<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>THE DEVELOPMENT OF A SIMULATION MODELING OF TRAFFIC PRIORITIZATION IN MULTISERVICE ENTERPRISE NETWORKS IN THE ANYLOGIC SYSTEM</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Medvedev Denis</string-name>
          <email>medvedev.denis@urfu.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Konstantin Aksyonov</string-name>
          <email>k.a.aksenov@urfu.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ural Federal University</institution>
          ,
          <addr-line>Ekaterinburg</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This thesis is devoted to the results of the development of a simulation model for the analysis and planning of traffic prioritization in multiservice enterprise networks. There were collected the main characteristics of the data network and types of traffic. Prioritization technique is selected for simulation. A model is constructed in the Anylogic simulation modeling system. The analysis of traffic flows and dependence of the quality of traffic transmission from various events are shown graphically. This thesis is devoted to the analysis, planning and modeling of traffic prioritization processes in multiservice enterprise networks. Currently, in corporate networks, while the auditing and analyzing traffic flows passing through the data transfer network (hereinafter DTN), it is noticed that traffic of different types, protocols and levels of the OSI model is transmitted through the DTN. It could be voice traffic coming from IP phones or PBX, real-time video traffic arising from video conferences between branches; various traffic of management and maintenance of equipment and network infrastructure (keepalive, heartbeat, sync,...), etc. The data transfer network has its own metrics allowing to assess its quality. The works [1-2] are devoted to the design of multiservice networks and DTN based on simulation modeling. It is possible to highlight the following characteristics of a network important for an estimation: 1. Bandwidth capacity. Bandwidth capacity describes how much the data could be transmitted and received through the data link per time unit. 2. Network throughput. Throughput describes the quantity of useful data that could be transmitted and received for certain time unit. Otherwise, the network throughput measures the speed of messages successfully delivered to the recipient. 3. The rate of frame loss. This characteristic describes how many frames were lost in the transmission process for various reasons. 4. Delay (latency) describes the time passed from the sending a package from point A and its receiving at point B. 5. Jitter shows the variety of delay in relation to the neighboring frames.</p>
      </abstract>
      <kwd-group>
        <kwd>traffic prioritization</kwd>
        <kwd>Anylogic</kwd>
        <kwd>multiservice networks</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Each type of the traffic also has its own characteristics and requirements for its
transmission. For instance, for transmission of voice traffic it is critical that the delay of network
should be at minimum level as well as there no frame losses and jitter should be unchanged. For
the video traffic there are important all these abovementioned features, but the frame loss is not
so critical in case that its loss is not more than 30%. For other types of traffic, the requirements
for the quality of communication channels are even less.</p>
      <p>Because of the width of the data link always has the limit of bandwidth capacity, it is
highly important to ensure that each type of traffic does not occupy the entire bandwidth.
Otherwise, it will negatively affect the transmission quality of other types of traffic. In order to
prevent this, it is used traffic prioritization to guarantee the quality of service (Quality of Service,
QoS). Traffic prioritization allows to set the most important traffic a higher priority in order to
improve the QoS metrics of this traffic by degrading the QoS metrics of low-priority traffic.</p>
      <p>The switch can use buffering to temporarily store packages and then send them to the
correct address. The buffering can also be used when the destination port is busy. A buffer is an
area of memory in which the switch stores the transmitted data.</p>
      <p>A memory buffer can use two methods to store and send packages: port buffering and
shared memory buffering. While port buffering the packages stores in queues that are associated
with individual input ports. A packet is transmitted to the output port only when all packages
ahead of it in the queue have been successfully transmitted. In this case, it is possible that one
package delays the entire queue due to the busy port of its destination. This delay can occur even
when the remaining packages can be transferred to the open ports of their destinations.</p>
      <p>
        While buffering in shared memory, all packages are stored in a common shared memory
buffer that is used by all ports on the switch. The amount of memory allocated to a port is
determined by the amount of memory it requires. This method is called dynamic buffer
allocation. Then the packages in the buffer are dynamically allocated to the output ports. This
allows to receive a package in one port and send it from another port without having to queue it.
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>The priority queueing technique was used to prioritize traffic during buffering. Priority
Queuing (PQ) provides unconditional priority of some packages over others. There are 4 queues:
high, medium, normal and low. Processing is carried out sequentially (from high to low levels),
starting with a high priority queue, and until it is completely cleared, it does not move to lower
priority queues. Thus, it is possible to monopolize the data link with high-priority queues. Traffic
whose priority is not specified will be queued by default.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Implementation of the model</title>
      <sec id="sec-2-1">
        <title>To create a simulation model the traffic was divided into four classes:</title>
      </sec>
      <sec id="sec-2-2">
        <title>1. Audio traffic – class with high priority. 2. Video traffic – class with second priority (medium). 3. Traffic management – class with third level of priority (normal). 4. Other traffic – class with less level of priority (low).</title>
        <p>
          On the basis of this the simulation model was created in Anylogic [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] system that could
measure the following indicators of traffic:
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>1. The quantity of packages of each type in queues 2. The percentage of packages of each type 3. The quantity of transmitted frames. 4. The quantity of lost frames.</title>
      </sec>
      <sec id="sec-2-4">
        <title>The result of program work is shown on the figure 1.</title>
        <p>In this model was used the traffic received earlier from the virtual enterprise network
created on the basis of EVE-NG system. This system belongs to the class of network emulation
platform, which has been actively developing for the last 5-8 years.</p>
        <p>
          They allow to create rather complex network topologies using models of
telecommunication devices (routers, switches, firewalls, etc.) and to simulate their functioning
in real time [
          <xref ref-type="bibr" rid="ref5 ref6">5-6</xref>
          ].
        </p>
        <p>For this thesis, a data transfer network was developed, the L2 model of which is presented
in figure 2.</p>
        <p>As can be seen from the above scheme of the data network, there are manufacturers of
various types of traffic including voice traffic, video conference traffic, server equipment
management traffic and traffic that does not fall under other types. This network was reproduced
in the EVE-NG simulation system. By simulating the operation of terminal devices, the quantity
of frames of each type was measured. The obtained figures were filled in the CSV table. Later
these figures were used in the simulation model to create a similar traffic flow. In the process of
the simulation model, the calculations of bandwidth capacity and performance of the data link
were carried out. The frame loss rate and its impact on traffic transmission success were also
calculated.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Conclusion</title>
      <p>During the development of the model, the need for high-load enterprise networks to
control access to bandwidth was formed by prioritizing traffic by dividing it into four groups and
allocating critical characteristics for different traffic classes. The simulation model of enterprise
data network with multiservice traffic is developed. The calculations of bandwidth capacity and
performance of data link are carried out. The frame loss index was also calculated. In the future,
it is planned to add other prioritization options such as WFQ, WRED, CBWFQ, LLQ.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Dorosinskiy</surname>
            <given-names>L.G.</given-names>
          </string-name>
          ,
          <article-title>Aksenov К</article-title>
          .А.,
          <string-name>
            <surname>Popov</surname>
            <given-names>М.V.</given-names>
          </string-name>
          <article-title>The dynamic simulation modelling and technical and economic design of multiservice communication network // Scientific and technical</article-title>
          reports of Saint Petersburg State Polytechnical University №
          <volume>1</volume>
          (
          <issue>72</issue>
          )
          <year>2009</year>
          .
          <article-title>Computer technology</article-title>
          .
          <source>Telecommunications and Management</source>
          . Saint Petersburg P.
          <fpage>153</fpage>
          -
          <lpage>159</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>K.A.</given-names>
            <surname>Aksyonov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.A.</given-names>
            <surname>Bykov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.F.</given-names>
            <surname>Smoliy</surname>
          </string-name>
          , M.V.
          <article-title>Popov Multi-service communication networks simulation and design with BPsim3 //</article-title>
          <source>Proceedings of the 2009 Winter Simulation Conference (WSC</source>
          <year>2009</year>
          ),
          <source>December 13-16</source>
          ,
          <year>2009</year>
          , Austin, Texas, USA. Pages 2768-
          <fpage>2777</fpage>
          . DOI:
          <volume>10</volume>
          .1109/WSC.
          <year>2009</year>
          .5429251
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Spiridonov</surname>
            <given-names>А.А.</given-names>
          </string-name>
          <article-title>Attacks on network switches // Youth scientific</article-title>
          and
          <source>technical Bulletin №12</source>
          ,
          <year>2013</year>
          . - P.
          <year>52</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>4. Company site Anylogic [Electronic source]. - URL: https://www.anylogic.ru/</mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Sorokin</surname>
            <given-names>А. А.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dmitriev</surname>
            <given-names>V. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Losev</surname>
            <given-names>N. N.</given-names>
          </string-name>
          <article-title>Virtual laboratory for modelling and research of telecommunications systems based on program</article-title>
          package NetWorkSimulator // Bulletin of Astrakhan State Technical University.: Management, Computer and
          <string-name>
            <given-names>Information</given-names>
            <surname>Sciences</surname>
          </string-name>
          .
          <year>2010</year>
          . № 1.
          <string-name>
            <surname>Pages</surname>
          </string-name>
          103-
          <fpage>108</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Filimonov</surname>
            <given-names>А. Yu.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Medvedev</surname>
            <given-names>D. А.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klimova</surname>
            <given-names>А. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Muraviev</surname>
            <given-names>А. А.</given-names>
          </string-name>
          <article-title>The application of virtual infrastructure components in the construction of a laboratory complex in an educational institution//Bulletin of higher education institutes</article-title>
          .
          <source>Tool engineering</source>
          .
          <volume>61</volume>
          ,
          <issue>12</issue>
          ,
          <year>2018</year>
          , pages.
          <fpage>1092</fpage>
          -
          <lpage>1099</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>