Portfolio
Portfolio
Portfolio
You are required to complete all these workshop assignments and research questions in this booklet and submit
them via the Canvas topic on before the 5th November 2018. This Assignment contributes 60% of the overall mark
for this module. The first 5 workshops should be done by yourself and workshop 6 with another person.
Research questions should be answered in your own words and properly referenced.
*Note it is essential in these workshops that you select the exact same named object as requested as there are
many objects that have similar names, but behave differently and may not work in our scenario.
6CC009 Workshop 1
Student Name:
Student ID:
In this workshop we will create a very simple network of 6 workstations and a server hub connecting them.
Objectives
Procedure
From the Riverbed modeller File menu select File > New> and select Project and name it WS1999999 where 999999
is your own students number. Name your scenario simple office.
Each project allows you to create scenarios which may be similar to each other, this allows you to change
parameters and see the effect on the attributes you are measuring.
Final Configurations
Task - Creating Network Topologies
1. From the Topology menu, choose the Rapid Configuration menu item
2. Select Star from the list of available configurations, then click OK…..
3. Use the following settings. Note it is essential you use the exact same devices as are suggested.
2. Select the Ethernet server and drag and drop on the workspace to place a copy there. Right click to
finish this operation, if you do not then subsequent clicks on the workspace will place a copy of the
object for each click.
3. Double-click the 10BaseT link in the Object Palette and click in the centre of the server and then the hub
to create a link between them.
We now need to design some traffic to be applied on the network.
Profile Configuration
Profiles describe the activity patterns of a user or group of users in terms of the applications used over a period of
time. You can have several different profiles running on a given LAN or workstation. These profiles can represent
different user groups – for example, you can have an Engineering profile, a Sales profile and an Administration
profile to depict typical applications used for each employee group. Profiles can execute repeatedly on the same
node. OPNET enables you to configure profile repetitions to run concurrently (at the same time) or serially (one after
the other). Profiles contain a list of applications. You can configure the applications within a profile to execute in the
following manner:
In most cases, when describing the actions of a single user, the actions are serial since most people can only perform
one activity at a time. However, when using applications that can perform non-blocking tasks, you can have more
than one task running at a time. When describing the activities of a group of users, concurrency is common. Like
profile repetitions, application repetitions within the profile can execute either concurrently or serially.
For more details and information on this, download and read the document " Configuring Applications and Profiles in
OPNet.pdf" from the Resources folder in the WOLF topic.
Application Configuration
A profile is constructed using different application definitions; for each application definition, you can specify usage
parameters such as start time, duration and repeatability. You may have two identical applications with different
usage parameters; you can use different names to identify these as two distinct application definitions.
For example, the engineer may browse the web frequently in the morning but occasionally in the afternoon. Hence,
you can create two different application definitions for web browsing, such as web_browsing_morning and
web_browsing_noon, with two different usage patterns. You can also create application definitions based on
different workgroups. For example, you may have an engineering_email and a sales_email where the former may
send 3 emails/sec while the latter may send 10 emails/sec. The software allows you to specify a user profile
consisting of many applications. There are two types of application models that are supported by the software:
Standard Network Applications and a custom application.
Task - Adding Traffic to the network - Defining the application and the profile config
From the Object Palette drag and drop the Application Config object and then the Profile Config object onto the
workspace
1. Right click on the application definition object and select Edit Attributes
2. Expand the Application Definitions attribute
3. Set the Application Definition attribute to "Default" and then expand it
4. Right-click on "Email (Light)" and select "Move Row Up", until it becomes the first in the list
5. Do the same with "File Transfer (Light)" until it becomes the third in the list.
6. Do the same with "Voice Over IP (PCM)" until it becomes the fourth in the list.
7. The top 4 rows in should now read "Email (Light), Database Access (Heavy), File Transfer (Light), Voice Over
IP (PCM)"
8. Now set the number of rows to 4 ( this sets the number of applications that will be able to run)
9. Click OK.
10. Right click on the Profile Definition object and select Edit Attributes
11. Click Profile Configuration attribute and set the Number of Rows to 2
12. Click in the Profile Configuration attribute and select Edit.
13. You will need to give the following Profile Names – SoftDeveloper and Telecom
14. Now fill in the table as shown
1. Now for each profile we need to add the applications that are used
2. Click in the applications column for the first profile, then Edit, and set the following for the SoftDevelopment
1. You also need to connect the server and apply some traffic.
2. Right click on the Ethernet server.
3. Select Edit Attributes >applications> Application Supported Services and click on “All”.
Collect statistics
The network is now configured with users running applications and hence creating traffic. Now we need to gather
the statistics to analyse the performance of the network. We will gather global statistics and some individual
statistics from the nodes in the network. Global statistics may often be required and as an example we will collect
the global delays on the network.
1. Logical topologies
2. Physical topologies
This should be about 400 words and be properly referenced using the Harvard Referencing style.
Student Name:________________________________________________________________________
In this workshop you will create 2 models, one of which uses only a hub and the other employs a switch. You will
then determine the advantages and disadvantages of each of these designs
Objectives
Procedure
1. Start Riverbed Modeler Academic Edition ⇒ Choose New from the File menu.
2. Select Project and click OK ⇒ Name the project <your student number >NetDesign, and the scenario
HubOnlyNetwork ⇒ Make sure that the Use Startup Wizard is checked ⇒ Click OK.
3. In the Startup Wizard: Initial Topology dialog box, make sure that Create Empty Scenario is selected ⇒ Click Next
⇒ Choose Campus from the Network Scale list ⇒ Click Next ⇒ Choose Miles from the Size drop-down menu and
assign 1 for both X Span and Y Span ⇒ Click Next twice ⇒ Click Finish.
4. Select the object palette, enter ethernet16_hub in the Search by name dialogue box and click next. Place
this object onto the scenario
7. Right click on the hub and the option Set Name – enter Hub1 as the name
Collect Statistics
1. Right click on the scenario and Choose Individual DES Statistics as shown
2. Run the simulation for 2 minutes
The network we just created utilizes only one hub to connect the 16 stations. We need to create another network that utilizes a
switch and see how this will affect the performance of the network. To do that we will create a duplicate of the current network:
1. Select Duplicate Scenario from the scenarios menu and name it HubSwitch
2. Using the Search by Name box locate and add an ethernet16_switch and ethernet16_hub to the scenario.
Name these Switch and Hub2 respectively.
3. Right click on a link and choose Select Similar links, press delete
4. Now rearrange the scenario and add the 10BaseT links as shown
5. Run the simulation for 2 minutes
Analysis of Results
9. Select the Collision Count statistic for Hub1 and click Show.
10. On the resulting graph right-click anywhere on the graph area ⇒ Choose Add Statistic ⇒ Expand the hierarchies
⇒ Select the Collision Count statistic for Hub2 ⇒ Change As Is to time_average ⇒ Click Add.
Research task for your portfolio
2. What problems could arise if you don’t understand traffic behaviour when you build a new network or
upgrade a network?
3. Does cloud computing fit into the types of traffic flow discussed in the lectures (terminal/host, client/server,
peer-to-peer, server/server, etc) or is it a new type of traffic flow? Why?
You should write about 400 words in total and be properly referenced where necessary, using the Harvard
Referencing style.
6CC009 Workshop 3
Student Name:________________________________________________________________________
In this project you will create a campus level model that comprises of 4 departments: Research; Engineering; E-
Commerce and Sales. Each of these will be in their own subnet and there will be a further subnet that contains the
campus level servers. The model will simulate multiple users and multiple usage profiles. You will investigate the
effect of traffic on the performance of this network.
Objectives
Procedure
Start Riverbed Modeller in the Advanced Networking VM, and create a project called 999999_NetDesign and an
empty scenario called 999999_SimpleNetwork (where 999999 is your own student number). In the initial startup
wizard create an empty campus scenario that is 2 km by 2km.
Open the object palette and from the Internet Toolbox select and place the objects : Application config; Profile
Config and a subnet . We need to edit the attributes of each of these with the following values.
1. Application Config
a. Name = Applications
b. Application Definitions = Default
2. Profile Config
a. Name = Profiles
b. Profile Configuration = Sample Profiles
3. Subnet
a. Name = Engineering
Now double click the subnet icon and it will open to a blank workspace. Add the following to the workspace from
the Internet Toolbox 10BaseT_LAN, ethernet16_Switch and a 10BaseT_link between the former two. We need to
edit the attributes of the 10BaseT_LAN node.
1. Name = LAN
2. Application > Application Supported Profiles
a. Rows = 1
b. Expand none
c. Set profile name to Engineering (which is one of Riverbeds sample profiles)
We now need to edit each subnet in turn to have the user profiles in each to reflect the role of that subnet.
Double click the Sales subnet and edit the attributes of its LAN
1. Application Supported Profiles > Profile Name = Sales Person
Now click on the parent subnet button to take you back to the workspace shown above
Edit the last two subnets as above but to have profile names used to be E-Commerce Customer and Researcher
respectively.
We now need a subnet containing the appropriate servers to support the applications defined in the user profiles.
You can check what applications are used from the attributes of the Profile node under Profile Configurations >
Applications .
From the object palette add a new subnet to the workspace and name it servers, then double click on it. In the
empty workspace add 3 ethernet_servers and one Ethernet16_switch. Connect the servers to the switch with
10BaseT_links. Edit the attributes of the first server
The subnets need to be connected together using 100BaseT links via the switch in the servers subnet. As you create
each link a pop up will appear to query what in each subnet you wish to connect to and from.
Your connections must be from switch to switch. Repeat this for the other 3 subnets.
In the duplicate scenario we are going to add background traffic in the links in addition to that of the traffic created
by the users interaction with the servers. Name the scenario 999999BusyNetwork (where 999999 is your student
number)
Select the 100BaseT links and edit the attributes. Make sure you tick the box Apply Changes To Selected Objects. We
need to add some traffic
This will give a background ulitlisation on the links of 99% for 30 minutes, which we will choose as the time of each
simulation.
Gather Statistics
Run the simulation for 30 minutes for both scenarios and gather Global statistics for HTTP – Page Response time.
Display both sets of time averaged statistics on the same chart for comparison.
Choose 3 other relevant statistics to compare scenarios and paste their outputs below with relevant titles. Explain
briefly why you have chosen these statistics and why they are important to consider.
1. Why does “scalability” mean and why is it an important network design goal? What are the challenges
network designers face when designing for scalability?
2. An existing network has a goal of 99.8 percent uptime. How much downtime will be permitted in hours per
week? How much downtime will be permitted in minutes per day and seconds per hour? Which values do
you think are acceptable in which circumstances?
[your answer here]
3. Assume that you are in Wolverhampton and you are downloading a 1MB image on a web page from a server
in California, USA. Assume that the bandwidth between the two locations is 1 Gbps. How long would the
image take to load. What types of delay will be significant in this transfer?
Student Name:________________________________________________________________________
In this workshop you configure and analyse the performance of RIP in a network containing 8 subnets and 4 routers.
Objectives
4. You will build a model of an autonomous system and using the routing protocol RIP you will analyse the
routing tables and observe how RIP is affected by link failures.
5. To write a total of 400 words on the research questions at the end of the worksheet.
Procedure
Start Riverbed Modeller in the Advanced Networking VM, and create a project called 999999_RIPNetwork and an
empty scenario called 999999_NoFailureRIP (where 999999 is your own student number)., this is to be a campus
based network 2Km X 2Km.
Using the internet_toolbox from the object palette, create the network as shown in the diagram below, using an
ethernet4_slip8_gtwy router, two 100BaseT_LAN objects and linked with duplex 100BaseT links. Name the objects
as shown on the diagram.
Highlight the all the objects in your scenario and then from Modeller toolbar select edit and click paste 3 times to
generate the network as shown below. Edit the names of the devices as seen in the scenario below and link the
routers together using PPP_DS3 links.
Choose statistics
Run the simulation and from Configure/Run pop up select the following rom the Global Attributes Tab
1. Duration = 10 minutes
2. IP > IP Dynamic Routing Protocol = RIP
3. IP > IP Interfacing Mode = Auto Addressed /Export
4. Simulation Efficiency = RIP Sim Efficiency = Disabled
a. This attribute needs to be disabled otherwise RIP will stop after the “RIP Stop Time”, but we need it
RIP to keep updating the routing table after we fail a link in the network.
We will now create a duplicate scenario from the scenarios menu and name it 9999999_FailedRIP (where 9999 is
your own student number) and induce a failure in this in order to make a comparison with the first network.
From Object palette search for the Failure Recovery object and drop it onto the scenario. Edit it’s attributes with the
following values.
Make sure the name attribute is set to fail the link between router 1 and 2.
Run the simulation – it may take some time for the statistics to be processed and these will only be available after
the run icon has stopped being greyed out.
[your graphs]
Routing Tables
Before examining the contents of the routing tables we need to establish the IP addresses of the all the interfaces as
these are set automatically.
1. The addresses are exported to a text file with the file extension .gdf in the directory storing your project. Use
Notepad++ to open this file.
2. Use this info to superimpose the Network IP addresses attached to your routers and the links between onto
a copy of your scenario.
[your diagram]
To check the contents of the routing tables in Router1 for both scenarios
[your table]
[your table]
What are the differences between these and why do they exist.
Research Questions
1. Highlight any major differences in the tables above and explain why they occur.
2. What are the security weaknesses of the DNS systems and what are the solutions?
Student Name:________________________________________________________________________
Introduction
Data and Voice communication originally travelled over separate networks as the demands for low
jitter, delay and dropped packets for voice were not achievable in a typical data type network.
However, recent investment giving increased bandwidth, and improved networking techniques
allowing different standards of service being given to different types of traffic make using the same
networks possible. The purpose of this workshop is to measure these parameters under differing
ways of handling the voice and data flows in the network.
As part of the resource allocation mechanisms, each router must implement some queuing
discipline that governs how packets are buffered while waiting to be transmitted. Various queuing
disciplines can be used to control which packets get transmitted (bandwidth allocation) and which
packets get dropped (buffer space). The queuing discipline also affects the latency experienced by
a packet, by determining how long a packet waits to be transmitted. Examples of the common
queuing disciplines are first-in- first-out (FIFO) queuing, priority queuing (PQ), and weighted-fair
queuing (WFQ).
The idea of FIFO queuing is that the first packet that arrives at a router is the first packet to be
transmitted. Given that the amount of buffer space at each router is finite, if a packet arrives and
the queue (buffer space) is full, then the router discards (drops) that packet. This is done without
regard to which flow the packet belongs to or how important the packet is.
PQ is a simple variation of the basic FIFO queuing. The idea is to mark each packet with a priority;
the mark could be carried, for example, in the IP Type of Service (ToS) field. The routers then
implement multiple FIFO queues, one for each priority class. Within each priority, packets are still
managed in a FIFO manner. This queuing discipline allows high- priority packets to cut to the front
of the line.
The idea of the fair queuing (FQ) discipline is to maintain a separate queue for each flow currently
being handled by the router. The router then services these queues in a round- robin manner.
WFQ allows a weight to be assigned to each flow (queue). This weight effectively controls the
percentage of the link’s bandwidth each flow will get. We could use ToS bits in the IP header to
identify that weight.
In this lab you will set up a network that carries three applications: FTP, Video, and VoIP. You will
study how the choice of the queuing discipline in the routers can affect the performance of the
applications and the utilization of the network resources.
Procedure
Start Riverbed Modeller in the Advanced Networking VM, and create a project called
999999_Queues and an empty scenario called 999999_FIFO (where 999999 is your own student
number). In the initial startup wizard create an empty campus scenario that is 2 km by 2km.
We now need to create some traffic in the network. Firstly we need to configure the
applications that may run on these workstations.
1. Configure the Application Node by right clicking on it.
a. Edit attributes > Application Definitions > set rows to 3.
b. Name the rows FTP application, Video Application, and VOIP application.
c. Go to the FTP Application row ⇒ Expand the Description hierarchy ⇒ Assign High Load to Ftp ⇒ Click on the
High Load value and choose Edit from the drop-down menu ⇒ Assign Constant(10) to Inter-Request Time ⇒
Assign Constant(1000000) to File Size. Keep the Type of Service (ToS) as Best Effort (0).
d. Go to the Video Application row ⇒ Expand the Description hierarchy ⇒ Assign Low Resolution
Video to Video Conferencing ⇒ Click on the Low Resolution Video value and choose Edit ⇒ Edit
the value of the Type of Service field (the Configure TOS/DSCP window appears) ⇒ From the drop-
down menu, assign Streaming Multimedia (4) to ToS ⇒ Click OK twice.
e. Go to the VoIP Application row ⇒ Expand the Description hierarchy ⇒ Assign PCM Quality
Speech to Voice. If you edit it, you can see that the ToS assigned to it is Interactive Voice (6).
2. Click OK and then save your project.
We now need to configure some user profiles to make use of the applications.
The queue profile object will generate queues of traffic and will just accept the standard ones that it has so there is
no need to change this object configuration at all.
W e now need to set some traffic from the FTP server and the workstations into the network.
5. Right-click on the FTP Client ⇒ Edit Attributes ⇒ Expand the Application: Supported Profiles hierarchy
inside Applications ⇒ Set rows to 1 ⇒ Set Profile Name to FTP Profile ⇒ Click OK.
6. Right-click on the Video Client ⇒ Edit Attributes ⇒ Expand the Application: Supported Profiles hierarchy
inside Applications ⇒ Set rows to 1 ⇒ Set Profile Name to Video Profile ⇒ Click OK.
7. Right-click on the VoIP West ⇒ Edit Attributes.
a. Expand the Application: Supported Profiles hierarchy inside Applications ⇒ Set rows to 1 ⇒ Set
Profile Name to VoIP Profile.
b. Edit the Application: Supported Services value inside Applications ⇒ Set rows to 1 ⇒ Set
Service Name to VoIP Application ⇒ Click OK twice.
8. Right-click on the VoIP East ⇒ Edit Attributes.
a. Expand the Application: Supported Profiles hierarchy inside Applications ⇒ Set rows to 1 ⇒ Set
Profile Name to VoIP Profile.
b. Edit the Application: Supported Services value inside Applications ⇒ Set rows to 1 ⇒ Set
Service Name to VoIP Application ⇒ Click OK twice.
9. Right-click on the FTP Server ⇒ Edit Attributes ⇒ Edit the Application: Supported Services value inside
Applications ⇒ Set rows to 1 ⇒ Set Service Name to FTP Application ⇒ Click OK twice.
10. Right-click on the Video Server ⇒ Edit Attributes ⇒ Edit the Application: Supported Services value
inside Applications ⇒ Set rows to 1 ⇒ Set Service Name to Video Application ⇒ Click OK twice.
Save your project.
Now we need to configure the routers so they have a queuing policy operating.
11. Click on the link connecting the East and West routers to select it ⇒ From the
Protocols, menu choose IP → QoS → Configure QoS.
12. Make sure the selected items are as shown in the following QoS Configuration
dialogue box ⇒ Click OK.
Note: Since the Visualize QoS Configuration radio button is checked, the link is coloured based on the QoS scheme
used.
We will now create a duplicate scenario and using a different queuing mechanism.
From the scenarios menu select duplicate scenario and name it 9999999_PQ where 999999 is your
student number.
1. Click on the link connecting the East and West routers to select it ⇒ From the
Protocols menu choose IP → QoS → Configure QoS.
2. Make sure the selected items are as shown in the following QoS Configuration
Dialogue box ⇒ Click OK
We will now create a duplicate scenario and using a different queuing mechanism.
From the scenarios menu select duplicate scenario and name it 9999999_WFQ where 999999 is your
student number.
Select Duplicate Scenario from the Scenarios menu and give it the name WFQ ⇒
Click OK.
3. Click on the link connecting the East and West routers to select it ⇒ From the
Protocols menu choose IP → QoS → Configure QoS.
4. Make sure the selected items are as shown in the following QoS Configuration
dialogue box ⇒ Click OK.
Click run and then save your project
Select a further 2 relevant statistics and paste all your results into the document
Comment on your results – why are they relevant and what are the differences
How differentiated services for different types of network traffic is achieved and why it is necessary
Scenario
Your company has two sites in Telford and Wolverhampton, each requiring a LAN to be setup at the site and for WAN
link to be enabled between them. In this scenario we will be using IPV6 on the routers and PCs. The routing protocol
RIP does not support IPV6 and so we will need to use one that has been developed with the same metric as RIP, but
will support it called RIPng (RIP new generation, and IPV6 was originally called IP new generation). The manner in
which we set up the routers is somewhat different as RIPng runs a process on each interface that enacts the routing
and creates the routing table.
S0/0/0 S0/0/0
WOLVES TELFORD
FC00::12:0 /112
G0/0
G0/0
Ethernet switch
Wolves
2011:314:271:1::/64 Telford
2011:314:271:1::/64
1. Working in pairs you are to decide who is TELFORD and other to WOLVES,
2. Cable up your workstation to a switch, then into the Ethernet port G0/0 of your router. Use a serial cable between the
serial ports of the routers. This cable is directional and the end with the DCE marked on it must go into the S0/0/0 port
of the WOLVES router
Configuring the Routers
Now we need to enable the IPV6 routing protocol on that interface and any interface that will be taking part in this.
This is unlike RIP using IPv4 which it enables the router to deal with RIP. The syntax is
ipv6 rip <name> enable command enables the specified IPv6 RIP routing process on an interface. The
process name is only significant within the router, and allows you to run more than one RIP process if you
want to. Because it is only locally significant, every router can have a different RIP process name without
conflict, although we generally don't recommend this, as it can become confusing to manage. We will call
our process comms
WOLVES(config-if)# no shutdown
TELFORD(config-if)# no shutdown
TELFORD(config-if)# interface s0/0/0
TELFORD(config-if)#no shutdown
Wolves PC 2011:314:271:1::2/64
Telford PC 2011:314:271:2::2/64
Check there is connectivity between the Telford pc and the Wolves PCs by using the IPV6 Ping command. Google the
command.
Or
Ping the two IPV6 addresses that your colleague has set on their G0/0 interface. Were you able to ping both
addresses?
Your colleagues PC will also have a link-local address starting with FE80::, ping their address. Were you successful?
Why?
Research Topics
Write notes in your words on the following topics using only 400 words.