EC2356 - COMPUTER NETWORKS LABORATORY LABORATORY MANUAL

Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
EC2356 - COMPUTER NETWORKS LABORATORY
LABORATORY MANUAL
FOR IV SEMESTER B.E (ECE)
ACADEMIC YEAR(2013-2014)
(FOR PRIVATE CIRCULATION ONLY)
ANNA UNIVERSITY CHENNAI-600 025
(REGULATION 2008)
DEPARTMENT OF ELECTRONICS AND COMMUNICATION
ENGINEERING
DR.NAVALAR NEDUNCHEZHIYAN COLLEGE OF ENGINEERING,
THOLUDUR 606 303, CUDDALORE DIST.
1
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
UNIVERSITY PRACTICAL EXAMINATION
Allotment of Marks
Internal assessment
=
20 marks
Practical examination =
80 marks
---------------------Total
=
100 marks
----------------------
INTERNAL ASSESSMENT (20 MARKS)
Staff should maintain the assessment register and the Head of the Department should
monitor it.
Split up of internal marks
Record
Model exam
Attendance
=
10 marks
=
5 marks
=
5 marks
----------------------
Total
=
20 marks
----------------------
UNIVERSITY EXAMINATION
The exam will be conducted for 100 marks. Then the marks will be calculated to 80
marks
Split up of practical examination marks
Aim and Procedure
:
10 marks
Theory
:
10 Marks
Diagram
:
20 Marks
Tabulation
:
15 Marks
Verification
:
25 Marks
Graph and Result
:
10 Marks
Viva Voce
:
10 Marks
-----------------
Total
:
100 Marks
----------------2
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
GENERAL INSTRUCTIONS FOR LABORATORY CLASSES
o Enter the Lab with CLOSED FOOTWEAR.
o Boys should “TUCK IN” the shirts.
o Students should wear uniform only.
o LONG HAIR should be protected, let it not be loose especially near ROTATING
MACHINERY.
o Any other machines / equipments should not be operated other than the prescribed
one for that day.
o POWER SUPPLY to your test table should be obtained only through the LAB
TECHNICIAN.
o Do not LEAN and do not be CLOSE to the rotating components.
o TOOLS, APPARATUS and GUAGE sets are to be returned before leaving the lab.
o HEADINGS and DETAILS should be neatly written
i. Aim of the experiment
ii. Apparatus / Tools / Instruments required
iii. Procedure / Theory / Algorithm / Program
iv. Model Calculations
v. Neat Diagram / Flow charts
vi. Specifications / Designs Details
vii. Tabulations
viii. Graph
ix. Result / discussions .
o Before doing the experiment, the student should get the Circuit / Program approval
by the FACULTY - IN - CHARGE.
o Experiment date should be written in the appropriate place.
o After completing the experiment, the answer to the viva-voce questions should be
neatly written in the workbook.
o Be PATIENT, STEADY, SYSTEMATIC AND REGULAR.
3
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
LIST OF EXPERIMETS
1. PC to PC Communication
2. Parallel Communication using 8 bit parallel cable
3. Serial communication using RS 232C
4. Ethernet LAN protocol
5. To create scenario and study the performance of CSMA/CD protocol through
simulation
6. Token bus and token ring protocols
7. To create scenario and study the performance of token bus and token ring protocols
through simulation
8. Wireless LAN protocols
9. To create scenario and study the performance of network with CSMA / CA protocol
and compare with CSMA/CD protocols.
3. Implementation and study of stop and wait protocol
4. Implementation and study of Goback-N and selective repeat protocols
5. Implementation of distance vector routing algorithm
6. Implementation of Link state routing algorithm
10.Implementation of Data encryption and decryption
11.Transfer of files from PC to PC using Windows / Unix socket processing
4
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
S.NO
01
02
LIST OF EXPERIMENTS
Ethernet
Page No
CONTENTS
6
a. Token Ring
9
b. Token Bus
03
Wireless LAN protocol
14
04
Stop and wait ARQ protocol
17
05
a. Selective Reject ARQ protocol
20
b. Go-Back-N ARQ protocol
ROUTING ALGORITHM’S
21
06
Distance vector algorithm
25
07
Link state algorithm
28
08
a. Data encryption and decryption shifting algorithm
b. RSA algorithm
a. PC to PC File transfer protocol HTTP web browsing.
09
31
34
b. FTP-File transfer protocol
c. SMTP – E-mail
10
a. PC to PC communication (Parallel)
b. PC to PC communication (Serial)
5
40
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 1
Title of the Exercise : ETHERNET
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
To create the scenario and study the performance of Ethernet LAN protocol through
simulation and using trainer kit.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
SPECIFICATION
-
INPUT PARAMETERS:
No of nodes
Frame interval
Frame size
Maximum back off time
Error generation
QUANTITY
1
-
: 2 to 4
: 250 ms to 1000ms
: 64 bytes to 1500bytes
: 4 to 32
: 10-9 10-6 and 10-3
TRANSFERRING A DATA FROM ONE NODE TO ANOTHER:





Each node is numbered as 1,2,3 and 4.
Each node is identified with its own IP address.
From any node file from the system can be opened for transmission.
This file can be sent to any destination node.
At the time of sending, sender window and receiver window are opened in the
respective nodes and data transfer occurs. The progress bar in these windows shows
the amount of data transferred and received.
 In each node, one trace window is available in which data transfer information with
time stamp appears continuously.
 At the end the data transfer, result appears with appearance parameters.
6
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
STORING OF TRANSFERRED FILES, RESULTS AND TRACES:
 For Ethernet operation, one directory namely Ethernet is created in the simulator
directly in C drive. For 4 nodes node 1, node 2, node 3 and node 4 subdirectories are
created.
 Now can be sender or receiver when one file transferred from one node to another
node the data file is stored in destination node. Result is stored as file with the name.
The result is stored in excel format which data can used for the graph.
 There is a provision in every mode to store the trace window information in
respective node. The store in excel format.
CONNECT AND DISCONNECT FACILITY:
At any instant, one node can be disconnected from the shared medium and other later
whenever it necessary, the node can be reconnected.
PAUSE AND RESET FACILITY:
At any time, the simulation can be stopped and can be continued. There is a reset
option in which the process will stop.
PROCEDURE:
 Select 2 nodes and carryout data transfer from one node to another node.
 Select 2 nodes and carryout data transfer between 2 nodes simultaneously and
analyse.Repeat the experiment for different packet sizes, different maximum back off
time and different error generation
 Select 3 nodes and carryout data transfer between the nodes simultaneously and
analyse.Repeat the experiment changing the input parameter.
 Select 4 nodes and do the data transfer and analyse the result when the data transfer is
going on. Disconnect one node and observe and record
RESULT:
Thus the performance of Ethernet LAN protocol through simulation and using
trainer kit was verified successfully.
7
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1.What is Ethernet?
Ethernet is a physical and data link layer technology for local area
networks (LANs).
2.What is meant Data Communication?
Data Communication is a exchange of data between two devices via some
form of transmission medium.
3.What are the fundamental characteristics of data communication?
Delivery:
The system must deliver data to the correct destination.
Accuracy:
The system must deliver data accurately.
Timeliness: The system must deliver data in a timely manner.
4.What are the components used in data communication?
Message, Sender, Receiver, Medium, Protocol.
5.How can you considered data communication ,what are they?
Data communication is considered ,
Local- if the communicating devices are in the same building
Remote –Geographical area.
8
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 2.a
Title of the Exercise : TOKEN RING
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
To create the scenario and study the performance of token ring LAN protocol
through simulation and using trainer kit.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
INPUT PARAMETER:
No of nodes
Frame Interval
Frame size
Error Generation
SPECIFICATION
-
QUANTITY
1
-
– 2 to 4
– 250ms by defeat
– 512bytes -2048bytes
– 10-9,10-6 and 10-3
TRANSFERING A DATA FILE ONE NODE TO ANOTHER:
 Each node is numbered as 1,2,3 and 4.
 Each node is identified with its own input address.
 In order to correct the node in the ring, connect switch is to be used.
 From any node file from the system can be opened for transmission.
 This file can be sent to any destination nodes.
 At this time of sending, the progress bar in these windows the amount of data
transferred and received.
 In each node one trace window is available in which the data transfer information
with time stamp appears continuously.
 At end of the data transfer result appears with performance parameter.
TOKEN HOLD ON TIME AND TOKEN PRIORITY:
 The default frame interval is 250ms in order to send many data packets sequentially
the token hold on time can be changed to higher value using this facility, the token
can be retained node for long time.
 The priority of the node also can be stated.
CONNECT AND DISCONNECT FACILITY:
At any instant one node can be disconnected from the shared medium. And later
whenever it is necessary the node can be reconnected.
9
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
PAUSE AND RESET FACILITY:
At any time the simulator and can be continued. There is reset option in which the
process will stop.
TOKEN RING OPERATION:
Initially the input address of the node are given and nodes are connected to the ring
network. Now, token is placed between the nodes connected. 2 to 4 nodes can be connected
in the ring. As per the priority of the nodes, the token will pass. The priority of the node can
be changed and then the token passing will take route as per the priority allotment.
The token hold on time can also be changed when the data is transferred the number
of frames that all transferred form the mode depends upon the token hold on time on time of
node after the token hold on time the token is passed on to the next priority node.
Duration the file transfer suppose one node in the ring is disconnected then one
messages window appears and ask for triggering the ring leaving the disconnected node if
the answer is yes .the particular node is disconnected and other nodes from a ring and
activities continue. If the answer is no then all the nodes are disconnected. In this cases all
the nodes all to be reconnected using connect switch
STORING OF TRANSFERRED RULES, FILES RESULT AND TRACES :
 For token ring operation, one directory namely token ring is created in the simulator
directory in c drive for 4 node, node2, node3 and node4 slur directories all created.
 Node can be a sender or receiver when one file is transferred from one node to
another the data file is stored in destination mode. Result is stored as a file with the
name part is stored in sender node. The result file is stored in excels format form
which data can be used for graph.
 There is a provision in every need to store the trace window
 Information in the respective mode they are also called in excel format.
PROCEDURE:
 Select 2 nodes and carryout data transfer form node to another node select 2 nodes
and carryout data transfer between 2 nodes simultaneously and analyse. Repeat the
experiment changing the parameters disconnect one redoes and answer to the
question yes and observe the operation and record it disconnect the node and answer
to the question no and observe the generation and record it.
 Select 4 nodes and do the data transfer when the data transfer is going on disconnect
one node and observe and record the effect.
RESULT:
Thus the performance of token ring LAN protocol through simulation and using
trainer kit was verified successfully.
10
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 2.b
Title of the Exercise : TOKEN BUS
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
To create and scenario and study the performance of token bus through simulation
and verify LAN trainees kit.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO APPARATUS
1.
PC
2.
LAN Trainerkit
3.
Network simulator
INPUT PARAMETERS:
No of nodes
Frame interval
Frame size
Error generation
SPECIFICATION
-
QUANTITY
1
-
-2 to 4
-250 ms to 1000 ms
-512 bytes to 2,4,8 bytes
-10-9,10-6 and 10-3
TRANSFERRING A DATA FILE ONE NODE TO ANOTHER:
 Each node is identified with its own input address
 Each node is numbered with the priority no of that given to the node
 In order to connect the node in the token bus connect switch to be used
 Form any node. File form the system can be opened for transmission
 This file can be sent to any destination node.
 At the any time of sending. Sender window and receiver window are opened in the
respective nodes and the data transfer occurs the progress bar in there windows shows
the amount of data transferred and received.
 In each node one trace window is .available in which data transfer information with
time stamp appears continuously.
 At the end of data transfer result appears with performance parameters.
TOKEN PRIORITY:
The priority of the node also can be changed by using this option.
CONNECT AND DISCONNECT FACILITY:
At any instant, one node can be disconnected from the shared medium.
And later whenever it is necessary, the node can be reconnected.
PAUSE AND RESET FACILITY:
At any time, the simulation can be stopped and can be stopped and can be
continued. There is reset option in switch. The process will stop.
11
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
TOKEN BUS OPERATION
Initially the IP address of the nodes and priority are given and nodes are
connected to the token bus network. Now token is passed between the nodes connected 2 to 4
nodes can be connected in the bus. As per the priority can be changed and then the token
passing will be take route as per the priority allotment.
During the file transfer suppose one node is the ring is connected then that node is
automatically disconnected and the token bus is refrontigned leaving that node automatically
no question is asked. The node can be reconnected using connect switch.
PAUSE AND RESET FACILITY:
During the file transfer one node in the ring is disconnected, then that node is and
process will stop.
STORING OF TRANSFERRED FILES, RESULT AND TRACES:
 For token operation, one directory namely token bus is created in the simulator
directory in C drive. For node 4, node 1, node 2, node3 and 4 subdirectories are
created.
 Node can be sender or receiver when one file is transferred from one to another node.
The data file is stored in the destination node. Result is stored as file with the name
part is stored in excel format in which data can be used for graph.
 There is a provision is every node store the trace window information in the
respective window. They are also stored in excel format.
PROCEDURE:
 Select 2 nodes and carryout data transfer from one node to another node.
 Select 2 nodes and carryout data transfer between two nodes simultaneously and
analyses. Repeat the experiment of different packet sizes and error.
 Select 3 nodes and carryout data transfer between the nodes simultaneously and
analyses. Repeat the experiment changing the input parameter.
RESULT:
Thus the performance of token bus LAN protocol through simulation and
using trainer kit was verified successfully.
12
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1. What is token ring?
Token ring local area network (LAN) technology is a local area
network protocol which resides at the data link layer (DLL) of the OSI model. It uses a
special three-byte frame called a token that travels around the ring. Token-possession grants
the possessor permission to transmit on the medium. Token ring frames travel completely
around the loop.
2.What is token bus?
Token bus is a network implementing the token ring protocol over a "virtual
ring" on a coaxial cable. A token is passed around the network nodes and only the node
possessing the token may transmit. If a node doesn't have anything to send, the token is
passed on to the next node on the virtual ring. Each node must know the address of its
neighbour in the ring, so a special protocol is needed to notify the other nodes of connections
to, and disconnections from, the ring.
3.Define networks.
A network is a set of devices connected by media links.
4. Define Communication channels
The links connecting the devices are often called communication channel.
5.What is meant by distributed processing & write any two advantages.
Networks use distributed processing in which a task is divided among
multiple computers.
Advantages: Security, Faster problem sloving, Collaborative processing
13
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 3
Title of the Exercise :WIRELESS LAN PROTOCOL
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
To create scenario and study the performance of wireless LAN protocol through
simulation and verify using LAN trainer kit.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
INPUT PARAMETERS:
No of Nodes
Frame Interval
Frame size
Max. back off time
Error generation
SPECIFICATION
-
QUANTITY
1
-
- 2 to 4
- 250ms to 1000ms
- 128bytes to 1500bytes
- 4 to 32
- 0.01,0.1 and 1.5
TRANSFERRING A DATA FILE FROM ONE NODE TO ANOTHER:
 Each node is numbered as 1, 2, 3 and 4.
 Each node is identified with its own input address.
 From any node mode file from the system can be opened for transmission.
 The file can be sent to any destination mode
 At the time of sending , sender window and receiver window are opened in the
respective modes and data transfer occur
 The progress bar in these windows shows the amount of data transferred and
received.
 In each node, one trace window is available in which data transfer information with
stamp appears continuously.
 At the end of data transfer, result appears with performance parameters.
STORING OF TRANSFERRED FILES, RESULTS AND TRACES:
 For the wireless LAN operation, one directory namely wireless is created in the
simulator directory in C drive. For node 4, node 1, node 2 and node 3 node 4 sub
directories are created.
 Node can be sender or receiver when one file is transferred from one node to another
node. The data file is stored in destination node. Result is stored as file with the name
part is stored in sender mode.
 The result file is stored in excel format from which data can be for graph.
14
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
 There is a provision in every node to store the trace window information is the
respective node. They are also stored in excel format.
CONNECT AND DISCONNECT FACILITY:
At any instant one node can be disconnected from the shared medium. And later
whenever it necessary the node can be reconnected.
PAUSE AND RESET FACILITY:
At any time, the simulation can be stopped and can be continued there is reset
option in which the process will stop.
PROCEDURE:
 Select 2 nodes and carryout data transfer from one node to another node.
 Select 2 nodes and carryout data transfer between two nodes simultaneously and
analyze. Repeat the experiment for packet sizes. Different maximum back off time
and different error generation.
 Select 3 nodes and carryout data transfer between the nodes simultaneously and
analyze. Repeat the experiment and changing the input parameter.
 Select 4 nodes and do the data transfer when the transfer is going on. Disconnect one
node and observe and record the effect.
RESULT:
Thus the performance of wireless LAN protocol through simulation
and using trainer kit was verified successfully.
15
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1.What is wireless LAN protocol?
IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN)
computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and
maintained by theIEEE LAN/MAN Standards Committee (IEEE 802). The base version of
the standard IEEE 802.11-2007 has had subsequent amendments. These standards provide
the basis for wireless network products using the Wi-Fi brand name.
2.What is meant by Collaborative processing?
Both multiple computer and multiple users may interact on a task.
3.What are the factors that depends on the performance of a network criteria?
Performance of a network depends on a number of factors,
a. Number of users
b.Type of transmission medium
b. Capabilities of the connected hardware d.Efficiency of software
4. Write the application which we are used in data communication?
i. Marketing &Sales
ii. Financial services
iii.Cellular telephone
ivCable television
5.Define protocol.
Protocol is a set of rules that govern data communication.
16
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 4
Title of the Exercise : STOP AND WAIT ARQ PROTOCOL
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
To implement and study the performance of stop and wait protocol through
simulation and LAN trainer kit.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
SPECIFICATION
-
QUANTITY
1
-
INPUT PARAMETERS
 Packet size
: 512B to 2048B
 Round trip time:50ms to 150ms
 Less Rate
: 0% to 50%
 Retransmit time out : 100ms to 1000ms.
NOTE
At the time of giving input parameters it is to be noted that output value given for
retransmit time out parameter should be more than RIT.
TRANSFERING DATA FILE FROM ONE SYSTEM TO ANOTHER SYSTEM
MAINLY in-WAN
In this experiement, there is one sender and one receiver.From the sender file the
system can be opened for transmission.
This can be send to the receiver by using start button .In between there is a
networks.There are trace windows in sender network and receiver and data through
information with the time stamp appears continuously.In networks the error information is
displayed.
At the end of the data transfer result appears with the performance parameters in the
bottom of the page namely payload, transform time throughput and losses.
STORING OF TRANSFERRED FILES AND TRACES.
At any time, the simulation can be stopped and can be continued, reset can be used to
start from the beginning.
17
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
EXPERIEMNT TO BE CARRIED OUT:
Select a file from the system and transfer the file from sender or receiver .Assign the
following input parameters the data flow follows stop and wait algorithm in sending the
packets (frames) in the network.
 Packet size
1024B
 RTT
100ms
 Loss rate
10%
 Retransmission time out
200ms
Choose a file and send note down the results.Note down the trace,when packet error
has occurred and when the time out has triggered and what was the next action.Check
whether stop and wait algorithm is followed.
 Change the packet size of 2048 bytes
 Send the same file
 Note down the results.
 Compare the results.
Similarly change the loss rate and compare the result.
QUEING THE GRAPH AND PRINTING THE GRAPH
In order to view the frame sent time graph.First we have to loss the simulator
software.In C: drive inside the simulator directory in stop and wait directory .The graph is
stored as excel file.In the computer system excel software should be available to view the
graph by opening the file “ Time frame” .The graph can be seen and data instead, derived
from the trace can be seen.The graph can be printed in excel software .During the time out
the packet is resent. It can be clearly viewed in the graph.
PERFORMANCE
 Payload delivered
 Simulation time
 Throughput
 Good Put
 Data frame
124.416 Kbytes
207.53ms
4.8723kbps
4.7961 kbps
122
RESULT:
Thus the performance of stop and wait protocol through simulation and LAN trainer
kit was verified successfully.
18
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1.
What is stop and wait ARQ protocol?
Stop-and-wait ARQ is a method used in telecommunications to send information
between two connected devices. It ensures that information is not lost due to dropped packets
and that packets are received in the correct order. It is the simplest kind of automatic repeatrequest (ARQ) method. A stop-and-wait ARQ sender sends one frame at a time; it is a
special case of the general sliding window protocol with both transmit and receive window
sizes equal to 1. After sending each frame, the sender doesn't send any further frames until it
receives an acknowledgement (ACK) signal. After receiving a good frame, the receiver sends
an ACK. If the ACK does not reach the sender before a certain time, known as the timeout,
the sender sends the same frame again.
2. In which layer error detection & error correction find?
Data can be corrupted during transmission. Transmission errors detected at
physical layer of OSI model. Transmission errors corrected at the data link layer.
3. Write the types of error & define it.
There are two types of error
a. single bit error
only one bit in the data unit such as a byte, character , or packet
changed from 1 to 0 or from 0 to1.
b. burst error
A burst error means that two or more bits in the data unit has
changed from 1 to 0 or 0 to1.
4. Define data link layer.
Data link layer is the second layer in OSI model. The DLL lies between the
network layer & physical layer. It receives services from physical layer and provides
services to the network layer. The DLL is responsible for carrying a packet from one
hop to next hop.
5. List out the duties of DLL?
Duties of DLL are
Packet zing,Addressing,Error control,Flow control, Medium access control
19
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 5.a
Title of the Exercise : SELECTIVE REJECT ARQ PROTOCOL
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
To implement and study the performance of selective ARQ protocol using
simulation and LAN trainer Kit.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
INPUT PARAMETERS
 Window size
 Bandwidth
 Frame size
 Round trip time
 Less Rate
 Retransmit time out
SPECIFICATION
-
QUANTITY
1
-
:1 to 10 packets
: 5000 kbs to 5000kbps
: 512B to 2048B
:50ms to 500ms
: 0% to 50%
: 100ms to 1000ms.
TRANSFERING A FILE (DATA) FROM ONE NODE TO ANOTHER NODE
In this experiment, there is one sender and one receiver from the sender file the
system can be opened for transmission.
This file can be send to the receiver by using start button .In between there is a
networks.There are trace windows in sender network and receiver and data through
information with the time stamp appears continuously. In networks the error information is
displayed.
At the end of the data transfer result appears with the performance parameters
STORING OF TRANSFERRED FILES AND TRACES.
The selective repeat simulator creates a directory named “selective repeat” in the
simulator directory in C: drive. The transmit file is stored in the directory.
PAUSE AND RESET FACILITY
At any time the simulation can be stopped and can be continued .Reset can be used to
start from the beginning.
PROCEDURE
Select a file the system and transfer the file from sender to receiver.Assign the
following input parameters.As the data flow follows selective repeat algorithm in sending the
packet (frames) in the network.
20
Dr.NNCE
ECE / VI SEM






Packet size
RTT
Less rate
Retransmission time out
Window size
Bandwidth
:
NETWORKS LAB - LM
1024B
100ms
10%
200ms
:2000kbps
5 Packets
Choose a file and send data down the results.Note down from the trace, when packet error
has occurred and when the time out has stopped happened and what was the next
action.Check whether it follows the selective repeat algorithm
 Change the packet size of 2048 bytes
 Send the frame file
 Note down the results.
 Compare the results.
Similarly change the loss rate and compare the result.Give the reason for congestion packet
drop.
VIEWING THE GRAPH AND PRINTING THE GRAPH
In order to view the frame sent Vs time graph.First we have to close the simulator
software.In C: drive inside the simulator directory in the selective repeat directory .The
graph is stored as excel file.In the computer system excel software should be available to
view the graph by opening the file “ Time frame xls” .The graph can be seen and data
derived from the trace can be seen.The graph can be printed in excel software .During the
time out, the packet is resent according to the Go-back –n algorithm in the graph.
By reducing the BW and by increasing the window size we will be able to see
congestion packet drop also in the network.
PERFORMANCE
Payload delivered
Simulation time
Throughput
Good Put
Data frame
132.546 Kbytes
51.67ms
20.5981kbps
20.5214kbps
130
RESULT:
Thus the performance of selective ARQ protocol using simulation and LAN trainer
Kit was verified successfully.
21
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 5.b
Title of the Exercise : GO BACK N ARQ PROTOCOL
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
To implement and study the performance of Go Back N ARQ protocol using
simulation and LAN trainer Kit.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
INPUT PARAMETERS
 Window size
 Bandwidth
 Packet size
 Round trip time
 Loss Rate
 Retransmit time out
SPECIFICATION
-
QUANTITY
1
-
:1 to 10 packets
: 500 kbs to 5ms
: 512B to 2048B
:50ms to 500ms
: 0% to 50%
: 100ms to 1000ms.
TRANSFERING DATA FILE FROM ONE SYSTEM TO ANOTHER SYSTEM
MAINLY in-WAN
In this experiment, there is one sender and one receiver from the sender file from the
system can be opened for transmission.
This file can be send to the receiver by using start button .In between there is a
network of networks.
If the time of sending sender window and receiver window are opened. The
progresses are in these windows shows amount of data transferred and received.
There are trace windows in sender network and receiver network and the data
transform information with the time stamp progress continuously
At the end of the data transfer result appears with the performance parameters.
STORING OF TRANSFERRED FILES AND TRACES.
The Go Back ON simulator creates a directory named “GO-BACK-N ” in the
simulator directory in C: drive. The transmit file is stored in this directory.
22
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
PAUSE AND RESET FACILITY
At any time the simulation can be stopped and can be continued .Reset can be used to
start from the beginning.
PROCEDURE
Select a file from the system and transfer the file from sender to receiver. Assign the
following input parameters. As the data flow follows Go-Back-N wait algorithm in sending
the packet (frames) in the network.
 Packet size
1024B
 RTT
100ms
 Retransmission time out
200ms
 Window size
:2000kbytes
 Bandwidth
:
5 Packets
Choose a file and send data down the results. Note down from the trace, when packet error
has occurred and when the time out has stopped happened and what was the next action.
Check whether it follows the Go-Back –N algorithm
 Change the packet size of 2048 bytes
 Send the same file
 Note down the result.
 Compare the result.
 Similarly change the loss rate Vs and compare the result..
VIEWING THE GRAPH AND PRINTING THE GRAPH
In order to view the frame sent Vs time graph. First we have to close the simulator
software. In C: drive inside the simulator directory in the Go-Back-N directory .The graph
is stored as excel file. In the computer system excel software should be available to view the
graph by opening the file “ Time frame xsl” .The graph can be seen and data derived from
the trace can be seen. The graph can be printed in excel software .During the time out, the
packet are used according to the Go-back –n algorithm. It can be clearly viewed in the graph.
By reducing the BW and by increasing the window size we will be able to see
congestion packet drop also in the network.
PERFORMANCE
 Packet size
 Retransmit time
 Window size
 Payload delivered
 Simulation time
 Throughput
 Good Put
 Data frame
1024 bytes
200ms
5 packets
132.546 Kbytes
56.78ms
18.7512kbps
18.675kbps
130
RESULT:
Thus the performance of Go Back N ARQ protocol using simulation and LAN
trainer Kit was verified successfully.
23
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1.
What is selective reject ARQ protocol..
Selective Repeat ARQ / Selective Reject ARQ is a specific instance of
the Automatic Repeat-Request (ARQ) protocol used for communications. It may be
used as a protocol for the delivery and acknowledgement of message units, or it may
be used as a protocol for the delivery of subdivided message sub-units.
2.
What is Go back N ARQ protocol..
Go-Back-N ARQ is a specific instance of the automatic repeat request (ARQ)
protocol, in which the sending process continues to send a number of frames specified by
a window size even without receiving an acknowledgement (ACK) packet from the receiver.
It is a special case of the general sliding window protocol with the transmit window size of N
and receive window size of 1.
3.Define parity bit.
The simplest form of error detection is to append a single bit called a parity bit
to a string of data.
4.Define hamming distance.
The number of bits positions in which two codeword differ is called the
hamming distance.
5.What is meant by codeword & block length?
Codeword is the encoded block of ‘n’ bits. It contains message bits and
redundant bits.
Block length: the number of bits ‘n’ after coding is called the block length of
the code.
24
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 6
Title of the Exercise : ROUTING ALGORITHM’S /
DISTANCE VECTOR ALGORITHM
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
To Implement and study the distance algorithm
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
SPECIFICATION
-
QUANTITY
1
-
INPUT PARAMETERS:




Router : 3 to 7
Connectivity between the routers to be given
Weight uncost
Some router to be selected
PROCESS:
The distance vector algorithm is executed initially in Iteration-1, the source router
creates the router table with the distance information of the other router connected to the
neighboring routers.
By using next switch second iteration is done. In the second iteration ,it calculates the
shortest distance to the unconnected notes then the information gathered in the first iteration
and defines the routing table. If there are ‘n’ routers the n-1 iteration are required to get
shortest distance for all the routers.
The routing table gives us shortest distance for all the routers from the some rout ion
and also information to which router the packet should go next.
PROCEDURE:
Select say 5 routers and draw the connectivity .Input the distance between the routers.
Select source router study the iteration and routing table for each iteration check finally
whether the short distance is calculated and correct next.
Keep the layout as is change for distance between the routers, the creation and for
each operation study and check and verify the result at the end. Keep the layout as it is
change the source router and do the experiments verify the result at the end. Do the different
configuration and do iteration and verify the results.
25
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
STORING OF TRANSFERRED FILES AND TRACES:
The distance vector simulator executes a directory named “Distance Vectors” in the
simulator directory in ‘E’ drive.
RESULT:
Thus the implementation and performance of distance vector algorithm was
verified successfully.
26
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1.
What is Routing algorithm?
Routing is the process of selecting paths in a network along which to send
network traffic. Routing is performed for many kinds of networks, including
the telephone network (Circuit switching),electronic data networks (such as
the Internet), and transportation networks.
2.What is Distance vector routing algorithm?
A distance-vector routing protocol is one of the two major classes of routing
protocols, the other major class being the link-state protocol. A distance-vector routing
protocol requires that a router informs its neighbors of topology changes periodically.
Compared to link-state protocols, which require a router to inform all the nodes in a
network of topology changes, distance-vector routing protocols have less computational
complexity and message overhead.
3.Define parity bit.
The simplest form of error detection is to append a single bit called a parity bit
to a string of data.
4.Define hamming distance.
The number of bits positions in which two codeword differ is called the
hamming distance.
5.What is meant by codeword & block length?
Codeword is the encoded block of ‘n’ bits. It contains message bits and
redundant bits.
Block length: the number of bits ‘n’ after coding is called the block length of
the code.
27
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 7
Title of the Exercise :
Date of the Exercise :
LINK STATE ALGORITHM
OBJECTIVE (AIM) OF THE EXPERIMENT
To implement and study the link state algorithm.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
APPARATUS
1.
PC
2.
LAN Trainerkit
3.
Network simulator
INPUT PARAMETERSS:




SPECIFICATION QUANTITY
1
-
Router : 3 to 7
Connectivity between the routers to be given
Weight uncost or distance between routers number 1 to 10
Source router to be selected.
PROCESS:
The link state algorithm is executed .There are parent group and transitive group.
Initially in iteration the source router is an parent group and all the directly connected routers
are in the transitive group and router table is created.
By using next switch 2nd Iteration is done .In what iteration the short distance
neighboring router is taken into parent group and the routers associated with the particular
router are placed in the transitive group and routing table is connected. In this way of there n
routers available. The n number of iteration is required to find the shortest distance in this
method.
Finally the routing table sizes the shortest distance for all routers from the source
routers and also information to which router the packet should go next.
PROCEDURE:
 Select say to routers and draw the connectivity Input the distance between the routers
select some router study the iteration and routing table every time created.
 Check finally whether the short distance is calculated and correct next best loop.
 Keep the layout as it is change the distance vector between the routers.
 Do the iteration and for each iteration study and check verify the result at the end
 Do the different configuration and do iteration and verify the results.
28
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
STORING OF TRANSFERRED FILES AND TRACES.
The link state simulator creates a directory named “Link state” in the simulator
directory in ‘E’ drive.
RESULT:
Thus the implementation and performance of link state vector algorithm was
verified successfully.
29
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1. What is link state algorithm?
The basic concept of link-state routing is that every node constructs a map of
the connectivity to the network, in the form of a graph, showing which nodes are
connected to which other nodes. Each node then independently calculates the next
best logical path from it to every possible destination in the network. The collection
of best paths will then form the node's routing table.
2. List out the services provided by the network layer.
The network layer is responsible for the source-to-destination delivery of a packet
possibly across multiple networks specific responsibility of a network layer includes the
following.
a. logical addressing b.Routing.
3. What is a virtual circuit?
A logical circuit made between the sending and receiving computer. The
connection is made after both computers do handshaking. after the connection; all
packets follow the same route and arrive in sequence.
4. What are datagrams?
In datagram approach, each packet is treated independently from all others. Even
when one packet represents just a place of a multipacket transmission, the networks treat
if as though it existed alone. Packets in this technology are referred to as datagrams.
30
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 8.a
Title of the Exercise :
DATA ENCRYPTION AND DECRYPTION SHIFTING
ALGORITHM
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
To implement the data encryption and decryption.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
SPECIFICATION QUANTITY
1
-
INPUT PARAMETERS:
 Input font to be given.
 Shift –no. of bits to be given.
PROCESS:
 The shifting algorithm is executed at the time of encryption.
 At the time of decryption, again shifting algorithm is executed.
PROCEDURE:
 Enter the font is the text box available.
 Give the Shifting index and use shift key.
 Encryption message appears in the window.
 When re-shift key is used re-shift algorithm is used with encrypted message and reshifted message is displayed.
RESULT:
Thus the performance of data encryption and decryption was verified successfully.
31
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 8.b
Title of the Exercise : RSA ALGORITHM
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
To implement the data encryption and decryption process during RSA algorithm
using simulation.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
SPECIFICATION QUANTITY
1
-
INPUT PARAMETERS:
Initially a plain font of max to characters is given.
PROCESS:
Here the RSA algorithm is used for encryption and decryption.
PROCEDURE:
Encryption:
 Encryption in key is used in the menu box.
 Then again encryption key below the font window is used to encrypting the message.
 RSA algorithm procedure is stage by stage executed and the steps are shown in the
output window.
 Secret key and public key are generated and displayed.
Decryption:
 Decryption key is used in the menu box.
 then again decryption key below the font window is used to decrypting the message
 Decryption stage is executed and steps are shown in the output window
 The decrypted font is displayed.
RESULT:
Thus the performance of data encryption and decryption using RSA algorithm was
verified successfully.
32
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1. What is meant by congestion?
Congestion in a network occurs if user sends data into the network at a rate
greater than that allowed by network resources.
2. Why the congestion occur in a network?
Congestion occurs because the switches in a network have a limited buffer
size to store arrived packets before processing.
3. What is data encryption ?
Data encryption refers to mathematical calculations and algorithmic schemes
that transform plaintext into cyphertext, a form that is non-readable to unauthorized
parties. The recipient of an encrypted message uses a key which triggers the algorithm
mechanism to decrypt the data, transforming it to the original plaintext version.
4.What is RSA algorithm?
An public-key encryption technology developed by RSA Data Security, Inc.
The acronym stands for Rivest, Shamir, and Adelman, the inventors of the technique.
The RSA algorithm is based on the fact that there is no efficient way to factor very
large numbers. Deducing an RSA key, therefore, requires an extraordinary amount of
computer processing power and time.The RSA algorithm has become the de facto
standard for industrial-strengthencryption, especially for data sent over the Internet.
5. What is the function of FECN?
The FECN bit is used to warn the receiver of congestion in the network. The
sender and receiver are communication with each other and are using some type of flow
control at a higher level.
33
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 9.a
Title of the Exercise :PC TO PC FILE TRANSFER PROTOCOL HTTP WEB
BROWSING
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
The function part IP is so for web browsing in this experiment the user can access one
control file the web server.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
APPARATUS
1.
PC
2.
Network simulator
INPUT PARAMETERS:
 Client ID –IP address
 Server ID- IP address
SPECIFICATION QUANTITY
2
-
PROCESS:
In the experiment at the time of connecting the client to the server communication
pipe namely socket is created. The socket is characterized by 4 parameters.
1. Server IP
2. Client IP
3. Local port number 80
4. Remote port number.
When the client sends the connect request to the server, it generates a 16 bit random and
send it as port no.
As for as the server is connected this port no. is remote port no. Once the socket is
created , the client can send the request to the server and set the file log is created in the
server.
PROCEDURE:
 The client IP address is entered.
 Then the server address is entered and activated.
 Then in the client side , to connect to the server address is entered and the connect
switch is used to connect the client to the server.
 Now the socket is created and the connection is made and log is given in the server.
 Then the user can send the request to the server by typing #netline.com / index.html
and press go button.
 How the request gives to server responds .It access the file namely index.html file and
transfer it to the client .Then the client hypertext made up language ,file and units.
 There is an interaction between the server and the client the server sends the file to
the client and in the client window, the context of the file is displayed.
34
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
 There is an interaction between the server and the client the server sends the file to
the client and in the client window, the context of the file is displayed.
 The user can disconnect the client and server also. In the server side log is generated
to every activity.
 The simulation is reused. In the simulation directory in C: drive the html file is
opened. In notepad and the content is altered and saved.
 Again the same application is run.
 It is to be verified that the modified context is appearing in the client window
RESULT:
Thus the function of PC to PC file transfer protocol HTTP web browsing was
verified successfully.
35
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 9.b
FTP –FILE TRANSFER PROTOCOL.
Title of the Exercise :
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
The function port ID is 21 for file transfer in this experiment, the user can do still
transfer from a FTP server.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
APPARATUS
PC
Network simulator
SPECIFICATION QUANTITY
-
INPUT PARAMETERS:
 Client ID–IP address
 Server ID- IP address
PROCESS:
In the experiment at the time of connecting the client to the server (It generally)
communication pipe namely socket is created. The socket is characterized by 4 parameters.
1. Server IP
2. Client IP
3. Local port number 80
4. Remote port number.
When the client sends the connect request to the server, it generates a 16 bit random which
lies between 1024 and 65.536 and send it as port no.
As for as the server is connected this port no. is remote port no.
In the FTP operation ,2 sockets are generated .They are control socket and data sockets.
Once the socket is created , the client can send the request to the server and set the file log is
created in the server.
RESULT:
Thus the performance of File transfer protocol was verified successfully.
36
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 9.c
Title of the Exercise :
Date of the Exercise :
STOP E-MAIL
OBJECTIVE (AIM) OF THE EXPERIMENT
The function port Id is 25 for the file transfer .In this experiment, the user can send email to another
FACILITIES REQUIRED AND PROCEDURE
FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
APPARATUS
PC
Network simulator
SPECIFICATION QUANTITY
-
INPUT PARAMETERS:
 Client ID–IP address
 Server ID- IP address
PROCESS:
In the experiment at the time of connecting the client to the server (It generally)
communication pipe namely socket is created. The socket is characterized by 4 parameters.
1. Server IP
2. Client IP
3. Local port number 80
4. Remote port number.
When the client sends the connect request to the server, it generates a 16 bit random which
lies between 1024 and 65.536 and send it as port no.
As for as the server is connected this port no. is remote port no.
In the e-mail operation 2 socket are generated. They are control socket and data socket.
Once the socket is created, the client can send the request to the server and set the file
log is created in the server and get the file.
PROCEDURE:
 user is supposed to given client IP address and server address in server. Then in
the client configuration window. The server address is address to be given and
connect button is to be used.
 Now the control socket and data socket are created.
 Then the user can send the request to the server by typing [email protected]
and progress go button.
 The content in the client window is taken as the message for the mail.
 The mail reaches the mail box of the user.
 The user IP address 132.168.11 can check email by using check mail key.
37
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
 Then the user systems interact with the server and of there any mail it gives as
message that user has got a mail.
 The content of the mail is also displayed in the user window.
RESULT:
Thus the performance of stop E-mail was verified successfully.
38
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1. Define FTP.
File transfer protocol is the standard mechanism provided by the TCP/IP for
copying a file one host to another. Transferring files from one computer to another is one of
the most common takes expected from a networking or internetworking environment.
2. How does FTP differ from other client server applications?
FTP differs from other client server applications in that it establishes two
connections between the hosts. One connection is used for data transfer and other for
control information.
3. What is SMTP?
The TCP/IP protocol supports electronic mail on the internet is called Simple mail
transfer protocol. It is a system for sending messages to other computer users based on email addresses.
4.What is Http?
The Hypertext Transfer Protocol is a protocol used mainly to access data on the
World Wide Web. The protocol transfer data in the form of plaintext, hypertext, audio,
and video and so on.
5.How does HTTP differ from SMTP?
a. HTTP differs from SMTP in the way the messages are sent from the client to
the server and from the server to the client.
b. Unlike SMTP, the HTTP messages are not destined to be read by humans.
c. HTTP messages are delivered immediately.
6. Relate HTTP and FTP.
HTTP is similar to FTP, because it transfers files and uses the services of TCP.
However it is much simpler than FTP, because HTTP uses only one TCP connection.
There is not a separate control connection.
39
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 10.a
Title of the Exercise :PC-PC COMMUNICATAION (PARALLEL)
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
The main aim of the experiement is to enough transfer a file from PC to another PC
using parallel port.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
3.
APPARATUS
PC
Network simulator
Parallel trainer kit
SPECIFICATION QUANTITY
2
2
DESCRIPTION
The main aim of the experiement is to transfer a file from PC to another PC using
parallel port.The interface between the PC’s is done through the parallel port(Lpt) in the PC,
a male to male a 25 pin D-type connection is used to connect together.The parallel port is
configure to run in bi-directional mode.The data links D0-D8 are used to readline a type of
data.The connect line STROBE and status link.ACK make the handshaking signal.The
Digital data pin are connected directly to the 74LS244 bidirectional buffer..The output of the
buffer is connected to the datalines of the parallel port.
OPERATION
 The data bytes to the transmitted is placed on the data register(0*378)
 The control PIN STORE is made low to indicate a valid data on the data bus.
 The receiver PC wait for the status pin FCK to go high.
 Once the ACK pin goes high the data in the data register is read.
 The receiver PC then acknowledges by giving a pulse can be set by user.
 This Handshaking sequence is repeated for every byte until the end of the life.
40
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
PROCEDURE
 Connect one end of the 25Pin n-type male and male connector to the parallel port of
your PC (LPT) signal.
 Connect end to be 25 pin n-type female connector of the PC to PC communication.
 Repeat the step1 and step2 with order.
 Connect the STROBE pin of system 1 to the ACK pin of System 2 in the trainer kit.
 Connect datapins D0-D7 of System1 to pins D0-D7 System2.
 Common the ground terminals
 Run Parallel 1 in both the PCs.
PC TRANSMITTING SYSTEM:
Select the file to be sent in the PC from which you want to transfer file.
FOR RECEIVING SYSTEM
Set the transmission rate.The user can choose the present rate it “Choose Delay”
option is selected or can assign only rate from 1 to 100ns it “ user Delay “ option is selected.
Select the path for the file to be stored.
NOTE:
 The “reactive file “ or “receive files” button is disable control the file path for the
receiving file is selected.
 Click “ Send file” button is the transmitting PC.
 Clock “ Receive file” Button in the receiver PC.
 “File through transfer Completer” message appears both in the transmitter and
receiver PC once the transfer is complete.
 The file is complete will be displayed on the textbook in the receiver PC.
 Clock “ Clear “ button to clear the contents in the text Box.
 Repeat all the above steps to send a new file.
RESULT:
Thus the performance of transfer a file from PC to another PC using parallel
port was verified successfully.
41
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 10.b
Title of the Exercise :
PC-PC COMMUNICATAION (SERIAL)
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
The main aim of the experiment is to enough transfer a file from PC to another PC
using Serial port.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
3.
APPARATUS
PC
Network simulator
Parallel trainer kit
SPECIFICATION QUANTITY
2
2
PROCEDURE
 Connect one end of the Pin n-type female to female connector to the serial port of
your PC signal.
 Connect other end to the 9 pin n-type for female connector of the PC to PC
communication trainer.
 Repeat the step1 and step2 with other PC system2.
 Connect RXD pin of System1 to find pin of System 2
 Connect RXD pin of System2 to TXD pin of System 1
 Connect MXR pin of System2 to NSR pin of System 2
 Connect RTS pin of System1 to MS pin of System 2
 Connect RTS pin of System2 to MS pin of System 1
 Common the ground terminals
 Run Serial 1 in both the PCs.
 Select the common terminal and Band rate.
42
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
NOTE:
 Band rate selected should be same for both the PCs
 Click set “ Serial-port” button successively change message appears.
 The status of the CTS pin will read ‘nodal ‘ in both receiver and transmitter.
 Clock RTS button in the transmitting Pc and receiver Pc.
 The status of the CTS pin will read ‘ok’ in both receiver an transmitter.
 The status of the ASR pin will read ‘ok’ in both receiver an transmitter.
 Type the message to be transmitted in the text box.
 Click “ Transmit” button to transmit in the typed context.
 Click “ CLR SCREEN” button to clear the text box.
TO TRANSMIT A FILE
 Type the message in the text box.
 Type the file Port with name to which context to be written.
 Click the “ WRITE-SCREEN-TO – FILE” button to the write context.
 Click the “ READ-FILE-TO-SCREEN” button to read context of the file.
 Clock “ Transmit – file “ button to transmit in the context.
NOTE
 The tranmitted file content will be stored in the path given in the receiving PC.
 Click “ CLR –SCREEN “to repeat the process.
 Click “ STOP “ button to exit.
RESULT:
Thus the performance of transfer a file from PC to another PC using serial
port was verified successfully.
43
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1. What is parallel communication?
parallel communication is a method of sending several data signals simultaneously
over several parallel channels. It contrasts with serial communication; this distinction is one
way of characterizing a communications link.
2. What is serial communication?
serial communication is the process of sending data one bit at a time, sequentially,
over a communication channel or computer bus. This is in contrast to parallel
communication, where several bits are sent as a whole, on a link with several parallel
channels. Serial communication is used for all long-haul communication and most computer
networks, where the cost of cable and synchronization difficulties make parallel
communication impractical.
3. Define DNS?
System that can map a name to an address and conversely an address to a name.
In TCP/IP, this is the domain name system.
4. Name different sections used in internet DNS.
a. Generic domain b. Country domain c. Inverse domain
5. What does a generic domain define?
The generic domains define registered hosts according to their generic behaviour.
6. Mentions the usage of inverse domain.
a. Inverse domain is used to map an address to a name.
b. To determine if the client is on the authorized list , it can send a query to the
DNS server and ask for the mapping of address to name.
44
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
QUESTION BANK
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
Implement PC to PC Communication for
(i)Parallel Communication using 8 bit parallel cable
(ii)Serial communication using RS 232C
Create scenario and show the performance of CSMA/CD protocol
through simulation using Ethernet LAN protocol.
Create scenario and show the performance of CSMA/CD protocol
through LAN Trainer Kit using Ethernet LAN protocol.
Create scenario and show the performance of token bus and token ring
protocols through simulation
Create scenario and show the performance of token bus and token ring
protocols through LAN Trainer kit
Create scenario and show the performance of network with CSMA / CA
protocol and compare with CSMA/CD protocols using Wireless LAN
protocols.
Implement and show the stop and wait protocol using simulation.
Implement and show the Goback-N and selective reject protocols.
Implement the distance vector routing algorithm to determine the shortest
path between two nodes.
Implement the Link state routing algorithm using simulation.
Implement the Data encryption and decryption using RSA algorithm
through simulation.
Transfer the files from PC to PC using SMTP.
Transfer the files from PC to PC using HTTP.
Transfer the files from PC to PC using FTP.
45