In using this website you are deemed to have read and agreed to the following terms and conditions:
The following terminology applies to these Terms and Conditions, Privacy Statement and Disclaimer Notice and any or all Agreements: "Client", "You" and "Your" refers to you, the person accessing
this website and accepting the Company's terms and conditions. "The Company", "Ourselves", "We" and "Us", refers to our Company. "Party", "Parties", or "Us", refers to both the Client and ourselves, or either the Client or ourselves. All terms refer to the offer, acceptance and consideration of payment necessary to undertake the process of our assistance to the Client in the most appropriate manner, whether by formal meetings of a fixed duration, or any other means, for the express purpose of meeting the Client's needs in respect of provision of the Company's stated services/products, in accordance with and subject to, prevailing English Law. Any use of the above terminology or other words in the singular, plural, capitalisation and/or he/she or they, are taken as interchangeable and therefore as referring to same.
We are committed to protecting your privacy. Authorized employees within the company on a need to know basis only use any information collected from individual customers. We constantly review our systems and data to ensure the best possible service to our customers. Parliament has created specific offences for unauthorised actions against computer systems and data. We will investigate any such actions with a view to prosecuting and/or taking civil proceedings to recover damages against those responsible
We are registered under the Data Protection Act 1998 and as such, any information concerning the Client and their respective Client Records may be passed to third parties. However, Client records are regarded as confidential and therefore will not be divulged to any third party, other than [contractual developers and then only that which is need for development of future services] [we do not keep long term logs of our clients actions other than those actions needed such as postings, messaging, blog submissions, etc. all customer files customers delete are also deleted from our logs, therefore, if legally required to do so by the appropriate authorities, we can only make accessible that which you have deemed kept. Clients have the right to request sight of, and copies of any and all Client Records we keep, on the proviso that we are given reasonable
notice of such a request. Clients are requested to retain copies of any literature issued in relation to the provision of our services. Where appropriate, we shall issue Client's with appropriate written information, handouts or copies of records as part of an agreed contract, for the benefit of both parties.
We will not sell, share, or rent your personal information to any third party or use your e-mail address for unsolicited mail. Any emails sent by this Company will only be in connection with the provision of agreed
services and products.
Exclusions and Limitations
The information on this web site is provided on an "as is" basis. To the fullest extent permitted by law, this Company:
- excludes all representations and warranties relating to this website and its contents or which is or may be provided by any affiliates or any other third party, including in relation to any inaccuracies or omissions in this website and/or the Company's literature; and
- excludes all liability for damages arising out of or in connection with your use of this website. This includes, without limitation, direct loss, loss of business or profits (whether or not the loss of such profits was foreseeable, arose in the normal course of things or you have advised this Company of the possibility of such potential loss), damage caused to your computer, computer software, systems and programs and the data thereon or any other direct or indirect, consequential and incidental damages.
This Company does not however exclude liability for death or personal injury caused by its negligence. The above exclusions and limitations apply only to the extent permitted by law. None of your statutory rights as a consumer are affected.
All major Credit/Debit Cards, Paypal, Amazon and Payza are all acceptable methods of payment. Our Terms are payment due upon purchase. All goods remain the property of the Company until paid for in full. All charge backs are aggressively defended and all false claims of fraud are filed as criminal activity.
Observing DOTA Playing Performance with OPNET Simple LAN System
This is English translated assignment of my undergraduate Telecommunication Network course in the Department of Electrical Engineering, Faculty of Engineering, Udayana University where in the final semesters I am often given research writing assignments. As far as I remember, the reason I took this topic was because at that time I often played DOTA locally with ten of my friends where our laptop was connected to a HUB device and LAN cable. This task has never been published anywhere and I as the author and copyright holder, license this paper customized CC-BY-SA where anyone can share, copy, republish, and sell it provided that you write my name as the author and notify that the original and open version available here.
Chapter 1 Introduction
DOTA (Defense Of The Ancient) is a multiplayer game with a LAN (local area network) system. Maximum game 12 people with a maximum of 10 players and 2 spectators. For example, to play 10 players, you need 10 PCs (Private Computers) connected to a LAN (local area network) (on the same network). Now this game can be played online. Each computer connected to a LAN (local area network) will send traffic (data flow) on the network. The amount of traffic depends on the game which is DOTA (Defense Of The Ancient) in this case. Not many people know how the performance of a network when playing DOTA (Defense Of The Ancient) with ten players (10 PCs). In this experiment, the traffic generated by 1 PC (private computer) to play DOTA is examined. After that, a simulation of 10 PCs (private computers) based on the traffic generated on OPNET is conducted
How is the performance of a network when playing DOTA (Defense Of The Ancient) ten players (10 PCs)?
To observe the performance of playing DOTA (Defense Of The Ancient) with a simple OPNET LAN (local area network) system.
To know the performance of playing DOTA (Defense Of The Ancient) with the OPNET LAN (local area network) simple system and can be used to consider the technology that must be used.
1.5 Scope and Boundaries
Not using a client - server system.
The maximum observed performance is 2 minutes (due to the OPNET Academic Edition version).
Only limited to LAN (local area network).
Chapter 2 Literature Review
Wireshark is a world-renowned network protocol analyzer software. Can also capture traffic on a computer network. This software is the de facto (and often said de jure) standard from various industries and educational institutions. Wireshark was developed by many networking experts around the world and is an ongoing project from 1998 (Combs, 2013).
2.2 End – End Delay
End - end delay is the time it takes for a data, bit, byte, packet from the transmitter to reach the receiver. The delay is usually calculated in seconds. On a network it is said that the delay of a network is the average delay. Delay on a network is calculated using the concept of the average time it takes for a packet from the transmitter to reach the receiver. Delay = Time/Packet (Gómez, 2005).
Ethernet collisions are usually based on CSMA/CD (Carrier Sense Multiple Access / Collision Detection). CSMA (Carrier Sense Multiple Access) is the ability of a host to detect whether a channel is empty or has traffic. If it is empty the host will continue sending data, and vice versa when there is traffic, the host will wait until it detects an empty new one to send. However, it does not apply if there are 2 hosts both detecting an empty channel. When this happens both of them will continue to send data together so that a collision occurs. Therefore, Collision Detection is needed. Besides being able to inform the host that a collision has occurred, there is also a Back-off algorithm where the host will wait based on various calculations before resending data (Peterson, 2003).
Chapter 3 Experiment Method
3.1 Place and Time
The experiment was carried out at the author's house, at Jln. Kusuma Bangsa 6, No. 7x, Denpasar, Bali. Trial time on Sunday, March 16, 2013, at 18:00 - 23:30.
3.2 Tools and Materials
Material is the traffic generated by a PC (Private Computer) when playing DOTA (Defense Of The Ancient) on a LAN (local area network). OPNET uses 10 Ethernet Station, 16 Port Ethernet Hub and 100 Base T ethernet cable. Here is a list of devices used:
Intel® Pentium® core-duo processor
AWUS036NHA 802.11b/g/n Long-Range USB Adapter
Alcor Micro, Corp. USB 2.0 PC Camera
Operating System Windows 7 Ultimate
OPNET IT GURU Academic Edition
Warcraft III Frozen Throne 1.64, Map DOTA 6.77
3.3 Experiment Step
3.3.1 Looking for the traffic generated by the PC when playing DOTA via LAN
1. Connect 2 computers in a LAN as follows:
2. Use wireshark on one PC (Private Computer) to record the traffic generated.
3. Do 1x DOTA (Defense Of The Ancient) game until it's finished.
3.3.1 Simulate with OPNET the performance of DOTA 10 player games
1. The network topology is as follows (distance in meters):
2. To select the observed performance select individual statistics in the simulation. Then here's the observed performance experiment:
3. In Simulation select Configure Discreet Event Simulation, then simulate for 2 minutes:
Chapter 4 Discussion
4.1 The traffic generated by 1 PC playing DOTA
By using the options on the Statistics menu, IO Graph. The following graph is generated where the horizontal axis is minutes, and the vertical axis is bytes/second. This graph shows that the traffic generated on 1 PC (Private Computer) is 100000 bytes/second. Meanwhile, the line with the highest value (close to 200000 bytes/second) is the overall traffic. (sent and received).
4.2 Simulation results on OPNET
So in the simulation each ethernet station is set to generate traffic of 100000 bytes/second. Network starts to live at the 5th second, the network is on for 120 seconds (ON Time), Never turns off (0 OFF Time). To make it more real, the packet is sent every 0.01 second (not per second) with a 1000 byte (1000 bytes/0.01 second = 100000 bytes/1 second) packet. The settings are as follows (by right clicking one of the PCs, selecting similar nodes, right clicking again, then selecting attributes):
Maka hasilnya sebagai berikut:
Chapter 5 Closing
Overall traffic and collision count is 10x greater. Collision count per PC is an average of 600, observed on HUB is 6000 (because there are 10 PCs). The average sent and receive traffic per PC is 800000 bytes / second observed as a whole and on HUB is 8000000 bytes / second (10x greater).
5.2 Future Work
This experiment is limited to a simple LAN. It could be used as further research by implementing client - server systems, with different network configurations, or other things.