Escolar Documentos
Profissional Documentos
Cultura Documentos
TECIIATOLOGY
TRrCrrY-620 009
W
DEPARTAIENT OT ELECTRONICS AND
COWTTONENGINEERING
IAB JIIANUAL
cotr7frtr6
SL.NO
NETWORKS LAB
PAGE NO
1.
PC
to PC Communication Parallel communication using 8 bit parallel cable Serial communication using RS 232C.
01
03
2.
3.
Implementation and study of stop and wait protocol Implementation and study of Go-back-N and
selective repeat protocols.
06
08 10
4.
t2 t4
5.
Implementation of distance vector routing algorithm Implementation of Link state routing algorithm. Transfer of flies from PC to PC using Windows/ UNIX socket Processing.
Ethernet LAN Protocol To create scenario and the performance of CSMA/CD Protocol Ethrol Simulation.
t6
6. 7.
l7
t9
24
8.
9.
Wireless LAN Protocols To create scenario and study the performance of network with CSMA/CA protocol and compare with CSMA/CD.
28
10.
30
SERIAL COMMUNICATION
AIM:
To transfer data serially between two PCs using RS 232 cable.
COMPONENTS REQUIRED:
Personal
Computer-2
RS 232 cable
Steps involved :
Host PC:
1.
2. Under network tab , click create a new connection & then click next. 3. Click setup an advanced connection & then click next. 4. Click connect directly to another PC click next & then do one of the
following,
*if you want your computer to act as the Host, click Host & then click next.
5. In Device for this connection, click" Communication Port "between them, and then click next.
6. Click the properties
button &
baud rate.
7.In user permission Wizard you can set the user name
authentic. S.Click finish to set up.
&
icon.Right click on the same & select the properties button,under general tab select the communication cable between two computer i.e.rcom port".
1
button &
Always
allow
will
Guest PC:
l.
2. 3.
Follow these stbps to be 1 to 4 in second PC in the next window select the guest
option & click next.
Enter the connection name which is user define able field, say for example
SERIAL COMMUNICATION.
Select the serial communication port
case
4. Click finish (enter) button. 5. Cilck the properties in the general tab,select the 6'communication
mentioned in the host machine.
between two computers"& click configure button. Set the same baud rate as
6. Select the options tab & set the parameters. 7. Select the networking tab & set the parameters. 8. Select the setting button & check the parameters. 9. Select the TCP/IP & click the parameters button &configure.
10. Select the advanced
the
('use
ll.
13.
Ctick the serial communication short circuit created in he desktop & enter the user name
&
15. Create
a new folder in the host & share the folder . Open the Internet
explorer in the guest & give the IP address of the host & shared folder can be
accessed from the guest.
RESULT:
Thus the data's are transferred serially between two computers using RS 232 cable.
PARALLEL COMMUNICATION
AIM:
To transfer data parallely between two PCs using
24 pinport
cable.
COMPONENTS REQUIRED:
Personal
Computer-2
Steps Involved:
3.Click setup an advanced connection & then click next. 4.Click connect directly to another PC click next & then do one of the following,
guest
button &
baud rate.
7.ln user permission Wizard you can set the user name & password for the guest
authentic.
between two computer com port". l0.Select the properties button & set the baud rate as it has been selected before.
1
l3.Requre all users to secure their Password and data. l4..Select the networking tab & select the TCP/IP properties.
15..Specify the IP range a sample value is shown below and other parameter.
will
same
which
1.
Enter the connection name which is user define able field, say for example
PARALLEL COMMUNICATION.
2.
Select
the parallel communication port which is available in your is LPTI & select the next button.
system.
In this case it
5. Select the options tab & set the parameters. 6. Select the networking tab & set the parameters. 7. Select the setting button & check the parameters. 8. Select the TCP/IP & click the parameters button &configure. 9. Select the advanced button & uncheck the IP header compression & select
the "use default gateway on remote network".
10. Select the DNS tab
I
& configure.
l.
Select the
12.
Click the parellal communication short circuit created in he desktop & enter
the user name
&
14. Create
explorer in the guest & give the IP address of the host & shared folder can be
accessed from the guest.
REST]LT:
Thus the data's are parellally tansferred between two PCs using
24 pnport
cable.
AIM:
To transfer datas between two nodes in a network using stop and wait protocol.
Set up required: Personal Computers-O2
Theory:
In a Stop and wait Protocol , the sender waits for an acknowledgement after every frame it sends. Only when an acknowledgement has been received, the next frame is
sent. This process of altemately sending
& waiting
The advantage
of
is simplicity ,
each frame
is
checked and
is ineffrciency.
Stop and
wait is slow,
all the way to the receiver and an acknowledged frame must travel all the way back before the next frame can be sent. Each frame sent & received uses the entire time
needed to traverse the link. If the distance between the device is long , the time spent
waiting for acknowledgment between each frame can add significantly to the total
transmission time.
Procedure:
II
Repeat the Experiment for a fixed Time out value, change the values of BER and
note the Successfully transmitted packets reading, Calculate the Throughput and Plot
the Graph.
PCl
Node id
Protocol:
Baud Rate
"CSMA./CD"
Duration:
Packet Length
1000
Bit Delay:0(atNEU)
Direction:
Sender
PC2
Node
id:
oo0"
on config menu
Protocol:
Baud Rate
Duration:
Packet Length
1000
Bit Delay:0(atNEU)
Direction: Receiver
Result:
Thus the transfer of data between two nodes is studied using stop and wait protocol.
AIM:
To transmit a set of data between two nodes in a network using Sliding window Go
back N protocol.
Set up required:
Personal Computers-O2
at
maintains a receiving
accept
to fall within the sending window. Similarly ,the receiver also window corresponding to the set of frames it is permitted to
the
window are transmitted one by one without expecting any acknowledgement for each
and every data frame. Only after sending all the data frames present in the window,it
expects acknowledgement.
If any error
retransmitted starting from the damaged or lost one. This approach can waste a lot of
bandwidth if the error rate is high.
PROCEDURE:
I
icon.
il
Repeat the Experiment for a fixed Time out value, change the values of BER and
note the Successfully transmitted packets reading, Calculate the Throughput and Plot the Graph.
PCl
Node id ='00" on config menu
Protocol:
Baud
Rate:
SKbps
and
NEU)
Duration:
30sec
Direction:
Sender
PC2
Node
id:
Protocol:
Baud Rate
"CSMA./CD"
Duration:
Packet
Length:
Direction:
Sender
RESULT:
Thus the set of data has been transmitted from sender to receiver using GOBACK N in
.
AIM:
To transmit a set of data between two nodes in a network using Sliding window and
Selective Repeat protocol.
Computers-02
THEORY:
GO BACK N protocol works well
therefore effors are small.
if
If the communication
it wastes lot of
more
bandwidth
effrcient alternate is to have several packet buffers in the receiver LLC layer for saving out of order packets , such that send only the packets that did not reach the receiver.
This approach that selectively sends only the missed packets and so
sliding window, selective repeat protocol.
it is named as
In this protocol, the sender and receiver maintains the same window sizes at the both
sender and receiver.
PROCEDURE:
10
II
Repeat the Experiment for a fixed Time out value , change the values of BER and note the Successfully transmitted packets reading . and Plot the Graph.
PCl
Node id
Protocol:
Baud Rate
Duration:
Packet
Length:
1000
Bit Delay:O(atNEU)
Direction:
Sender
PC2
Node
id:
Protocol:
Baud Rate
"CSMA/CD"
Duration:
Packet Length
1000
Direction:
Sender
RESULT:
Thus the transfer of data between two nodes is studied using selective repeat protocol.
11
AIM:
To create scenario and study the performance of token bus protocol in a network.
THOERY: TOKEN BUS: In the token bus or token ring topology, the stations are connected to a single cable
called a bus. They make a logical ring because each station knows the address of its
successor. When a station has finished sending its data,
it
matching the destination address of the token gets the token to access the
media. The token bus LAN,standardized by IEEE,uses this topology.
PROCEDURE:
PC1
Node
id:
Protocol:
Baud Rate
"ALOHA"
Duration:
Packet
Length:
1000
I and"l"
on menu 2
t2
Bit Delay:O(atNEU)
Direction:
Sender
PC2
Node
id:
Protocol: Duration:
Packet
"ALOHA"
l0Osec 1000
1
Length:
and'03" on menu 2
Direction:
Sender
Note 1: If you connect two PC's and configured four nodes then set the "My Address"
as 0
Note2: Start running the experiment from the lowest priority node (i.e., from 'My
Address' 3 in case of four nodes Note3: No of Nodes has to be set as 4 when two PCs are connected
RESULT:
Thus the transfer of data between two nodes is studied using token bus protocol.
t3
AIM:
To create scenario and study the performance of token ring protocol in a network.
Set up
required: Computers-02
Personal
its
seen by other stations the successor is the next one does not have to the address
that
if
one of the links the medium between two adjacent stations fails, the whole
system fails.
PROCEDURE:
PC1
Node id
(60"
Protocol:
Baud Rate
set all
to .RING'
Duration:
Packet
Length:
1000
t4
Bit Delay:0(atNEU)
Direction:
Sender
PC2
Node
id:
and
Protocol:
Baud
to 'RlNGl
Duration:
Packet
Length:
1000
Bit Delay:O(atNEU)
Direction:
Note L:
Sender
"My Address"
as 0 to 3 in
Note2: Start running the experiment from the lowest priority node (i.e., from 'My
Address' 3 in case of four nodes Note3: No of Nodes has to be set as 4 when two PCs are connected
RESULT:
Thus the scenario was created and the performance of token ring protocol was studied.
l5
AIM:
To Implement and study the distance vector routing algorithm.
Computers-02
THOERY:
In distance vector routing ,the least cost route between any two nodes is the route with minimum distance. In this protocol,eacg node maintains a vector of minimum distance to every node. The table at each node also guides the packets to the desired node by
showing the next
hop in the route. Each node can know only the distance between its
self and its immediate neighbours, those directly connected to it. The whole idea of
distance vector routing is the sharing of information between neighbours, those directly
connected to it.The whol;e idea of distance vector routing is the sharing between neighbors.
of information
PROCEDURE:
t6
I
the edges(link).
network.
RESULT:
Thus the distance vector routing algorithm was implemented and studied.
l7
AIM:
To Implement and study the link state routing algorithm.
Set up PC with
TTTEORY:
In
link state routing ,if each node in the domain has the entire topology of the domain - the list of nodes and links, how they ure connected including the type
,cost and condition of the links-the node
routing table, but the routing table for each node is unique because the calculations
are based
state routing
the edges(link).
network.
RESULT:
Thus the
AIM:
To establish a socket connection between two computers and use it reliably to
transfer a file.
Set up
required:
JAVA, FTP socket software
PCos -2,
THEORY:
The socket programming technique, the socket is inbuilt in the Operating System
of
the computer. Socket is a technique to communicate between two systems or two networks to encrypt and decrypt the data in secret way. The socket consists of
family, types of the socket, protocol, socket address. The family of the socket is
IPOD and IPO4 are the two families of socket.The protocol of the socket is TCP/P
Types of Socket:
o o o
Raw socket is a type of socket in transport layer.It is used to send the data to the application layer from network layer.It is used to send data to the application layer from transport layer using TCP (Transmission control protocol).
PROCEDURE:
l9
PC2
Client
User name :Administrator
Pass word:Student
Confim password:Student
Server IP address :192.168.15.18 Server port number:2000
:192.168.15.18
number:2000
I
Client.
I
Encrypting and Decrypting a file using RC4 algorithm
Initial Setup:
1. Browse'C:\Lantrain\DataSecurity'.
2.
Copy the 'RC4' folder and three class files (Connect, RC4Client,
Server) and
paste PC'S
(Start Run
type 'cmd').
2. Browse
20
Encrypting a file:
1. Open command prompt in the client
side.
2. Browse
6. Enter the Encryption key not more than 5 characters. 7. Enter the path name of the file to be encrypted. (for eg: c:\\abc.txt)
8.
Type YES
continue
2I
3.
Enter the
(i.e.,
c:\\output.txt)
RESULT:
AIM:
To create a scenario and study the performance of CSMA/CD protocol.
COMPONENTS REQUIRED:
THEORY:
CSMA/CD PROTOCOL:
The access mechanism used in an Ethernet is called carrier sense multiple access
access to
carrier sense multiple access with collision detection. The original design was a multiple access method in which every work station had equal access to a link. In
In CSMA
existing traffic on the line. A device listens by checking for a voltage. If no voltage
is detected, the line is considered idle and transmission is initiated. In CSMA once a node starts transmitting,
it
if there is
collision. In CSMA\CD the station wishing to transmit first listens to make certain that the link is free, then transmits its data and listens again. During the data
transmission the station checks the line for the extremely high voltage that indicate
PROCEDURE:
24
FORMULA:
N*P
\J_
C*ta
8)
8)
25
PCl
Node
Protocol:
Baud rate
: Duration :
Packet
100 s 100
length:
ms
byes
IPD:40
Direction
Bit delay:0(atNEU)
Sender
PC2
Node Id
on config menu 2
Protocol: Csma/cd
Baud
rate:8
Duration
Packet
100
length:
ms
100 bytes
IPD:40
Direction
Bit delay:O(atNEU)
: Sender
RESULT:
The scenario is created & performance of CSMA\CD protocol is studied.
26
Successfully transmitted
Throughput(%)
Throughput
-X
[12345678S
OfTered Loatl {G}
FORMULA:
(Sum of Successfully Tx packet in all the nodes * Packet Length * 8)
x-
x-
27
AIM:
To Study the performance of CSMA/CA protocol
APPARATUS REQUIRED:
THEORY:
To avoid traffic in Ethemet, the access mechanism called carrier sense multiple
access
an
evaluation from multiple access to carrier sense, multiple access method in which
every workstation had equal access to link.
In MA, there is no provision for traffic co-ordinators. Access to the line was open to any node at any time with the assumption that the nodes of the two devices that
attempts for access at the same time were small enough to be unimportant. Any
station wishing to transmit did so, then relied on acknowledgement to verify that the transmitted frame had not been destroyed by other traffic on line. But in CSMA / CA , the handshaking process ( i.e, RTS
CTS - DATA
- ACK
cycle mechanism ) is
followed.
PROCEDURE:
icon in the screen in PCs. ( Two nodes as Senders in the first PC & one node
as receiver
in the second PC )
28
off
corresponding readings.
between them.
FORMULA:
Calculation of Practical Throughput for CSMA/CA:
[=
(Duration of Experiment * Data Rate)
RESULT:
The performance of CSMA/CA protocol is studied and the corresponding graph is
drawn.
29
PC's --02
THEORY:
The RC 4 is a symmetric key encryption scheme and is based on a sequence of
random number permutations. These are compaxable with one time in terms of their
making
it
easier
it is enough to construct
For both the encryption and decryption, the length of the key stream
length of the input plain text /cipher text. The corresponding bytes of plain text
XORed with the key stream to get the plain text.
It
Restrict key -string to a maximum
of
5 characters(4O) bits
J:0
For
i:0 to 255&0
-table [i],state table[i])
30
RC4-pmg(input:state -table[0 {
:25
5])
i:j:o;
do(for length of plain text)
i:(i:1)mod
j
2561
25 6 ;
:0 :state-table [i]mod
])
F(state-tab1e[i]:state -table [i]) mod 256 RC4-ENC (input plain -text[current -bye] statetable [t] )
:
) PROCEDURE ENCRYPTION:
DECRYPTION:
RESULT:
Thus the data encryption and decryption was implemented.
31
WIRELESS LANS
AIM:
To transfer the folder between two pc's without using wires.
THEORY:
Wireless communication is one of the fastest growing technologies. The demand for connecting devices without the use
of
cables
LANs
in
LAN's,
technology for
small wireless LAN's. Although both protocols need several layers to operate, we
concentrate mostly on
the physical
and data
link layers.
IEEE 802.1I
IEEE has defined the specification for a wireless LAN called IEEE 802.1l,which
covers the physical and data
link layers.
ARCHITECHTURE:
The standards define two kinds
extended service set(ESS)
of
LAN. A basic service set is made of stationary or mobile wireless stations and a
optional central base station, known as the access point(AP).
is usually a
wired LAN. Two types of stations: Mobile and stationary. The mobile stations are normal stations
inside a BSS. The stationary stations are AP stations that are part of a wired LAN.
32
PROCEDURE:
transmitted.
RESULT:
Thus wireless LAN's and the file was transformed between two PC's without using wire.
33