Upload
jamesedwin1988
View
217
Download
0
Embed Size (px)
Citation preview
7/30/2019 Computer Networks Record
1/35
EXPT NO: PC TO PC COMMUNICATION
DATE: SERIAL COMMUNICATION
Objective: To verify serial communication using RS 232C.
Equipments:
DCT-03.
9 pin D connector cables 2nos.
Computers PC 2nos.
Connecting chords.
Power supply.
Procedure:
Connect the power supply with proper polarity to the kit DCT 03 and while
connecting, ensure that it is off.
Keep all switch fault switches in off position.
Refer to the diagram and carry out the following connections and settings.
Connect 9 pin D connector cable between one computer com port and CN3
connector on DCT 03 kit and second 9 Pin D connector cable between another
computer com port and CN4 connector on DCT 03 kit.
Connect the TD1 post to RD2 post.
Connect the RD1 post to TD2 post.
Keep the switch settings of SW4 towards ON position as shown in the diagram. Switch on the power supply and both the computers.
Run DCT03 software and select Serial Communication Software link on both
PCs.
Select your computer operating system, this will provide link to hyper terminalsoftware.
Once the connection to hyperlink is established you can type in one of the
computers window and can see typed text on the other computers window.
To do file transfer, select a file transfer protocol using hyperlink on both PCs.
Put the flow control on XON/XOFF & repeat the procedure of file transfer.
Select the receiving file save location and the same protocol as selected in
transmitter. Click on file transfer button, you will see progress of file transfer.
You will see progress of file receiving in the receiver.
Variations in LED of respective ports can be observed while file is beingtransmitted from one computer to another.
For observation of ASCII equivalent of keyboard data transmitted connect theTD1 post to DATA IN post.
7/30/2019 Computer Networks Record
2/35
From the hyperterminal of PC1,type any character and observe its ASCII
equivalent on 8-bit LED display.
Result:
Thus serial communication using RS 232C was verified.
7/30/2019 Computer Networks Record
3/35
EXPT NO: PC TO PC COMMUNICATION
DATE: PARALLEL COMMUNICATION
Objective:
To verify parallel communication using RS 232C.
Equipments:
DCT-03.
9 pin D connector cables 2nos.
Computers PC 2nos.
Connecting chords. Power supply.
Procedure:
Carry out the following connections and settings as shown in the diagram.
Keep all the switch fault switches in off position.
Keep SW6 in PC mode.
Connect LPT/parallel port of one PC connector to CN1 on left hand side onDCT03 kit using 25-25 pin D type cable. Similarly connect LPT/parallel port of
another PC to connector CN2 on right hand side on DCT03 kit using 25-25 pin D
type cable.
Keep the switch settings for SW1, SW2 & SW3 in ON position as shown.
Switch on the power supply.
Run DCT software and select Parallel Communication Software link on bothPCs.
Clicking on Port setting will show you three ports (i.e. LPT1, LPT2, LPT3),select
the port from the user machine through which the data transfer has to occur. Forexample clicking on LPT1 will set the LPT1 as the active port on the machine for
the data transfer.
Please ensure that the selected ports are in bi-directional mode, this can be
checked from the BIOS settings of the computer. Clicking on Protocols namely Stop and Wait Protocol, Go Back N Protocol and
Selective Repeat Protocol. Select same protocol on both PC.
Select one PC in transmit mode and another in receive mode.
Select the file to be sent from the transmitter computer. Inter packet delay can be
varied from 5 ms to 100 ms. Packets to be sent are shown with blue colour. Click
on transmit file button.
On the remote PC click on receive file button.
7/30/2019 Computer Networks Record
4/35
Status of the file transfer will be indicated on screen with different colour coding
depending on the status of packet whether it is sent & acknowledged, sent but not
acknowledged, bad packet error in packet.
After the user has selected the file the PC shows the no of packets and size of thefile in the boxes on the top. The packets with their packet sequence is also shown.
Once the transfer starts and the client computer acknowledges the packets it send
the signal back to the transmitting PC. Any acknowledge positive or negative withtheir packet sequence is displayed below the current packet number.
Any positive acknowledge received is displayed as ACK(0) and any negative
acknowledge is displayed as NACK(0) along with their packet sequence inbrackets.
Once the packet has been acknowledged and signal shown the next packet is
transmitted and so on till the whole file gets transmitted.
On the right hand top shows frame info. The frame info consists of different color
packets. Each color specifies different status of the packet. Observe the effect on file transfer by introducing error in data bits use switch
SW2 to introduce error for a moment.
Once the file transfer gets complete you will be prompted by file transfer
successful at transmitter.
At the receiver a selection window will pop up to indicate location for the
received file to be saved.
Verify the received file with transmitted file, this shows end of the file transfer
with success
Result:
Thus parallel communication using RS 232C was verified.
7/30/2019 Computer Networks Record
5/35
EXPT NO: STAR TOPOLOGY
DATE: ANALYSIS AND VERIFICATION OF
STOP &WAIT PROTOCOL
Objective:
To analyze and verify Stop and Wait Protocol using star topology..
Equipments:
LTS-01 trainer kit.
2- computers with Win-2K/XP and Ethernet port available on them.
RJ-45 to RJ-45 LAN connecting cables.
L-SIM LAN protocol analyzer and simulator software.
Procedure:
Connect 2 computer LAN ports using RJ-45 to RJ-45 LAN connecting cables
provided with the system to LTS-01 star topology ports.
Switch on the LTS-01 & computers.
Run L-SIM software on all the computers, one should be server and others should
be clients.
On the server computer select type of network as LAN. On the server computer select the topology as STAR, select protocol as Stop &
Wait click on create network button.
Remote computer details will appear on the computers connected in network,
server will be able to see all clients and all clients will be able to see only server.
Select the computer to whom data file is to be transferred, from the load button,
previously stored/selected file information can be loaded or you can select any filewhich is to be transmitted.
File size will appear in the software window, select the packet size, inter packet
delay and click on OK.
Total packets formed for that file will be indicated on computers. Same details of file will appear o remote computer to which file is to be
transmitted.
Click on file transfer button to transfer file.
During file transfer process you can insert errors into data packets being
transmitted through software window.
See the effect of bad packet error, packet negative acknowledgment error or autoerrors on file transfer.
7/30/2019 Computer Networks Record
6/35
Select BAD PACKET error and click on Generate button in the transmitter
window when say 7th packet is in the transmission state.
The 7th packet in the receiver window will be marked as bad packet. This packetwill be retransmitted from transmitter. Now the packet will be received correctly
this time.
Select ACK LOST error and click on Generate button in the transmitter windowwhen say 23rd packet is in the transmission state.
The 23rd packet in the receiver will be marked as unacknowledged. This packet
will be retransmitted from transmitter. The retransmitted packet will be receivedcorrectly this time.
Select AUTO ERROR and click on Generate button in the transmitter window at
any packet is in the transmission state, errors are generated at random intervalsand no other error insertion facility will be available to user.
Status of packets received when auto error is selected. File transfer from one
computer to another will take place. Multiple file transfer between various server-
client combinations should be performed to observe throughput v/s packet size
graph on transmitter computer. Close file transfer window and click on protocol analyzer and network analyzer
buttons on transmitter computer to view details of the log created.
Under Network analyzer window click on Graph analyzer button. Calculate
throughput and click on plot graph button.
Detailed graph of throughput v/s packet size for the total file transfer activity will
appear on graph window.
Result:
7/30/2019 Computer Networks Record
7/35
Thus Stop & Wait protocol was analyzed and verified using star topology.
EXPT NO: STAR TOPOLOGY
DATE: ANALYSIS AND VERIFICATION OF
GO BACK N PROTOCOL
Objective:
To analyze and verify Go Back N Protocol using LAN port.
Equipments:
LTS-01 trainer kit.
2- computers with Win-2K/XP and Ethernet port available on them.
RJ-45 to RJ-45 LAN connecting cables.
L-SIM LAN protocol analyzer and simulator software.
Procedure:
Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting
cables provided with the system to LTS-01 star topology ports.
Switch on the LTS-01 & computers.
Run L-SIM software on all the computers, one should be server and others should
be clients.
On the server computer select type of network as LAN.
On the server computer select the topology as STAR, select protocol as Stop &
Wait click on create network button.
Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only server.
Select the computer to whom data file is to be transferred, from the load button,
previously stored/selected file information can be loaded or you can select any filewhich is to be transmitted.
File size will appear in the software window, select the packet size, inter packet
delay and click on OK.
Total packets formed for that file will be indicated on computers.
Same details of file will appear o remote computer to which file is to be
transmitted.
Click on file transfer button to transfer file.
During file transfer process you can insert errors into data packets being
transmitted through software window.
See the effect of bad packet error, packet negative acknowledgment error or autoerrors on file transfer. Observe carefully which packet/packets are retransmitted.
Select BAD PACKET error and click on Generate button in the transmitter
window when say 15th packet is in the transmission state.
7/30/2019 Computer Networks Record
8/35
The 15th packet in the receiver window will be marked as bad packet. 15 th, 16th &
17th packets will be retransmitted from transmitter. Retransmitted 15th, 16th &17th packets will be received correctly this time. Receiver will discard 16 th and
17th packets and only 15th packet is accepted.
Select ACK LOST error and click on Generate button in the transmitter window
when say 21st
packet is in the transmission state. The 21st packet in the receiver will be marked as unacknowledged. 21 st, 22nd &
23rd packets will be retransmitted from transmitter. Retransmitted 21st, 22nd & 23rd
packets will be received and discarded by receiver as they were received correctlyearlier.
Select AUTO ERROR and click on Generate button in the transmitter window at
any packet is in the transmission state, errors are generated at random intervalsand no other error insertion facility will be available to user.
Status of packets received when auto error is selected. File transfer from one
computer to another will take place. Multiple file transfer between various server-client combinations should be performed to observe throughput v/s packet size
graph on transmitter computer. Close file transfer window and click on protocol analyzer and network analyzer
buttons on transmitter computer to view details of the log created.
Under Network analyzer window click on Graph analyzer button. Calculate
throughput and click on plot graph button.
Detailed graph of throughput v/s packet size for the total file transfer activity willappear on graph window.
7/30/2019 Computer Networks Record
9/35
Result:
Thus Go Back N protocol was analyzed and verified using star topology.
EXPT NO: STAR TOPOLOGY
DATE: ANALYSIS AND VERIFICATION OFSELECTIVE REPEAT PROTOCOL
Objective:
To analyze and verify Selective Repeat Protocol using star topology.
Equipments:
LTS-01 trainer kit. 2-computers with Win-2K/XP and Ethernet port available on them.
RJ-45 to RJ-45 LAN connecting cables.
L-SIM LAN protocol analyzer and simulator software.
Procedure:
Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting
cables provided with the system to LTS-01 star topology ports.
Switch on the LTS-01 & computers.
Run L-SIM software on all the computers, one should be server and others should
be clients.
On the server computer select type of network as LAN. On the server computer select the topology as STAR, select protocol as Stop &
Wait click on create network button.
Remote computer details will appear on the computers connected in network,
server will be able to see all clients and all clients will be able to see only server.
Select the computer to whom data file is to be transferred, from the load button,
previously stored/selected file information can be loaded or you can select any filewhich is to be transmitted.
File size will appear in the software window, select the packet size, inter packet
delay and click on OK.
Total packets formed for that file will be indicated on computers. Same details of file will appear on remote computer to which file is to be
transmitted.
Click on file transfer button to transfer file.
During file transfer process you can insert errors into data packets being
transmitted through software window.
See the effect of bad packet error, packet negative acknowledgment error or autoerrors on file transfer. Observe carefully which packet/packets are retransmitted.
7/30/2019 Computer Networks Record
10/35
Select BAD PACKET error and click on Generate button in the transmitter
window when say 13th packet is in the transmission state.
The 13th packet in the receiver window will be marked as bad packet. The 13th
packet will be retransmitted from transmitter. Retransmitted 13thpacket will be
received correctly this time.
Select ACK LOST error and click on Generate button in the transmitter windowwhen say 26th packet is in the transmission state.
The 26th packet in the receiver will be marked as unacknowledged. 26 th packet
will be retransmitted from transmitter. Retransmitted 26th packet will be receivedand discarded by receiver as it was received correctly earlier.
Select AUTO ERROR and click on Generate button in the transmitter window at
any packet is in the transmission state, errors are generated at random intervalsand no other error insertion facility will be available to user.
Status of packets received when auto error is selected. File transfer from one
computer to another will take place. Multiple file transfer between various server-
client combinations should be performed to observe throughput v/s packet size
graph on transmitter computer. Close file transfer window and click on protocol analyzer and network analyzer
buttons on transmitter computer to view details of the log created.
Under Network analyzer window click on Graph analyzer button. Calculate
throughput and click on plot graph button.
Detailed graph of throughput v/s packet size for the total file transfer activity will
appear on graph window.
7/30/2019 Computer Networks Record
11/35
Result:
Thus Selective Repeat protocol was analyzed and verified using star topology.
EXPT NO: RING TOPOLOGYDATE: ANALYSIS AND VERIFICATION OF
STOP &WAIT PROTOCOL
Objective:
To analyze and verify Stop and Wait Protocol using ring topology.
Equipments:
LTS-01 trainer kit.
2-computers with Win-2K/XP and Ethernet port available on them.
RJ-45 to RJ-45 LAN connecting cables.
L-SIM LAN protocol analyzer and simulator software.
Procedure:
Connect 2 computer LAN ports using RJ-45 to RJ-45 LAN connecting cables
provided with the system to LTS-01 ring topology ports. Switch on the LTS-01 & computers.
Run L-SIM software on all the computers, one should be server and others should
be clients.
On the server computer select type of network as LAN.
On the server computer select the topology as RING, select protocol as Stop &
Wait click on create network button.
Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only server.
Select the computer to whom data file is to be transferred, from the load button,
previously stored/selected file information can be loaded or you can select any filewhich is to be transmitted.
File size will appear in the software window, select the packet size, inter packet
delay and click on OK.
Total packets formed for that file will be indicated on computers.
Same details of file will appear on remote computer to which file is to be
transmitted.
Click on file transfer button to transfer file.
7/30/2019 Computer Networks Record
12/35
During file transfer process you can insert errors into data packets being
transmitted through software window.
See the effect of bad packet error, packet negative acknowledgment error or autoerrors on file transfer.
Select BAD PACKET error and click on Generate button in the transmitter
window when say 7th
packet is in the transmission state. The 7th packet in the receiver window will be marked as bad packet. This packet
will be retransmitted from transmitter. Now the packet will be received correctly
this time.
Select ACK LOST error and click on Generate button in the transmitter window
when say 23rd packet is in the transmission state.
The 23rd packet in the receiver will be marked as unacknowledged. This packetwill be retransmitted from transmitter. The retransmitted packet will be received
correctly this time.
Select AUTO ERROR and click on Generate button in the transmitter window atany packet is in the transmission state, errors are generated at random intervals
and no other error insertion facility will be available to user. Status of packets received when auto error is selected. File transfer from one
computer to another will take place. Multiple file transfer between various server-client combinations should be performed to observe throughput v/s packet size
graph on transmitter computer.
Close file transfer window and click on protocol analyzer and network analyzer
buttons on transmitter computer to view details of the log created.
Under Network analyzer window click on Graph analyzer button. Calculate
throughput and click on plot graph button.
Detailed graph of throughput v/s packet size for the total file transfer activity will
appear on graph window.
7/30/2019 Computer Networks Record
13/35
Result:
Thus Stop & Wait protocol was analyzed and verified using ring topology.
EXPT NO: RING TOPOLOGY
DATE: ANALYSIS AND VERIFICATION OF
GO BACK N PROTOCOL
Objective:
To analyze and verify Go Back N Protocol using ring topology.
Equipments: LTS-01 trainer kit.
2-computers with Win-2K/XP and Ethernet port available on them.
RJ-45 to RJ-45 LAN connecting cables.
L-SIM LAN protocol analyzer and simulator software.
Procedure:
Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting
cables provided with the system to LTS-01 ring topology ports.
Switch on the LTS-01 & computers.
Run L-SIM software on all the computers, one should be server and others should
be clients. On the server computer select type of network as LAN.
On the server computer select the topology as RING, select protocol as Stop &
Wait click on create network button.
Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only server.
Select the computer to whom data file is to be transferred, from the load button,previously stored/selected file information can be loaded or you can select any file
which is to be transmitted.
File size will appear in the software window, select the packet size, inter packet
delay and click on OK.
Total packets formed for that file will be indicated on computers.
Same details of file will appear on remote computer to which file is to be
transmitted.
Click on file transfer button to transfer file.
During file transfer process you can insert errors into data packets being
transmitted through software window.
7/30/2019 Computer Networks Record
14/35
See the effect of bad packet error, packet negative acknowledgment error or auto
errors on file transfer. Observe carefully which packet/packets are retransmitted.
Select BAD PACKET error and click on Generate button in the transmitterwindow when say 15th packet is in the transmission state.
The 15th packet in the receiver window will be marked as bad packet. 15 th, 16th &
17th packets will be retransmitted from transmitter. Retransmitted 15th
, 16th
&17th packets will be received correctly this time. Receiver will discard 16 th and
17th packets and only 15th packet is accepted.
Select ACK LOST error and click on Generate button in the transmitter windowwhen say 21st packet is in the transmission state.
The 21st packet in the receiver will be marked as unacknowledged. 21 st, 22nd &
23rd packets will be retransmitted from transmitter. Retransmitted 21st, 22nd & 23rd
packets will be received and discarded by receiver as they were received correctly
earlier.
Select AUTO ERROR and click on Generate button in the transmitter window at
any packet is in the transmission state, errors are generated at random intervals
and no other error insertion facility will be available to user. Status of packets received when auto error is selected. File transfer from one
computer to another will take place. Multiple file transfer between various server-
client combinations should be performed to observe throughput v/s packet size
graph on transmitter computer.
Close file transfer window and click on protocol analyzer and network analyzerbuttons on transmitter computer to view details of the log created.
Under Network analyzer window click on Graph analyzer button. Calculate
throughput and click on plot graph button.
Detailed graph of throughput v/s packet size for the total file transfer activity will
appear on graph window.
7/30/2019 Computer Networks Record
15/35
Result:
Thus Go Back N protocol was analyzed and verified using ring topology.
EXPT NO: RING TOPOLOGY
DATE: ANALYSIS AND STUDY OF
SELECTIVE REPEAT PROTOCOL
Objective:
To analyze and verify Selective Repeat Protocol using ring topology.
Equipments:
LTS-01 trainer kit.
2-computers with Win-2K/XP and Ethernet port available on them.
RJ-45 to RJ-45 LAN connecting cables.
L-SIM LAN protocol analyzer and simulator software.
Procedure:
Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting
cables provided with the system to LTS-01 ring topology ports. Switch on the LTS-01 & computers.
Run L-SIM software on all the computers, one should be server and others should
be clients.
On the server computer select type of network as LAN.
On the server computer select the topology as RING, select protocol as Stop &
Wait click on create network button.
Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only server.
Select the computer to whom data file is to be transferred, from the load button,
previously stored/selected file information can be loaded or you can select any filewhich is to be transmitted.
File size will appear in the software window, select the packet size, inter packet
delay and click on OK.
Total packets formed for that file will be indicated on computers.
Same details of file will appear on remote computer to which file is to be
transmitted.
Click on file transfer button to transfer file.
7/30/2019 Computer Networks Record
16/35
During file transfer process you can insert errors into data packets being
transmitted through software window.
See the effect of bad packet error, packet negative acknowledgment error or autoerrors on file transfer. Observe carefully which packet/packets are retransmitted.
Select BAD PACKET error and click on Generate button in the transmitter
window when say 13th
packet is in the transmission state. The 13th packet in the receiver window will be marked as bad packet. The 13th
packet will be retransmitted from transmitter. Retransmitted 13thpacket will be
received correctly this time.
Select ACK LOST error and click on Generate button in the transmitter window
when say 26th packet is in the transmission state.
The 26th packet in the receiver will be marked as unacknowledged. 26 th packetwill be retransmitted from transmitter. Retransmitted 26th packet will be received
and discarded by receiver as it was received correctly earlier.
Select AUTO ERROR and click on Generate button in the transmitter window atany packet is in the transmission state, errors are generated at random intervals
and no other error insertion facility will be available to user. Status of packets received when auto error is selected. File transfer from one
computer to another will take place. Multiple file transfer between various server-client combinations should be performed to observe throughput v/s packet size
graph on transmitter computer.
Close file transfer window and click on protocol analyzer and network analyzer
buttons on transmitter computer to view details of the log created.
Under Network analyzer window click on Graph analyzer button. Calculate
throughput and click on plot graph button.
Detailed graph of throughput v/s packet size for the total file transfer activity will
appear on graph window.
7/30/2019 Computer Networks Record
17/35
Result:
Thus Selective Repeat protocol was analyzed and verified using ring topology.
EXPT NO: BUS TOPOLOGY
DATE: ANALYSIS AND VERIFICATION OF
STOP &WAIT PROTOCOL
Objective:
To analyze and verify Stop and Wait Protocol using bus topology.
Equipments:
LTS-01 trainer kit.
2-computers with Win-2K/XP and Ethernet port available on them.
RJ-45 to RJ-45 LAN connecting cables.
L-SIM LAN protocol analyzer and simulator software.
Procedure:
Connect 2 computer LAN ports using RJ-45 to RJ-45 LAN connecting cables
provided with the system to LTS-01 bus topology ports.
Switch on the LTS-01 & computers.
Run L-SIM software on all the computers, one should be server and others should
be clients.
On the server computer select type of network as LAN.
On the server computer select the topology as BUS, select protocol as Stop &
Wait click on create network button.
Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only server.
Select the computer to whom data file is to be transferred, from the load button,previously stored/selected file information can be loaded or you can select any file
which is to be transmitted.
File size will appear in the software window, select the packet size, inter packet
delay and click on OK.
7/30/2019 Computer Networks Record
18/35
Total packets formed for that file will be indicated on computers.
Same details of file will appear on remote computer to which file is to be
transmitted.
Click on file transfer button to transfer file.
During file transfer process you can insert errors into data packets being
transmitted through software window. See the effect of bad packet error, packet negative acknowledgment error or auto
errors on file transfer.
Select BAD PACKET error and click on Generate button in the transmitterwindow when say 7th packet is in the transmission state.
The 7th packet in the receiver window will be marked as bad packet. This packet
will be retransmitted from transmitter. Now the packet will be received correctlythis time.
Select ACK LOST error and click on Generate button in the transmitter window
when say 23rd packet is in the transmission state.
The 23rd packet in the receiver will be marked as unacknowledged. This packet
will be retransmitted from transmitter. The retransmitted packet will be received
correctly this time.
Select AUTO ERROR and click on Generate button in the transmitter window at
any packet is in the transmission state, errors are generated at random intervals
and no other error insertion facility will be available to user.
Status of packets received when auto error is selected. File transfer from one
computer to another will take place. Multiple file transfer between various server-
client combinations should be performed to observe throughput v/s packet size
graph on transmitter computer.
Close file transfer window and click on protocol analyzer and network analyzer
buttons on transmitter computer to view details of the log created.
Under Network analyzer window click on Graph analyzer button. Calculatethroughput and click on plot graph button.
Detailed graph of throughput v/s packet size for the total file transfer activity will
appear on graph window.
7/30/2019 Computer Networks Record
19/35
Result:
Thus Stop & Wait protocol was analyzed and verified using bus topology.
EXPT NO: BUS TOPOLOGY
DATE: ANALYSIS AND VERIFICATION OF
GO BACK N PROTOCOL
Objective:
To analyze and verify Go Back N Protocol using bus topology.
Equipments:
LTS-01 trainer kit.
2-computers with Win-2K/XP and Ethernet port available on them.
RJ-45 to RJ-45 LAN connecting cables.
L-SIM LAN protocol analyzer and simulator software.
Procedure: Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting
cables provided with the system to LTS-01 bus topology ports.
Switch on the LTS-01 & computers.
Run L-SIM software on all the computers, one should be server and others should
be clients.
On the server computer select type of network as LAN.
On the server computer select the topology as BUS, select protocol as Stop &Wait click on create network button.
Remote computer details will appear on the computers connected in network,
server will be able to see all clients and all clients will be able to see only server.
Select the computer to whom data file is to be transferred, from the load button,
previously stored/selected file information can be loaded or you can select any file
which is to be transmitted.
File size will appear in the software window, select the packet size, inter packet
delay and click on OK.
Total packets formed for that file will be indicated on computers.
7/30/2019 Computer Networks Record
20/35
Same details of file will appear on remote computer to which file is to be
transmitted.
Click on file transfer button to transfer file.
During file transfer process you can insert errors into data packets being
transmitted through software window.
See the effect of bad packet error, packet negative acknowledgment error or autoerrors on file transfer. Observe carefully which packet/packets are retransmitted.
Select BAD PACKET error and click on Generate button in the transmitter
window when say 15th packet is in the transmission state.
The 15th packet in the receiver window will be marked as bad packet. 15 th, 16th &
17th packets will be retransmitted from transmitter. Retransmitted 15th, 16th &
17th packets will be received correctly this time. Receiver will discard 16 th and17th packets and only 15th packet is accepted.
Select ACK LOST error and click on Generate button in the transmitter window
when say 21st packet is in the transmission state.
The 21st packet in the receiver will be marked as unacknowledged. 21 st, 22nd &
23rd packets will be retransmitted from transmitter. Retransmitted 21st, 22nd & 23rd
packets will be received and discarded by receiver as they were received correctly
earlier.
Select AUTO ERROR and click on Generate button in the transmitter window at
any packet is in the transmission state, errors are generated at random intervalsand no other error insertion facility will be available to user.
Status of packets received when auto error is selected. File transfer from one
computer to another will take place. Multiple file transfer between various server-
client combinations should be performed to observe throughput v/s packet sizegraph on transmitter computer.
Close file transfer window and click on protocol analyzer and network analyzer
buttons on transmitter computer to view details of the log created.
Under Network analyzer window click on Graph analyzer button. Calculate
throughput and click on plot graph button.
Detailed graph of throughput v/s packet size for the total file transfer activity willappear on graph window.
7/30/2019 Computer Networks Record
21/35
Result:
Thus Go Back N protocol was analyzed and verified using bus topology.
EXPT NO: BUS TOPOLOGY
DATE: ANALYSIS AND VERIFICATION OF
SELECTIVE REPEAT PROTOCOL
Objective:
To analyze and verify Selective Repeat Protocol using bus topology.
Equipments:
LTS-01 trainer kit.
2-computers with Win-2K/XP and Ethernet port available on them. RJ-45 to RJ-45 LAN connecting cables.
L-SIM LAN protocol analyzer and simulator software.
Procedure:
Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting
cables provided with the system to LTS-01 bus topology ports.
Switch on the LTS-01 & computers.
Run L-SIM software on all the computers, one should be server and others should
be clients.
On the server computer select type of network as LAN.
On the server computer select the topology as BUS, select protocol as Stop &Wait click on create network button.
Remote computer details will appear on the computers connected in network,
server will be able to see all clients and all clients will be able to see only server.
Select the computer to whom data file is to be transferred, from the load button,
previously stored/selected file information can be loaded or you can select any filewhich is to be transmitted.
7/30/2019 Computer Networks Record
22/35
File size will appear in the software window, select the packet size, inter packet
delay and click on OK.
Total packets formed for that file will be indicated on computers.
Same details of file will appear on remote computer to which file is to be
transmitted.
Click on file transfer button to transfer file. During file transfer process you can insert errors into data packets being
transmitted through software window.
See the effect of bad packet error, packet negative acknowledgment error or autoerrors on file transfer. Observe carefully which packet/packets are retransmitted.
Select BAD PACKET error and click on Generate button in the transmitter
window when say 13th packet is in the transmission state.
The 13th packet in the receiver window will be marked as bad packet. The 13th
packet will be retransmitted from transmitter. Retransmitted 13thpacket will be
received correctly this time.
Select ACK LOST error and click on Generate button in the transmitter window
when say 26th packet is in the transmission state.
The 26th packet in the receiver will be marked as unacknowledged. 26 th packetwill be retransmitted from transmitter. Retransmitted 26th packet will be received
and discarded by receiver as it was received correctly earlier.
Select AUTO ERROR and click on Generate button in the transmitter window atany packet is in the transmission state, errors are generated at random intervals
and no other error insertion facility will be available to user.
Status of packets received when auto error is selected. File transfer from one
computer to another will take place. Multiple file transfer between various server-client combinations should be performed to observe throughput v/s packet size
graph on transmitter computer.
Close file transfer window and click on protocol analyzer and network analyzerbuttons on transmitter computer to view details of the log created.
Under Network analyzer window click on Graph analyzer button. Calculate
throughput and click on plot graph button.
Detailed graph of throughput v/s packet size for the total file transfer activity will
appear on graph window.
7/30/2019 Computer Networks Record
23/35
Result:
Thus Selective Repeat protocol was analyzed and verified using bus topology.
EXPT NO: ANALYSIS AND VERIFICATION OF
DATE: CSMA-CD PROTOCOL
Objective:
To analyze and verify CSMA-CD protocol.
Equipments:
LTS-01 trainer kit.
3 computers with Win-2K/XP and Ethernet port available on them. RJ-45 to RJ-45 LAN connecting cables.
L-SIM LAN protocol analyzer and simulator software.
Procedure:
Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting
cables provided with the system to LTS-01 star topology ports.
Switch on the LTS-01 & computers.
Run L-SIM software on all the computers, one should be server and others should
be clients.
On the server computer select type of network as LAN. On the server computer select the topology as STAR, select protocol as CSMA-
CD click on create network button.
Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only server.
Select the computer to whom data file is to be transferred, from the load button,previously stored/selected file information can be loaded or you can select any file
which is to be transmitted.
7/30/2019 Computer Networks Record
24/35
File size will appear in the software window, select the packet size, inter packet
delay and click on OK.
Total packets formed for that file will be indicated on computers.
Same details of file will appear on remote computer to which file is to be
transmitted.
Click on file transfer button to transfer file. During file transfer process try to send file to server from another client
computer, file transfer from second transmitter will also get initiated.
When packet from second sender collides with first sender it will be indicated ascollision packet on server & client-1.
File from first sender will resume after some time and second time and second
sender file will be kept on hold till first file transfer gets completed.
Once the first sender file reached to server its display is refreshed and server will
show packet status for second sender.
Second sender file transfer will also get completed and thus collision of twopackets transmitted simultaneously from two senders is detected and cleared.
Multiple file transfer between various server-client combinations should be
performed to observe throughput v/s packet size graph on transmitter computer.
Close file transfer window and click on protocol analyzer and network analyzer
buttons on transmitter computer to view details of the log created.
Under network analyzer window click on graph analyzer button.
Detailed graph of throughput v/s packet size for the total file transfer activity will
appear on graph window.
7/30/2019 Computer Networks Record
25/35
Result:
Thus CSMA-CD Protocol was analyzed and verified.
EXPT NO: ANALYSIS AND VERIFICATION OF
DATE: CSMA-CA PROTOCOL
Objective:
To analyze and verify CSMA-CA protocol.
Equipments:
LTS-01 trainer kit.
3 computers with Win-2K/XP and Ethernet port available on them. RJ-45 to RJ-45 LAN connecting cables.
L-SIM LAN protocol analyzer and simulator software.
Procedure:
Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting
cables provided with the system to LTS-01 star topology ports.
Switch on the LTS-01 & computers.
Run L-SIM software on all the computers, one should be server and others should
be clients.
On the server computer select type of network as LAN. On the server computer select the topology as STAR, select protocol as CSMA-
CA click on create network button.
Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only server.
Click on the send RTS button to get your computer into transmitter mode.
7/30/2019 Computer Networks Record
26/35
Select the computer to whom data file is to be transmitted, from the load button,
previously stored/selected file information can be loaded or you can select anyfile, which is to be transmitted.
File size will appear in the software window, select the packet size, inter packet
delay and click OK.
Total packets formed for that file will be indicated on computers, same details offile will appear on remote computer to which file is to be transmitted.
Click on file transfer button to transfer file.
During file transfer process try to get access to transmit file by clicking on sendRTS button on other computers, you will be prompted with channel is busy
message.
Thus collision of two packets transmitted simultaneously from two senders isavoided.
File transfer from one computer to another will take place.
Multiple file transfer between various server-client combinations should beperformed to observe throughput v/s packet size graph on transmitter computer.
Close file transfer window and click on protocol analyzer and network analyzer
buttons on transmitter computer to view details of the log created.
Under network analyzer window click on graph analyzer button.
Detailed graph of throughput v/s packet size for the total file transfer activity will
appear on graph window.
7/30/2019 Computer Networks Record
27/35
Result:
Thus CSMA-CA Protocol was analyzed and verified.
EXPT NO: VERIFICATION OF DATA ENCRYPTION
DATE: AND DECRYPTION
Objective:
To verify data encryption and decryption.
Equipments:
LTS-01 trainer kit.
2 computers with Win-2K/XP and Ethernet port available on them.
RJ-45 to RJ-45 LAN connecting cables.
L-SIM LAN protocol analyzer and simulator software.
Procedure:
Connect at least two computer LAN ports using RJ-45 to RJ-45 LAN connecting
cables provided with the system to LTS-01 star topology ports.
Switch on the LTS-01 & computers. Run L-SIM software on both the computers, one should be server and another
should be client.
On the server computer select type of network as STAR and select protocol asStop & Wait and click on create network button.
Remote computer details will appear on the computers connected in network,server will be able to see client and client will be able to see server.
7/30/2019 Computer Networks Record
28/35
Select the computer to whom data file is to be transferred, from the load button,
previously stored/selected file information can be loaded or you can select anyfile, which is to be transmitted. If notepad text file is selected encryption
information can be viewed very clearly for each packet formed for that file.
File size will appear in the software window, select the packet size, inter packet
delay and click OK. Total packets formed for that file will be indicated on computers, same details of
file will appear on remote computer to which file is to be transmitted.
Click on file transfer button to transfer file.
Click on pause button to interrupt file transfer and click on encrypt/decrypt button
to see file packet encrypted and decrypted.
The actual file selected packet content and encrypted data content will be seen inencryption details window.
Any text can be typed at the bottom box, which we want to encrypt and provide
key text for encryption. Similarly same key can be typed again to decrypt andrecover encrypted text. If the key at decryption stage differs from key at
encryption stage, decrypted data will not be perfect as per original data. To understand the working of how decryption took place you can view visual
explanation of encryption and decryption process by clicking on visual helpbutton.
We can resume file transfer by clicking on continue button.
Encrypted format of each packet can thus be seen by pausing the file transfer atrespective packet when it is under transmission state.
File transfer from one computer to another will take place.
To study programming of Cryptography with encryption and decryption processsample executable file & program is provided inside program files-Lsim-
SampleApplication.zip.
When user extracts this folder he will find cryptography folder inside whichcryptography.cpp and cryptography.exe files are provided.
If user runs the cryptography.exe file screen with browse option for selection of
file to be encrypted and enter key for encryption option will get open for user toselect the file and enter encryption key.
When user clicks on encrypt button a message with encryption completed will
popup. Encrypted file will be stored at the same location from where file forencryption is selected.
User has to select file to be decrypted and enter decryption key.
When user clicks on decrypt button a message with decryption completed will
popup. Decrypted file will be stored at the same location from where the file fordecryption is selected.
To verify encryption and decrypted files user has to close the cryptography.exe
file.
Actual programming can be checked from cryptography.cpp program.
7/30/2019 Computer Networks Record
29/35
Result:
Thus verification of Encryption and Decryption was done.
EXPT NO: SIMULATION OF DISTANCE
DATE: VECTOR ROUTING ALGORITHM
Objective:
To simulate distance vector routing algorithm.
Equipments:
N-SIM.
Computer with Win-2K/XP.
Procedure:
Run N-SIM software from your computer.
To check working of distance vector routing algorithm in the form of
animated representation click on distance vector routing under routing
protocols. We can study the working of distance vector routing algorithm through this
animated movie.
To implement this algorithm click on algorithms under menu and click ondistance vector routing.
Add the number of routers, select one by one, maximum 8 routers can be
added, all the added routers will appear in the window.
7/30/2019 Computer Networks Record
30/35
Click configure button to define the links between pair of routers and define
its cost in kilometers.
Once all the possible pairs have been defined click save button to save theconfiguration that has been defined.
Depending on the configuration, possible links will be defined, implemented
and drawn in the screen near the routers added. We can edit the configuration at any time by clicking on the value of the
router number or cost.
To simulate and find out shortest path select the source and destinationrouters.
Click on simulate button to start the algorithm, this will calculate the shortest
path and will be shown on the screen.
Click on the result button to see the parameters for shortest path.
Click on graph button to plot the readings against the various parameters.
7/30/2019 Computer Networks Record
31/35
Result:
Thus distance vector routing algorithm was simulated.
EXPT NO: SIMULATION OF LINK
DATE: STATE ROUTING ALGORITHM
Objective:
To simulate Link State routing algorithm.
Equipments:
N-SIM.
Computer with Win-2K/XP.
Procedure:
Run N-SIM software from your computer.
To check working of link state routing algorithm in the form of animatedrepresentation click on distance vector routing under routing protocols.
We can study the working of link state routing algorithm through this
animated movie.
To implement this algorithm click on algorithms under menu and click on
distance vector routing.
Add the number of routers, select one by one, maximum 8 routers can beadded, all the added routers will appear in the window.
7/30/2019 Computer Networks Record
32/35
Click configure button to define the links between pair of routers and define
its cost in kilometers.
Once all the possible pairs have been defined click save button to save theconfiguration that has been defined.
Depending on the configuration, possible links will be defined, implemented
and drawn in the screen near the routers added. We can edit the configuration at any time by clicking on the value of the
router number or cost.
To simulate and find out shortest path select the source and destinationrouters.
Click on simulate button to start the algorithm, this will calculate the shortest
path and will be shown on the screen.
Click on the result button to see the parameters for shortest path.
Click on graph button to plot the readings against the various parameters.
7/30/2019 Computer Networks Record
33/35
Result:
Thus Link state routing algorithm was simulated.
EXPT NO: IMPLEMENTATION AND STUDY OF
DATE: WIRELESS LAN
Objective:
To implement and study wireless LAN.
Equipments:
3 or 4 computers with Win-2K/XP.
Access point with accessories.
Wireless LAN Access cards with USB driver installed on respective
computers.
L-SIM LAN protocol analyzer and simulator software.
Procedure:
Connect Access point to power outlet and switch it on.
Connect USB wireless access cards to computer USB ports and check for
driver installed on respective computers.
7/30/2019 Computer Networks Record
34/35
We will find wireless LAN detection on your computers, assign IP address to
the detected wireless LAN and connect it. Connection of wireless LAN willbe indicated on your computers.
Run L-SIM software on all the computers, one should be server and others
should be clients.
On the server computer select type of network as WLAN. On the sever computer select topology as STAR, select protocol as CSMA-
CA click on create network button.
Remote computer details will appear on the computers connected in network,server will be able to see all clients and all clients will be able to see only
server.
Click on the send RTS button to get your computer into transmitter mode.
Select the computer to whom data file is to be transmitted, from the load
button, previously stored/selected file information can be loaded or you can
select any file, which is to be transmitted.
File size will appear in the software window, select the packet size, inter
packet delay and click OK.
Total packets formed for that file will be indicated on computers, same detailsof file will appear on remote computer to which file is to be transmitted.
Click on file transfer button to transfer file.
During file transfer process try to get access to transmit file by clicking onsend RTS button on other computers, you will be prompted with channel is
busy message.
Thus collision of two packets transmitted simultaneously from two senders is
avoided.
File transfer from one computer to another will take place.
Multiple file transfer between various server-client combinations should beperformed to observe throughput v/s packet size graph on transmittercomputer.
Close file transfer window and click on protocol analyzer and network
analyzer buttons on transmitter computer to view details of the log created.
Under network analyzer window click on graph analyzer button.
Detailed graph of throughput v/s packet size for the total file transfer activity
will appear on graph window.
7/30/2019 Computer Networks Record
35/35
Result:
Thus Wireless LAN was implemented and studied.