Network LAB 3 Prepared by: Eng. Mennatallah Hesham Uder Supervision of: Dr. Nermeen Hamza Dr. Iman Fahmy.

Slides:



Advertisements
Similar presentations
Topology The physical topology of a network refers to the configuration of cables, computers and other peripherals. The main types of network topologies.
Advertisements

Customizing the MOSS 2007 Search Results November 2007 Rafael Perez.
ALEPH Networked GUI Scenarios for now and the future Theo Engelman Senior ICT consultant Utrecht University Library (Netherlands)
Performance analysis and Capacity planning of Home LAN Mobile Networks Lab 4
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Window NT Workstation and Server. Windows NT refers to two products workstation server can act as both a client and server in a network environment.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Inventory Throughout this slide show there will be hyperlinks (highlighted in blue) follow the hyperlinks to navigate to the specified Topic or Figure.
Intro - Outlook Show Graphics of Outlook Using Outlook Folders Outlook Web Access Contacts Calendar.
Working with SharePoint Document Libraries. What are document libraries? Document libraries are collections of files that you can share with team members.
Building and managing class pages on our new Web site School Wires Training.
BASIC NETWORK CONCEPTS (PART 6). Network Operating Systems NNow that you have a general idea of the network topologies, cable types, and network architectures,
Module 5: Managing Public Folders. Overview Managing Public Folder Data Managing Network Access to Public Folders Publishing an Outlook 2003 Form Discussion:
Xcode Presentation Tom Pletzke. Creating App from template Launch Xcode Select Tabbed Application.
Classroom User Training June 29, 2005 Presented by:
Multiple Cases Access Utilities1 Access & ODBC Managing and Using ODBC Connections P.O. Box 6142 Laguna Niguel, CA
1 Guide to Novell NetWare 6.0 Network Administration Chapter 11.
Database Applications – Microsoft Access Lesson 9 Designing Special Queries Updated 4/11.
Database Applications – Microsoft Access Lesson 9 Designing Special Queries.
Lab How to Use WANem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
10-1 aslkjdhfalskhjfgalsdkfhalskdhjfglaskdhjflaskdhjfglaksjdhflakshflaksdhjfglaksjhflaksjhf.
Lecture Note 9: Introduction to the MS Access
Introduction to the WebBoard Terry Dennis. The WebBoard - Our Connection The WebBoard URL is
| | Tel: | | Computer Training & Personal Development Outlook Express Complete.
IT 211 Project Integration and Deployment Lab #11.
Teaching with OPNET Software
Special Project Group 03 Chintan Shah Nisharg Patel Cynthia York.
Creating a Web Site to Gather Data and Conduct Research.
Installing Ricoh Printers There are two basic steps: 1. Acquire the drivers. 2. Use the Windows Add Printer Wizard to install the drivers within the operating.
MLC CAD Systems Introducing… Presented by: John McCord How to customize.
MagicInfo Pro Scheduler Now that a template has been created from content imported into the Library, the user is ready to begin scheduling content to.
General Systems Information ALEPH v20.01 Library Staff Training © South Dakota Library Network, 2013 ©Ex Libris (USA), 2011 Modified for SDLN Version
1 Data Bound Controls II Chapter Objectives You will be able to Use a Data Source control to get data from a SQL database and make it available.
TIMES 3 Technological Integrations in Mathematical Environments and Studies Jacksonville State University 2010.
Chapter 8: Virtual LAN (VLAN)
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions.
® IBM Software Group © 2006 IBM Corporation “Essential” HTML Tags and Page Development Techniques This Learning Module describes the standard HTML tags.
1 NetInsight Demonstration 10 October 2007
HTML Concepts and Techniques Fifth Edition Chapter 6 Using Frames in a Web Site.
Version How to Use Packet Tracer MarinaMD.
How to Run a Scenario In HP LoadRunner >>>>>>>>>>>>>>>>>>>>>>
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
Workflows II: Collect feedback for a file How to collect feedback Collecting feedback for a file can be challenging. However, if you save a file to a document.
Confidential Web Ordering Overview. Confidential LOG ON:   Enter your login name &
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
Network design Topic 2 Existing network infrastructure.
Administering Microsoft Windows Server 2003 Chapter 2.
Tutorial for Circulation Staff FIU Library
Contract Invoice Guide
When you run a scenario, the Vusers on each host machine use the host’s IP address. You can define multiple IP addresses on a host machine to emulate a.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
ContentXXL.NET CMS SPC2007 Step-By-Step.  Overview  View Data from SharePoint  SharePoint configuration  contentXXL configuration  Using a Webservice.
VB.NET and Databases. ADO.NET VB.Net allows you many ways to connect to a database. The technology used to interact with a database or data source is.
PowerGrade Training PowerPoint Lakeland School Corporation August 2008.
Data Network Designing and Evaluation
Performance Evaluation of Ethernet Networks under different Scenarios Lab 6
Copyright © 2014 Pearson Canada Inc. Ext. 5b-1 Copyright © 2014 Pearson Canada Inc. Application Extension 5b Using Microsoft Access Part 2: Using Information.
Lab Assignment Mobile Networks Lab 3
Graphical Data Engineering
How to add a network printer in Windows 7
Modeling Networks Last Update
Introduction to Opnet Mobile Networks Introduction to Opnet
Daisy Chain Versus Collapsed Backbone Architecture
Multi-host Internet Access Portal (MIAP) Enhancement Guide
Exploring Microsoft® Access® 2016 Series Editor Mary Anne Poatsy
A Network Operating System Edited By Maysoon AlDuwais
What is StudentWeb? In StudentWeb you can access:
What is StudentWeb? In StudentWeb you can access:
Presentation transcript:

Network LAB 3 Prepared by: Eng. Mennatallah Hesham Uder Supervision of: Dr. Nermeen Hamza Dr. Iman Fahmy

Agenda What is applications and profiles? Create a new network Run statistics and view results Compare results

Applications and Profiles Two boxes that do not represent physical components The Applications node contains data about the applications used in the network, such as Web browsing. More specifically, traffic is associated with each application, so there is a difference between “light Web browsing” and “heavy Web browsing.” In the Profiles icon, different applications are associated with different PCs.

Let’s Create a New Network Step 1: Launch IT Guru and create a new projectn “hub_switch_project”. Step 2: Create a scenario “hub_scenario”. Later we will add another scenario into the same project “switch_scenario”. Step 3: Choose the default model library and default scenario dimensions. Step 4: Drag five Ethernet workstations and a Server into the construction area and connect them up with the aid of a hub.

Let’s Create a New Network Step 5: Add profile and application nodes. Step 6: Open the attributes window for application node, rename it to “applications” and select “Default” for the Application Definitions row. This makes all standard network applications available for use in our topology – HTTP, FTP, , Database, etc. Step 7: We will create a custom profile – web application user profile – let us call the profile “web user.” To get there, go under the edit box – attributes window - for the profile.

Let’s Create a New Network Step 8: Go to profile configuration and select “edit”. Step 9: Under Profile Name change the name to “Web User”. Step 10: Change the entry under Repeatability column to “unlimited”.

Let’s Create a New Network Step 11: Under Applications select edit and a new window pops out – this is the Applications Table window. Here we will select an application that will be associated with the Web User profile. Step 12: Select row 1 and pick “web browsing heavy”.

Let’s Create a New Network Step 13: Close all open windows. At this stage we have created a new profile called “Web User” and this profile can be applied in our topology.

Let’s Create a New Network Step 14: Apply the profile “Web User” to all the workstations. This can be conveniently done by holding the control key down and selecting all five workstations and then making the appropriate change in the attribute window of any ONE workstation. One must make sure that the “Apply changes to selected objects” is checked on however in the attribute window of the workstation.

Let’s Create a New Network The profile is applied by first opening the Applications tree. In the row entry for Application Supported Profiles select edit. A new window opens – Supported Profiles window – here go to row 1 and select Web User.

Let’s Create a New Network Step 15: Proceed to configuring the server. Select edit attributes, open the Applications tree and go to the Application Supported Services row. Select edit. A new window the “Applications Services Table window” opens up. Select row 1 and choose web browsing heavy.

Run and View Results Step 16: Choose the statistics that ought to be collected during a simulation run and then run the simulation and view result.

Compare Results Use Switch instead of Hub and compare results (Try it by yourself)

Assignment 2 The First Bank of Paradise’s Operations building has 10 floors, each having many users connected to a 10Base-T workgroup switch in the floor’s telecommunications closet. The users share an Oracle server and seven file and print servers in the basement.

Assignment 2 In Scenario 1, the switches on each floor are daisy chained to the core switch in the basement. We will see that this daisy chain approach introduces high application latency to users on the highest floor.

Assignment 2 In Scenario 2, the daisy chain topology is retained, but the core switch is moved to the fifth floor. We will see that this reduces latency on the highest floor but increases it on the bottom floor.

Assignment 2 In Scenario 3, the core switch is kept in the basement, but a collapsedbackbone topology is used, in which the core switch in the basement is linked directly to the workgroup switch on each floor.

Assignment 2 Compare the “response time” of “95 Users Floor 10”, “50 Users Floor 5” and “70 Users Floor 1” Hint: Expand Requesting Client Custom Application and select Application Response Time (sec).

Assignment 2 Prepare a brief report giving your conclusions and determining which scenario will achieve the same application performance for all the users.