Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 79

S.K.

P Institute of Technology Doc No : ECE


Rev. No :
Tiruvannamalai – 606611. Date :

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING

COMPUTER NETWORKS LAB MANUAL

SUB CODE: EC 2356

BRANCH: ECE
YEAR/SEM: III / VI
ACADEMIC YEAR: 2014-2015

PREPARED BY

G.RAJKUMAR
AP/ECE
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Faculty Details

Name of the Faculty : G.RAJKUMAR


Designation : AP
Department : ECE

Course Detail

Name of the Course : B.E


Branch : Electronics & Communication Engineering
Title of the subject : Computer Networks Lab
Semester : VI
Batch : 2012-2016
Subject code : EC2356
Academic Year : 2014-15
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

NAME :

REG.NO :

DEPT :

SEM :

SUB CODE/NAME :
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

TABLE OF CONTENTS

S.NO DATE NAME OF THE EXPERIENT MARKS SIGN


S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Setting the configuration menu:

PC 1 PC 2

Node id 0 Node id 0
Protocol CSMA/CD Protocol CSMA/CD
Baud Rate 8Kbps Baud Rate 8Kbps
Duration 100s Duration 100s

Packet Length 1000 bytes Packet Length 1000 bytes

Bit Delay 0(at NEU) Bit Delay 0(at NEU)


Direction Sender Direction Receiver

CALCULATION:

Time out value in ms Successfully Tx packets Practical Throughput

Model Graph:
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 1 – STOP & WAIT


Aim:

To Provide reliable data transfer between two nodes over an unreliable network using the
stop and wait protocol

Apparatus required:

1. Benchmark Kit
2. Personal computer.

Formula used:

(Sum of Successfully Tx packets * Packet Length * 8)


X= ---------------------------------------------------------------------------
(Duration of Experiment * Data rate)

Procedure:

1. Click on the Stop & Wait icon from the desktop on both PCs.
2. Click the Configuration button in the window in both the Pc’s.
3. Set the Inter Packet Delay to 400msecs
4. Click OK button and Download the driver to the NIU using the BOOT button command.
Booting from any one of the applications is enough.
5. Run the experiment by clicking button or by choosing RUN -> Start from each
application.
6. Set the Timeout Value to 1500 ms
7. Note down the no of successfully Transmitted Packets.
8. Repeat the above steps for various time out values and plot the graph between timeout
Value & Throughput. Find the optimum timeout value from the plot.
9. Explain why the throughput is less compared to CSMACD protocol.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Result:

Thus the data transfer between two nodes over an unreliable network using the stop and-
wait protocol has been implemented and it is successfully measured.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Model Tabulation:

BER Successfully Theoretical Practical


Tx packets Throughput Throughput

Model Graph:
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 2 – STOP & WAIT WITH BER


Aim:

To provide reliable data transfer between two nodes over an error network using the stop-
and wait Protocol.

Apparatus required:

1. Benchmark Kit
2. Personal computer.

Procedure:

1. Set the error rate to 10-2 in the NEU.


2. Follow the Stop and Wait Experiment procedure for running the experiment.
3. Set the time out value as 3000 ms in the sender window.
4. From the Statistics window note down the number of successfully transmitted packets
and calculate the throughput. (Calculation of throughput is same as explained in the
previous expt.)
5. Repeat the Experiment by setting different BER in the NEU.
6. Use the values to plot the graph between BER Vs Throughput

Setting the configuration menu:

PC 1 PC 2

Node id 0 Node id 0
Protocol CSMA/CD Protocol CSMA/CD
Baud Rate 8Kbps Baud Rate 8Kbps
Duration 100s Duration 100s

Packet Length 1000 bytes Packet Length 1000 bytes

Bit Delay 0(at NEU) Bit Delay 0(at NEU)


Direction Sender Direction Receiver
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Result:

Thus the reliable data transfer between two nodes over an error network using the stop-and
wait Protocol has been implemented and its performance is measured.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Setting the configuration menu:

Model Tabulation:

Duration: 100 secs


Packet Length – 1000 bytes
Data rate – 8000

Time out value in ms Successfully Tx packets Practical Throughput


S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 3 – SLIDING WINDOW GO BACK N


Aim:

Provide reliable data transfer between two nodes over an unreliable network using the
sliding window go back N protocol.

Apparatus required:

1. Benchmark Kit
2. Personal computer.

Calculation of Practical Throughput:

(Sum of Successfully Tx packets * Packet Length * 8)


X = -------------------------------------------------------------
(Duration of Experiment * Data rate)

Procedure:

1. Click on the Sliding Window GBN icon from the desktop on both PCs.
2. Click the Configuration button in the window in both the Pc’s.
3. Set the Inter Packet Delay to 400msecs
4. Click OK button and Download the driver to the NIU using the BOOT button command.
Booting from any one of the applications is enough.
5. Run the experiment by clicking button or by choosing RUN ->Start from each
application.
6. Set the Timeout Value to 1500 ms
7. Note down the no of successfully Transmitted Packets.
8. Repeat the above steps for various time out values and plot the graph between timeout
Value & throughput. Find the optimum timeout value from the plot.
9. Explain why the throughput is less compared to CSMACD protocol.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Model Graph:
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Result:

Thus the reliable data transfer between two nodes over an unreliable network using the Go
back N Protocol has been implemented and its performance is measured.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Model Tabulation:

BER Successfully Theoretical Practical


Tx packets Throughput Throughput

Model Graph:
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 4 – SLIDING WINDOW GO BACK N WITH BER

Aim:

To provide reliable data transfer between two nodes over an error network using the sliding
window GBN protocol.

Apparatus required:

1. Benchmark Kit
2. Personal computer.

Calculation of Practical Throughput:

(Sum of Successfully Tx packets * Packet Length * 8)


X = -------------------------------------------------------------
(Duration of Experiment * Data rate)

Procedure:

1. Set the error rate to 10-2 in the NEU.


2. Follow the Sliding Window GBN experiment procedure for running the experiment.
3. Set the time out value as 3000 ms in the sender window.
4. From the Statistics window note down the number of successfully transmitted packets
and calculate the throughput.
5. Repeat the Experiment by setting different BER in the NEU.
6. Use the values to plot the graph between BER Vs Throughput
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Result:

Thus the reliable data transfer between two nodes over an error network using the Go back
N Protocol has been implemented and its performance is measured.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Setting the configuration menu:

Model Tabulation:

Duration: 100 secs


Packet Length – 1000 bytes
Data rate – 8000

Time out value in ms Successfully Tx packets Practical Throughput


S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 5 – SLIDING WINDOW SELECTIVE REPEAT

Aim:

To provide reliable data transfer between two nodes over an unreliable network using the
sliding window selective repeat protocol.

Apparatus required:

1. Benchmark Kit
2. Personal computer.

Calculation:

(Sum of Successfully Tx packets * Packet Length * 8)


X = ---------------------------------------------------------------------
(Duration of Experiment * Data rate)

Procedure:

1. Click on the Selective Repeat icon from the desktop on both PCs.
2. Click the Configuration button in the window in both the Pc’s.
3. Set the Inter Packet Delay to 400msecs
4. Click OK button and Download the driver to the NIU using the BOOT button command.
Booting from any one of the applications is enough.
5. Run the experiment by clicking button or by choosing RUN -> Start from each
application.
6. Set the Timeout Value to 1000 ms
7. Note down the no of successfully Transmitted Packets.
8. Repeat the above steps for various time out values and plot a graph between timeout
Value & Throughput. Find the optimum timeout value from the plot.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Model Graph:
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Result:

Thus the reliable data transfer between two nodes over an unreliable network using the
sliding window selective repeat protocol has been implemented and its performance is measured.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Setting the configuration menu:

Model Tabulation:

BER Successfully Theoretical Practical


Tx packets Throughput Throughput
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 6 – SLIDING WINDOW SELECTIVE REPEAT WITH BER

Aim:

To provide reliable data transfer between two nodes over an error network using the sliding
window selective repeat protocol.

Apparatus required:

1. Benchmark Kit
2. Personal computer.

Calculation:

(Sum of Successfully Tx packets * Packet Length * 8)


X = --------------------------------------------------------------
(Duration of Experiment * Data rate)

Procedure:

1. Set the error rate to 10-2 in the NEU.


2. Follow the Sliding Window Selective Repeat experiment procedure for running the
experiment.
3. Set the time out value as 3000 ms in the sender window.
4. From the Statistics window note down the number of successfully transmitted packets
and calculate the throughput.
5. Repeat the Experiment by setting different BER in the NEU.
6. Use the values to plot the graph between BER Vs Throughput
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Model Graph:
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Result:

Thus the reliable data transfer between two nodes over an error network using the sliding
window selective repeat protocol has been implemented and its performance is measured.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Configuration menu:

Model Graph:
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 7 – CSMA

Aim:

To implement the CSMA protocol for packet communication between a number of nodes
connected to a common bus.

Apparatus required:

1. Benchmark Kit
2. Personal computer.

Formula used:

Calculation of Practical Throughput (X) from the obtained readings:

Successfully transmitted packet by a node = Tx Packets – Collision Count

X = (Sum of Successfully Tx packet in all the nodes * Packet Length * 8)


--------------------------------------------------------------------------------------
(Duration of Experiment * Data rate)

Calculation of Theoretical Throughput:

a = (end to end bit delay in bits) / (Packet length in bits) = (bit delay*N) /
(P)

Calculation of Practical Offered load:

G = (Sum of Transmitted packets in all the nodes * Packet Length * 8)


------------------------------------------------------------------------------
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

(Duration of Experiment * Data rate)

Model tabulation:

IPD Tx1 Tx 2 Tx 3 Tx 4 G – practical X – practical Theoretical


Offered Load Throughput Throughput
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Procedure:

1. Click on the MAC Experiment icon twice from the desktop on both PC’s.
2. Click the Configuration button in the window in both the PC’s

G= N*P
---------
C * ta

G is the generated load in the network.


N is the number of nodes participating in the network. For example, let us say that 4
nodes using 2 computers)
P is the packet length expressed in bits; say 100 bytes (800 bits).
C is the data rate normally set as 8kbs, which is selected in the NEU.
ta is the inter packet delay expressed in seconds; the time interval between two
consecutive packets generated.

So, lets assume ta= 40 milliseconds and substitute the above mentioned parameters
in the Equation A which leads to G = 10. Like wise assume various values of ta to generate
offer loads in the range of 0.1 to 10. Substitute the ta in the configuration menu.

3. Select the “OK” button and Download the driver to the NIU using the BOOT
button command. Booting from any one of the applications is enough.

4. Run the experiment by clicking button or RUN –> Start from each application.
5. View the statistics window for results. Only Tx packets and collision count are taken
into account for MAC calculation.
6. Note down the readings once the experiment is completed.
7. Repeat the above steps for various values of ta.
8. Calculate Practical offered load from the formula and plot graph between practical
Offered load and Throughput.
9. Repeat the experiments for various values of Packet length, Node, Data rate and Bit
delay.

Result:

Thus the CSMA protocol for packet communication between a number of nodes connected
to a common bus has been implemented successfully and its performance is measured.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Configuration menu:

Model Graph:
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 8 – CSMA/CD
Aim:

To implement the CSMA/CD protocol for packet communication between a number of


nodes connected to a common bus.

Apparatus required:

1. Benchmark Kit
2. Personal computer.

Formula used:

Calculation of Practical Throughput (X) from the obtained readings:


Successfully transmitted packet is printed on the CSMA/CD experiment window.

X = (Sum of Successfully Tx packet in all the nodes * Packet Length * 8)


--------------------------------------------------------------------------------------
(Duration of Experiment * Data rate)

Calculation of Practical Offered load:

G = (Sum of Transmitted packets in all the nodes * Packet Length * 8)


------------------------------------------------------------------------------
(Duration of Experiment * Data rate)

Procedure:

1. Click on the MAC Experiment icon twice from the desktop on both PC’s.
2. Click the Configuration button in the window in both the PC’s
3. Calculate the IPD (ta) as given below

G= N*P
---------
C * ta
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Model tabulation:

IPD Tx1 Tx 2 Tx 3 Tx 4 G – Offered Load X – Throughput


S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

G is the offered load assumed to the network.


N is the number of nodes participating in the network. For example, let us say that
4nodes (using 2 computers)
P is the packet length expressed in bits; say 100 bytes (800bits)
C is the data rate normally set as 8kbs, which is selected in the NEU.

ta is the inter packet delay expressed in seconds; the time interval between two
consecutive packets generated.

So, lets assume ta= 40 milliseconds and substitute the above mentioned parameters
in the Equation A which leads to G = 10. Like wise assume various values of ta to generate
offer loads in the range of 0.1 to 10. Substitute the value of ta in the configuration menu.

4. Select the “OK” button and Download the driver to the NIU using the BOOT
button command.
5. Run the experiment by clicking button or RUN –> Start from each application.
6. View the statistics window for results. Only Tx packets and successfully
transmitted packets are taken into account for CSMA/CD calculation.

7. Note down the readings once the experiment is completed.

8. Repeat the above steps for various values of ta.


9. Calculate Practical offered load and plot graph between Offered load and Throughput.
10. Repeat the experiment for various values of Packet length, Node, Data rate.

Result:

Thus the CSMA/CD protocol for packet communication between a number of nodes
connected to a common bus has been implemented successfully and its performance is measured.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Setting the configuration:

Model tabulation:

IPD Tx 1 Tx 2 Tx 3 Tx 4 G- X– Avg Delay


Offered Practical
Load Throughp
ut
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 9 - TOKEN BUS

Aim:

To implement the token passing access in BUS-LAN.

Apparatus required:

1. Benchmark Kit
2. Personal computer.

Note: All the nodes have to be configured as ‘Senders’. Set the topology as ‘Bus’.

1: If you connect two PC’s and configured four nodes then set the My Address as 0 to 3 in
all four nodes, if you connect three PCs and configured six nodes then set the My Address as 0 to 5
in all six nodes.

2: Start running the experiment from the lowest priority node (i.e., from My Address 3 in
case of four nodes and 5 in the case of six nodes)

3: No of Nodes has to be set as 4 when two PCs are connected and 6 when three PCs are
connected.

G= N*P
--------
C * ta

G is the generated load in the network.


N is the number of nodes participating in the network. For example, let us say that 4 nodes
(using 2 computers)
P is the packet length expressed in bits; say 100 bytes (800 bits).
C is the data rate normally set as 8kbs, which is selected in the NEU.
ta is the inter packet delay expressed in seconds; the time interval between two consecutive
packets generated.

So, lets assume ta= 40 milliseconds and substitute the above mentioned parameters in
theEquation A which leads to G = 10. Like wise assume various values of ta to generate offer loads
in the range of 0.1 to 10. Substitute the value of ta in the configuration menu.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Formula used:

Calculation of Practical Throughput (X) from the obtained readings:

X= (Sum of Tx packet in all the nodes * Packet Length * 8)


-------------------------------------------------------------------------
(Duration of Experiment * Data rate)

Calculation of the Offered load:

G= N*P
--------
C * ta

G – Offered load
N – Number of nodes
P – Packet length in bits
C – Data rate in bits/sec
ta – Inter packet delay in millisecs.

Model Graph

Procedure:
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

1. Click on the Token Bus icon twice from the desktop.


2. Click the Configuration button in the window in both the PC’s
3. Click OK button and Download the driver to the NIU using the BOOT button command.
4. Run the experiment by clicking button or by choosing RUN _ Start from each
application. Run the all the experiments at the same time.
5. Set the Token Holding Time (THT) (say 10000 ms).
6. View the statistics window for results. To view the statistics window click on button.
7. Note down the readings once the experiment is completed.
8. Repeat the above steps for various values of ta.
9. Calculate the Practical offered load from the below given formula and plot the graph
between the practical Offered load and Throughput.
10. Repeat the experiments for various values of Packet length, Node, Data rate.
11. Repeat the above steps, while running the experiment set the BER to 10-2 in the NEU
or try to stop one of the nodes and observe the behavior and explain the same.

Result:

Thus the the token passing access in BUS-LAN has been implemented successfully
and its performance is measured.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Model tabulation:

IPD Tx 1 Tx 2 Tx 3 Tx 4 G- X –Practical Avg Delay


Offered Throughput
Load
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 10 - TOKEN RING

Aim:

To implement the token passing access in RING-LAN.

Apparatus required:

1. Benchmark Kit
2. Personal computer.

Formula used:

Calculation of Practical Throughput (X) from the obtained readings:

X= (Sum of Tx packet in all the nodes * Packet Length * 8)


-------------------------------------------------------------------------
(Duration of Experiment * Data rate)

Calculation of the Offered load:

G= N*P
--------
C * ta
G – Offered load
N – Number of nodes
P – Packet length in bits
C – Data rate in bits/sec
ta – Inter packet delay in millisecs.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Setting the configuration menu:

Model Graph:
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Procedure:

1. Click on the Token ring icon twice from the desktop.


2. Click the Configuration button in the window in both the PC’s.
G= N*P
---------
C * ta
 G is the generated load in the network.
 N is the number of nodes participating in the network. For example, let us say that 4
nodes (using 2 computers)
 P is the packet length expressed in bits; say 100 bytes (800 bits).
 C is the data rate normally set as 8kbs, which is selected in the NEU.
 ta is the inter packet delay expressed in seconds; the time interval between two
consecutive packets generated.
 So, lets assume ta= 40 milliseconds and substitute the above mentioned parameters
in the Equation A which leads to G = 10. Like wise assume various values of ta to
generate offer loads in the range of 0.1 to 10. Substitute the value of ta in the
configuration menu.

3. Click OK button and Download the driver to the NIU using the BOOT button command.
4. Run the experiment by clicking button or by choosing RUN -> Start from each
application. Run the all the experiments at the same time.
5. Set the Token Holding Time (THT) (say 10000 ms).
6. View the statistics window for results. To view the statistics window click on button.
7. Note down the readings once the experiment is completed.
8. Repeat the above steps for various values of ta.
9. Calculate the Practical offered load from the below given formula and plot the graph
between the practical Offered load and Throughput.
10. Repeat the experiments for various values of Packet length, Node, Data rate.
11. Repeat the above steps, while running the experiment set the BER to 10-2 in the NEU
or try to stop one of the nodes and observe the behavior and explain the same.

Result:

Thus the the token passing access in BUS-LAN has been implemented successfully and its
performance is measured.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 11 – Distance Vector routing protocol

Aim:

To simulate the distance vector routing protocol to maintain routing tables


as the traffic and topology of the network changes

Procedure:

1. Double click on LanT Routing Simulator icon from the desktop.

2. Click button and browse open C:\Lantrain\Config\ linear.txt.

3. Click button and select Distance vector algorithm

4. The icon in the screen represents the nodes and the green colour line
represents the path. The values inside the braces represents the ‘Forward
and Reverse’ weights.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

5. Click on the node N0 icon to obtain the routing table.

6. The above picture shows the nodes and its routing table.

7. Observe the routing table showing No route to some of the destinations


even though there is a physical connection. This is because the routing
table of the corresponding nodes is not been updated since there is no
hopping. To update the routing table click SINGLE STEP button.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

8. Hopping happens by clicking SINGLE STEP button.


S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

9. Now after several hopping the routing table gets updated. As the
number nodes increases, the number of hopping increases. This is one of
the disadvantages of distance vector algorithm.

Count to Infinity problem:

10. Click the green colour line lying between N3 and N4.

11. Enter the forward and reverse weight as ‘-1’ in order to disconnect N4
from the other nodes
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

12. Now observe the routing table.

13. Now you could observe that there are no changes in the routing table,
as they are not updated. Click SINGLE STEP button to update the routing
table.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

14. Even after several hopping the routing tables of N0, N1, N2, N3 shows the
path and weight to N4. These false updates are another disadvantage in the
‘Distance vector algorithm’.

 Try the same experiment for ‘Mesh’ structure.


 Load mesh.txt in the simulator and run the simulator until
convergence.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Result:

Thus the distance vector routing protocol to maintain routing tables as the
traffic and topology of the network changes was simulated successfully.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 12 – Link State routing protocol

Aim:

To simulate the link state routing protocol to maintain routing tables as


the traffic and topology of the network changes.

Procedure:

1. Double click on LanT Routing Simulator icon from the desktop.


2. Click button and browse open C:\Lantrain\Config\linear.txt.
3. Click configure button and select Link state algorithm.
4. Click on the nodes to obtain the routing table.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

5. Click the SINGLE STEP button to update the routing table. Routing
table of entire nodes gets updated after a single hopping. This is one of the
advantages of Link state algorithm over Distance vector algorithm.

Count to Infinity problem:

6. Click on the green colour line lying between N3 and N4.

7. Enter forward and reverse weights as -1 to disconnect N4 from the other


nodes.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

8. Observe the routing table. The values are not changed as it’s not
updated.

9. Click the single step button.


S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

10. Now you could see the routing table for each nodes been updated. This
is the advantage of ‘Link state algorithm’ over ‘Distance vector algorithm’.

o Try the same experiment for ‘Mesh’ structure.


o Load mesh.txt in the simulator and run the simulator until
convergence.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Result:

Thus the link state routing protocol to maintain routing tables as the
traffic and topology of the network changes was simulated successfully.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 13 - RC4 Key

Aim:

Understand the steps involved in RC4 algorithm encryption and decryption process.

Procedure:

1. Double click rc4 on icon.


2. Select Step mode and type any text to encrypt. Type any encryption key in either text or
binary mode.
3. Click the Next button from the right side panel.
4. Now the State table and Key tables are formed. (S Box contains a matrix of 256 values
starting from 0 and K Box contains the matrix of repeated ASCII values of the key
entered).
5. The flow of the algorithm in each step is explained in the description panel on the right
side.
6. In the next step the permutated values are stored in the S Box Permutation.
7. Key bit stream is generated from the values obtained from S Box Permutation.
8. XOR operation is done between the binary value and key bit stream generated.
9. Cipher text is formed corresponding to the XOR value generated.
10. Copy the cipher text by selecting and pressing ctrl + c.
11. Click the clear button and paste the cipher text in the text field.
12. Enter the same key that is used for encryption.
13. Now you could retrieve back the original message.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Result:

Thus the steps involved in RC4 algorithm were verified by using encryption and decryption
process.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 14 – File transfer using Socket FTP

Aim:

To establish a socket connection between two computers and use it to


reliably transfer a file.

Initial set-up:

Copy and paste FTPGui folder in C: and SocketFTP.exe file in


C:\Lantrain\bin\Connect the Ethernet (RJ-45) ports of two PCs with the
supplied swap cable. Since these 2 PCs are connected and there is no DHCP so
to assign IP address, setup two PCs IP address and gateway as follows

1st PC:

IP address : 192.168.0.1
Gateway : 192.168.0.1

2nd PC:

IP address : 192.168.0.2
Gateway : 192.168.0.2

Check if there is a connection between them by opening a browser and


typing the other PCs IP address. The other PCs Directory structure will be
displayed in the browser and this is the indication that the connection is
established between the PCs.

Procedure:

1. Double click on socket FTP icon from the desktop.


2. Setup username, password, server ip address, and server port no in the
application.

3. Ensure that the FTP Server and Overwrite check boxes are checked.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

4. Click Start Server button.

5. Click ok to continue.

6. Open FTP client in another PC.


S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

7. Check the FTP Client and Verbose check box.


8. Give the same username, password, server ip address, port number and
segment size (say 128 or 256 or 1024) and specify the file that has to be
sent.
9. Click Send File.
10. Now you could find your file in C:\FTPGui of the server.

Result:

Thus the file transfer between two computers was implemented by using a
socket connection.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 15 - Serial Communication

Aim:

To establish a simple network connecting between a host and guest PC


through serial communication part as physical medium.

Apparatus Required:

1. Two PC’s with windows 2000 professional


2. RS-232, DB-9 connector
3. Serial ports in PC’s
4. Serial null modem cable

Theory:

In serial transmission, one bit follow another so we need only one


communication channel rather than ‘n’ to transmit data between 2
communicating devices. The advantage of serial over parallel is only one
communicating channel serial transmission reduces the cost of transmission
over parallel by righty a factor if ‘n’ since communication within devices is
parallel.

Transmission occurs in 3 ways:


1. Synchronous
2. Asynchronous
3. ISo chronous

Procedure:

To prepare host PC:

1. Open network connection.


2. Under network tasks create a new connection click next.
3. Click setup an advanced connection and click next.
4. Click connect directly to another computer.
5. If computer acts as host, click host.
6. In device for this, click communication host icon “1” and then click next.
7. Click properties button and set designed baud rate.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

8. In user permission wizard, you can set user name and password for guest
authentification.
9. Click next to finish the setup and the following screen will appear.
10. Open network connections and you can observe the incoming connection
icon.

To prepare guest PC:

1. Enter the connection name.


2. Select serial communication port.
3. Click finish and a dialogue box will appear.
4. Click “properties” in general table, select communication cable between 2
computers.
5. Set baud rate as fixed in hosts.
6. Select the option tab and set the parameters.
7. Select security options and select a typical option check box.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

8. Select the network tab and set the parameters.


9. Select the setting button and check the parameters

Result:

Thus a simple network connection between a host and a guest PC through


serial communication port is established.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 16 - Parallel Communication

Aim:

To establish a simple network connecting between a host and guest PC


through parallel communication part as physical medium.

Apparatus Required:

1. Two windows PC and at least with window’s 2000.


2. Parallel ports
3. DB-25(RS-232)Cable

Theory:

In parallel communication bits are transmitted at a time, While sending


bits are transmitted the speed at which the data being sent are connected by a
clock and a clock function may be embedded into a data using coding technique
or sampling technique are used to sample at middle of bits.

Procedure:

To prepare host PC:

1. Open network connection.


2. Under network tasks create a new connection click next.
3. Click setup an advanced connection and click next.
4. Click connect directly to another computer.
5. In device for thus
6. In user permission wizard, you can set user name and password for guest.
7. Click next to finish the setup.
8. Open network connection.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

To prepare guest PC:

1. Follow the steps 1 to 4 as mentioned in preparing the host.


2. Enter the connection name.
3. Select parallel communication port’s which is available in your system.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

4. Click finish and click properties button and select the parameter.
5. Select the options and set the parameters.
6. Select security options and select the parameter.
7. Select the network tab and follow steps in serial communication.

Result:

Thus a simple network connection between a host and a guest PC through


parallel communication port is established.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

Experiment 17 - IMPACT OF TRANSMISSION POWER IN A WLAN

AIM:

Throughput measurements and comparison of throughput for different


transmission power levels.

REQUIREMENTS:

1. Two Personal computers.


2. D-Link software.

PROCEDURE:

1. Configure WLAN-T for 802.11g mode


2. Configure the client and initiate a FTP Session
3. The client should be kept in a suitable distance from the WLAN-T where
the effect of change in TX power level of the WLAN-T is left by the client
4. Keep the power level of WLAN-T to the full level
5. Measure the signal strength using NET Stumber software and tabulate
6. Run the FTP in the session in the client as mentioned
7. Note down the throughput and tabulate
8. Now vary the transit power level of the WLAN-T to 50%, 25%, 10% &5%
and note down the signal strength and throughput for each power level
and tabulate.
9. Plot a graph for level Vs throughput

INFERENCES:

 The throughput is at its best when the client sees the power as excellent
signal strength. As the transition power level is decreased the throughput
also starts decreasing.
 If the power level is less, signal to noise deteriorates which in turn results
in retransmission of packets. This reduces the throughput considerably.
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :
S.K.P Institute of Technology Doc No : ECE
Rev. No :
Tiruvannamalai – 606611. Date :

RESULT:

Thus the throughput measurement and comparison of throughput for


different transmission power level was done and execute successfully.

You might also like