Академический Документы
Профессиональный Документы
Культура Документы
Submitted to Submitted by
Prof. Yograj Sharma Jaydeep Rajput
(Head of Department) (0902CS161021)
2. Hub – A hub is basically a multiport repeater. A hub connects multiple wires coming from
different branches, for example, the connector in star topology which connects different stations.
Hubs cannot filter data, so data packets are sent to all connected devices.
3. Bridge – A bridge operates at data link layer. A bridge is a repeater, with add on functionality
of filtering content by reading the MAC addresses of source and destination. It is also used for
interconnecting two LANs working on the same protocol. It has a single input and single output
port, thus making it a 2 port device.
Types of Bridges
Transparent Bridges :- These are the bridge in which the stations are completely unaware
of the bridge’s existence i.e. whether or not a bridge is added or deleted from the network ,
reconfiguration of the stations is unnecessary. These bridges makes use of two processes
i.e. bridge forwarding and bridge learning.
4. Switch – A switch is a multi port bridge with a buffer and a design that can boost its
efficiency(large number of ports imply less traffic) and performance. Switch is data link layer
device. Switch can perform error checking before forwarding data, that makes it very efficient as
it does not forward packets that have errors and forward good packets selectively to correct port
only. In other words, switch divides collision domain of hosts, but broadcast domain remains
same.
5. Routers – A router is a device like a switch that routes data packets based on their IP
addresses. Router is mainly a Network Layer device. Routers normally connect LANs and
WANs together and have a dynamically updating routing table based on which they make
decisions on routing the data packets. Router divide broadcast domains of hosts connected
through it.
EXPERIMENT 2
2. Hostname
Syntax : C:\>hostname
The hostname command is used to show or set a computer's hostname and domain name It is
one of the most basic of the network administrative utilities.
3. Ipconfig: Internet protocol configuration .
SYNTAX: C:\>ipconfig
The ipconfig command is used to find out your current local IP address, default gateway, TCP/IP
settings and more
SYNTAX: C:\>tracert
Traceroute is a command which can show you the path a packet of information takes from your
computer to one you specify. It will list all the routers it passes through until it reaches its
destination, or fails to and is discarded. In addition to this, it will tell you how long each 'hop'
from router to router takes.
5: PING: Packet Internet Groper
SYNTAX: C:\>ping
Ping is a computer network administration software utility used to test the reachability of a host
on an Internet Protocol network
EXPERIMENT 3
Bus topology is a network type in which every computer and network device is connected to
single cable. When it has exactly two endpoints, then it is called Linear Bus topology.
RING Topology
It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbours for each device.
1. A number of repeaters are used for Ring topology with large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then
the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data
loss repeaters are used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called Dual Ring Topology.
1. Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.
2. Cheap to install and expand
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub
is the central node and all others nodes are connected to the central node.
EXPERIMENT 4:
Implementation and study of stop and wait protocol.
NAME
Study Stop & Wait Protocol
OBJECTIVE
To study Stop & Wait protocol
EQUIPMENTS
NT-LTS trainer kit
3 or more Computers with win-2K / XP and Ethernet port available on them RJ-45 to RJ-45
LAN connecting cables
L-S IM LAN protocol analyzer and simulator software
PROCEDURE
1. 1 Connect system in star topology using NT-LTS kit.
2. Using L-SIM, setup and select Stop and wait protocol on Star topology.
3. Select data file from one computer to transfer.
4. Select packet size.
5. Transfer file (Click on transfer button)
6. During transfer insert erroes into data packet.
7. Observe error for Bad packet from Error Generator
8. Observe error for Acknowledgement Lost from Error Generator.
Observation
Only Single packet is sent at a time and when an error is generated that packet is marked as Red
on Reciever computer and when Acknkowlege is not received to sender computer it resends that
packet then continue other packets one by one. In our case we did a Bad packet error on 7th
sender
EXPERIMENT 5:
Implementation and study of Selective Go Back-N Protocol
NAME
Study Go Back N Protocol
OBJECTIVE
To study Go Back N protocol
EQUIPMENTS
NT-LTS trainer kit
3 or more Computers with win-2K / XP and Ethernet port available on them RJ-45 to RJ-45
LAN connecting cables
L-SIM LAN protocol analyzer and simulator software
PROCEDURE
1. Connect system in star topology using NT-LTS kit.
2. Using L-SIM, setup and select Go Back N protocol on Star topology.
3. Select data file from one computer to transfer.
4. Select packet size..
5. Transfer file (Click on transfer button)
6. During transfer insert erroes into data packet.
7. Observe error for Bad packet from Error Generator
8. Observe error for Acknowledgement Lost from Error Generator.
EXPERIMENT 6
Implementation and Study of Selective Repeat Protocol
NAME
Study Selective Repeat Protocol
OBJECTIVE
To study Selective Repeat protocol
EQUIPMENTS
NT-LTS trainer kit
3 or more Computers with win-2K / XP and Ethernet port available on them RJ-45 to RJ-45
LAN connecting cables
L-SIM LAN protocol analyzer and simulator software
PROCEDURE
1. 1 Connect system in star topology using NT-LTS kit.
2. Using L-SIM, setup and select Selective Repeat protocol on Star topology.
3. Select data file from one computer to transfer.
4. Select packet size.
5. Transfer file (Click on transfer button)
6. During transfer insert erroes into data packet.
7. Observe error for Bad packet from Error Generator
8. Observe error for Acknowledgement Lost from Error Generator.
EXPRIMENT 7
Implementation and study of CSMA-CD Protocol
NAME
study CSMA-CA protocol using Ethernet LAN
OBJECTIVE
Study CSMA-CA protocol using Ethernet LAN
EQUIPMENTS
NT-LTS trainer kit
3 or more Computers with win-2K / XP and Ethernet port available on them RJ-45 to RJ-45
LAN connecting cables
L-SIM LAN protocol analyzer and simulator software
PROCEDURE
1. Connect system in star topology using NT-LTS kit.
2. Using L-SIM, setup and CSMA -CA protocol on Star topology.
3. Select data file from one computer to transfer.
4. Select packet size.
5. Transfer file (Click on transfer button)
6. During transfer insert erroes into data packet.
7. Observe error for Bad packet from Error Generator
8. Observe error for Acknowledgement Lost from Error Generator.
.
9. Multiple file transfer between various server-client combinations should be performed to
observe throughput v/s packet size graph on transmitter computer.
10. Close file transfer window and click on protocol analyzer and Network analyzer buttons on
transmitter computer to view details of the log created.
EXPERIMENT 8
Implementation and Study of CSMA-CD Protocol
NAME
Study CSMA-CD Protocol
OBJECTIVE
To study CSMA-CD protocol
EQUIPMENTS
NT-LTS trainer kit
3 or more Computers with win-2K / XP and Ethernet port available on them RJ-45 to RJ-45
LAN connecting cables
L-SIM LAN protocol analyzer and simulator software
PROCEDURE
1. Connect system in star topology using NT-LTS kit.
2. Using L-SIM, setup and select CSMA-CD on Star topology.
3. Select data file from one computer to transfer.
4. Select packet size.
5. Transfer file (Click on transfer button)
6. During transfer insert erroes into data packet.
7. Observe error for Bad packet from Error Generator
8. Observe error for Acknowledgement Lost from Error Generator.
Experiment No. 9
Name
Study Pure Aloha Protocol
Objective
To Study Pure Aloha Protocol
Equipment
NT-LTS trainer kit 3 or more Computers with win-2K / XP and Ethernet port available on them
RJ-45 to RJ-45 LAN connecting cables L-S IM LAN protocol analyzer and simulator software.
Procedure
1. Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting cables
provided with the system to NT-LTS star topology ports.
2. Switch on the NT-LTS &Computers.
3. Run L-SIM software on all the computers, one should be server and others should be
clients.
4. On the server computer select type of network as LAN.
5. On the server computer select the topology as STAR, select protocol as Pure ALOHA
click on create network button.
6. Remote computer details will appear on the computers connected in network, server will
be able to see all clients and all clients will be able to see only server.
7. Select the computer to whom data file is to be transferred, from the load button,
previously stored/selected file information can be loaded or you can select any file, which
is to be transmitted.
8. File size will appear in the software window, select the packet size up to 8192 and click
OK.
9. One packet formed for that file will be indicated on computers, same details of file will
appear on remote computer to which file is to be transmitted.
10. Click on file transfer button to transfer file
11. During file transfer process try to send file to same receiver from another computer, file
transfer from second transmitter will also gets initiated.
12. When packet from second sender collides with first sender it will be indicated as collision
packet on server & Client-1and client-2.
13. Click on OK button to the server and client-1and retransmit the File from first sender to
the receiver. Receiver receive file successfully when no other Clients are transmitting
file.
14. Multiple file transfer between various server-client combinations should be performed to
observe throughput v/s packet size graph on transmitter computer.
15. Close file transfer window and click on protocol analyzer and Network analyzer buttons
on transmitter computer to view details of the log created.
16. Under Network analyzer window click on Graph analyzer button.
17. Calculate throughput and click on Plot graph button. Graph for SLOTED ALOHA
protocol
18. Detailed graph of throughput v/s packet size for the total file transfer activity will appear
on graph window.
19. This plot can be printed by clicking on print button.
20. Similarly, Comparison of two different protocols is performed in Network Analyzer.
Snapshots
Experiment No 10
NAME
OBJECTIVE
To study slotted ALOHA protocol EQUIPMENTS NT-LTS trainer kit 3 or more Computers
with win-2K / XP and Ethernet port available on them RJ-45 to RJ-45 LAN connecting cables L-
S IM LAN protocol analyzer and simulator software
PROCEDURE
1. Connect 3 or more computer LAN ports using RJ-45 to RJ-45 LAN connecting cables
provided with the system to NT-LTS star topology ports.
2. Switch on the NT-LTS &Computers.
3. Run L-SIM software on all the computers, one should be server and others should be
clients.
4. On the server computer select type of network as LAN.
5. On the server computer select the topology as STAR, select protocol as Slotted ALOHA
click on create network button.
6. Remote computer details will appear on the computers connected in network, server will
be able to see all clients and all clients will be able to see only server.
7. File transmit button will get activated for fixed slot duration and same will be indicated
by Green symbol on respective client window. NL-LTS : LAN / WLAN TRAINING
SYSTEM V-19.0 - 130 - NETWORKS
8. Select the computer to whom data file is to be transferred, from the load button,
previously stored/selected file information can be loaded or you can select any file, which
is to be transmitted.
9. File size will appear in the software window, select the packet size up to 8192 and click
OK. NL-LTS : LAN / WLAN TRAINING SYSTEM V-19.0 - 131 - NETWORKS
10. One packet formed for that file will be indicated on computers, same details of file will
appear on remote computer to which file is to be transmitted.
11. Click on file transfer button to transfer file.
12. During file transfer process try to send file to same receiver from another computer, file
transfer from second transmitter will also gets initiated.
13. When packet from second sender collides with first sender it will be indicated as collision
packet on server & Client-1and client-2. NL-LTS : LAN / WLAN TRAINING SYSTEM
V-19.0 - 132 - NETWORKS
14. Click on OK button to the server and first sender. First sender is auto ready to retransmit
the File from first sender to the receiver. Receiver receive file successfully when no other
Clients are transmitting file First sender ready to transmit NL-LTS : LAN / WLAN
TRAINING SYSTEM V-19.0 - 133 - NETWORKS
15. File transmission started from first sender to the receiver.
16. Receiver received file successfully
17. Click on OK to the second sender and second sender is auto ready to retransmit the same
file to the server. Receiver receive file successfully when no other Clients are
transmitting file
18. Multiple file transfer between various server-client combinations should be performed to
observe throughput v/s packet size graph on transmitter computer.
19. Close file transfer window and click on protocol analyzer and Network analyzer buttons
on transmitter computer to view details of the log created.
20. Under Network analyzer window click on Graph analyzer button.
21. Calculate throughput and click on Plot graph button.
22. Detailed graph of throughput v/s packet size for the total file transfer activity will appear
on graph window.
23. This plot can be printed by clicking on print button.
24. Similarly, Comparison of two different protocols is performed in Network Analyzer
window.
Snapshot
Experiment – 11
NAME
Study Token Bus Protocol
OBJECTIVE
To study token bus protocol
EQUIPMENTS
NT-LTS trainer kit
3 or more Computers with win-2K / XP and Ethernet port available on them RJ-45 to RJ-45
LAN connecting cables
L-S IM LAN protocol analyzer and simulator software
PROCEDURE
1. Connect four or more computer LAN ports using RJ-45 to RJ-45 LAN connecting cables
provided with the system to NT-LTS bus topology ports.
2. Switch on the NT-LTS & Computers.
3. Run L-SIM software on all the computers, one should be server and others should be client.
Run the software in the sequence of connection i.e. server first followed by first client to last
client.
4. On the server computer select type of network as LAN.
5. On the server computer select the topology as BUS, select protocol as Token Bus and select
token activation time as desired, click on create network button.
6. To just observe how token passes from one computer to another computer and effect of token
time keep token duration from 5 to 40 seconds and to do actual file transfer keep token duration
as 50 or 60 seconds.
7. Remote computer details will appear on the computers connected in network, server will be
able to see all clients and all clients will be able to see only server.
8. Select the computer to whom data file is to be transferred, from the load button, previously
stored/selected file information can be loaded or you can select any file, which is to be
transmitted.
9. File size will appear in the software window, select the packet size, inter packet delay and
click OK.
10. Total packets formed for that file will be indicated on computers, same details of file will
appear on remote computer to which file is to be transmitted.
11. Click on file transfer button to transfer file.
12. File transfer from one computer to another will take place.
13. Remove connection of last client and see the effect on file transfer or token transfer. You will
find that token will process till the client who is connected in network.
14. Remove connection of client which is in between the server and last client and see the effect
on file transfer or token transfer. You will find that token will process till the client who is
connected in network from client and will not process for the client get disconnected from
network.
Experiment – 12
NAME
Study Token Ring Protocol
OBJECTIVE
To study token ring protocol
EQUIPMENTS
PROCEDURE
1. Connect four computer LAN ports using RJ-45 to RJ-45 LAN connecting cables provided
with the system to NT-LTS ring topology ports.
2. Switch on the NT-LTS & Computers.
3. Run L-SIM software on all the computers, one should be server and other 3 should be client.
Run the software in the sequence of connection i.e. server first followed by first client to last
client.
4. On the server computer select type of network as LAN.
5. On the server computer select the topology as RING, select protocol as Token Ring and select
token activation time as desired, click on create network button.
6. To just observe how token passes from one computer to another computer and effect of token
time keep token duration from 5 to 40 seconds and to do actual file transfer keep token duration
as 50 or 60 seconds.
7. Remote computer details will appear on the computers connected in network, server will be
able to see all clients and all clients will be able to see only server.
8. Select the computer to whom data file is to be transferred, from the load button, previously
stored/selected file information can be loaded or you can select any file, which is to be
transmitted.
9. File size will appear in the software window, select the packet size, inter packet delay and
click OK.
10. Total packets formed for that file will be indicated on computers, same details of file will
appear on remote computer to which file is to be transmitted.
11. Click on file transfer button to transfer file.
12. File transfer from one computer to another will take place.
13. To see the effect of ring break state remove any of the client from the hardware and close L-
SIM window for that client. Ring broken message will be prompted on server computer and
network will get destroyed, you need to reconfigure the network. Since the network is created
with logical ring physical removal of computer from hardware will be detected when token
completes its cycle and reaches to the client whose connection is removed, hence it will take
some time to show disconnection of computer in case of unplugging of computer.