Network Design, Traffic Modeling, and Performance Analysis Project
VerifiedAdded on 2020/05/11
|33
|2685
|66
Project
AI Summary
This project focuses on designing and analyzing a network for a college organization using the OPNET simulation tool. The design utilizes a star topology with three subnetworks for engineering, research, and administration departments. The assignment details the configuration of routers, node specifications, and traffic modeling, including application profiles for HTTP, FTP, database, and email traffic. Network performance is investigated by analyzing Ethernet delay and application response times, with simulation graphs illustrating the impact of varying traffic intensities. The project provides a comprehensive overview of network design principles, traffic modeling, and performance analysis, demonstrating how to use OPNET to evaluate network behavior and optimize performance. The project includes detailed descriptions of HTTP, FTP, database, and email protocols, and the conclusion summarizes the design, simulation, and analysis processes.

Networking Technologies
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Table of Contents
1. Introduction...................................................................................................................................2
Part-A.....................................................................................................................................................2
2. Network design..............................................................................................................................2
Part-B...................................................................................................................................................11
3. Network Traffic Modelling.........................................................................................................11
Part-C...................................................................................................................................................16
4. Network performance and investigation....................................................................................16
5. Conclusion....................................................................................................................................28
References............................................................................................................................................28
Appendix –A............................................................................................................................................30
1. Introduction...................................................................................................................................2
Part-A.....................................................................................................................................................2
2. Network design..............................................................................................................................2
Part-B...................................................................................................................................................11
3. Network Traffic Modelling.........................................................................................................11
Part-C...................................................................................................................................................16
4. Network performance and investigation....................................................................................16
5. Conclusion....................................................................................................................................28
References............................................................................................................................................28
Appendix –A............................................................................................................................................30

1. Introduction
The whole network will be designed at OPNET. The OPNET is one type of networking
simulation tool. It has many toolsets. The Packet format, Process model, Project window,
Simulation window and node model are the Toolsets of OPNET. The protocol used at the design
is defined by packet format. The simulation window is used for capturing and displaying the
results. The Process model defines the behavior of the network devices. The link connectivity
and Network Topology is defined by the Project window. The nodal model is used for defining
the interface for the network devices. The Network diagram will be designed for the college
organization. The selected organization will be appropriate for the network traffic. The star
topology will be used for designing the network. The network design will be tested. The
Network traffic will be determined with application traffic generated by every department. The
investigation will be done for analyzing the network performance that is affected by link
performance.
Part-A
2. Network design
The network is designed for medium sized company. Three departments such as engineering,
research and administration are designed with different number of users. Each department is
connected with individual router. This network is called as sub network. The three sub networks
are connected with router, which is known as core network. Several topologies are there in
networking design. The star topology is used for designing the required network in college. In
college, the network is needed for many purposes. The administration department in college used
the internet for providing the information of college in the daily updating. They update all the
events happen at the college including placements of college. The Engineering departments used
it for developing the knowledge, searching information related to corresponding subjects. Many
students got benefit of the internet in the college. The research department used it for researching
and innovating new things. The benefit of star topology is when one system in the topology get
failed which is not affect the any other system in the topology.
The whole network will be designed at OPNET. The OPNET is one type of networking
simulation tool. It has many toolsets. The Packet format, Process model, Project window,
Simulation window and node model are the Toolsets of OPNET. The protocol used at the design
is defined by packet format. The simulation window is used for capturing and displaying the
results. The Process model defines the behavior of the network devices. The link connectivity
and Network Topology is defined by the Project window. The nodal model is used for defining
the interface for the network devices. The Network diagram will be designed for the college
organization. The selected organization will be appropriate for the network traffic. The star
topology will be used for designing the network. The network design will be tested. The
Network traffic will be determined with application traffic generated by every department. The
investigation will be done for analyzing the network performance that is affected by link
performance.
Part-A
2. Network design
The network is designed for medium sized company. Three departments such as engineering,
research and administration are designed with different number of users. Each department is
connected with individual router. This network is called as sub network. The three sub networks
are connected with router, which is known as core network. Several topologies are there in
networking design. The star topology is used for designing the required network in college. In
college, the network is needed for many purposes. The administration department in college used
the internet for providing the information of college in the daily updating. They update all the
events happen at the college including placements of college. The Engineering departments used
it for developing the knowledge, searching information related to corresponding subjects. Many
students got benefit of the internet in the college. The research department used it for researching
and innovating new things. The benefit of star topology is when one system in the topology get
failed which is not affect the any other system in the topology.

To design the network with three subnetworks. Here to develop the college organization with
three with three sub parts called Engineering, Research and Administration.
To choose the Application in order to set the application configuration
three with three sub parts called Engineering, Research and Administration.
To choose the Application in order to set the application configuration
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Profile for profile configuration

To set the engineer departments with 25 number of clients

To set the Researcher departments with 25 number of clients
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

To set the Administration departments with 25 number of clients

Set attributes for the Router1.
Set attributes for the Router2.
Set attributes for the Router2.

Set attributes for the Router3.
Node specifications and attributes
The Riverbed modeler permits users to switch the definition of conditions for its nodes by
hopeful the alteration of the node attributes. The features include the traffic generation
parameters includes the bit rate, packet size, and inter-arrival time and packet generation start
time and the Wireless Local Area Network MAC parameters (which includes the MAC address
of the node, the Channel settings, response power threshold and the control packet threshold).
For the multi-beam antenna broadcast, the bottleneck node wants to be cognizant of the
addresses of its response nodes. In order to integrate this capability, hence they can includes
multiple destination addresses as portion of our node model. As the number of destinations
increases, they model the usage of that numerous destination addresses in our nodes.
Node specifications and attributes
The Riverbed modeler permits users to switch the definition of conditions for its nodes by
hopeful the alteration of the node attributes. The features include the traffic generation
parameters includes the bit rate, packet size, and inter-arrival time and packet generation start
time and the Wireless Local Area Network MAC parameters (which includes the MAC address
of the node, the Channel settings, response power threshold and the control packet threshold).
For the multi-beam antenna broadcast, the bottleneck node wants to be cognizant of the
addresses of its response nodes. In order to integrate this capability, hence they can includes
multiple destination addresses as portion of our node model. As the number of destinations
increases, they model the usage of that numerous destination addresses in our nodes.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Part-B
3. Network Traffic Modelling
Types of traffic
The actual traffic
types used by each
group of users
Ethernet Delay – this
represents the end-to-
end delay of all
packets received by
all the stations.
Applications Frequency
It supports frequency
bandwidths of 800,
900, 1800 and 1900
MHz and new
frequency
bandwidths that range
from 800 MHz to
2.62 GHz.
Message Size
To configure the size
of the data message,
but the size of the
control message is
512 bytes, by default.
The effects of the
control messages are
more noticeable when
you are modeling the
transfer of small files,
but have less impact
on the results for a
large file transfers.
1. Traffic Received
(in packets/sec)
by the traffic
sinks across all
nodes
1. Database
application
2. Traffic Sent (in
packets/sec) by
the traffic sources
across all nodes.
2. File transfer
protocol
3. Network Traffic Modelling
Types of traffic
The actual traffic
types used by each
group of users
Ethernet Delay – this
represents the end-to-
end delay of all
packets received by
all the stations.
Applications Frequency
It supports frequency
bandwidths of 800,
900, 1800 and 1900
MHz and new
frequency
bandwidths that range
from 800 MHz to
2.62 GHz.
Message Size
To configure the size
of the data message,
but the size of the
control message is
512 bytes, by default.
The effects of the
control messages are
more noticeable when
you are modeling the
transfer of small files,
but have less impact
on the results for a
large file transfers.
1. Traffic Received
(in packets/sec)
by the traffic
sinks across all
nodes
1. Database
application
2. Traffic Sent (in
packets/sec) by
the traffic sources
across all nodes.
2. File transfer
protocol

3. Client Http -
Traffic Received
(bytes/sec).
3. Hypertext
transfer protocol
4. Global Statistics -
DB Query -
Response Time
(sec).
5. Global Statistics -
HTTP -Page
Response Time
(seconds).
6. Client DB -
Traffic Received
(bytes/sec).
Traffic Received
(bytes/sec).
3. Hypertext
transfer protocol
4. Global Statistics -
DB Query -
Response Time
(sec).
5. Global Statistics -
HTTP -Page
Response Time
(seconds).
6. Client DB -
Traffic Received
(bytes/sec).

To set the server for accessing all branches. The below screenshot shows the application
supported services provides the service for the branches.
The Main router performed all operations for sending and receiving the information from one
branches to another.
supported services provides the service for the branches.
The Main router performed all operations for sending and receiving the information from one
branches to another.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Set the cloud for internet purpose because these networks are wireless.
After configuration is done then choose individual DES statistics
After configuration is done then choose individual DES statistics

To choose what are all the applications are needed.

The below screenshot shows the setting IP address for the system
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Part-C
4. Network performance and investigation
The connection between network configurations and its performance is investigated using the
simulation graph. The bandwidth is changed according to the given requirement by adding the
different application traffic intensity for the application server. The delay is measured for the
changed bandwidth. The following screenshots shows the network performances after adding the
application traffic to the system.
HTTP
HTTP stands for Hyper Text Transfer Protocol. It is one of the Underlying Protocol. It
could be used by a WWW (World Wide Web).This protocol is used for defining how the
messages are transmitted and formatted. And also it defines what all actions are taken by web
servers and browsers to provide the response for the different commands. If one could be typing
URL in the browser that sends the HTTP command to the web server for showing the web page.
The HTTP is one of the stateless protocol. The each command in the HTTP is executed
independently for that reason only it is known as stateless protocol. It is the Application
Protocol. It is used for hypermedia data systems and distributed collaborative. It is the base for
data communication. The hypertext is a Structured Text. It used the logical links among nodes.
FTP
FTP stands for File Transfer Protocol. It is the standard Internet Protocol. It is used for
transmitting files among the computers in the internet at the TCP/IP connections. The FTP is a
client server protocol. It depend on the two public services channels among the server and client.
The command channel is used for controlling a conversation. The data channel is used for
Transmitting File information content. With the help of FTP, the client gives the request for the
server to download the file. And also the client has a capacity to download, delete, rename,
move, upload and copy the files from the server. The FTP is worked in two models that are
active and passive models. At the Active Mode, after starting the session by client through
Command Channel Request, The server starts the Information Connection Back for a client. And
initiates the transferring data process. At Passive Mode, The server used a command channel for
4. Network performance and investigation
The connection between network configurations and its performance is investigated using the
simulation graph. The bandwidth is changed according to the given requirement by adding the
different application traffic intensity for the application server. The delay is measured for the
changed bandwidth. The following screenshots shows the network performances after adding the
application traffic to the system.
HTTP
HTTP stands for Hyper Text Transfer Protocol. It is one of the Underlying Protocol. It
could be used by a WWW (World Wide Web).This protocol is used for defining how the
messages are transmitted and formatted. And also it defines what all actions are taken by web
servers and browsers to provide the response for the different commands. If one could be typing
URL in the browser that sends the HTTP command to the web server for showing the web page.
The HTTP is one of the stateless protocol. The each command in the HTTP is executed
independently for that reason only it is known as stateless protocol. It is the Application
Protocol. It is used for hypermedia data systems and distributed collaborative. It is the base for
data communication. The hypertext is a Structured Text. It used the logical links among nodes.
FTP
FTP stands for File Transfer Protocol. It is the standard Internet Protocol. It is used for
transmitting files among the computers in the internet at the TCP/IP connections. The FTP is a
client server protocol. It depend on the two public services channels among the server and client.
The command channel is used for controlling a conversation. The data channel is used for
Transmitting File information content. With the help of FTP, the client gives the request for the
server to download the file. And also the client has a capacity to download, delete, rename,
move, upload and copy the files from the server. The FTP is worked in two models that are
active and passive models. At the Active Mode, after starting the session by client through
Command Channel Request, The server starts the Information Connection Back for a client. And
initiates the transferring data process. At Passive Mode, The server used a command channel for

sending the client data that is needed to open the information channel. The Client begins entire
connections in the passive mode.
The FTP is used in graphical FTP clients and web browser. The Graphical FTP clients
reduce process of file transfer. This process is reduced like drag and drop the file icons among
the windows. The FTP has two common programs that are cyber duck and WinSCP. The cyber
duck is used for Mac operating system and the WinSCP is used for windows. The web browser is
used for connecting FTP Addresses with HTTP addresses. The use of web browser in FTP
transfer reduce the process of browsing large read, retrieve and directories files.
Data Base
The Data Base model is the structure of the database. Three kinds of data base model is there,
that are network database model, hierarchical database model and relational database model. The
network Data Base model is one type of data base model. It permits several records to be
connected with the same file. The network Data Base model is a many to many relationship
model. The files in network data base model is commonly related. One could access the network
Data Base Model in any Table Record at the Data Base. It is flexibility, so it is easier for
navigation and searching information. But it is difficult to the first time users.
Email
Normally, Email used the two kinds of protocols. The protocols are push and pull protocol.
These protocols are used for accessing the users to receive and send the mails. The SMTP
(Simple Mail Transfer Protocol) is used for transferring the mails among the users and mail
severs. The push mail is also known as transferring mail. The MAA (Mail Access Agent
protocols such as POP3 and IMAP is used to retrieve the pulling mails from a local servers.
Entire Email protocols used the transmission Congestion protocol as the fundamental Transport
Layer Protocol.
connections in the passive mode.
The FTP is used in graphical FTP clients and web browser. The Graphical FTP clients
reduce process of file transfer. This process is reduced like drag and drop the file icons among
the windows. The FTP has two common programs that are cyber duck and WinSCP. The cyber
duck is used for Mac operating system and the WinSCP is used for windows. The web browser is
used for connecting FTP Addresses with HTTP addresses. The use of web browser in FTP
transfer reduce the process of browsing large read, retrieve and directories files.
Data Base
The Data Base model is the structure of the database. Three kinds of data base model is there,
that are network database model, hierarchical database model and relational database model. The
network Data Base model is one type of data base model. It permits several records to be
connected with the same file. The network Data Base model is a many to many relationship
model. The files in network data base model is commonly related. One could access the network
Data Base Model in any Table Record at the Data Base. It is flexibility, so it is easier for
navigation and searching information. But it is difficult to the first time users.
Normally, Email used the two kinds of protocols. The protocols are push and pull protocol.
These protocols are used for accessing the users to receive and send the mails. The SMTP
(Simple Mail Transfer Protocol) is used for transferring the mails among the users and mail
severs. The push mail is also known as transferring mail. The MAA (Mail Access Agent
protocols such as POP3 and IMAP is used to retrieve the pulling mails from a local servers.
Entire Email protocols used the transmission Congestion protocol as the fundamental Transport
Layer Protocol.

Set the duration for simulation process
After set the duration then run the simulation widow, it shows the status as simulation
completed.
After set the duration then run the simulation widow, it shows the status as simulation
completed.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Then produce the corresponding result browser window, to click it.
The below the screenshot shows the current project and scenario is running.
The below the screenshot shows the current project and scenario is running.

To click the rectangular box to generate the graph
Choose view results at the work place, to show the simulation results.
Choose view results at the work place, to show the simulation results.

Global statistics
FTP application
FTP application
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

HTTP application
Email application
Email application

Database application
Ethernet delay
Ethernet delay

Node statistics
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

FTP Server
HTTP Server
HTTP Server

E-Mail Server
Data Base Server
Data Base Server

5. Conclusion
The network diagram is designed at OPNET. The Web, FTP and Database is connected to the
Ethernet switch. Three sub network is used for designing the network. The network is designed
with application and profile configuration. The network traffic is generated for the applications
such as FTP, HTTP, Email and Web. The graph is simulated for the all profiles in the network.
By adding network traffic to the design some variations are occurred in the design, which is
displayed at the graph. The network diagram is designed according to the requirement.
References
Cabaj, K., Gregorczyk, M. and Mazurczyk, W. (2017). Software-defined networking-based
crypto ransomware detection using HTTP traffic characteristics. Computers & Electrical
Engineering.
Dean, T. (2013). Network+ guide to networks. Boston, Mass.: Course Technology/Cengage
Learning.
El-din, S., Farah, E., Babiker, A. and Mustafa, N. (2017). Performance Evaluation and
Comparisons for FTP Protocol over WLAN IEEE 802.11 n and Ethernet Technologies
IEEE 802.3.
Ethernet Technologies IEEE 802.3 Performance over VoIP Network Using OPNET Simulator.
(2015). International Journal of Science and Research (IJSR), 4(12), pp.499-501.
Gao, L. and Wu, Z. (2013). Performance Analysis of MAC in VDL2 Based on OPNET
Simulation. Applied Mechanics and Materials, 385-386, pp.1643-1646.
Gupta, E. and Kaur, E. (2010). Comparative Throughput of WiFi and Ethernet LANs using
OPNET MODELER. International Journal of Computer Applications, 8(6), pp.6-9.
Hawa, M. (2013). An OPNET simulation model for peer-to-peer networks. SIMULATION,
89(8), pp.1009-1019.
Heidemann, J., Obraczka, K. and Touch, J. (1997). Modeling the performance of HTTP over
several transport protocols. IEEE/ACM Transactions on Networking, 5(5), pp.616-630.
The network diagram is designed at OPNET. The Web, FTP and Database is connected to the
Ethernet switch. Three sub network is used for designing the network. The network is designed
with application and profile configuration. The network traffic is generated for the applications
such as FTP, HTTP, Email and Web. The graph is simulated for the all profiles in the network.
By adding network traffic to the design some variations are occurred in the design, which is
displayed at the graph. The network diagram is designed according to the requirement.
References
Cabaj, K., Gregorczyk, M. and Mazurczyk, W. (2017). Software-defined networking-based
crypto ransomware detection using HTTP traffic characteristics. Computers & Electrical
Engineering.
Dean, T. (2013). Network+ guide to networks. Boston, Mass.: Course Technology/Cengage
Learning.
El-din, S., Farah, E., Babiker, A. and Mustafa, N. (2017). Performance Evaluation and
Comparisons for FTP Protocol over WLAN IEEE 802.11 n and Ethernet Technologies
IEEE 802.3.
Ethernet Technologies IEEE 802.3 Performance over VoIP Network Using OPNET Simulator.
(2015). International Journal of Science and Research (IJSR), 4(12), pp.499-501.
Gao, L. and Wu, Z. (2013). Performance Analysis of MAC in VDL2 Based on OPNET
Simulation. Applied Mechanics and Materials, 385-386, pp.1643-1646.
Gupta, E. and Kaur, E. (2010). Comparative Throughput of WiFi and Ethernet LANs using
OPNET MODELER. International Journal of Computer Applications, 8(6), pp.6-9.
Hawa, M. (2013). An OPNET simulation model for peer-to-peer networks. SIMULATION,
89(8), pp.1009-1019.
Heidemann, J., Obraczka, K. and Touch, J. (1997). Modeling the performance of HTTP over
several transport protocols. IEEE/ACM Transactions on Networking, 5(5), pp.616-630.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Ismail, M. (2009). Implementation of Video Voice over IP in Local Area Network Campus
Environment. International Journal of Computer and Electrical Engineering, pp.15-19.
Kim, K., Lee, C., Shin, S., Roh, B., Roh, B. and Han, M. (2016). Effective Routing Protocol
Implementation Framework on Riverbed (OPNET) Modeler and its Example for
AntHocNet. The Journal of Korean Institute of Communications and Information Sciences,
41(8), pp.974-985.
Mekkanen, M., Antila, E., Virrankoski, R. and Elmusrati, M. (2017). Using OPNET to Model
and Evaluate the MU Performance Based on IEC 61850-9-2LE.
Performance Evaluation and Comparisons for FTP Protocol over WLAN IEEE 802.11 n and
Ethernet Technologies IEEE 802.3. (2015). International Journal of Science and Research
(IJSR), 4(12), pp.502-504.
Rahman, M. and Mto, A. (2013). Investigation of Bandwidth Requirement of Smart Meter
Network Using OPNET Modeler. Smart Grid and Renewable Energy, 04(04), pp.378-390.
Shin, S. and Yoon, M. (2012). Virtual vectors and network traffic analysis. IEEE Network,
26(1), pp.22-26.
Su, H. and Wang, L. (2013). Design on the Network Model of Cloud Computing Based on
P2P. Advanced Materials Research, 756-759, pp.1605-1609.
Sun, R. (2011). The Design of Enterprise Network Monitoring System in Ethernet
Environment. Applied Mechanics and Materials, 66-68, pp.2291-2297.
Sun, Y., Sun, Y., Xu, P. and Liu, H. (2013). Performance Analysis of Wireless Sensor Network
Based on OPNET. Communications and Network, 05(03), pp.512-516.
T.Alisa, Z. (2013). Evaluating the Performance of Wireless Network using OPNET
Modeler. International Journal of Computer Applications, 62(13), pp.22-28.
Wang, K. and Gan, L. (2014). Design and Implementation of Router Based on Wireless Sensor
Network. Applied Mechanics and Materials, 608-609, pp.499-502.
Environment. International Journal of Computer and Electrical Engineering, pp.15-19.
Kim, K., Lee, C., Shin, S., Roh, B., Roh, B. and Han, M. (2016). Effective Routing Protocol
Implementation Framework on Riverbed (OPNET) Modeler and its Example for
AntHocNet. The Journal of Korean Institute of Communications and Information Sciences,
41(8), pp.974-985.
Mekkanen, M., Antila, E., Virrankoski, R. and Elmusrati, M. (2017). Using OPNET to Model
and Evaluate the MU Performance Based on IEC 61850-9-2LE.
Performance Evaluation and Comparisons for FTP Protocol over WLAN IEEE 802.11 n and
Ethernet Technologies IEEE 802.3. (2015). International Journal of Science and Research
(IJSR), 4(12), pp.502-504.
Rahman, M. and Mto, A. (2013). Investigation of Bandwidth Requirement of Smart Meter
Network Using OPNET Modeler. Smart Grid and Renewable Energy, 04(04), pp.378-390.
Shin, S. and Yoon, M. (2012). Virtual vectors and network traffic analysis. IEEE Network,
26(1), pp.22-26.
Su, H. and Wang, L. (2013). Design on the Network Model of Cloud Computing Based on
P2P. Advanced Materials Research, 756-759, pp.1605-1609.
Sun, R. (2011). The Design of Enterprise Network Monitoring System in Ethernet
Environment. Applied Mechanics and Materials, 66-68, pp.2291-2297.
Sun, Y., Sun, Y., Xu, P. and Liu, H. (2013). Performance Analysis of Wireless Sensor Network
Based on OPNET. Communications and Network, 05(03), pp.512-516.
T.Alisa, Z. (2013). Evaluating the Performance of Wireless Network using OPNET
Modeler. International Journal of Computer Applications, 62(13), pp.22-28.
Wang, K. and Gan, L. (2014). Design and Implementation of Router Based on Wireless Sensor
Network. Applied Mechanics and Materials, 608-609, pp.499-502.

Yi, T. (2013). OPNET Network Simulations Based on the Performance of WLAN
IEEE802.11. Applied Mechanics and Materials, 385-386, pp.1651-1654.
Appendix –A
The abbreviation of OPNET is an Optimized Engineering Tools. The OPNET is a
simulator tool. It is used to simulate the performance and behavior of network. The difference of
OPNET from the other simulators is versatility and power. It is used for working with all layer of
OSI model.
OPNET Technologies released the first software called as OPNET Modeler. By using
this software, the R&D method is enhanced resultant to design and easy analysis of
Communication Networks, protocols, devices, and application. This networking software is also
compatible with 32-bit or 64-bit platforms and has an open interface for easy integration of
libraries, external object files and other network simulators.
The below screenshots are show the how to install OPNET Riverbed modeler.
IEEE802.11. Applied Mechanics and Materials, 385-386, pp.1651-1654.
Appendix –A
The abbreviation of OPNET is an Optimized Engineering Tools. The OPNET is a
simulator tool. It is used to simulate the performance and behavior of network. The difference of
OPNET from the other simulators is versatility and power. It is used for working with all layer of
OSI model.
OPNET Technologies released the first software called as OPNET Modeler. By using
this software, the R&D method is enhanced resultant to design and easy analysis of
Communication Networks, protocols, devices, and application. This networking software is also
compatible with 32-bit or 64-bit platforms and has an open interface for easy integration of
libraries, external object files and other network simulators.
The below screenshots are show the how to install OPNET Riverbed modeler.

Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser


1 out of 33
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.