CHAPTER 5 SIMULATION RESULT

advertisement
36 CHAPTER 5
SIMULATION RESULT
In order to have a better network traffic system run in the PT. Bukit Makmur Mandiri
Utama, the author has designed some system that can be implemented in the company.
As the current network system in BUMA has no VLAN, which means that less security
and high broadcast traffic; the author intended to use VLAN, because it is important in
the company to keep the security in each department and to have better network
performance. Author will prove that the new design will have a better result than the
current system. Because of the project is for giving PT. Bukit Makmur Mandiri Utama a
network traffic solution and it is not yet granted by the company itself, the author cannot
add switch by author’s will and cannot change the system in the company, that is why
author choose to have a simulation. Author did a simulation using a Packet Tracer by
made a topology similar with the current topology. The meaning of similar that, author
did not use as many Personal Computer (host / PC) as in the real situation of the
company, but author made it as a parable.
The meaning of parable in the simulation to pretend that:
•
45 - 50 users = 5 users
•
35 - 44 users = 4 users
•
25 - 34 users = 3 users
•
15 - 24 users = 2 users
•
< 15 users = 1 user
37 The reason why author have to pretend the number of personal computer because, it is a
simulation that pretend to be the real system, the system cannot be run using an
application because it is simulated in Packet Tracer, and the look can be so messy if
keep using the real number of Personal Computers in the company. The Simulation is to
do comparison between the current network systems and the design made by author that
use of VLAN implementation and the addition of clustering switch in the PT. Bukit
Makmur Mandiri Utama Network System.
5.1
Simulation Process
As mentioned above that the simulation is being used to simulate the current
network system and the “designed” system. The designed term is the solution
design that author has made. The application that is used for simulation is
CISCO Packet Tracer.
In Packet Tracer, the type of devices has already
provided without need to install the IOS image of the device. There are three
types of devices that are used for simulation in Packet Tracer:
•
Core switch = 2960TT – 24
•
Distribution / Access switch = 2950TT – 24
•
Personal Computer = PC
All those devices will fill the network topology of PT. Bukit Makmur Mandiri
Utama network.
38 5.2
Current Network
The current network of BUMA has no VLAN, so every device in all departments
connects with others. Here is the simulation topology of the current network:
Figure 5.1 Simulation of current network system
IP Address: 192.168.12.11 – 192.168.12.61
The simulation in here represents the current network system in BUMA like in
figure 3.2. In the context of conceptual switch, switch A and switch B are being
the core switch that is connected to the distribution switch. The switch E in here
become a distribution switch and distribute the packet to the switch below it,
which is switch L, switch R, and switch H. The switch M connected to switch L
and switch I connected to switch H.
It can become a problem in the
performance, because there are too many hops for switch M and switch I that
39 they have to pass through switch L and switch H to get access to switch E and
then to switch B; too many hops means less performance.
Each switch representing each division, except for switch G, Y, I and switch O,
P, Q and switch V, W that handle 1 division. In here, all devices use a same
network of IP Address and they connect with others, so less security in the
system because, nobody knows if there is an inside intruders in the company that
can use some application to sniff and look around the data in other division.
High broadcast traffic can occurred because each node broadcasting to others,
there is no broadcast domain. The real data can be seen in the figure 3.3.
5.3
VLAN Simulation
Author has designed the VLAN topology like in the figure 4.4 that there are 3
clustering core switches, which are switch A, switch B, and switch E. The
distribution switches that connected will follow them to the ports of switch.
Here is the VLAN topology that is simulated using Packet Tracer:
Figure 5.2 VLAN Simulation
40 Figure 5.3 Show VLAN Brief (Switch A)
Figure 5.4 Show VLAN Brief (Switch B)
41 Figure 5.5 Show VLAN Brief (Switch E)
In the Figure 5.2 above, there is only core switch and distribution switch, this
design minimize the number of hops that previously occurs in the existing
system of the Switch E to improve the performance of the traffic. The VLAN
that has been configured makes no division can have connection to other
divisions, in other words no connection in every division that makes the security
inside the network system more secure. With VLAN implemented, it will helps
administrator to manage the broadcast domains, no high broadcast traffic in the
network traffic that previously dominate the total traffic in BUMA.
5.4
Discussion of the Result
After the topology has been designed and put into the Packet Tracer. The author
configured the workstation/devices into a right configuration; one with no VLAN
and just connecting all devices and one with VLAN and clustering switch. All
the devices has been configured correctly, except for the clustering switch.
Simulation using Packet Tracer has some limitation that need to be faced. In
Packet Tracer, author cannot configure the clustering switch because of the type
42 of switch available not supported clustering. The unsupported switch because of
clustering need higher version of Cisco Catalyst, which is 3500XL while in the
packet tracer, the highest version of the available switch is 2960TT; that is why
the clustering cannot be simulated.
First thing that is done to measure the speed of connection of other device in
Packet Tracer by using ping. Author choose the PC32 to ping PC36 because,
they are in the same IT VLAN and to have a comparison between the ping based
on figure 5.1 and figure 5.2 The command to do the ping in here is: “ping –t ip
address". Here are the screenshots of ping from PC32 to PC36:
Figure 5.6 Ping in the existing network
43 Figure 5.7 Ping in the VLAN network
The result of statistic can be seen that ping in the VLAN network is faster than
ping in the existing network, which means that VLAN improve the performance
of the network traffic [21].
5.4.1 Fault If Condition
In this fault if condition, author will test the benefit of using clustering switch,
that can back up the work of other switch if one switch is fail or overload or goes
down [22]. To simulate this condition, author made a new topology, because
there is no clustering and it is made like a mesh topology, because the concept of
work quite same between the use of mesh topology and clustering switch, even
though in real life, clustering switch does not need a mesh topology.
44 Author will use six switches and four PCs to simplify the testing, because the
purpose of this simulation just to see how fast that the link can goes back up. If
author used the topology in figure 5.2, the topology can be so mesh up and it will
be hard to be seen and so complex. That is the reason of just choose a simple
topology to test the clustering (mesh).
Figure 5.8 Pretend to be clustering
In the figure above, both switch 5 and switch 6 have 2 VLAN, which are VLAN
10 and VLAN 20. The way it was simulated to test the fault if condition that
author will cut the switch one by one and let see in the ping, how the packet will
react if there is a switch off. The simulation has captured that the route that has
been determined by default that when PC 1 want to go to PC 3 is through switch
5 – switch 2 – switch 3 – switch 6. The route has been determined by default
when PC1 has sent ARP packet to all nodes to determine the link and test how it
will reroute and the time it takes to tell the other nodes about what happen and
try to find a new route back.
45 First fault condition:
In this first fault condition, switch 2 is cut to simulate how the packets will react
with the sudden lost connection to switch 2.
Figure 5.9 Switch 2 cut
Figure 5.10 The ping response
46 Second fault condition:
In this second fault condition, switch 1 that is cut to see how the packets will
react with the lost connection to switch 1.
Figure 5.11 Switch 1 cut
Figure 5.12 Response of switch 1 cut
47 Third fault condition:
In this third fault condition, switch 3 that is cut to see how the packets will react
with the lost connection to switch 3.
Figure 5.13 Switch 3 cut
Figure 5.14 The response of switch 3 cut
48 Fourth Fault Condition:
In this fourth fault condition, switch 4 that is cut to see how the packets will react
with the lost connection to switch 4.
Figure 5.15 Switch 4 Cut
Figure 5.16 The Reply of ping
49 Fifth Fault Condition
In this fifth fault condition, switch 1 and switch 4 are cut to see how the packets
will react with the lost connection to switch 1 and switch 4.
Figure 5.17 Switch 1 and Switch 4 are cut
Figure 5.18 The result of switch 1 and switch 4 cut
50 Sixth Fault Condition
In this sixth fault condition, switch 2 and switch 3 are cut to see how the packets
will react with the lost connection to switch 2 and switch 3. Switch 2 and switch
3 is the determined path from PC 1 to PC 3.
Figure 5.19 Switch 2 and Switch 3 are cut
Figure 5.20 The result of switch 2 and switch 3 cut
51 Seventh Fault Condition
In this fifth fault condition, switch 2 and switch 4 are cut to see how the packets
will react with the lost connection to switch 2, then lost connection to switch 4.
Figure 5.21 Switch 2 and switch 4 are cut
Figure 5.22 The result of switch 2 and switch 4 cut
Download