Professional Documents
Culture Documents
Stid1103 Assignment1-Longdocument A202 04042021
Stid1103 Assignment1-Longdocument A202 04042021
INDIVIDUAL ASSIGNMENT # 1
(WORDS PROCESSING)
Utilize word processing utilities to format long document. You could use sample given BELOW.
By
In presenting this project of the requirements for a Master of Science in Information and
Communication Technology (MSc. IC) from Universiti Utara Malaysia, I agree that the
University library may make it freely available for inspection. I further agree that
permission for copying of this project paper in any manner, in whole or in part, for
Graduate School. It is understood that any copying or publication or use of this project or
parts thereof for financial gain shall not be allowed without my written permission. It is
also understood that due recognition shall be given to me and to Universiti Utara
Malaysia for any scholarly use which may be made of any material from my project
paper.
Request for permission to copy or make other use of materials in this project, in whole or
ABSTRACT
Networking evaluation techniques have been carried out different procedures and
behavior for presenting the TCP/IP state over different areas. Furthermore, the rapid
growth of using quality of services technique (QoS) for measuring and monitoring the
TCP/IP state has growth rapidly due to the improvement process for presenting new
techniques over LAN. TCP congestion algorithm has been used to control and monitor
the TCP/IP state over local area network. Different difficulties have been presented the
integration or the using of first in- first out technique among router for scheduling TCP/IP
state. Hence, this study has been concerned on using the quality of service evaluation
process of the TCP cognition control algorithm and to measure the TCP cognition control
algorithm state over local area network. However, Object Oriented Approach Modified
(Hoffer, et al., 1999) has been selected for designing, development, and testing the
Praise to Allah for his guidance and blessing for giving me the strength and perseverance
to complete this project. I would foremost like to thank my parents, for providing me
with the opportunity to pursue my goals and for their love and affection, which has
helped me through the most trying times. Equal gratitude goes out to my siblings and
brothers. I would like to thank my supervisor, Mr. A bin B for her guidance and
constant motivation that has enabled me to complete my project work. Moreover, I would
also like to thank her for the opportunities that she has made available to me.
I would like to present my thanks to all my brothers specially Cxxx and Dxxx , Also to
my wife my son Exxx, my daughters Fxxx ,Gxxx and Hxxx and all my family who has
always been there for me. Finally, I would like to express my appreciation to all my
friends, colleagues, other staff, and everyone who has helped me in this journey.
<your name> (matric#)
TABLE OF CONTENTS
CHAPTER ONE
1. Introduction
1.7 Conclusion
CHAPTER TWO
1. Introduction
2.2 FIFO
2.3 MAC and TCP/IP Address
2.6 Conclusion
CHAPTER THREE
3.2 Design
3.3 Development
3.4 Testing
3.5 Conclusion
CHAPTER FOUR
4.6 Summary
CHAPTER FIVE
5.1 Introduction
5.3 Summary
CHAPTER SIX
CONCLUSION
6.1 Introduction
6.3 Conclusion
REFERENCES
LIST OF FIGURES
List of tables
Table page Num
Table 3.1: H/W.S/W Specifications
Table 4.1: QoS based Response Time
Table 4.2: QoS based Throughput
Table 4.3: QoS based Traceroute
Table 4.4: Non Functional requirements
Table 5.1: TCP Based Response Time Use Test Case
Table 5.2: TCP Based Throughput Use Test Case
Table 5.3: TCP Based Tracerpute Use Test Case
Table 5.4: IP Based Response Time Use Test Case
Table 5.5: IP Based Throughput Use Test Case
Table 5.6: IP Based throughput Use Test Case
CHAPTER ONE
INTRODUCTION
1. Introduction
The success of the current Internet relies to a large extent on cooperation between
the users and network. The network signals its current state to the users by marking or
dropping packets. The user then strives to maximize the sending rate without causing
network congestion. To achieve this, the users implement a flow control algorithm that
controls the rate at which data packets are sent into the Internet (Wang, Y., et al., 2007).
More specifically, the Transmission Control Protocol (TCP) is used by the users to adjust
the sending rate in response to changing network conditions. In a network the computers
communicates with the help of IP-address. In an organization the transmission of data has
to be very much secured (Hayder, N., et al., 2008). The organizations may use Dynamic
IP addressing (Mohd D., Nurhayati A., 2006), to reduce the conflict that occurs between
the computers by giving them different IP address such that the data reaches to the
destination (Mohamed G., Chin T., 2003). On the Dynamic network the IP address of the
client machine keeps on changing. So, it’s difficult that data packets reach the correct
destination (Ramachandran, V., and Nandi, S., 2005); (Johnson, J. Z., 1998).
1.1 Problem Statements
There are two packet scheduling algorithms at the router, the first one is FIFO
(First in First Out, or Drop- Tail), which is widely used in the current Internet routers.
The second is RED (Random Early Detection), which drops incoming packets at a certain
probability
The difficulty to measure the network signals state using FIFO, because of a
The difficulty to measure the network signals state using RED, because of it’s
cannot keep a good fairness when the capacity of shared link becomes small
Model the proposed technique for measuring and analyzing the network
TCP state.
This study aims to evaluate the TCP performance over local area network based
on FIFO and RED mechanism. This study also will be employed a QoS mechanism for
measuring the application performance. Furthermore, Figure 1.1 shows the work flow of
TCP cognition control algorithm between clients over local area network (LAN).
Computer 1 Computer 1
user
Computer 3 Computer 3
user
A review on the literature will be helped in identifying the importance and a host
of benefits of implementing a like mechanism for evaluation the TCP performance over
A) Identify the TCP performance by elaborate the capacity of using different application
The classification of this study will be concerned on five chapters which begin
with the introduction section as the first chapter. An overview of the content of the
understanding of the concept that will be used in the coming chapters and
Chapter two: This chapter will discuss about literature reviews, previous
related work and challenges, and more information to understand the research
components.
Chapter three: This chapter discusses the methodology that will be used in this
system.
1.7 Conclusion
This chapter concerned on describing and explaining the study factors that lead to
the selection of the area studied. It also explains the objectives of conducting the study, as
well as its significances to the real world situation. These elements are important as it
ignites the implementation of the project. The next chapter deals with the literature
review which elaborates on related works that have been established in the same field.
CHAPTER TWO
LITERATURE REVIEW
2. Introduction
a cable is unplugged, an alarm can be triggered in the network operations center. Some
network evaluation mechanism allows work orders to be signed off and documentation
on the physical layer to be updated automatically (Bahl, P. and Padmanabhan, V., 2000).
However, a network tracking tools can help technicians resolve hardware problems by
identifying the location in the physical layer where trouble occurs by maintaining
Today’s, the evaluations process of the TCP performance in determining its status
among local area network have been brought different types and patterns for measuring
this status. Furthermore, TCP evaluation methods and tools such as Quality of Service
(QoS) for measuring the TCP quality based on the level of predictability and
manageability of the services supplied by one or more service providers for determining
Different studies have focused on measuring and evaluation TCP QoS in provide
a particular importance which give inherent shared nature of Grid services and to the
limited capabilities based on hardware and software tools that are typically available to
satisfy a client's request. Moreover, online environments need always to measure its QoS
for measuring the client’s satisfaction on the online environments such as e-Business and
e-Science environments. The complexity of the web over local area network has been
produced different patters to measure and elaborate the business logic of the application.
QoS in multiple environments will reflect, to a large extent (Orge, et al., 2004).
congestion situations in a growing Internet (Stevens, 1997). Routers and local area
networks require an active buffer management to facilitate and enhance the exhibit
phenomenon (Braden, 1998). Additionally, high buffer occupation entails loss of packet
bursts, that are characteristic for TCP/IP traffic; the ’Lock-Out’ phenomenon able to
deploy unfairness between different ports and TCP connections among local area
network. The Random Early Detection (RED) algorithm is currently the most using in
providing the TP/IP with the clear performance, which it has been recommended as a
useful solution for the addressed issues (Floyd, & Jacobson, 1993).
for the mutely services (Heinanen, 1998), that supports relevant service classes, which
from bursts.
2.2 FIFO
Figure 2.1: First In, First out Process
Figure 2.1 shows the FIFO process, which presents an acronym for First In, First
Out. This illustration of the different behaviors presents the principle of a queue or first
come, it’s an criteria for processing different behaviors based on what comes in first is
handled first, what comes in next waits until the first is finished, etc (Losk, 2003).
"standing in a line" or "queuing", where the persons leave the queue in the order they
arrive.
The FIFO presentation unable to describe the variation process, the reason back to
the FIFO is not accurately descriptive of the different patterns and behaviors among local
area network. Different researchers have been suggested the using of queuing theory
which provide general determination of the more concept of queue, moreover, it’s
First in, first out queuing is a useful acronym in providing the general behavior by
scheduling the evaluation process (Kohler, E., et al., 2006). In FIFO queuing, all packets
are treated equally by placing them into a single queue, and then servicing them in the
same order that they were placed into the queue. FIFO queuing is also referred to as First
come, first served (FCFS) queuing. The using of FIFO queuing provide different benefits
A) the using of FIFO queue in designing the software patterns based routers by providing
an extremely low computational load during the processing of routers, this processing
work on scheduling the entire signals and organizing them with more elaborate queue
disciplines.
B) Its elaborate they require size for placing signals p which make it more predictable.
The measurements of the entire packets among routers in local area network are not
organized and the maximum delay is determined by the maximum depth of the queue.
C) As long as the queue depth remains short, FIFO queuing provides simple contention
resolution for network resources without adding significantly to the queuing delay
Every network interface has a MAC address (Media Access Controller) also
known as the physical address. This is the actual hardware address that the lowest level of
the network users to communicate (Batten, K., 2001). The physical address is an 8 byte
value of each of the four bytes. Valid addresses thus range from 0.0.0.0 to
stream transport-layer protocol (Stevens, W., 1994). It is widely used on the Internet and
in the Web. This section defines TCP terminology relevant for understanding this paper.
More detail on HTTP TCP behavior appears in (Barford, & Crovella, 2000). The
fundamental unit of data transfer in TCP is a byte (i.e., for sequence numbering, control,
and error Control purposes). However, TCP implementations generally work with a
larger logical unit size called a segment when transmitting packets across an IP
internetwork. The Maximum Segment Size (MSS) is a settable parameter for a TCP
A QoS enabled network must be able to handle different traffic streams in different
ways. (Comer, C., & Douglas, E., 2006). This necessitates categorizing traffic into types
or classes and defining how each type is handled. All the following aspects could be
Admission control
Queuing
Congestion management
Nowadays, the multiple using of the Internet applications have been modified the
way to treat different services and explorer the abilities to enhance and develop these
different evaluation tools and methods have been built for this purposes such as QoS
(Vincenzo, 2001). Currently, the QoS is determined by network capacity rather than by
Figure 2.2 shows a brief description for the related works which highlighted study
Hayder, J., Zuriati Z , Mohamed, O. (2009). Fairness of This study described the effectiveness of using cognition This study has been deployed AIMD mechanism This study described the main issues of deploying AIMD
the tcp-based new aimd congestion Control algorithm. control on reduce the performance of the network. to reduce the network performance which reflects good to enhance the network performance. Otherwise, AIMD
Journal of Theoretical and Applied Information efficiency as well as good fairnessevaluation process mechanism can also be replaced with more useful
Technology. The study has been identified the problem of using based on multi flows, which start at the same time and mechanism for increase the network performance.
AIMD (Additive Increase Multiplicative Decrease) in a also by considering each flow start at a different time in
set of liner algorithms. other way.
Emmanuel, L., Laurent, D., and Guillaume, J. (2007). The study described the end-to-end congestion control The study has been explored a new pattern for Emmanuel, el al. modified the existing approach (TFRC)
gTFRC, a TCP friendly QoS-aware Rate Control for sup-port over the different servers and Assured describing the new end-to-end mechanism for to take into account the QoS negotiated. The study was
DiffServ Assured Service. National ICT Australia Ltd, Forwarding (AF) class. continuous transfer based on TCP-Friendly Rate Control applicable to use another approaches to be integrated
Australia, 2 ENSICA - LAAS/CNRS, France. (TFRC). with QoS negotiated.
This study faced different difficulties to exame the
cognition control over TCP.
Stefan, K., Michael, M., & Norbert, V. (2001). Analytic This study investigated the new detection algorithm The study has been deployed a new detection algorithm The study showed the success process for analyzing the
Performance Evaluation of the RED Algorithm for QoS in behavior randomly for Differentiated Services to cope behavior over Differentiated Services based RED new detection algorithm behavior over Differentiated
TCP/IP Networks. 9th IFIP Conference on Performance with feedback oriented traffic like TCP. mechanism to cope with the TCP traffic. Services. Relevant suggestions can also take in account
Modeling And Evaluation Of ATM & IP Networks 2001, by integrating other existing behavior and measure the
Budapest. Moreover, the study has identified the existing detection detection performance for TCP traffic.
problem to cope with TCP traffic.
Figure 2.2: Related Works Outline
However, the purpose of using QoS mechanisms back to the ability of this
mechanism to control and monitor the emerging and network response. The study aimed
to define Internet QoS Requirements and to evaluate them; the twofold approach is
among local area network, also measure the effectiveness of using round time trip (RTT)
algorithm based on two flows or more than that. The study has shown the effectiveness of
using cognition control on reduce the performance of the network. Furthermore, AIMD
algorithms that it reflects good efficiency as well as good fairness. Hence, the study has
been proposed “evaluation method of fairness for New AIMD congestion control
algorithm”. Moreover, the study has been done the evaluation process based on multi
flows, which start at the same time and also by considering each flow start at a different
congestion control sup-port over the different servers and Assured Forwarding (AF)
class. However, the study has been used and examined the cognition control based on
Assured Service (AS) which provides a minimum level of throughput guarantee. Based
on these services provided, the study has explored a new pattern for describing the new
(TFRC). Moreover, the study modified the existing approach (TFRC) to take into account
the QoS negotiated. The result of this new pattern named as gTFRC, the ability of this
pattern can be presented by reach the minimum throughput guarantee whatever the flow’s
RTT and target rate. Finally, QoS has been used in order to measure and implement the
behavior randomly for Differentiated Services to cope with feedback oriented traffic like
TCP. Additionally, this paper has been modeled the features of TCP and RED and
evaluate the model using a discrete-time analysis. The importance of using these tools for
the evaluation process is to compose model, i.e., TCP feedback traffic over a RED queue
(Geoff, H., 2000). Deriving not only mean values but also distributions for the
performance measures, we obtain insights of the behavior of TCP under RED. Figure 2.4
shows the evaluation process for analyzing the new detection algorithm behavior over
Differentiated Services.
Figure 2.4: Analyzing the new detection algorithm behavior over Differentiated Services
Other researchers such as Mascolo, Grieco, Ferorelli, Camarda, & Piscitelli,
(2003) improved the work flow of the TCP cognition control over LAN by enhancing the
sender side based on the classic Tahoe/Reno TCP that has been recently proposed to
improve fairness and efficiency of TCP. Moreover, this research has performed the end-
to-end estimate of the available bandwidth by properly counting and filtering the stream
of ACK packets over local area network for multi servers. The proposed technique work
also on enhances the cognition window and reduces the threshold after a congestion
Hence, the TCP cognition control will be able to manipulate the TCP paradigm
with the adaptive decrease paradigm. In addition, the proposed technique has been tested
on Linux 2.2.20 of Westwood+, Westwood+ and Reno TCP to “ftp data over emulated
WAN and over Internet connections spanning continental and intercontinental distances”
(Bustos, M., et L., 2003). The result that has been obtained showed the implementation
result of employed the bandwidth estimation algorithm by Westwood+ and nicely, that
monitors the available bandwidth, whereas the TCP Westwood bandwidth estimation
(Mascolo, 2003).
However, a study by Martin &Carey (2004) described the internet packet traffic
and analyze its behavior over the internet. Moreover, this study shown that around 15-
25% of TCP connections have at least one TCP RST (reset). Also relevant result has been
observed by measuring the internet links over Internet. The study has been tested over
reset connections arise from local events such as network outages, attacks, or
reconfigurations, as well as from global trends in TCP usage. Additionally, the study
described the behaviors level in the global trend in reset TCP connections (Ankur, C.,
2004). It’s shown that, most prevalent anomaly is the absence of the normal FIN
handshake for connection termination. Instead, connections are often reset by the client.
Furthermore, figure 2.5 shows the output of analyzing the TCP/IP behavior over Internet,
2.6 Conclusion
This chapter focused on two sections, the first section concerned on describe and
explain the issue of TCP/IP, QoS, RED, FIFO, and other relevant subjects. Moreover, the
second section concerned on the related and previous work on integrating and analyzing
the TCP, IP behavior over Local Area Network, and Internet. Finally, the research
methodology which is adapted by Hoffer et al. (1999) to this study in order to achieve the
objective will be discussed in the next chapter. This methodology has been carefully
chosen to make sure that it is suitable for developing the proposed system.
CHAPTER THREE
RESEARCH METHODOLOGY
3. Introductions
research project; it is a systematic way to solve the research problem. The research
methods refer to the methods and techniques used by the researcher in performing the
research. This study will be used Object Oriented Approach (OOA) that adopted by
Hoffer, et al. (1999). This methodology has been modified to fit the study purpose.
Moreover, Hoffer, et al. (1999) has been stated in his book that a system or software
works has to be carried out in order to achieve the objective or goal of the system
development. The processes involve are also bounded with rules that has to be followed
to ensure that the application developed is in line with the original predetermined
requirements.
1.Understand
4.Test
Requirement
3.Development 2. Design
conditions as follows:
The requests to deal with problems occurred in current procedures practiced by the
opportunity.
Furthermore, implementing the project requires a proper Local Area Network (LAN)
to work on. Moreover, FIFO technique will be used in order in the cognitive control
based on the Quality of Service evaluation (QoS). Thus a work plan will be generated to
make sure that the end product meets the requirements. Planning a project also involve
3.2 Design
This phase involves the process of designing the system which in the case of this
design is a QoS evaluation of the TCP congestion control algorithm. However, designing
the system involves two main processes that are categorized into logical design and
physical design. Additionally, during this phase, the descriptions for the proposed
alternatives produced in the previous phase were converted into logical and physical
specifications. Theoretically, designing the system involves two main processes that are
A) Logical Design
Hoffer, et al. (1999) explained that logical design is the phase where all functional
features that have been chosen for the development of the system are described without
programs. Moreover, FIFO and RED mechanism will be used to evaluate the TCP
congestion control algorithm. Figure 3.2 below shows the tentative design for the
proposed mechanism of evaluation the TCP performance based on the client connection
writing programs. For this project, Unified Modeling Language (UML) will be used as
the techniques of notation to represent the system’s requirements. With UML, the
researcher will be produced use case diagram to represent the whole functions available
in the propose system. Other than that, sequence diagram will be also generated to
visualize the structure of the system’s flows. All of these diagrams will be produced
using the Rational Rose 2000 Enterprise Edition’s software. It is a simple, easy yet the
Client PC
TCP-A- TCP-A-
TCP-A A A-A
TCP-A-B TCP-A-B-A
Policy
TCP-B-A
Firewall
TCP-N
Figure 3.2: Tentative Design for the Proposed Mechanism for TCP Evaluation
B) Physical Design
However, physical design deals with the process of converting the logical design
into a more technical specification of the system development. In designing the physical
part of the system, all diagrams of data sources, data flows and data processing that were
produced in the logical design will be turned into a structured systems design. During
physical design, the researcher will be determined which evaluation mechanism will be
used during the development process, as well as the study will identify which platform
will be used, operating system and network environment the system will run under. Table
designing process which include the system’s functions, entities involve, hardware and
operating system determined. After everything was designed, the physical system
specifications were ready to be turned over to programmers for the next phase which is
3.3 Development
During the development phase, the requirements and systems specifications from
the System design step will be translated into machine readable computer code. This is
the critical phase in the implementation of this study (Kwok, et al, 2004). The system will
be developed using different evaluation mechanism such as FIFO and RED technology.
During coding, the programs will be written that constructed the system. There are
different steps require to follow during the development phase, these steps involves the
creation of the system software. Requirements and systems specifications from the
system design step are translated into machine readable computer code. This is the
critical phase in the implementation of this project. In the case of this project, the
proposed TCP analyzing system base FIFO and RED will show its capability as a PHP
language designed specifically for specifying and displaying content over Internet.
3.4 Testing
This phase will follow the development phase after the system will be coded, it
will be tested in order to find any error that may occurs and correct them. The testing will
also took place to ensure that it will provide the most liable services to users (client)
before the installation. Thus the testing include both software and hardware configuration
for the system. The study will present the use case test technique to evaluate and test
3.5 Conclusion
development, and test) which applied for the proposed TCP analyzing system. Moreover,
this chapter has been deployed the Object – Oriented approach (OOA) from Hoffer, et al.
(1999) which has been adapted as a guide throughout the project. OOA is the most
common structured systems development phases being used in many project and
organizations. As proposed by Hoffer, et al. (1999), the OOA consists of six phases. But
the study has been modified this phases based on the study requirements. Finally, in the
CHAPTER FOUR
This chapter briefly discusses the deployed system that used in order to fist the
study goals for measuring the network performance in UUM environment. The results of
the study bring together the functionalities, interface, and generalized design principles
Identifying the requirements for any system supports the implementation steps
(Bahrami, 1999; Bennett, 2002; Dennis, 2005). Listed below are the functional and non-
functional requirements of the system. In the priority column, the following short hands
are used:
TCP/IP protocol.
UPX protocol.
IPX protocol.
UDP protocol.
Table 4.3: QoS based Traceroute
TCP/IP protocol.
UPX protocol.
IPX protocol.
UDP protocol.
B. Non-Functional Requirements
database.
1998; Hoffer, 1999). Furthermore, use case diagrams (a) organize functional
requirements of QCheck system (b) model the goals of system/actor (user) interactions
for QCheck system, (c) record paths from trigger events to goals that QCheck is aimed to
and (d) describe main flow of events and the contents actions (Hoffer, 2002; Jacobson,
2004; Schmuller, 2002). Figure 4.1 shows the deployed QCheck system over LAN, the
functionality of the system presents two sides, administrator for controlling the measuring
TCP
Response Time
UDP
Administrator
QoS Through Put Client
SPX
Traceroute
IPX
The page layout for the cover page and subsequent pages differs. The cover page
layout was split into four sections (Silva, P., & Paton, N., 2003). These are:
Header
This section contains the titles of the QCheck and a welcome message to measure the
network performance over TCP/IP protocols and specify contents of the results.
Cover display
The QCheck system cover provided recognition of the system title, which would be
updated, based on every issue subscribed. There were two options: either to go to the
details screen after run the system or use the direct hyperlink which locates in the temp
folder.
Headlines
decide quickly whether the selected protocol is appropriate for measuring the client
network performance. This service could help the administrator of the system to pick the
Menu
This part display two sprit table of contents of the QCheck system. A list view of the
QCheck selections and quick links for these contents are indicated with appropriate
buttons. Buttons are more visible to select options (protocols and details) than the direct
ergonomic requirements. Figure 4.2, shows the QCheck system of the administrator side
Check Time
Result
Check Based
TCP Protocol
Throughput
Check Based
UDP Protocol
Traceroute
Check Based
SPX Protocol
Iterations
number
Check Based
IPX Protocol
Data Size per
100 bytes
Run the
System after
Specification
View Result
Details
Figure 4.2: The Administrator Side for Measuring the Client Network Performance
Setting Menu
for QCheck
QCheck based
Response Time
From
TCP/
IP
To
TCP/
IP
TCP/
IP
Minimum EndPoint
Result Details
Avarage
Max
Result
The contents of the QCheck system play a crucial role in providing user
(administrator) with the useful and appropriate functions for measuring the client
(Atanas, R, & Miriam, R., 2006). The content requirements were divided into two
sections:
(a) Content display
The contents of the QCheck system provide the network administrator to control
The QCheck system contents support the multi protocol such as (TCP, SPX,
Also, the QCheck system result details content supports the network administrator
traceroute).
The structural content assisted new users (Network administrator) when he/she want
to optimize any available function to be measured based on the selected protocol and
allow administrator to view their own functions for measuring network performance
(Atle, R., 2008). However the available functions provided as a two set to obtain a better
controlling of protocol and measurement result through the quick accessing to the
existing content that QCheck system provides. Figure 4.4 depicts the navigational
Identify
Protocol
Specify Result
Details
Measure the
Client
Performance
Client PC
Figure 4.5 shows the administrator screen for measuring the response time of the client IP
over LAN. Moreover, the figure below presents one for both iterations and data size as a
minimum value.
iteration and data size. However, figure 4.6 presents the client IP measurement for response time
Figure 4.7 shows the cline IP performance measurement based the throughput
function. The throughput for 1000 data size produced 94.118 Mbps.
Figure 4.9 shows the measurement process for the client IP based response time
function. Administrator able to insert his IP addresses as an endpoint to measure the client IP
address.
Figure 4.10 shows the measurement process for the client IP based thorughput function.
Administrator able to insert his IP addresses as an endpoint to measure the client IP address.
Figure 4.11 shows the measurement process for the client IP based traceroute function.
Administrator able to insert his IP addresses as an endpoint to measure the client IP address.
This chapter presents the overview process for the deployed QCheck system for
measuring the network client performance based response time, throughput, and traceroute
functions. The UML diagrams are used to model the design view of the deployed system. The
design of the interface and content of the QCheck system for measuring the client protocol
performance are also elaborated in order, use case diagram has been used to present the system
CHAPTER FIVE
QCHECK EVALUATION
5.1 Introduction
This study focused on deploying and analyzing a QCheck system for providing and
supporting the network administrator with the ability to measure the quality of service (QoS) of
the client network over different protocols. Although QCheck system became the most useful
methods for measuring the network quality which obtains multi functions to be deployed by the
administrator. The evaluation was concerning on two computers one for the administrator for
specifying the require protocols and the other one for the client side.
5.2 Use Test Case
System testing performs testing on interaction of entire dialog components when all the
components are combined for the first time. According to Booch et aJ. (2001), they explained
that use cases could be used as the basis of test cases for these elements as they evolve during
deploying and developing phase, and it also can be excellent sources of system tests. Collard
(1999) strengthens above point by explaining that if the use cases for a system are complete and
accurate, the process of deriving the test cases is straightforward. Otherwise, the attempt to
This study has employed the test design guideline from Collard (1999) who has
demonstrated the development of test cases that is used in testing use case's event. Six use case
processes have been identified such as; TCP based response time, TCP based throughput, TCP
based throughput, IP based response time, IP based throughput, and IP based throughput.
Implementation of Use case testing consists of generating the normal test case and negative test
case, show the normal test case used to test against each normal mainstream process of use case.
m-medium, l-
low)
Response client
Data size Disconnect 3:30 PM
Time TCP
Response
Time
m-medium, l-
low)
TCP
Throughput
Value
m-medium, l-
low)
TCP
Tracerpute
value
m-medium, l-
low)
Response client
Data size Disconnect 3:60 PM
Time IP Response
Time
m-medium, l-
low)
Throughput client
IP Disconnect 4:00 PM
Throughput
value
m-medium, l-
low)
Tracerpute
value
5.3 Summary
The evaluation phase of the deployed QCheck system presented during this phase by
carrying out the use test case for six network measurement (TCP based response time, TCP
based throughput, TCP based throughput, IP based response time, IP based throughput, and IP
based throughput). Moreover, this chapter presented the result based administrator selection for
client protocol and measurement results. Deploying of QCheck system will bring the usefulness
to measure and identify the network quality over clients. It is hoped that this project will be part
CONCLUSION
Nowadays, the using of networking tools such as Quality of Service for measuring and
identifying the available services over LAN has been rapidly growth due to the improvement in
system evaluation technique. Furthermore, administrators start to look on other alternative ways
to identify network performance based TCP and IP protocol. This study has been emphasized the
Identify the network requirements for using the packet scheduling algorithms and
Model the proposed technique for measuring and analyzing the network TCP
state.
The outcome of the first objective has been discussed in chapter 4, where the main
functionality, actors and use case of the QCheck system are described by presented the
administrator and client side among QCheck system. Then, screen design and description has
To support the final objectives, the evaluation of the prototype system was conducted by
optimizing use test case for six cases (TCP based response time, TCP based throughput, TCP
based throughput, IP based response time, IP based throughput, and IP based throughput).
Moreover, the main definition for the QCheck system tools has been perceived and used
by administrator side. Though absolute attributes are important, it is how those attributes are
perceived, now and in the future, that defines network requirements. Furthermore, identifying
quality of service involves two stages: (a) highlighting which attributes are important and (b)
The deployed QCheck system optimized and tested based two endpoint, which presents
administrator and client. Thus, the evaluation of its true performance cannot be conducted due to
limited financial budget to use real connection services with multi clients that show the real
performance of the deployed system among different protocols. There are several
1. The deployed QCheck system should be upgraded with more useful and beneficial
functions for browsing the available networks information in order to satisfy with the
and based different protocols. However, in this study, due to limit time and resources,
only two devices QCheck have been integrated to. A future study should take into
account more respondents to evaluate the system performance among those clients.
3. Identify the available techniques for maximizing the efficient use of the functions that
4. Develop the security system to secure and safe the information about the client
information.
6.3 Conclusion
The deploying of QCheck system has been described and the results of that deploying
have been collected based use test case technique. The primary aim of the experiment was to
evaluate the interface and content of the system in supporting the administrator to measure the
client network performance over LAN. It is inappropriate to generalize the findings as only two
devices, but it has been demonstrated that the QChceck system is well accepted.
Moreover, the chapter proposed recommendation to support efficiency, effectiveness and
satisfaction system to obtain for administrator to do their measuring to the network performance
over LAN.
REFERENCE
Batten, K. Saraf, A., and Treptin, S. (2001). A secure peer-to-peer backup system, December.
Bahl, P. and Padmanabhan, V. (2000). Radar: An in-building rfbased user location and tracking
system, in Proceedings of the IEEE International Conference on Computer Communications
(INFOCOM), pp. 775–784.
Cox and Noble (2002). Pastiche: Making backup cheap and easy. In In Proceedings of Fifth
Usenix Symposium on Operating Systems Design and Implementation.
Elnahrawy, E., Li, X. and Martin, R. (2004). The limits of localization using signal strength: A
comparative study,” in Proceedings of the First IEEE International Conference on Sensor and
Ad hoc Communcations and Networks (SECON 2004), pp. 406–414.
Jorge Cardoso; Amit Sheth; John Miller; Jonathan Arnold; Krys Kochut (2004). Quality of
Service for Workflows and Web Service Processes, 004,
(http://lsdis.cs.uga.edu/library/download/CSM+QoS-WebSemantics.pdf).
Johnson, J. (1998). Network Security Programs: Process and Metrics for the Real-World, White
paper, Internet Security Systems, Inc.
Kwok, T., Nguyen, T., Lam, L., & Roy, K. (2004). An Efficient and Systematic Method to
Generate XSLT Stylesheets for Different Wireless Pervasive Devices, ACM 1-58113-912-8,
New York, USA.
Krishnan, R., Allman, M., Partridge, C., & Sterbenz, J. (2002). Explicit transport error
notification (ETEN) for error prone wireless and satellite networks. Technical Report 8333,
BBN Technologies.
Mascolo, S., Grieco, A., Ferorelli, R., Camarda, P., & Piscitelli, G. (2003). Performance
Evaluation of Westwood TCP Congestion Control. Preprint submitted to Elsevier Science.
Mohd D., Nurhayati A. (2006). Performance Evaluation Of TCP/IP Protocol for Mobile Ad Hoc
Network. WSEAS Transactions on Computers, Vol.5, No.7, pp. 1481-1486.
Ramachandran, V., and Nandi, S. (2005). Detecting ARP spoofing: An active technique, Lecture
Notes in COMPUTER SCIENCE 3803, pp.239-250.
Vincenzo, M., Andrea, V., & Alenia, S. (2001). A Framework for Internet QoS Requirements
Definition and Evaluation: an experimental approach. University of Rome “La Sapienza”/
Etnoteam S.p.A.
Xiao, B. and Gao, C. (2006). Detection and localization of sybil nodes in vanets, in Proceedings
of the Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor
Networks (DIWANS).
Hayder, J., Zuriati Z , Mohamed, O. (2009). Fairness of the tcp-based new aimd congestion
Control algorithm. Journal of Theoretical and Applied Information Technology.
Emmanuel, L., Laurent, D., and Guillaume, J. (2007). gTFRC, a TCP friendly QoS-aware Rate
Control for DiffServ Assured Service. National ICT Australia Ltd, Australia, 2 ENSICA -
LAAS/CNRS, France.
Stefan, K., Michael, M., & Norbert, V. (2001). Analytic Performance Evaluation of the RED
Algorithm for QoS in TCP/IP Networks. 9th IFIP Conference on Performance Modeling And
Evaluation Of ATM & IP Networks 2001, Budapest.
Mascolo, S., Grieco, A., Ferorelli, R., Camarda, P., & Piscitelli, G. (2003). Performance
Evaluation of Westwood+ TCP Congestion Control. Preprint submitted to Elsevier Science.
2003.
Stevens, W. (1997). “RFC2001: TCP slow start, congestion avoidance, fast retransmit, and fast
recoveryalgorithms.” http://www.ietf.org/rfc/rfc2001.txt, Jan. 1997.
Braden, B., Clark, D., & Crowcroft J. (1998). RFC2309: Recommendations on queue
management and congestion avoidance in the internet. http://www.ietf.org/rfc/rfc2309.txt,
Apr.1998.
Floyd, S., & Jacobson, V. (1993). Random early detection gateways for congestion avoidance,”
IEEE/ACM Transactions on Networking, vol. 1, pp. 397–413, Aug. 1993.
Heinanen, J., Baker, F., Weiss, W., & Wroclawski, J. (1997). RFC2597: Assured forwarding
PHB group.” http://www.ietf.org/rfc/rfc2597.txt, Jan. 1997.
Martin, A. & Carey, W. (2004).An Analysis of TCP Reset Behaviour on the Internet.
Department of Computer Science University of Calgary Calgary, AB, Canada, T2N 1N4.
Barford, P., & Crovella, M. (2000). Critical Path Analysis of TCP Transactions", Proceedings of
ACM SIGCOMM, September 2000.
Chen, Z., Liang-Tien, C., & Bu-Sung L. (2004). DAML-QoS Ontology for Web Services.
ICWS, pp472- 479, 2004.
Bustos, M., Van, H., & Kaeo, M. (2003). Terminology for Benchmarking IPSec Devices", IETF
draft-ietf-bmwg-ipsec-term-02.txt, November 2003.
Geoff, H., (2000). Internet Performance Survival Guide QoS strategies for Multi-service
Networks, Wiley Computer Publishings, 2000.
Kohler, E., Handley, M., & Floyd, S. (2006). Datagram Congestion Control Protocol (DCCP).
Request for Comments 4340, IETF.
Jourjon, G., Lochin, E., Dairaine, L., Senac, P., Moors, T., & Seneviratne, A. (2006).
Implementation and performance analysis of a QoS-aware TFRC mechanism. In: Proc. of
IEEE ICON, Singapore.
Floyd, S., Kohler, E., & Padhye, J. (2006). Profile for DCCP Congestion Control ID 3: TRFC
Congestion Control. Request for Comments 4342, IETF.
Comer, C., & Douglas, E. (2006). Internetworking with TCP/IP, 5E, Prentice Hall: Upper Saddle
River, NJ.
Wang, Y., Chou, L., & Lin, C. (2007). The design and implementation of the NCTUns network
simulation engine. Science Direct, Simulation Modeling Practice and Theory, 2007, 57-81.
Hayder, N., Zuriati, A., Mohamed, O., & Shamala, S. (2008). The TCPBased New AIMD
Congestion Control Algorithm, International Journal of Computer Science and Network
Security, VOL.8 No.10, 2008, 331-338.
Bennett, S., McRobb, S., & farmer, R. (2002). Object-oriented System Analysis and Design 2nd
Edition. UK, McGraw Hill.
Dennis, A., Wixom, B.H., & Tegarden, D. (2005). System analysis and design with UML
version 2.0: an object-oriented approach with UML, 2nd edition. Hoboken, NJ: John Wiley
and Sons, Inc.
Eriksson, H., & Penker, M. (1998). UML Toolkit. USA, John Wiley & Sons, Inc.
Hoffer, J. A., George, J. F & Valacich, J. S. (2002). Modern Systems Analysis and Design (3rd
Edition). Upper Saddle River, New Jersey: Prentice Hall.
Jacobson, I., Christerson, M., Johnsson, P. & Overgaars, G. (2004). Object-oriented Software
Engineering: A Use Case Driven Approach (revised). Harlow, England: Addison-Wesley.
Silva, P.P.D. & Paton, N.W. (2003). UML: The Unified Modeling Language for Interactive
Applications. Retrieved from: http://scholar.google.com/scholar?q=UMLi:%20The
%20Unified%20Modeling%20Language%20for%20Interactive
%20Applications&hl=en&lr=&oi=scholart.
Atanas, R, & Miriam, R. (2006). Static control-flow analysis for reverse engineering of UML
sequence diagrams. 31(1): 96 – 102.
Atle, R. (2008). Extending UML Sequence Diagrams to Model Trust- dependent Behavior with
the Aim to Support Risk Analysis. 197(2): 15-29.
Schmuller, J. (2002). SAMS Teach Yourself UML in Hours . SAMS Publishing, Indiana.