Вы находитесь на странице: 1из 35

RUSTAMJI INSTITUTE OF TECHNOLOGY

BSF ACADEMY, TEKANPUR

Department of Computer Science & Engineering

CS 6004 - Computer Network

Submitted to Submitted by
Prof. Yograj Sharma Jaydeep Rajput
(Head of Department) (0902CS161021)

Computer Science & Engineering 6thSemester


(2016-20 Batch)
INDEX

S.No. Name of Experiment Experiment Date Submission Date Signature


1. Study of various network
devices.
2. Study of various LINUX and
Windows Networking
Commands.
3. Study of Network
Topologies.
4. Implementation and Study
of Stop-n-Wait Protocol.
5. Implementation and Study
of Go Back-N Protocol.
6. Implementation and Study
of Selective Repeat
Protocol.
7. Implementation and Study
of CSMA - CA Protocol.
8. Implementation and Study
of CSMA - CD Protocol.
9. Implementation and Study
of Pure Aloha Protocol.
10. Implementation and Study
of Slotted Aloha Protocol.
11. Implementation and Study
of Token Bus Protocol.
12. Implementation and Study
of Token Ring Protocol.
EXPERIMENT 1
STUDY OF NETWORK DEVICE
1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal over the
same network before the signal becomes too weak or corrupted so as to extend the length to
which the signal can be transmitted over the same network.

2. Hub – A hub is basically a multiport repeater. A hub connects multiple wires coming from
different branches, for example, the connector in star topology which connects different stations.
Hubs cannot filter data, so data packets are sent to all connected devices.

3. Bridge – A bridge operates at data link layer. A bridge is a repeater, with add on functionality
of filtering content by reading the MAC addresses of source and destination. It is also used for
interconnecting two LANs working on the same protocol. It has a single input and single output
port, thus making it a 2 port device.
Types of Bridges
 Transparent Bridges :- These are the bridge in which the stations are completely unaware
of the bridge’s existence i.e. whether or not a bridge is added or deleted from the network ,
reconfiguration of the stations is unnecessary. These bridges makes use of two processes
i.e. bridge forwarding and bridge learning.

 Source Routing Bridges :- In these bridges, routing operation is performed by source


station and the frame specifies which route to follow. The hot can discover frame by
sending a specical frame called discovery frame, which spreads through the entire network
using all possible paths to destination.

4. Switch – A switch is a multi port bridge with a buffer and a design that can boost its
efficiency(large number of ports imply less traffic) and performance. Switch is data link layer
device. Switch can perform error checking before forwarding data, that makes it very efficient as
it does not forward packets that have errors and forward good packets selectively to correct port
only. In other words, switch divides collision domain of hosts, but broadcast domain remains
same.
5. Routers – A router is a device like a switch that routes data packets based on their IP
addresses. Router is mainly a Network Layer device. Routers normally connect LANs and
WANs together and have a dynamically updating routing table based on which they make
decisions on routing the data packets. Router divide broadcast domains of hosts connected
through it.
EXPERIMENT 2

Network Command /window Linux


1. Arp: Address Resolution Protocol
Syntax: c:\>arp
It is easy to think of network communications in terms of IP addressing, packet delivery is
ultimately dependent on the Media Access Control (MAC) address of the device’s network
adapter

2. Hostname
Syntax : C:\>hostname
The hostname command is used to show or set a computer's hostname and domain name It is
one of the most basic of the network administrative utilities.
3. Ipconfig: Internet protocol configuration .
SYNTAX: C:\>ipconfig

The ipconfig command is used to find out your current local IP address, default gateway, TCP/IP
settings and more

4. Tracert: Trace route

SYNTAX: C:\>tracert

Traceroute is a command which can show you the path a packet of information takes from your
computer to one you specify. It will list all the routers it passes through until it reaches its
destination, or fails to and is discarded. In addition to this, it will tell you how long each 'hop'
from router to router takes.
5: PING: Packet Internet Groper

SYNTAX: C:\>ping

Ping is a computer network administration software utility used to test the reachability of a host
on an Internet Protocol network
EXPERIMENT 3

Study of Various Topologies


BUS Topology

Bus topology is a network type in which every computer and network device is connected to
single cable. When it has exactly two endpoints, then it is called Linear Bus topology.

Features of Bus Topology

1. It transmits data only in one direction.


2. Every device is connected to a single cable

Advantages of Bus Topology


1. It is cost effective.
2. Cable required is least compared to other network topology.

Disadvantages of Bus Topology

1. Cables fails then whole network fails.


2. If network traffic is heavy or nodes are more the performance of the network decreases.

RING Topology
It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbours for each device.

Features of Ring Topology

1. A number of repeaters are used for Ring topology with large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then
the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data
loss repeaters are used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called Dual Ring Topology.

Advantages of Ring Topology

1. Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.
2. Cheap to install and expand

STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub
is the central node and all others nodes are connected to the central node.

Features of Star Topology

1. Every node has its own dedicated connection to the hub.


2. Hub acts as a repeater for data flow.
3. Can be used with twisted pair, Optical Fibre or coaxial cable.

Advantages of Star Topology

1. Fast performance with few nodes and low network traffic.


2. Hub can be upgraded easily.
3. Easy to troubleshoot.

Disadvantages of Star Topology

1. Cost of installation is high.


2. Expensive to use.

EXPERIMENT 4:
Implementation and study of stop and wait protocol.

NAME
Study Stop & Wait Protocol

OBJECTIVE
To study Stop & Wait protocol

EQUIPMENTS
NT-LTS trainer kit
3 or more Computers with win-2K / XP and Ethernet port available on them RJ-45 to RJ-45
LAN connecting cables
L-S IM LAN protocol analyzer and simulator software

PROCEDURE
1. 1 Connect system in star topology using NT-LTS kit.
2. Using L-SIM, setup and select Stop and wait protocol on Star topology.
3. Select data file from one computer to transfer.
4. Select packet size.
5. Transfer file (Click on transfer button)
6. During transfer insert erroes into data packet.
7. Observe error for Bad packet from Error Generator
8. Observe error for Acknowledgement Lost from Error Generator.
Observation

Only Single packet is sent at a time and when an error is generated that packet is marked as Red
on Reciever computer and when Acknkowlege is not received to sender computer it resends that
packet then continue other packets one by one. In our case we did a Bad packet error on 7th

sender
EXPERIMENT 5:
Implementation and study of Selective Go Back-N Protocol

NAME
Study Go Back N Protocol

OBJECTIVE
To study Go Back N protocol

EQUIPMENTS
NT-LTS trainer kit
3 or more Computers with win-2K / XP and Ethernet port available on them RJ-45 to RJ-45
LAN connecting cables
L-SIM LAN protocol analyzer and simulator software

PROCEDURE
1. Connect system in star topology using NT-LTS kit.
2. Using L-SIM, setup and select Go Back N protocol on Star topology.
3. Select data file from one computer to transfer.
4. Select packet size..
5. Transfer file (Click on transfer button)
6. During transfer insert erroes into data packet.
7. Observe error for Bad packet from Error Generator
8. Observe error for Acknowledgement Lost from Error Generator.
EXPERIMENT 6
Implementation and Study of Selective Repeat Protocol
NAME
Study Selective Repeat Protocol

OBJECTIVE
To study Selective Repeat protocol

EQUIPMENTS
NT-LTS trainer kit
3 or more Computers with win-2K / XP and Ethernet port available on them RJ-45 to RJ-45
LAN connecting cables
L-SIM LAN protocol analyzer and simulator software

PROCEDURE
1. 1 Connect system in star topology using NT-LTS kit.
2. Using L-SIM, setup and select Selective Repeat protocol on Star topology.
3. Select data file from one computer to transfer.
4. Select packet size.
5. Transfer file (Click on transfer button)
6. During transfer insert erroes into data packet.
7. Observe error for Bad packet from Error Generator
8. Observe error for Acknowledgement Lost from Error Generator.
EXPRIMENT 7
Implementation and study of CSMA-CD Protocol

NAME
study CSMA-CA protocol using Ethernet LAN

OBJECTIVE
Study CSMA-CA protocol using Ethernet LAN

A.To study CSMA-CA protocol using Ethernet LAN.

EQUIPMENTS
NT-LTS trainer kit
3 or more Computers with win-2K / XP and Ethernet port available on them RJ-45 to RJ-45
LAN connecting cables
L-SIM LAN protocol analyzer and simulator software

PROCEDURE
1. Connect system in star topology using NT-LTS kit.
2. Using L-SIM, setup and CSMA -CA protocol on Star topology.
3. Select data file from one computer to transfer.
4. Select packet size.
5. Transfer file (Click on transfer button)
6. During transfer insert erroes into data packet.
7. Observe error for Bad packet from Error Generator
8. Observe error for Acknowledgement Lost from Error Generator.

.
9. Multiple file transfer between various server-client combinations should be performed to
observe throughput v/s packet size graph on transmitter computer.
10. Close file transfer window and click on protocol analyzer and Network analyzer buttons on
transmitter computer to view details of the log created.
EXPERIMENT 8
Implementation and Study of CSMA-CD Protocol
NAME
Study CSMA-CD Protocol

OBJECTIVE
To study CSMA-CD protocol

EQUIPMENTS
NT-LTS trainer kit
3 or more Computers with win-2K / XP and Ethernet port available on them RJ-45 to RJ-45
LAN connecting cables
L-SIM LAN protocol analyzer and simulator software

PROCEDURE
1. Connect system in star topology using NT-LTS kit.
2. Using L-SIM, setup and select CSMA-CD on Star topology.
3. Select data file from one computer to transfer.
4. Select packet size.
5. Transfer file (Click on transfer button)
6. During transfer insert erroes into data packet.
7. Observe error for Bad packet from Error Generator
8. Observe error for Acknowledgement Lost from Error Generator.
Experiment No. 9
Name
Study Pure Aloha Protocol

Objective
To Study Pure Aloha Protocol

Equipment
NT-LTS trainer kit 3 or more Computers with win-2K / XP and Ethernet port available on them
RJ-45 to RJ-45 LAN connecting cables L-S IM LAN protocol analyzer and simulator software.

Procedure
1. Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting cables
provided with the system to NT-LTS star topology ports.
2. Switch on the NT-LTS &Computers.
3. Run L-SIM software on all the computers, one should be server and others should be
clients.
4. On the server computer select type of network as LAN.
5. On the server computer select the topology as STAR, select protocol as Pure ALOHA
click on create network button.
6. Remote computer details will appear on the computers connected in network, server will
be able to see all clients and all clients will be able to see only server.
7. Select the computer to whom data file is to be transferred, from the load button,
previously stored/selected file information can be loaded or you can select any file, which
is to be transmitted.
8. File size will appear in the software window, select the packet size up to 8192 and click
OK.
9. One packet formed for that file will be indicated on computers, same details of file will
appear on remote computer to which file is to be transmitted.
10. Click on file transfer button to transfer file
11. During file transfer process try to send file to same receiver from another computer, file
transfer from second transmitter will also gets initiated.
12. When packet from second sender collides with first sender it will be indicated as collision
packet on server & Client-1and client-2.
13. Click on OK button to the server and client-1and retransmit the File from first sender to
the receiver. Receiver receive file successfully when no other Clients are transmitting
file.
14. Multiple file transfer between various server-client combinations should be performed to
observe throughput v/s packet size graph on transmitter computer.
15. Close file transfer window and click on protocol analyzer and Network analyzer buttons
on transmitter computer to view details of the log created.
16. Under Network analyzer window click on Graph analyzer button.
17. Calculate throughput and click on Plot graph button. Graph for SLOTED ALOHA
protocol
18. Detailed graph of throughput v/s packet size for the total file transfer activity will appear
on graph window.
19. This plot can be printed by clicking on print button.
20. Similarly, Comparison of two different protocols is performed in Network Analyzer.
Snapshots
Experiment No 10
NAME

Study Slotted ALOHA Protocol

OBJECTIVE

To study slotted ALOHA protocol EQUIPMENTS NT-LTS trainer kit 3 or more Computers
with win-2K / XP and Ethernet port available on them RJ-45 to RJ-45 LAN connecting cables L-
S IM LAN protocol analyzer and simulator software

PROCEDURE

1. Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting cables
provided with the system to NT-LTS star topology ports.
2. Switch on the NT-LTS &Computers.
3. Run L-SIM software on all the computers, one should be server and others should be
clients.
4. On the server computer select type of network as LAN.
5. On the server computer select the topology as STAR, select protocol as Slotted ALOHA
click on create network button.
6. Remote computer details will appear on the computers connected in network, server will
be able to see all clients and all clients will be able to see only server.
7. File transmit button will get activated for fixed slot duration and same will be indicated
by Green symbol on respective client window. NL-LTS : LAN / WLAN TRAINING
SYSTEM V-19.0 - 130 - NETWORKS
8. Select the computer to whom data file is to be transferred, from the load button,
previously stored/selected file information can be loaded or you can select any file, which
is to be transmitted.
9. File size will appear in the software window, select the packet size up to 8192 and click
OK. NL-LTS : LAN / WLAN TRAINING SYSTEM V-19.0 - 131 - NETWORKS
10. One packet formed for that file will be indicated on computers, same details of file will
appear on remote computer to which file is to be transmitted.
11. Click on file transfer button to transfer file.
12. During file transfer process try to send file to same receiver from another computer, file
transfer from second transmitter will also gets initiated.
13. When packet from second sender collides with first sender it will be indicated as collision
packet on server & Client-1and client-2. NL-LTS : LAN / WLAN TRAINING SYSTEM
V-19.0 - 132 - NETWORKS
14. Click on OK button to the server and first sender. First sender is auto ready to retransmit
the File from first sender to the receiver. Receiver receive file successfully when no other
Clients are transmitting file First sender ready to transmit NL-LTS : LAN / WLAN
TRAINING SYSTEM V-19.0 - 133 - NETWORKS
15. File transmission started from first sender to the receiver.
16. Receiver received file successfully
17. Click on OK to the second sender and second sender is auto ready to retransmit the same
file to the server. Receiver receive file successfully when no other Clients are
transmitting file
18. Multiple file transfer between various server-client combinations should be performed to
observe throughput v/s packet size graph on transmitter computer.
19. Close file transfer window and click on protocol analyzer and Network analyzer buttons
on transmitter computer to view details of the log created.
20. Under Network analyzer window click on Graph analyzer button.
21. Calculate throughput and click on Plot graph button.
22. Detailed graph of throughput v/s packet size for the total file transfer activity will appear
on graph window.
23. This plot can be printed by clicking on print button.
24. Similarly, Comparison of two different protocols is performed in Network Analyzer
window.
Snapshot
Experiment – 11
NAME
Study Token Bus Protocol

OBJECTIVE
To study token bus protocol

EQUIPMENTS
NT-LTS trainer kit
3 or more Computers with win-2K / XP and Ethernet port available on them RJ-45 to RJ-45
LAN connecting cables
L-S IM LAN protocol analyzer and simulator software

PROCEDURE
1. Connect four or more computer LAN ports using RJ-45 to RJ-45 LAN connecting cables
provided with the system to NT-LTS bus topology ports.
2. Switch on the NT-LTS & Computers.
3. Run L-SIM software on all the computers, one should be server and others should be client.
Run the software in the sequence of connection i.e. server first followed by first client to last
client.
4. On the server computer select type of network as LAN.
5. On the server computer select the topology as BUS, select protocol as Token Bus and select
token activation time as desired, click on create network button.
6. To just observe how token passes from one computer to another computer and effect of token
time keep token duration from 5 to 40 seconds and to do actual file transfer keep token duration
as 50 or 60 seconds.
7. Remote computer details will appear on the computers connected in network, server will be
able to see all clients and all clients will be able to see only server.
8. Select the computer to whom data file is to be transferred, from the load button, previously
stored/selected file information can be loaded or you can select any file, which is to be
transmitted.
9. File size will appear in the software window, select the packet size, inter packet delay and
click OK.
10. Total packets formed for that file will be indicated on computers, same details of file will
appear on remote computer to which file is to be transmitted.
11. Click on file transfer button to transfer file.
12. File transfer from one computer to another will take place.
13. Remove connection of last client and see the effect on file transfer or token transfer. You will
find that token will process till the client who is connected in network.
14. Remove connection of client which is in between the server and last client and see the effect
on file transfer or token transfer. You will find that token will process till the client who is
connected in network from client and will not process for the client get disconnected from
network.
Experiment – 12

NAME
Study Token Ring Protocol

OBJECTIVE
To study token ring protocol

EQUIPMENTS

NT-LTS trainer kit


4 Computers with win-2K / XP and Ethernet port available on them RJ-45 to RJ-45 LAN
connecting cables
L-S IM LAN protocol analyzer and simulator software

PROCEDURE

1. Connect four computer LAN ports using RJ-45 to RJ-45 LAN connecting cables provided
with the system to NT-LTS ring topology ports.
2. Switch on the NT-LTS & Computers.
3. Run L-SIM software on all the computers, one should be server and other 3 should be client.
Run the software in the sequence of connection i.e. server first followed by first client to last
client.
4. On the server computer select type of network as LAN.

5. On the server computer select the topology as RING, select protocol as Token Ring and select
token activation time as desired, click on create network button.
6. To just observe how token passes from one computer to another computer and effect of token
time keep token duration from 5 to 40 seconds and to do actual file transfer keep token duration
as 50 or 60 seconds.
7. Remote computer details will appear on the computers connected in network, server will be
able to see all clients and all clients will be able to see only server.
8. Select the computer to whom data file is to be transferred, from the load button, previously
stored/selected file information can be loaded or you can select any file, which is to be
transmitted.
9. File size will appear in the software window, select the packet size, inter packet delay and
click OK.
10. Total packets formed for that file will be indicated on computers, same details of file will
appear on remote computer to which file is to be transmitted.
11. Click on file transfer button to transfer file.
12. File transfer from one computer to another will take place.
13. To see the effect of ring break state remove any of the client from the hardware and close L-
SIM window for that client. Ring broken message will be prompted on server computer and
network will get destroyed, you need to reconfigure the network. Since the network is created
with logical ring physical removal of computer from hardware will be detected when token
completes its cycle and reaches to the client whose connection is removed, hence it will take
some time to show disconnection of computer in case of unplugging of computer.

Вам также может понравиться