1302-traffic modeling techniques
TRANSCRIPT
-
8/13/2019 1302-Traffic Modeling Techniques
1/51
Traffic Modeling Techniques Network Analysis and Planning
Session 1302
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in anyformat without the prior written consent of OPNET Technologies, Inc.
2007 OPNET Technologies, Inc.
-
8/13/2019 1302-Traffic Modeling Techniques
2/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 2
1302 Traffic Modeling Techniques
Outline
Motivation for traffic modelingTraffic representationTraffic generation: sources and import methodsTraffic modeling: comparison of various approachesLab #1
Comparing accuracy and speed of explicit and hybrid simulationLab #2
New application deployment study
Lab #3Capacity planning
-
8/13/2019 1302-Traffic Modeling Techniques
3/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 3
1302 Traffic Modeling Techniques
Motivation
It is critical to provide good inputsnetwork topology
traffic
It is equally critical to choose a traffic modeling techniquesimulation speed vs. accuracy
This session focuses on modeling traffic
Garbage in
Garbage out
-
8/13/2019 1302-Traffic Modeling Techniques
4/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 4
1302 Traffic Modeling Techniques
Outline
Motivation for traffic modelingTraffic representationTraffic generation: sources and import methodsTraffic modeling: comparison of various approachesLab #1
Comparing accuracy and speed of explicit and hybrid simulationLab #2
New application deployment study
Lab #3Capacity planning
-
8/13/2019 1302-Traffic Modeling Techniques
5/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 5
1302 Traffic Modeling Techniques
Traffic Samples
WAN link OC48 (30 minute average )
http://loadrunner.uits.iu.edu/weathermaps/abilene/mrtg-data/HSTNng-ATLAng
Application trace
-
8/13/2019 1302-Traffic Modeling Techniques
6/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 6
1302 Traffic Modeling Techniques
Real-World Traffic Representation
Types of trafficWAN, LAN, application traffic
Traffic representation in OPNET
Choice of representation depends on modeling purposePacket by packet
End-to-end delays, protocol details, segmentation effectsAggregated traffic
Capacity planning, steady-state routing analysis
Traffic Flows, Device/Link Loads(Background Traffic)
Aggregated Traffic
Explicit TrafficPacket by Packet
OPNET RepresentationTraffic Type
-
8/13/2019 1302-Traffic Modeling Techniques
7/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 7
1302 Traffic Modeling Techniques
Parameters in Traffic Representation
Traffic ParametersPacket inter-arrival time or arrival rate
seconds, packets/secondPacket size
bits, bytes etc. bits/sec = bits/pkt * pkts/sec
Variability settingsProbability Distribution Function (PDF)
standard (exponential, bernoulli etc)custom
build your own with PDF editor scripted
Interarrivaltime
File Size
-
8/13/2019 1302-Traffic Modeling Techniques
8/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 8
1302 Traffic Modeling Techniques
Outline
Motivation for traffic modelingTraffic representationTraffic generation: sources and import methodsTraffic modeling: comparison of various approachesLab #1
Comparing accuracy and speed of explicit and hybrid simulationLab #2
New application deployment study
Lab #3Capacity planning
-
8/13/2019 1302-Traffic Modeling Techniques
9/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 9
1302 Traffic Modeling Techniques
Sources of Explicit Traffic
Explicit traffic injected atApplication Layer
email, HTTP, FTP etcACE, app_demands
Network Layer IP traffic flowsRPG (self-similar traffic generator)
Lower layers Native protocol sources
Ethernet, ATM, Frame Relay etcATM traffic flows
-
8/13/2019 1302-Traffic Modeling Techniques
10/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 10
1302 Traffic Modeling Techniques
Sources of Aggregated Traffic
Traffic flows injected atApplication Layer
app_demands Network Layer
IP traffic flowsLower Layers
ATM traffic flowsATM PVC loads
Element loadsCPU utilizationLink loadsDo not require source modelsLoads to flows conversion utility
IP Traffic Flow
app_demand
-
8/13/2019 1302-Traffic Modeling Techniques
11/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 11
1302 Traffic Modeling Techniques
Traffic Data Import
TrafficData
Network monitoringsoftware samples traffic
periodically using probesExport to textfiles or OPNETrecognizableformats
Import into OPNET
-
8/13/2019 1302-Traffic Modeling Techniques
12/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 12
1302 Traffic Modeling Techniques
Importing Explicit Traffic Packet Trace
Packet tracescaptured usingnetwork analyzer
Sniffer analyzer tcpdumpwindump
ApplicationCharacterizationEditor (ACE)
-
8/13/2019 1302-Traffic Modeling Techniques
13/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 13
1302 Traffic Modeling Techniques
Importing Traffic Flow Data
Flow-specific data Demand objects
-
8/13/2019 1302-Traffic Modeling Techniques
14/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 14
1302 Traffic Modeling Techniques
Importing Aggregated Traffic Link Loads
Link load information fromCA eHealth
MRTGInfoVistaHP OpenViewSpreadsheet (text info)
Can be converted into trafficflows
-
8/13/2019 1302-Traffic Modeling Techniques
15/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 15
1302 Traffic Modeling Techniques
Traffic Flow Creation Wizards
Traffic / Create Traffic FlowsIP UnicastIP MulticastVoIPMPLS VPN
-
8/13/2019 1302-Traffic Modeling Techniques
16/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 16
1302 Traffic Modeling Techniques
Scaling Existing Traffic
Global attributesTraffic Scaling Factor
Traffic Scaling ModeAll trafficBackground traffic
Individual demands
-
8/13/2019 1302-Traffic Modeling Techniques
17/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 17
1302 Traffic Modeling Techniques
Trending from historical dataRegression algorithms based on least square fitting
Linear, Exponential, Logarithmic, Auto selectSimple growth (linear)Compound growth (geometric)
Traffic Trending
timeAug 2004Feb 2004 Dec 2004
Historical data
Growth
profile(bps)
-
8/13/2019 1302-Traffic Modeling Techniques
18/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 18
1302 Traffic Modeling Techniques
Modeling Traffic Priority
Type of Service attribute
DSCPEFAF xy
IP Precedence0,1,,7
-
8/13/2019 1302-Traffic Modeling Techniques
19/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 19
1302 Traffic Modeling Techniques
Socket Information
Attribute on IP traffic flowsSource address
Destination addressSource PortDestination PortProtocol
Security and routing analysis
-
8/13/2019 1302-Traffic Modeling Techniques
20/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 20
1302 Traffic Modeling Techniques
Traffic Center
-
8/13/2019 1302-Traffic Modeling Techniques
21/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 21
1302 Traffic Modeling Techniques
Outline
Motivation for traffic modelingTraffic representationTraffic generation: sources and import methodsTraffic modeling: comparison of various approachesLab #1
Comparing accuracy and speed of explicit and hybrid simulationLab #2
New application deployment study
Lab #3Capacity planning
-
8/13/2019 1302-Traffic Modeling Techniques
22/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 22
1302 Traffic Modeling Techniques
Simulation Techniques
Discrete event simulation (DES)Model all traffic (data, signaling, management) using packets
Account for all timers in every protocol layer Perform every state/event transitions of all protocol layers
Analytical simulation (Flow Analysis)Abstract queue performance using mathematical equationsModel traffic as state information in various network elements
Hybrid simulationMix of modeling approaches (discrete event + analytical)Mixture of traffic types (explicit traffic + aggregated traffic)
-
8/13/2019 1302-Traffic Modeling Techniques
23/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 23
1302 Traffic Modeling Techniques
Comparison of Various Simulation Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
24/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 24
1302 Traffic Modeling Techniques
Micro-Simulation Delay Estimation
Delay estimator ( t) for explicit packets due to additional aggregatedtraffic contending for a common resource (such as a link)
Retrospective micro-sim as lazy evaluation on real packet arrivalSensitive to queuing schemes like PQ, CQ, and WFQ
r1 r2
t
b1 b2 b3
Time
Micro-simulation
-
8/13/2019 1302-Traffic Modeling Techniques
25/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 25
1302 Traffic Modeling Techniques
Hybrid Simulation
-
8/13/2019 1302-Traffic Modeling Techniques
26/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 26
1302 Traffic Modeling Techniques
Outline
Motivation for traffic modelingTraffic representationTraffic generation: sources and import methodsTraffic modeling: comparison of various approaches
Lab #1
Comparing accuracy and speed of explicit and hybrid simulationLab #2
New application deployment study
Lab #3
Capacity planning
-
8/13/2019 1302-Traffic Modeling Techniques
27/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 27
1302 Traffic Modeling Techniques
Lab 1: Overview
Use different traffic modeling approachesConfigure traffic using IP Traffic Flows
Change the traffic mix to useExplicit trafficBackground trafficHybrid traffic
Compare results and simulation speed
Refer to lab manual for instructions
-
8/13/2019 1302-Traffic Modeling Techniques
28/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 28
1302 Traffic Modeling Techniques
Source nodes (videoservers) with different
ToS (1,2,3) Interface with WFQ
100 video users (MPEG4) - 3 available service classes
Queuing delays?
Destination nodes
Lab 1: Network Model
-
8/13/2019 1302-Traffic Modeling Techniques
29/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 29
1302 Traffic Modeling Techniques
B R E A K
-
8/13/2019 1302-Traffic Modeling Techniques
30/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 30
1302 Traffic Modeling Techniques
Effects on Background Traffic Flows
Quality of Service (QoS)MarkingClassificationQueuing
Load Balancing:
Split traffic flows proportionally among available paths
OverheadsTraffic volumes and packet sizes adjusted to account for protocol overheads
Segmentation (DES only)Reduce packet size to within MTU
-
8/13/2019 1302-Traffic Modeling Techniques
31/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 31
1302 Traffic Modeling Techniques
Load Balancing Background Traffic Flows
0.75
0.25
0.5 * 0.75 = 0.375
0.375
0.25
0.25
0.3750.375
1302 ffi d li h i
-
8/13/2019 1302-Traffic Modeling Techniques
32/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 32
1302 Traffic Modeling Techniques
Modeling Efficiency
Tradeoff: speed vs. accuracyMore details = less speed
Discrete Event Simulation (DES) vs. Flow AnalysisUse Flow Analysis where applicable
Routing, capacity planningSimplify DES model
Reduce network scopeAggregate traffic
Simulation speedup in DESHybrid simulation
Traffic mix attributeTarget traffic + baseline traffic
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
33/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 33
1302 Traffic Modeling Techniques
Hybrid Simulation: Traffic Mix Attribute
Attribute on IP/ATM traffic flowsConfiguring traffic type mix
ExplicitBackgroundMixed (hybrid) use small percentage of explicit (not values like 50%)
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
34/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 34
1302 Traffic Modeling Techniques
Hybrid Simulation: Target Traffic Approach
Target trafficModel all details using explicit mode
Baseline trafficModel as aggregated traffic
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
35/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 35
g q
Typical Workflow
Application deployment studyImport network topology
Deploy one instance of new application from packet traceModel as explicit traffic
Import baseline network loadModel as link loads
Deploy multiple users of new applicationModel as traffic flows
ACE to flows conversion utility
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
36/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 36
Outline
Motivation for traffic modelingTraffic representation
Traffic generation: sources and import methodsTraffic modeling: comparison of various approachesLab #1
Compare accuracy and speed of explicit and hybrid simulation
Lab #2 New application deployment study
Lab #3
Capacity planning
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
37/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 37
Lab 2: New Application Deployment
Import application trace file and convert it into OPNET trafficDeploy application on top of existing baseline traffic
Study the application end-to-end performanceSimulate impact of many application users using traffic flows
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
38/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 38
Lab 2: Application Trace and Network Model
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
39/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 39
Flow Analysis Concepts
Traffic Data1) Traffic flows2) Device/link load
Topology Data
Flow analysis engine1) Fast2) Steady-state analysis3) Aggregated traffic only
Discrete Event Simulation1) High-fidelity1) Transient and steady-state analysis2) Packet-by-packet traffic
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
40/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 40
RoutingCapacity planning
SurvivabilityQuality of Service (QoS)Delay analysisVoIP deployment
Flow Analysis Capabilities
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
41/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 41
Outline
Motivation for traffic modelingTraffic representation
Traffic generation: sources and import methodsTraffic modeling: comparison of various approachesLab #1
Comparing accuracy and speed of explicit and hybrid simulation
Lab #2 New application deployment study
Lab #3
Capacity planning
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
42/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 42
Lab 3: Capacity Planning
Corporate WAN upgradeIdentifying bottlenecksApply QoS to improve voice traffic performanceUpgrade links to solve existing utilization problems.Forecast traffic growth and identify future bottlenecks.
Refer to lab manual for instructions
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
43/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 43
Session 1619 Importing Network Traffic with XDI (formerly MVI)
Session 1505 Building Traffic Source ModelsSession 1554 Case Studies: Specialized Topics in Traffic and QoSModelingSession 1350 Network Traffic Characterization and CapacityPlanningSession 1813 from 2006 Traffic Behavior and Queuing in a QoSenvironment
Presents queuing modeling in a QoS environment (by Prof. Bertsekas)
Other Sessions : Traffic Modeling
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
44/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 44
Take-Away Points
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
45/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 45
Reference Slides
Following slides are for reference
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
46/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 46
Analytical Coupled with Micro-Simulation
r1r2
t + a
b1 b2 b3
Time
Micro-simulationAnalytical-simulation
a
When real packets are separated by a long intervalLazy evaluation in two stages: analytical + micro-simulation
Currently implemented for FIFO queues onlyGain in simulation speed compared to pure micro-simulation
1302 Traffic Modeling Techniques
A t d T ffi J t N b t
-
8/13/2019 1302-Traffic Modeling Techniques
47/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 47
Aggregated Traffic Just a Number toCompute a Delay
Aggregated traffic in OPNETTraffic flows (routed background traffic)Device/link loads (static background traffic)
Common to both type of aggregated trafficInternal representation: just a number for a given node/link Effects: only one effect to produce a delay
One difference between the two types of aggregated trafficTraffic flows (routed background traffic) needs to be propagated to eachnode in the flow path tracer packets (propagators)
2Mbps2Mbps
2Mbps
2Mbps2Mbps
2Mbps
2Mbps2Mbps
2Mbps
2Mbps
2Mbps2Mbps
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
48/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 48
Defining Traffic Flows
3 basic steps
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
49/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 49
Defining Traffic Flows (cont.)
Each flow is broken down into intervals as specified
Interval : 300-600 seconds
1302 Traffic Modeling Techniques
-
8/13/2019 1302-Traffic Modeling Techniques
50/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 50
I1 I2 I3 I4 I5
Simulating Background Traffic Flows
Refresher tracer packets
I1
P1 P3 P4 P5P2
1302 Traffic Modeling Techniques
Simulating Background Traffic Flows
-
8/13/2019 1302-Traffic Modeling Techniques
51/51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2007 OPNET Technologies, Inc. 51
Simulating Background Traffic Flows(cont.)
Sending new information on traffic level changes
start time = 150.00.0 I1 I2 I3 I4 I5