Академический Документы
Профессиональный Документы
Культура Документы
User Guide
Release 2.0 • August 1997
All rights reserved. No part of this publication may be reproduced by any means without written
permission from CACI Products Company.
The information in this publication is believed to be accurate in all respects. However, CACI Products
Company cannot assume the responsibility for any consequences resulting from the use thereof. The
information contained herein is subject to change. Revisions to this publication or new editions of it
may be issued to incorporate such change.
COMNET III™, COMNET Baseliner™, and COMNET Predictor™ are trademarks of CACI Products
Company.
Table of Contents
&KDSWHU ,PSRUWLQJ1HWZRUN7UDIILF
Overview ................................................................................................. 11
External Traffic Interface Types.............................................................. 11
Capturing a Network Traffic File ............................................................ 13
Building a COMNET III model............................................................... 13
Conversation Pair Traffic Import............................................................. 14
Event Trace Traffic Import...................................................................... 28
$SSHQGL[% 7UDIILF)LOH'HVFULSWLRQ
To maintain a competitive edge in today’s market, proactive network management is the key
to success. COMNET family of network planning tools empowers users to proactively manage
network capacity and perform sophisticated what-if scenarios. There are three products in the
COMNET Network Planning suite:
COMNET Predictor™ enables network managers and planners to quickly predict the
performance of large networks using CACI’s exclusive Flow Decomposition™ technology.
Using imported network topology and traffic data, users create a model of their network and
analyze the impact of changes and identify sources of delays. Exports to COMNET III for
more detailed analysis.
COMNET Baseliner allows you to use data gathered from these different resources and
empowers you to proactively plan and manage your network (Figure 1.1). COMNET
Baseliner can automate the task of building a baseline model of your network. Once the
baseline model is in the COMNET environment, you can simulate, identify problems on your
network, and try out multiple what-if scenarios before implementing changes.
2YHUYLHZ
Network Management
Systems (SNMP) Data Network architecture
Network analyzers
(RMON, RMON 2) Data Load characteristics
This document covers the operational details on how COMNET Baseliner helps you build
your network baseline model.
System Architecture
COMNET Baseliner helps you build a baseline model of your network by transforming data
collected from a variety of network management and monitoring tools into COMNET model
information (Figure1.2).
The model building process in COMNET can be split into two phases:
1. Building a network architecture model
2. Building a network load profile for the resulting model network.
2YHUYLHZ
Figure 1.2: COMNET Baseliner and its role within the COMNET framework
Network Architecture
The first step of building a COMNET framework model is to construct a topology of the
network under study. COMNET Baseliner helps you build an accurate representation of your
network architecture by using the data captured by your existing network management tools.
COMNET Baseliner extracts node and link information from the data, in the topology file, to
automatically generate a COMNET topology model file. Based on the data available,
COMNET Baseliner can identify different types of links (e.g., Ethernet, Token Ring, FDDI
Ring or Point-to-Point [WAN] link). The import process may be tailored to suit your need in
the advanced user mode. Once in the COMNET environment, you can modify the node and
link parameters.
2YHUYLHZ
With conversation pair traffic, representing the highest level of detail, the import process uses
the interrupted Poisson process for characterizing the traffic flow. In the scenario, where the
import process does not have enough data available, it will use the default Poisson process for
characterizing the traffic. On the other end of the spectrum (such as event trace traffic) the
events recorded in the data file govern the traffic flow during simulation. The type of problem
under study would determine what kind of data to import. External traffic can include traffic
from multiple sources being sent over multiple segments.
External traffic may be mixed with internal traffic within the model. Within the simulation,
external traffic behaves similar to internal traffic. This is particularly useful for trying out
multiple what-if scenarios.
A Look Ahead
• Chapter 2 describes the topology import process for generating a basic template of your
network architecture model.
• Chapter 3 covers the load characterization process, describing interfaces to different
types of traffic data, the traffic profile definition process, and the name matching process.
• Appendices A through C describes how to capture or configure some of the network
monitoring tools so that the data required for the import process is collected properly.
&+$37(5 Importing Network Topology
In this chapter we outline the topology import process to build a baseline model of your network
architecture. The import process allows you to leverage on the topology data collected by SNMP-
based tools for network management. For small- to medium-scale networks, SNMP tools such as
Castlerock’s SNMPc, are sufficient to manage the network. For larger networks, many use NMS
such as HP OpenView, IBM NetView for AIX, or Cabletron SPECTRUM. The import process
extracts relevant information from the topology files to help you build an accurate model of your
network architecture.
2. The advanced user mode allows you to configure the import process parameters to suit your
specific needs. The COMNET model information generated in this mode reflects the user-
defined options such as selective segment and/or node import. Once the topology file has
been scanned for potential nodes and link segments, the topology import process
automatically generates and loads the resulting network architecture model. The nodes and
link segments identified are placed on the COMNET framework canvas. The node and link
configurations are set to default and can be customized in COMNET.
,PSRUWLQJ1HWZRUN7RSRORJ\
The following steps for exporting topology information from your existing NMS tool are
guidelines only. Different versions of the software may behave differently.
HP OpenView
To export the network topology from HP OpenView, type at the command line:
ovtopodump -l -r > topofile.top where, the filename (topofile.top) may be
replaced by any name of your choice. This command can be used even when HP OpenView is
not running. This command does not work with HP OpenView for Windows.
Digital PolyCenter
The topology export commands for the Digital PolyCenter are the same as HP OpenView
instructions. The same command line for topology capture is used.
Castlerock SNMPc
You can directly use the file saved by the SNMPc tool which by default has an extension (*.ndb).
Cabletron SPECTRUM
In order to export the network topology from Cabletron SPECTRUM, the topology command
has to be installed within SPECTRUM. The format of the file which is installed is a tar file. This
file can be expanded using the Extensions Tool-kit provided as part of the core SPECTRUM
installation. If the core SPECTRUM is not present the Spectrum.tar is not be installed.
Where to find the tar file? The Spectrum.tar file is included on the COMNET
installation media. If for any reason, it is not included, then you may download the
particular file from our ftp site: ftp.caciasl.com. You can login as an anonymous
user (user_id) with your e-mail_address as the password. The Spectrum.tar file
can be found under the following directory :
/pub/comnet/COMNET Baseliner/topology/NMS/Spectrum/
Using SpectroINSTALL. Move the tar file (i.e. topex1.0.tar) from the COMNET
area to the top level of the SPECTRUM area. The file has to be installed using
SpectroINSTALL. In order to invoke SpectroINSTALL, perform the following steps:
1. Become root
2. Type INSDK/Install.quick at the command prompt. This invokes SpectroINSTALL
3. From here, follow the SPECTRUM Installation Procedures with one exception: the only
component that should be selected for installation is topex1.0 (i.e. Topology Export).
4. Exit root
,PSRUWLQJ1HWZRUN7RSRORJ\
This procedure would have added menu options within SPECTRUM. Select the
command Export Topology, to capture the topological information of your network. For
more details, read the README file associated with Spectrum.tar.
Default Mode
• Select the appropriate Topology type specifying the NMS tool used to capture the
topology file.
• Click on the file detail button [..], to select the topology file.
• Click on the IMPORT button.
The import status displays the number of link segments and network nodes found in the file.
Once the file has been read, the resulting network topology is placed on the COMNET canvas.
You can now interact with the topology elements as you would under the COMNET
environment.
relevant for your study. The topology import process can be configured using any one or all
filtering options.
• Select the appropriate Topology type specifying the NMS tool used to capture the
topology file.
• Click on the file detail button [..], to select the topology file captured in the previous
section.
• Click on the IMPORT button.
• Select Filter...
The topology file is scanned for nodes and links with the import status reflecting the number
of elements found. The current status of the import process is displayed on the Filter dialog
form (Figure 2.2). The basic principle is simple: the Include List contains all the
candidate link segments for the Topology Import process whereas the Discard List
contains all the segments which will be filtered out during the Import process.
1 3 2 5 1 2 4
7 8 9 6
• Group Nodes: This option would import all the nodes attached to segment,
however, they would all be represented as a single group node. The name of the group
node shows how many nodes it represents. This option would be ideal for reducing the
cluttering of the display for large networks while preserving the total number of nodes
in the network. This would also assume that the nodes connected to the segments all
behave similarly, hence we can collapse into a group node.
• Super Nodes: This option is to be used for large enterprise-wide networks, where
the nodes attached to the segment are collapsed into a single node, called the Super
Node. This option is typically useful in a scenario where the individual conversations
within the local segment are not important, but the emphasis is on the inter-
communication between various segments. Hence, all the traffic flow from one
segment to other may be abstracted such that it happens between two such Super
Nodes.
Once the topology import process is completed, the resulting file is stored, by default, as
Traflink.c3 model file. You are prompted to save the resulting file under whatever name
you like.
The network architecture model created is based on the data inferred from the topology file.
You may want to cross-check the model to see whether the topology reflects your existing
network. As a rule-of-thumb, all nodes that were part of multiple segments are identified as
probable routers. This might not be true under all circumstances, thus make the necessary
modifications as required.
In certain situations, the data exported by your NMS tool might contain multiple flags for the
type of link segment(s). This is another area where you should cross-check whether the type of
link segment represented on the model reflects your “real” segment. Sometimes, when it is not
possible to find out the exact connectivity between segments, you might have to manually add
additional point-to-point link(s) as necessary.
&+$37(5 Importing Network Traffic
Once you have built a network architecture model (Chapter 2), the next step is to define your
network’s load characteristics. There are two ways to define traffic within your network
architecture: internal traffic definition and external traffic definition. Internal traffic can be
generated using the traffic generators from within the framework. COMNET Baseliner allows
you to import external traffic which is defined by a traffic data file(s). COMNET Baseliner
provides built-in interfaces to import traffic data from a variety of network analyzers and/or
RMON tools.
In this chapter we outline how to import external traffic data, representing your “real” network
traffic, using COMNET Baseliner to build a baseline model of your load. The import process
transforms the data captured into traffic model information to represent the data flow within
your network architecture. For networks spanning multiple segments the import process allows
you to merge multiple traffic data files collected over different segments into
a single traffic model file. Once the external traffic model is loaded, you may mix it with
internal traffic sources for “what-if” scenarios.
You can use COMNET Baseliner to import traffic characteristics into both COMNET III and
COMNET Predictor. Due to the difference in operation of the two tools, some sections in this
chapter are relevant to one of the tools only. Where applicable, the headers [COMNET III
only] and [COMNET Predictor only] will appear.
,PSRUWLQJ1HWZRUN7UDIILF
It is important to understand the differences in the two approaches described above. With the
event trace approach, the event scheduling mechanism during the simulation is controlled
directly by the captured file, hence, the simulation time is limited by the capture interval of
your traffic file. The capture duration in most cases is constrained by the buffer space on the
network analyzer and is typically limited to couple of minutes based on your network activity.
This approach is most useful when you have a particular (maybe, user defined) distribution of
events which needs to be generated within COMNET III. You would have full control on how
data flows within your network, allowing you to extend the event scheduling mechanism of
COMNET III. This approach also allows you drive your external call and session traffic,
which may be derived from, for example, customer billing records.
The nature of problem under study would identify the type of import procedure to use.
Typically, the conversation pair traffic data should be sufficient to model your network load
characteristics. Internal traffic sources may be used in conjunction with external sources for
,PSRUWLQJ1HWZRUN7UDIILF
various “what-if” scenarios. Both external and internal traffic sources behave similarly within
COMNET III. Hence, one may mix user controlled traffic scheduling with internally generated
events based on observations from a probability distribution.
Fields may be in any order and the length of the fields may vary. Generally, you will need to
define a configuration file for your network analyzer to get a file in the relevant format. Please
consult your analyzer’s user’s manual for further information on how to capture and save
traffic data (see Appendix B for network analyzer configuration information).
To start the traffic import process, select the menu option, File→Import→Network
Traffic. This launches the Traffic Import Wizard (Figure 3.1).
The Traffic Import Wizard guides you through the process of building a baseline model of
your network load. The import process transforms the captured data into traffic model
information to represent the data flow within your network architecture. For networks
spanning multiple segments, the import process allows you to merge several traffic data files
collected over different segments, into a single traffic model file.
,PSRUWLQJ1HWZRUN7UDIILF
By default, the list box in the import traffic wizard is empty, which signifies that no data files
have been selected for the import process. To define new traffic data files, select the [Add…]
button, this would invoke the File Import Wizard (see next section). The [Edit…] button
allows you to modify parameters of the selected traffic data profile from the import list. To
remove a list item, select the traffic data profile and click on the [Remove] button.
The [Save Libs] button allows you to save user-defined traffic profiles and name maps to a
library. Once the profiles are saved to a library, they will be available across multiple models.
If the tool used to capture the traffic characteristics of your network is not listed in the combo
box, select the Generic option in the combo box. Click on the [Monitoring tool …]
button. This will display a list of elements in the library; click on the [Add…] button to define
a parameter set for your tool.
Defining new traffic profile. It is assumed that all the data values are separated by the
character comma (","). The column defines the position of the data element in the comma-
separated line.
The dialog box (Figure 3.3) has been partitioned into three tabs:
Bi-directional: If this option is selected then it is assumed that available traffic data contains
detailed information on each direction. The data includes defining the source and sink pairs,
packet counts and byte counts in each direction.
Parameters
Upper Layer Decode: Some monitoring tools can decode higher level protocols. Selecting this
option allows you to include the higher-level protocol information when the data is imported.
Host A identifies the first end point of the conversation and Host B identifies the other end
point of the conversation.
Protocol: This column identifies the data element representing the protocol running between
the node pair.
Bytes: This column identifies the data element representing the total number of bytes
transferred between the node pair.
Packets B→A: This column identifies the data element representing the total number of
packets transferred from Host B to Host A.
Bytes A→B: This column identifies the data element representing the total number of bytes
transferred from Host A to Host B.
Bytes B→A: This column identifies the data element representing the total number of bytes
transferred from Host B to Host A.
None: The default option assumes that there is no other time-relevant information available in
data file.
Start, Stop Time: Select this option if the data file contains the start time of the conversation
and the end time of the conversation. When this option is selected you are required to fill up
the columns which represent the relevant time stamps.
Delta Time: Select this option if the file contains the actual duration of the conversation. The
duration may be in seconds, milliseconds, microseconds, or nanoseconds. You will also need
to specify the column representing the delta time stamp.
The Name Matching process also allows you to configure the external traffic model based on
your specific requirements. For example, there might be a traffic profile consisting of all the
nodes in the segment, however, the aim of the study might only be related to traffic
conversation(s) held between specific nodes in the segment. The node name(s) of interest can
be name-matched and; the traffic nodes, which are irrelevant to the current scenario, can be
filtered out by mapping them to the **Filter** name in the model list. This allows
,PSRUWLQJ1HWZRUN7UDIILF
multiple “what-if” scenarios by utilizing the same captured file. Another scenario where the
same traffic file may be reused is when you have situation of opening new sites that have the
same traffic characteristics as your current local segment. All you have to do is map the same
external names to node names at the new sites.
Select the [Add Name Map…] button, to begin the name matching process and defining a
new name map. (See next section)
Defining a new name map. The dialog shows three list boxes (Figure 3.8):
1. External ↔ Model Name Map: This list shows the mapping to be used during the import
process. The first name is the name used in the external traffic data file, whereas, the next
associated name is the model name used within the model environment.
2. External Names: This list shows the network device names found in the traffic data file.
External names would include all origins and destinations of traffic data file.
3. Model Names: This list shows all the names used within the model. It also includes two
special names: <Local Broadcast> and **Filter**. The former is used to
associate any broadcast messages found in the external traffic file, while the latter is used
in the advanced mode. In the advanced mode, you may bring specific traffic only into the
model, while you filter out traffic unrelated to the scenario. This allows us to use the same
captured traffic file for a variety of “what-if” scenarios.
How to map names. The name-matching process tries to automatically map all the identical
names found in both the external name list and the model name list. To map the names
manually or to re-map names:
(a) Select the name in the external name list. If multiple names need to be mapped to the
same model name, they may be selected by holding down the shift button and highlighting
the relevant names.
(b) Select the corresponding name in the model list.
(c) Click on the [↔] button. This will add the name map to the External ↔ Model Name
Map list at the top.
Advanced Options
(a) Names in the external name list may also be selected by using the Find text box. For
example, you might want to filter out all the traffic originating or terminating from sub-
net 128.128.127. This may be achieved by typing in 128.128.127.* in the find text box
and hitting the [Enter] or [Return] key. This action would highlight all the names in the
external name list.
(b) Consider the scenario where we might want to see what the delay would be for a new
application on the network. In this case, we may not be interested in where the traffic is
originating or terminating, but only at the network load. In order to handle such a
scenario, you can use the [Random] button to randomly map external names to model
names.
,PSRUWLQJ1HWZRUN7UDIILF
The traffic configuration dialog box (Figure 3.10) is displayed when the [View
Conversations…] button is selected. The dialog provides some more information about
the import process. The first information includes the number of conversations observed in the
data set, in this example, 52 conversations. To view the observed conversations graphically,
select the [View..] button. This will launch the conversation viewer (Figure 3.11). By
default, all the conversation pairs (TopN% = 100) are imported. The user can import only the
TopN or TopN% conversations based on total byte volume generated by each conversation. In
most network traffic captures, there is a lot of activity on the network, however, only a few
conversations make up the bulk of the traffic. If we follow the 80-20 rule, 80% of the network
traffic is characterized by the TopN = 20% of the conversation pairs.
,PSRUWLQJ1HWZRUN7UDIILF
Note: In the Traffic Import Wizard, modifying the value of TopN or TopN(%) also allows you
configure the import process. By specifying a number of top conversations, the import process
will only yield the specified conversations for analysis/simulation.
Graphical View of Conversation Matrix. The graphical layout provides a bird’s-eye view of
network activity. The lines between nodes depict the conversations on the network. The
variation in line thickness represents varying traffic data volume between node pairs. The
color on the lines follows the stop light paradigm, where, green line represents network traffic
load between 0% to 10%. The color turns into yellow when the traffic volume represents
between 10% to 40% of the total byte volume. It turns to red for conversations representing
above 40% of the total byte volume.
Navigation: Detail on each network device and conversation arcs is available by double
clicking on the graphical node/arc. Shortcut to the same details is accessible via the right
mouse click on any graphical nodes/arcs.
Conversation arcs
• Application distribution
• Protocol distribution
• Conversation properties (Figure 3.12), the list shows that three conversations are
occurring between network nodes NSC 0342D9 and Sun 89DA52. For more details on
any conversation, double-click on the conversation item in the tree list, or click on (+)
icon next to the conversation of interest.
Figure 3.14: Step One: Traffic Import Wizard after adding multiple data files
Figure 3.15: Traffic Import Wizard - Step Two
Once satisfied with the network load definition, we can move onto the next phase of the
Traffic Import Wizard by selecting the [Next>] button (Figure 3.15). Step two of the Traffic
Import Wizard provides two key functions for the import process: It allows you to look at the
traffic conversations from multiple traffic data files and provides a mechanism for selectively
importing the conversations. (see Step Four: Preview imported conversation pairs.)
Once satisfied with your import options, click on [Finish] to complete the import process.
At the conclusion of the process, an alert dialog (Figure 3.16) is displayed giving you the
option of deleting the previous externally imported profiles (if they exist). If [Cancel] is
selected, the traffic profiles are merged. The resulting traffic model file populates the Packet
Rate Matrix in COMNET. To view the packet rate matrix, select the Define• Packet
Rate Matrix menu option (in [COMNET Predictor], select Tabulate• Packet
Flows ). You can now simulate the resulting baseline model of your network.
Select the Use External File option to inform COMNET III that an external traffic
model file exists and to use it during the simulation. Varying the value in the Traffic Scale can
scale the external traffic. On selecting the Import Traffic Files option, the Traffic
Import Dialog form is displayed (Figure 3.18). Alternatively, you can directly invoke the same
dialog by selecting the File/Import/Event Trace menu option.
,PSRUWLQJ1HWZRUN7UDIILF
1 2 3 4
Legend:
1. Lists the candidate network traffic files, the associated traffic profile and the model to external
name match profile. You can add multiple traffic files by using the [Add] button.
2. To [Remove] selected external traffic file(s) from the import list.
3. To [Edit] the selected external traffic file form the import list.
4. To Add external traffic file(s) for the import process. On selecting this option, a traffic
characterization dialog form is displayed (Figure 3.19).
5 6 9 7 8 4
On selecting a Profile Template which you might want to Edit or Add, the Traffic Profile
Dialog is displayed (Figure 3.20).
Legend:
1. Identifies the name of the Traffic Profile. Each Profile name should be unique and cannot
be left empty.
2. Select the File format:- Comma-separated Values or Fixed-Column Values
(see Appendix B).
3. Select the type of traffic you are defining:- Messages, Sessions or Calls.
4. All lines listed here are ignored during the import process. Note: Please ensure that an
end of line separates each line listed here character (Enter or Return). There is also
no need to list the entire line, the first few words of the line would be sufficient.
5. Starting Positions of each of the variable(s), i.e. Destination, Source, Message,
Time, Message Size/Number of Sessions, Hold Time for Calls. For Comma-Separated
Values (CSV) format files, this identifies the position of the variable in the line (see
Appendix B).
6. Length of each variable, defined in Starting Positions (see 5). For example, if the
Starting Position for the Destination is column 25 and the Length is 12 characters, then
the Destination names are expected to be located in columns 25 to 36. These fields are not
defined for CSV format files (see Appendix B).
7. Traffic Time Stamp in the file may be either absolute (Time in Hrs:Min:Sec) or
relative (Delta Time).
8. The Traffic Time Units can be selected from either:- Seconds, MilliSeconds,
MicroSeconds or NanoSeconds.
9. This parameter allows you to synchronize the incoming traffic with the model traffic. By
default, the incoming traffic is set to start at 0.00 seconds. This may be modified, for
example, to reflect some delay during simulation time, such as boot-up delay of the nodes
such as hubs, routers, print-servers etc. Hence, the external traffic time is skewed based
on the value defined for this parameter. The time units are same as those defined in
Traffic Time Units.
Each simulation can have up to three external traffic model files:- one for messages
(message.ext), one for sessions (session.ext) and one for calls (call.ext). COMNET III also
provides you with an option to scale the level of external traffic to be introduced within your
model. By default, the value is set to 1.00. COMNET III uses the value set here when it
utilizes the traffic model during simulation. For example, in order to double the traffic level,
set the value to 2.00. The effect of this is to halve the scheduling period between each
external traffic events. Using the given example (Figure 3.21), now the last event is scheduled
at 57.95 seconds but the number of events will remain the same.
Within the simulation, external traffic queues for links in the same manner as internal traffic.
Normally, since the traffic captured was already on the link, it has the correct packet size and
does not need to be broken down further into multiple packets. However, if the link that uses
the traffic has a smaller packet size, it is packetized appropriately. External message and
session traffic can be used to trigger any application or traffic source that uses the received
message scheduling. The default message text field for an external message source reflects the
Message Id found in the external traffic model file (message.ext).
The steps described in this section using existing network analyzers with COMNET Baseliner
are guidelines only; different software versions may behave differently.
$SSHQGL[$
6. Æ Æ
Move to Files Save Expert data
7. The following sections of data is required from the Expert Sniffer database for the
import process:
• Header Information • Contents • Global Statistics • General Statistics
• Network Objects • DLC Stations • Subnets • Subnet Pairs
• Network Stations • Connections/Applications
3Com LANServant
COMNET Baseliner utilizes the matrix report from LANServant Manager. The matrix report
has to be saved in CSV format. To create a matrix report, refer to the LANServant Manager,
Statistics Management Module & Packet Decode Management Module User Guide (Ch. 8).
Compuware EcoSCOPE
COMNET Baseliner uses the conversation statistics report from EcoSCOPE. To create the
conversation statistics report in EcoSCOPE, use the following steps provided:
1. Edit single.ini in the EcoSCOPE config directory. Under the [Export] header, add the
line "ExportCACI=3DTRUE". Create an [Export] header if one does not already exist.
Save the single.ini file.
2. Start up EcoSCOPE's Single View. Open the database file from which you would like to
extract the data.
3. Open the File Menu and click on Export. Wait until the export is complete. The caci.txt
file will be located in the EcoSCOPE data directory.
loaddump $1 -parameters -all -net_src -net_dst -proto -symm -delimiter char , > $2
COMNET interfaces to a variety of network analyzers and/or RMON monitoring tools for
importing traffic data. This appendix outlines the data required by the traffic import process in
COMNET. The import process builds a traffic profile of your network activity based on the
data captured. In order to model the traffic profile accurately, the import process needs
specific data in the captured file.
Data collected from different tools vary in the level of detail used to characterize the network
load. COMNET provides an open interface, which allows you to define the profile of the data
collected. It provides interface to two types of traffic data:- Conversation pair traffic and
Event trace traffic. The following sections briefly describe what type of data the import
process expects.
All the input data is assumed to be in an ASCII file, which is in comma, separated value
(CSV) format. This would also allow you to generate your own traffic patterns from a
spreadsheet or database application to drive your simulation models. By default, all rows
beginning with the character “*” would be ignored by the import process. This would allow
you to have comments within your input traffic profile.
The traffic import process requires each row in the input file to contain at least the following
information:
Data profile Type I: If the data contains summarized end-to-end conversation information
Example:
*Logfile: 18/04/1996 19:43:22 to 18/04/1996 19:54:22
* Probe, Time Index, HostA, HostB, Index, # Packets, # Bytes, # Errors, deltaTime (sec)
"probe ie0 (1)", 18/04/1996 19:43:22,[00000C3E7097],[00000C3E7096],1,1351,164822,0,360
"probe ie0 (1)", 18/04/1996 19:43:22,[002002E0098A],[00000C3E7085],1,301,15567,0,47
"probe ie0 (1)", 18/04/1996 19:43:22,[00800A4F8045],[002002E0098A],1,257,10822,0,98
$SSHQGL[%
Data profile Type II: If the data contains detailed end-to-end conversation information
Example:
*Logfile: 18/04/1996 19:44:22 to 18/04/1996 19:54:22
*Start,Stop,ApplId,Proto,HostA,HostB,#Pkts(A->B),#Bytes(A->B),#Pkts(B->A),#Bytes(B->A)
“18/04/1996 19:44:22”,”18/04/1996 19:45:22”,”WWW”,”ip”,”cacilj”,”solar”,1351,33420,24,3678
“18/04/1996 19:44:03”,”18/04/1996 19:48:45”,”word”,”ipx”,”popfly”,”deadfly”,144,233334,0,0
“18/04/1996 19:44:26”,”18/04/1996 19:50:20”,”nntp”,”ip”,”mars”,”ariadne”,341,44400,46,432
“18/04/1996 19:45:34”,”18/04/1996 19:54:03”,”ftp”,”ip”,”cacilj”,”orion”,1321,36482,25,3680
$SSHQGL[%
00000000011111111112222222222333333333344444444445555555555666666666677777777778888888888
12345678901234567890123456789012345678901234567890123456789012345678901234567890123456789
1 2 3 4 5 6 7 8
Variable Number
For NetView for AIX (and Digital PolyCenter) files look under the following directory:
/pub/comnet/COMNET Baseliner/topology/NMS/NetView/
HP OpenView Interface
COMNET III may be installed so that it can be started from HP OpenView, version 2 and later.
After installation, COMNET III will appear as a menu pick and on line help will be available.
In addition, you can export your topology from OpenView to COMNET III by clicking on the
Tools, COMNET III, Topology Export pull-down in the Root window. All of these installation
instructions assume that OpenView is installed in the standard location, /usr/OV. If it is
installed elsewhere, simply replace /usr/OV in the instruction examples with the directory in
which you installed OpenView. In addition, you can extract the topology information from
OpenView and import it into COMNET III.
To install COMNET III under OpenView, perform the following steps. You will need root
permissions to write the files and create the necessary directories.
• Copy all files from the installation media into a temporary directory. (You will have already
done this during the standard COMNET III installation procedure.)
• Edit the file comnet.reg found in the sub-directory OpenView which will be in the
temporary directory that you just created. Edit the line after Action “start” to give the path
to the COMNET III executable. Set the icon path for comnet.gif to the directory where
COMNET III is installed.
$SSHQGL[&
• You may also want to edit the line after Action “topo” to direct the output from a topology export
to somewhere other than /tmp or to direct it to a file whose name is different from c3.top.
• If your copy of OpenView is installed in /usr/OV/bin, you can simply typing install will put
all files in the proper places and create needed directories. To install the OpenView to COMNET
III interface manually:
• Copy comnet.reg to /usr/OV/registration/C
• Create the directory /usr/OV/help/C/comnet/OVW/Functions. Copy comnet.fun
into this directory.
• Copy the file comnet.tsk into the directory, /usr/OV/help/C/OVW/Tasks.
You can import background icon bitmaps from /usr/OV/bitmaps to use in COMNET III
as background icons via the following steps. The background icons in NetView for AIX are provided
as .gif files, so the first step is to convert them to .xwd files. A public domain utility provided with
COMNET III can do this. Simply type giftoxwd <icon file name> to run the conversion. Now
start Simdraw, load the current COMNET III background icon file. Next
import as a raster file the background icon that you just converted. Save the background icon
library and the new icon will then be available to COMNET III.
Digital PolyCenter
The installation steps are same as IBM NetView for AIX instructions above.
Cabletron SPECTRUM
The following instructions can be found within the documentation, however, they have been included
for completeness.
In order to export the network topology from Cabletron SPECTRUM, the topology command
has to be installed within SPECTRUM. The format of the file which is installed is a tar file.
This file can be expanded using the Extensions Tool-kit provided as part of the core SPECTRUM
installation. If the core SPECTRUM is not present, the product will not be installed.
Using SpectroINSTALL
Move the tar file (i.e. topex1.0.tar) from the COMNET III area to the top level of the
SPECTRUM area. The file has to be installed using SpectroINSTALL. In order to invoke
SpectroINSTALL, perform the following steps:
• Become root
• Type the following line at the command prompt:
• INSDK/Install.quick
• This will invoke SpectroINSTALL
• From here the SPECTRUM Installation Procedures can be followed, with one exception.
Note: The only component that should be selected for installation is topex1.0
(i.e. Topology Export).
• Exit root
This procedure adds menu options within SPECTRUM. Select the command Export
Topology, to capture the topological information of your network. For further details, please
review the README file associated with Spectrum.tar.