Anda di halaman 1dari 61

TABLE OF CONTENTS

Ex.No

TITLE

PAGE NO.

Study Of Networking Devices

Study Of Networking Commands

Cable Construction

11

PC To PC Communication Using Serial Parallel Adapter

14

PC To PC Communication Using Switch

18

Secured Data Transfer Using Serial/Parallel Adapter

23

Simulation Of Token Ring Protocol

29

Simulation Of Token Bus Protocol

33

Simulation Of CSMA/CD

37

10

Simulation Of CSMA/CA

41

11

Simulation Of Ring Topology Using LAN Trainer Kit

45

12

Simulation Of Bus Topology Using LAN Trainer Kit

47

13

Simulation Of Star Topology Using LAN Trainer Kit

49

14

Implementation Of Stop And Wait Protocol

51

15

Implementation Of Go Back N Protocol

53

16

Implementation Of Distance Vector Routing

55

17

Implementation Of Link State Routing

57

18

Client-Server Communication Using Switch

59

Powered By www.technoscriptz.com

Ex No: 1
STUDY OF NETWORKING DEVICES
Aim:
To study the functions of various networking devices used in local area networks.
Theory:
LAYER1_DEVICE:
(i)

Repeater:
A repeater receives a signal, regenerates it, and passes it on. It can regenerate and retime
network signals at the bit level to allow them to travel a longer distance on the media.

(ii)

Hub:
Hubs are actually multiport repeaters. Using a hub changes the network topology from a
linear bus, where each device plugs directly into the wire, to a star. Hubs are also called
concentrators. Three Different types of hubs

Passive:
A passive hub serves as a physical connection point only. It does not manipulate or view the
traffic that crosses it. It does not boost or clean the signal. A passive hub is used only to share
the physical media. As such, the passive hub does not need electrical power.
Active:
An active hub must be plugged into an electrical outlet because it needs power to amplify the
incoming signal before passing it out to the other ports.
Intelligent:
Intelligent hubs are sometimes called smart hubs. These devices basically function as active
hubs, but also include a microprocessor chip and diagnostic capabilities. Intelligent hubs are
more expensive than active hubs, but are useful in troubleshooting situations.

LAYER2_DEVICES:
(iii) BRIDGES

Layer 2 devices are more intelligent than Layer 1 devices. Layer 2 devices make forwarding
decisions based on Media Access Control (MAC) addresses contained within the headers of
transmitted data frames.

A bridge is a Layer 2 device used to divide, or segment, a network. Bridges collect and selectively
pass data frames between two network segments.

In order to do this, bridges learn the MAC address of devices on each connected segment. With
this information, the bridge builds a bridging table and forwards or blocks traffic based on that
table.

This results in smaller collision domains and greater network efficiency.

Bridges do not restrict broadcast traffic.

When a bridge receives a frame on the network, the destination MAC address is looked up in the
bridge table to determine whether to filter, flood, or copy the frame onto another segment.

If the destination device is on the same segment as the frame, the bridge blocks the frame from
going on to other segments. This process is known as filtering.

If the destination device is on a different segment, the bridge forwards the frame to the appropriate
segment.

If the destination address is unknown to the bridge, the bridge forwards the frame to all segments
except the one on which it was received. This process is known as flooding.

(iv) Switches

A switch is sometimes described as a multiport bridge.

A switch chooses the port to which the destination device or workstation is connected.

Switches improve network performance by improving speed and bandwidth.

Switching data frames is the process by which a frame is received on an input medium and then
transmitted to an output medium.

The second is the maintenance of switching operations where switches build and maintain
switching tables.

Switches make forwarding decisions based on MAC addresses contained within transmitted data
frames. Switches learn the MAC addresses of devices connected to each port and this information
is entered into a switching table.

Switches create a virtual circuit between two connected devices that want to communicate. When
the virtual circuit is created, a dedicated communication path is established between the two
devices.

LAYER3_DEVICE:
(v) Routers:

A router is a Layer 3 device. Routers make decisions based on groups of network addresses, or
classes, as opposed to individual MAC addresses. Routers use routing tables to record the Layer 3
addresses of the networks that are directly connected to the local interfaces and network paths
learned from neighbor routers.

The following are functions of a router:

Examine inbound packets of Layer 3 data.

Choose the best path for the data through the network.

Route the data to the proper outbound port.

Routers do not forward broadcasts unless they are programmed to do so. Therefore, routers reduce
the size of both the collision domains and the broadcast domains in a network.

Routers are the most important devices to regulate traffic on large networks. Routers enable
communication between two computers regardless of location or operating system.

A router is a special type of computer.

It has the same basic components as a standard desktop PC.

It has a CPU, memory, a system bus, and various input/output interfaces.

However, routers are designed to perform some very specific functions that are not typically
performed by desktop computers.

Routers do not forward broadcasts unless they are programmed to do so. Therefore, routers reduce
the size of both the collision domains and the broadcast domains in a network.

Routers are the most important devices to regulate traffic on large networks. Routers enable
communication between two computers regardless of location or operating system.

(vi) Gateway:
A network gateway is an internetworking system capable of joining together two networks that
use different protocols. It can be implemented completely in software, completely in hardware or in
firmware. Depending upon the types of protocols they support network gateways can operate at any levels
of OSI model. Because by definition it appears at the edge of a network, related capabilities like firewalls
tend to be integrated with it. A gateway may basically contain devices such as protocol translators,
impedance matching devices, rate converters, fault isolations or signal translators as necessary to provide
system interoperability.

PC
PC

PC

PC
LAN

Gate way
PC

PC

Result:

Thus the networking devices with its uses were studied.

8
Ex No: 2
STUDY OF NETWORKING COMMANDS
Aim:
To study the various networking Commands.
IP Configuration Details:
(i) ipconfig Command:
Syntax:
C:\Documant and setting\administrtor.RMDECE>ipconfig

(ii) ipconfig/all Command:


Syntax:
C:\Documant and setting\administrtor.RMDECE>ipconfig/all

9
Testing Connectivity:
(i) Self Ping Command:
Syntax:
C:\Documant and setting\administrtor.RMDECE>ping <ip_address>
Example:
C:\Documant and setting\administrtor.RMDECE>ping 50.50.50.57

(ii) Ping to Destination


Syntax:
C:\Documant and setting\administrtor.RMDECE>ping <destination ip_address>
Example:
C:\Documant and setting\administrtor.RMDECE>ping 50.50.50.1

10
(iv) Improper ping Command
Syntax:
C:\Documant and setting\administrtor.RMDECE>ping <improper ip_address>
Example: 1
C:\Documant and setting\administrtor.RMDECE>ping 192.168.10.10

Example: 2
C:\Documant and setting\administrtor.RMDECE>ping 50.50.50.100

Result:
Thus the networking commands were studied and tested.

11
Ex No: 3
CABLE CONSTRUCTION
Aim:
To construct the cable for different configuration.
Theory:
There are different types of configuration
1. Straight Through

2. Cross Over

3. Roll Over

1. Straight Through Cable:


A cable that maintains the pin connection all the way through the communication path is straight
through cable. The wire connected to pin 1 is the transmit connection on either end of the communication
cable.
Use straight-through cables for the following cabling:

Switch to router

Switch to PC or server

Hub to PC or server

12
2. Cross Over Cable:
In cross over cable, some of the wires on one side of the cable are crossed to different pin on the
other side of the cable. Pin 1 on one end is connected to the pin 3 on the other end. Pin 2 on one end is
connected to pin 6 on other end.
Use crossover cables for the following cabling:

Switch to switch

Switch to hub

Hub to hub

Router to router

PC to PC

Router to PC

13
3.

Roll Over Cable:

The cable used between a terminal and a console port is a rollover cable

The rollover cable, also known as a console cable, has a different pin out than the straightthrough or crossover RJ-45 cables.

This cable is typically flat to distinguish it from the others.

As the name specifies the pinouts on one end are literally rolled over on the other end.

Result:
Thus the networking cables were studied and tested.

14
Ex No:4
PC TO PC COMMUNICATION USING SERIAL/PARALLEL ADAPTER
Aim:
To transfer the file between the two computers serially using Serial/Parallel adapter
connection.
Theory:
In serial communication, one bit follows another and so we need only one communication channel
rather than transmit data having two communication channels. The main advantage of serial
communication is that it reduces the cost of transmission over parallel communication by a factor h.

Parallel port
Serial port

Serial port
D0 D1 D2 D3 D4 D5 D6 D7 S1 S2 S3

S4

S5

D0 D1 D2 D3 D4 D5 D6 D7 S1 S2 S3 S4

S5

Parallel port

PROCEDURE:
Step 1 : Select Start All programs Vi-Rt simulator
Transmitter:
Step 2: Open PC to PC File transfer and select Transmitter
Step 3: Add IPaddress of receiver system and click connect.
Step 4: once connected select a file to be transmitted and send file.
Receiver:
Step 5: Choose start all programs ViRtSim
Step 6: Choose PC to PC file transfer and select receiver
Step 7: Save the file once received from its transmitter.

15
Transmitter Windows:
Step 1: Connect Transmitter:

Step 2: Select file to be sent:

16
Receiver Window:
Step 1: Connect receiver:

Step 2: Save received File:

17
Step 3: Check saved file in specified destination:

Result:
Thus the file was transmitted from one PC to another PC using serial parallel adapter.

18
Ex No:5
PC TO PC COMMUNICATION USING SWITCH
Aim:
To view, transfer and operate on files that can be shared between two systems in a network
connected through switch.
Theory:
A network switch is a small hardware device that connects multiple computers together with a
LAN. Network switches generally have more intelligence than a hub. Switches are capable of interpreting
and inspecting data packets as they are received, determining the source and destination code and thus
forwarding them appropriately. By delivering messages only to the connected device indeed a network
switch conserves bandwidth and offers generally better performance than a hub.
Procedure:
Step 1: Initially find out the IP address of the respective systems which communicate through the switch
using the ipconfig command
Step 2: Test the connectivity of the systems to be communicating through the switch using ping command
Step 3: Enable the sharing rights of the folders/files which are to be shared between the systems
communicating through the switch
Step 4: Run the command < IP address > of the system to be shared in order to access the sharable
folders and files.

Connection Between Two Systems Through Switch

Console cable
System 1

System 2

Switch

Straight through cable

19

Step 1: self ping system 1:

Step 2: self ping system 2:

20
Step 3: testing connectivity between system 1 and system 2:

Step 4: Enabling sharing:

21

Shared folders:

22
Step 5: Run the command < IP address> of the other system:

Step 6: Access the sharable folders of the other system:

Result:
Thus PC to PC communication using switch was performed.

23
Ex No: 6
SECURED DATA TRANSFER USING SERIAL/PARALLEL ADAPTER
Aim:
To transfer the Encrypted Data between the two computers serially using Serial/Parallel
adapter connection and decrypt the same at the receiver using ViRtSim software.
Theory:
Network security involves four aspects: privacy, message authentication, message integrity and
non-repudiation. Privacy means that the sender and the receiver expect confidentiality. The transmitted
message should make sense only to the intended receiver. Authentication means that the receiver is sure of
the senders identity and that an imposter has not sent the message. Integrity means that the data must
arrive at the receiver exactly as it was sent. Non-repudiation means that a receiver must be able to prove
that a received message came from a specific sender.
Privacy is achieved by encrypting the message at the sender and decrypting the received
message at the receiver. The data to be encrypted at the sender site is called plaintext/clear text. The
encrypted data is called cipher text.
Procedure:
Transmitter:
Step 1: Choose start all programs ViRtSim
Step 2: Choose serial and parallel communication RS232 data security data encryption
Step 3: Connect the transmitter and enter the data to be sent.
Step 4: Send the data after entering the password
Receiver:
Step 1: Choose start all programs ViRtSim
Step 2: Choose serial and parallel communication RS232 data security data decryption
Step 3: Connect the receiver
Step 4: Decrypt the received data and enter the password
Step 5: Check the original message.

24
Step 1: Connect transmitter:

Step 2: Enter data to be encrypted:

25
Step 3: Encrypt the data:

Receiver:
Step 1: Connect the receiver:

26
Step 2: Received Data:

Step 3: Decrypt the data:

27
Step 4: Original data received:

Step 5: Wrong password entered:

28
Step 5: Wrong clear text decrypted:

Result:
Thus the encrypted data was transmitted serially and decrypted at the receiver.

29
Ex No:7
SIMULATION OF TOKEN RING PROTOCOL
Aim:
To simulate the token ring protocol using ViRtSim software and study its characteristics.
Theory:
Token ring resolves the uncertainty of occurrence of collisions or delays produced by multiple
stations attempting to capture the link at the same time. Each station may transmit only during its turn and
may send only one frame during its turn. This mechanism is called Token passing. Whenever the network
is free it transmits a 3 byte token which is a simple placeholder frame that passes from NIC to NIC in
sequence until it encounters a station with data to send. The station holds the token and sends the data
which is checked by each station on the ring. Each station checks the destination address, regenerates the
frame if a match is not found. The intended receiver receives the data and sends an acknowledgement
frame to the sender. The sender releases the token to the ring after receiving the acknowledgement frame.

Token passing
A
Token

C
Transmitting data
A

Token Held

Data1
Denied
Data1

Denied
Data1

Data 1 received

30
Procedure:
Step 1: Select program ViRtSim Simulation Token Ring
Step 2: Enter the program, save and run it

Algorithm:
Step 1: declare a frame variable and assign it the data frame to be transmitted.
Step 2: declare a token variable.
Step 3: call the bus function to initialize the ring topology based network.
Step 4: call the construct logical ring function to create a network with four devices.
Step 5: start to pass the token in the ring.
Step 6: check if node B wants to transmit data. If node B wants to transmit data repeat the process of
capturing the token until captured.
Step 7: once token is captured node B transmits data. The intended receiver receives data and sends an
acknowledge. Once acknowledge reaches node B, it releases the token on to the ring.
Step 8: Stop passing token.

Program:
include<protocol.h>
void main()
{
Frame X;
Token t;
X = Data 1;
RING_TOPOLOGY();
CONSTRUCT_LOGICAL RING();
START TOKEN_PASSING(t);
WANT TO_TRANSMIT(A);
repeat
r = TOKEN_CAPTURE(A);
until(r);
TRANSMIT_DATA(A,C,X);
STOP TOKEN_PASSING();
}

31
Step 1: Enter The Program, Save, Run:

Step 2: Station A receives Token:

32
Step 3: Station C receives Data and Sends Acknowledge:

Result:
Thus the token ring protocol was simulated using ViRtSim software and its characteristics were
studied.

33

Ex. No: 8
SIMULATION OF TOKEN BUS PROTOCOL
Aim:
To simulate the token bus protocol using ViRtSim software and study its characteristics.
Theory:
The token bus protocol uses token passing access control and a physical or logical bus topology.
In token passing systems a small data frame(token) is passed in an orderly fashion from one device to
another. A token is a special message that temporarily gives media control to the device holding the token.
Passing the token around distributes access control among the networks devices. Each device knows from
which device it receives the token and to which device the token should be passed. Each device
periodically gets control of the token, performs its duties and retransmits the token for the next device to
use. Protocols limit how long each device can control the token.

Token Passing
A
Token
B

Data Transmit
A
Denied
Denied
B
Token held

Procedure:
Step 1: Select program ViRtSim Simulation Token Bus
Step 2: Enter the program, save and run it

Data 1

34

Algorithm:
Step 1: declare a frame variable and assign it the data frame to be transmitted.
Step 2: declare a token variable.
Step 3: call the bus function to initialize the ring topology based network.
Step 4: call the construct logical ring function to create a network with four devices.
Step 5: start to pass the token in the ring.
Step 6: check if node B wants to transmit data. If node B wants to transmit data repeat the process of
capturing the token until captured.
Step 7: once token is captured node B transmits data. The intended receiver receives data and sends an
acknowledge. Once acknowledge reaches node B, it releases the token on to the ring.
Step 8: Stop passing token.

Program:
include<protocol.h>
void main()
{
Frame X;
Token t;
X = Data 1;
BUS_TOPOLOGY();;
CONSTRUCT_LOGICAL RING();
START TOKEN_PASSING(t);
WANT TO_TRANSMIT(B);
repeat
r = TOKEN_CAPTURE(B);
until(r);
TRANSMIT_DATA(B,C,X);
STOP TOKEN_PASSING();
}

35
Step 1: Enter The Program, Save, Run:

Step 2: Station B sends Token:

36
Step 3: Station C receives Data and Sends Acknowledge:

Result:
Thus the token bus protocol was simulated using ViRtSim software and its characteristics was
studied.

37
Ex. No: 9
SIMULATION OF CSMA/CD
Aim:
To simulate the CSMA/CD protocol using ViRtSim software and study its characteristics.
Theory:
Carrier sense multiple access is a network access method used on shared network topologies such
as Ethernet to control access to the network. Devices attached to the network cable listen(carrier sense)
before transmitting. If the channel is in use, devices wait before transmitting. Multiple access indicates that
many device can connect to and share the same network. All devices have equal access to use the network
when it is clear.
Collision detection defines what happens when two devices sense a clear channel, then attempt to
transmit at the same time. A collision occurs and both devices stop transmission, wait for a random amount
of time and then retransmit. This is the technique used to access the 802.3 Ethernet network channel. This
method handles collision as they occur, but if the bus is constantly busy, collision can occur so often that
the performance drops drastically.

Collision in a network

B
Data to B
collision

Data to
C

After specified interval

B
Data to B

38

Data to C

C
Algorithm:
Step 1: declare two frame variables and assign them the data frames to be transmitted.
Step 2: initialize the CSMA/CD function.
Step 3: send data from node A to node B and sense multiple access.
Step 4: send data from node B to node C and sense multiple access.
Step 5: check if collision occurs.
Step 6: if collision occurs wait for 1000ms and then retransmit the two data from the nodes one after the
other.
Step 8: Stop the execution.
Procedure:
Step 1: Select program ViRtSim Simulation CSMA CSMA/CD
Step 2: Enter the program, save and run it
Program:
include <protocol.h>
void main()
{
Frame X,Y;
X="data1";
Y="data2";
CSMACD_INIT();
CSMACD_START();
CSMA_SEND(B,A,X);
CSMA_SEND(A,C,Y);
R=COLLISION_OCCUR();
if(R)
{
WAIT(1000);
RETRANSMIT(B,A);
RETRANSMIT(A,C);
}
}

39
Step 1: Two Stations Transmit data simultaneously:

Step 2: Occurrence of Collision:

40
Step 3: Retransmit from Station B to Station A:

Step 4: Retransmit from Station A to Station C:

Result:
Thus the CSMA/CD protocol was simulated using ViRtSim software and its characteristics was
studied.

41
Ex. No: 10
SIMULATION OF CSMA/CA
Aim:
To simulate the CSMA/CA protocol using ViRtSim software and study its characteristics.
Theory:
Carrier sense multiple access is a network access method used on shared network topologies such
as Ethernet to control access to the network. Devices attached to the network cable listen(carrier sense)
before transmitting. If the channel is in use, devices wait before transmitting. Multiple access indicates that
many device can connect to and share the same network. All devices have equal access to use the network
when it is clear.
Collision Avoidance defines what happens when two devices sense a clear channel, then attempt
to transmit at the same time. A collision occurs and both devices stop transmission, wait for a random
amount of time and then retransmit. This is the technique used to access the 802.3 Ethernet network
channel. This method handles collision as they occur, but if the bus is constantly busy, collision can occur
so often that the performance drops drastically.
Request to send (RTS) sent to A

B
RT
S

Clear to send (CTS) sent to A

B
CT
S

42
Data transmitted to B

B
Data

C
Acknowledge (ACK) sent to A

B
ACK

C
Algorithm:
Step 1: declare a frame variable and assign them the data frame to be transmitted.
Step 2: initialize the CSMA/CA function
Step3: Nodes keep listening to the channel
Step 4: send request to send frame from node A to node B
Step 5: send clear to send frame from node B to node A
Step 6: send data from node A to node B and sense multiple access.
Step 7: send acknowledge frame from node B to node A
Step 8: Stop the execution.
Program:
include <protocol.h>
void main()
{
Frame X;
X="data1";
CSMACA_INIT();
CSMACA_START();
NODE_LISTEN();
REQUESTTO_SEND(A,B);
CLEARTO_SEND(B,A);
DATATO_SEND(A,B,X);
ACKNOWLEDGE(B,A);
}

43
Procedure:
Step 1: Select program ViRtSim Simulation CSMA CSMA/CA
Step 2: Enter the program, save and run it
Step 1: Node A sends RTS frame to node B:

Step 2: Node B sends CTS frame to node A:

44
Step 3: Node A sends data frame to node B:

Step 3: Node B sends ACK frame to node A:

Result:
Thus the CSMA/CA protocol was simulated using ViRtSim software and its characteristics was
studied.

45
Ex. No: 11
SIMULATION OF RING TOPOLOGY USING LAN TRAINER KIT
Aim:
To simulate the ring topology using LAN trainer kit and study its characteristics.
Theory:
In ring topology, each device has a dedicated point to point line configuration with the two devices
on either side of it. A signal is passed along the ring in one direction from device to device until it reaches
its destination. Each device in the ring incorporates a repeater. When a device receives a signal intended for
another device its repeater regenerates the bit and passes them along unidirectional traffic.
VI LAN TRAINER KIT RING TOPOLOGY

NIC1

NIC2

NIC3

Node A

Node
B

Node
D

Node C

Procedure:
Step 1: Switch on the LAN trainer kit and give connections as shown in the block diagram. The NIC 1 is
placed in programming mode.
Step 2: select ViRtSim in the PC and then the utilities.
Step 3: select ARM downloader and click read device ID.
Step 4: reset the NIC 1 and then the device ID will be read successfully.
Step 5: to load the ARM processor, select the respective hex bit file and click load flash.
Step 6: to load the FPGA processor, go to Start all programs Xilinx Accessories and click on
IMPACT
Step 7: Create a new project on Boundary scan configuration, select the respective hex bit file and load the
FPGA chip
Step 8: when program is successfully loaded switch the kit to execution mode and reset.
Step 9:

Select on the ViRtSim window PC to PCPing. Enter the host information and test the
connectivity.

Step 10: OSI LAN TRAINER TopologyRing


Step 11: Connect the PC with the kit and send the data
Step 12: once data reaches the destination stop the execution.

46

Result:
Thus ring topology was implemented and simulated using VI-LAN trainer kit and ViRtSim
software.

47
Ex. No: 12
SIMULATION OF BUS TOPOLOGY USING LAN TRAINER KIT
Aim:
To simulate the bus topology using LAN trainer kit and study its characteristics.
Theory:
The bus topology connects each station on the network into something called the
segment trunk. A bus is usually referred to a cable that connects end to end and this is used to transmit the
signals from one end to the other end. At every end a terminator is placed so that it understands in which
direction the data is travelling and also terminator is used to absorb the signals. If the terminator does not
absorb the signal then the same signal is reflected back to the bus confusing the whole data flow.
VI LAN TRAINER KIT BUS TOPOLOGY

NIC1

NIC2

NIC3

Rx

Node A

Tx

Node B

Node C

Node D

Procedure:
Step 1: Switch on the LAN trainer kit and give connections as shown in the block diagram. The NIC 1 is
placed in programming mode.
Step 2: select ViRtSim in the PC and then the utilities.
Step 3: select ARM downloader and click read device ID.
Step 4: reset the NIC 1 and then the device ID will be read successfully.
Step 5: to load the ARM processor, select the respective hex bit file and click load flash.
Step 6: to load the FPGA processor, go to Start all programs Xilinx Accessories and click on
IMPACT
Step 7: Create a new project on Boundary scan configuration, select the respective hex bit file and load the
FPGA chip
Step 8: when program is successfully loaded switch the kit to execution mode and reset.
Step 9:

Select on the ViRtSim window PC to PCPing. Enter the host information and test the
connectivity.

Step 10: OSI LAN TRAINER Topologybus


Step 11: Connect the PC with the kit and send the data
Step 12: once data reaches the destination stop the execution.

48

Result:
Thus bus topology was implemented and simulated using VI-LAN trainer kit and ViRtSim
software.

49
Ex. No: 13
SIMULATION OF STAR TOPOLOGY USING LAN TRAINER KIT
Aim:
To simulate the star topology using LAN trainer kit and study its characteristics.
Theory:
In a star topology each device has a dedicated point to point link only to a central controller,
usually called hub. The devices are not directly linked to each other. Unlike a mesh topology a star
topology does not allow direct traffic between devices. The controller acts as an exchange, it sends the data
to the controller which then relays the data to the other connected device. Its advantage includes robustness.
If one link fails only that link is affected and all other link remain active.
VI LAN TRAINER KIT STAR TOPOLOGY

NIC2

NIC1

NIC3

Node A

Node B

Node C

Node D

Procedure:
Step 1: Switch on the LAN trainer kit and give connections as shown in the block diagram. The NIC 1 is
placed in programming mode.
Step 2: select ViRtSim in the PC and then the utilities.
Step 3: select ARM downloader and click read device ID.
Step 4: reset the NIC 1 and then the device ID will be read successfully.
Step 5: to load the ARM processor, select the respective hex bit file and click load flash.
Step 6: to load the FPGA processor, go to Start all programs Xilinx Accessories and click on
IMPACT
Step 7: Create a new project on Boundary scan configuration, select the respective hex bit file and load the
FPGA chip
Step 8: when program is successfully loaded switch the kit to execution mode and reset.
Step 9:

Select on the ViRtSim window PC to PCPing. Enter the host information and test the
connectivity.

50
Step 10: OSI LAN TRAINER TopologyStar
Step 11: Connect the PC with the kit and send the data
Step 12: once data reaches the destination stop the execution.

Result:
Thus star topology was implemented and simulated using VI-LAN trainer kit and ViRtSim software.

51
Ex. No: 14
IMPLEMENTATION OF STOP AND WAIT PROTOCOL
Aim:
To implement and test the stop and wait protocol using LAN trainer kit and ViRtSim.
Theory:
Stop and wait protocol is an efficient way of dealing errors during transmission. The stop and wait
protocol stops the transmission of packets when the loss of data or any other error causes a negative
acknowledgement to reach the transmitting computer (ie) the transmitting computer waits for a kind of
acknowledgement from the receiving computer. If the receiving computer acknowledges the sent data, the
transmitting computer sends the next data. If the receiver sends a negative acknowledgement then the
transmitter retransmits the data. This way the transmission is reliable.

Node
A

Node
A
Node
A

Stop and Wait


Protocol

1
AC
K
2

Node
A
Node
A

NAC
K
2

Node
A
Node
A

AC
K
3

Node
A
Node
A

AC
K

Procedure:
Step 1: Connect the master/server to the computer NIC port.
Step 2: Select ViRtSim in the PC and then the utilities.
Step 3: Select ARM downloader and click read device ID.

Node
B

Node
B
Node
B
Node
B
Node
B
Node
B
Node
B
Node
B
Node
B

52
Step 4: Reset the NIC 1 and then the device ID will be read successfully.
Step 5: To load the ARM processor, select the respective hex bit file and click load flash.
Step 6: To load the FPGA processor, go to Start all programs Xilinx Accessories and click on
IMPACT
Step 7: Create a new project on Boundary scan configuration, select the respective hex bit file and load the
FPGA chip
Step 8: When program is successfully loaded switch the kit to execution mode and reset.
Step 9:

Select on the ViRtSim window PC to PCPing. Enter the host information and test the
connectivity.

Step 10: OSI LAN TRAINER ProtocolStop and wait


Step 11: Connect the PC with the kit and send the data
Step 12: While transmitting, enter the error by deleting the error bit - .
Step 13: A NAK frame will be transmitted to the sender and transmission will be stopped.
Step 14: The error is then removed by reentering the error bit -. The transmission is resumed.
Step 15: Once data reaches the destination stop the execution.

Result:
Thus stop and wait protocol was implemented and simulated using VI-LAN trainer kit and
ViRtSim software.

53
Ex. No: 15
IMPLEMENTATION OF GO BACK - N PROTOCOL
Aim:
To implement and test the Go back - N protocol using LAN trainer kit and ViRtSim.
Theory:
In Go back N protocol if one frame is damaged or lost, all frames sent since the lost frame
acknowledged are retransmitted. The receiver sends an acknowledgement frame for a group of data frames.
Only one acknowledgement is enough for a group of transmitted data. In case of lost data frames the
transmitter sends a negative acknowledgement with data frame that is damaged or lost. Once sender
receives a NAQ, it retransmits data. If there is a repetition the receiver discards one of the data.

Procedure:
Step 1: Connect the master/server to the computer NIC port.
Step 2: Select ViRtSim in the PC and then the utilities.
Step 3: Select ARM downloader and click read device ID.
Step 4: Reset the NIC 1 and then the device ID will be read successfully.
Step 5: To load the ARM processor, select the respective hex bit file and click load flash.
Step 6: To load the FPGA processor, go to Start all programs Xilinx Accessories and click on
IMPACT
Step 7: Create a new project on Boundary scan configuration, select the respective hex bit file and load the
FPGA chip
Step 8: When program is successfully loaded switch the kit to execution mode and reset.
Step 9:

Select on the ViRtSim window PC to PCPing. Enter the host information and test the
connectivity.

Step 10: OSI LAN TRAINER ProtocolGo back-N


Step 11: Connect the PC with the kit and send the data
Step 12: While transmitting, enter the error by pressing the error button on the LAN kit as many times as
the number of frames in the data.
Step 13: A NAK frame will be transmitted to the sender and transmission will be stopped.
Step 14: The transmission is resumed when the data is again sent.
Step 15: Once data reaches the destination stop the execution.

54

Result:
Thus Go back-N protocol was implemented and simulated using VI-LAN trainer kit and ViRtSim
software.

55
Ex. No: 16
IMPLEMENTATION OF DISTANCE VECTOR ROUTING
Aim:
To implement and test the distance vector routing using ViRtSim.
Theory:
In distance vector routing each router shares its knowledge about the entire network with
information from its neighbors in a step by step procedure. Once this is complete it will have a complete
idea about the network. The table consists of network ID, cost and next hop. The cost refers to the number
of hop count(least) to reach a particular destination. Routers using distance-vector algorithms send all or
part of their routing table entries to adjacent routers on a periodic basis. This happens even if there are no
changes in the network. By receiving a routing update, a router can verify all the known routes and make
changes to its routing table. This process is also known as routing by rumor. The understanding that a
router has of the network is based upon the perspective of the adjacent router of the network topology
Procedure:
Step 1: open ViRtSim and select simulation Distance Vector Routing
Step 2: design the required network by including the routers, links and corresponding weights on the links.
Step 3: select the sender and destination node and click the Find Path.
Step 4: Click the Calculate button which displays all the route details and shows the shortest route.

Step 1: Design The Required Network:

56
Step 2: The Shortest Path:

Result:
Thus the distance vector routing algorithm was implemented and simulated using ViRtSim
software.

57
Ex. No: 17
IMPLEMENTATION OF LINK STATE ROUTING
Aim:
To implement and test the link state routing using ViRtSim.
Theory:
In link state routing every router shows its knowledge about its neighbor to the entire network and
ultimately all routers will have a routing table within the link state database. Link-state routing protocols
respond quickly to network changes sending trigger updates only when a network change has occurred.
Link-state routing protocols send periodic updates, known as link-state refreshes, at longer time intervals,
such as every 30 minutes. When a route or link changes, the device that detected the change creates a linkstate advertisement (LSA) concerning that link. The LSA is then transmitted to all neighboring devices.
Each routing device takes a copy of the LSA, updates its link-state database, and forwards the LSA to all
neighboring devices. This flooding of LSAs is required to ensure that all routing devices create databases
that accurately reflect the network topology before updating their routing tables.
Procedure:
Step 1: open ViRtSim and select simulation Link State Routing
Step 2: design the required network by including the routers and links.
Step 3: select the sender and destination node and click the Find Path.
Step 4: Click the Calculate button which displays all the route details and shows the shortest route.
Step 1: Design The Required Network:

58
Step 2: Available Paths:

Step 3: Shortest Path:

Result:
Thus the link state routing algorithm was implemented and simulated using ViRtSim software.

59
Ex. No: 18
CLIENT-SERVER COMMUNICATION USING SWITCH
Aim:
To transfer a .exe file between two computers through switch.
Procedure:
Step 1: Select Start Visual studio 6.0 VC++
Step 2: Open a new project and new C++ source file
Step 3: Enter the program, save and link wsock32.lib file in the project settings
Step 4: Compile and execute the project in the server and then in the client
Step 5: Check the received file in the specified destination in the server system.
Program:
Server:
#include<fcntl.h>
#include<io.h>
#include<iostream.h>
#include<stdio.h>
#include<windows.h>

SOCKET Listen();
void main()
{
WORD version;
WSADATA wsa;
SOCKET CommSock;
char fil[512];
version=MAKEWORD(1,1);
WSAStartup(version,&wsa);
CommSock = Listen();
FILE *fout=fopen("d:\\2.rar","wb");
int count = 0;
while(count=recv(CommSock,fil,sizeof(fil),0))
{
if(strcmp(fil,"FINAL")==0)
{
fclose(fout);
exit(0);
}
fwrite(fil,1,count,fout);
}

60
}

SOCKET Listen()
{
SOCKADDR_IN ServAddr;
SOCKET ServSock = socket(AF_INET,SOCK_STREAM,0),clisock;
ServAddr.sin_family = AF_INET;
ServAddr.sin_port = htons(3000);
ServAddr.sin_addr.s_addr = INADDR_ANY;
bind(ServSock,(LPSOCKADDR)& ServAddr,sizeof(struct sockaddr));
listen(ServSock,4);
SOCKADDR_IN cliaddr;
int sin_size = sizeof(struct sockaddr_in);
clisock=accept(ServSock,(LPSOCKADDR) &cliaddr, &(sin_size));
return(clisock);
}

Client:
#include<stdio.h>
#include<windows.h>
#include<io.h>
#include<fcntl.h>

SOCKET Connect(char*);
void main()
{
WORD version;
WSADATA wsa;
version = MAKEWORD(1,1);
WSAStartup (version,&wsa);
SOCKET CommSock;
CommSock = Connect("11.1.1.2");
int fd=open("d:\\ccc.txt.exe",O_RDONLY);
long int size=0;
size=lseek(fd,0L,SEEK_END);
printf("%d",size);
char fil[512];
close(fd);

61
FILE *fr=fopen("d:\\ccc.txt","rb");
long int temp=0;
long count=size/512;
while(temp<=count)
{
int i=fread(fil,1,sizeof(fil),fr);
send(CommSock,fil,i,0);
temp++;
}
strcpy(fil,"FINAL");
send(CommSock,fil,sizeof(fil),0);
fclose(fr);
}

SOCKET Connect(char *ip)


{
SOCKADDR_IN ServAddr;
SOCKET ClientSock = socket (AF_INET,SOCK_STREAM,0);
ServAddr.sin_family = AF_INET;
ServAddr.sin_port = htons(3000);
ServAddr.sin_addr.s_addr = inet_addr(ip);
connect(ClientSock,(LPSOCKADDR) &ServAddr,sizeof(struct sockaddr));
return(ClientSock);
}

Result:
Thus the file was from client to server using VC++ software and switch.

Anda mungkin juga menyukai