Computer Networks Record

Embed Size (px)

Citation preview

  • 7/30/2019 Computer Networks Record

    1/35

    EXPT NO: PC TO PC COMMUNICATION

    DATE: SERIAL COMMUNICATION

    Objective: To verify serial communication using RS 232C.

    Equipments:

    DCT-03.

    9 pin D connector cables 2nos.

    Computers PC 2nos.

    Connecting chords.

    Power supply.

    Procedure:

    Connect the power supply with proper polarity to the kit DCT 03 and while

    connecting, ensure that it is off.

    Keep all switch fault switches in off position.

    Refer to the diagram and carry out the following connections and settings.

    Connect 9 pin D connector cable between one computer com port and CN3

    connector on DCT 03 kit and second 9 Pin D connector cable between another

    computer com port and CN4 connector on DCT 03 kit.

    Connect the TD1 post to RD2 post.

    Connect the RD1 post to TD2 post.

    Keep the switch settings of SW4 towards ON position as shown in the diagram. Switch on the power supply and both the computers.

    Run DCT03 software and select Serial Communication Software link on both

    PCs.

    Select your computer operating system, this will provide link to hyper terminalsoftware.

    Once the connection to hyperlink is established you can type in one of the

    computers window and can see typed text on the other computers window.

    To do file transfer, select a file transfer protocol using hyperlink on both PCs.

    Put the flow control on XON/XOFF & repeat the procedure of file transfer.

    Select the receiving file save location and the same protocol as selected in

    transmitter. Click on file transfer button, you will see progress of file transfer.

    You will see progress of file receiving in the receiver.

    Variations in LED of respective ports can be observed while file is beingtransmitted from one computer to another.

    For observation of ASCII equivalent of keyboard data transmitted connect theTD1 post to DATA IN post.

  • 7/30/2019 Computer Networks Record

    2/35

    From the hyperterminal of PC1,type any character and observe its ASCII

    equivalent on 8-bit LED display.

    Result:

    Thus serial communication using RS 232C was verified.

  • 7/30/2019 Computer Networks Record

    3/35

    EXPT NO: PC TO PC COMMUNICATION

    DATE: PARALLEL COMMUNICATION

    Objective:

    To verify parallel communication using RS 232C.

    Equipments:

    DCT-03.

    9 pin D connector cables 2nos.

    Computers PC 2nos.

    Connecting chords. Power supply.

    Procedure:

    Carry out the following connections and settings as shown in the diagram.

    Keep all the switch fault switches in off position.

    Keep SW6 in PC mode.

    Connect LPT/parallel port of one PC connector to CN1 on left hand side onDCT03 kit using 25-25 pin D type cable. Similarly connect LPT/parallel port of

    another PC to connector CN2 on right hand side on DCT03 kit using 25-25 pin D

    type cable.

    Keep the switch settings for SW1, SW2 & SW3 in ON position as shown.

    Switch on the power supply.

    Run DCT software and select Parallel Communication Software link on bothPCs.

    Clicking on Port setting will show you three ports (i.e. LPT1, LPT2, LPT3),select

    the port from the user machine through which the data transfer has to occur. Forexample clicking on LPT1 will set the LPT1 as the active port on the machine for

    the data transfer.

    Please ensure that the selected ports are in bi-directional mode, this can be

    checked from the BIOS settings of the computer. Clicking on Protocols namely Stop and Wait Protocol, Go Back N Protocol and

    Selective Repeat Protocol. Select same protocol on both PC.

    Select one PC in transmit mode and another in receive mode.

    Select the file to be sent from the transmitter computer. Inter packet delay can be

    varied from 5 ms to 100 ms. Packets to be sent are shown with blue colour. Click

    on transmit file button.

    On the remote PC click on receive file button.

  • 7/30/2019 Computer Networks Record

    4/35

    Status of the file transfer will be indicated on screen with different colour coding

    depending on the status of packet whether it is sent & acknowledged, sent but not

    acknowledged, bad packet error in packet.

    After the user has selected the file the PC shows the no of packets and size of thefile in the boxes on the top. The packets with their packet sequence is also shown.

    Once the transfer starts and the client computer acknowledges the packets it send

    the signal back to the transmitting PC. Any acknowledge positive or negative withtheir packet sequence is displayed below the current packet number.

    Any positive acknowledge received is displayed as ACK(0) and any negative

    acknowledge is displayed as NACK(0) along with their packet sequence inbrackets.

    Once the packet has been acknowledged and signal shown the next packet is

    transmitted and so on till the whole file gets transmitted.

    On the right hand top shows frame info. The frame info consists of different color

    packets. Each color specifies different status of the packet. Observe the effect on file transfer by introducing error in data bits use switch

    SW2 to introduce error for a moment.

    Once the file transfer gets complete you will be prompted by file transfer

    successful at transmitter.

    At the receiver a selection window will pop up to indicate location for the

    received file to be saved.

    Verify the received file with transmitted file, this shows end of the file transfer

    with success

    Result:

    Thus parallel communication using RS 232C was verified.

  • 7/30/2019 Computer Networks Record

    5/35

    EXPT NO: STAR TOPOLOGY

    DATE: ANALYSIS AND VERIFICATION OF

    STOP &WAIT PROTOCOL

    Objective:

    To analyze and verify Stop and Wait Protocol using star topology..

    Equipments:

    LTS-01 trainer kit.

    2- computers with Win-2K/XP and Ethernet port available on them.

    RJ-45 to RJ-45 LAN connecting cables.

    L-SIM LAN protocol analyzer and simulator software.

    Procedure:

    Connect 2 computer LAN ports using RJ-45 to RJ-45 LAN connecting cables

    provided with the system to LTS-01 star topology ports.

    Switch on the LTS-01 & computers.

    Run L-SIM software on all the computers, one should be server and others should

    be clients.

    On the server computer select type of network as LAN. On the server computer select the topology as STAR, select protocol as Stop &

    Wait click on create network button.

    Remote computer details will appear on the computers connected in network,

    server will be able to see all clients and all clients will be able to see only server.

    Select the computer to whom data file is to be transferred, from the load button,

    previously stored/selected file information can be loaded or you can select any filewhich is to be transmitted.

    File size will appear in the software window, select the packet size, inter packet

    delay and click on OK.

    Total packets formed for that file will be indicated on computers. Same details of file will appear o remote computer to which file is to be

    transmitted.

    Click on file transfer button to transfer file.

    During file transfer process you can insert errors into data packets being

    transmitted through software window.

    See the effect of bad packet error, packet negative acknowledgment error or autoerrors on file transfer.

  • 7/30/2019 Computer Networks Record

    6/35

    Select BAD PACKET error and click on Generate button in the transmitter

    window when say 7th packet is in the transmission state.

    The 7th packet in the receiver window will be marked as bad packet. This packetwill be retransmitted from transmitter. Now the packet will be received correctly

    this time.

    Select ACK LOST error and click on Generate button in the transmitter windowwhen say 23rd packet is in the transmission state.

    The 23rd packet in the receiver will be marked as unacknowledged. This packet

    will be retransmitted from transmitter. The retransmitted packet will be receivedcorrectly this time.

    Select AUTO ERROR and click on Generate button in the transmitter window at

    any packet is in the transmission state, errors are generated at random intervalsand no other error insertion facility will be available to user.

    Status of packets received when auto error is selected. File transfer from one

    computer to another will take place. Multiple file transfer between various server-

    client combinations should be performed to observe throughput v/s packet size

    graph on transmitter computer. Close file transfer window and click on protocol analyzer and network analyzer

    buttons on transmitter computer to view details of the log created.

    Under Network analyzer window click on Graph analyzer button. Calculate

    throughput and click on plot graph button.

    Detailed graph of throughput v/s packet size for the total file transfer activity will

    appear on graph window.

    Result:

  • 7/30/2019 Computer Networks Record

    7/35

    Thus Stop & Wait protocol was analyzed and verified using star topology.

    EXPT NO: STAR TOPOLOGY

    DATE: ANALYSIS AND VERIFICATION OF

    GO BACK N PROTOCOL

    Objective:

    To analyze and verify Go Back N Protocol using LAN port.

    Equipments:

    LTS-01 trainer kit.

    2- computers with Win-2K/XP and Ethernet port available on them.

    RJ-45 to RJ-45 LAN connecting cables.

    L-SIM LAN protocol analyzer and simulator software.

    Procedure:

    Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting

    cables provided with the system to LTS-01 star topology ports.

    Switch on the LTS-01 & computers.

    Run L-SIM software on all the computers, one should be server and others should

    be clients.

    On the server computer select type of network as LAN.

    On the server computer select the topology as STAR, select protocol as Stop &

    Wait click on create network button.

    Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only server.

    Select the computer to whom data file is to be transferred, from the load button,

    previously stored/selected file information can be loaded or you can select any filewhich is to be transmitted.

    File size will appear in the software window, select the packet size, inter packet

    delay and click on OK.

    Total packets formed for that file will be indicated on computers.

    Same details of file will appear o remote computer to which file is to be

    transmitted.

    Click on file transfer button to transfer file.

    During file transfer process you can insert errors into data packets being

    transmitted through software window.

    See the effect of bad packet error, packet negative acknowledgment error or autoerrors on file transfer. Observe carefully which packet/packets are retransmitted.

    Select BAD PACKET error and click on Generate button in the transmitter

    window when say 15th packet is in the transmission state.

  • 7/30/2019 Computer Networks Record

    8/35

    The 15th packet in the receiver window will be marked as bad packet. 15 th, 16th &

    17th packets will be retransmitted from transmitter. Retransmitted 15th, 16th &17th packets will be received correctly this time. Receiver will discard 16 th and

    17th packets and only 15th packet is accepted.

    Select ACK LOST error and click on Generate button in the transmitter window

    when say 21st

    packet is in the transmission state. The 21st packet in the receiver will be marked as unacknowledged. 21 st, 22nd &

    23rd packets will be retransmitted from transmitter. Retransmitted 21st, 22nd & 23rd

    packets will be received and discarded by receiver as they were received correctlyearlier.

    Select AUTO ERROR and click on Generate button in the transmitter window at

    any packet is in the transmission state, errors are generated at random intervalsand no other error insertion facility will be available to user.

    Status of packets received when auto error is selected. File transfer from one

    computer to another will take place. Multiple file transfer between various server-client combinations should be performed to observe throughput v/s packet size

    graph on transmitter computer. Close file transfer window and click on protocol analyzer and network analyzer

    buttons on transmitter computer to view details of the log created.

    Under Network analyzer window click on Graph analyzer button. Calculate

    throughput and click on plot graph button.

    Detailed graph of throughput v/s packet size for the total file transfer activity willappear on graph window.

  • 7/30/2019 Computer Networks Record

    9/35

    Result:

    Thus Go Back N protocol was analyzed and verified using star topology.

    EXPT NO: STAR TOPOLOGY

    DATE: ANALYSIS AND VERIFICATION OFSELECTIVE REPEAT PROTOCOL

    Objective:

    To analyze and verify Selective Repeat Protocol using star topology.

    Equipments:

    LTS-01 trainer kit. 2-computers with Win-2K/XP and Ethernet port available on them.

    RJ-45 to RJ-45 LAN connecting cables.

    L-SIM LAN protocol analyzer and simulator software.

    Procedure:

    Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting

    cables provided with the system to LTS-01 star topology ports.

    Switch on the LTS-01 & computers.

    Run L-SIM software on all the computers, one should be server and others should

    be clients.

    On the server computer select type of network as LAN. On the server computer select the topology as STAR, select protocol as Stop &

    Wait click on create network button.

    Remote computer details will appear on the computers connected in network,

    server will be able to see all clients and all clients will be able to see only server.

    Select the computer to whom data file is to be transferred, from the load button,

    previously stored/selected file information can be loaded or you can select any filewhich is to be transmitted.

    File size will appear in the software window, select the packet size, inter packet

    delay and click on OK.

    Total packets formed for that file will be indicated on computers. Same details of file will appear on remote computer to which file is to be

    transmitted.

    Click on file transfer button to transfer file.

    During file transfer process you can insert errors into data packets being

    transmitted through software window.

    See the effect of bad packet error, packet negative acknowledgment error or autoerrors on file transfer. Observe carefully which packet/packets are retransmitted.

  • 7/30/2019 Computer Networks Record

    10/35

    Select BAD PACKET error and click on Generate button in the transmitter

    window when say 13th packet is in the transmission state.

    The 13th packet in the receiver window will be marked as bad packet. The 13th

    packet will be retransmitted from transmitter. Retransmitted 13thpacket will be

    received correctly this time.

    Select ACK LOST error and click on Generate button in the transmitter windowwhen say 26th packet is in the transmission state.

    The 26th packet in the receiver will be marked as unacknowledged. 26 th packet

    will be retransmitted from transmitter. Retransmitted 26th packet will be receivedand discarded by receiver as it was received correctly earlier.

    Select AUTO ERROR and click on Generate button in the transmitter window at

    any packet is in the transmission state, errors are generated at random intervalsand no other error insertion facility will be available to user.

    Status of packets received when auto error is selected. File transfer from one

    computer to another will take place. Multiple file transfer between various server-

    client combinations should be performed to observe throughput v/s packet size

    graph on transmitter computer. Close file transfer window and click on protocol analyzer and network analyzer

    buttons on transmitter computer to view details of the log created.

    Under Network analyzer window click on Graph analyzer button. Calculate

    throughput and click on plot graph button.

    Detailed graph of throughput v/s packet size for the total file transfer activity will

    appear on graph window.

  • 7/30/2019 Computer Networks Record

    11/35

    Result:

    Thus Selective Repeat protocol was analyzed and verified using star topology.

    EXPT NO: RING TOPOLOGYDATE: ANALYSIS AND VERIFICATION OF

    STOP &WAIT PROTOCOL

    Objective:

    To analyze and verify Stop and Wait Protocol using ring topology.

    Equipments:

    LTS-01 trainer kit.

    2-computers with Win-2K/XP and Ethernet port available on them.

    RJ-45 to RJ-45 LAN connecting cables.

    L-SIM LAN protocol analyzer and simulator software.

    Procedure:

    Connect 2 computer LAN ports using RJ-45 to RJ-45 LAN connecting cables

    provided with the system to LTS-01 ring topology ports. Switch on the LTS-01 & computers.

    Run L-SIM software on all the computers, one should be server and others should

    be clients.

    On the server computer select type of network as LAN.

    On the server computer select the topology as RING, select protocol as Stop &

    Wait click on create network button.

    Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only server.

    Select the computer to whom data file is to be transferred, from the load button,

    previously stored/selected file information can be loaded or you can select any filewhich is to be transmitted.

    File size will appear in the software window, select the packet size, inter packet

    delay and click on OK.

    Total packets formed for that file will be indicated on computers.

    Same details of file will appear on remote computer to which file is to be

    transmitted.

    Click on file transfer button to transfer file.

  • 7/30/2019 Computer Networks Record

    12/35

    During file transfer process you can insert errors into data packets being

    transmitted through software window.

    See the effect of bad packet error, packet negative acknowledgment error or autoerrors on file transfer.

    Select BAD PACKET error and click on Generate button in the transmitter

    window when say 7th

    packet is in the transmission state. The 7th packet in the receiver window will be marked as bad packet. This packet

    will be retransmitted from transmitter. Now the packet will be received correctly

    this time.

    Select ACK LOST error and click on Generate button in the transmitter window

    when say 23rd packet is in the transmission state.

    The 23rd packet in the receiver will be marked as unacknowledged. This packetwill be retransmitted from transmitter. The retransmitted packet will be received

    correctly this time.

    Select AUTO ERROR and click on Generate button in the transmitter window atany packet is in the transmission state, errors are generated at random intervals

    and no other error insertion facility will be available to user. Status of packets received when auto error is selected. File transfer from one

    computer to another will take place. Multiple file transfer between various server-client combinations should be performed to observe throughput v/s packet size

    graph on transmitter computer.

    Close file transfer window and click on protocol analyzer and network analyzer

    buttons on transmitter computer to view details of the log created.

    Under Network analyzer window click on Graph analyzer button. Calculate

    throughput and click on plot graph button.

    Detailed graph of throughput v/s packet size for the total file transfer activity will

    appear on graph window.

  • 7/30/2019 Computer Networks Record

    13/35

    Result:

    Thus Stop & Wait protocol was analyzed and verified using ring topology.

    EXPT NO: RING TOPOLOGY

    DATE: ANALYSIS AND VERIFICATION OF

    GO BACK N PROTOCOL

    Objective:

    To analyze and verify Go Back N Protocol using ring topology.

    Equipments: LTS-01 trainer kit.

    2-computers with Win-2K/XP and Ethernet port available on them.

    RJ-45 to RJ-45 LAN connecting cables.

    L-SIM LAN protocol analyzer and simulator software.

    Procedure:

    Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting

    cables provided with the system to LTS-01 ring topology ports.

    Switch on the LTS-01 & computers.

    Run L-SIM software on all the computers, one should be server and others should

    be clients. On the server computer select type of network as LAN.

    On the server computer select the topology as RING, select protocol as Stop &

    Wait click on create network button.

    Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only server.

    Select the computer to whom data file is to be transferred, from the load button,previously stored/selected file information can be loaded or you can select any file

    which is to be transmitted.

    File size will appear in the software window, select the packet size, inter packet

    delay and click on OK.

    Total packets formed for that file will be indicated on computers.

    Same details of file will appear on remote computer to which file is to be

    transmitted.

    Click on file transfer button to transfer file.

    During file transfer process you can insert errors into data packets being

    transmitted through software window.

  • 7/30/2019 Computer Networks Record

    14/35

    See the effect of bad packet error, packet negative acknowledgment error or auto

    errors on file transfer. Observe carefully which packet/packets are retransmitted.

    Select BAD PACKET error and click on Generate button in the transmitterwindow when say 15th packet is in the transmission state.

    The 15th packet in the receiver window will be marked as bad packet. 15 th, 16th &

    17th packets will be retransmitted from transmitter. Retransmitted 15th

    , 16th

    &17th packets will be received correctly this time. Receiver will discard 16 th and

    17th packets and only 15th packet is accepted.

    Select ACK LOST error and click on Generate button in the transmitter windowwhen say 21st packet is in the transmission state.

    The 21st packet in the receiver will be marked as unacknowledged. 21 st, 22nd &

    23rd packets will be retransmitted from transmitter. Retransmitted 21st, 22nd & 23rd

    packets will be received and discarded by receiver as they were received correctly

    earlier.

    Select AUTO ERROR and click on Generate button in the transmitter window at

    any packet is in the transmission state, errors are generated at random intervals

    and no other error insertion facility will be available to user. Status of packets received when auto error is selected. File transfer from one

    computer to another will take place. Multiple file transfer between various server-

    client combinations should be performed to observe throughput v/s packet size

    graph on transmitter computer.

    Close file transfer window and click on protocol analyzer and network analyzerbuttons on transmitter computer to view details of the log created.

    Under Network analyzer window click on Graph analyzer button. Calculate

    throughput and click on plot graph button.

    Detailed graph of throughput v/s packet size for the total file transfer activity will

    appear on graph window.

  • 7/30/2019 Computer Networks Record

    15/35

    Result:

    Thus Go Back N protocol was analyzed and verified using ring topology.

    EXPT NO: RING TOPOLOGY

    DATE: ANALYSIS AND STUDY OF

    SELECTIVE REPEAT PROTOCOL

    Objective:

    To analyze and verify Selective Repeat Protocol using ring topology.

    Equipments:

    LTS-01 trainer kit.

    2-computers with Win-2K/XP and Ethernet port available on them.

    RJ-45 to RJ-45 LAN connecting cables.

    L-SIM LAN protocol analyzer and simulator software.

    Procedure:

    Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting

    cables provided with the system to LTS-01 ring topology ports. Switch on the LTS-01 & computers.

    Run L-SIM software on all the computers, one should be server and others should

    be clients.

    On the server computer select type of network as LAN.

    On the server computer select the topology as RING, select protocol as Stop &

    Wait click on create network button.

    Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only server.

    Select the computer to whom data file is to be transferred, from the load button,

    previously stored/selected file information can be loaded or you can select any filewhich is to be transmitted.

    File size will appear in the software window, select the packet size, inter packet

    delay and click on OK.

    Total packets formed for that file will be indicated on computers.

    Same details of file will appear on remote computer to which file is to be

    transmitted.

    Click on file transfer button to transfer file.

  • 7/30/2019 Computer Networks Record

    16/35

    During file transfer process you can insert errors into data packets being

    transmitted through software window.

    See the effect of bad packet error, packet negative acknowledgment error or autoerrors on file transfer. Observe carefully which packet/packets are retransmitted.

    Select BAD PACKET error and click on Generate button in the transmitter

    window when say 13th

    packet is in the transmission state. The 13th packet in the receiver window will be marked as bad packet. The 13th

    packet will be retransmitted from transmitter. Retransmitted 13thpacket will be

    received correctly this time.

    Select ACK LOST error and click on Generate button in the transmitter window

    when say 26th packet is in the transmission state.

    The 26th packet in the receiver will be marked as unacknowledged. 26 th packetwill be retransmitted from transmitter. Retransmitted 26th packet will be received

    and discarded by receiver as it was received correctly earlier.

    Select AUTO ERROR and click on Generate button in the transmitter window atany packet is in the transmission state, errors are generated at random intervals

    and no other error insertion facility will be available to user. Status of packets received when auto error is selected. File transfer from one

    computer to another will take place. Multiple file transfer between various server-client combinations should be performed to observe throughput v/s packet size

    graph on transmitter computer.

    Close file transfer window and click on protocol analyzer and network analyzer

    buttons on transmitter computer to view details of the log created.

    Under Network analyzer window click on Graph analyzer button. Calculate

    throughput and click on plot graph button.

    Detailed graph of throughput v/s packet size for the total file transfer activity will

    appear on graph window.

  • 7/30/2019 Computer Networks Record

    17/35

    Result:

    Thus Selective Repeat protocol was analyzed and verified using ring topology.

    EXPT NO: BUS TOPOLOGY

    DATE: ANALYSIS AND VERIFICATION OF

    STOP &WAIT PROTOCOL

    Objective:

    To analyze and verify Stop and Wait Protocol using bus topology.

    Equipments:

    LTS-01 trainer kit.

    2-computers with Win-2K/XP and Ethernet port available on them.

    RJ-45 to RJ-45 LAN connecting cables.

    L-SIM LAN protocol analyzer and simulator software.

    Procedure:

    Connect 2 computer LAN ports using RJ-45 to RJ-45 LAN connecting cables

    provided with the system to LTS-01 bus topology ports.

    Switch on the LTS-01 & computers.

    Run L-SIM software on all the computers, one should be server and others should

    be clients.

    On the server computer select type of network as LAN.

    On the server computer select the topology as BUS, select protocol as Stop &

    Wait click on create network button.

    Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only server.

    Select the computer to whom data file is to be transferred, from the load button,previously stored/selected file information can be loaded or you can select any file

    which is to be transmitted.

    File size will appear in the software window, select the packet size, inter packet

    delay and click on OK.

  • 7/30/2019 Computer Networks Record

    18/35

    Total packets formed for that file will be indicated on computers.

    Same details of file will appear on remote computer to which file is to be

    transmitted.

    Click on file transfer button to transfer file.

    During file transfer process you can insert errors into data packets being

    transmitted through software window. See the effect of bad packet error, packet negative acknowledgment error or auto

    errors on file transfer.

    Select BAD PACKET error and click on Generate button in the transmitterwindow when say 7th packet is in the transmission state.

    The 7th packet in the receiver window will be marked as bad packet. This packet

    will be retransmitted from transmitter. Now the packet will be received correctlythis time.

    Select ACK LOST error and click on Generate button in the transmitter window

    when say 23rd packet is in the transmission state.

    The 23rd packet in the receiver will be marked as unacknowledged. This packet

    will be retransmitted from transmitter. The retransmitted packet will be received

    correctly this time.

    Select AUTO ERROR and click on Generate button in the transmitter window at

    any packet is in the transmission state, errors are generated at random intervals

    and no other error insertion facility will be available to user.

    Status of packets received when auto error is selected. File transfer from one

    computer to another will take place. Multiple file transfer between various server-

    client combinations should be performed to observe throughput v/s packet size

    graph on transmitter computer.

    Close file transfer window and click on protocol analyzer and network analyzer

    buttons on transmitter computer to view details of the log created.

    Under Network analyzer window click on Graph analyzer button. Calculatethroughput and click on plot graph button.

    Detailed graph of throughput v/s packet size for the total file transfer activity will

    appear on graph window.

  • 7/30/2019 Computer Networks Record

    19/35

    Result:

    Thus Stop & Wait protocol was analyzed and verified using bus topology.

    EXPT NO: BUS TOPOLOGY

    DATE: ANALYSIS AND VERIFICATION OF

    GO BACK N PROTOCOL

    Objective:

    To analyze and verify Go Back N Protocol using bus topology.

    Equipments:

    LTS-01 trainer kit.

    2-computers with Win-2K/XP and Ethernet port available on them.

    RJ-45 to RJ-45 LAN connecting cables.

    L-SIM LAN protocol analyzer and simulator software.

    Procedure: Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting

    cables provided with the system to LTS-01 bus topology ports.

    Switch on the LTS-01 & computers.

    Run L-SIM software on all the computers, one should be server and others should

    be clients.

    On the server computer select type of network as LAN.

    On the server computer select the topology as BUS, select protocol as Stop &Wait click on create network button.

    Remote computer details will appear on the computers connected in network,

    server will be able to see all clients and all clients will be able to see only server.

    Select the computer to whom data file is to be transferred, from the load button,

    previously stored/selected file information can be loaded or you can select any file

    which is to be transmitted.

    File size will appear in the software window, select the packet size, inter packet

    delay and click on OK.

    Total packets formed for that file will be indicated on computers.

  • 7/30/2019 Computer Networks Record

    20/35

    Same details of file will appear on remote computer to which file is to be

    transmitted.

    Click on file transfer button to transfer file.

    During file transfer process you can insert errors into data packets being

    transmitted through software window.

    See the effect of bad packet error, packet negative acknowledgment error or autoerrors on file transfer. Observe carefully which packet/packets are retransmitted.

    Select BAD PACKET error and click on Generate button in the transmitter

    window when say 15th packet is in the transmission state.

    The 15th packet in the receiver window will be marked as bad packet. 15 th, 16th &

    17th packets will be retransmitted from transmitter. Retransmitted 15th, 16th &

    17th packets will be received correctly this time. Receiver will discard 16 th and17th packets and only 15th packet is accepted.

    Select ACK LOST error and click on Generate button in the transmitter window

    when say 21st packet is in the transmission state.

    The 21st packet in the receiver will be marked as unacknowledged. 21 st, 22nd &

    23rd packets will be retransmitted from transmitter. Retransmitted 21st, 22nd & 23rd

    packets will be received and discarded by receiver as they were received correctly

    earlier.

    Select AUTO ERROR and click on Generate button in the transmitter window at

    any packet is in the transmission state, errors are generated at random intervalsand no other error insertion facility will be available to user.

    Status of packets received when auto error is selected. File transfer from one

    computer to another will take place. Multiple file transfer between various server-

    client combinations should be performed to observe throughput v/s packet sizegraph on transmitter computer.

    Close file transfer window and click on protocol analyzer and network analyzer

    buttons on transmitter computer to view details of the log created.

    Under Network analyzer window click on Graph analyzer button. Calculate

    throughput and click on plot graph button.

    Detailed graph of throughput v/s packet size for the total file transfer activity willappear on graph window.

  • 7/30/2019 Computer Networks Record

    21/35

    Result:

    Thus Go Back N protocol was analyzed and verified using bus topology.

    EXPT NO: BUS TOPOLOGY

    DATE: ANALYSIS AND VERIFICATION OF

    SELECTIVE REPEAT PROTOCOL

    Objective:

    To analyze and verify Selective Repeat Protocol using bus topology.

    Equipments:

    LTS-01 trainer kit.

    2-computers with Win-2K/XP and Ethernet port available on them. RJ-45 to RJ-45 LAN connecting cables.

    L-SIM LAN protocol analyzer and simulator software.

    Procedure:

    Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting

    cables provided with the system to LTS-01 bus topology ports.

    Switch on the LTS-01 & computers.

    Run L-SIM software on all the computers, one should be server and others should

    be clients.

    On the server computer select type of network as LAN.

    On the server computer select the topology as BUS, select protocol as Stop &Wait click on create network button.

    Remote computer details will appear on the computers connected in network,

    server will be able to see all clients and all clients will be able to see only server.

    Select the computer to whom data file is to be transferred, from the load button,

    previously stored/selected file information can be loaded or you can select any filewhich is to be transmitted.

  • 7/30/2019 Computer Networks Record

    22/35

    File size will appear in the software window, select the packet size, inter packet

    delay and click on OK.

    Total packets formed for that file will be indicated on computers.

    Same details of file will appear on remote computer to which file is to be

    transmitted.

    Click on file transfer button to transfer file. During file transfer process you can insert errors into data packets being

    transmitted through software window.

    See the effect of bad packet error, packet negative acknowledgment error or autoerrors on file transfer. Observe carefully which packet/packets are retransmitted.

    Select BAD PACKET error and click on Generate button in the transmitter

    window when say 13th packet is in the transmission state.

    The 13th packet in the receiver window will be marked as bad packet. The 13th

    packet will be retransmitted from transmitter. Retransmitted 13thpacket will be

    received correctly this time.

    Select ACK LOST error and click on Generate button in the transmitter window

    when say 26th packet is in the transmission state.

    The 26th packet in the receiver will be marked as unacknowledged. 26 th packetwill be retransmitted from transmitter. Retransmitted 26th packet will be received

    and discarded by receiver as it was received correctly earlier.

    Select AUTO ERROR and click on Generate button in the transmitter window atany packet is in the transmission state, errors are generated at random intervals

    and no other error insertion facility will be available to user.

    Status of packets received when auto error is selected. File transfer from one

    computer to another will take place. Multiple file transfer between various server-client combinations should be performed to observe throughput v/s packet size

    graph on transmitter computer.

    Close file transfer window and click on protocol analyzer and network analyzerbuttons on transmitter computer to view details of the log created.

    Under Network analyzer window click on Graph analyzer button. Calculate

    throughput and click on plot graph button.

    Detailed graph of throughput v/s packet size for the total file transfer activity will

    appear on graph window.

  • 7/30/2019 Computer Networks Record

    23/35

    Result:

    Thus Selective Repeat protocol was analyzed and verified using bus topology.

    EXPT NO: ANALYSIS AND VERIFICATION OF

    DATE: CSMA-CD PROTOCOL

    Objective:

    To analyze and verify CSMA-CD protocol.

    Equipments:

    LTS-01 trainer kit.

    3 computers with Win-2K/XP and Ethernet port available on them. RJ-45 to RJ-45 LAN connecting cables.

    L-SIM LAN protocol analyzer and simulator software.

    Procedure:

    Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting

    cables provided with the system to LTS-01 star topology ports.

    Switch on the LTS-01 & computers.

    Run L-SIM software on all the computers, one should be server and others should

    be clients.

    On the server computer select type of network as LAN. On the server computer select the topology as STAR, select protocol as CSMA-

    CD click on create network button.

    Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only server.

    Select the computer to whom data file is to be transferred, from the load button,previously stored/selected file information can be loaded or you can select any file

    which is to be transmitted.

  • 7/30/2019 Computer Networks Record

    24/35

    File size will appear in the software window, select the packet size, inter packet

    delay and click on OK.

    Total packets formed for that file will be indicated on computers.

    Same details of file will appear on remote computer to which file is to be

    transmitted.

    Click on file transfer button to transfer file. During file transfer process try to send file to server from another client

    computer, file transfer from second transmitter will also get initiated.

    When packet from second sender collides with first sender it will be indicated ascollision packet on server & client-1.

    File from first sender will resume after some time and second time and second

    sender file will be kept on hold till first file transfer gets completed.

    Once the first sender file reached to server its display is refreshed and server will

    show packet status for second sender.

    Second sender file transfer will also get completed and thus collision of twopackets transmitted simultaneously from two senders is detected and cleared.

    Multiple file transfer between various server-client combinations should be

    performed to observe throughput v/s packet size graph on transmitter computer.

    Close file transfer window and click on protocol analyzer and network analyzer

    buttons on transmitter computer to view details of the log created.

    Under network analyzer window click on graph analyzer button.

    Detailed graph of throughput v/s packet size for the total file transfer activity will

    appear on graph window.

  • 7/30/2019 Computer Networks Record

    25/35

    Result:

    Thus CSMA-CD Protocol was analyzed and verified.

    EXPT NO: ANALYSIS AND VERIFICATION OF

    DATE: CSMA-CA PROTOCOL

    Objective:

    To analyze and verify CSMA-CA protocol.

    Equipments:

    LTS-01 trainer kit.

    3 computers with Win-2K/XP and Ethernet port available on them. RJ-45 to RJ-45 LAN connecting cables.

    L-SIM LAN protocol analyzer and simulator software.

    Procedure:

    Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting

    cables provided with the system to LTS-01 star topology ports.

    Switch on the LTS-01 & computers.

    Run L-SIM software on all the computers, one should be server and others should

    be clients.

    On the server computer select type of network as LAN. On the server computer select the topology as STAR, select protocol as CSMA-

    CA click on create network button.

    Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only server.

    Click on the send RTS button to get your computer into transmitter mode.

  • 7/30/2019 Computer Networks Record

    26/35

    Select the computer to whom data file is to be transmitted, from the load button,

    previously stored/selected file information can be loaded or you can select anyfile, which is to be transmitted.

    File size will appear in the software window, select the packet size, inter packet

    delay and click OK.

    Total packets formed for that file will be indicated on computers, same details offile will appear on remote computer to which file is to be transmitted.

    Click on file transfer button to transfer file.

    During file transfer process try to get access to transmit file by clicking on sendRTS button on other computers, you will be prompted with channel is busy

    message.

    Thus collision of two packets transmitted simultaneously from two senders isavoided.

    File transfer from one computer to another will take place.

    Multiple file transfer between various server-client combinations should beperformed to observe throughput v/s packet size graph on transmitter computer.

    Close file transfer window and click on protocol analyzer and network analyzer

    buttons on transmitter computer to view details of the log created.

    Under network analyzer window click on graph analyzer button.

    Detailed graph of throughput v/s packet size for the total file transfer activity will

    appear on graph window.

  • 7/30/2019 Computer Networks Record

    27/35

    Result:

    Thus CSMA-CA Protocol was analyzed and verified.

    EXPT NO: VERIFICATION OF DATA ENCRYPTION

    DATE: AND DECRYPTION

    Objective:

    To verify data encryption and decryption.

    Equipments:

    LTS-01 trainer kit.

    2 computers with Win-2K/XP and Ethernet port available on them.

    RJ-45 to RJ-45 LAN connecting cables.

    L-SIM LAN protocol analyzer and simulator software.

    Procedure:

    Connect at least two computer LAN ports using RJ-45 to RJ-45 LAN connecting

    cables provided with the system to LTS-01 star topology ports.

    Switch on the LTS-01 & computers. Run L-SIM software on both the computers, one should be server and another

    should be client.

    On the server computer select type of network as STAR and select protocol asStop & Wait and click on create network button.

    Remote computer details will appear on the computers connected in network,server will be able to see client and client will be able to see server.

  • 7/30/2019 Computer Networks Record

    28/35

    Select the computer to whom data file is to be transferred, from the load button,

    previously stored/selected file information can be loaded or you can select anyfile, which is to be transmitted. If notepad text file is selected encryption

    information can be viewed very clearly for each packet formed for that file.

    File size will appear in the software window, select the packet size, inter packet

    delay and click OK. Total packets formed for that file will be indicated on computers, same details of

    file will appear on remote computer to which file is to be transmitted.

    Click on file transfer button to transfer file.

    Click on pause button to interrupt file transfer and click on encrypt/decrypt button

    to see file packet encrypted and decrypted.

    The actual file selected packet content and encrypted data content will be seen inencryption details window.

    Any text can be typed at the bottom box, which we want to encrypt and provide

    key text for encryption. Similarly same key can be typed again to decrypt andrecover encrypted text. If the key at decryption stage differs from key at

    encryption stage, decrypted data will not be perfect as per original data. To understand the working of how decryption took place you can view visual

    explanation of encryption and decryption process by clicking on visual helpbutton.

    We can resume file transfer by clicking on continue button.

    Encrypted format of each packet can thus be seen by pausing the file transfer atrespective packet when it is under transmission state.

    File transfer from one computer to another will take place.

    To study programming of Cryptography with encryption and decryption processsample executable file & program is provided inside program files-Lsim-

    SampleApplication.zip.

    When user extracts this folder he will find cryptography folder inside whichcryptography.cpp and cryptography.exe files are provided.

    If user runs the cryptography.exe file screen with browse option for selection of

    file to be encrypted and enter key for encryption option will get open for user toselect the file and enter encryption key.

    When user clicks on encrypt button a message with encryption completed will

    popup. Encrypted file will be stored at the same location from where file forencryption is selected.

    User has to select file to be decrypted and enter decryption key.

    When user clicks on decrypt button a message with decryption completed will

    popup. Decrypted file will be stored at the same location from where the file fordecryption is selected.

    To verify encryption and decrypted files user has to close the cryptography.exe

    file.

    Actual programming can be checked from cryptography.cpp program.

  • 7/30/2019 Computer Networks Record

    29/35

    Result:

    Thus verification of Encryption and Decryption was done.

    EXPT NO: SIMULATION OF DISTANCE

    DATE: VECTOR ROUTING ALGORITHM

    Objective:

    To simulate distance vector routing algorithm.

    Equipments:

    N-SIM.

    Computer with Win-2K/XP.

    Procedure:

    Run N-SIM software from your computer.

    To check working of distance vector routing algorithm in the form of

    animated representation click on distance vector routing under routing

    protocols. We can study the working of distance vector routing algorithm through this

    animated movie.

    To implement this algorithm click on algorithms under menu and click ondistance vector routing.

    Add the number of routers, select one by one, maximum 8 routers can be

    added, all the added routers will appear in the window.

  • 7/30/2019 Computer Networks Record

    30/35

    Click configure button to define the links between pair of routers and define

    its cost in kilometers.

    Once all the possible pairs have been defined click save button to save theconfiguration that has been defined.

    Depending on the configuration, possible links will be defined, implemented

    and drawn in the screen near the routers added. We can edit the configuration at any time by clicking on the value of the

    router number or cost.

    To simulate and find out shortest path select the source and destinationrouters.

    Click on simulate button to start the algorithm, this will calculate the shortest

    path and will be shown on the screen.

    Click on the result button to see the parameters for shortest path.

    Click on graph button to plot the readings against the various parameters.

  • 7/30/2019 Computer Networks Record

    31/35

    Result:

    Thus distance vector routing algorithm was simulated.

    EXPT NO: SIMULATION OF LINK

    DATE: STATE ROUTING ALGORITHM

    Objective:

    To simulate Link State routing algorithm.

    Equipments:

    N-SIM.

    Computer with Win-2K/XP.

    Procedure:

    Run N-SIM software from your computer.

    To check working of link state routing algorithm in the form of animatedrepresentation click on distance vector routing under routing protocols.

    We can study the working of link state routing algorithm through this

    animated movie.

    To implement this algorithm click on algorithms under menu and click on

    distance vector routing.

    Add the number of routers, select one by one, maximum 8 routers can beadded, all the added routers will appear in the window.

  • 7/30/2019 Computer Networks Record

    32/35

    Click configure button to define the links between pair of routers and define

    its cost in kilometers.

    Once all the possible pairs have been defined click save button to save theconfiguration that has been defined.

    Depending on the configuration, possible links will be defined, implemented

    and drawn in the screen near the routers added. We can edit the configuration at any time by clicking on the value of the

    router number or cost.

    To simulate and find out shortest path select the source and destinationrouters.

    Click on simulate button to start the algorithm, this will calculate the shortest

    path and will be shown on the screen.

    Click on the result button to see the parameters for shortest path.

    Click on graph button to plot the readings against the various parameters.

  • 7/30/2019 Computer Networks Record

    33/35

    Result:

    Thus Link state routing algorithm was simulated.

    EXPT NO: IMPLEMENTATION AND STUDY OF

    DATE: WIRELESS LAN

    Objective:

    To implement and study wireless LAN.

    Equipments:

    3 or 4 computers with Win-2K/XP.

    Access point with accessories.

    Wireless LAN Access cards with USB driver installed on respective

    computers.

    L-SIM LAN protocol analyzer and simulator software.

    Procedure:

    Connect Access point to power outlet and switch it on.

    Connect USB wireless access cards to computer USB ports and check for

    driver installed on respective computers.

  • 7/30/2019 Computer Networks Record

    34/35

    We will find wireless LAN detection on your computers, assign IP address to

    the detected wireless LAN and connect it. Connection of wireless LAN willbe indicated on your computers.

    Run L-SIM software on all the computers, one should be server and others

    should be clients.

    On the server computer select type of network as WLAN. On the sever computer select topology as STAR, select protocol as CSMA-

    CA click on create network button.

    Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only

    server.

    Click on the send RTS button to get your computer into transmitter mode.

    Select the computer to whom data file is to be transmitted, from the load

    button, previously stored/selected file information can be loaded or you can

    select any file, which is to be transmitted.

    File size will appear in the software window, select the packet size, inter

    packet delay and click OK.

    Total packets formed for that file will be indicated on computers, same detailsof file will appear on remote computer to which file is to be transmitted.

    Click on file transfer button to transfer file.

    During file transfer process try to get access to transmit file by clicking onsend RTS button on other computers, you will be prompted with channel is

    busy message.

    Thus collision of two packets transmitted simultaneously from two senders is

    avoided.

    File transfer from one computer to another will take place.

    Multiple file transfer between various server-client combinations should beperformed to observe throughput v/s packet size graph on transmittercomputer.

    Close file transfer window and click on protocol analyzer and network

    analyzer buttons on transmitter computer to view details of the log created.

    Under network analyzer window click on graph analyzer button.

    Detailed graph of throughput v/s packet size for the total file transfer activity

    will appear on graph window.

  • 7/30/2019 Computer Networks Record

    35/35

    Result:

    Thus Wireless LAN was implemented and studied.