StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Traffic Statistics on the Network - Lab Report Example

Cite this document
Summary
The report "Traffic Statistics on the Network" focuses on the critical analysis of the major issues in traffic statistics on the network. The tool in question, Riverbed Modeler Academic Edition, is vital in mastering the fundamental concepts of network configuration…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Traffic Statistics on the Network
Read Text Preview

Extract of sample "Traffic Statistics on the Network"

The tool in question, Riverbed Modeler Academic Edition, is vital in mastering the fundamental concepts of network configuration. The tool enables a user to study, manage and troubleshoot a real-life network infrastructure with ease. As illustrated above, after installing and following the steps indicated promptly, what follows is the description of the practicality of the tool.

The implementation that is under scrutiny utilizes 16 Ethernet connections. The 16 networks cabled use the 10-baseT link hence the network speed averages 10 Mbps. The assumptions are derived based on the facts about the cables and the networking norms. However, every connection has unique attributes and that is where the tool becomes handy. For instance, the hub configuration on the network in review shows 0.02 seconds as the inter-arrival time for the packets. Further, forward, a constant size of 1500 bytes per packet is set. The default configurations changed to an off state of 0.00 seconds and an on state of 100 seconds. This sort of configuration is only ideal when the administrator can anticipate the network data flow. This sort of configuration for a hub is bound to cause congestion. The settings applied for this network and the applied changes are what determine the sort of traffic flow for this network. All the stations generate traffic at an average rate of one 100-byte packet at the interval of 4 milliseconds. The calculation shows that the actual average traffic for each node is 100 bytes/packet * 4 bits/byte * 1 packet/0.004 sec = 100 Kbps.

The speed of the network is dependent on the equipment in most cases. The network at hand generates a slower flow of data due to the settings that emanate from the holdups enforced at the hub configuration. The interval and the time allocation for the packet determine the packet size threshold set.

The network under scrutiny has an ideal flow of traffic. However, the bottleneck of a 100-byte packet every 4 milliseconds is potentially damaging for it slows down the network. The hub configurations reviewed if an ideal network is the goal intended by the organization this network designed.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Networking lab Report Example | Topics and Well Written Essays - 250 words - 1”, n.d.)
Networking lab Report Example | Topics and Well Written Essays - 250 words - 1. Retrieved from https://studentshare.org/information-technology/1690604-networking-lab
(Networking Lab Report Example | Topics and Well Written Essays - 250 Words - 1)
Networking Lab Report Example | Topics and Well Written Essays - 250 Words - 1. https://studentshare.org/information-technology/1690604-networking-lab.
“Networking Lab Report Example | Topics and Well Written Essays - 250 Words - 1”, n.d. https://studentshare.org/information-technology/1690604-networking-lab.
  • Cited: 0 times

CHECK THESE SAMPLES OF Traffic Statistics on the Network

Network Intrusion Detection and Forensics

The NIDS systems detect illicit use of computer networks, alert network administrators, create reports in the system through their logging abilities, and try to prevent harm to the network by malevolent network users.... Limitations of the network Intrusion Detection Systems 7 3.... This report contains details of research of two open source network Intrusion Detection Systems (NIDS), Snort and Bro, and compares then in terms of performance, strength and features to determine which of them offers superior service in intrusion detection....
26 Pages (6500 words) Dissertation

Impact of the Virtual Private Network on Businesses

Business exchange information securely within computers and devices on these networks provided that only persons with real access to the network could share that information. ... The aim of the paper is to look into the impact of Virtual Private network to businesses, this in relation to the meaning of VPN, the stages of its development, and the advantages it has over others.... A virtual private network enables the developing or building of private networks across the internet....
5 Pages (1250 words) Research Paper

Critical investigation of frame relay traffic

As a result, Frame Relay gives an order of magnitude improvement in network throughput over X.... his paper is an attempt to analyze frame-relay traffic.... SDN represents another ideal carrier for frame relay traffic able to support a number of frame mode bearer services (FMBS)....
20 Pages (5000 words) Essay

High-Speed Network Switching

However, this needs a well-organized method of network switched communication to get entrance to the network expedients consistently and at an elevated switching rate.... Under this circumstance, the main and prime challenge is to effectively manage the network traffic and quick switching among network nodes to offer enhanced user experience and support.... Additionally, the data is inserted into the network by the manager in a transmitting system; besides negotiating a sequence of connections as well as switches, the data is sent to the controller at the host that is at the receiving end....
15 Pages (3750 words) Research Proposal

The Development of Network Intrusion Detection Systems

his technique is used to identify the normal state of the network by clustering the total number of packets that are sent and received in the network.... Although the probability of getting the actual state of the network is high, there is every possibility for it to go wrong too.... (Taylor , 2001) that could hinder the chances of getting the correct nature of the network.... In TCP type sampling, equal numbers of packet sets were used for analysis for each TCP type in order to get a full picture of the network traffic....
5 Pages (1250 words) Research Paper

Better Public Transportation can Solve Traffic Problems

The prioritization should be based on the availability of existing network that can support it.... The use of public transport in UK and USA can be proved through statistics.... % use public transport (Public Transportation statistics | Statistic Brain).... "Public Transportation statistics | Statistic Brain.... This paper will support the stance that if public transport is made better and maintained, it will enable many people to switch from the use of private cars and travel by public means of transportation what will contribute positively to reducing traffic problems....
9 Pages (2250 words) Term Paper

Network Traffic and Performance

This approach also naturally includes all customer equipment since it is monitoring calls already on the network.... Another disadvantage is that it can only monitor the traffic that is on the network.... The advantage of non-intrusive testing and monitoring is that it does not add any additional load to the network.... These tests can run automatically since the network is running and if frees field personnel for other tasks....
13 Pages (3250 words) Lab Report

Network Monitoring

n agent is software that runs on the network devices that are being managed.... Network monitoring has a role in network management as it will help resolve issues and in the process of diagnosis of the issues that are faced in the network.... etwork monitoring can be defined as the process of getting network traffic and closely checking to know what is happening in the network.... Network monitoring defines the work of a network administrator as they strive to ensure that the network is smooth in its operation....
15 Pages (3750 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us