IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 5 - Issue 1, January 2016 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Investigating And Evaluating Of Network Failures And Performance Over Distributed WAN In Application Protocol Layer

[Full Text]

 

AUTHOR(S)

Enoch Okoh Kofi, Micheal Asante, Francis Kwadzo Agbenyegah

 

KEYWORDS

Wide Area Network, Enhance Interior Gateway Routing Protocol (EIGRP), Routers, Riverbed Modeler, Utilization

 

ABSTRACT

The Experiment was done to find out network failures and application performance relationship over distributed Wide Area Net (WAN). In order to access related application over the cloud there must be an internet connectivity which will help the respective workstations to access the remote server for applications being deployed over the network. Bandwidth improvement helps in reducing utilization over the network and it also helps in improving Application Efficiency of these Applications in terms of Response Time. Routers were configured under Enhance Interior Gateway Routing Protocol (EIGRP) to reduce utilization and to ensure load sharing over the network. Three scenarios were modeled and their performance efficiency was evaluated. A modeled computer Network with and without a fail Router under different scenarios and such Network was simulated with emphasis on the Application Performance. The Experiment was done for fifty workstations under three scenarios and these three scenarios were accessed and evaluated on experimental basis using Riverbed modeler to show the Effect of Application Network performance. The performance results show that increasing the bandwidth reduces utilization and also with the failure of one communication bandwidth, users can still access Network Application with a minimal cost.

 

REFERENCES

[1] Anu, M Introduction to modelling and Simulation, State University of New York.

[2] AunHaider, HarshaSirisena, Krzysztof Pawlikowski and Michael J. Ferguson, “Congestion Control Algorithms in High Speed Telecommunication Networks”, Department of Electrical and Electronic Engineering, 2003.

[3] Bosworth,S.,and Kabay, M.E,(2002).Computer Security Handbook, Toronto: WileyInc

[4] Brakmo, L. and Peterson, L. “TCP Vegas: End to end congestion avoidance on a Global internet”, IEEE Journal on Selected Areas in communication, 13(8): 1465-1480, October 1995.

[5] Chiu, D. and Jain, R. “Analysis of the Increase/Decrease Algorithms for Congestion Avoidance in computer Networks”, Journal of Computer Networks and ISDN, 17(1), June 1989.

[6] Dalal, Y.K., “The Information Outlet: A New Tool for Office Organization, “Proc. On-line Cong. Local Networks and Distributed Office Systems, London, May 1981, pp. 11-19.

[7] Eitan Altman, ChadiBarakat and Victor M. Ramos, “Analysis of AIMD Protocol over Path with Variable Delay” University of Nice, 2004.

[8] http://czx.ujn.edu.cn.Date Access August 17th, 2014

[9] http://daywatch.com,Data Access, May 10th,2014

[10] http://dspace.unimap.edu,Date Access July 2014

[11] http://en.wikipedia.org/wiki/Bandwidth,DateAccess,June 2014

[12] http://en.wikipedia.org/wiki/NetworkTopology,Date Access July 30th,2014

[13] http://en.wikipedia.org/wiki/quality-of-service. Date Access ,April 20th, 2014.

[14] http://en.wikipedia.simulation,DateAccess,August 2014

[15] http://enterprise37.opnet.com/4dcgi/DOWNLOAD_ITE-AE,Date Access July,2014

[16] http://media-cms.riverbed.com/document/download.html,Date Access July,2014

[17] Http://ptgmedia.pearsoncmg.com,DateAccess,August 2014

[18] http://staffwww.dcs.shef.ac.uk,Date Access July 10th,2014

[19] http://www.gettingyouconnected.com,DateAccess,July 17th,2014

[20] http://www.riverbed.com,Date Access July, 2014

[21] http://www.ukessay.com,DateAccess,May 2014

[22] https//www.eng.tau.ac.il,Date Accessed, July 5th 2014

[23] Jahwan Koo, SeongjinAhn, Jin Wook Chung, “A comparative Study of Queue, Delay, and Loss Characteristics of AQM Schemes in QoS-Enable Networks”, Computing and Informatics Journal, Vol. 22,2003,1001-1019, V 205-Feb.-8.

[24] Johari R. and Tan DKH, “End-to-end congestion control for the internet: Delays And Stability”, IEEE/ACM Transactions on Networking 9(6), 818-812,201.

[25] Kyas,O.(2001).Network Troubleshooting, Palo Alto California, Agilent Technologies

[26] L. Wang,Cai, L. Liu, X. and Shen, X. “AIMD Congestion Control: Stability, TCP- Friendliness, Delay Performance”, Tech. Rep., March 2006.

[27] Lahanas, A. and Tsaoussidis, V. “Exploiting the Efficiency and Fairness Potential Of AIMD base Congestion Avoidance and Control”, Journal of Computer Network 2003.

[28] Lin Cai, Xuemin Shen, Jon W. Mork, Jianping Pan, “Performance Analysis of AIMD-Controlled Multimedia Flows in Wireless/IP Networks”, Department of Electrical & Computer Engineering, University of Waterloo, 2005.

[29] Metcalf, R.M., Boggs, D.R., Thacker, C.P., and Lamposn, B.W. “Multipoint Data Communication System with Collusion Detection, US Patent No. No. 46043. Dec. 13, 1977.

[30] Metcalfe, R.M and Boggs, D.R. “Ethernet: Distributed packet Switching for Local Computer Networks, “Comm. ACM, 19:7 July 1976, pp 395-404.

[31] MichealWelzl, “Network Congestion Control Managing Internet Traffic”, John Wiley & Sons Ltd., 2005.

[32] Pecora,F.(2005).Principles of simulation and Multi-Agent Approach, school of science and Technology, Orebro University

[33] Ravi S. Prasad, “An Evolutionary Approach to improve End-to-End Performance In Tep/Ip Networks”, Ph. D. Thesis, College of Computing, Georgia Institute of Technology, April 2008.

[34] Shoch J.F., and Hupp, J.A., “Performance of an Ethernet Local Network – A Preliminary Report, “Local Area Comm. Network Symp., Boston, May 1979, pp. 113-125. Revised version Proc. Compcon Spring 80, San Franciso, pp. 318-322.

[35] Shoch, J.F. “An Annotated Bibliography on Local Computer Networks” (3rded.), Xerox Parc Technical Report SSL-80-2, and IFIP Working Group 6.4. Working Paper 80-12, April 1980.

[36] Wang, S. Y., Chou, C.L.,Lin, C.C., 2007. The design and implementation of the NCTUns network simulation engine. Science Direct, simulation modelling Practice and theory, 57-81.