technique emerged as an attractive alternative that is heavily used in performance evaluation of computer systems. Thus, it becomes necessary to build a simulation model and study it as a surrogate for an actual sys Friday Yakubu is with Iya Abubakar Computer Center, Ahmadu Bello tem. University, Zaria, Nigeria.E-mail: yakfri@ yahoo.com.  Barroon I. Ahmad is with the Department of Mathematics, Ahmadu Bello University, Zaria, Nigeria. E-mail: [email protected].

Figure 1: Network Map (left), Lab Setup (right) To develop a simulation model of the targeted network environment, the physical topology of the network was examined and studied. To substitute the targeted network environment, a network model to examine and validate the implementation of individual application models was developed using the OPNET modeler.

2.1 Network Topology The physical topology of the Digital Center is depicted in Figures 1 and 2. The targeted Digital Center is a LAN network generating UDP and TCP traffic flows. The network environment consists of twelve client hosts installed with Windows operating system. Ten hosts are connected to a CISCO switch, and each of the hosts communicates with any of the three different servers via a wireless link. The switch and the other two workstations are connected via another CISCO switch. The last switch is connected to a router that serves as a gateway to the Internet. The LAN has bandwidth of 100 megabits, link data rate of 64,000 bps and router buffer of 2MB. The network is assumed to provide traffic flows significantly faster than what the wireless link can transmit. The Digital Center is actually connected to the University network and its Internet connection. Studying the entire University network is not part of the coverage for this paper. Figure 1 illustrates the topology of the targeted University Digital Center network and its Internet connections. In the simulated environment, two different hosts were set to generate voice and video streams and each of the ten hosts generates TCP traffic. Traffic shaping was not imposed in the network setup. The traffic flows are forwarded base on Besteffort scheme. The Internet is simulated using an IP32 cloud, a built-in OPNET model.

2.2 Modelling Traffics The packet traces from the University Digital Center were collected and analyzed using Ethereal, public domain protocol analysis software [4]. The most commonly used applications in the targeted network environment were identified and deployed into the simulation model for the Digital Center. We divided these applications into five categories as shown in table 1. TABLE 1 APPLICATION DEFINITIONS Application e-Mail (light) e-Mail (heavy) FTP (light) FTP (heavy) Web browsing (light) Web browsing (heavy) Video streaming VIOP stream

Meaning Indicate light activities of e-mail application Indicate heavy activities of e-mail Indicate light file transfer activities Indicate heavy file transfer activities Indicate light browsing activities Indicate heavy browsing activities Indicate Watching live video transmission Indicate duplex voice activities

To configure and model the behavior of the targeted Digital Center in OPNET, the Application and Profile Configuration modules were added to the emulated target network environment as shown in figure 1. The Application Configuration module contains the application definitions, while the Profile Configuration module contains the profiles of user behavior.

2.3 Application and Profile Configuration of the Targeted Digital Center Profiles describe the activity patterns of a user or group of users in terms of the applications used

over a period of time and for each application definition, you can specify usage parameters such as start time, duration and repeatability [6]. The targeted Digital Center has several different profiles running concurrently on its LAN. Using OPNET the different profiles were configured to run concurrently.

Figure 2: Profile Configurations The profiles contain a list of applications shown in table 1. Figure 2 depicts the profile configurations. A profile is constructed using different application definitions. The targeted environment has identical applications with different usage parameters. However, different names were used to identify these distinct application definitions. Figure 3 depicts the application configurations.

list of built-in models. OPNET provides pre-set configurations such as: Light Browsing, Heavy Browsing, Searching, or Image Browsing. For thetargeted network environment, light and heavy browsing were selected. Table 2 shows the preset configurations parameters of the selected web applications, while Figure 3 illustrates steps for configuring a web application in OPNET. HTTP Specification which defines the version of HTTP protocol, Page Interarrival Time which specifies time in seconds between consecutive webpage downloads, and type of service specifies traffic shaping policy adapted. TABLE 2 HEAVY (TOP) AND LIGHT (DOWN) W EB BROWSING CONFIGURATION Attribute HTTP specification Page interarrival (second) Type of service

Value time

Best effort

Attribute HTTP specification Page interarrival (second) Type of service

HTTP 1.1 Exponential (60)

Value time

HTTP 1.1 Exponential (720) Best effort

Figure 3: Profile Configurations kjk

3 MODELLING APPLICATIONS IN OPNET We modeled the user applications via OPNET Modeler simulation software. OPNET Modeler provides standard built-in models for software applications such as web (HTTP), e-mail, FTP, and remote login, which can be easily configured to simulate applications used in the Digital Center [6].

3.1 Configuring Web (HTTP) Applications To configure a web browsing application, the application named HTTP was selected from the

Figure 4: Configuring a Web Application in

OPNET

3.2 Configuring e-Mail Applications To configure an e-mail application, the application named e-Mail was selected from the list of built-in models. OPNET provides preset configurations for e-mail application as well. The pre set e-mail configurations include Low Load, Medium Load, and High Load. The model also allows custom configuration via parameters such as Send(Receive) Interarrival Time which spe-

cify the amount of time in seconds between consecutive sent (receive) operations, Send(Receive) Group Size which determine the number of emails messages per single sent(receive) operation, and E-Mail Size which defines the size of email message in bytes. The e-mail configurations for selected loads are shown in Table 3 and also figure 5 shows how to configure an e-mail application in OPNET. TABLE 3 HIGH (TOP) AND LOW (DOWN) LOAD EMAIL CONFIGURATION

Attribute Send interarrival (second) Send group size Receive interarrival (second) e-mail size (bytes) Type of service

Attribute Send interarrival time (second) Send group size Receive interarrival time (second) e-mail size (bytes) Type of service

time

Value Exponential (360)

time

Constant (3) Exponential (360) Constant (2000) Best effort

the FTP file to be transferred. The e-mail configurations are shown in Table 4, while figure 6 depicts how to configure an FTP application in OPNET. TABLE 4 HEAVY (TOP) AND LIGHT (BOTTOM) FILE TRANSFER CONFIGURATION Attribute InterRequest (seconds) File size (bytes) Type of service

Value time

Constant (50000) Best effort

Attribute InterRequest (seconds) File size (bytes) Type of service

Exponential (360)

Value time

Exponential (3600) Constant (1000) Best effort

Value Exponential (3600) Constant (3) Exponential (3600) Constant (500) Best effort

Figure 6: Configuring an ftp Application in

OPNET

Figure 5: Configuring an e-mail Application

in OPNET

3.3 Configuring FTP Applications To configure ftp application, the application named ftp was selected from the list of built-in models. OPNET also provides preset configurations for FTP application. The preset FTP configurations include Low Load, Medium Load, and High Load. The Inter-Request Time parameter is the time in seconds between consecutive FTP requests. The File Size defines the size in bytes of

3.4 Configuring VOIP Stream In order to model VOIP traffic in OPNET, an object called application definition attribute which consist of predefined applications was modified to support voice streaming. The Voice application was modeled by configuring the (Voice) Table parameters. The VoIP application uses G.711 encoder scheme and Interactive Voice (6) as the type of service for establishing the VoIP calls. The Video stream configuration is shown in Table 5 and figure 7 illustrates the configuration of VIOP stream application in OPNET.

TABLE 5 VOIP STREAM CONFIGURATION Attribute Silence length (seconds) Talk spurt length (seconds)

Value Exponential (0.65) Exponential (0.352)

Encoder scheme Voice frame per packet Type of service

G.711 (silence) 1 Interactive (6)

4

CONCLUSION

It is quite common for multiple users of the Internet to get connected at the same time, and running multiple networking applications including video and VOIP applications. Consequently, there are many circumstances in which the last hop link becomes a bottleneck resulting in congestion among user’s applications. This paper describes the methodology developed for modeling applications and user profiles in a Digital Center at Ahmadu Bello University, Zaria-Nigeria using OPNET Modeler.

REFERENCES [1]

Figure 7: Configuring VOIP Application in

OPNET

[2]

3.5 Configuring Video Stream To model video stream application, application definition attribute object which consist of predefined applications was used with modification on the predefined parameters. The Video stream configuration is shown in Table 6, while figure 7 describes configuration of Video stream application in OPNET. TABLE 6 VIDEO STREAM CONFIGURATION Attribute Frame interval time Frame size Type of service Traffic mix (%)

Value 10 frames/sec 128x120 pixels Best effort All discrete

Figure 7: Configuring Video Stream Applica-

tion.

[3]

[4] [5] [6]

M. Ahmed, S. Mahmood, M. U. Ghani and M. Shoaib, “Performance Evaluation Metrics: Can buffer size override the higher rotational speed of hard disk in terms of overall performance or throughput?”, Volume 6, Issue 10, Cumulated No. 31, October 1, 2010, Journal of American Science 2010, ISSN: 1545-1003. http://www.jofamericanscience.org/journals/amsci/a m0610/59_3458am0610_503_508.pdf, accessed on 25/3/2011. D. Anagnostopoulos and M. Nikolaidou (2001). An Object-Oriented Modeling Approach for Dynamic Computer Network Simulation, International Journal of Modelling and Simulation. Vol 21, No. 4, 2001 http://www.dit.hua.gr/~mara/publications/ijms01.pdf, accessed on 25/10/2010. C. John and R. John (2002), Network modeling and Simulation with Mixed Traffic Data Sources, Western Marine Conference. http://www.drewhamilton.com/wmc00/Hamilton_WMC2000.pdf, accessed on 15/10/2010. Ethereal: A Network Protocol Analyzer, http://www.ethereal.com, accessed 8/15/2006. OPNET Technologies, Inc. http://www.opnet.com/, accessed 8/15/2009. OPNET Technologies, Inc. OPNET Modeler Product Documentation, release 11.5. http://opnet-modelerdocumentation.software.informer.com/, accessed on 20/10/2010.

Download [PDF] - Institute of Computing & ICT - ABU Zaria

2.1 Network Topology. The physical topology of the Digital Center is depicted in Figures 1 and 2. The targeted Digital. Center is a LAN network generating UDP and. TCP traffic flows. The network environment consists of twelve client hosts installed with. Windows operating system. Ten hosts are con- nected to a CISCO ...

322KB Sizes 0 Downloads 100 Views

Recommend Documents

Abu-hmeidan_Yacub.pdf
Yacub Abu-hmeidan [who uses the alias Ghazawneh on Facebook] spreads hatred of. Jews on social media and was a student at Glendale Community College ...

Sunan Abu Dawud.pdf
Battles (Kitab Al−Malahim)........................487. 38. Prescribed Punishments (Kitab Al−Hudud)...........495. 39. Types of Blood−Wit (Kitab Al−Diyat)...............519. 40. Model Behavior of the ... teaches you everything, even about excr

Computing is a Natural Science - the denning institute
Jul 14, 2007 - Even politicians are utilizing sophisticated social data analyses, ... framework for computing [3, 4]. ... scale-free structure of network connectivity ...

abu zahrim yaser
awarded February, 2017 to. ABU ZAHRIM YASER. The Editors of CHEMICAL ENGINEERING JOURNAL. Elsevier, Amsterdam, The Netherlands.

The Biography of Theodore Abu Qurrah Revisited
ince the long and halting process of the recovery of Theodore Abu Qurrah's works be-. Sgan, there have been ..... Pomialovskii, edi, 14.11-15.4. 1"' Ibid., 14.11.

THE INSTITUTE OF COST & WORKS ACCOUNTANTS OF INDIA THE INSTITUTE ...
THE INSTITUTE OF COST & WORKS ACCOUNTANTS OF INDIA. THE INSTITUTE OF ... the time of admission to Foundation or Intermediate Course. ... Training programmes will be conducted at the Regional Councils and major Chapters.

ISO Certification Abu Dhabi.pdf
Page 2 of 5. ISO Certification Cost. We are ISO 9001,. 14001 and OHSAS. 18001 consultants. with operations in the. United Kingdom and. across the Middle. East. Set up in 1997,. Environmental and. Quality Solutions. (EQS) specializes in. helping compa

CV_Proof. Dr. Yousef Abu-Mayla.pdf
Home: Rafah - Gaza Strip. .... project – work shop of the Research Area “Atmosphere and Climate” in ... Abu Mayla Y (2001)A study of the wadi hydrology network in Arab ... Dr. Yousef Abu-Mayla.pdf. CV_Proof. Dr. Yousef Abu-Mayla.pdf. Open.

Heritage - Iraqi Archaeologist Dr.Bahnam Abu Al-Soof
many new opportunities for the iraqi business community. ... for knowledge sharing, project management. consultation and collaboration by local oonservation ... GHF has received software and hardware grants from ESRl,. Autodesk, Trimble ...

EISENMAN—The ABU GHRAIB EFFECT.pdf
Page 4 of 287. Page 4 of 287. EISENMAN—The ABU GHRAIB EFFECT.pdf. EISENMAN—The ABU GHRAIB EFFECT.pdf. Open. Extract. Open with. Sign In.

Abu Daud 2.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Abu Daud 2.pdf.

The Seasonality of Con ict
Apr 7, 2017 - working and the intensity of conflict implying that better wages or job prospects increase ... alternative explanations based on temperature, precipitation, ...... For example, reducing food and energy subsidies (which are ...

The Seasonality of Con ict
Bo and Dal Bo 2011) and empirical studies establish a connection between the returns to working and the intensity of conflict implying that better wages or job ...

Florida Institute of Technology
Florida Tech Senior Design Project. Railroad Signaling Block Design Tool ... The software application shall include formulas on the following specific parameters ...

ICT AcceptableUseStudent.pdf
immediately inform a member of staff who will then report it to a member of the ICT Support Team or a member of. the senior management team. 2.10 Students ...

The Biography of Theodore Abu Qurrah Revisited
... Akhbdr all-qiddisin alladhina khamjil min bileidind (British Library, ms. ar. ch. 38 = add. 9965, fol. 32a). .... most detailed investigation of a christological theme.

The Etiquette Of Seeking Knowledge by Shaykh Bakr Abu Zayd.pdf ...
There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. The Etiquette Of Seeking Knowledge by Shaykh Bakr Abu Zayd.p

advanced institute advanced institute of technology ... -
Head Department of Computer Science and Engg. ... Courses at Advances Educational Institutions ... infrastructure, sophisticated labs and all other facilities.

Untitled - ICT-SMK.Net
Using the JOE Editor. 91 .... The bottom line is that you want to find quick and efficient ways of getting Ubuntu .... chris@host1:/tmp$ sudo useradd -m joe.