Você está na página 1de 35

JJ C OLLE GE OF EATGIATBERIATG AATD

TECIIATOLOGY

TRrCrrY-620 009

W
DEPARTAIENT OT ELECTRONICS AND

COWTTONENGINEERING

ECl 354 NETWORKS

IAB JIIANUAL

cotr7frtr6
SL.NO

NETWORKS LAB

PAGE NO

1.

PC

to PC Communication Parallel communication using 8 bit parallel cable Serial communication using RS 232C.

01

03

2.
3.

Implementation and study of stop and wait protocol Implementation and study of Go-back-N and
selective repeat protocols.

06
08 10

4.

Token bus and token ring protocols


To create scenario and perfofinance of token bus and token ring protocols through simulation.

t2 t4

5.

Implementation of distance vector routing algorithm Implementation of Link state routing algorithm. Transfer of flies from PC to PC using Windows/ UNIX socket Processing.
Ethernet LAN Protocol To create scenario and the performance of CSMA/CD Protocol Ethrol Simulation.

t6

6. 7.

l7
t9
24

8.

9.

Wireless LAN Protocols To create scenario and study the performance of network with CSMA/CA protocol and compare with CSMA/CD.

28

10.

Implementation of Data encryption and decryption.

30

SERIAL COMMUNICATION

AIM:
To transfer data serially between two PCs using RS 232 cable.

COMPONENTS REQUIRED:
Personal

Computer-2

RS 232 cable
Steps involved :

Host PC:

1.

Open the Network connection.

2. Under network tab , click create a new connection & then click next. 3. Click setup an advanced connection & then click next. 4. Click connect directly to another PC click next & then do one of the
following,

*if you want your computer to act as the Host, click Host & then click next.
5. In Device for this connection, click" Communication Port "between them, and then click next.
6. Click the properties

button &

set the desired

baud rate.

7.In user permission Wizard you can set the user name
authentic. S.Click finish to set up.

& password for the guest

9.Open Network Connections

&

you can observe the oolncoming connections"

icon.Right click on the same & select the properties button,under general tab select the communication cable between two computer i.e.rcom port".
1

0.Select the properties

button &

set the baud rate as

it has been selected before.

l.Select the user tab & unlock the parameters

Always

allow

directly connected device such as Palmtop Computer to

connect without providing a Password.& data.

*Require all users to secure their Password and data.


l2.Select the networking tab & select the TCP/IP properties.

l3.Specify the IP range , (a sample value :192.168.15.10) and other parameter.

l4.Open the device manager,under modem you

will

be seeing a null modem

connection named as "Communication cable between computers" double click on


the same in which,select the modem tab & set the same baud rate as earlier.

Guest PC:

l.
2. 3.

Follow these stbps to be 1 to 4 in second PC in the next window select the guest
option & click next.

Enter the connection name which is user define able field, say for example

SERIAL COMMUNICATION.
Select the serial communication port
case

which is available in your system.In this

it is COMI & select the next button.


cable

4. Click finish (enter) button. 5. Cilck the properties in the general tab,select the 6'communication
mentioned in the host machine.

between two computers"& click configure button. Set the same baud rate as

6. Select the options tab & set the parameters. 7. Select the networking tab & set the parameters. 8. Select the setting button & check the parameters. 9. Select the TCP/IP & click the parameters button &configure.
10. Select the advanced

button & uncheck the IP header compression & select

the

('use

default gateway on remote network".

ll.
13.

Selectthe DNS tab & configure.

12. Select the

WINS tab & configure.

Ctick the serial communication short circuit created in he desktop & enter the user name

&

password, before pressing the connect button ensure the host

PC &guest PC is connected using RS232 null modem connect.


14. Press the connect

button. Then the connection will be established.

15. Create

a new folder in the host & share the folder . Open the Internet

explorer in the guest & give the IP address of the host & shared folder can be
accessed from the guest.

RESULT:
Thus the data's are transferred serially between two computers using RS 232 cable.

PARALLEL COMMUNICATION

AIM:
To transfer data parallely between two PCs using

24 pinport

cable.

COMPONENTS REQUIRED:
Personal

Computer-2

24 pin LPT port cable

Steps Involved:

Host PC: l.Open network connection.


2.under network, click create a new connection & then click next.

3.Click setup an advanced connection & then click next. 4.Click connect directly to another PC click next & then do one of the following,

*if you want your computer to acts as the guest, click


5. In Device for this connection,

guest

& then click next.

click" Communication Port 6between them, and

then click next.


6. Click the properties

button &

set the desired

baud rate.

7.ln user permission Wizard you can set the user name & password for the guest
authentic.

8.Click finish to set up.


9.Open

Network Connections & you can observe the 6'Incoming

connectionso'icon.Right click on the same &


select the properties button,under general tab select the :communication cable

between two computer com port". l0.Select the properties button & set the baud rate as it has been selected before.
1

l.Select the user tab & unlock the parameters

l2.Always allow directly connected device such as Palmtop Computer to connect


without providing a Password,&
data.

l3.Requre all users to secure their Password and data. l4..Select the networking tab & select the TCP/IP properties.
15..Specify the IP range a sample value is shown below and other parameter.

l6.Open the device manager,under modem you connection named as

will

be seeing a null modem

"Communication cable between computertt double click on the

same

which

will give the following screen,


select the modem tab

& set the same baud rate as earlier.

Guest PC: Follow these steps to


guest option

be 1 to 4 in second PC in the next window select the

& click next.

1.

Enter the connection name which is user define able field, say for example

PARALLEL COMMUNICATION.

2.

Select

the parallel communication port which is available in your is LPTI & select the next button.

system.

In this case it

3. Ensure the host PC &

guest PC has selected the "Direct cable connection

(LPT1)" for communication.

4. Cilck the properties in the general tab,select the (communication cable


between two computers"& click configure button.Set the same baud rate as mentioned in the host machine.

5. Select the options tab & set the parameters. 6. Select the networking tab & set the parameters. 7. Select the setting button & check the parameters. 8. Select the TCP/IP & click the parameters button &configure. 9. Select the advanced button & uncheck the IP header compression & select
the "use default gateway on remote network".
10. Select the DNS tab
I

& configure.

l.

Select the

WINS tab & configure.

12.

Click the parellal communication short circuit created in he desktop & enter
the user name

&

password,before pressing the connect button ensure the host

PC &guest PC is connected using 24 pin LPT parellal cable null modem


connect.
13. Press the connect

button. Then the connection will be established.

14. Create

a new folder in the host

& share the folder . Open the Internet

explorer in the guest & give the IP address of the host & shared folder can be
accessed from the guest.

REST]LT:
Thus the data's are parellally tansferred between two PCs using

24 pnport

cable.

IMPLEMENTATION OF'STOP AND WAIT PROTOCOL

AIM:
To transfer datas between two nodes in a network using stop and wait protocol.
Set up required: Personal Computers-O2

Lan Trainer Kit -01

Theory:

In a Stop and wait Protocol , the sender waits for an acknowledgement after every frame it sends. Only when an acknowledgement has been received, the next frame is
sent. This process of altemately sending

& waiting

repeats until the sender transmits the

an end of transmit (EOT) frame.

The advantage

of

stop and wait

is simplicity ,

each frame

is

checked and

acknowledged before the next frame is sent. The disadvantage

is ineffrciency.

Stop and

wait is slow,

since each frame must travel

all the way to the receiver and an acknowledged frame must travel all the way back before the next frame can be sent. Each frame sent & received uses the entire time
needed to traverse the link. If the distance between the device is long , the time spent

waiting for acknowledgment between each frame can add significantly to the total
transmission time.

Procedure:

II
Repeat the Experiment for a fixed Time out value, change the values of BER and

note the Successfully transmitted packets reading, Calculate the Throughput and Plot
the Graph.

Setting the configuration menu:

PCl
Node id

- '(0)) on config menu


set all to

Protocol:
Baud Rate

"CSMA./CD"

: SKbps (At both the config menu and NEU)


30sec

Duration:

Packet Length

1000

Bit Delay:0(atNEU)

Direction:

Sender

PC2
Node

id:

oo0"

on config menu

Protocol:
Baud Rate

set all to "CSMA"/CD"

: SKbps (At both the config menu and NEU)


30sec

Duration:

Packet Length

1000

Bit Delay:0(atNEU)

Direction: Receiver

Result:
Thus the transfer of data between two nodes is studied using stop and wait protocol.

SLIDING WINDOW GO BACK N

AIM:
To transmit a set of data between two nodes in a network using Sliding window Go
back N protocol.

Set up required:

Personal Computers-O2

LAN Trainer Kit -01


Theory:
The essence of all sliding window protocols is that

at

any instant of time, the sender

maintains a set of sequence numbers corresponding to frames it is permitted to send.


These frames are said

maintains a receiving
accept

to fall within the sending window. Similarly ,the receiver also window corresponding to the set of frames it is permitted to
the

. In this Sliding window - Go back N technique all the data frames in

window are transmitted one by one without expecting any acknowledgement for each
and every data frame. Only after sending all the data frames present in the window,it
expects acknowledgement.

If any error

occurs in any of the frames then all the data are

retransmitted starting from the damaged or lost one. This approach can waste a lot of
bandwidth if the error rate is high.

PROCEDURE:

I
icon.

il
Repeat the Experiment for a fixed Time out value, change the values of BER and

note the Successfully transmitted packets reading, Calculate the Throughput and Plot the Graph.

Setting the configuration menu:

PCl
Node id ='00" on config menu

Protocol:
Baud

set all to "CSMA"/CD"

Rate:

SKbps

(At both the config menu

and

NEU)

Duration:

30sec

PacketLength= 1000 Bit Delay:0(at NEU)

Direction:

Sender

PC2
Node

id:

"0" on config menu


set all to

Protocol:
Baud Rate

"CSMA./CD"

: 8Kbps (At both the config menu and NEU)


30sec 1000

Duration:
Packet

Length:

Bit Delay:0(at NEU)

Direction:

Sender

RESULT:

Thus the set of data has been transmitted from sender to receiver using GOBACK N in

sliding window protocol.

.
AIM:

SLIDING WINDOW SELECTIYE REPEAT PROTOCOL

To transmit a set of data between two nodes in a network using Sliding window and
Selective Repeat protocol.

Set up required: Personal

Computers-02

Lan Trainer Kit -01

THEORY:
GO BACK N protocol works well
therefore effors are small.

if

the communication line channel is good and


channel / line is poor,

If the communication

it wastes lot of
more

bandwidth

in retransmitting the frames that have reached receiver intact. A

effrcient alternate is to have several packet buffers in the receiver LLC layer for saving out of order packets , such that send only the packets that did not reach the receiver.

This approach that selectively sends only the missed packets and so
sliding window, selective repeat protocol.

it is named as

In this protocol, the sender and receiver maintains the same window sizes at the both
sender and receiver.

PROCEDURE:

10

II
Repeat the Experiment for a fixed Time out value , change the values of BER and note the Successfully transmitted packets reading . and Plot the Graph.

Setting the configuration menu:

PCl
Node id

"0)' on config menu


set all to "CSMA"/CD"

Protocol:
Baud Rate

: 8Kbps (At both the config menu and NEU)


30sec

Duration:
Packet

Length:

1000

Bit Delay:O(atNEU)

Direction:

Sender

PC2
Node

id:

"0" on config menu


set all to

Protocol:
Baud Rate

"CSMA/CD"

: 8Kbps (At both the config menu and NEU)


30sec

Duration:

Packet Length

1000

Bit Delay: 0(at NEU)

Direction:

Sender

RESULT:

Thus the transfer of data between two nodes is studied using selective repeat protocol.
11

TOKEN BUS PROTOCOLS

AIM:
To create scenario and study the performance of token bus protocol in a network.

Set up required: Personal Computers-O2

Lan Trainer Kit -01

THOERY: TOKEN BUS: In the token bus or token ring topology, the stations are connected to a single cable
called a bus. They make a logical ring because each station knows the address of its
successor. When a station has finished sending its data,

it

release the token and inserts

the address of its successor in the token and

only the station with the address


shared

matching the destination address of the token gets the token to access the
media. The token bus LAN,standardized by IEEE,uses this topology.

PROCEDURE:

Setting the configuration menu:

PC1
Node

id:

"0" on config menu 1 and "1" on config menu 2


set all to

Protocol:
Baud Rate

"ALOHA"

: SKbps (At both the config menu and NEU)


100sec

Duration:
Packet

Length:

1000

My Address: "0" for menu

I and"l"

on menu 2

t2

Bit Delay:O(atNEU)

Direction:

Sender

PC2
Node

id:

"0" on conf,rg menu 1 and "1" on config menu 2


set all to

Protocol: Duration:
Packet

"ALOHA"

l0Osec 1000
1

Length:

My Address:"2" for menu Bit Delay:O(atNEU)

and'03" on menu 2

Direction:

Sender

Note 1: If you connect two PC's and configured four nodes then set the "My Address"
as 0

to 3 in all four nodes.

Note2: Start running the experiment from the lowest priority node (i.e., from 'My
Address' 3 in case of four nodes Note3: No of Nodes has to be set as 4 when two PCs are connected

RESULT:

Thus the transfer of data between two nodes is studied using token bus protocol.

t3

TOKEN RING PROTOCOL

AIM:
To create scenario and study the performance of token ring protocol in a network.
Set up

required: Computers-02

Personal

Lan Trainer Kit -01

THOERY: TOKEN RING:


In the token ring when a station sends the token to

its

successor, the tokens cannot be

seen by other stations the successor is the next one does not have to the address

in line .This means that the token

of the next successor. The problem with this topology is

that

if

one of the links the medium between two adjacent stations fails, the whole

system fails.

PROCEDURE:

Setting the configuration menu:

PC1
Node id

(60"

on config menu 1 and o'1" on config menu 2

Protocol:
Baud Rate

set all

to .RING'

: 8Kbps (At both the config menu and NEU)


100sec

Duration:
Packet

Length:

1000

t4

Bit Delay:0(atNEU)

Direction:

Sender

PC2
Node

id:

"0" on config menu I


set all

and

"1" on config menu 2

Protocol:
Baud

to 'RlNGl

Rate: SKbps (At both the config menu and NEU)


100sec

Duration:
Packet

Length:

1000

Bit Delay:O(atNEU)

Direction:
Note L:

Sender

If you connect two PC's


all four nodes.

and configured four nodes then set the

"My Address"

as 0 to 3 in

Note2: Start running the experiment from the lowest priority node (i.e., from 'My
Address' 3 in case of four nodes Note3: No of Nodes has to be set as 4 when two PCs are connected

RESULT:

Thus the scenario was created and the performance of token ring protocol was studied.

l5

IMPLEMENTATION OF DISTANCE VECTOR ROUTING ALGORITHM

AIM:
To Implement and study the distance vector routing algorithm.

Set up required: Personal

Computers-02

Lan Trainer Kit -01

THOERY:
In distance vector routing ,the least cost route between any two nodes is the route with minimum distance. In this protocol,eacg node maintains a vector of minimum distance to every node. The table at each node also guides the packets to the desired node by
showing the next

hop in the route. Each node can know only the distance between its

self and its immediate neighbours, those directly connected to it. The whole idea of
distance vector routing is the sharing of information between neighbours, those directly
connected to it.The whol;e idea of distance vector routing is the sharing between neighbors.

of information

PROCEDURE:

LINEAR AND MESH NETWORK:

Calculate the number of periods required for convergence.

t6

I
the edges(link).

We can edit the network by changing the notepad contents.

network.

RESULT:

Thus the distance vector routing algorithm was implemented and studied.

l7

IMPLEMENTATION OF LINK STATE ROUTING ALGORITHM

AIM:
To Implement and study the link state routing algorithm.
Set up PC with

required: routing simulation software.

TTTEORY:

In

link state routing ,if each node in the domain has the entire topology of the domain - the list of nodes and links, how they ure connected including the type
,cost and condition of the links-the node

can use Dijkstra's algorithm to build

routing table, but the routing table for each node is unique because the calculations
are based

on different interpretations of the topology. The idea of Link

state routing

is sharing of information about its neighbours to the entire network.

PROCEDURE: LINEAR AND MESH NETWORK:

Calculate the number of periods required for convergence.

the edges(link).

We can edit the network by changing the notepad contents.

network.

RESULT:
Thus the

link state routing algorithm was implemented and studied.


18

TRANSFER FILES FROM PC TO PC USING WINDOWS ruNIX SOCKET PROCESSING.

AIM:
To establish a socket connection between two computers and use it reliably to
transfer a file.

Set up

required:
JAVA, FTP socket software

PCos -2,

THEORY:
The socket programming technique, the socket is inbuilt in the Operating System

of

the computer. Socket is a technique to communicate between two systems or two networks to encrypt and decrypt the data in secret way. The socket consists of

family, types of the socket, protocol, socket address. The family of the socket is
IPOD and IPO4 are the two families of socket.The protocol of the socket is TCP/P

.The socket address is a local IP


and port address are the

address and port address and remote IP address

Types of Socket:

o o o

Raw socket Datagrarn socket


Stream socket.

Raw socket is a type of socket in transport layer.It is used to send the data to the application layer from network layer.It is used to send data to the application layer from transport layer using TCP (Transmission control protocol).

PROCEDURE:

l9

PCl Server User name:Administrator Pass word:Student Confim password:Student


Server IP address Server port

PC2

Client
User name :Administrator
Pass word:Student

Confim password:Student
Server IP address :192.168.15.18 Server port number:2000

:192.168.15.18

number:2000

Segment size:256 or 512

File name to be sent: C:\new text Enable Verbose check box.

I
Client.

I
Encrypting and Decrypting a file using RC4 algorithm

Initial Setup:
1. Browse'C:\Lantrain\DataSecurity'.

2.

Copy the 'RC4' folder and three class files (Connect, RC4Client,

Server) and
paste PC'S

it into the 'Java\jdkl.S\bin' folder in both the server and client

Setting up the Server:


1. Open command prompt window

(Start Run

type 'cmd').

2. Browse

the java bin folder. server.

3. Type'java Server'to runthe

20

Encrypting a file:
1. Open command prompt in the client
side.

2. Browse

the java bin folder.

3. type 'java RC4Client'.

4. Enter the IP address of the server.


5. Enter the mode of operation.

6. Enter the Encryption key not more than 5 characters. 7. Enter the path name of the file to be encrypted. (for eg: c:\\abc.txt)

8.

Type YES

if you like to close the session or type NO if you like to

continue

decrypting the 'Cipher text'.

9. The encrypted text is available in c:\output.txt.


10. Try to re-arrange the cipher text using any crypt-analysis tool.

2I

Decrypting the Cipher text file:


1. Enter the mode of operation
as

DEC for decrypting the cipher text.

2. Enter the Decryption key

same as used for Encryption.

3.

Enter the

full path name of the file to be decrypted.

(i.e.,

c:\\output.txt)

4. Find out the decrypted file in c:\\output.txt.


22

RESULT:

Thus the implemented of transferring a file from PC to PC using windows AJnix


socket is done and studied.

ETHERNET LAr[ PROTOCOL (CSMA/CD)

AIM:
To create a scenario and study the performance of CSMA/CD protocol.

COMPONENTS REQUIRED:

LAN trainer kit -01


PC's --02

THEORY:
CSMA/CD PROTOCOL:
The access mechanism used in an Ethernet is called carrier sense multiple access

with collision detection. It is the result of an evaluation from multiple

access to

carrier sense multiple access with collision detection. The original design was a multiple access method in which every work station had equal access to a link. In

MAN there was no provision for traffic co-ordination.

In CSMA

system, any workstation wishing

to transmit, must first listen for

existing traffic on the line. A device listens by checking for a voltage. If no voltage
is detected, the line is considered idle and transmission is initiated. In CSMA once a node starts transmitting,

it

continues until the end of its packet even

if there is

collision. In CSMA\CD the station wishing to transmit first listens to make certain that the link is free, then transmits its data and listens again. During the data
transmission the station checks the line for the extremely high voltage that indicate

a collision. By detecting the collision and aborting the transmission immediately.


The channel is freed for other transmission attempts.

PROCEDURE:

24

FORMULA:

Calculate the IPD (ta)

N*P
\J_

C*ta

(Sum of Successfully Tx packet in all the nodes * Packet Length


v_
1\-

8)

(Duration of Experiment * Data rate)

(Sum of Transmitted packets in all the nodes * Packet Length

8)

G(Duration of Experiment * Data rate)

25

Setting the configuration menu

PCl
Node

Id: '0' on config menu 1 and '1' on config menu 2


Csma./cd
8 kbps (at

Protocol:
Baud rate

: Duration :
Packet

both config menu and NEU)

100 s 100

length:
ms

byes

IPD:40
Direction

Bit delay:0(atNEU)

Sender

PC2
Node Id

: '0' on config menu 1 and 'l' :

on config menu 2

Protocol: Csma/cd
Baud

rate:8

kbps (at both config menu and NEU)


s

Duration
Packet

100

length:
ms

100 bytes

IPD:40
Direction

Bit delay:O(atNEU)

: Sender

RESULT:
The scenario is created & performance of CSMA\CD protocol is studied.
26

MAC LAYER PROTOCOL CSMA/CD:


Offered load%o Thearitical Practical

lnter packet delay(ms) Thearitical


Practical

Successfully transmitted

Throughput(%)

Model graph: Offer+d Load Vs Throughput

Throughput

-X

[12345678S
OfTered Loatl {G}

FORMULA:
(Sum of Successfully Tx packet in all the nodes * Packet Length * 8)

x-

(Duration of Experiment * Data rate)

x-

(Sum of Successfully Tx packet in all the nodes * Packet Lenglh * 8)

(Duration of Experiment * Data rate)

27

WTRELESS LAN PROTOCOL(CSMA/CA)

AIM:
To Study the performance of CSMA/CA protocol

APPARATUS REQUIRED:

LAN TRAINER KIT -01,


PC'S _02

THEORY:

To avoid traffic in Ethemet, the access mechanism called carrier sense multiple
access

with collision avoidance process (CSMA/CA) is used. It is the result of

an

evaluation from multiple access to carrier sense, multiple access method in which
every workstation had equal access to link.

In MA, there is no provision for traffic co-ordinators. Access to the line was open to any node at any time with the assumption that the nodes of the two devices that
attempts for access at the same time were small enough to be unimportant. Any
station wishing to transmit did so, then relied on acknowledgement to verify that the transmitted frame had not been destroyed by other traffic on line. But in CSMA / CA , the handshaking process ( i.e, RTS

CTS - DATA

- ACK

cycle mechanism ) is

followed.

PROCEDURE:

icon in the screen in PCs. ( Two nodes as Senders in the first PC & one node
as receiver

in the second PC )

28

off

40ms, Control Signal Handshake equal to Packet length, Data Signal

Handshake equal to twice the Packet length.

offered load, average delay and average interpacket delay.

corresponding readings.

between them.

FORMULA:
Calculation of Practical Throughput for CSMA/CA:

(Sum of ACK counts in all sender nodes * Packet Length * 8)

[=
(Duration of Experiment * Data Rate)

Calculation of Practical Offered Load for CSMA/CA:

(No of G count in all sender nodes * Packet Length * 8)

x-(Duration of Experiment * Data Rate)

RESULT:
The performance of CSMA/CA protocol is studied and the corresponding graph is
drawn.

29

ENCRYPTION AND DECRYPTION

AIM: To implement the data encryption and decryption.


COPONENTS REQUIRED:
Lan trainer kit -01

PC's --02

THEORY:
The RC 4 is a symmetric key encryption scheme and is based on a sequence of
random number permutations. These are compaxable with one time in terms of their

cryptographic strength. Its implementation is based on simple XOR like operation

making

it

easier

for hardware implementations. The operation being XOR, the

encryption and decryption is the same process and


hardware block for the both operations.

it is enough to construct

For both the encryption and decryption, the length of the key stream

will equal the


are

length of the input plain text /cipher text. The corresponding bytes of plain text
XORed with the key stream to get the plain text.

KEY GENERATION ALGORITHM:


RC4 -KsA(inpufkey string)

It
Restrict key -string to a maximum

of

5 characters(4O) bits

Initialize state table [0:255]:0


Initialise key table [0:255]:repeating block of key string

J:0
For

i:0 to 255&0
-table [i],state table[i])

For f:(i=state -table [i]:key-table[i])mod 256


Swap(state Ene for

30

Out put: state -table[0 :25 5] )

RC4-pmg(input:state -table[0 {

:25

5])

i:j:o;
do(for length of plain text)

i:(i:1)mod
j

2561
25 6 ;

:0 :state-table [i]mod

Swap(state -table [i],state-table [

])

F(state-tab1e[i]:state -table [i]) mod 256 RC4-ENC (input plain -text[current -bye] statetable [t] )
:

) PROCEDURE ENCRYPTION:

DECRYPTION:

RESULT:
Thus the data encryption and decryption was implemented.

31

WIRELESS LANS

AIM:
To transfer the folder between two pc's without using wires.

THEORY:
Wireless communication is one of the fastest growing technologies. The demand for connecting devices without the use

of

cables

is increasing everywhere. Wireless

LANs

can be found on college campus, in office buildings and

in

many public ureas.

Two promising wireless technologies

for LANs: IEEE 802.11, wireless

LAN's,

sometimes called wireless Ethemet and Bluetooth. Bluetooth,

technology for

small wireless LAN's. Although both protocols need several layers to operate, we
concentrate mostly on

the physical

and data

link layers.

IEEE 802.1I
IEEE has defined the specification for a wireless LAN called IEEE 802.1l,which
covers the physical and data

link layers.

ARCHITECHTURE:
The standards define two kinds
extended service set(ESS)

of

services, the basic services set(BSS)and the

BASIC SERVICE SET:


IEEE 802.11 defines the basic service set(BSS) as the building block of a wireless

LAN. A basic service set is made of stationary or mobile wireless stations and a
optional central base station, known as the access point(AP).

EXTENDED SERVICE SET:


An extended service set (ESS) is made up of two or more BSS 's with AP's. In this
case, the BSSs are connected through a

distribution system ,which

is usually a

wired LAN. Two types of stations: Mobile and stationary. The mobile stations are normal stations
inside a BSS. The stationary stations are AP stations that are part of a wired LAN.

32

PROCEDURE:

transmitted.

RESULT:
Thus wireless LAN's and the file was transformed between two PC's without using wire.

33

Você também pode gostar