Documente Academic
Documente Profesional
Documente Cultură
Ioannis Gallikas
MSc in Communication Network Planning and Management
2003-2004
This report is submitted in partial submission for the degree of Master of Science
Portsmouth University
Abstract
The need for communication and data transfer was the reason that networking was introduced. Only lately though networks provide us with real-time applications. Real-time applications are the ones that we need to have the smallest possible end-to-end delay. Such application are voice and video conferencing. Unfortunately these applications are bandwidth demanding and most of the times, a new higher capacity link is needed in order to provide the required delays, something that it is not cost effective. Hence a new way was needed in order to run these applications and still maintain the low end-to-end delay without having to spent more money on upgrading the network. This is done by implementing certain QoS techniques in the network which will promise low latencies on the desired applications. The technique that we are most interested in is Differentiated Services. There are several different ways to apply DiffServ in a network. All these ways will be explained later on the background theory. A network was chosen in order to apply DiffServ. This network was decided to be the GUNET since it is a highly utilized network and such applications are under testing in reality. Instead of doing all the calculations by hand, computer software will be used, something that is much faster and much more accurate. The simulation package that will be used is called OPNET and is one of the best in the market for network simulation.
Portsmouth University
ACKNOWLEDGEMENTS
I would like to thank my Supervisor Mr Frank Margrave for providing me with useful knowledge and directions on how to deal this project and Dr. Nick Savage for his help and his notes provided on differentiated services. I would also like to thank my parents and the rest of my family who supported me and helped me reach this far with my studies. I would also like to thank my colleagues who helped me by providing useful tips and support during the past few months here in Portsmouth. Finally I would like to thank Mr. Vasileios Adamos, whose previous experience of OPNET was very helpful.
.dedicated to my mother
ii
Portsmouth University
GLOSSARY
ATM CoS CQ DIFFSERV DLSw DWRR FIFO FTP GRNET GUNET INTSERV IP IPX ISP MDRR MPLS PPP PQ QoS PBR RSVP SAP SMB SNA TCP ToS UDP VOIP WFQ Asynchronous Transfer Mode Class of Service Custom Queuing Differentiated Services Data-Link Switching Deficit Weighted Round Robin First In First Out File Transfer Protocol Greek Network Greek Universities Network Integrated Services Internet Protocol Internetwork Packet Exchange Internet Service Provider Modified Deficit Round Robin Multi Protocols Labeling Switching Point to Point Priority Queuing Quality of Service Policy-Based Routing ReSerVation Protocol Service Advertising Protocol Subnet Bandwidth Management Systems Network Architecture Transmission Control Protocol Type of Service User Datagram Protocol Voice Over IP Weighted Fair Queuing
iii
Portsmouth University
CHAPTER 1 1. INTRODUCTION
The demand for constant and instant data communication between companies, organizations and universities which are spread in different locations has developed the need of networking. As these networks become larger, much faster, more complex and more bandwidth demanding, their design and management becomes an ever more challenging task. Cost is a significant factor in a networks capacity. The increased demand on bandwidth when new applications are introduced in a network makes a network to be cost defective since better links are needed to keep the utilization levels and end-to-end delay in minimal levels. Hence new ways should be introduced in a network that would cope with the extra loading and still produce good results. This was succeeded by applying a new method of traffic control called QoS. There are different approaches of QoS. The one of most interest is differentiated services which work with real-time applications such as voice and video. No matter what the nature of the network to be implemented is, before building anything it is best to design it and, if possible, test it. This is the most cost efficient way as potential errors are easier to be identified and corrected in an early stage. Problems can be solved through, by running a computer simulation program since that would be more time effectual than actually performing the calculations by hand. OPNET is a graphically based package which allows the performance of communication networks ranging from simple links to complex enterprise-wide systems to be analyzed and predicted. It supports a building-block approach where the blocks are familiar objects in the real world. The design tool has a library of these network objects, each one representing one or more real-world objects. The object parameters are easily adjusted to match the real world objects. It is capable for performing analysis of both computer and communication networks and based on a description of a network, its control algorithms and workload, it simulates the operation of the network and provides measures of network performance.
Page 1
Portsmouth University
Page 2
Portsmouth University
The network on which Differentiated Services are going to be applied is the Greek Universities Network, which is known as GUNET. The network consists of sixteen universities, eight of which are located in Athens, two are located in Thessaloniki and the rest six are spreaded around Greece. The decision of choosing that specific network was based on the fact that GUNET is my countrys network which makes it easier to me to find vital information and on the fact that only lately the universities started exploring the option of adding VOIP in the network and Video Conferencing will be another advantage.
Page 3
Portsmouth University
Page 4
Portsmouth University
Prioritization (differentiated Services) where the network traffic is classified and apportioned network resources according to bandwidth management policy criteria. A networks elements give preferential treatment to classifications identified as having more demanding requirements, when QoS is enabled. (internet reference 27) There are two more types that can characterize QoS. Per Flow : Flow is a unidirectional data-stream between two nodes, and
is identified by its transport protocol, source address, source port, and destination address and destination port. Per Aggregate: Aggregate is just more than one flows which have some common parameters as the ones mentioned earlier.
Portsmouth University
biggest advantage of ATM over technologies such as Frame Relay and Fast Ethernet is that ATM supports QoS which allows ISPs to guarantee to customers that a low end-to-end delay will not exceed certain limits. QoS is based in four Protocols: ReSerVation Protocol (RSVP) Is the one that provides the signalling to enable the resource reservation Protocol on the network. Although RSVP is used mainly on a Per-Flow basis, sometimes, it can be seen to be used also PerAggregates. Differentiated Services (DiffServ) Is the simplest way to categorize and prioritise network traffic flows and aggregates. Multi Protocols Labeling Switching (MPLS) Is the one that manages the bandwidth on a network by routing the traffic according to the labels in the packet headers. Subnet Bandwidth Management (SMB) Is responsible of categorizing and prioritizing at the data link-layer on wired networks.
Page 6
Portsmouth University
Page 7
Portsmouth University
differentiated on the basis of performance in addition to pricing tiers used in the past. Diffserv provides a wide range of services through a combination of the following functions. Setting bits in the TOS octet at network edges and administrative boundaries using those bits to determine how packets are treated by the routers inside the network conditioning the marked packets at network boundaries in accordance with the requirements of each service. The diffserv architecture is composed of a number of small functional units implemented in the network nodes. This includes the definition of a set of Per-Hop Behaviors (PHBs), packet classification and traffic conditioning functions like metering, marking, shaping and policing. The resource allocation for each service type adds a new dimension to the problem, for which the Bandwidth Brokers are being considered. (Internet reference 3) The diffserv model is scalable because of a few reasons that are listed below: Diffserv suggests that the more expensive tasks like multi-flow classification, policing, shaping and marking be done at the border routers of the ISP networks. This is because the border routers deal with the customer links that are slow as a result of which it has time to do the costly functions like MFC and traffic conditioning. The core routers, on the other hand simply does the forwarding based on the diffserv code point (DSCP), which is the first six bits in the TOS byte in the IP header. Since the core routers need not maintain any per-flow state, this model is more scalable. The granularity of service provisioning is a class in diffserv, as opposed to being a flow in IntServ. Multiple flows may be mapped on to a single per-hop behaviour (PHB), which is indicated by the value in the DSCP. This too, ensures the scalability of the diffserv model. (Internet reference 3) When implementing Diffserv, it can be seen that: Diffserv codepoints (DSCPs) redefine the Type-of-Service (ToS) in the IPv4 field Precedence bits are preserved Type-of-Service bits are NOT
Page 8
Portsmouth University
IP precedence utilizes the 3 precedence bits in the IPv4 header's Type of Service (ToS) field to specify class of service for each packet. Traffic can be partitioned in up to six classes of service using IP precedence (two others are reserved for internal network use). The queuing technologies throughout the network can then use this signal to provide the appropriate expedited handling. (Internet reference 25) The service provider establishes a Service Level Agreement (SLA or service level specification) with each user. A user can then only generate a certain amount of traffic of a specific class. The traffic is policed at the border of the service provider network. This method differs to the integrated services approach by treating each packet individually rather than trying to specify a set route that the packet must take. The overall network must set-up to meet all of the SLAs. [1]
Page 9
Portsmouth University
QUALITY OF SERVICE PARAMETERS Service Level 1 3 Application Non-critical data Similar to Internet today No minimum information rate guaranteed Mission-critical data VPN outsourcing, ecommerce Similar to ATM VBR Real time applications Video streaming, voice, videoconferencing Priority Mapping Best-effort delivery Unmanaged performance
Low loss rate Controlled delay and delay variation Low loss rate Low delay and delay variation
Page 10
Portsmouth University
2.1.2.2. IP PRECEDENCE
Use of IP Precedence allows specifying the class of service for a packet. The three precedence bits in the IPv4 headers type of service (ToS) field is used for this purpose.
Figure 2 shows the ToS field. (internet reference 28)
Using the ToS bits, we can define up to six classes of service. Other features configured throughout the network can then use these bits to determine how to treat the packet in regard to the type of service to grant it. These other QoS features can assign appropriate traffic-handling policies including congestion management strategy and bandwidth allocation. For example, although IP Precedence is not a queueing method, queueing methods such as weighted fair queueing (WFQ) and Weighted Random Early Detection (WRED) can use the IP Precedence setting of the packet to prioritize traffic. (internet reference 28) By setting precedence levels on incoming traffic and using them in combination with the Cisco IOS QoS queueing features, we can create differentiated services. We can use features such as policy-based routing (PBR) and CAR to set precedence based on extended access list classification. These features afford considerable flexibility for precedence assignment. For example, we can assign precedence based on application or user, or by destination and source subnetwork. (internet reference 28) So that each subsequent network element can provide service based on the determined policy, IP Precedence is usually deployed as close to the edge of the network or the administrative domain as possible. We can think of IP Precedence as an edge function
Page 11
Portsmouth University
that allows core, or backbone, QoS features, such as WRED, to forward traffic based on CoS. IP Precedence can also be set in the host or network client, but this setting can be overridden by policy within the network. (internet reference 28) We can use the three IP Precedence bits in the ToS field of the IP header to specify CoS assignment for each packet. We can partition traffic into up to six classes, the remaining two are reserved for internal network use and then use policy maps and extended ACLs to define network policies in terms of congestion handling and bandwidth allocation for each class. (internet reference 28)
However, the IP Precedence feature allows considerable flexibility for precedence assignment. That means we can define your own classification mechanism. For example, we might want to assign precedence based on application or access router. (internet reference 28)
Page 12
Portsmouth University
5 3
2 6 4
The figure above represents a FIFO queue. As it can be seen, different packet flows are represented by different colors. The queue acts as a barrier for temporary burst of packets avoiding unnecessary dropping by storing them, hoping that congestion will improve and they can be dispatched. When congestion is heavy and the queue overflows new arriving packets will be dropped since the router doesnt have any other choice for them.
Page 13
Portsmouth University
Page 14
Portsmouth University
In the above Figure, the priority-group command assigns priority list 1 to Serial1. The priority-list command defines the queuing algorithm to be used by queue list 1 and maps the traffic into various queues. Priority queuing is useful when you want to guarantee that the DLSw+ traffic will get through even if it delays other types of traffic. It works best if the DLSw+ traffic is low volume (for example, a small branch with a transaction rate of five to ten transactions per minute), and the number of queues is kept to a minimum (two or three). In this configuration, DLSw+ is in the highest-priority queue, Telnet (TCP port 23) is in the medium queue, IPX is in the normal queue, and FTP (TCP port 21) is in the lowest-priority queue.
Page 15
Portsmouth University
Custom queuing is commonly used when deploying DLSw+ networks because it allows the network manager to ensure that a guaranteed percentage of the link can be used for SNA, Telnet, and FTP. However, unless the DLSw+ traffic is broken into separate TCP conversations (using SAP or LOCADDR prioritization described earlier), batch SNA transfer or NetBIOS traffic shares the same output queue and may negatively impact interactive SNA response times.
Page 16
Portsmouth University
Page 17
Portsmouth University
Page 18
Portsmouth University
Q1
Port
Q2
Page 19
Portsmouth University
Page 20
Portsmouth University
CHAPTER 3
3. OPNET MODELLER
Problems can be effectively solved through, by running a computer simulation program since that would be more time efficient than actually doing the calculations by hand. OpNet is a graphically based package which allows the performance of communication networks ranging from simple links to complex enterprise-wide systems to be analysed and predicted. It supports a building-block approach where the blocks are familiar objects in the real world. The design tool has a library of these network objects, each one representing one or more real-world objects. The object parameters are easily adjusted to match the real world objects. It is capable for performing analysis of both computer and communication networks and based on a description of a network, its control algorithms and workload, it simulates the operation of the network and provides measures of network performance. [5] One of the first steps before the beginning of the Project is to register with the OPNET simulation package. This will be done through the OPNET website. In order to learn the capabilities of the OPNET simulation package, there are several online models which were contributed by users, and also there are tutorials on the Program that will be very helpful to succeed in a quick understanding on how the programs works and how to model the required network for this project. [5]
Portsmouth University
Modeller supports all network types and technologies, allowing you to answer the most difficult questions with confidence. Using OPNET Modeller, an organization will benefit by: Boosting Network R&D Productivity: Leverage the specialized editors, analysis tools, and off-the-shelf models provided with OPNET Modeller to focus the time on the unique parts of a project. [5] Improving Product Quality: Test product or service designs in realistic customer scenarios before production. [5]
Reducing Time-to-Market: Develop and validate the designs ahead of the
competition. Use the models to demonstrate the value of the solutions to customers and partners. [5]
simulations. It centres on the project editor. In this workspace you can create a network model, collect statistics directly from each network object or from the network as a whole, execute simulation and view results. [2] Create Network Models Choose Statistics
22
Portsmouth University
Portsmouth University
The probe editor: The probe editor lets you specify the statistics to be collected during simulation. The simulation sequence editor: Although you can run simulations from within the project editor, you may want to specify additional simulation constraints in the simulation sequence editor. The analysis tool: With analysis tool you can create scalar graphs, for parametric studies, define templates to which you apply statistical data and create analysis configurations that you can save and view later. The filter editor: The filter editor lets you create additional filters.
The project editor will be explained below since is the one that will be used for the design and simulation of the projects network. [2]
24
Portsmouth University
25
Portsmouth University
Scenarios: contains operations that provide control over the scenarios included in a project Topology: contains operations related to network topology, including building a network and creating network objects. Traffic: contains operations related to specifying the traffic on a network, including importing traffic files and specifying routing across the network. Protocols: contains operations related to specific protocol models. Simulation: contains operations for configuring and running simulations. Results: contains operations that control the collection and viewing of statistics. Windows: lists all open editor windows and allows the user to make one active. Help: provides access to context-sensitive help, the online documentation and tutorial, and information about the program. Pop-Up Menus: In addition to the menu bar menus, several pop-up menus are available within the Project Editor: Workspace pop-up menu: contains operations related to setting the workspace view, collecting results, and viewing results. Object pop-up menu: contains operations related to setting object properties, collecting results, and viewing results. Statistic pop-up menu: contains operations related to a particular statistic. Panel pop-up menu: contains operations related to the appearance and content of an analysis panel. Graph pop-up menu: contains operations related to the appearance and content of a graph. Miscellaneous Operations: There are also several operations available within the Project Editor that do not appear on a menu:
26
Portsmouth University
Display Subnet View: this operation moves the user down to the network hierarchy by displaying the contents of a subnetwork when he/she double clicks on the subnets icon. Open Node Model: this operation automatically opens the corresponding node model when the user double clicks on a network node. Zoom Panel: The Zoom Panel operation lets the user magnify a selected part of an analysis panel by dragging the cursor across it. After this operation, the selected area fills the panel. The user also can use <Control>+z and <Control>+u to zoom into and out for the centre of the panel. Pan Panel: in an analysis panel, this operation shifts the display along the horizontal axis when the left-arrow or right-arrow keys are pressed by the user. (Not available when the full horizontal scale is displayed.) Action Buttons: The Project Editor provides action buttons for several frequently used operations. The button labels in figure 2.11 identify the operation invoked by the button. [3]
Topology: Object Palette View: Go to parent Subnetwork View: Zoom in Results: Hide/or Show all panels Results: View Results
Results: View Web Reports Topology: Mark object as failed Topology: Mark object as recovered Simulation: Run Simulation
View: Zoom out Figure 3. Action buttons of the Project Editor [3]
Features: Originally developed at MIT, and introduced in 1987 as the first commercial network simulator, OPNET Modeller continues to define the state of the art with the following features:
27
Portsmouth University
Hierarchical network models: Manage complex network topologies with unlimited subnetwork nesting. Object-oriented modelling: Nodes and protocols are modelled as classes with inheritance and specialization. Clear and simple modelling paradigm: Model the behaviour of individual objects at the Process Level and interconnect them to form devices at the Node Level. Interconnect devices using links to form networks at the Network Level. Organize multiple network scenarios into Projects to compare designs. Finite state machine modelling of protocols and other processes. Simulate any required behaviour with C/C++ logic in FSMs states and transitions. We control the level of detail. Comprehensive support for protocol programming. Over 400 library functions simplify writing protocol models. Wireless, point-to-point, and multipoint links: Link behaviour is open and programmable. Accurately account for delay, availability, bit errors and throughput characteristics of links. Incorporate physical layer characteristics and environmental effects. Geographical and mobility modelling: Model cellular and satellite networks or any network with mobile nodes. Control each nodes position dynamically or pre-define trajectories. Add maps and other background graphics for context and visual enhancement. Total openness: APIs for program-driven construction or inspection of all models and result files. Easily integrates existing code libraries into your simulations. Source code provided for all standard models. Integrated analysis tools: Comprehensive tools to display simulation results. Easily plot and analyze time series, histograms, probability functions, parametric curves, and confidence intervals. Export to spreadsheets pr use XML. Animation: Animate model behaviour, either during or after simulation. Integrated debugger: Quickly validate simulation behaviour or track down problems. 28 Ioannis Gallikas MSc
Portsmouth University
Import data from text files, XML, and popular tools from HP, Concord, Network Associates Sniffer, NetScout, Infovista, and others. Financial cost attribute for devices: Export network costs to spreadsheets for a financial bottom line. Comprehensive library of detailed protocol and application models: Including Multi-Tier Applications, Voice, HTTP, TCP, IP, OSPF, BGP, EIGRP, RIP, RSVP, Frame Relay, FDDI, Ethernet, ATM, 802.11 Wireless LANs, MPLS, PNNI, DOCSIS, UMTS, IP Multicast, Circuit Switch and many more. Provided as FSMs with open source code. Comprehensive library of detailed protocol and network devices: The Standard Model Library includes hundreds of vendor specific and generic device models including routers, switches, workstations, and packet generators. Quickly assemble our own device models using the Device Creator. Aggregate traffic from LANs or Cloud nodes. Highly efficient simulation engine and memory management. Hybrid simulations significantly improve performance by combining the accuracy of discrete-event simulation with the speed of analytical modelling. Runtime environment: Deliver proprietary protocol and device models to endusers, running simulations and working at the network level only. Windows NT, Windows 2000, and UNIX supported (transparent cross platform usage). Convenient licensing: Enhanced floating license system with automatic license key downloads via the Internet and graphical license management. What does OPNET Modeller Provide? OPNET Modeller provides: An intuitive graphical environment that precisely models real networks, devices, protocols, and applications. The control over modelling detail needed to support our engineering decisions. Built-in support for simulating all types of network technologies.
29
Portsmouth University
The industrys most comprehensive library of standards-based protocol models, with completely open source code. An environment designed to model proprietary protocols using Finite State Models, C/C++ and extensive libraries. Powerful analysis tools integrated directly into the GUI. The industrys most efficient simulation engine, with hybrid simulation capability. Outstanding support and services to ensure user success. [4]
30
Portsmouth University
CHAPTER 4
Picture 1 GRNET
31
Portsmouth University
GUNET consists of sixteen Universities in total. Table 1 below displays the Universities and their location in Greece. Greek Universities Agricultural University Pantion University Harokopio University University of Pireus National Metsovio University National Kapodistriako University University of Economics University of Good Arts Aristotelio University Macedonia University University of Patra University of Crete Ioannina University University of Thessaly University of Thrace Aegean University Location Athens Athens Athens Athens Athens Athens Athens Athens Thessaloniki Thessaloniki Patra Heraklio Ioannina Larissa Xanthi Rhodes
As it can be seen in Table 1, there are eight Universities in Athens, two Universities in Thessaloniki and the rest are some on the mainland and some on the islands. Picture 2 displays the GUNET Network and the backbone links that connect the University Routers and the cities where the Universities are located.
32
Portsmouth University
Table 2 below displays the capacity of the Backbone Network links between the University Routers. From Location Athens Athens Athens Athens Athens Athens Athens To Location Thessaloniki Patra Heraklio Rhodes Larissa Ioannina Xanthi Capacity (Mbps) 69 Mbps 45 Mbps 60 Mbps 1000 Mbps 18 Mbps 4.5 Mbps 6 Mbps
Table 2 Capacity of the GUNET Backbone Network between the University Routers
33
Portsmouth University
By looking extensively at Picture 1, we can see the capacity of the links that each University is connected with the main Router of the city. The capacity of the links can be seen in Table 3 below. In Athens, it can be seen that there are three Routers in which the universities are connected with and these three Routers are the ones that connect to the main Router of Athens. The capacity of the link between these Routers is 2.5 Gbps. From City Router Athens Athens Athens Athens Athens Athens Athens Athens Thessaloniki Thessaloniki Patra Heraklio Ioannina Larissa Xanthi Rhodes To University Agricultural University Pantion University Harokopio University University of Pireus National Metsovio University National Kapodistriako University University of Economics University of Good Arts Aristotelio University Macedonia University University of Patra University of Crete Ioannina University University of Thessaly University of Thrace Aegean University
Table 3 Capacity of the links Between Universities and City Router
Capacity (Mbps) 1000 Mbps 1000 Mbps 2 Mbps 1000 Mbps 1000 Mbps 1000 Mbps 1000 Mbps 2 Mbps 34 Mbps 18 Mbps 34 Mbps 28 Mbps 24 Mbps 8 Mbps 21 Mbps 1000 Mbps
34
Portsmouth University
The "Application Config" node can be used for the following specifications: 1. "ACE Tier Information": Specifies the different tier names used in the network model. This attribute will be automatically populated when the model is created using the "Network->Import Topology>Create from ACE..." option. The tier name and the corresponding ports at which the tier listens to incoming traffic is cross-referenced by different nodes in the network. 2. "Application Specification": Specifies applications using available application types. You can specify a name and the corresponding description in the process of creating new applications. 35 Ioannis Gallikas MSc
Portsmouth University
For example, "Web Browsing (Heavy HTTP 1.1)" indicates a web application performing heavy browsing using HTTP 1.1. The specified application name will be used while creating user profiles on the "Profile Config" object. 3. "Voice Encoder Schemes": Specifies encoder Parameters for each of the encoder schemes used for generating Voice traffic in the network.
The "Profile Config" node can be used o create user profiles. These user profiles can then be specified on different nodes in the network to generate application layer traffic. The application defined in the "Application Config" objects are used by this object to configure profiles. Therefore, you must create applications using the "Application Config" object before using this object. You can specify the traffic patterns followed by the applications as well as the configured profiles on this object.
36
Portsmouth University
Defines attribute configuration details for protocols supported at the IP layer. These specifications can be refrenced by the individual nodes using symbolic names (character strings.) 1. "Queuing Profiles": Defines different queuing profiles such as FIFO, WFQ, Priority Queuing, Custom Queuing, MWRR, MDRR and DWRR. 2. "CAR Profiles": Defines different CAR profiles that can be used in the network.
The Subnet node will be used to represent each city where the University will be located. Inside each Subnet, there will be the nodes that will represent the Universitys Network configuration. In two cases though, the Subnet node will represent the University as well since in these locations multiple Universities are located. These two locations are Athens with 8 Universities and Thessaloniki with 2 Universities.
37
Portsmouth University
Use 100BaseT_LAN object to represent a Fast Ethernet LAN in a switched topology. The object contains any number of clients as well as one server. Client traffic can be directed to the internal server as well as external servers. Supported applications include: FTP, Email, Database, Custom, Rlogin, Video, X windows, HTTP etc. These applications run over TCP or UDP. For each application, you can specify traffic for group of clients, allowing you to quickly characterize the entire LAN. You may also wish to set the following attributes: Switching Speed: (default = 500,000pkts/sec) Number of Workstations: (default = 10)
The PPP_Server model represents a server node with server applications running over TCP/IP and UDP/IP. This node supports one underlying SLIP connection. The operational speed is determined by the data rate of the connected link.
38
Network Traffic Control Protocols: RIP, UDP, IP, TCP, OSPF Interconnections: One SLIP connection at a selectable data rate. Attributes: Server Configuration Table:
Portsmouth University
application servers running on the node. Transport Address: This attribute allows for the specification of the address of the node. "IP Forwarding Rate": specifies the rate (in packets/second) at which the node can perform a routing decision for an arriving packet and transfer it to the appropriate output interface. "IP Gateway Function": specifies whether the local IP node is acting as a gateway. Workstations should not act as gateways, as they only have one network interface. "RIP Process Mode": specifies whether the RIP process is silent or active. Silent RIP processes do not send any routing updates but simply receive updates. All RIP processes in a workstation should be silent RIP processes. "TCP Connection Information": specifies whether diagnostic information about CP connections from this node will be displayed at the end of the simulation. "TCP Maximum Segment Size": determines the size of segments sent by TCP. His value should be set to largest segment size that the underlying network can carry unfragmented. "TCP Receive Buffer Capacity": specifies the size of the buffer used to hold received data before it is forwarded to the application.
39
Portsmouth University
The model CS_12016_16s_a10_fe8_ge3_sl24_adv represents the following device: Vendor: Product: Device Class: Configuration: Cisco Systems CISCO 12016 Gigabit Switch Router This model represents a specific configuration of an IP-based router switch model. Interconnections: 1. 12-port serial DS3 interfaces (44.736Mbps). 2. 8-port Packet over SONET (PoS) OC3 interfaces (PPP over SONET)(155.52Mbps) 3. 2-port Packet over SONET (PoS) OC12 interfaces (PPP over SONET)(622.08Mbps) 4. 2-port Packet over SONET (PoS) OC48 interfaces (PPP over SONET)(2.48832Gbps) 5. 8-port ATM OC3 (155.52Mbps) 6. 2-port ATM OC12 (622.08Mbps) 7. 8-port 100BaseT Fast Ethernet (100Mbps). 8. 3-port 1000BaseT Gigabit Ethernet (1000 Mbps) General Operation: IP packets arriving on an IP interface are routed to the appropriate output interface based on their destination IP address. The Routing Information Protocol (RIP), Open Shortest 40 Ioannis Gallikas MSc
Portsmouth University
Path First (OSPF) protocol, Border Gateway Protocol (BGP), Interior Gateway Routing Protocol (IGRP) or Enhanced Interior Gateway Routing Protocol (EIGRP) may be used to automatically and dynamically create the routing tables and select routes in an adaptive manner. The key model features are: 1. An IP forwarding rate of 60,000,000 packets/sec 2. The router model implements a "store and forward" type of switching methodology. Implemented Protocols: 1. Ethernet (IEEE 802.3) 2. Internet Protocol (IP) 3. Routing Information Protocol (RIP) 4. User Datagram Protocol (UDP) 5. Open Shortest Path First (OSPF) Protocol 6. Border Gateway Protocol (BGP) 7. Interior Gateway Routing Protocol (IGRP) 8. Enhanced Interior Gateway Routing Protocol (EIGRP)
Slot 0 1 2 3 4 5 6 7 8
Technology 4 atmOC3 4 atmOC3 1 atmOC12 1 atmOC12 8 eth100T 1 eth1000T 1 eth1000T 1 eth1000T 12 SLIP DS3 41 Ioannis Gallikas MSc
Network Traffic Control 9 10 11 12 13 14 33-36 37-40 41 42 43 44 4 SLIP OC3 4 SLIP OC3 1 SLIP OC12 1 SLIP OC12 1 SLIP OC48 1 SLIP OC48
Portsmouth University
Note: This router has 16 slots of which 15 slots are used as interface card slots and one route processor slot. It has an aggregate switching capacity of 80 Gbps.
The model CS_12008_8s_a5_fe8_ge1_sl9_adv represents the following device: Vendor: Product: Device Class: Configuration: Cisco Systems CISCO 12008 Gigabit Switch Router This model represents a specific configuration of an IP-based router switch model.
Interconnections: 1. 4-port Packet over SONET (PoS) OC3 interfaces (PPP over SONET)(155.52Mbps) 42 Ioannis Gallikas MSc
Portsmouth University
2. 4-port Packet over SONET (PoS) OC12 interfaces (PPP over SONET)(622.08Mbps) 3. 1-port Packet over SONET (PoS) OC48 interfaces (PPP over SONET)(2.48832Gbps) 4. 4-port ATM OC3 (155.52Mbps). 5. 1-port ATM OC12 (622.08Mbps) 6. 8-port 100BaseT Fast Ethernet (100Mbps). 7. 1-port 1000BaseT Gigabit Ethernet (1000 Mbps) General Operation: IP packets arriving on an IP interface are routed to the appropriate output interface based on their destination IP address. The Routing Information Protocol (RIP), Open Shortest Path First (OSPF) protocol, Border Gateway Protocol (BGP), Interior Gateway Routing Protocol (IGRP) or Enhanced Interior Gateway Routing Protocol (EIGRP) may be used to automatically and dynamically create the routing tables and select routes in an adaptive manner. The key model features are: 1. An IP forwarding rate of 28,000,000 packets/sec 2. The router model implements a "store and forward" type of switching methodology. Implemented Protocols: 1. Ethernet (IEEE 802.3) 2. Internet Protocol (IP) 3. Routing Information Protocol (RIP) 4. User Datagram Protocol (UDP) 5. Open Shortest Path First (OSPF) Protocol 6. Border Gateway Protocol (BGP) 7. Interior Gateway Routing Protocol (IGRP) 8. Enhanced Interior Gateway Routing Protocol (EIGRP)
43
Network Traffic Control Slot 0 1 2 3 4 5 6 Interface 0-3 4 5-12 13 14-17 18-21 22 Technology 4 atmOC3 1 atmOC12 8 eth100T 1 eth1000T 4 SLIP OC3 4 SLIP OC12 1 SLIP OC48
Portsmouth University
Note: This router has 8 slots of which 7 slots are used as interface card slots and one route processor slot. It has an aggregate switching capacity of 40 Gbps.
The CS_7206_6s_a2_ae8_f4_tr4_slip16 model represents the following device: Vendor: Product: Device Class: Configuration: Cisco Systems CISCO7204 Router This model was created using the device creator utility and contains the following technologies:
44
Network Traffic Control Technology ATM Ethernet FDDI Token Ring Slip IF/Port Count 2 8 4 4 16
Portsmouth University
The ethernet16_layer4_switch node model represents a layer-4 switch supporting up to 16 Ethernet interfaces. The switch implements the Spanning Tree algorithm in order to ensure a loop free network topology. Switches communicate with each other by sending Bridge Protocol Data Units (BPDU's). Packets are received and processed by the switch based on the current configuration of the layer-4 redirection information and the spanning tree. General Function: Switch
Supported Protocols: Spanning Tree Bridge, Ethernet Protocols: Spanning Tree Bridge Protocol (IEEE 802.1D), Ethernet (IEEE 802.3)
45
Portsmouth University
1) 16 Ethernet connections at the specified data rate (10, 100, 1000 Mbps) Restrictions: The switch can only connect LAN's of the same type (Ethernet to Ethernet, FDDI to FDDI, or Token Ring to Token Ring). Port Interface Description: Combination of up to 16 Ethernet ports (10 Mbps, 100 Mbps, or 1000 Mbps)
The 100BaseT duplex link represents an Ethernet connection operating at 100 Mbps. It can connect any combination of the following nodes (except Hub-to-Hub, which cannot be connected): 1) Station 2) Hub 3) Bridge 4) Switch 5) LAN nodes
46
Network Traffic Control Packet Formats: Ethernet Data Rate: 100 Mbps Model Attributes:
Portsmouth University
"Propagation Speed": specifies the propagation speed (in meters/sec) for the medium. If the "delay" attribute of the link is set to "Distance Based", this speed is used to calculate the propagation delay based on the distance between two nodes. Restrictions: This link can not be used to connect two Ethernet hubs.
The PPP_Adv point-to-point link connects two nodes with serial interfaces (e.g., routers with PPP ports) at a selectable data rate. Packet Formats: ip_dgram_v4, ipx_pkt 47 Ioannis Gallikas MSc
Portsmouth University
Selectable (e.g., DS0, DS1, DS3, T1, T3, OC3, OC12, OC36, OC48).
After the initial OPNET logo is displayed Picture 3, then it is time to create a new project. This is done under the File menu New Project
48
Portsmouth University
By pressing ok, we were sent to the next window where we will put the name of the Network that we want to build and also to name a scenario for it as well.
In our case, the name of the model was GUNET and the scenario position remained as it was. Now, we are ready to insert the first attributes we want the program to have. This mean, we created and empty scenario.
By pressing next, we are being sent to the next table, in which we can choose the location where we want our network to be located in. In our case we choose World and in the next table we choose Europe. 49 Ioannis Gallikas MSc
Portsmouth University
By pressing next, we will continue to the next dialog, where we must insert all the nodes we want our template to include. This means to specify all the components like routers, switches, LAN, links and servers.
After pressing the next button, a screen of Europe displays and then we have to zoom in several times to reach to the desired location where our network will be designed which is in Greece. After that, we can open the Object Pallet and start dragging the desired nodes in the OPNET window and start building the network.
50
Portsmouth University
51
Portsmouth University
Inside the application definitions, is the table, were we can define all the applications that we want to use on the network and the description of each application. The applications that we used are FTP, Http, Email, Database, Voice and Video Conferencing and this can be seen in Picture 5.
By clicking inside the application and definition table in the description menu, we can choose by High, Medium or Low setting of each application. The application descriptions for the FTP application can be seen in Picture 6.
52
Portsmouth University
The FTP application was set to low load and the FTP table displays the values the FTP low description has. This can be seen in Picture 7.
The application descriptions for the Email application can be seen in Picture 6. Email application was set to high load. This can be seen in Picture 8.
53
Portsmouth University
The Email table displays the values that Email High description has. This can be seen in Picture 9.
The application description for the Database application can be seen in Picture 10. As it can be seen the () value means that there was a change in the Database Table.
54
Portsmouth University
The Database table displays the values that Email High application has. This can be seen in Picture 9. Here we changes the Transaction Mix to 50% which means that half the traffic will be the queries and the other half will be the response.
The Http application was set to Heavy Browsing. The Http description table can be seen in Picture 12.
55
Portsmouth University
The Http table displays the values that Http application has. This can be seen in Picture 13.
The application description for the Voice application can be seen in Picture 14. As it can be seen the () value means that there was a change in the Voice Table.
56
Portsmouth University
The change made in the Voice table was on the traffic mix, which means that the voice application will be behave as background traffic, something that increased the simulation speed and decreased the overall simulation time. Also the encoder scheme was changed to GSM (silence) which is one of the best schemes because when there is no voice detected in the network, no traffic will be transferred. This can be seen in Picture 15
The application description for the Video Conferencing application can be seen in Picture 16. As it can be seen the () value means that there was a change in the Video Conferencing Table.
57
Portsmouth University
The change made in the Video Conferencing table was on the traffic mix as mentioned earlier in the voice table, which means that the Video Conferencing application will be behave as background traffic, something that increased the simulation speed and decreased the overall simulation time. This can be displayed in Picture 17.
In order for Voice Application to work, we need to define the Voice encoder Schemes. This is done by clicking in the voice encoder scheme value as displayed in Picture 18 below:
58
Portsmouth University
In order to be sure that there will be no problems in specifying the correct Voice Encoder Scheme, as it can be seen in Picture 19, all the supported schemes were inserted.
59
Portsmouth University
60
Portsmouth University
It can also be seen that the Operation mode is set to Simultaneous which means that all profiles will run together instead of running in serial order which means that all profiles would run one after another which wouldnt be so realistic. By clicking inside the application inside the Profile Configuration of each University, we can set the different applications we want the profile to have. The following applications can be seen as displayed in Picture 22 below:
For the Video Conferencing profile the following Application table can be seen as displayed in Picture 23 below:
61
Portsmouth University
62
Portsmouth University
Under the Application Destination Preferences we will insert all the destinations we want the supported services to go. This is shown in Picture 27 Under the Number of workstation we changed the default value of 10 to 25 which is a more realistic value for a University.
63
Portsmouth University
Picture 27, displays the Application Destination Preferences table, where we can specify the Actual Name destination of the voice application.
64
Portsmouth University
Assuming that each workstation has the ability to call any workstation on the GUNET Network even workstations in the same LAN, the following settings where inserted in the Actual name Table as it can be seen in Picture 28. In the left column we can see the destinations and in the right column we can see the Selection Weight of the application where we can select the type of priority with respect to the rest applications.
65
Portsmouth University
66
Portsmouth University
67
Portsmouth University
68
Portsmouth University
Since we want the LAN to communicate with all the other LANs, but since the Video Conferencing is only supported by the LAN_0 LANs, then a new Actual Name Table was crated for this application as it can be seen in Picture 33 with all the LAN_0 ones.
69
Portsmouth University
The switches were used to connect the two LANs with the University router and the only change that was made in the attributes was the name, where the initials of the University it represents was inserted. 70 Ioannis Gallikas MSc
Portsmouth University
71
Portsmouth University
Under the application supported services, we inserted 1 row and choose to insert the Http heavy application. All the other servers were done accordingly to the application they would support
72
Portsmouth University
Under the background load, we changed the intensity of the traffic in bps both incoming and outgoing. These changes were done by clicking to change the intensity (bps) value. A new window appears where we can put the number of bits/sec we want to put and the period that we want this utilization to have. This can be seen in Picture 37 and Picture 38.
73
Portsmouth University
The Background traffic was implemented in most of the links. Theses changes can be seen in the following tables. Table 4 below displays the network activity on each link of the backbone network.
74
Network Traffic Control Links between Routers Athens - Thessaloniki Athens -Patra Athens - Heraklio Athens - Rhodes Thessaloniki - Xanthi Thessaloniki - Larissa Patra - Ioannina Data carried in (bits/sec) 34.100.000 (bits/sec) 29.700.000 (bits/sec) 29.800.000 (bits/sec) 14.600.000 (bits/sec) 2.321,2 (bits/sec) 8.896 (bits/sec) 1.112,2 (bits/sec)
Portsmouth University Data carried out (bits/sec) 37.600.000 (bits/sec) 29.500.000 (bits/sec) 46.500.000 (bits/sec) 16.700.000 (bits/sec) 2589,1 (bits/sec) 7.683,2 (bits/sec) 1.395,6 (bits/sec)
In some cases, this utilization is also for the traffic between the city routers and the university router. Table 5 and Table 6 display the network activity between the city routers and the university router. City Router to University Router Thessaloniki Router to Aristotelio University Thessaloniki Router to Macedonia University Patra Router to Patra University
Table 5 Background Utilization between City Router and University Router
Data carried out (bits/sec) 23.700.000 (bits/sec) 5.570,1 (bits/sec) 22.500.000 (bits/sec)
75
Network Traffic Control City Router to University Router Xanthi Router to Thrace University Larissa Router to Thessaly University Ioannina Router to Ioannina University Heraklio Router to Creta University 16.900.000 (bits/sec) 1.112,2 (bits/sec) 8.896 (bits/sec) Data carried in (bits/sec) 2.321,2 (bits/sec)
Portsmouth University Data carried out (bits/sec) 2589,1 (bits/sec) 7.683,2 (bits/sec) 1.395,6 (bits/sec) 23.000.000 (bits/sec)
Unfortunately, exact number of the loading between the Athens routers and the universities couldnt be found and the only traffic implemented is based only between the Athens Routers. There are three routers in ring topology in Athens which are connected with 2.5Gbps links and one of the routers connects to Athens city router with 1GBps link. Table 7 displays the Background Utilization between the Athens Routers and Table 8 displays the Background Utilization between Athens City router and Athens Router Athens Router to Athens Router Athens Router to Acropolis Router Athens Router to Ilissos Router Acropolis Router to Ilissos Router
Table 7 Background Utilization between Athens Routers
Data carried out (bits/sec) 20.500.000 (bits/sec) 375.900.000 (bits/sec) 4.920 (bits/sec)
76
Portsmouth University
Table 8 Background Utilization between Athens City Router and Athens Router
Unfortunately in most cases, the GUNET was a highly utilized network and by getting voice and video conferencing in the network would certainly have a big impact on it. Hence some of the links needed to be upgraded without of course exceeding the GRNET links capacity available. In one case though the link was downgraded in order to get some congestion later on the network during simulation time. Hence Table 9 displays the new capacity of the backbone network. Links between Routers Athens - Thessaloniki Athens -Patra Thessaloniki - Xanthi Thessaloniki - Larissa Patra - Ioannina Initial Capacity (Mbps) 69 (Mbps) 45 (Mbps) 6 (Mbps) 18 (Mbps) 4.5 (Mbps) Upgraded Capacity (Mbps) 100 (Mbps) 60 (Mbps) 12 (Mbps) 12 (Mbps) 12 (Mbps)
Some changes on the capacity of the links occurred from the City routers to the University routers as well. These changes can be seen in Table 10 below. In two cases where the universities are located in Athens, the capacity of the link was upgraded from 2 Mbps to 1000 Mbps since all the other universities of Athens use Gbit links.
77
Portsmouth University
Links between City Router and University Router Thessaloniki Router to Aristotelio University Router Thessaloniki Router to Macedonia University Router Xanthi Router to Thrace University Router Larissa Router to Thessaly University Router Patra Router to Patra University Router Ioannina Router to Ioannina University Router Athens Acropolis Router to Harokopio University Athens Ilissos Router to University of Good Arts
Initial Capacity (Mbps) 34 (Mbps) 18 (Mbps) 21 (Mbps) 8 (Mbps) 34 (Mbps) 22 (Mbps) 2 (Mbps) 2 (Mbps)
Upgraded Capacity (Mbps) 60 (Mbps) 22 (Mbps) 22 (Mbps) 22 (Mbps) 60 (Mbps) 22 (Mbps) 1000 (Mbps) 1000 (Mbps)
Table 10 Capacity of the Upgraded Links between City Routers and University Routers
Portsmouth University
the network, we should first declare in the application configuration node the priority of the applications we wanted to test under QoS. The two applications in which we changed the priority settings was voice and video conferencing and on both we inserted the same setting for priority. By default, both applications are set to best effort (0) as seen Picture 39 and in Picture 40.
By clicking on the Type of Service value, a new window appears. This window can be seen in Picture 41.
79
Portsmouth University
The options that we have in order to change the priority of the application can be seen in Picture 42.
80
Portsmouth University
Unfortunately due to luck of time, only the best priority could be simulated. Hence, the settings on this window was changed from best effort (0) to Reserved (7). And also, in order to have the best priority of the application, we clicked added the three options below the type of service window in order the application to work better also for delay, throughput and reliability. The final settings can be seen in Picture 43.
Since from the first minute it was observed that the simulation would take ages to finish, we had to build the same project seven times and run each different queuing scenario in different workstations in order to finish within the time limit.
81
Portsmouth University
By pressing the configure QoS menu, a new window appears. This window is where we can change the different queues and can be seen in Picture 45.
82
Portsmouth University
The different queuing techniques available at OPNET Modeller are displayed in Picture 46
By selecting the desired queuing technique and applying the changes on the QoS configuration table, all the connected interfaces on the network will be automatically configured to run the selected QoS scheme. The way that the different projects were named was the following:
83
Network Traffic Control Project Name GUNET 1 Lower Links GUNET 2 Lower Links GUNET 3 Lower Links GUNET 4 Lower Links GUNET 5 Lower Links GUNET 6 Lower Links GUNET 7 Lower Links
Portsmouth University Queuing Technique FIFO WFQ Priority Queuing Custom Queuing MWRR DWRR MDRR
By changing the Type of Service from ToS to DSCP (252) which is the highest priority settings and running a simulation, there wasnt any change on the results and hence only the ToS was the one that was used to change the priority. These were the only changes made in order to run the simulation and applying QoS respectively. CHAPTER 4 --------------------------------------------------------------------------------------------31 4.1. NETWORK DECISION AND IMPLEMENTATION------------------------------------31 4.2. COMPONENTS USED -----------------------------------------------------------------------35 4.2.1. APPLICATION CONFIG .................................................................................... 35 4.2.2. PROFILE CONFIG .............................................................................................. 36 4.2.3. QoS CONFIG........................................................................................................ 37 4.2.4. SUBNET NODE ................................................................................................... 37 4.2.5. 100BaseT_LAN NODE ........................................................................................ 38 4.2.6. PPP_SERVER NODE .......................................................................................... 38 4.2.7. CISCO ROUTER CS_12016_16s_a10_fe8_ge3_sl24_adv NODE ..................... 40 4.2.8. CISCO ROUTER CS_12008_8s_a5_fe8_ge1_sl9_adv NODE ........................... 42 4.2.9. CISCO ROUTER CS_7206_6s_a2_ae8_f4_tr4_slip16 NODE ........................... 44 4.2.10. ETHERNET16_LAYER4_SWITCH NODE ..................................................... 45 4.2.11. 100BaseT DUPLEX LINK ................................................................................. 46 4.2.12. PPP_ADV POINT-TO-POINT LINK ................................................................ 47 4.3. NETWORK DESIGN AND IMPLEMENTATION IN OPNET ------------------------48 4.3.1. NETWORK CONFIGURATION......................................................................... 51 4.3.1.1. APPLICATION CONFIGURATION---------------------------------------------51 84 Ioannis Gallikas MSc
Portsmouth University
4.3.1.2. PROFILE CONFIGURATION ----------------------------------------------------59 4.3.1.3. 100BaseT_LAN CONFIGURATION --------------------------------------------62 4.3.1.4. ROUTERS CONFIGURATION---------------------------------------------------70 4.3.1.5. SWITCH CONFIGURATION-----------------------------------------------------70 4.3.1.6. PPP_SERVER CONFIGURATION ----------------------------------------------71 4.3.1.7. LINKS UTILISATION -------------------------------------------------------------72 4.3.2. APPLYING QoS ON GUNET ............................................................................. 78 4.3.2.1. SETTING UP THE APPLICATION CONFIGURTION ----------------------78 4.3.2.2 SETTING UP QoS SCHEMES-----------------------------------------------------82
85
Portsmouth University
CHAPTER 5
5.1.1. VOICE
As a test to see if OPNET was working correctly, the simulation was run twice with the FIFO queuing. From the picture below we can see only one graph for both scenarios, which means that both graphs are 100% similar. This is because when in OPNET results coincide with each other in overlay mode the program shows only the first graph and does not multiplex the colours together. The End-to-End delay is the time taken for a packet from the moment it leaves from the source to the moment it reaches the destination. The smaller the End-to-End delays the better for the users. Clearly in the picture we can see that the traffic is generated just after the second minute of the simulation and increases vertically up to the third minute before it starts to stabilize but still it continues to increase because the utilisation of the network is increasing. This is due to the fact that the links of the network are setup to work on high utilization in order to apply differentiated services. If the utilization of the links were low, then by applying the differentiated services would actually give worst End-to-End delays because it would take more time for the routers to apply the different queuing techniques plus to send the data instead of sending the data directly.
85
Portsmouth University
We can see in the graph below that the delay variation increases up to a certain point when the traffic starts and then stabilizes a little. Then it starts decreasing slowly. This means that the delay of the network is high in the beginning of the simulation and then drops down as the traffic of the network moves on and because the network can handle the traffic adequately.
86
Portsmouth University
We can see in the graph below that the delay variation increases up to a certain point when the traffic starts. Then it starts decreasing rapidly. This means that the delay of the network is high in the beginning of the simulation and then drops down as the traffic of the network moves on and because the network can handle the traffic adequately. As well we can see that the video had a smoother end-to-end delay and also a better packet delay variation by comparing it with the voice. This is because, the video conferencing application sent larger amounts of data and makes fewer transactions, where the voice application is sending smaller amounts of data but has more transactions.
87
Portsmouth University
5.2.1 VOICE
In the graph below we can see that WFQ compared to FIFO behaves much worse. The end-to-end delay has increased significantly. While the FIFO delay is around 0.075 seconds in average the network with WFQ not only has a much higher delay but also it never stabilizes to a certain value but continues to increase for the entire time that the simulation was run.
88
Portsmouth University
In the graph below, we can observe that the blue which is the Fifo queuing, from the minute the end-to-end delay stabilized, the packet delay variation started to drop. Same thing can be seen for the red graph as well. From the minute it starts to stabilize, the packet delay variation starts to decrease which means that the end-to-end delay starts to stabilize.
89
Portsmouth University
The graph below displays the video conferencing packet delay variation. As expected, the Fifo queuing has stabilized as soon as the traffic went along and have a normal behavior. The WFQ queuing had a new pinch which means that the packet delay variation is not stable up to the time that the simulation finished.
90
Portsmouth University
91
Portsmouth University
The graph below displays the voice packet delay variation. As we can see, the priority queuing is much smoother and much smaller than the Fifo queuing which is expected since the end-to-end delay of priority queuing was quite smooth. From the blue graph, we can see that from the minute that the end-to-end delay starts to stabilize, the packet delay variation starts to decrease.
92
Portsmouth University
As expected, the video conferencing packet delay variation of the priority queuing is much better than the Fifo queuing. From the beginning of the simulation the red graph is almost a straight line which means that there is no delay variation and the blue has a big spike in the beginning which means that there was delay variation in the beginning of the simulation but it degraded immediately. But in the end, the priority queuing is still the best option over Fifo queuing.
93
Portsmouth University
94
Portsmouth University
The graph bellow displays the voice packet delay variation. We can observe that the red graph is a straight line just above the x axis which means that there is minimum delay variation The blue graph which is the Fifo queuing has a big spike in the beginning of the simulation and as soon as traffic goes on, it starts degrading but still far away from the custom queuing technique.
95
Portsmouth University
The graph below displays the video conferencing packet delay variation. As we can see, the Fifo queuing has a spike in the beginning of the simulation, and then it degrades immediately and as the traffic goes on, we see that due to the high utilisation of the network, the packet delay variation increases again. The custom queuing represented by the red graph, from the beginning of the simulation is a straight line close to the x axis which means that there is minimal delay variation.
96
Portsmouth University
5.5.1. VOICE
In the graph below we can see that MWRR compared to FIFO behaves much worse. Similar results as the WFQ queuing were obtained. The end-to-end delay has increased significantly. While the FIFO delay is around 0.075 seconds in average the network with MWRR not only has a much higher delay but also it never stabilizes to a certain value but continues to increase for the entire time that the simulation was run.
97
Portsmouth University
In the graph below, we can observe that the blue which is the Fifo queuing, from the minute the end-to-end delay stabilized, the packet delay variation started to drop. Same thing can be seen for the red graph as well. From the minute it starts to stabilize, the packet delay variation starts to decrease which means that the end-to-end delay starts to stabilize.
98
Portsmouth University
The graph below displays the video conferencing packet delay variation. As expected, the Fifo queuing has stabilized as soon as the traffic went along and have a normal behavior. The MWRR queuing had a new pinch which means that the packet delay variation is not stable up to the time that the simulation finished.
99
Portsmouth University
100
Portsmouth University
6. CONCLUSION
The purpose of this project was to monitor the traffic on a network by implementing Differentiated Services. The GUNET network was proposed in order to implement DiffServ since it is a slightly congested network and voice and video conferencing are applications that a technical team is trying to insert to the network nowadays. The network uses as a backbone a part of the GRNET links to transfer data between the universities. Due to the fact that GUNET doesnt use the whole capacity of the GRNET, some upgrades on the links were made in order to get voice and video application a real possibility to be implemented. The links although the network was setup in the beginning to provide with real-time delays, when differentiated services were implemented, we had to downgrade the links in order to increase the utilization on the links since DiffServ applies to congested networks.
101
Portsmouth University
CHAPTER 7
102
Portsmouth University
103
Portsmouth University
CHAPTER 8
]
8.1. REFERENCES
[1] N. Savage. (2004). B351 Multimedia Networks Study Notes, Portsmouth University [2] OPNET Online Tutorial. University of Portsmouth Department of Computer & Electronic Engineering
[3] OPNET Online Documentation. University of Portsmouth Department of
Computer & Electronic Engineering [4] Gremont, Boris (Dr.) Data Communications & Networks 1 Issue 3 University of Portsmouth 2000-2001 Department of Computer & Electronic Engineering [5] OPNET Modeller Manual v9
Portsmouth University
11) http://www.sciencedaily.com/encyclopedia/differentiated_services 12) http://www.telecom.tuc.gr/networkcourse/1 13) http://www.webopedia.com/TERM/Q/QoS.html 14) http://www.gunet.gr/index.pl?id=3121 15) http://netmon.grnet.gr/traffic/ 16) http://diffserv.sourceforge.net/ 17) http://qos.ittc.ukans.edu/diffoverview/index.htm 18) http://qos.ittc.ukans.edu/ipqos/ip_qos.htm 19) http://docs.sun.com/db/doc/816-4094/6mab39ut0?a=view 20) http://www.ypes.gr/nomarxiakh_aut.htm 21) http://www.ellada.net/travelinfo/rhodes.html 22) http://www.webopedia.com/TERM/A/ATM.html 23) http://www.webopedia.com/TERM/T/throughput.html 24) http://www.linktionary.com/s/sbm.html 25) http://www.telecom.tuc.gr/networkcourse/qos.ppt 26) http://www.sciencedaily.com/encyclopedia/differentiated_services 27)http://66.102.9.104/search?q=cache:http%3A%2F%2Fwww.hep.ucl.ac.uk%2F~ytl%2 Fqos%2Findex.html 28)http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/qos_c/qcp rt1/qcdclass.htm 29) http://www.opalsoft.net/qos/WhyQoS.htm 30)http://www.cisco.com/en/US/netsol/ns339/ns392/ns399/ns404/networking_solutions_ white_paper0900aecd800dd974.shtml 31)http://www.cisco.com/en/US/products/sw/iosswrel/ps1820/products_feature_guide09 186a00800f4891.html#29478 32)http://www.cisco.com/en/US/tech/tk331/tk336/technologies_design_guide09186a008 0237a48.shtml#wp16388 33) http://www.cisco.com/warp/public/63/mdrr_wred_overview.html 34) http://networking.ittoolbox.com/documents/document.asp?i=2528 105 Ioannis Gallikas MSc
Portsmouth University
35) http://www.cisco.com/warp/public/732/Tech/qos/ 36)http://www.cisco.com/warp/public/105/dscpvalues.html#dscpandassuredforwardingcl asses 37) http://www.cse.ohio-state.edu/~jain/cis788-99/ftp/qos_protocols/ 38)http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/ciscoasu/class/qpm1_1/usi ng_qo/c1plan.htm#xtocid321027 39) http://www.cse.ohio-state.edu/~jain/cis788-99/ftp/qos_protocols/index.html Last accessed 20/09/04
106
Portsmouth University
CHAPTER 8
]
8.1. REFERENCES
[1] N. Savage. (2004). B351 Multimedia Networks Study Notes, Portsmouth University [2] OPNET Online Tutorial. University of Portsmouth Department of Computer & Electronic Engineering
[3] OPNET Online Documentation. University of Portsmouth Department of
Computer & Electronic Engineering [4] Gremont, Boris (Dr.) Data Communications & Networks 1 Issue 3 University of Portsmouth 2000-2001 Department of Computer & Electronic Engineering [5] OPNET Modeller Manual v9
Portsmouth University
11) http://www.sciencedaily.com/encyclopedia/differentiated_services 12) http://www.telecom.tuc.gr/networkcourse/1 13) http://www.webopedia.com/TERM/Q/QoS.html 14) http://www.gunet.gr/index.pl?id=3121 15) http://netmon.grnet.gr/traffic/ 16) http://diffserv.sourceforge.net/ 17) http://qos.ittc.ukans.edu/diffoverview/index.htm 18) http://qos.ittc.ukans.edu/ipqos/ip_qos.htm 19) http://docs.sun.com/db/doc/816-4094/6mab39ut0?a=view 20) http://www.ypes.gr/nomarxiakh_aut.htm 21) http://www.ellada.net/travelinfo/rhodes.html 22) http://www.webopedia.com/TERM/A/ATM.html 23) http://www.webopedia.com/TERM/T/throughput.html 24) http://www.linktionary.com/s/sbm.html 25) http://www.telecom.tuc.gr/networkcourse/qos.ppt 26) http://www.sciencedaily.com/encyclopedia/differentiated_services 27)http://66.102.9.104/search?q=cache:http%3A%2F%2Fwww.hep.ucl.ac.uk%2F~ytl%2 Fqos%2Findex.html 28)http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/qos_c/qcp rt1/qcdclass.htm 29) http://www.opalsoft.net/qos/WhyQoS.htm 30)http://www.cisco.com/en/US/netsol/ns339/ns392/ns399/ns404/networking_solutions_ white_paper0900aecd800dd974.shtml 31)http://www.cisco.com/en/US/products/sw/iosswrel/ps1820/products_feature_guide09 186a00800f4891.html#29478 32)http://www.cisco.com/en/US/tech/tk331/tk336/technologies_design_guide09186a008 0237a48.shtml#wp16388 33) http://www.cisco.com/warp/public/63/mdrr_wred_overview.html 34) http://networking.ittoolbox.com/documents/document.asp?i=2528 105 Ioannis Gallikas MSc
Portsmouth University
35) http://www.cisco.com/warp/public/732/Tech/qos/ 36)http://www.cisco.com/warp/public/105/dscpvalues.html#dscpandassuredforwardingcl asses 37) http://www.cse.ohio-state.edu/~jain/cis788-99/ftp/qos_protocols/ 38)http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/ciscoasu/class/qpm1_1/usi ng_qo/c1plan.htm#xtocid321027 39) http://www.cse.ohio-state.edu/~jain/cis788-99/ftp/qos_protocols/index.html Last accessed 20/09/04
106