Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET
Computer networks need protocols to govern all transmission and presentation processes. The transmission control protocol (TCP) is one of the most important protocols that have the compatibility to work with all types of computer networks, overcoming all architectural and operating system differences. Nowadays, networks depend on the TCP protocol to control data flow between all types of connected computers, whether it is client or server, over any type of media whether it is wired or wireless networks, for all network topologies. A simulation of a university campus network has been conducted to determine TCP protocol features; those features are taken into consideration as one of the most important network parameters. In all digital networks, the data transmission is not a continuous transmission – instead, it is a discreet transmission, presenting itself as packets. These packets transfer and propagate within the network between computers, and network nodes using the TCP protocol depending on the address, which is embedded in its header. TCP has a great influence on the network speed. The network simulator OPNET provides an easy way of campus design, predicting, and estimating the performance of networks in a university campus environment. In this research, wired
connections reach all computer network users at fixed points to maintain higher Mbps and ensure reliable communications between all the campus network nodes, as well as to increase the overall network performance taking into account the future expansions for the university campus network design.
Ali, A. A. A., Vassilaras, S. & Ntagkounakis, K. (2009). A Comparative Study of Bandwidth Requirements of VoIP Codecs Over WiMax Access Networks. Third International Conference. pp. 197-203.
Barznji, A. O., Rashid, T. A. & Al-Salihi, N. K. (2018). Computer network simulation of firewall and VoIP performance monitoring. International Journal of Online Engineering (iJOE), 14(9), 2-3.
Dong, J., Curtmola, R., Sethi, R. & Nita-Rotaru, C. (2008). Toward Secure Network Coding in Wireless Networks; Threats and Challenges. IEEE 4th Workshop on Secure Network Protocol.
Evangelista, J. E. N., Paulicena, E. H., Silva, R. A. & Anzaloni, A. (2014). Analysis of energy consumption using HTTP and FTP protocols over IEEE 802.11. IEEE Journals and Magazines, 12, 668-674.
Hagen, J. T. & Mullins, B. E. (2013). TCP Veto: A Novel Network Attack and its Application to SCADA Protocols. IEEE PES Innovative Smart Grid Technologies Conference.
Kotz, D. & Essein, K. (2002). Analysis of a Campus-Wide Wireless Network. New York: IEEE Computer Society Press.
Le, T., Kuthethoor, G., Hansupichon, C., Sesha, P., Strohm, J., Hadynski,G., Kiwior, D. & Parker, D. (2009). Reliable User Datagram Protocol for Airborne Network. IEEE Symposium on Computer. p. 1-6.
Nassar, S., El-Sayed, A. & Aiad, N. (2010). Improve the Network Performance by Using Parallel Firewalls. Beijing: IEEE Inc. p. 1-5.
Pawlikowski, K., Jeong, H. D. & Lee, J. S. (2002). The Credibility of Simulation Studies of Telecommunication Networks. IEEE Communications Magazine.
Rashid, T. A. & Barznji, A. O. (2018). A virtualized computer network for salahaddin university new campus of HTTP services using OPNET simulator. In: Auer, M. & Zutin, D, (Eds). Online Engineering and Internet of Things. Vol. 22. Kurdistan: Springer.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).