www.igatesolutions.com

ABOUT THE AUTHOR S.Baba Fakruddin is working as Lecture & Head department of Computer Science & Technology ,since May 2008.Under his guidance Several Hundreds of MAJOR and MINI project work for Msc Computer Science & MCA project traines weretrained for the S.K.University and J.N.T.University project traines under JAVA , JEE Technology.He is Elected as the VICE PRESIDENT for DEGREE COMPUTER LECTURE ASSOCIATION under S.K. University Anantapur.Worked as a Sr. Software Engineer in Hi-Tech City for the company FortunaPix Pvt Ltd. In programming his area of interest is on Object Oriented Programming. Enthusiastic to do new things. He is verve and energetic in every event.And also handling Logistics Business.

www.sbabamca.wordpress.com

1

www.igatesolutions.com COMPUTER NETWORKS PRACTICAL LAB PROGRAMS PROGRAM NO : 1

Exercise Number : 1 Title of the Exercise : ETHERNET Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT To create the scenario and study the performance of Ethernet LAN protocol through simulation and using trainer kit. FACILITIES REQUIRED AND PROCEDURE a) FACILITIES REQUIRED TO DO THE EXPERIMENT:

S.NO 1. 2. 3.

APPARATUS

SPECIFICATI ON -

QUANTITY

PC LAN Trainerkit 1 Network simulator INPUT PARAMETERS: No of nodes : 2 to 4 Frame interval : 250 ms to 1000ms Frame size : 64 bytes to 1500bytes Maximum back off time : 4 to 32 Error generation : 10-9 10-6 and 10-3 TRANSFERRING A DATA FROM ONE NODE TO ANOTHER: Each node is numbered as 1,2,3 and 4. Each node is identified with its own IP address. From any node file from the system can be opened for transmission. This file can be sent to any destination node. At the time of sending, sender window and receiver window are opened in the respective nodes and data transfer occurs. The progress bar in these windows shows the amount of data transferred and received. In each node, one trace window is available in which data transfer information with time stamp appears continuously. At the end the data transfer, result appears with appearance parameters. STORING OF TRANSFERRED FILES, RESULTS AND TRACES: For Ethernet operation, one directory namely Ethernet is created in the simulator directly in C drive. For 4 nodes node 1, node 2, node 3 and node 4 subdirectories are created. www.sbabamca.wordpress.com

2

www.igatesolutions.com

Now can be sender or receiver when one file transferred from one node to another node the data file is stored in destination node. Result is stored as file with the name. The result is stored in excel format which data can used for the graph. There is a provision in every mode to store the trace window information in respective node. The store in excel format. CONNECT AND DISCONNECT FACILITY: At any instant, one node can be disconnected from the shared medium and other later whenever it necessary, the node can be reconnected. PAUSE AND RESET FACILITY: At any time, the simulation can be stopped and can be continued. There is a reset option in which the process will stop. PROCEDURE: Select 2 nodes and carryout data transfer from one node to another node. Select 2 nodes and carryout data transfer between 2 nodes simultaneously and analyse.Repeat the experiment for different packet sizes, different maximum back off time and different error generation Select 3 nodes and carryout data transfer between the nodes simultaneously and analyse.Repeat the experiment changing the input parameter. Select 4 nodes and do the data transfer and analyse the result when the data transfer is going on. Disconnect one node and observe and record RESULT: Thus the performance of Ethernet LAN protocol through simulation and using trainer kit was verified successfully. Program no : 2.a Title of the Exercise : TOKEN RING Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT To create the scenario and study the performance of token ring LAN protocol through simulation and using trainer kit. FACILITIES REQUIRED AND PROCEDURE a) FACILITIES REQUIRED TO DO THE EXPERIMENT:

S.NO

APPARATUS

1. 2. 3.

PC LAN Trainerkit Network simulator

SPECIFICATI ON -

QUANTITY 1 -

www.sbabamca.wordpress.com

3

www.igatesolutions.com

INPUT PARAMETER: No of nodes – 2 to 4 Frame Interval – 250ms by defeat Frame size – 512bytes -2048bytes Error Generation – 10-9,10-6 and 10-3 TRANSFERING A DATA FILE ONE NODE TO ANOTHER: Each node is numbered as 1,2,3 and 4. Each node is identified with its own input address. In order to correct the node in the ring, connect switch is to be used. From any node file from the system can be opened for transmission. This file can be sent to any destination nodes. At this time of sending, the progress bar in these windows the amount of data transferred and received. In each node one trace window is available in which the data transfer information with time stamp appears continuously. At end of the data transfer result appears with performance parameter. TOKEN HOLD ON TIME AND TOKEN PRIORITY: The default frame interval is 250ms in order to send many data packets sequentially the token hold on time can be changed to higher value using this facility, the token can be retained node for long time. The priority of the node also can be stated. CONNECT AND DISCONNECT FACILITY: At any instant one node can be disconnected from the shared medium. And later whenever it is necessary the node can be reconnected. PAUSE AND RESET FACILITY: At any time the simulator and can be continued. There is reset option in which the process will stop. TOKEN RING OPERATION: Initially the input address of the node are given and nodes are connected to the ring network. Now, token is placed between the nodes connected. 2 to 4 nodes can be connected in the ring. As per the priority of the nodes, the token will pass. The priority of the node can be changed and then the token passing will take route as per the priority allotment. The token hold on time can also be changed when the data is transferred the number of frames that all transferred form the mode depends upon the token hold on time on time of node after the token hold on time the token is passed on to the next priority node.

www.sbabamca.wordpress.com

4

www.igatesolutions.com

Duration the file transfer suppose one node in the ring is disconnected then one messages window appears and ask for triggering the ring leaving the disconnected node if the answer is yes .the particular node is disconnected and other nodes from a ring and activities continue. If the answer is no then all the nodes are disconnected. In this cases all the nodes all to be reconnected using connect switch STORING OF TRANSFERRED RULES, FILES RESULT AND TRACES : For token ring operation, one directory namely token ring is created in the simulator directory in c drive for 4 node, node2, node3 and node4 slur directories all created. Node can be a sender or receiver when one file is transferred from one node to another the data file is stored in destination mode. Result is stored as a file with the name part is stored in sender node. The result file is stored in excels format form which data can be used for graph. There is a provision in every need to store the trace window Information in the respective mode they are also called in excel format. PROCEDURE: Select 2 nodes and carryout data transfer form node to another node select 2 nodes and carryout data transfer between 2 nodes simultaneously and analyse. Repeat the experiment changing the parameters disconnect one redoes and answer to the question yes and observe the operation and record it disconnect the node and answer to the question no and observe the generation and record it. Select 4 nodes and do the data transfer when the data transfer is going on disconnect one node and observe and record the effect. RESULT: Thus the performance of token ring LAN protocol through simulation and using trainer kit was verified successfully Program Number : 2.b Title of the Exercise : TOKEN BUS Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT To create and scenario and study the performance of token bus through simulation and verify LAN trainees kit. FACILITIES REQUIRED AND PROCEDURE a) FACILITIES REQUIRED TO DO THE EXPERIMENT:

S.NO

APPARATUS

1. 2. 3.

PC LAN Trainerkit Network simulator

SPECIFICATI ON -

QUANTITY 1 -

www.sbabamca.wordpress.com

5

www.igatesolutions.com

INPUT PARAMETERS: No of nodes -2 to 4 Frame interval -250 ms to 1000 ms Frame size -512 bytes to 2,4,8 bytes Error generation -10-9,10-6 and 10-3 TRANSFERRING A DATA FILE ONE NODE TO ANOTHER: Each node is identified with its own input address Each node is numbered with the priority no of that given to the node In order to connect the node in the token bus connect switch to be used Form any node. File form the system can be opened for transmission This file can be sent to any destination node. At the any time of sending. Sender window and receiver window are opened in the respective nodes and the data transfer occurs the progress bar in there windows shows the amount of data transferred and received. In each node one trace window is .available in which data transfer information with time stamp appears continuously. At the end of data transfer result appears with performance parameters. TOKEN PRIORITY: The priority of the node also can be changed by using this option. CONNECT AND DISCONNECT FACILITY: At any instant, one node can be disconnected from the shared medium. And later whenever it is necessary, the node can be reconnected. PAUSE AND RESET FACILITY: At any time, the simulation can be stopped and can be stopped and can be continued. There is reset option in switch. The process will stop. TOKEN BUS OPERATION Initially the IP address of the nodes and priority are given and nodes are connected to the token bus network. Now token is passed between the nodes connected 2 to 4 nodes can be connected in the bus. As per the priority can be changed and then the token passing will be take route as per the priority allotment. During the file transfer suppose one node is the ring is connected then that node is automatically disconnected and the token bus is refrontigned leaving that node automatically no question is asked. The node can be reconnected using connect switch. PAUSE AND RESET FACILITY: During the file transfer one node in the ring is disconnected, then that node is and process will stop. STORING OF TRANSFERRED FILES, RESULT AND TRACES:

www.sbabamca.wordpress.com

6

www.igatesolutions.com

For token operation, one directory namely token bus is created in the simulator directory in C drive. For node 4, node 1, node 2, node3 and 4 subdirectories are created. Node can be sender or receiver when one file is transferred from one to another node. The data file is stored in the destination node. Result is stored as file with the name part is stored in excel format in which data can be used for graph. There is a provision is every node store the trace window information in the respective window. They are also stored in excel format. PROCEDURE: Select 2 nodes and carryout data transfer from one node to another node. Select 2 nodes and carryout data transfer between two nodes simultaneously and analyses. Repeat the experiment of different packet sizes and error. Select 3 nodes and carryout data transfer between the nodes simultaneously and analyses. Repeat the experiment changing the input parameter. RESULT: Thus the performance of token bus LAN protocol through simulation and using trainer kit was verified successfully. ProgramNumber : 3 Title of the Exercise :WIRELESS LAN PROTOCOL Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT To create scenario and study the performance of wireless LAN protocol through simulation and verify using LAN trainer kit. FACILITIES REQUIRED AND PROCEDURE a) FACILITIES REQUIRED TO DO THE EXPERIMENT:

S.NO 1. 2. 3.

APPARATUS

SPECIFICATI ON -

QUANTITY

PC LAN Trainerkit 1 Network simulator INPUT PARAMETERS: No of Nodes - 2 to 4 Frame Interval - 250ms to 1000ms Frame size - 128bytes to 1500bytes Max. back off time - 4 to 32 Error generation - 0.01,0.1 and 1.5 TRANSFERRING A DATA FILE FROM ONE NODE TO ANOTHER:

www.sbabamca.wordpress.com

7

www.igatesolutions.com

Each node is numbered as 1, 2, 3 and 4. Each node is identified with its own input address. From any node mode file from the system can be opened for transmission. The file can be sent to any destination mode At the time of sending , sender window and receiver window are opened in the respective modes and data transfer occur The progress bar in these windows shows the amount of data transferred and received. In each node, one trace window is available in which data transfer information with stamp appears continuously. At the end of data transfer, result appears with performance parameters. STORING OF TRANSFERRED FILES, RESULTS AND TRACES: For the wireless LAN operation, one directory namely wireless is created in the simulator directory in C drive. For node 4, node 1, node 2 and node 3 node 4 sub directories are created. Node can be sender or receiver when one file is transferred from one node to another node. The data file is stored in destination node. Result is stored as file with the name part is stored in sender mode. The result file is stored in excel format from which data can be for graph. There is a provision in every node to store the trace window information is the respective node. They are also stored in excel format. CONNECT AND DISCONNECT FACILITY: At any instant one node can be disconnected from the shared medium. And later whenever it necessary the node can be reconnected. PAUSE AND RESET FACILITY: At any time, the simulation can be stopped and can be continued there is reset option in which the process will stop. PROCEDURE: Select 2 nodes and carryout data transfer from one node to another node. Select 2 nodes and carryout data transfer between two nodes simultaneously and analyze. Repeat the experiment for packet sizes. Different maximum back off time and different error generation. Select 3 nodes and carryout data transfer between the nodes simultaneously and analyze. Repeat the experiment and changing the input parameter.

www.sbabamca.wordpress.com

8

www.igatesolutions.com

Select 4 nodes and do the data transfer when the transfer is going on. Disconnect one node and observe and record the effect. RESULT: Thus the performance of wireless LAN protocol through simulation and using trainer kit was verified successfully Program Number : 4 Title of the Exercise : STOP AND WAIT ARQ PROTOCOL Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT To implement and study the performance of stop and wait protocol through simulation and LAN trainer kit. FACILITIES REQUIRED AND PROCEDURE a) FACILITIES REQUIRED TO DO THE EXPERIMENT:

S.NO APPARATUS 1. PC 2. LAN Trainerkit 3. Network simulator INPUT PARAMETERS

SPECIFICATION -

QUANTITY 1 -

Packet size : 512B to 2048B Round trip time:50ms to 150ms Less Rate : 0% to 50% Retransmit time out : 100ms to 1000ms. NOTE At the time of giving input parameters it is to be noted that output value given for retransmit time out parameter should be more than RIT. TRANSFERING DATA FILE FROM ONE SYSTEM TO ANOTHER SYSTEM MAINLY inWAN In this experiement, there is one sender and one receiver.From the sender file the system can be opened for transmission. This can be send to the receiver by using start button .In between there is a networks.There are trace windows in sender network and receiver and data through information with the time stamp appears continuously.In networks the error information is displayed. At the end of the data transfer result appears with the performance parameters in the bottom of the page namely payload, transform time throughput and losses. STORING OF TRANSFERRED FILES AND TRACES. At any time, the simulation can be stopped and can be continued, reset can be used to start from the beginning. EXPERIEMNT TO BE CARRIED OUT: www.sbabamca.wordpress.com

9

www.igatesolutions.com

Select a file from the system and transfer the file from sender or receiver .Assign the following input parameters the data flow follows stop and wait algorithm in sending the packets (frames) in the network. Packet size 1024B RTT 100ms Loss rate 10% Retransmission time out 200ms Choose a file and send note down the results.Note down the trace,when packet error has occurred and when the time out has triggered and what was the next action.Check whether stop and wait algorithm is followed. Change the packet size of 2048 bytes Send the same file Note down the results. Compare the results. Similarly change the loss rate and compare the result. QUEING THE GRAPH AND PRINTING THE GRAPH In order to view the frame sent time graph.First we have to loss the simulator software.In C: drive inside the simulator directory in stop and wait directory .The graph is stored as excel file.In the computer system excel software should be available to view the graph by opening the file “ Time frame” .The graph can be seen and data instead, derived from the trace can be seen.The graph can be printed in excel software .During the time out the packet is resent. It can be clearly viewed in the graph. PERFORMANCE Payload delivered 124.416 Kbytes Simulation time 207.53ms Throughput 4.8723kbps Good Put 4.7961 kbps Data frame 122 RESULT: Thus the performance of stop and wait protocol through simulation and LAN trainer kit was verified successfully

www.sbabamca.wordpress.com

10

www.igatesolutions.com

Program Number : 5.a Title of the Exercise : SELECTIVE REJECT ARQ PROTOCOL Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT To implement and study the performance of selective ARQ protocol using simulation and LAN trainer Kit. FACILITIES REQUIRED AND PROCEDURE a) FACILITIES REQUIRED TO DO THE EXPERIMENT:

S.NO APPARATUS 1. PC 2. LAN Trainerkit 3. Network simulator INPUT PARAMETERS

SPECIFICATION -

QUANTITY 1 -

Window size :1 to 10 packets Bandwidth : 5000 kbs to 5000kbps Frame size : 512B to 2048B Round trip time :50ms to 500ms Less Rate : 0% to 50% Retransmit time out : 100ms to 1000ms. TRANSFERING A FILE (DATA) FROM ONE NODE TO ANOTHER NODE In this experiment, there is one sender and one receiver from the sender file the system can be opened for transmission. This file can be send to the receiver by using start button .In between there is a networks.There are trace windows in sender network and receiver and data through information with the time stamp appears continuously. In networks the error information is displayed. At the end of the data transfer result appears with the performance parameters STORING OF TRANSFERRED FILES AND TRACES. The selective repeat simulator creates a directory named “selective repeat” in the simulator directory in C: drive. The transmit file is stored in the directory. PAUSE AND RESET FACILITY At any time the simulation can be stopped and can be continued .Reset can be used to start from the beginning. PROCEDURE Select a file the system and transfer the file from sender to receiver.Assign the following input parameters.As the data flow follows selective repeat algorithm in sending the packet (frames) in the network. Packet size 1024B www.sbabamca.wordpress.com

11

www.igatesolutions.com

RTT 100ms Less rate 10% Retransmission time out 200ms Window size :2000kbps Bandwidth : 5 Packets Choose a file and send data down the results.Note down from the trace, when packet error has occurred and when the time out has stopped happened and what was the next action.Check whether it follows the selective repeat algorithm Change the packet size of 2048 bytes Send the frame file Note down the results. Compare the results. Similarly change the loss rate and compare the result.Give the reason for congestion packet drop. VIEWING THE GRAPH AND PRINTING THE GRAPH In order to view the frame sent Vs time graph.First we have to close the simulator software.In C: drive inside the simulator directory in the selective repeat directory .The graph is stored as excel file.In the computer system excel software should be available to view the graph by opening the file “ Time frame xls” .The graph can be seen and data derived from the trace can be seen.The graph can be printed in excel software .During the time out, the packet is resent according to the Go-back –n algorithm in the graph. By reducing the BW and by increasing the window size we will be able to see congestion packet drop also in the network. PERFORMANCE Payload delivered 132.546 Kbytes Simulation time 51.67ms Throughput 20.5981kbps Good Put 20.5214kbps Data frame 130 RESULT: Thus the performance of selective ARQ protocol using simulation and LAN trainer Kit was verified successfully. Program Number : 5.b Title of the Exercise : GO BACK N ARQ PROTOCOL Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT To implement and study the performance of Go Back N ARQ protocol using simulation and LAN trainer Kit. www.sbabamca.wordpress.com

12

www.igatesolutions.com

FACILITIES REQUIRED AND PROCEDURE a) FACILITIES REQUIRED TO DO THE EXPERIMENT:

S.NO APPARATUS 1. PC 2. LAN Trainerkit 3. Network simulator INPUT PARAMETERS

SPECIFICATION -

QUANTITY 1 -

Window size :1 to 10 packets Bandwidth : 500 kbs to 5ms Packet size : 512B to 2048B Round trip time :50ms to 500ms Loss Rate : 0% to 50% Retransmit time out : 100ms to 1000ms. TRANSFERING DATA FILE FROM ONE SYSTEM TO ANOTHER SYSTEM MAINLY inWAN In this experiment, there is one sender and one receiver from the sender file from the system can be opened for transmission. This file can be send to the receiver by using start button .In between there is a network of networks. If the time of sending sender window and receiver window are opened. The progresses are in these windows shows amount of data transferred and received. There are trace windows in sender network and receiver network and the data transform information with the time stamp progress continuously At the end of the data transfer result appears with the performance parameters. STORING OF TRANSFERRED FILES AND TRACES. The Go Back ON simulator creates a directory named “GO-BACK-N ” in the simulator directory in C: drive. The transmit file is stored in this directory. PAUSE AND RESET FACILITY At any time the simulation can be stopped and can be continued .Reset can be used to start from the beginning. PROCEDURE Select a file from the system and transfer the file from sender to receiver. Assign the following input parameters. As the data flow follows Go-Back-N wait algorithm in sending the packet (frames) in the network. Packet size 1024B RTT 100ms

www.sbabamca.wordpress.com

13

www.igatesolutions.com

Retransmission time out 200ms Window size :2000kbytes Bandwidth : 5 Packets Choose a file and send data down the results. Note down from the trace, when packet error has occurred and when the time out has stopped happened and what was the next action. Check whether it follows the Go-Back –N algorithm Change the packet size of 2048 bytes Send the same file Note down the result. Compare the result. Similarly change the loss rate Vs and compare the result.. VIEWING THE GRAPH AND PRINTING THE GRAPH In order to view the frame sent Vs time graph. First we have to close the simulator software. In C: drive inside the simulator directory in the Go-Back-N directory .The graph is stored as excel file. In the computer system excel software should be available to view the graph by opening the file “ Time frame xsl” .The graph can be seen and data derived from the trace can be seen. The graph can be printed in excel software .During the time out, the packet are used according to the Go-back –n algorithm. It can be clearly viewed in the graph. By reducing the BW and by increasing the window size we will be able to see congestion packet drop also in the network. PERFORMANCE Packet size 1024 bytes Retransmit time 200ms Window size 5 packets Payload delivered 132.546 Kbytes Simulation time 56.78ms Throughput 18.7512kbps Good Put 18.675kbps Data frame 130 RESULT: www.sbabamca.wordpress.com

14

www.igatesolutions.com

Thus the performance of Go Back N ARQ protocol using simulation and LAN trainer Kit was verified successfully Program Number : 6 Title of the Exercise : ROUTING ALGORITHM’S / DISTANCE VECTOR ALGORITHM Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT To Implement and study the distance algorithm FACILITIES REQUIRED AND PROCEDURE a) FACILITIES REQUIRED TO DO THE EXPERIMENT:

S.NO APPARATUS 1. PC 2. LAN Trainerkit 3. Network simulator INPUT PARAMETERS:

SPECIFICATION -

QUANTITY 1 -

Router : 3 to 7 Connectivity between the routers to be given Weight uncost Some router to be selected PROCESS: The distance vector algorithm is executed initially in Iteration-1, the source router creates the router table with the distance information of the other router connected to the neighboring routers. By using next switch second iteration is done. In the second iteration ,it calculates the shortest distance to the unconnected notes then the information gathered in the first iteration and defines the routing table. If there are ‘n’ routers the n-1 iteration are required to get shortest distance for all the routers. The routing table gives us shortest distance for all the routers from the some rout ion and also information to which router the packet should go next. PROCEDURE: Select say 5 routers and draw the connectivity .Input the distance between the routers. Select source router study the iteration and routing table for each iteration check finally whether the short distance is calculated and correct next. Keep the layout as is change for distance between the routers, the creation and for each operation study and check and verify the result at the end. Keep the layout as it is change the source router and do the experiments verify the result at the end. Do the different configuration and do iteration and verify the results. STORING OF TRANSFERRED FILES AND TRACES: The distance vector simulator executes a directory named “Distance Vectors” in the simulator directory in ‘E’ drive. www.sbabamca.wordpress.com

15

www.igatesolutions.com

RESULT: Thus the implementation and performance of distance vector algorithm was verified successfully. Program Number : 7 Title of the Exercise : LINK STATE ALGORITHM Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT To implement and study the link state algorithm. FACILITIES REQUIRED AND PROCEDURE a) FACILITIES REQUIRED TO DO THE EXPERIMENT:

S.NO

APPARATUS

1. 2.

PC LAN Trainerkit 3. Network simulator INPUT PARAMETERSS:

SPECIFICATI ON -

QUANTITY

-

-

1

Router : 3 to 7 Connectivity between the routers to be given Weight uncost or distance between routers number 1 to 10 Source router to be selected. PROCESS: The link state algorithm is executed .There are parent group and transitive group. Initially in iteration the source router is an parent group and all the directly connected routers are in the transitive group and router table is created. By using next switch 2nd Iteration is done .In what iteration the short distance neighboring router is taken into parent group and the routers associated with the particular router are placed in the transitive group and routing table is connected. In this way of there n routers available. The n number of iteration is required to find the shortest distance in this method. Finally the routing table sizes the shortest distance for all routers from the source routers and also information to which router the packet should go next. PROCEDURE: Select say to routers and draw the connectivity Input the distance between the routers select some router study the iteration and routing table every time created. Check finally whether the short distance is calculated and correct next best loop. Keep the layout as it is change the distance vector between the routers.

www.sbabamca.wordpress.com

16

www.igatesolutions.com

Do the iteration and for each iteration study and check verify the result at the end Do the different configuration and do iteration and verify the results. STORING OF TRANSFERRED FILES AND TRACES. The link state simulator creates a directory named “Link state” in the simulator directory in ‘E’ drive. RESULT: Thus the implementation and performance of link state vector algorithm was verified successfully. Program Number : 8.a Title of the Exercise : DATA ENCRYPTION AND DECRYPTION SHIFTING ALGORITHM Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT To implement the data encryption and decryption. FACILITIES REQUIRED AND PROCEDURE a) FACILITIES REQUIRED TO DO THE EXPERIMENT:

S.NO

APPARATUS

1. 2.

PC LAN Trainerkit 3. Network simulator INPUT PARAMETERS:

SPECIFICATI ON -

QUANTITY

-

-

1

Input font to be given. Shift –no. of bits to be given. PROCESS: The shifting algorithm is executed at the time of encryption. At the time of decryption, again shifting algorithm is executed. PROCEDURE: Enter the font is the text box available. Give the Shifting index and use shift key. Encryption message appears in the window. When re-shift key is used re-shift algorithm is used with encrypted message and re-shifted message is displayed. RESULT: www.sbabamca.wordpress.com

17

www.igatesolutions.com

Thus the performance of data encryption and decryption was verified successfully. Program Number : 8.b Title of the Exercise : RSA ALGORITHM Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT To implement the data encryption and decryption process during RSA algorithm using simulation. FACILITIES REQUIRED AND PROCEDURE a) FACILITIES REQUIRED TO DO THE EXPERIMENT:

S.NO

APPARATUS

1. 2.

SPECIFICATI ON -

QUANTITY

PC LAN 1 Trainerkit 3. Network simulator INPUT PARAMETERS: Initially a plain font of max to characters is given. PROCESS: Here the RSA algorithm is used for encryption and decryption. PROCEDURE: Encryption: Encryption in key is used in the menu box. Then again encryption key below the font window is used to encrypting the message. RSA algorithm procedure is stage by stage executed and the steps are shown in the output window. Secret key and public key are generated and displayed. Decryption: Decryption key is used in the menu box. then again decryption key below the font window is used to decrypting the message Decryption stage is executed and steps are shown in the output window The decrypted font is displayed. RESULT: Thus the performance of data encryption and decryption using RSA algorithm was verified successfully. Program Number : 9.a www.sbabamca.wordpress.com

18

www.igatesolutions.com

Title of the Exercise :PC TO PC FILE TRANSFER PROTOCOL HTTP WEB BROWSING Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT The function part IP is so for web browsing in this experiment the user can access one control file the web server. FACILITIES REQUIRED AND PROCEDURE a) FACILITIES REQUIRED TO DO THE EXPERIMENT:

S.NO

APPARATUS

1. 2.

PC Network simulator INPUT PARAMETERS:

SPECIFICATI ON -

QUANTITY 2 -

Client ID –IP address Server ID- IP address PROCESS: In the experiment at the time of connecting the client to the server communication pipe namely socket is created. The socket is characterized by 4 parameters. 1. Server IP 2. Client IP 3. Local port number 80 4. Remote port number. When the client sends the connect request to the server, it generates a 16 bit random and send it as port no. As for as the server is connected this port no. is remote port no. Once the socket is created , the client can send the request to the server and set the file log is created in the server. PROCEDURE: The client IP address is entered. Then the server address is entered and activated. Then in the client side , to connect to the server address is entered and the connect switch is used to connect the client to the server. Now the socket is created and the connection is made and log is given in the server.

www.sbabamca.wordpress.com

19

www.igatesolutions.com

Then the user can send the request to the server by typing #netline.com / index.html and press go button. How the request gives to server responds .It access the file namely index.html file and transfer it to the client .Then the client hypertext made up language ,file and units. There is an interaction between the server and the client the server sends the file to the client and in the client window, the context of the file is displayed. There is an interaction between the server and the client the server sends the file to the client and in the client window, the context of the file is displayed. The user can disconnect the client and server also. In the server side log is generated to every activity. The simulation is reused. In the simulation directory in C: drive the html file is opened. In notepad and the content is altered and saved. Again the same application is run. It is to be verified that the modified context is appearing in the client window RESULT: Thus the function of PC to PC file transfer protocol HTTP web browsing was verified successfully. Program Number : 9.b Title of the Exercise : FTP –FILE TRANSFER PROTOCOL. Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT The function port ID is 21 for file transfer in this experiment, the user can do still transfer from a FTP server. FACILITIES REQUIRED AND PROCEDURE a) FACILITIES REQUIRED TO DO THE EXPERIMENT:

S.NO

APPARATUS

1. 2.

PC Network simulator INPUT PARAMETERS:

SPECIFICATI ON -

QUANTITY -

Client ID–IP address Server ID- IP address PROCESS: In the experiment at the time of connecting the client to the server (It generally) communication pipe namely socket is created. The socket is characterized by 4 parameters. www.sbabamca.wordpress.com

20

www.igatesolutions.com

1. Server IP 2. Client IP 3. Local port number 80 4. Remote port number. When the client sends the connect request to the server, it generates a 16 bit random which lies between 1024 and 65.536 and send it as port no. As for as the server is connected this port no. is remote port no. In the FTP operation ,2 sockets are generated .They are control socket and data sockets. Once the socket is created , the client can send the request to the server and set the file log is created in the server. RESULT: Thus the performance of File transfer protocol was verified successfully. Program Number : 9.c Title of the Exercise : STOP E-MAIL Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT The function port Id is 25 for the file transfer .In this experiment, the user can send e-mail to another FACILITIES REQUIRED AND PROCEDURE FACILITIES REQUIRED TO DO THE EXPERIMENT: S.NO APPARATUS SPECIFICATI QUANTITY ON 1. PC 2. Network simulator INPUT PARAMETERS: Client ID–IP address Server ID- IP address PROCESS: In the experiment at the time of connecting the client to the server (It generally) communication pipe namely socket is created. The socket is characterized by 4 parameters. 1. Server IP 2. Client IP 3. Local port number 80 4. Remote port number.

www.sbabamca.wordpress.com

21

www.igatesolutions.com

When the client sends the connect request to the server, it generates a 16 bit random which lies between 1024 and 65.536 and send it as port no. As for as the server is connected this port no. is remote port no. In the e-mail operation 2 socket are generated. They are control socket and data socket. Once the socket is created, the client can send the request to the server and set the file log is created in the server and get the file. PROCEDURE: user is supposed to given client IP address and server address in server. Then in the client configuration window. The server address is address to be given and connect button is to be used. Now the control socket and data socket are created. Then the user can send the request to the server by typing [email protected] and progress go button. The content in the client window is taken as the message for the mail. The mail reaches the mail box of the user. The user IP address 132.168.11 can check email by using check mail key. Then the user systems interact with the server and of there any mail it gives as message that user has got a mail. The content of the mail is also displayed in the user window. RESULT: Thus the performance of stop E-mail was verified successfully. Program Number : 10.a Title of the Exercise :PC-PC COMMUNICATAION (PARALLEL) Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT The main aim of the experiement is to enough transfer a file from PC to another PC using parallel port. FACILITIES REQUIRED AND PROCEDURE a) FACILITIES REQUIRED TO DO THE EXPERIMENT:

S.NO

APPARATUS

1. 2.

PC Network simulator Parallel trainer kit

3.

SPECIFICATI ON -

QUANTITY

-

2

2 -

DESCRIPTION

www.sbabamca.wordpress.com

22

www.igatesolutions.com

The main aim of the experiement is to transfer a file from PC to another PC using parallel port.The interface between the PC’s is done through the parallel port(Lpt) in the PC, a male to male a 25 pin D-type connection is used to connect together.The parallel port is configure to run in bi-directional mode.The data links D0-D8 are used to readline a type of data.The connect line STROBE and status link.ACK make the handshaking signal.The Digital data pin are connected directly to the 74LS244 bidirectional buffer..The output of the buffer is connected to the datalines of the parallel port. OPERATION The data bytes to the transmitted is placed on the data register(0*378) The control PIN STORE is made low to indicate a valid data on the data bus. The receiver PC wait for the status pin FCK to go high. Once the ACK pin goes high the data in the data register is read. The receiver PC then acknowledges by giving a pulse can be set by user. This Handshaking sequence is repeated for every byte until the end of the life. PROCEDURE Connect one end of the 25Pin n-type male and male connector to the parallel port of your PC (LPT) signal. Connect end to be 25 pin n-type female connector of the PC to PC communication. Repeat the step1 and step2 with order. Connect the STROBE pin of system 1 to the ACK pin of System 2 in the trainer kit. Connect datapins D0-D7 of System1 to pins D0-D7 System2. Common the ground terminals Run Parallel 1 in both the PCs. PC TRANSMITTING SYSTEM: Select the file to be sent in the PC from which you want to transfer file. FOR RECEIVING SYSTEM Set the transmission rate.The user can choose the present rate it “Choose Delay” option is selected or can assign only rate from 1 to 100ns it “ user Delay “ option is selected. Select the path for the file to be stored. NOTE: The “reactive file “ or “receive files” button is disable control the file path for the receiving file is selected. Click “ Send file” button is the transmitting PC. www.sbabamca.wordpress.com

23

www.igatesolutions.com

Clock “ Receive file” Button in the receiver PC. “File through transfer Completer” message appears both in the transmitter and receiver PC once the transfer is complete. The file is complete will be displayed on the textbook in the receiver PC. Clock “ Clear “ button to clear the contents in the text Box. Repeat all the above steps to send a new file. RESULT: Thus the performance of transfer a file from PC to another PC using parallel port was verified successfully. Exercise Number : 10.b Title of the Exercise : PC-PC COMMUNICATAION (SERIAL) Date of the Exercise : OBJECTIVE (AIM) OF THE EXPERIMENT The main aim of the experiment is to enough transfer a file from PC to another PC using Serial port. FACILITIES REQUIRED AND PROCEDURE a) FACILITIES REQUIRED TO DO THE EXPERIMENT:

S.NO

APPARATUS

1. 2.

PC Network simulator Parallel trainer kit

3.

SPECIFICATI ON -

QUANTITY

-

2

2 -

PROCEDURE Connect one end of the Pin n-type female to female connector to the serial port of your PC signal. Connect other end to the 9 pin n-type for female connector of the PC to PC communication trainer. Repeat the step1 and step2 with other PC system2. Connect RXD pin of System1 to find pin of System 2 Connect RXD pin of System2 to TXD pin of System 1 Connect MXR pin of System2 to NSR pin of System 2

www.sbabamca.wordpress.com

24

www.igatesolutions.com

Connect RTS pin of System1 to MS pin of System 2 Connect RTS pin of System2 to MS pin of System 1 Common the ground terminals Run Serial 1 in both the PCs. Select the common terminal and Band rate. NOTE: Band rate selected should be same for both the PCs Click set “ Serial-port” button successively change message appears. The status of the CTS pin will read ‘nodal ‘ in both receiver and transmitter. Clock RTS button in the transmitting Pc and receiver Pc. The status of the CTS pin will read ‘ok’ in both receiver an transmitter. The status of the ASR pin will read ‘ok’ in both receiver an transmitter. Type the message to be transmitted in the text box. Click “ Transmit” button to transmit in the typed context. Click “ CLR SCREEN” button to clear the text box. TO TRANSMIT A FILE Type the message in the text box. Type the file Port with name to which context to be written. Click the “ WRITE-SCREEN-TO – FILE” button to the write context. Click the “ READ-FILE-TO-SCREEN” button to read context of the file. Clock “ Transmit – file “ button to transmit in the context. NOTE The tranmitted file content will be stored in the path given in the receiving PC. Click “ CLR –SCREEN “to repeat the process. www.sbabamca.wordpress.com

25

www.igatesolutions.com

Click “ STOP “ button to exit. RESULT: Thus the performance of transfer a file from PC to another PC using serial port was verified successfully.

www.sbabamca.wordpress.com

26

COMPUTER NETWORKS PRACTICAL LAB PROGRAMS.pdf

There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. COMPUTER ...

1MB Sizes 2 Downloads 146 Views

Recommend Documents

Computer Networks Lab Manual -
break; printf("Enter the Message.\n"); //get message from keybrd. len = read(1, msg, 100) - 1; .... What is the use of adding header and trailer to frames? 71.

Introduction-To-Networks-Lab-Manual-V5-1-Lab-Companion.pdf ...
3. Page 3 of 3. Introduction-To-Networks-Lab-Manual-V5-1-Lab-Companion.pdf. Introduction-To-Networks-Lab-Manual-V5-1-Lab-Companion.pdf. Open. Extract.

Computer Lab Technician.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Computer Lab ...

Computer Networks
Abstract—The purpose of this paper is to show how computer networking is .... a variety of network hardware devices: switches, hubs, and routers; and they all.

Computer Networks
Bluetooth) or thousands of kilometers (e.g. via the Internet). Over the past two decades ... Address or a Data-Link Control Address. When someone examines a ...

Computer Networks
Computer Networks. Dr. Miguel Sánchez. Department of Computer Engineering [email protected]. Page 2. 2. Outline. Subject Presentation. Subject Assessment. Today's lecture ... 4. Computer Networks. ○ Yearly subject. ○ Textbook. ○ Topdown appro

pdf-1466\communication-networks-computer-science-computer ...
... of the apps below to open or edit this item. pdf-1466\communication-networks-computer-science-computer-networking-by-cram101-textbook-reviews.pdf.

PDF Computer Networks
places the student at the center of the learning experience. Forouzan's Computer ... fun as well. The appealing visual layout combines with numerous figures and examples to provide multiple routes to ... Data Communications and Networking.

Computer Networks -II.pdf
Computer Networks -II.pdf. Computer Networks -II.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Computer Networks -II.pdf.

COMPUTER NETWORKS -II.pdf
Page 1 of 2. MS – 641. VI Semester B.C.A. Degree Examination, May/June 2014. (Old Scheme). Computer Science. 6BCA – 1 : COMPUTER NETWORKS – II.

GE6161-COMPUTER-PRACTICES-LAB- By EasyEngineering.net.pdf ...
Page 1 of 63. **Note: Other Websites/Blogs Owners Please do not Copy (or) Republish. this Materials, Students & Graduates if You Find the Same Materials with.

Hemispheric Attention Networks: Automatic vs. Controlled ... - Zaidel Lab
Spatial Orienting can occur with non-predictive (i.e., 50% valid) peripheral cues ... Methods. LANT: • Targets presented tachistoscopically to the left visual field ...

NETWORKS LAB MANUAL CBCS SCHEME 5 sem.pdf
Page 2 of 3. Computer Network Laboratory 15CSL57. Dept of CSE, MITE, Moodabidri Page 1. COMPUTER NETWORK LABORATORY. [As per Choice Based Credit System (CBCS) scheme]. (Effective from the academic year 2017 -2018). SEMESTER – V. Subject Code 15CSL5

MIT TYBSC Computer Science Computer Networks II.pdf ...
الزاوية BÔAتسمى الزاوية المركزية. حدد زوايا مركزية أخرى في هذا الشكل . o. C. A. D. B. O. التي تحصر القوس AB. #. Whoops! There was a problem loading this page. Retrying... Whoops! The

mastering networks an internet lab manual pdf
Whoops! There was a problem loading more pages. Retrying... mastering networks an internet lab manual pdf. mastering networks an internet lab manual pdf.