OPNET
OPNET
Session Goals
Learn the basics of using Modeler through a combination of lectures and labs Learn and practice Modeler methodologies and use cases Learn how to create new
Processes Nodes Packets Links Networks
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
Class Format
Lots of material to cover, so class will move quickly Half lecture; half lab Conference proceedings will be available on website Class is interactive; dont hesitate to ask questions Prerequisites Ability to understand C or C++ Basic understanding of networks
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
Course Outline
Introduction Overview Events and event list concepts Packets Network modeling Node modeling Link modeling Running a simulation Process modeling Analyzing and publishing results Additional features and modules Conclusion
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
Solution Portfolio
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
Introduction: Agenda
Methodology and Workflow OPNET Hierarchy
Network Node Process
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
Simulation Methodology
Start
No
Specifying the system model Choosing input and running simulations System results accurate? Results sufficiently detailed? No
Yes
No
End
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
Duplicate scenario
Make changes Re-run simulation Compare results
Iterate
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
10
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
11
Links represent point-to-point and bus links Icons assist the user in quickly locating the correct nodes and links Vendor models are distinguished by a specific color and logo for each company
Generic Devices Vendor Devices
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
12
Subnets
Organize network components Represent actual network physical constructs Has no behavioral aspects Logical, Stationary, mobile, or satellite
Subnet Types
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
13
Annotation Palette
Open by selecting Topology / Open Annotation Palette Add rectangles, circles, lines and text to models to enhance their appearance This method is an effective way to graphically illustrate and document the changes made to a model Does not affect analysis Annotations can be temporarily hidden
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
14
Zooming
Zoom to Rectangle button on the Project Editor toolbar allows the user to define a rectangular area to magnify Zoom to Previous button returns the workspace to the previous magnification level Mouse Scroll Wheel or Page-Up and Page-Down keys for small increments Right-click on the workspace to open the workspace pop-up menu
Zoom in Zoom to all Zoom out Zoom to selection Zoom to window
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
15
Node Domain
Basic building blocks (modules) include processors, queues, and transceivers
Processors are fully programmable via their process model Queues also buffer and manage data packets Transceivers are node interfaces
Receiver Processor
Queues
Transmitters
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
16
Process Domain
Process model components
State transition diagrams Blocks of C code OPNET Kernel Procedures (KPs) State variables Temporary variables
A process is an instance of a process model Processes can dynamically create child processes Processes can respond to interrupts
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
17
Simulation Output
Three kinds of output
Vectors List of time-value pairs Scalars List of values dependent on parametric input Not plotted vs. time Animations Packet flows Node movements Output to 3DNV
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
18
Lab: Workspace
Go to lab book Practice navigating the project editor
Navigate the project project_environment_ref Load a map Explore the network Navigate subnets Practice zooming features Examine attributes of devices
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
19
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
20
Event-Driven Simulation
Events are specific activities that occur at a certain time OPNET simulations are event-driven Simulation time advances when an event occurs A different method might be to sample at regular intervals
Disadvantages Accuracy of results is limited by the sampling resolution Simulation is inefficient if nothing happens for long periods
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
21
Module
src.gen src.rte src.gen src.rte
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
22
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
23
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
24
Interrupts
First event in the event list becomes an interrupt Simulation Kernel delivers the interrupt to the designated module Data associated with the interrupt can be obtained by the module Processors and queues can have BEGSIM interrupts
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
25
New event reaches head of event list, which causes Simulation Kernel to deliver an interrupt to the appropriate module
Simulation Kernel deletes event from event list, allowing new event to reach head of list
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
26
0.01234 56789 11111 11 0.01234 56789 11111 22 0.01234 56789 11111 33 0.01234 56789 11111 44 0.01234 56789 11111 55 0.01234 56789 11111 66 0.01234 56789 11111 77
Suppose that this interrupt triggers an event to occur at 0.01234 56789 11111 75.
The Simulation Kernel minimizes the time required to place this event at the correct place on the list.
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
27
Delivery of Interrupts
When an interrupt is delivered to a module, control passes from the Simulation Kernel to the module If the module is a queue or processor, the interrupt is delivered to the process running within the module Other modules, such as transmitters and receivers, are covered later
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
28
Each event may schedule other events The event list is always growing and shrinking An event is pending until executed A pending event can be cancelled
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
29
Forced States
Forced (green) and unforced (red) states differ significantly in execution timing In a forced state, the process
Invokes the enter executives Invokes the exit executives Evaluates all condition statements If exactly one condition statement evaluates to true, the transition is traversed to the next state
Forced (green) states
Enter execs invoked No blocking or waiting Exit execs invoked Transition to next state
30
Unforced States
In an unforced state, the process
Invokes the enter executives Places a marker at the middle of the state Releases control to the Simulation Kernel and becomes idle Resumes at the marker and processes the exit execs when next invoked
Unforced (red) states
Start of invocation
End of invocation
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
31
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
32
Find marker
Red state?
Yes
Receive interrupt
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
33
3. Transition occurs.
6. Transition occurs.
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
34
In control SK
pr1 invoked at initial state. Continues executing states until a red (unforced) state is entered. Release control to SK and becomes idle Remove first event from event list. Advance next event to head of list. Deliver interrupt to pr2.
pr1
SK
pr2
SK Other processes
35
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
Node model
Network model
Network model
36
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
37
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
38
Event Type
BEGSIM BEGSIM
Module
src.gen src.queue
Node model
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
39
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
40
Time
0.0 0.0
Event Type
BEGSIM BEGSIM
Module
src.gen src.queue
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
41
Process model
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
42
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
43
Process model
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
44
Time
0.0 0.0 4.3
Event Type
BEGSIM BEGSIM SELF
Module
src.gen src.queue src.gen
Marker
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
45
Event Type
BEGSIM SELF
Module
src.queue src.gen
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
46
Time
4.3
Event Type
SELF
Module
src.gen
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
47
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
48
Time
4.3 4.3
Event Type
SELF STRM
Module
src.gen src.queue
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
49
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
50
Simulation Termination
Simulations terminate in one of four ways:
The event list is emptied Simulation attribute duration expires A process calls for termination, using the KP op_sim_end() A fatal error occurs
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
51
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
52
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
53
Packets: Agenda
Packets in Modeler Packet Formats Lab: Create a Packet Format Packet Events
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
54
Packets
Information-carrying entities that circulate among system components General data structures, organized into fields of user-defined information Dynamically created and destroyed as the simulation progresses A single system may rely on multiple types of packets with different formats
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
55
Packet Formats
Packets can either be unformatted or formatted Unformatted packets have no user-defined data fields Formatted packets have zero or more fields Field types
Integer Floating point Structure Packet Information
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
56
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
57
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
58
Packets: Summary
The basic elements for data exchange
Between modules in nodes Between nodes in a network
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
59
Map Backgrounds Annotations Deriving and Creating New Models Object Attributes Online Documentation
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
60
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
61
Rapid Configuration
Rapid configuration allows you to quickly create networks of any size Available topology configurations:
Bus Ring Star Tree Mesh Unconnected
Specify the number of nodes, the node and link models used, how nodes will be arranged, and node locations within the workspace
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
62
Startup Wizard
The Startup Wizard can quickly configure a new scenario There are several settings for each scenario:
Name Initial topology Network scale Network size Technologies
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
63
Background Maps
View/hide maps by choosing View / Background / Set Properties Geotiff, MapInfo, MrSID, and CADRG images automatically appear at the correct latitude and longitude position.
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
64
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
65
Device Creator
Automatically create a particular device with a specific configuration Launched from Topology menu Select any number of interfaces and protocols
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
66
Object Attributes
Control aspects of objects behavior Are values that may vary
From one model to the next Between objects of the same model type
Right-click on an object and select Edit Attributes to view or change Can be promoted to
Set the value at a higher layer Specify a range of values at runtime
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
67
Attribute help accessible by clicking on the question mark next to the attribute
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
68
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
69
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
70
Queues
Offer all the functionality of processors Can also buffer and manage a collection of data packets
Queue
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
71
Point-to-point transceivers
Bus transceivers
Radio transceivers
Transmitter
Receiver
Transmitter
Receiver
Transmitter
Receiver
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
72
Node Objects: Antennas Antennas may be used with radio transceivers to specify antenna properties
Antenna
73
Module Connections
Packet streams carry data packets from a source to a destination module Statistic wires carry a single data value from a source to a destination module Logical associations tie individual transmitters and receivers together to make a transceiver pair
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
74
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
75
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
76
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
77
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
78
Lab accomplishments
Built generator to send out packets (using simple_source model) Built receiver to accept and destroy packets (using sink model)
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
79
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
80
Link Types
Link objects model physical layer effects between nodes, such as delays, noise, etc.
A point-to-point link transfers data between two fixed nodes.
A bus link transfers data among many nodes and is a shared media.
A radio link, established during a simulation, can be created between any radio transmitter-receiver channel pair. Satellite and mobile nodes must use radio links. Fixed nodes may use radio links. A radio link is not drawn but is established if nodes contain radio transceivers.
Radio link
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
81
Link Editor
Create or modify links Choose link types Modify attributes
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
82
Verify Links
Ensures that point-to-point and bus link connections are valid
Enough transmitters and receivers to support all of the incoming and outgoing links Data rates of the connected transmitter and receiver match the data rate of the link Transceivers support the attached link technology
It is always a good idea to use the Verify Links feature (Ctrl+L) before running a simulation to ensure connectivity
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
83
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
84
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
85
Statistics: Agenda
Statistic Collection Configuring Simulations Viewing Results Lab: Complete Bank Model and Analyze Results
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
86
Statistic Collection
Statistic Attributes Descriptions of Statistics Statistic Collection Modes
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
87
Statistic Attributes
Right-clicking on a statistic while in the Choose Results dialog box presents a menu of statistic attributes
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
88
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
89
Understanding Statistics
Define the goals of the study, and as a result, understand the statistics that should be collected to get useful results
Browse available statistics and view their descriptions Understand the default collection mode to help interpret results
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
90
Configuring Simulations
Scenarios automatically provide a default duration and random number seed for simulations Users can set simulation attributes by choosing Configure Simulation from the Simulation menu, or by clicking on the running man icon:
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
91
Running a Simulation
The Simulation Sequence window shows the progress of simulation Elapsed time bar displays the progress of the simulation
Appears after 1,000,000 events by default
Elapsed/Remaining Time: Real time elapsed and remaining time Simulation Time: Simulation time elapsed and number of events processed
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
92
Viewing Results
Results can be displayed by:
Selecting the View Results button on the tool bar Selecting View Results from the Results menu Right-clicking the project workspace and selecting from the pop-up menu
View Results dialog box allows the user to select the results to display.
- Note: Only the statistics you chose for collection will be available
The Show button in the View Results dialog box displays a graph of the selected statistics
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
93
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
94
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
95
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
96
Modeling Traffic
Three traffic types
Explicit/Discrete (modeled packet-by-packet) Flows (modeled analytically using source-to-destination pairs) Loads (modeled analytically using a background load on a link)
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
97
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
98
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
99
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
100
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
101
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
102
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
103
Confidence Intervals
Used to indicate the reliability of an estimate, based on a trial or series of random trials Determines whether the values collected can be used with confidence to make statements about the typical behavior of the modeled system Example: With probability 0.95 one will find the parameter x between a pair of stochastic endpoints
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
104
Parallel
In parallel on the same machine requiring a single runtime license Models must be properly codified for parallel simulation
Distributed
Multiple simulations automatically distributed to other machines using multiple runtime licenses or a site license
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
105
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
106
Lab Summary
10 Simulation runs Previously link utilization plotted w.r.t. time Mean of link utilization plotted w.r.t. random seed
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
107
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
108
Process Models
Process models represent algorithms
Communications protocols and algorithms Shared-resource managers Queuing disciplines Specialized traffic generators Statistic-collection mechanisms Control Processes
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
109
Process Editor
Toolbar Buttons:
1 2 3 4 5 6 7 8 9 10
1. Create state 2. Create transition 3. Set initial state 4. Edit state variable 5. Edit temporary variable 6. Edit header block 7. Edit function block 8. Edit diagnostic block 9. Edit termination block 10. Compile process model
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
110
State Transitions
Transitions connect states
Conditional Unconditional
Exactly one condition must evaluate to true If the condition statement (x == y) is true, the transition executive (Reset_Timers) is invoked
Condition statement
Transition executive
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
111
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
112
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
113
Packet Package: op_pk_create () op_pk_create_fmt () op_pk_copy () op_pk_get () op_pk_total_size_get () op_pk_nfd_set () op_pk_nfd_get () op_pk_send () op_pk_send_delayed () op_pk_destroy ()
Interrupt Package: op_intrpt_schedule_self () op_intrpt_type () op_intrpt_strm () op_intrpt_code () Simulation and Event Packages: op_ev_cancel () op_sim_time ()
ID, Topo and Internal Model Access Packages: op_id_self () op_topo_parent () op_topo_child () op_ima_obj_attr_get ()
Naming convention for Kernel Procedures op_<family name describing object >_<action>
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
114
115
Proto-C
State transition diagrams C programming language Library of OPNET Kernel Procedures (KPs) State variables (private to each process) Temporary variables
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
116
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
117
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
118
Service completion
Sends queued packet in svc_compl To svc_start if queue nonempty Back to idle if queue empty
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
119
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
120
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
121
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
122
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
123
Kernel Procedures
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
124
Lab Description
Uses the project bank_net, to model changes in the transaction rate and measure the effects of those changes Create modified sink process model to compute ETE delay
Get the packet Obtain the creation time Write out its ETE delay as a global statistic Destroy the packet
Incorporate new sink process model into existing node model Create ETE delay statistic probe Run simulation Filter the View Results graphs to answer questions
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
125
Lab Description
Provide answers to the banks CIO
What is the average end-to-end delay (ETE delay) for all transactions when the generation rate is 0.4 seconds/transaction (or 2.5 transactions/second)? For this generation rate, what percentage of the packets incurred an ETE delay of less than 1 second?
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
126
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
127
Probe Editor
In previous chapters, statistics were selected and results collected in the Project Editor The Probe Editor enables you to configure where information is collected and what statistics are measured You can save collections of probes to a file for use in different scenarios
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
128
Probe Editor
1 2 3 4 5 6 7 8 9 10 11
Toolbar
1. Global Statistic Probe 2. Node Statistic Probe 3. Link Statistic Probe 4. Path Statistic Probe 5. Demand Statistic Probe 6. Coupled Statistic Probe 7. Attribute Probe 8. Automatic Animation Probe 9. Statistic Animation Probe 10. Custom Animation Probe 11. Live Statistic Probe
Probe Workspace
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
129
Exporting Data
Export collected statistics to a text file or spreadsheet Spreadsheet application can be specified If no spreadsheet application is specified the data is written to an ASCII file
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
130
Right-click inside graph on desired panel Select Export Graph Data to Spreadsheet Modeler launches the appropriate program with data
131
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
132
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
133
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
134
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
135
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
136
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
137
Model Library
Extensive library of standards-based and vendor models OPNETs Model Research and Development division designs, develops, and maintains the model library Models are created using published standards and widely-used vendor implementations
IEEE Specifications (e.g., 802.1q, 802.3, 802.11, etc.) ANSI Standards (e.g., X3.139, T1.513, etc.) ATM Forum Specifications (e.g, UNI 3.1, TM 4.0, etc.) RFC Documents (e.g., RFC-793, RFC-1058, RFC-1771, etc.) Vendor Technologies (e.g., VLAN tagging, EIGRP, etc.)
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
138
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
139
Available Models
Standard Models
Essential models that support the majority of OPNET users Generic Vendor (Cisco, Lucent, Marconi, etc.)
Specialized Models
Models of interest to more focused communities within the OPNET user base They are available on a fee/license basis Current specialized models include UMTS DOCSIS IPv6 Circuit Switching MPLS PNNI
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
140
Modeler Wireless
Wireless nodes and protocols Node mobility
Trajectory Orbit (for satellite nodes)
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
141
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
142
ODK Overview
C/C++ APIs Highlights
Custom Network data import/export OPNET Advanced Graphical Interface Wizard-driven topology creation and configuration Custom Visualization Report generation and export
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
143
ODK enables a user to develop custom mechanisms for importing topology, traffic and configuration data from text files, databases, spreadsheets, etc.
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
144
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
145
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
146
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
147
Questions
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
148
Support Center
FAQs Licenses Mailing List Contributed models and papers Updates (software, models, documentation) Tech Support Login assistance
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
149
Documentation References
Modeler Tutorials Model User Guides Methodologies and Case Studies FAQs on www.opnet.com
78: How can I map more than one dimension into the code in op_intrpt_schedule_self ()? 166: What mechanisms can be used by the model developer to share data among processes without using invocations or interrupts? 182: How do I get the beginsim intrpt attribute enabled? 1091: How do I track what line of code is causing a syntax error and/or other compilation errors? 1209: How can I generate distribution outcomes from my own function instead of standard distributions or an external file? Many many others (over 1400 FAQs)
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
150
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
151
Take-Away Points
OPNET simulations are event driven OPNET modeling hierarchy
Network Node Process
Model design is modular Results can be displayed in many ways Almost everything can be customized to fit your needs
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
152