Upload
navidabedpoor
View
91
Download
4
Tags:
Embed Size (px)
DESCRIPTION
Building Network Topologies /Steps for Building a Network Topology /Examples of Various Topologies Used for /Different Studies /Lab 3 – Switched LANs
Citation preview
OPNET IT Guru Academic Edition
Chapter 4 LAB 3 – Switched LANs
N. Abedpoor
Imam Reza International University of Mashhad
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013
● Building Network Topologies
• Steps for Building a Network Topology
• Examples of Various Topologies Used for Different
Studies
● Lab 3 – Switched LANs
Chapter 4 Lab3 – Switched LANs
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 2
● The software supports many different techniques for building
network topologies. Topologies can be created manually or
imported from tools that perform auto-discovery. The model
library that comes with the software provides models of
various devices used in current day networks. Devices that
aggregate sections of the network (such as LAN segments,
ATM/Frame Relay clouds) are provided in order to simplify the
network topology and improve simulation performance.
● using the software to do the following:
• build complete network topologies
• build partial topologies
• model a single path between two devices
Building Network Topologies using OPNET
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 3
● There are five basic steps outlined for building a network
topology.
Steps for Building a Network Topology
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 4
Determine your eventual goal
Assess your existing network
Determine if you need aggregation
Select a building technique
Create your
network
topology
● The choice of devices for constructing a network topology and
the method is very much a function of the goal of a simulation
study. Depending upon the context in which the software is
being used, you may represent the topology as a single path
between two devices, a partial topology with portions of the
network abstracted or a complete topology with every device
explicitly modeled.
Determine your eventual goal
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 5
Determine your eventual goal
● only the infrastructure supporting traffic between two devices
of interest is represented
• For example, if the objective of using the software is to
analyze a client-server application
● The advantage of this topology is that it enhances the focus
of the study to the main objects of interest, i.e. the client and
the server. Since other devices are not explicitly modeled, the
simulation is very efficient. There is no loss of accuracy since
the effect of the remaining network on the client-server traffic
is taken into account. You can easily and quickly perform a
number of what-if scenarios by changing client/server
parameters or the amount of traffic in the intermediate
sections of the network.
Single Path
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 6
Determine your eventual goal
● In certain situations, it may be important to represent portions
of the network in detail while abstracting other sections.
● For example, if the objective is to study the utilization of a
backbone, the backbone portion must be completely
represented. Other sections of the network may be abstracted.
However their effects should be captured when traffic
information is entered.
Partial Topology
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 7
Determine your eventual goal
● A complete topology is necessary when a particular problem is
scaled across the network and it is important to identify the
impact of the problem on all devices involved.
● For example, if a new application is being deployed and the
objective of the simulation is to determine its impact on
intermediate network devices, it may be important to model
the complete topology.
● Complete topologies may also be used when the objective of
the study is to move a server to various prospective locations
and study the impact of each choice on network resources
(say link utilization).
Complete Topology
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 8
Determine your eventual goal
● Listed below are some examples of goals and recommended
topologies:
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 9
Determine your eventual goal
Recommended Topology Goals of the simulation
Single Path Performance of a database application
Single Path Performance of FTP with different TCP settings
Single Path Performance of application for remote users
Single Path Performance of a new application in the network
Complete Effect of a new application deployment on the network
Partial Backbone analysis
Partial Trading off Fast Ethernet VS. Gigabit Ethernet
Partial Moving from shared media to a switched network
● Before beginning construction the final topology, it is important to
have a complete picture of the existing network in the form of a
drawing or a map. It is important to identify all existing devices, their role, and the protocols that are running in the existing network. It is
also important to identify the flows and traffic patterns in your
existing network.
● Consider the following questions:
• 1. Is the network flat (predominantly switched) or segmented
(routed)?
• 2. Where are the main servers located (WWW server, database
server etc.)?
• 3. What is the main traffic flow (users accessing the database
server, traffic through a firewall etc.)?
• 4. What are the sources of broadcast and multicast traffic?
Assess your existing network
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 10
Assess your existing network
● Before performing the final steps in generating a topology, it is
important to determine if you can aggregate portions of the network.
● Aggregation can be performed at the segment level (LAN segment)
or at the subnet level (IP subnet).
● Portions of the network, which are outside the corporate control such
as the Internet or the carriers, can also be represented as simple
"cloud" objects with the appropriate latencies.
● Examples of the above are illustrated graphically next slides:
Determine if you need aggregation
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 11
Determine if you need aggregation
● A LAN segment can be aggregated into a shared LAN object. The
number of workstations that the shared LAN represents and the
different applications generating traffic can be specified. The shared
LAN automatically scales the traffic based on the number of stations.
Utilization measured on the shared LAN can be modeled as
background utilization on the shared LAN object.
Figure 1: Shared LAN Aggregation
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 12
Determine if you need aggregation
● Shared LAN segments connected to a switch may be aggregated into
a switched LAN object. The number of workstations that the entire
switched LAN segment represents can be specified. Applications can be
configured on the switched LAN and the model automatically scales the
total traffic based on the number of workstations. Utilization measured on
a switched segment can be input as background utilization on the
switched LAN. The switching speed for the LAN segment can also be
specified.
Figure 2: Shared LAN Aggregation
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 13
Determine if you need aggregation
● The frame relay cloud can be used to represent a section of the
core frame relay network. Typically, a company uses a frame relay
carrier service for long haul communications and the carrier
infrastructure can be represented as the frame relay cloud. Packet
latency and discard probabilities can be modeled on the frame relay
cloud. Similarly, an ATM cloud can be used to represent core portions
of an ATM network and an IP cloud can be used to represent portions
of the Internet.
Figure 3: Frame relay (or ATM) aggregation
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 14
Determine if you need aggregation
Figure 4: IP Level aggregation
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 15
Determine if you need aggregation
● Topologies can be created manually or automatically through a
process of importing from tools that perform auto-discovery.
● Topologies can be constructed automatically from router configuration files and text/XML files as well.
Each one of these techniques is discussed in detail below.
● Direct Import
● The software supports importing topologies directly from a number of
vendor products. Each import procedure varies slightly based on the
information obtained from the vendor products. Refer to the product
documentation for details on the import procedure.
Select a technique for creating the topology
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 16
Select a building
technique
• The VNE Server Environment
The OPNET VNE (Virtual Network Environment) Server product
provides an on-line, continuously valid, integrated view of your network.
VNE Server collects network data from disparate sources, and
intelligently merges this information to create a unified network
representation that can be used for network planning, engineering, and
operations.
Designed for openness, VNE Server is a user-extensible solution that
can encompass virtually any data source. VNE Server provides a
complete, architected approach for managing network information.
• Vendor Products
You can import from vendor products such as HP Network Node
Manager or Tivoli Netview. Refer to the product documentation for the
complete list of supported vendor products and procedures on how to
import from these products.
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 17
Select a building
technique
• Text/XML Files
OPNET supports text-based or XML-based topology import. These
text/XML files have a specific format that can be found in the product
documentation. Geographic location information can be supplied in
these files.
• Router Configurations
OPNET supports import of router configuration files. Geographic location
information can be supplied with the router configurations. When you
use router configuration files, the topology that is created will have
attributes that control routing behavior specified based on the contents
of the router configuration files.
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 18
Select a building
technique
The key features of the import process:
● The import preserves the network layout and hierarchy. The
relative positioning of objects is preserved. If objects are within subnets, the software will create subnets and place objects within them.
● Devices are mapped accurately to the model library. The software maintains a large database of device models (e.g. routers, switches, servers etc.) and their characteristics. During import, devices are identified based on their function and vendor.
● Import provides aggregation. The topology can be imported with LAN level aggregation, IP segment level aggregation or no aggregation at all.
● A Question/Answer database provides a method for dealing with unmanaged devices in case of import from HP Network Node Manager.
● Import can repair structural defects in the network.
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 19
Select a building
technique
● Manual Construction
● Manual construction can be used when the topology is simple (in
terms of number of objects and complexity of interconnection) or
when supporting tools that provide topology information for direct
import are not available.
● To build topologies by hand, the software provides a number of
object palettes that contain common network devices and links used
for interconnection. The software also provides a technique called
"Rapid Configuration" that allows you to quickly create standard
topologies (star, tree, bus, mesh, etc.) containing many devices with
a few clicks. Once a topology has been created by hand, the
software provides features that allow the user to select a large
number of objects and apply attribute values in one operation.
Consistency checking is provided to ensure that links are accurate
and the interconnected devices are compatible.
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 20
Select a building
technique
● Once the steps above have been completed, you can build
the network topology.
● The link consistency check must be executed to ensure that
the topology is accurate and there are no disconnected links.
● When the topology construction is complete, you can specify
attribute values on devices and run simulations. Some
features that are useful for this purpose are listed below.
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 21
Create the
topology
Create the Topology
Details about these features may be found in the
software documentation.
● Find node: Allows the user to locate any node by name across the
network. LAN objects or any objects that represent many devices can
be configured with the names of individual members that they
represent (aliases). The find node utility also locates a device by its
alias.
● Logical object selection: Objects can be selected based on their
type or any of their attribute settings. Selection sets can be retained
for further selection.
● Applying changes to selected objects: Changes to attribute values
for objects selected manually or using the find/logical object selection
command can be applied with a single click.
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 22
Create the
topology
Details about these features may be found in the
software documentation.
● Configuring attributes: Attributes can be configured to represent
characteristics of the device. Protocol parameters can also be tuned.
● Selecting advanced models that contain many attributes: Models
are divided into a three-tier structure: advanced, intermediate and
final. Advanced models contain numerous attributes that can be
tuned based on the different protocols they contain. Intermediate
models contain a subset of the advanced model attributes and Final
models contain only very basic attributes that have to be configured
by the user.
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 23
Create the
topology
● The example topology selected consists of users on shared LAN segments.
LAN segments on the same floor of an office are connected to each other via
a switch. All switches interface to a building router. A backbone spans various
campuses and connects the building routers together. Servers are located on
a server farm in one of the buildings.
Examples of Various Topologies
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 24
Co
mp
lete
To
po
log
y
● If the network is being used to study the performance of an existing
application in the presence of regular day-to-day network traffic, a
single path from the client to the server may be adequate. The effect
of network traffic is to cause additional delay for the application
traffic. The network traffic is represented by background utilization on
the intermediate devices. Application traffic is modeled explicitly. This
is an example of a hybrid simulation. Hybrid simulation explicitly
models the application of interest. The network traffic effects are
analytically represented to obtain both accuracy and simulation
efficiency.
Topology for Client/Server Performance Analysis
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 25
Single Path Topology
● If the network is used to study application deployment, it is
important to represent all the traffic flows from all clients to the
servers. Since the objective is to study application response
time and the effect of this application on the switches and
routers, it is not important to model in full detail of each LAN
segment. LANs may be aggregated into shared LAN objects
with the appropriate number of workstations. Note that the
LAN object will automatically scale the traffic based on the
number of workstations. The flows across the switches and
routers must be modeled explicitly as the effect of the new
application on such devices is important in the study.
Topology for Application Deployment
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 26
Topology for Application Deployment
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 27
Partial Topology
● If the above network is used to study utilization on the backbone, it is
important to model flows across the backbone accurately. Modeling
individual LAN segments and switches is not important. The shared
LAN segments along with the switches can be aggregated into
switched LAN segments that generate cross traffic via the backbone.
Topology for Analysis Backbone
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 28
Partial Topology
● There is a limit to how many hosts can be attached to a single
network and to the size of a geographic area that a single
network can serve. Computer networks use switches to
enable the communication between one host and another,
even when no direct connection exists between those hosts.
● A switch is a device with several inputs and outputs leading to
and from the hosts that the switch interconnects. The core job
of a switch is to take packets that arrive on an input and
forward (or switch) them to the right output so that they will
reach their appropriate destination.
Lab 3 – Switched LANs
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 29
A Set of Local Area Networks Interconnected by Switches
● A key problem that a switch must deal with is the finite
bandwidth of its outputs. If packets destined for a certain
output arrive at a switch and their arrival rate exceeds the
capacity of that output, then we have a problem of contention.
In this case, the switch will queue, or buffer, packets until the
contention subsides. If it lasts too long, however, the switch
will run out of buffer space and be forced to discard packets.
When packets are discarded too frequently, the switch is said
to be congested.
Lab 3 – Switched LANs
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 30
A Set of Local Area Networks Interconnected by Switches
NOTES:
Create Project:
● Name the project <your initials>_SwitchedLAN
● Name the scenario OnlyHub
● make sure that Create Empty Scenario
● Choose Office for Network Scale
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 31
NOTES:
Create the Network: ● Use Rapid Configuration.
● Star Topology
● Choose Ethernet from Model List
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 32
NOTES:
Configure Network Nodes
● Select Similar Nodes
● Edit Attributes.
● Set Value Shown in
figure.
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 34
NOTES:
Choose Statistics
● Choose Individual Statistics
● choose the following four
statistics
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 35
NOTES:
Configure the Simulation
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 36
NOTES:
Duplicate Scenario
● We need to create another network that utilizes a switch and
see how this will affect the performance of the network.
● 1- Scenarios menu Duplicate Scenario name
HubAndSwitch OK
● 2- Open the Object Palette
● 3- place a Hub and a Switch to new scenario.
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 37
NOTES:
● 4- change the name attribute of both models to Hub2 and
Switch
● Reconfigure the
network of HubAndSwitch
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 38
NOTES:
Run the Simulation
● Scenarios menu Manage Scenario.
● Value under Results column to <collect>
● OK (to run Simulation)
● After simulation completes, click close
● Save your Project
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 39
NOTES:
View the Results
● 1- Result menu Compare Results
● 2- Select and change something you see in figure
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 40
NOTES:
View the Results
● Traffic Sent (packets/sec)
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 41
NOTES:
View the Results
● Traffic Received(packets/sec)
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 42
NOTES:
View the Results
● Collision Count
N. Abedpoor – International Imam Reza University of Mashhad Dec. 2013 43