Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Bahria University, Islamabad Campus

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

Bahria University, Islamabad Campus

Department of Computer Sciences


Midterm Examination
Class/Section: MS (Telecom)
(Fall 2020 Semester)
Paper Type: Descriptive

Course: Network Performance Evaluation Date: 27-11-2020

Course Code: EET-717 Time: 17:30 hours

Faculty’s Name: Dr. Muazzam A. Khan Max Marks: 50 Time Allowed: 90 Mins
Total Pages: 1 (including this)

INSTRUCTIONS:
I. All questions are compulsory.
II. There are total three questions. III.
The paper is closed book.
IV. The students are not allowed any helping material
(books, tables, formulas, etc). V. Use blue, black or blue-black
ink only. Do NOT use lead pencil especially.

Student’s Name: Tayyab Rafique Enroll No:01-245191-010


(USE CAPITAL LETTERS)

Q.1 a. Briefly explain the common mistakes done in network performance evaluation?
Answer
Common Mistakes in Evaluation

1. No Goals
" No general purpose model
" Goals ⇒ Techniques, Metrics, Workload
" Not trivial
2. Biased Goals
" ``To show that OUR system is better than THEIRS'‘
" Analysts = Jury
3. Unsystematic Approach
4. Analysis Without Understanding the Problem
5. Incorrect Performance Metrics
6. Unrepresentative Workload
7. Wrong Evaluation Technique
8. Overlook Important Parameters
9. Ignore Significant Factors
10. Inappropriate Experimental Design
11. Inappropriate Level of Detail
12. No Analysis
13. Erroneous Analysis
14. No Sensitivity Analysis
15. Ignoring Errors in Input

b. What are different evaluation techniques you can use to evaluate the performance
of heterogeneous networks?

Answer

What are different evaluation techniques you can useto evaluate the performance of
heterogeneous networks?

• What life-cycle stage of the system?


– Measurement only if something exists
– If new, analytical modeling or simulation are only options
• When are results needed? (often, yesterday!)
– Analytic modeling only choice
– Simulations and measurement are often same
• But Murphy’s Law strikes measurement more
• What tools and skills are available?
– Maybe languages to support simulation
– Tools to support measurement (ex: packet sniffers, ASCII text file to feature
monitoring hooks)
– Skills in analytic modeling (ex: queuing theory)
• Level of accuracy desired?
– Analytic modeling coarse (if it seems to be accurate, even the analysts are
surprised!)
– Simulation has more details, but may abstract key system details
– Measurement may sound real, but workload, configuration, etc., should still be
missing
• Accuracy are often high to none without proper design
– Even with accurate data, still have to draw proper conclusions
• Ex: so time interval is 10.2351 with 90% confidence. So what? What does it mean?
• What are the alternatives?
– Can explore trade-offs easiest with analytic models, simulations moderate,
measurement most difficult
• Ex: QFind – determine impact (tradeoff) of RTT and OS
• Difficult to live RTT tradeoff
• Easy to simulate RTT tradeoff in network, not OS
• Cost?
– Measurement generally most costly
– Analytic modeling cheapest (pencil and paper)
– Simulation often cheap but some tools expensive
• Traffic generators, network simulators
• Scalability?
– Much easier to convince people with measurements
– Most people are skeptical of analytic modeling results since hard to grasp
• Often validate with simulation before using
• Can use two or more techniques
– Validate one with another
– Most high-quality perf analysis papers have analytic model + simulation or
measurement

Q.2 a. Explain the performance metrics you have chosen to evaluate your network &
what is the reason behind this selection?

Answer
When you’re evaluating your network performance, there are several different
metrics that you simply can analyze. Network performance is stricken by variety
of various factors. employing a network performance monitoring (NPM) solution,
your enterprise can rummage around for these factors and understand how they’re
hurting your network’s performance. the information your network monitoring
solution collects allows your IT team to realize insights into performance metrics
also.
It’s important for companies to understand which network performance metrics are
important to look at, though. Any metric will provide some information about
your network, which can make it appear to be you must analyze every single one.
However, counting on the particular issues that plague your network, not every
metric goes to be important for you to appear at. Despite this, there are some
metrics that are essential for any businesses to contemplate. Read on to get seven
essential network performance metrics that your company absolutely must keep
track of.
Bandwidth usage
Bandwidth is that the maximum data transmission rate possible on a network. For optimal
network operations, you would like to urge as near your maximum bandwidth as
possible without reaching critical levels. this means that your network is sending
the maximum amount data because it can within a period of your time, but isn’t
being overloaded. An NPM can monitor what quantity bandwidth is currently
being employed on a network, additionally as what quantity bandwidth is often
used during daily operations. the answer may provide you with a warning when
your network is using an excessive amount of bandwidth.

Throughput
Throughput measures your network’s actual data transmission rate, which might vary
wildly through different areas of your network. While your network’s bandwidth
measures the theoretical limit of knowledge transfer, throughput tells you ways
much data is really being sent. Specifically, throughput measures the proportion
of knowledge packets that are successfully being sent; a coffee throughput means
there are lots of failed or dropped packets that require to be sent again.
Latency
Latency is that the delay that happens between a node or device requesting data and when
that data is finished being delivered. This delay can happen for a spread of
reasons, but regardless of the cause, your NPM solution can track any delays and
log them. Consistent delays or odd spikes in delay time indicate a serious
performance issue; however, because delays can often be undetectable to the
human eye, you would like a monitoring tool to stay a watch on any delays that
happen.
Packet Loss
Packet loss examines what percentage data packets are dropped during data transmissions
on your network. The more data packets that are lost, the longer it takes for a
knowledge request to be fulfilled. Your IT team should understand how many
packets are being dropped on the average across your infrastructure. A network’s
Transmission Control Protocol (TCP) interprets when packets are dropped and
takes steps to make sure that data packets can still be transmitted; your network
team should monitor this method to create sure it’s working.
Retransmission
When packets are lost, the network must retransmit it to finish an information request. This
retransmission rate lets your enterprise understand how often packets are being
dropped, which is a sign of congestion on your network. you'll analyze
retransmission delay, or the time it takes for a dropped packet to be retransmitted,
to know how long it takes your network to live through packet loss.

Availability
Network availability, also know as uptime, simply measures whether or not the network is
currently operational. you'll never guarantee 100% availability, but you wish to
remember of any downtime that happens on your network that you just weren’t
expecting. It’s important to be alerted when the network goes down, which
network monitoring tools will provide for you. However, you must even be able
to discover your actual uptime percentage and the way often your network goes
down.
Connectivity
Connectivity refers as to if or not the connections between the nodes on your network are
working properly. If there's an improper or malfunctioning connection on your
network, it will be a serious hurdle for your company. Ideally, every connection
should be operating at peak levels in the least times. However, performance issues
like malware can target specific nodes or connections to affect performance in
this specific area of the network.

b. How you can configure a wireless node in NS-2, write down the commands
you can use in NS-2 tcl file for?
1. Create and config node
2. Trace file creation and tracing events
3. Create links between nodes

Answer

b. How you can configure a wireless node in NS-2, write down the commands
you can use in NS-2 tcl file for?
Ans:
The wireless networking model can be created using Tool Command Language (TCL)
script with fixed number of nodes. The sample code discussed below models the wireless
network with 2 nodes. Nodes are configured with the components of channel, networking
interface, radio propagation model, Medium Access Control (MAC) protocol, adhoc
routing protocol, interface queue, link layer, topography object, and antenna type. The
wireless network with 2 nodes can be viewed in the Network Animator (NAM) window
after executing the file sample1.tc
To configure a wireless node in NS-2
set ns_ [new Simulator] ;# Create a NS simulator object

set n1 [ns_ node] ;# Create a WIRELESS node !!!

1. Create and config node

set ns_ [new Simulator] ;# Create a NS simulator object

$ns_ node-config \
-llType LL
-ifqType "Queue/DropTail/PriQueue"
-ifqLen 50
-macType Mac/802_11
-phyType "Phy/WirelessPhy"

-addressingType flat or hierarchical or expanded


-adhocRouting DSDV or DSR or TORA
-propType "Propagation/TwoRayGround"
-antType "Antenna/OmniAntenna"
-channelType "Channel/WirelessChannel"
-topoInstance $topo
-energyModel "EnergyModel"
-initialEnergy (in Joules)
-rxPower (in W)
-txPower (in W)

-agentTrace ON or OFF
-routerTrace ON or OFF
-macTrace ON or OFF
-movementTrace ON or OFF
2. Trace file creation and tracing events

$ns_ trace-all tracefile


$ns trace-all $tf

3. Create links between nodes

$ns simplex-link \tup{node0} \tup{node1} \tup{bandwidth} \tup{delay}


\tup{queue_type}

Q. 3 Explain the following (20)


a) Techniques for workload Characterization in Mobile networks?

Answer
Techniques for workload Characterization

• Averaging
• Specifying dispersion
• Markov Models
• Single-parameter histograms
• Multi-parameter histograms
• Principal-component analysis
• Clustering

Averaging

• Characterize workload with average


Example: Average number of network hops
• Arithmetic mean may be inappropriate
Example: average hops may be a fraction
Example: data may be skewed
Specify with median, mode.

• Specifying dispersion

• Variance and Standard deviation
• C.O.V
• Min-Max Range
• 10- 90-percentiles
• If C.O.V. is 0, then mean is the same
• If C.O.V. is high, may want complete histogram (next)
• Or divide into sub-components and average those that are similar only
• Ex: average small and large packet sizes

Clustering

Steps in Clustering

o Take Samples
o Select Parameters
o Transform
o Remove outliers
o Scale observation
o Select distant metrics
o Perform Clustering
o Interpret

Markov Models

If next request depends upon previous request, then can use Markov model
Actually, more general. If next state depends upon current state

Can use for application transitions


Example: users run editors, compilers, linkers
 Markov model to characterize probability of type j after type i
Can use for page reference locality
Example: probability of referencing page (or procedure) But not probability
 really refers to order of requests
May be several Markov models that have same relative frequency

b) Markov Models and its impact on performance?

If next request depends upon previous request, then can use Markov model
Actually, more general. If next state depends upon current state
Can use for application transitions
Example: users run editors, compilers, linkers
 Markov model to characterize probability of type j after type i
Can use for page reference locality
Example: probability of referencing page (or procedure )But not probability
 really refers to order of requests
May be several Markov models that have same relative frequency

c) Difference between Scatter Plots, Gantt Charts and Kiviat Graphs used for data
presentation?

Answer

Scatter Plots

• Useful in statistical analysis


• Also excellent for huge quantities of data
– Can show patterns otherwise invisible

Gantt charts

In general, represents Boolean condition … on or off.


Length of lines represent busy.

Kiviat Graphs

• Also called “star charts” or “radar plots”


• ½ are HB, ½ are LB
• Note, don’t have to have all at 100% can be “10% busy”, say
• Useful for looking at balance between HB and LB metrics (“Star” is best)

HB Metrics LB Metrics
App throughput App response time
Link utilization Link overhead
Router utilization Router overhead
% packets arrive # duplicates
% implicit acks % packets with error
d) What are different hardware and software tools used for network monitoring?

Answer:
Network Monitoring

Network monitoring systems include software and hardware tools that can track various


aspects of a network and its operation, such as traffic, bandwidth utilization, and uptime.
These systems can detect devices and other elements that comprise or touch the network, as
well as provide status updates.

Hardware Network monitoring tools

 SolarWinds Server and Application Monitor.


 NinjaRMM.
 Paessler PRTG Network Monitor.
 HW Monitor.
 Open Hardware Monitor.
 HWiNFO.
 ManageEngine OpManager.
 AIDA64.

Software Network monitoring tools

 Cacti. ...
 Zabbix. ...
 ntop. ...
 Icinga. ...
 Spiceworks. ...
 Observium Community. ...
 Wireshark.
The End of Question Sheet

Page 1 of 1

You might also like