SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ISSN : 2347 - 8446 (Online)
ISSN : 2347 - 9817 (Print)
www.ijarcst.com
International Journal of Advanced Research in
Computer Science & Technology (IJARCST 2014)
© All Rights Reserved, IJARCST 201491
Vol. 2, Issue 2, Ver. 1 (April - June 2014)
Computer Network Performance Evaluation Based on Different
Data Packet Size Using OMNeT++ Simulation Environment
I
Mr. Dhobale J V, II
Dr. Kalyankar N V, III
Dr. Khamitkar S D
I
Assist. Professor, Shri. D B P C O M, Manur, Nashik (MH)
II
Principal,Yeshwant College Nanded (MH)
III
Reader & Director, School of Computational Sciences, SRTMU, Nanded
I. Introduction
The performance of the Network configurations is measured
using simulation environment. We preferred OMNeT++ Version
4.2 ( Objective Modular Network Testbed ) object oriented
modular discrete event network simulation framework with
INET framework for OMNeT++ with 2.2.0-ae90ecd release.
Development of OMNeT++ is started in 1992, since then many
people contributed to OMNeT++ with several models. It is
primarily used to simulate the communication networks and other
distributed systems. It is used for academic as well as Industrial
research purposes. OMNeT++ runs on Windows, Mac & Linux
Operating Systems. Here are the features of OMNeT++ which
makes it different from other simulation environment:
OMNeT++ is designed to support network simulation on a1.	
large scale.
Modular structure.2.	
The design of NED (Network Description).3.	
GUI Interface with Graphical Editor.4.	
Separation of Model and Experiments.5.	
Simple Module Programming Model.6.	
Design of the Simulation Library.7.	
Parallel Simulation Support.8.	
Real-Time Simulation, Network Emulation.9.	
Animation and Tracing Facility.10.	
Visualization of Dynamic Behaviour.11.	
Enriched Result Analysis Mechanism12.	
INET consists of several simulation application models. We use
NclientsnetworkapplicationwithbasicHTTPnetworksetupfrom
INET to carry out our experiments. It consists of client server
environment with variable number of clients.
Performance evaluation parameters are set through initialization
(INI)andNetworkDescription(NED)filesandinourexperiments
those files are basicHTTP.ini and Nclients.ned and result of the
experiment is collected through answer (ANF) file. We setup the
experiment to evaluate the network performance by changing the
Data Packet Sizes. To investigate the problem How Data Packet
size affecting the Network Performance? We use **.tcp.mss
(Maximum Segment Size) parameter from basicHTTP.ini file.We
took reading by changing Data Packet Size to 256bytes, 536bytes,
1072bytes & 2144Bytes and collect the readings. We evaluated
Network performance in terms of ServerThroughput.Throughput
from the server is evaluated through ThruputFrom module while
throughput to the server is evaluated through ThruputTo module.
Throughput is number of bits transferred per second from server
to the client or vice versa.
II. Related Work
Number of Researchers has contributed their efforts for the
performance evaluation of wired as well wireless Computer
Networks. These research papers evaluated performance on the
basis of different parameters and methodologies. Here we are
considering contribution papers in the area of wired networks.
Research Paper entitled “A general communication performance
evaluation model based on routing path decomposition” shows
that High-level modelling and simulation methods are necessary
for the evaluations of various options in Network on Chip (NoC)
architectures, in order to meet the stringent requirements of the
increasing complicated future MPSoCs (Multi-processor system-
on-chips). An analytical solution is proposed and a performance
model based on the routing path decomposition and the traditional
queuing system in presented in detail. The analytical model
features comprehensive and elaborate performance estimation
for a variety of networks under different configurations. Research
validate the reliability of the proposed model through extensive
experiments and demonstrate its usefulness in performance
prediction, including computation of the overall packet latency for
the network and the latency distribution in different channels.
One such paper “Real-time Performance Evaluation of Line
TopologySwitchedEthernet”isthepaperpublishedinInternational
Journal of Automation and Computing” in October 2008 by Fan
Cen,Tao Xing & Ke-TongWu present new procedure to calculate
the end to end delay in switched Ethernet using network calculus.
The researchers applied this procedure to assess the real-time
performance of line topology switched Ethernet. The outcome
of the paper shows that the results are matching with the result
of simulations and the maximum end to end delay in the network
linearlyincreaseswiththepacketlengthandswitchnumber.These
are the key factors impacting the delay.
EsmaYildirim –Tevfik Kosar in their Research Paper titled “End-
to-End Data-Flow Parallelism for Throughput Optimization in
High-Speed Networks” published in Journal of Grid Computing
(2012) 10:395-418 proved that the end-to-end transfer throughput
in high-speed networks could be improved dramatically by using
data parallelism that takes into account the end-system capacities
such as the cpu load, disk access speed and NIC capacity over the
Abstract
with this research paper we are investigating the effect of different Data Packet Sizes on the Computer network Performance. The
performance of the Network is evaluated on the basis of Throughput. To investigate the problem we are using OMNeT++ network
simulation framework and Nclient application module from INET framework. We have considered four different types of data packet
sizes i.e 256, 536, 1072 & 2144bytes for our experiments. The performance of the Network is measured in terms of throughput.
Keywords
OMNeT++, NClient, INET, Network Performance, Throughput, Data Packet Size, Datarate, Simulation, Server, Clients.
ISSN : 2347 - 8446 (Online)
ISSN : 2347 - 9817 (Print)
www.ijarcst.com
International Journal of Advanced Research in
Computer Science & Technology (IJARCST 2014)
© 2014, IJARCST All Rights Reserved
92
Vol. 2, Issue 2, Ver. 1 (April - June 2014)
nodes. The model presented in this study provides the parallelism
parameters such as the optimal number of streams per stripe,
number of stripe per node and number of nodes dynamically. The
experimental results conducted using various settings indicate the
accuracy of the model and close-to maximal throughput values.
The model also gives very good results with immediate sampling
especially for large file sizes.
III. Research Methodology
As mentioned in the Introduction section we are using Simulation
environment with OMNeT++ framework to carry out our
experiment. We have used Nclient application form INET to
simulate our research. There are three basic setup provided under
Nclients in INET those TelenetApp, File transfer and basicHTTP
module. Out of these we choose basicHTTP module with
TCPBasicCliApp and TCPGenericSrvApp modules. TelenetApp
generates very low traffic.
Fig. 1: Nclients.Ned: Client Server experimental setup
configuration
To measure the performance of the present network we use
thruputMeter modules. This module is placed between TCP and
TCPApp layer. We required two modules to collect result for
incoming and outgoing traffic to the server. Our client and server
are the StandardHost modules provided in the INET. We have
modified the StandardHost with thruputMeter. Modified structure
ofstandardHostalongwiththruputMeterisshowinfigure2below.
The results of the experiments are collected in excel file from
the default .ans file. .ans file in OMNeT++ gives two types of
results vector and scalar.Vector results are recording of time series
data and scalar results are supposed to record a single value per
simulation run. We have considered scalar result as avg. thruput
for our analysis purpose, Throughput of both thruputMeter i.e.
thruputFrom & thruputTo related to the server.
Fig. 2: StandardHost with thruputMeter module between tcp &
tcpApp
We collect the readings of the simulation experiment by two
ways:
We Kept datarate constant and changed the number of clients1.	
on the server and average throughput scalar values are
collected for respective experiments.
For specific setup on a server we change the datarate and2.	
collect the scalar average throughput in excel files.
For our experiment we kept datarate variation between 10Mbps to
100Mbps with the interval of 10Mbps and clients variance from
10 clients per server to 150 clients per server with the interval
of 10 clients. We took these reading with four packet sizes i.e.
at 256bytes, 536bytes, 1072bytes and 2144bytes with delay=
0.1us unless and until mentioned. We have run each simulation
experiment for n=500s (simulation seconds). We collected the
throughput results by running the simulation experiment 10
(datarate variance from 10Mbps to 100Mbps with the interval of
10Mbps) ×15 (no of client variance from 10 clients to 150 clients
with the interval of 10) × 4 (packet sizes i.e. 256, 536, 1072 &
2144 bytes) =600 times.
IV. Result Analysis
Throughput values of the simulation experiment is collected in
excel file. We have collected results at 10, 20, 30, 40, 50, 60, 70,
80, 90, 100Mbps with 10, 20, 30….…130, 140, 150 clients per
server. These results are collected for four packet sizes i.e. 256,
536, 1072 & 2144 byte. Our result shows that throughput values
from the server and to the server for four data packet sizes are
minimum at 10Mbps with 10 number of clients per server and
maximum are at 10Mbps for packet sizes 536, 1072 & 2144. For
packet size 256 both throughput from the serve and throughput to
the server are maximum at 100Mbps with 150 clients per server
and at 20Mbps with 130 clients per server respectively.
A. With Constant Datarate
We analyze the trend of throughput by keeping datarate constant
and changing the number of clients from 10 number of clients to
the 150 clients per server for all four data packet sizes.
ISSN : 2347 - 8446 (Online)
ISSN : 2347 - 9817 (Print)
www.ijarcst.com
International Journal of Advanced Research in
Computer Science & Technology (IJARCST 2014)
© All Rights Reserved, IJARCST 201493
Vol. 2, Issue 2, Ver. 1 (April - June 2014)
Fig 3: Throughput From server at 10Mbps
By analysing the experimental readings for throughput From the
server we came to know that average throughput from the server is
increases with increase in the number of clients from 10 number of
clients till 110 number of clients per server for all the data packet
sizes, it falls with 120 number of clients on a server for all data
packet sizes except data packet size with 256bytes. Throughput
from the server for all the data packet sizes is maximum with
130 number of clients amongst the interval of clients ranging
from 10 number of clients to 150 clients per server on the server.
Throughput readings with 140 number of clients decrease from
the value with 130 number of clients and it increases with 150
number of clients in compare to throughput from the sever with
140numberofclients.Thisthroughputpatterissameatalldatarate
intervals i.e. form 10Mbps to 100Mbps.
Fig. 4: Throughput To the server at 100Mbps
When we observe the throughput to the server from 10 number of
clients to 150 number of clients at specific datarate from 10Mbps
to 100Mbps with the interval of 10Mbps we get same level of
output trend for all the data packet sizes at each datarate interval.
Throughput values to the server are increasing with increase in
the number of clients till 110 number of clients, throughput values
to the server are decreases at 120 number for all the data packet
sizes except 256byte packet size it shows increase in the trend.
Throughput values to the server with 130 number of clients is
maximum amongst all client intervals from 10 number of clients
to 150 clients. Throughput value at 140 clients decreases from
130 clients and it increases slightly from 140 clients to 150
clients. Throughput from the server and throughput to the server
at specific datarate with variations in number of clients per server
gives maximum values with smaller datapacket size i.e. 256bytes,
amongst 256bytes, 536bytes, 1072bytes & 2144 bytes.
B. With Constant Number of Clients
Now we analyse the trend of throughput from the Server by
keeping number of clients constant and changing the datarate
from 10Mbps to 100Mbps.
Fig. 5: Throughput From the server for 10 No of Clients on a
server
Observations of the experiments shows that
I.	 The throughput from the server with constant Number of
clients 10, throughput from the server is increasing with
increase in the datarate from 10Mbps to 100Mbps for all
the four data packet sizes.
II.	 For Number of clients 20 on the server the throughput form
the server shows that at all the datarate the throughput from
the sever is constant but it is higher with smaller packet size
i.e. 256bytes and for remaining other data packet sizes it is
same i.e.536bytes, 1072bytes and 2144bytes.
III.	 Throughput from the server with number of clients 30 on
a server gives same level of throughput from the server at
all the datarates but gives lower throughput with smaller
data packet size i.e. 256bytes and for remaining data packet
sizes i.e. 536bytes, 1072bytes & 2144bytes it is same but
bit higher than data packet size 256bytes.
IV.	 Throughput from server with 40 number of clients on server
gives throughput which is constant for all the datarates from
10Mbps to 100Mbps & for all the data packet sizes but
gives higher throughput at all the datarates with smaller
data packet sizes i.e.256bytes.For other data packet sizes
i.e. 536bytes, 1072bytes and 2144bytes gives lower than
smaller data packet size and same for all other data packet
sizes.
V.	 Throughput from the server for number of clients 50 on a
server shows same level of throughput at all the datarates but
havingvariationswithrespecttodatapacketsizes.Forsmaller
data packet sizes i.e. 256bytes it gives lowest throughput,
for data packet size 536bytes it gives highest throughput
and for remaining two data packet sizes i.e. 1072bytes and
2144bytes it gives same level of throughput which is higher
than throughput with 256byte packet sizes and smaller than
throughput with 536byte data packet size.
VI.	 Throughput form the server with number of clients 60 & 70
on a server gives same level of throughput at all the datarate
andgivesmaximumthroughputwithsmallerdatapacketsize
i.e.256btes while for other data packet sizes i.e.536bytes,
1072bytes and 2144bytes it gives same level of throughput
from the server and which is much lower than the value with
smaller data packet size.
VII.	 Throughput from the server with number of clients 80 & 90
on a server gives similar type of throughput form the server
pattern at all the datarates and for different data packet size
ISSN : 2347 - 8446 (Online)
ISSN : 2347 - 9817 (Print)
www.ijarcst.com
International Journal of Advanced Research in
Computer Science & Technology (IJARCST 2014)
© 2014, IJARCST All Rights Reserved
94
Vol. 2, Issue 2, Ver. 1 (April - June 2014)
it gives lowest throughput with smaller data packet size
i.e. 256bytes and for other data packet sizes i.e.536bytes,
1072byytes and 2144bytes it gives same level of throughput
whichhigherthan thevaluerecordedat256bytesdatapacket
size.
VIII.	Throughput from server with number of clients 100 on a
server gives highest throughput from the serve at 10Mbps
and for other datarate intervals it gives lower value than
10Mbps which is similar for the data packet sizes 536Mbps,
1072Mbps & 2144Mbps and for data packet size 256Mbps
it gives lower values at all datarate intervals in compare to
other data packet sizes.
IX.	 Throughput form the server with 110 number of clients
on a server gives lower throughput at 10Mbps for all the
data packet sizes, among the tested data packet sizes it
gives lowest throughput with data packet size 256bytes.
Throughput at 20Mbps, 30Mbps and 40Mbps is similar
for all the data packet sizes. Throughput at 50Mbps is
higher than throughput at 40Mbps for all data packet sizes
except 256bytes packet size, it remain same like previous
throughput with same data packet size. Throughput from
server at datarate 60Mbps, 70Mbps, 80Mbps, 90Mbps &
100Mbps it shows similar throughput pattern for all the data
packet sizes; amongst data packet sizes, it gives maximum
throughput with smaller data packet size i.e.256Bytes.
X.	 Throughput with 120 number of clients on a server is giving
same level of throughput at all the datarate and for all the
data packet sizes; amongst the tested four data packets sizes,
maximum throughput we received with smaller data packet
size i.e.256bytes, for other remaining data packet sizes it
gives same level of throughput.
XI.	 Throughput with 130 number of clients on a server is
recorded maximum at 10Mbps and minimum at 20Mbps it
remain at same level at other data rate which is higher than
20Mbps and lower than 10Mbps this is for all data packet
sizes; amongst all data packet sizes maximum throughput
is recorded at smaller data packet size i.e.256byte.
XII.	 Throughput from the server with number of client 140 on
a server at 10Mbps to 40Mbps is similar while at 50Mbps
to 100Mbps is similar and slightly higher than throughput
at 40Mbps; this throughput is same for all data packet
sizes except 256bytes data packet size which gives lower
throughput than other data packet sizes.
XIII.	Throughput from the server with number of clients 150 on
a server gives similar throughput patter at 30, 40, 50, 60,
70, 80, 90 & 100Mbps for all four data packet sizes; we
havereceivedmaximumthroughputwithsmallerdatapacket
size i.e. 256Bytes and minimum throughput with 536byte
data packet size for other data packet size i.e.1072bytes and
2144byteitgivessamelevelofthroughputatabovedatarates.
Throughput at 10Mbps for data packet sizes gives minimum
throughput with smaller data packet size i.e.256bytes and
maximum throughput with 1072bytes and 2144bytes while
at 20Mbps throughput is lower with smaller datapacket size
while maximum throughput is with 536byte data packet
size.
By analysing the experimental readings for throughput to the
server we came to know that throughput to the server is showing
following type of behaviour
The throughput to the server is increasing steadily with1.	
increase in datarate for the 10 number of clients on a server,
it gives same type of throughput pattern like throughput from
the server with 10 number of clients.
Throughput to the server with 20number of clients on server2.	
gives same level of throughput at all data rates for all the
data packet sizes; minimum throughput is recorded with
smaller data packet sizes i.e. 256bytes while for other data
packet sizes i.e.536bytes, 1072bytes and 2144bytes it gives
maximum throughput.
Throughput to the server with 30, 40, 70, 80 & 90 number3.	
of clients on a server gives same level of throughput at all
data rates for all the data packet sizes, recorded maximum
throughput with smaller data packet size i.e.256bytes and
minimum throughput is recorded with all other data packet
sizes i.e. 536bytes,1072bytes & 2144bytes.
Throughputtotheserverwith50numberofclientsonaserver4.	
gives same level of throughput pattern at all datarate intervals
with all four types of data packet sizes; recording maximum
throughput to the server with both 1072bytes and 2144bytes
data packet sizes while minimum throughput recorded is at
smaller data packet size i.e with 256bytes.
Throughput to the server with 60 number of clients gives5.	
exactly same throughput level of patters like throughput
pattern with 20number of clients.
Throughput to the server with 100 number of clients on a6.	
server gives maximum throughput to the server at 10Mbps
for all data packet sizes. Amongst all these data packet sizes
it gives maximum throughput to the server with smaller data
packet size i.e. 256bytres at all data rates and for remaining
data packet sizes i.e. 536bytes, 1072bytes and 2144bytes
it gives same level of throughput which is smaller than the
throughput with 256bytes data packet size at 20Mbps to
100Mbps datarates.
Throughput to the server with 110 number of clients at7.	
10Mbps, 20Mbps, 30Mbps & 40Mbps is giving same level
ofthroughputwithallfourtypesofdatapacketsizes;amongst
these data packet size minimum throughput is recorded with
smallerdatapacketsizei.e.256bytesandforotherdatapacket
sizes i.e. 536bytes, 1072bytes and 2144bytes it gives same
level of throughput to the server. Throughput to the server at
50, 60, 70, 80, 90 & 100Mbps gives same level of throughput
to the server for all data packet sizes except 256bytes at
50Mbps data rate, which gives same level of throughput like
at 40Mbps.
Throughput to the server with 120 number of clients gives8.	
same level of throughput to the server at all data rates i.e.
from 10Mbps to 100Mbps for all data packet sizes; amongst
these data packet sizes it gives maximum throughput with
smaller data packet size i.e. 256bytes and for all other data
packet sizes it gives same level of throughput.
Throughput to the server with 130 numbers of clients gives9.	
maximum throughput at 10Mbps with data packet sizes
536bytes, 1072bytes and 2144bytes, at same datarate &
with 256bytes data packet size we received less throughput.
Second highest throughput we have received at 20Mbps with
all data packet sizes; amongst all these data packet sizes we
have received highest throughput with 256byte data packet
size.At datarates 30,40,50,60,70,80,90 & 100Mbps we have
received same level of throughput for all data packet sizes.
Throughput to the server with 140 number of clients gives10.	
maximum number of throughput with smaller data packet
size i.e.256bytes at all datarates and for other data packet
ISSN : 2347 - 8446 (Online)
ISSN : 2347 - 9817 (Print)
www.ijarcst.com
International Journal of Advanced Research in
Computer Science & Technology (IJARCST 2014)
© All Rights Reserved, IJARCST 201495
Vol. 2, Issue 2, Ver. 1 (April - June 2014)
sizes i.e. 536bytes, 1072bytes & 2144bytes it gives lower but
same level of throughput at 50, 60, 70, 80, 90 & 100Mbps;
at 30 & 40Mbps it gives same level of throughput while at
20Mbps it gives maximum throughput with all the mentioned
data packet sizes.
Throughput to the server with 150 number of clients gives11.	
exactly same level of throughput for all data packet sizes at
70,80,90 & 100Mbps; maximum throughput with all data
packet sizes is recorded at 10Mbps.
Fig. 6: Throughput To server for 150 number of clients on a
server
V. Conclusions
By analysing the throughput values of the simulation experiment
we came to know that
Maximum throughput we have received with smaller data packet
size. Maximum throughput from the server for our experiment
amongst all four data packet size is recorded with 256byte data
packet and minimum throughput from the server is recorded
with 536byte data packet size while maximum throughput to the
server is recorded with 2144byte data packet size and minimum
throughput to the server is recorded with 536byte data packet
size.
VI. Acknowledgement
WearethankfultoallthestaffofSchoolofComputationalSciences,
SRTMU, Nanded for providing us the necessary guidance and
facility to carry out present research.
References
[1]	 Ai-lianCHENG,YUNPAN,Xiao-langYAN,Ruo-hongHuan,
“A general commu nication performance evaluation model
based on routing path decomposition”. Journal of Zhejiang
University-science c (Computer & Electronics) ISSN 1869-
1951.
[2]	 Plamenka Borovska, Ognian Nakov, Desislava Ivanova,
Kamen Ivanov, Georgi Georgiev, “Communication
performance evaluation and analysis of a mesh system area
network for high performance computers”. ISSN:1790-2769
& ISBN:978-960-474-188-5.
[3]	 Fan Cen, Tao Xing, Ke-Tong Wu., “Real-time performance
evaluationoflinetopologyswitchedEthernet,”.International
Journal ofAutomation and computing, 05 (4), October 2008,
376-380.
[4]	 HON-HING WAN & YU-KWOK, “High data arte video
transmissionusingparallelTCPconnections:approachesand
performance evaluation,” The Journal of Supercomputing,
35, 119-139, 2006.
[5]	 Esma Yildirim – Tevfik Kosar, “End-to-end data flow
parallelism for throughput optimization in High Speed
Networks,” J Grid Computing (2012) 10:395-418.
[6]	 Mohd Nazri, Ismail and Abdullah Mohd Zin, “Development
of simulation model in heterogeneous network environment:
comparing the accuracy of simulation model for data
transfer measurement over wide area network,” Information
Technology Journal 7 (6): 897-903, 2008.
[7]	 AndrasVarga,RudolfHornig,“AnoverviewoftheOMNeT++
simulation environment,” SIMUTools, March 03-07, 2008,
Marseille, France. ISBN:978-963-9799-20-2.
[8]	 Andras Varga and OpenSim Ltd. OMNeT++ User manual
version 4.2.
[9]	 INET Framework for OMNeT++ Manual
Author’s Profile
Dr. Kalyankar N. V.: Principal, Yeshwant
Mahavidyalaya, Nanded. Author is recognised
Ph.D. guide of SRTMU, Nanded in the subject
of Computer Science and Physics. He is having
65 Research Paper publications in various
international journals along with 2 books. He
haschairednumberofInternationalandnational
conferences during his 33 years of services. His
areaofinterestisNetworking,Cybersecurity&ImageProcessing.
He is Fellow and member of various International and National
Research organizations.
Dr. Khamitkar S. D.: Reader & Director, School
of Computational Sciences, Swami Ramanand
Teerth Marathwada University, Nanded. Author
is Renowned Ph.D. guide in the subject of
Computer Science. He is having 14 years of PG
teaching experience and has 12 international
Research publications under his belt. Currently
he is guiding 11 Research Scholars for Ph.
D. Programme. His area of interest is Networking & Image
Processing.AuthorhaschairedvariousnationalandInternational
conferencesandalsoResearchandacademiccommitteesatSRTM
University, Nanded.
Mr. Dhobale J. V.: Assistant Professor, Shri.
DhonduBaliramPawarCollegeofManagement
& Research Scholar Swami Ramanad Teerth
Marathawada University Nanded. Author has
completed his M.Sc. (Computer Applications)
in 2001 and started his carrier as Lecturer. In
2010 he has completed his MBA degree with
Marketing Specialization. He is having 13 years
of UG & PG teaching experience. During his tenure of services
he has published 12 national and international Research papers
in the area of Computers science and Management. Currently he
is pursuing Ph. D. degree from SRTM University, Nanded. His
area of interest is Computer Networks.

Weitere ähnliche Inhalte

Was ist angesagt?

On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...CSCJournals
 
TEST-COST-SENSITIVE CONVOLUTIONAL NEURAL NETWORKS WITH EXPERT BRANCHES
TEST-COST-SENSITIVE CONVOLUTIONAL NEURAL NETWORKS WITH EXPERT BRANCHESTEST-COST-SENSITIVE CONVOLUTIONAL NEURAL NETWORKS WITH EXPERT BRANCHES
TEST-COST-SENSITIVE CONVOLUTIONAL NEURAL NETWORKS WITH EXPERT BRANCHESsipij
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsCSCJournals
 
Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual Network
Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual NetworkPerformance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual Network
Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual NetworkjournalBEEI
 
Multistage interconnection networks a transition to optical
Multistage interconnection networks a transition to opticalMultistage interconnection networks a transition to optical
Multistage interconnection networks a transition to opticaleSAT Publishing House
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridiaemedu
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...IJCNCJournal
 
Selective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device CommunicationSelective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device CommunicationTELKOMNIKA JOURNAL
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
 
Interplay of Communication and Computation Energy Consumption for Low Power S...
Interplay of Communication and Computation Energy Consumption for Low Power S...Interplay of Communication and Computation Energy Consumption for Low Power S...
Interplay of Communication and Computation Energy Consumption for Low Power S...ijasuc
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
 
Review on Green Networking Solutions
Review on Green Networking SolutionsReview on Green Networking Solutions
Review on Green Networking Solutionsiosrjce
 
Cu3210381040
Cu3210381040Cu3210381040
Cu3210381040IJMER
 

Was ist angesagt? (18)

On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
 
TEST-COST-SENSITIVE CONVOLUTIONAL NEURAL NETWORKS WITH EXPERT BRANCHES
TEST-COST-SENSITIVE CONVOLUTIONAL NEURAL NETWORKS WITH EXPERT BRANCHESTEST-COST-SENSITIVE CONVOLUTIONAL NEURAL NETWORKS WITH EXPERT BRANCHES
TEST-COST-SENSITIVE CONVOLUTIONAL NEURAL NETWORKS WITH EXPERT BRANCHES
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNs
 
Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual Network
Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual NetworkPerformance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual Network
Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual Network
 
3
33
3
 
Multistage interconnection networks a transition to optical
Multistage interconnection networks a transition to opticalMultistage interconnection networks a transition to optical
Multistage interconnection networks a transition to optical
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using grid
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
 
Selective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device CommunicationSelective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device Communication
 
I1102014953
I1102014953I1102014953
I1102014953
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
 
H0261047055
H0261047055H0261047055
H0261047055
 
Interplay of Communication and Computation Energy Consumption for Low Power S...
Interplay of Communication and Computation Energy Consumption for Low Power S...Interplay of Communication and Computation Energy Consumption for Low Power S...
Interplay of Communication and Computation Energy Consumption for Low Power S...
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
Review on Green Networking Solutions
Review on Green Networking SolutionsReview on Green Networking Solutions
Review on Green Networking Solutions
 
Cu3210381040
Cu3210381040Cu3210381040
Cu3210381040
 

Ähnlich wie Computer Network Performance Evaluation Based on Different Data Packet Size Using OMNeT++ Simulation Environment

Performance Evaluation of Ipv4, Ipv6 Migration Techniques
Performance Evaluation of Ipv4, Ipv6 Migration TechniquesPerformance Evaluation of Ipv4, Ipv6 Migration Techniques
Performance Evaluation of Ipv4, Ipv6 Migration TechniquesIOSR Journals
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2hanums1
 
Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...Maria Stylianou
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsJigisha Aryya
 
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...ijceronline
 
AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...
AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...
AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...IAEME Publication
 
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...IJECEIAES
 
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...IAEME Publication
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachIJERA Editor
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachIJERA Editor
 
Comprehensive Performance Evaluation on Multiplication of Matrices using MPI
Comprehensive Performance Evaluation on Multiplication of Matrices using MPIComprehensive Performance Evaluation on Multiplication of Matrices using MPI
Comprehensive Performance Evaluation on Multiplication of Matrices using MPIijtsrd
 
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...IJECEIAES
 

Ähnlich wie Computer Network Performance Evaluation Based on Different Data Packet Size Using OMNeT++ Simulation Environment (20)

Performance Evaluation of Ipv4, Ipv6 Migration Techniques
Performance Evaluation of Ipv4, Ipv6 Migration TechniquesPerformance Evaluation of Ipv4, Ipv6 Migration Techniques
Performance Evaluation of Ipv4, Ipv6 Migration Techniques
 
N017147679
N017147679N017147679
N017147679
 
G04844450
G04844450G04844450
G04844450
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
 
Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systems
 
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
 
H04845157
H04845157H04845157
H04845157
 
AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...
AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...
AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...
 
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
 
A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...
A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...
A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...
 
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
 
Comprehensive Performance Evaluation on Multiplication of Matrices using MPI
Comprehensive Performance Evaluation on Multiplication of Matrices using MPIComprehensive Performance Evaluation on Multiplication of Matrices using MPI
Comprehensive Performance Evaluation on Multiplication of Matrices using MPI
 
Generator of pseudorandom sequences
Generator of pseudorandom sequences Generator of pseudorandom sequences
Generator of pseudorandom sequences
 
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
 

Mehr von Jaipal Dhobale

Research Paper Network-Driven Monitoring
Research Paper Network-Driven MonitoringResearch Paper Network-Driven Monitoring
Research Paper Network-Driven MonitoringJaipal Dhobale
 
Unit no 08_dm_insights on challenges in management of disaster
Unit no 08_dm_insights on challenges in management of disasterUnit no 08_dm_insights on challenges in management of disaster
Unit no 08_dm_insights on challenges in management of disasterJaipal Dhobale
 
Unit no 07_dm_ascertaining roles
Unit no 07_dm_ascertaining rolesUnit no 07_dm_ascertaining roles
Unit no 07_dm_ascertaining rolesJaipal Dhobale
 
Unit no 05 disaster response
Unit no 05 disaster responseUnit no 05 disaster response
Unit no 05 disaster responseJaipal Dhobale
 
Disaster management and planning
Disaster management and planningDisaster management and planning
Disaster management and planningJaipal Dhobale
 
Unit no 14_the written research report
Unit no 14_the written research reportUnit no 14_the written research report
Unit no 14_the written research reportJaipal Dhobale
 
Unit no 09_developing sampling plan
Unit no 09_developing sampling planUnit no 09_developing sampling plan
Unit no 09_developing sampling planJaipal Dhobale
 
Unit no 08_designing questionnaire
Unit no 08_designing questionnaireUnit no 08_designing questionnaire
Unit no 08_designing questionnaireJaipal Dhobale
 
Unit no 07_measurement of scaling
Unit no 07_measurement of scalingUnit no 07_measurement of scaling
Unit no 07_measurement of scalingJaipal Dhobale
 
Unit no 06_collecting primary data by communication
Unit no 06_collecting primary data by communicationUnit no 06_collecting primary data by communication
Unit no 06_collecting primary data by communicationJaipal Dhobale
 
Unit no 05_collecting primary data by observation
Unit no 05_collecting primary data by observationUnit no 05_collecting primary data by observation
Unit no 05_collecting primary data by observationJaipal Dhobale
 
Unit no 04_collecting secondary data from inside & outside the organization
Unit no 04_collecting secondary data from inside & outside the organizationUnit no 04_collecting secondary data from inside & outside the organization
Unit no 04_collecting secondary data from inside & outside the organizationJaipal Dhobale
 
Unit no 03_types of research design
Unit no 03_types of research designUnit no 03_types of research design
Unit no 03_types of research designJaipal Dhobale
 
Unit no 02_research design formulation
Unit no 02_research design formulationUnit no 02_research design formulation
Unit no 02_research design formulationJaipal Dhobale
 
Unit no 01_introduction to research
Unit no 01_introduction to researchUnit no 01_introduction to research
Unit no 01_introduction to researchJaipal Dhobale
 
Unit no 05_dm_disaster recovery
Unit no 05_dm_disaster recoveryUnit no 05_dm_disaster recovery
Unit no 05_dm_disaster recoveryJaipal Dhobale
 
Unit no 03 disaster preparedness
Unit no 03 disaster preparednessUnit no 03 disaster preparedness
Unit no 03 disaster preparednessJaipal Dhobale
 
Unit no 02 dm_disaster mitigation
Unit no 02 dm_disaster mitigationUnit no 02 dm_disaster mitigation
Unit no 02 dm_disaster mitigationJaipal Dhobale
 

Mehr von Jaipal Dhobale (20)

Research Paper Network-Driven Monitoring
Research Paper Network-Driven MonitoringResearch Paper Network-Driven Monitoring
Research Paper Network-Driven Monitoring
 
Unit no 08_dm_insights on challenges in management of disaster
Unit no 08_dm_insights on challenges in management of disasterUnit no 08_dm_insights on challenges in management of disaster
Unit no 08_dm_insights on challenges in management of disaster
 
Unit no 07_dm_ascertaining roles
Unit no 07_dm_ascertaining rolesUnit no 07_dm_ascertaining roles
Unit no 07_dm_ascertaining roles
 
Unit no 05 disaster response
Unit no 05 disaster responseUnit no 05 disaster response
Unit no 05 disaster response
 
Disaster management and planning
Disaster management and planningDisaster management and planning
Disaster management and planning
 
Unit no 14_the written research report
Unit no 14_the written research reportUnit no 14_the written research report
Unit no 14_the written research report
 
Unit no 09_developing sampling plan
Unit no 09_developing sampling planUnit no 09_developing sampling plan
Unit no 09_developing sampling plan
 
Unit no 08_designing questionnaire
Unit no 08_designing questionnaireUnit no 08_designing questionnaire
Unit no 08_designing questionnaire
 
Unit no 07_measurement of scaling
Unit no 07_measurement of scalingUnit no 07_measurement of scaling
Unit no 07_measurement of scaling
 
Unit no 06_collecting primary data by communication
Unit no 06_collecting primary data by communicationUnit no 06_collecting primary data by communication
Unit no 06_collecting primary data by communication
 
Unit no 05_collecting primary data by observation
Unit no 05_collecting primary data by observationUnit no 05_collecting primary data by observation
Unit no 05_collecting primary data by observation
 
Unit no 04_collecting secondary data from inside & outside the organization
Unit no 04_collecting secondary data from inside & outside the organizationUnit no 04_collecting secondary data from inside & outside the organization
Unit no 04_collecting secondary data from inside & outside the organization
 
Unit no 03_types of research design
Unit no 03_types of research designUnit no 03_types of research design
Unit no 03_types of research design
 
Unit no 02_research design formulation
Unit no 02_research design formulationUnit no 02_research design formulation
Unit no 02_research design formulation
 
Unit no 01_introduction to research
Unit no 01_introduction to researchUnit no 01_introduction to research
Unit no 01_introduction to research
 
Unit no 05_dm_disaster recovery
Unit no 05_dm_disaster recoveryUnit no 05_dm_disaster recovery
Unit no 05_dm_disaster recovery
 
Unit no 03 disaster preparedness
Unit no 03 disaster preparednessUnit no 03 disaster preparedness
Unit no 03 disaster preparedness
 
Unit no 02 dm_disaster mitigation
Unit no 02 dm_disaster mitigationUnit no 02 dm_disaster mitigation
Unit no 02 dm_disaster mitigation
 
Dbms basics 02
Dbms basics 02Dbms basics 02
Dbms basics 02
 
Disaster management
Disaster managementDisaster management
Disaster management
 

Kürzlich hochgeladen

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Kürzlich hochgeladen (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Computer Network Performance Evaluation Based on Different Data Packet Size Using OMNeT++ Simulation Environment

  • 1. ISSN : 2347 - 8446 (Online) ISSN : 2347 - 9817 (Print) www.ijarcst.com International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014) © All Rights Reserved, IJARCST 201491 Vol. 2, Issue 2, Ver. 1 (April - June 2014) Computer Network Performance Evaluation Based on Different Data Packet Size Using OMNeT++ Simulation Environment I Mr. Dhobale J V, II Dr. Kalyankar N V, III Dr. Khamitkar S D I Assist. Professor, Shri. D B P C O M, Manur, Nashik (MH) II Principal,Yeshwant College Nanded (MH) III Reader & Director, School of Computational Sciences, SRTMU, Nanded I. Introduction The performance of the Network configurations is measured using simulation environment. We preferred OMNeT++ Version 4.2 ( Objective Modular Network Testbed ) object oriented modular discrete event network simulation framework with INET framework for OMNeT++ with 2.2.0-ae90ecd release. Development of OMNeT++ is started in 1992, since then many people contributed to OMNeT++ with several models. It is primarily used to simulate the communication networks and other distributed systems. It is used for academic as well as Industrial research purposes. OMNeT++ runs on Windows, Mac & Linux Operating Systems. Here are the features of OMNeT++ which makes it different from other simulation environment: OMNeT++ is designed to support network simulation on a1. large scale. Modular structure.2. The design of NED (Network Description).3. GUI Interface with Graphical Editor.4. Separation of Model and Experiments.5. Simple Module Programming Model.6. Design of the Simulation Library.7. Parallel Simulation Support.8. Real-Time Simulation, Network Emulation.9. Animation and Tracing Facility.10. Visualization of Dynamic Behaviour.11. Enriched Result Analysis Mechanism12. INET consists of several simulation application models. We use NclientsnetworkapplicationwithbasicHTTPnetworksetupfrom INET to carry out our experiments. It consists of client server environment with variable number of clients. Performance evaluation parameters are set through initialization (INI)andNetworkDescription(NED)filesandinourexperiments those files are basicHTTP.ini and Nclients.ned and result of the experiment is collected through answer (ANF) file. We setup the experiment to evaluate the network performance by changing the Data Packet Sizes. To investigate the problem How Data Packet size affecting the Network Performance? We use **.tcp.mss (Maximum Segment Size) parameter from basicHTTP.ini file.We took reading by changing Data Packet Size to 256bytes, 536bytes, 1072bytes & 2144Bytes and collect the readings. We evaluated Network performance in terms of ServerThroughput.Throughput from the server is evaluated through ThruputFrom module while throughput to the server is evaluated through ThruputTo module. Throughput is number of bits transferred per second from server to the client or vice versa. II. Related Work Number of Researchers has contributed their efforts for the performance evaluation of wired as well wireless Computer Networks. These research papers evaluated performance on the basis of different parameters and methodologies. Here we are considering contribution papers in the area of wired networks. Research Paper entitled “A general communication performance evaluation model based on routing path decomposition” shows that High-level modelling and simulation methods are necessary for the evaluations of various options in Network on Chip (NoC) architectures, in order to meet the stringent requirements of the increasing complicated future MPSoCs (Multi-processor system- on-chips). An analytical solution is proposed and a performance model based on the routing path decomposition and the traditional queuing system in presented in detail. The analytical model features comprehensive and elaborate performance estimation for a variety of networks under different configurations. Research validate the reliability of the proposed model through extensive experiments and demonstrate its usefulness in performance prediction, including computation of the overall packet latency for the network and the latency distribution in different channels. One such paper “Real-time Performance Evaluation of Line TopologySwitchedEthernet”isthepaperpublishedinInternational Journal of Automation and Computing” in October 2008 by Fan Cen,Tao Xing & Ke-TongWu present new procedure to calculate the end to end delay in switched Ethernet using network calculus. The researchers applied this procedure to assess the real-time performance of line topology switched Ethernet. The outcome of the paper shows that the results are matching with the result of simulations and the maximum end to end delay in the network linearlyincreaseswiththepacketlengthandswitchnumber.These are the key factors impacting the delay. EsmaYildirim –Tevfik Kosar in their Research Paper titled “End- to-End Data-Flow Parallelism for Throughput Optimization in High-Speed Networks” published in Journal of Grid Computing (2012) 10:395-418 proved that the end-to-end transfer throughput in high-speed networks could be improved dramatically by using data parallelism that takes into account the end-system capacities such as the cpu load, disk access speed and NIC capacity over the Abstract with this research paper we are investigating the effect of different Data Packet Sizes on the Computer network Performance. The performance of the Network is evaluated on the basis of Throughput. To investigate the problem we are using OMNeT++ network simulation framework and Nclient application module from INET framework. We have considered four different types of data packet sizes i.e 256, 536, 1072 & 2144bytes for our experiments. The performance of the Network is measured in terms of throughput. Keywords OMNeT++, NClient, INET, Network Performance, Throughput, Data Packet Size, Datarate, Simulation, Server, Clients.
  • 2. ISSN : 2347 - 8446 (Online) ISSN : 2347 - 9817 (Print) www.ijarcst.com International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014) © 2014, IJARCST All Rights Reserved 92 Vol. 2, Issue 2, Ver. 1 (April - June 2014) nodes. The model presented in this study provides the parallelism parameters such as the optimal number of streams per stripe, number of stripe per node and number of nodes dynamically. The experimental results conducted using various settings indicate the accuracy of the model and close-to maximal throughput values. The model also gives very good results with immediate sampling especially for large file sizes. III. Research Methodology As mentioned in the Introduction section we are using Simulation environment with OMNeT++ framework to carry out our experiment. We have used Nclient application form INET to simulate our research. There are three basic setup provided under Nclients in INET those TelenetApp, File transfer and basicHTTP module. Out of these we choose basicHTTP module with TCPBasicCliApp and TCPGenericSrvApp modules. TelenetApp generates very low traffic. Fig. 1: Nclients.Ned: Client Server experimental setup configuration To measure the performance of the present network we use thruputMeter modules. This module is placed between TCP and TCPApp layer. We required two modules to collect result for incoming and outgoing traffic to the server. Our client and server are the StandardHost modules provided in the INET. We have modified the StandardHost with thruputMeter. Modified structure ofstandardHostalongwiththruputMeterisshowinfigure2below. The results of the experiments are collected in excel file from the default .ans file. .ans file in OMNeT++ gives two types of results vector and scalar.Vector results are recording of time series data and scalar results are supposed to record a single value per simulation run. We have considered scalar result as avg. thruput for our analysis purpose, Throughput of both thruputMeter i.e. thruputFrom & thruputTo related to the server. Fig. 2: StandardHost with thruputMeter module between tcp & tcpApp We collect the readings of the simulation experiment by two ways: We Kept datarate constant and changed the number of clients1. on the server and average throughput scalar values are collected for respective experiments. For specific setup on a server we change the datarate and2. collect the scalar average throughput in excel files. For our experiment we kept datarate variation between 10Mbps to 100Mbps with the interval of 10Mbps and clients variance from 10 clients per server to 150 clients per server with the interval of 10 clients. We took these reading with four packet sizes i.e. at 256bytes, 536bytes, 1072bytes and 2144bytes with delay= 0.1us unless and until mentioned. We have run each simulation experiment for n=500s (simulation seconds). We collected the throughput results by running the simulation experiment 10 (datarate variance from 10Mbps to 100Mbps with the interval of 10Mbps) ×15 (no of client variance from 10 clients to 150 clients with the interval of 10) × 4 (packet sizes i.e. 256, 536, 1072 & 2144 bytes) =600 times. IV. Result Analysis Throughput values of the simulation experiment is collected in excel file. We have collected results at 10, 20, 30, 40, 50, 60, 70, 80, 90, 100Mbps with 10, 20, 30….…130, 140, 150 clients per server. These results are collected for four packet sizes i.e. 256, 536, 1072 & 2144 byte. Our result shows that throughput values from the server and to the server for four data packet sizes are minimum at 10Mbps with 10 number of clients per server and maximum are at 10Mbps for packet sizes 536, 1072 & 2144. For packet size 256 both throughput from the serve and throughput to the server are maximum at 100Mbps with 150 clients per server and at 20Mbps with 130 clients per server respectively. A. With Constant Datarate We analyze the trend of throughput by keeping datarate constant and changing the number of clients from 10 number of clients to the 150 clients per server for all four data packet sizes.
  • 3. ISSN : 2347 - 8446 (Online) ISSN : 2347 - 9817 (Print) www.ijarcst.com International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014) © All Rights Reserved, IJARCST 201493 Vol. 2, Issue 2, Ver. 1 (April - June 2014) Fig 3: Throughput From server at 10Mbps By analysing the experimental readings for throughput From the server we came to know that average throughput from the server is increases with increase in the number of clients from 10 number of clients till 110 number of clients per server for all the data packet sizes, it falls with 120 number of clients on a server for all data packet sizes except data packet size with 256bytes. Throughput from the server for all the data packet sizes is maximum with 130 number of clients amongst the interval of clients ranging from 10 number of clients to 150 clients per server on the server. Throughput readings with 140 number of clients decrease from the value with 130 number of clients and it increases with 150 number of clients in compare to throughput from the sever with 140numberofclients.Thisthroughputpatterissameatalldatarate intervals i.e. form 10Mbps to 100Mbps. Fig. 4: Throughput To the server at 100Mbps When we observe the throughput to the server from 10 number of clients to 150 number of clients at specific datarate from 10Mbps to 100Mbps with the interval of 10Mbps we get same level of output trend for all the data packet sizes at each datarate interval. Throughput values to the server are increasing with increase in the number of clients till 110 number of clients, throughput values to the server are decreases at 120 number for all the data packet sizes except 256byte packet size it shows increase in the trend. Throughput values to the server with 130 number of clients is maximum amongst all client intervals from 10 number of clients to 150 clients. Throughput value at 140 clients decreases from 130 clients and it increases slightly from 140 clients to 150 clients. Throughput from the server and throughput to the server at specific datarate with variations in number of clients per server gives maximum values with smaller datapacket size i.e. 256bytes, amongst 256bytes, 536bytes, 1072bytes & 2144 bytes. B. With Constant Number of Clients Now we analyse the trend of throughput from the Server by keeping number of clients constant and changing the datarate from 10Mbps to 100Mbps. Fig. 5: Throughput From the server for 10 No of Clients on a server Observations of the experiments shows that I. The throughput from the server with constant Number of clients 10, throughput from the server is increasing with increase in the datarate from 10Mbps to 100Mbps for all the four data packet sizes. II. For Number of clients 20 on the server the throughput form the server shows that at all the datarate the throughput from the sever is constant but it is higher with smaller packet size i.e. 256bytes and for remaining other data packet sizes it is same i.e.536bytes, 1072bytes and 2144bytes. III. Throughput from the server with number of clients 30 on a server gives same level of throughput from the server at all the datarates but gives lower throughput with smaller data packet size i.e. 256bytes and for remaining data packet sizes i.e. 536bytes, 1072bytes & 2144bytes it is same but bit higher than data packet size 256bytes. IV. Throughput from server with 40 number of clients on server gives throughput which is constant for all the datarates from 10Mbps to 100Mbps & for all the data packet sizes but gives higher throughput at all the datarates with smaller data packet sizes i.e.256bytes.For other data packet sizes i.e. 536bytes, 1072bytes and 2144bytes gives lower than smaller data packet size and same for all other data packet sizes. V. Throughput from the server for number of clients 50 on a server shows same level of throughput at all the datarates but havingvariationswithrespecttodatapacketsizes.Forsmaller data packet sizes i.e. 256bytes it gives lowest throughput, for data packet size 536bytes it gives highest throughput and for remaining two data packet sizes i.e. 1072bytes and 2144bytes it gives same level of throughput which is higher than throughput with 256byte packet sizes and smaller than throughput with 536byte data packet size. VI. Throughput form the server with number of clients 60 & 70 on a server gives same level of throughput at all the datarate andgivesmaximumthroughputwithsmallerdatapacketsize i.e.256btes while for other data packet sizes i.e.536bytes, 1072bytes and 2144bytes it gives same level of throughput from the server and which is much lower than the value with smaller data packet size. VII. Throughput from the server with number of clients 80 & 90 on a server gives similar type of throughput form the server pattern at all the datarates and for different data packet size
  • 4. ISSN : 2347 - 8446 (Online) ISSN : 2347 - 9817 (Print) www.ijarcst.com International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014) © 2014, IJARCST All Rights Reserved 94 Vol. 2, Issue 2, Ver. 1 (April - June 2014) it gives lowest throughput with smaller data packet size i.e. 256bytes and for other data packet sizes i.e.536bytes, 1072byytes and 2144bytes it gives same level of throughput whichhigherthan thevaluerecordedat256bytesdatapacket size. VIII. Throughput from server with number of clients 100 on a server gives highest throughput from the serve at 10Mbps and for other datarate intervals it gives lower value than 10Mbps which is similar for the data packet sizes 536Mbps, 1072Mbps & 2144Mbps and for data packet size 256Mbps it gives lower values at all datarate intervals in compare to other data packet sizes. IX. Throughput form the server with 110 number of clients on a server gives lower throughput at 10Mbps for all the data packet sizes, among the tested data packet sizes it gives lowest throughput with data packet size 256bytes. Throughput at 20Mbps, 30Mbps and 40Mbps is similar for all the data packet sizes. Throughput at 50Mbps is higher than throughput at 40Mbps for all data packet sizes except 256bytes packet size, it remain same like previous throughput with same data packet size. Throughput from server at datarate 60Mbps, 70Mbps, 80Mbps, 90Mbps & 100Mbps it shows similar throughput pattern for all the data packet sizes; amongst data packet sizes, it gives maximum throughput with smaller data packet size i.e.256Bytes. X. Throughput with 120 number of clients on a server is giving same level of throughput at all the datarate and for all the data packet sizes; amongst the tested four data packets sizes, maximum throughput we received with smaller data packet size i.e.256bytes, for other remaining data packet sizes it gives same level of throughput. XI. Throughput with 130 number of clients on a server is recorded maximum at 10Mbps and minimum at 20Mbps it remain at same level at other data rate which is higher than 20Mbps and lower than 10Mbps this is for all data packet sizes; amongst all data packet sizes maximum throughput is recorded at smaller data packet size i.e.256byte. XII. Throughput from the server with number of client 140 on a server at 10Mbps to 40Mbps is similar while at 50Mbps to 100Mbps is similar and slightly higher than throughput at 40Mbps; this throughput is same for all data packet sizes except 256bytes data packet size which gives lower throughput than other data packet sizes. XIII. Throughput from the server with number of clients 150 on a server gives similar throughput patter at 30, 40, 50, 60, 70, 80, 90 & 100Mbps for all four data packet sizes; we havereceivedmaximumthroughputwithsmallerdatapacket size i.e. 256Bytes and minimum throughput with 536byte data packet size for other data packet size i.e.1072bytes and 2144byteitgivessamelevelofthroughputatabovedatarates. Throughput at 10Mbps for data packet sizes gives minimum throughput with smaller data packet size i.e.256bytes and maximum throughput with 1072bytes and 2144bytes while at 20Mbps throughput is lower with smaller datapacket size while maximum throughput is with 536byte data packet size. By analysing the experimental readings for throughput to the server we came to know that throughput to the server is showing following type of behaviour The throughput to the server is increasing steadily with1. increase in datarate for the 10 number of clients on a server, it gives same type of throughput pattern like throughput from the server with 10 number of clients. Throughput to the server with 20number of clients on server2. gives same level of throughput at all data rates for all the data packet sizes; minimum throughput is recorded with smaller data packet sizes i.e. 256bytes while for other data packet sizes i.e.536bytes, 1072bytes and 2144bytes it gives maximum throughput. Throughput to the server with 30, 40, 70, 80 & 90 number3. of clients on a server gives same level of throughput at all data rates for all the data packet sizes, recorded maximum throughput with smaller data packet size i.e.256bytes and minimum throughput is recorded with all other data packet sizes i.e. 536bytes,1072bytes & 2144bytes. Throughputtotheserverwith50numberofclientsonaserver4. gives same level of throughput pattern at all datarate intervals with all four types of data packet sizes; recording maximum throughput to the server with both 1072bytes and 2144bytes data packet sizes while minimum throughput recorded is at smaller data packet size i.e with 256bytes. Throughput to the server with 60 number of clients gives5. exactly same throughput level of patters like throughput pattern with 20number of clients. Throughput to the server with 100 number of clients on a6. server gives maximum throughput to the server at 10Mbps for all data packet sizes. Amongst all these data packet sizes it gives maximum throughput to the server with smaller data packet size i.e. 256bytres at all data rates and for remaining data packet sizes i.e. 536bytes, 1072bytes and 2144bytes it gives same level of throughput which is smaller than the throughput with 256bytes data packet size at 20Mbps to 100Mbps datarates. Throughput to the server with 110 number of clients at7. 10Mbps, 20Mbps, 30Mbps & 40Mbps is giving same level ofthroughputwithallfourtypesofdatapacketsizes;amongst these data packet size minimum throughput is recorded with smallerdatapacketsizei.e.256bytesandforotherdatapacket sizes i.e. 536bytes, 1072bytes and 2144bytes it gives same level of throughput to the server. Throughput to the server at 50, 60, 70, 80, 90 & 100Mbps gives same level of throughput to the server for all data packet sizes except 256bytes at 50Mbps data rate, which gives same level of throughput like at 40Mbps. Throughput to the server with 120 number of clients gives8. same level of throughput to the server at all data rates i.e. from 10Mbps to 100Mbps for all data packet sizes; amongst these data packet sizes it gives maximum throughput with smaller data packet size i.e. 256bytes and for all other data packet sizes it gives same level of throughput. Throughput to the server with 130 numbers of clients gives9. maximum throughput at 10Mbps with data packet sizes 536bytes, 1072bytes and 2144bytes, at same datarate & with 256bytes data packet size we received less throughput. Second highest throughput we have received at 20Mbps with all data packet sizes; amongst all these data packet sizes we have received highest throughput with 256byte data packet size.At datarates 30,40,50,60,70,80,90 & 100Mbps we have received same level of throughput for all data packet sizes. Throughput to the server with 140 number of clients gives10. maximum number of throughput with smaller data packet size i.e.256bytes at all datarates and for other data packet
  • 5. ISSN : 2347 - 8446 (Online) ISSN : 2347 - 9817 (Print) www.ijarcst.com International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014) © All Rights Reserved, IJARCST 201495 Vol. 2, Issue 2, Ver. 1 (April - June 2014) sizes i.e. 536bytes, 1072bytes & 2144bytes it gives lower but same level of throughput at 50, 60, 70, 80, 90 & 100Mbps; at 30 & 40Mbps it gives same level of throughput while at 20Mbps it gives maximum throughput with all the mentioned data packet sizes. Throughput to the server with 150 number of clients gives11. exactly same level of throughput for all data packet sizes at 70,80,90 & 100Mbps; maximum throughput with all data packet sizes is recorded at 10Mbps. Fig. 6: Throughput To server for 150 number of clients on a server V. Conclusions By analysing the throughput values of the simulation experiment we came to know that Maximum throughput we have received with smaller data packet size. Maximum throughput from the server for our experiment amongst all four data packet size is recorded with 256byte data packet and minimum throughput from the server is recorded with 536byte data packet size while maximum throughput to the server is recorded with 2144byte data packet size and minimum throughput to the server is recorded with 536byte data packet size. VI. Acknowledgement WearethankfultoallthestaffofSchoolofComputationalSciences, SRTMU, Nanded for providing us the necessary guidance and facility to carry out present research. References [1] Ai-lianCHENG,YUNPAN,Xiao-langYAN,Ruo-hongHuan, “A general commu nication performance evaluation model based on routing path decomposition”. Journal of Zhejiang University-science c (Computer & Electronics) ISSN 1869- 1951. [2] Plamenka Borovska, Ognian Nakov, Desislava Ivanova, Kamen Ivanov, Georgi Georgiev, “Communication performance evaluation and analysis of a mesh system area network for high performance computers”. ISSN:1790-2769 & ISBN:978-960-474-188-5. [3] Fan Cen, Tao Xing, Ke-Tong Wu., “Real-time performance evaluationoflinetopologyswitchedEthernet,”.International Journal ofAutomation and computing, 05 (4), October 2008, 376-380. [4] HON-HING WAN & YU-KWOK, “High data arte video transmissionusingparallelTCPconnections:approachesand performance evaluation,” The Journal of Supercomputing, 35, 119-139, 2006. [5] Esma Yildirim – Tevfik Kosar, “End-to-end data flow parallelism for throughput optimization in High Speed Networks,” J Grid Computing (2012) 10:395-418. [6] Mohd Nazri, Ismail and Abdullah Mohd Zin, “Development of simulation model in heterogeneous network environment: comparing the accuracy of simulation model for data transfer measurement over wide area network,” Information Technology Journal 7 (6): 897-903, 2008. [7] AndrasVarga,RudolfHornig,“AnoverviewoftheOMNeT++ simulation environment,” SIMUTools, March 03-07, 2008, Marseille, France. ISBN:978-963-9799-20-2. [8] Andras Varga and OpenSim Ltd. OMNeT++ User manual version 4.2. [9] INET Framework for OMNeT++ Manual Author’s Profile Dr. Kalyankar N. V.: Principal, Yeshwant Mahavidyalaya, Nanded. Author is recognised Ph.D. guide of SRTMU, Nanded in the subject of Computer Science and Physics. He is having 65 Research Paper publications in various international journals along with 2 books. He haschairednumberofInternationalandnational conferences during his 33 years of services. His areaofinterestisNetworking,Cybersecurity&ImageProcessing. He is Fellow and member of various International and National Research organizations. Dr. Khamitkar S. D.: Reader & Director, School of Computational Sciences, Swami Ramanand Teerth Marathwada University, Nanded. Author is Renowned Ph.D. guide in the subject of Computer Science. He is having 14 years of PG teaching experience and has 12 international Research publications under his belt. Currently he is guiding 11 Research Scholars for Ph. D. Programme. His area of interest is Networking & Image Processing.AuthorhaschairedvariousnationalandInternational conferencesandalsoResearchandacademiccommitteesatSRTM University, Nanded. Mr. Dhobale J. V.: Assistant Professor, Shri. DhonduBaliramPawarCollegeofManagement & Research Scholar Swami Ramanad Teerth Marathawada University Nanded. Author has completed his M.Sc. (Computer Applications) in 2001 and started his carrier as Lecturer. In 2010 he has completed his MBA degree with Marketing Specialization. He is having 13 years of UG & PG teaching experience. During his tenure of services he has published 12 national and international Research papers in the area of Computers science and Management. Currently he is pursuing Ph. D. degree from SRTM University, Nanded. His area of interest is Computer Networks.