Computer Networks,EC-803, Lab Manual

download Computer Networks,EC-803, Lab Manual

of 24

Transcript of Computer Networks,EC-803, Lab Manual

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    1/24

      DEPARTMENT OF

    ELECTRONICS & COMMUNICATION

    ENGINEERING 

    VIII SEM (EC)

    COMPUTER NETWORKS

     

    (EC-803)

    LABORATORY MANUAL

    CHAMELIDEVI SCHOOL OF ENGINEERING,

    INDORE

     

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    2/24

    CHAMELIDEVI GROUP OF INSTITUTIONS

    CHMELIDEVI SCHOOL OF ENGG.

    ELECTRONICS COMMUNICATION ENGG.

     LIST OF EXPERIMENTS

    SUBJECT: COMPUTER NETWORKS CLASS: VIII SEM

    SUB CODE: EC–803 ROLL No. :

      SECTION:

    S.NO

    .NAME OF EXPERIMENT

    DATE OF

    EXPERIMENT

    DATE OF

    SUBMISSION

    FACULTY

    SIGNATURE

    & REMARKS

    1. Study and execution of various Linux NetworkingCommands.

    2.Study and installation of NCTUNS NetworkSimulator and Emulator.

    3.

    Simulate a three-node oint-to-oint network with adulex link !etween them.Set the "ueue si#e and vary the !andwidth andfind the num!er of ackets droed.

    4.

    Simulate a four-node oint-to-oint network andconnect the link as follows$%ly a TC& agent !etween n' to n( and aly aU)& agent !etween n* and n(.

    %ly relevant alications over TC& and U)&agents changing the arameters and determine thenum!er of ackets sent !y two agents.

    5.

    Simulate the different tyes of +nternet traffic suchas ,T& TELNET over a network and analy#e thethroughut using NCTUNS.

    6.

    Simulate the transmission of ing messages over anetwork toology consisting of nodes and findthe num!er of ackets droed due to congestionusing NCTUNS.

    7.

    Simulate an Ethernet L%N using N nodes /-*'0change error rate and data rate and comare

    throughut using NCTUNS.

    8.

    Simulate an Ethernet L%N using N nodes and setmultile traffic nodes and determine collisionsacross different nodes using NCTUNS.

    9

    Simulate an Ethernet L%N using N nodes and setmultile traffic nodes and lot congestion windowfor different source1destination using NCTUNS.

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    3/24

    10

    Simulate simle 2SS and with transmitting nodesin wireless L%N !y simulation and determine theerformance with resect to transmission ofackets using NCTUNS.

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    4/24

    EXPERIMENT 1

    Aim: Study and execution of various Linux Networin! "ommands

    T#eory:

    1$ %in!

    The ping command allows the user to test whether or not a networkconnection is active, the speed of that connection, and how a network behaves givenspecific data loads. We will use this command in its simplest form:ping IP-addressWhen the ping command is finished (or you manually stop it with CTR!C", a

    minimum, average, and ma#imum time taken to transmit and receive the re$uestpackets is calculated, as is a percentage of packets that may have been lost.

    &$ ifconfi!The ifconfig command is a tool used to display and configure networkinterfaces. We will use this command to display information about our networkinterface by entering the ifconfig command with no options. This command willdisplay information about the network card (normally eth%", &' address, broadcastaddress, and network mask. &t also shows how many packets were received andtransmitted. There is also information about the loopback device (lo".The loopback device is a path for your machine to network with itself. This

    feature is useful for testing a computers networking capabilities without beingphysically connected to a network. )y convention, the loopback device is given theaddress *+.%.%.*.

    -fasilsmashtech /01 2sbin2ifconfigeth% 3' )R456C57T R388&89 3T&C57T T3:*;%% etric:*  R< packets:*+=>?* errors:% dropped:% overruns:% frame:%  T< packets:????* errors:% dropped:% overruns:% carrier:%  collisions:% t#$ueuelen:*%%%

    '$ ar%

    The arp command by itself is used to view the information currently in the5R' table (5ddress Resolution 'rotocol". This table maps the &' address ofmachines on your network segment with their 5C address.C8@TA;=; 4perating 7ystems && +%%;Wab 1?6:B+%%;WBcnetA;=;BlabsBlab?Blab?.wpd 'age + of ?

    hostname also: domainname, dnsdomainnameThe hostname command tells you what the hostname of your machine is setto. The hostname is determined from a number of sources, such as the

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    5/24

    2etc2sysconfig2network or 2etc2hosts files.

    -fasilsmashtech 01 arp5ddress Wtype Waddress Dlags ask &face;A.>=.*>.* ether C eth%

    ($ netstatThe netstat command displays details about the network, including routingtables and other interface statistics. When used by itself, the netstat commanddisplays a large amount of data. The information of interest to us is at the top of thelist: Active Internet Connections. This list displays the &nternet address yourconnected to, how you are connected to it, and how much data has been sent andreceived by this connection.

    -fasilsmashtech /01 netstat5ctive &nternet connections (w2o servers"'roto Recv!E 7end!E ocal 5ddress Doreign 5ddress 7tate

    tcp % % .+>%.F:https @7T5)&7@65ctive 38&< domain sockets (w2o servers"'roto RefCnt Dlags Type 7tate &!8ode 'athuni# *% - 0 69R5 ?A% 2dev2loguni# + - 0 69R5 ==+; 2var2run2hal2hotplugGsocketuni# + - 0 69R5 +A;+ udevduni# + - 0 69R5 *%%;=?uni# > - 0 7TR@5 C488@CT@6 =+?>F 2tmp2.uni# > - 0 7TR@5 C488@CT@6 *%+* 2tmp2fam!rootuni# > - 0 7TR@5 C488@CT@6 *%+%uni# > - 0 7TR@5 C488@CT@6 A+=uni# > - 0 7TR@5 C488@CT@6 A+;

    )$ tc%dum%

    This is a packet decoder that displays all traffic across the entire network dueto the @thernet cards ability to detect the incoming and outgoing transmission data(called promiscuous or HsnoopH mode". This program is normally used to analyIeTC' performance.

    *$ traceroute

    This program prints the route along which an &' packet travels from the localhost to reach the destination host. &t also shows each hop along the connection routefrom a local to remote host and gives all the intermediate routers.

    -fasilsmashtech /01 traceroute google.comtraceroute: Warning: google.com has multiple addressesJ using +%A.F;.**.*%%traceroute to google.com (+%A.F;.**.*%%", >% hops ma#, >F byte packets * K K K

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    6/24

    +$ Nma%

    &t is designed to allow system administrators and curious individuals to scan large networks todetermine which hosts are up and what services they are offering. nmap supports a large number ofscanning techni$ues such as:36', TC' connect(", TC' 7L8 (half open", ftp pro#y (bounce attack"

    &C' (ping sweep", D&8, 5CM sweep,

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    7/24

    Mernel &' routing table6estination 9ateway 9enmask Dlags etric Ref 3se &face ;?.*A+.;=.>+* K +;;.+;;.+;;.% 3 % % % eth%  K +;;.+;;.%.% 3 % % % eth%default %.%.%.% 39 % % % eth%

    1/$ di! 0domain information !ro%er$&t is a fle#ible tool for interrogating 687 name servers. &t performs 687 lookups and displays theanswers that are returned from the name server(s" that were $ueried. ost 687 administrators use dig totroubleshoot 687 problems because of its fle#ibility, ease of use and clarity of output. 4ther lookuptools tend to have less functionality than dig

    -fasilsmashtech /01 dig google.com

    J QQ 6i9 A.+.? QQ google.comJJ global options: printcmd

    JJ 9ot answerJJ !@56@RQQ! opcode: E3@RL, status: 84@RR4R, id: ?*=JJ flags: $r rd raJ E3@RL: *, 587W@R: >, 53T4R&TL: ?, 566&T&485: ?

    JJ E3@7T&48 7@CT&48Jgoogle.com. &8 5

    JJ 587W@R 7@CT&48google.com. *++ &8 5 ?.*+;.?;.*%%google.com. *++ &8 5 ?.*+;.=.*%%google.com. *++ &8 5 +%A.F;.**.*%%

    JJ 53T4R&TL 7@CT&48google.com. >+=;= &8 87 ns>.google.comgoogle.com. >+=;= &8 87 ns?.google.comgoogle.com. >+=;= &8 87 ns*.google.comgoogle.com. >+=;= &8 87 ns+.google.com

    JJ 566&T&485 7@CT&48ns*.google.com. *;++*= &8 5 +*=.+>A.>+.*%ns+.google.com. *;++*= &8 5 +*=.+>A.>?.*%ns>.google.com. *;++*= &8 5 +*=.+>A.>=.*%ns?.google.com. *;++*= &8 5 +*=.+>A.>F.*%

    JJ Euery time: A+ msecJJ 7@RS@R: *+.+A.>=.*1;>(*+.+A.>=.*"JJ W@8: Thu ar ; *?:>F:?; +%%AJJ 79 7&@ rcvd: +*+

    11$ Nsoou%

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    8/24

     &t is a program to $uery &nternet domain name servers. 8slookup has two modes: interactive and non!interactive. &nteractive mode allows the user to $uery name servers for information about various hostsand domains or to print a list of hosts in a domain. 8on!interactive mode is used to print Uust the nameand re$uested information for a host or domain

    -fasilsmashtech /01 nslookup google.com7erver: server ip5ddress: gateway ip >

    8on!authoritative answer8ame: google.com5ddress: +%A.F;.**.*%%8ame: google.com5ddress: ?.*+;.?;.*%%8ame: google.com5ddress: ?.*+;.=.*%%

    1&$ Et#erea

     V 'rotocol analyIer, or Hpacket snifferH software, used fornetwork troubleshooting, analysis, software and protocoldevelopment, and education. &t has all of the standardfeatures of a protocol analyIer

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    9/24

    EXPERIMENT &

    Aim: Study and instaation of N"T2NS Networ Simuator and Emuator

    T#eory:8etwork simulation is an important tool in developing, testing and evaluating network protocols7imulation can be used without the target physical hardware, making it economical and practical foralmost any scale of network topology and setup. &t is possible to simulate a link of any bandwidth anddelay, even if such a link is currently impossible in the real world. With simulation, it is possible to seteach simulated node to use any desired software. This means that meaning deploying software is not anissue. Results are also easier to obtain and analyIe, because e#tracting information from important

    points in the simulated network is as done by simply parsing the generated trace files.

    7imulation is only of use if the results are accurate, an inaccurate simulator is not useful at all.ost network simulators use abstractions of network protocols, rather than the real thing, making theirresults less convincing. 7.L. Wang reports that the simulator 4'8@T uses a simplified finite statemachine to model comple# TC' protocol processing. -*A0 87!+ uses a model based on )76 TC', it isimplemented as a set of classes using inheritance. 8either uses protocol code that is used in real worldnetworking.

     Im%rovin! Networ Simuation:

    Wang states that 7imulation results are not as convincing as those produced by real hardwareand software e$uipment.X This statement is followed by an e#planation of the fact that most e#istingnetwork simulators can only simulate real life network protocol implementations with limited detail,which can lead to incorrect results. 5nother paper includes a similar statement, running the actual TC'code is preferred to running an abstract specification of the protocol.X )rakmo and 'eterson go on todiscuss how the )76 implementations of TC' are $uite important with respect to timers. 7imulatorsoften use more accurate round trip time measurements than those used in the )76 implementation,making results differ.

    3sing real world network stacks in a simulator should make results more accurate, but it is notclear how such stacks should be integrated with a simulator. The network simulator 8CT3ns shows howit is possible to use the network stack of the simulators machine.

     Network Simulation Experience

    The 8etwork 7imulator offers a simplified and complete network simulation e#perience. Thefollowing diagram depicts this functionality offered by the 8etwork 7imulator.

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    10/24

    The 8etwork 7imulator can design and simulate a network with 78', T*, TDTD, DT', Telnetand &47 devices, in four simple steps:

    *. 5dd devices to the 6evice tree: 5dd devices with the re$uired configuration to the device tree in the8etwork 6esigner. 'reconfigured devices are also bundled with the toolkit.

    +. Create the 8etwork: Create and add bulk devices to the network, at one shot.

    >. Configure the 8etwork devices: Configure the devices in the network, if re$uired.

    λ 7tart the 8etwork: 7tart the network or start individual agents in the network. The &) )rowser

    and T* Craft &nterface test tools, can be used as the manager tools for testing.

    Networ Emuation

    8etwork emulation refers to actual network traffic passing through some software which might

    do some analysis or perhaps modify the traffic in some way. The @mulation 8etwork in the W586group is used for testing and evaluation of networking software and hardware. The scale is limitedJ it ismade up +? emulation machines and one central controlling computer. 7etup of such a network is timeconsuming and e#pensive: in addition to the aforementioned +; computers, a Cisco +A;% switch and aCyclades >+ port terminal server are included in the network. @ach emulation machine also has a ? portnetwork interface controller. The controlling machine includes special capture cards (known as 659 -=0cards" to allow easier capture and processing of network traffic. This network has no easy way of addinglatency and bandwidth bottlenecks, which means creating adverse conditions on the network is difficult.&t is possible to use 6ummy net to add latency, but this is a lot of work. There is a proUect to solve thisissueJ a non blocking crossbar @thernet switch is being created for the network, but the cost involved islarge.

    4ther network emulation done in the W586 group include validating the W586 simulator. Thiswas done by setting up a physical network with Dree)76 machines using 6ummynet to add latency.6ummy net is one e#ample of network emulation software, 8&7T 8et is another, it claims to allowcontrolled, reproducible e#periments with network performance sensitive2adaptive applications andcontrol protocols in a simple laboratory settingX.

    87!+ also provides some network emulation functionality, it is able to capture packetsfrom the live network and drop, delay, re!order, or duplicate them. @mulation, especially in the case of anetwork simulator like 87!+, is interesting because it is using real world data from real world networkstacks. @mulation offers something simulation never can: it is performed on a real network, using actuale$uipment and real software. owever, it is very limited compared to simulation in other areasJ fore#ample scale. The W586 @mulation 8etwork described earlier re$uires a lot of setup and is e#pensive,yet only contains +? emulation machines. There is no theoretical limit to the number of nodes asimulator can handle, and increasing the siIe of a simulation does not cost anything. The factors toconsider are R5, disk space and the small amount of time taken to change a simulation script. &ngeneral, changing the simulation is a simple step, though it would be comple# in the case a huge amountof nodes being re$uired (a million, for e#ample".

    5lso, network emulation must of course be run in real time, where simulation can sometimessimulate large time periods in a small amount of time. &n the case of a million nodes, the simulation

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    11/24

    might run in greater than real time because the hardware it is run on would limit performance.

    Introduction to Networ Simuators8etwork simulators implemented in software are valuable tools for researchers to develop, test

    and diagnose network protocols. 7imulation is economical because it can

    carry out e#periments without the actual hardware. &t is fle#ible because it can, for e#ample, simulate alink with any bandwidth and propagation delay. 7imulation resultsare easier to analyIe than e#perimental results because important information at critical points can beeasily logged to help researchers diagnose network protocols.

    8etwork simulators, however, have their limitations. 5 complete network simulator needs tosimulate networking devices (e.g., hosts and routers" and application programs that generate networktraffic. &t also needs to provide network utility programs to configure, monitor, and gather statisticsabout a simulated network. Therefore, developing a complete network simulator is a large effort. 6ue tolimited development resources, traditional network simulators usually have the following drawbacks:

    Y 7imulation results are not as convincing as those produced by real hardware and software e$uipment.&n order to constrain their comple#ity and development cost, most network simulators usually can onlysimulate real!life network protocol implementations with limited details, and this may lead to incorrectresults.

    Y These simulators are not e#tensible in the sense that they lack the standard 38&< '47&< applicationprogramming interface (5'&". 5s such, e#isting or to!be!developed real!life application programs cannotrun normally to generate traffic for a simulated network. &nstead, they must be rewritten to use theinternal 5'& provided by the simulator (if there is any" and be compiled with the simulator to form asingle, big, and comple# program.

    To overcome these problems, Wang invented a kernel re!entering simulation methodology andused it to implement the arvard network simulator. ater on, Wang further improved the methodologyand used it to design and implement the 8CT3ns network simulator and emulator.

    3ifferent ty%es of simuators

    7ome of the different types of simulators are as follows:!

    * &Ts 8@T7& +. 8&7T >. C'7& ?. &8758@ ;. 8@7T =. R@5. 87 F. 4'8@T A.8CT3ns

    N"T2ns

    Introduction

    8CT3ns is open source, high $uality, and supports many types of networks.The 8CT3nsis a high!fidelity and e#tensible network simulator and emulator capable of simulating various protocols

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    12/24

    used in both wired and wireless &' networks. &ts core technology is based on the novel kernel re!enteringmethodology invented by 'rof. 7.L. Wang -*, +0 when he was pursuing his 'h.6. degree at arvard3niversity. 6ue to this novel methodology, 8CT3ns provides many uni$ue advantages that cannot beeasily achieved by traditional network simulators such as ns!+ ->0 and 4'8@T -?0.

    5fter obtaining his 'h.6. degree from arvard 3niversity in 7eptember *AAA, 'rof. 7.L. Wangreturned to Taiwan and became an assistant professor in the 6epartment of Computer 7cience and&nformation @ngineering, Nationa "#iao Tun! 2niversity 08CT3", Taiwan, where he founded his8etwork and 7ystem aboratory.X 7ince that time, 'rof. 7.L. Wang has been leading and working withhis students to design and implement 8CT3ns (the 8CT3 8etwork 7imulator" for more than five years.

    Saient features of N"T2ns

    The 8CT3ns network simulator and emulator has many useful features listed as follows:

    λ &t can be used as an emulator. 5n e#ternal host in the real world can e#change packets (e.g., set

    up a TC' connection" with nodes (e.g., host, router, or mobile station" in a network simulated by

    8CT3ns. Two e#ternal hosts in the real world can also e#change their packets via a networksimulated by 8CT3ns. This feature is very useful as the function and performance of real!worlddevices can be tested under various simulated network conditions.

    λ &t directly uses the real!life inu# Ns TC'2&' protocol stack to generate high!fidelity simulationresults. )y using a novel kernel re!entering simulation methodology, a real!life 38&< (e.g., inu#"kernelNs protocol stack can be directly used to generate high!fidelity simulation results.

    λ &t can use any real!life e#isting or to!be!developed 38&< application program as a traffic generatorprogram without any modification. 5ny real!life program can be run on a simulated network togenerate network traffic. This enables a researcher to test the functionality and performance of a

    distributed application or system under various network conditions. 5nother important advantage ofthis feature is that application programs developed during simulation studies can be directly moved toand used on real!world 38&< machines after simulation studies are finished. This eliminates the timeand effort re$uired to port a simulation prototype to a real!world implementation if traditionalnetwork simulators are used.

    λ &t can use any real!life 38&< network configuration and monitoring tools. Dor e#ample, the 38&<route, ifconfig, netstat, tcpdump, traceroute commands can be run on a simulated network toconfigure or monitor the simulated network.

    λ &n 8CT3ns, the setup and usage of a simulated network and application programs are e#actly thesame as those used in real!world &' networks. Dor e#ample, each layer!> interface has an &' addressassigned to it and application programs directly use these &' addresses to communicate with eachother. Dor this reason, any person who is familiar with real!world &' networks can easily learn andoperate 8CT3ns in a few minutes. Dor the same reason, 8CT3ns can be used as an educational toolto teach students how to configure and operate a real!world network.

    λ &t can simulate fi#ed &nternet, Wireless 58s, mobile ad hoc (sensor" networks, 9'R7 networks, andoptical networks. 5 wired network is composed of fi#ed nodes and point!to!point links. Traditionalcircuit!switching optical networks and more advanced 4ptical )urst 7witching (4)7" networks are

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    13/24

    also supported. 5 wireless networks is composed of &@@@ F%+.** (b" mobile nodes and access points(both the ad!hoc mode and infra!structure mode are supported". 9'R7 cellular networks are alsosupported.

    λ &t can simulate various networking devices. Dor e#ample, @thernet hubs, switches, routers, hosts,

    &@@@ F%+.** (b" wireless stations and access points, W58 (for purposelydelaying2dropping2reordering packets", Wall (wireless signal obstacle", 9'R7 base station, 9'R7phone, 9'R7 9978, 9'R7 7978, optical circuit switch, optical burst switch, Eo7 6iff7erv interiorand boundary routers, etc.

    λ &t can simulate various protocols. Dor e#ample, &@@@ F%+.> C752C6 5C, &@@@ F%+.** (b"C752C5 5C, learning bridge protocol, spanning tree protocol, &', obile &', 6iffserv (Eo7",R&', 47'D, 36', TC', RT'2RTC'276', TT', DT', Telnet, etc.

    λ &ts simulation speed is high. )y combining the kernel re!entering methodology with the discrete!event simulation methodology, a simulation Uob can be finished $uickly.

    λ &ts simulation results are repeatable. &f the chosen random number seed for a simulation case is fi#ed,the simulation results of a case are the same across different simulation runs even though there aresome other activities (e.g., disk &24" occurring on the simulation machine.

    *. &t provides a highly integrated and professional 93& environment. This 93& can help a user (*" drawnetwork topologies, (+" configure the protocol modules used inside a node, (>" specify the movingpaths of mobile nodes, (?" plot network performance graphs, (;" playing back the animation of alogged packet transfer trace, etc. 5ll these operations can be easily and intuitively done with the 93&.

    *" &ts simulation engine adopts an open!system architecture and is open source. )y using a set of

    module 5'&s provided by the simulation engine, a protocol module writer can easily implement his(her" protocol and integrate it into the simulation engine. 8CT3ns uses a simple but effective synta#to describe the settings and configurations of a simulation Uob. These descriptions are generated bythe 93& and stored in a suite of files. 8ormally the 93& will automatically transfer these files to thesimulation engine for e#ecution. owever, if a researcher wants to try his (her" novel device ornetwork configurations that the current 93& does not support, he (she" can totally bypass the 93& andgenerate the suite of description files by himself (herself" using any te#t editor (or script program".The non!93&!generated suite of files can then be manually fed to the simulation engine for e#ecution

    . &t supports remote and concurrent simulations. 8CT3ns adopts a distributed architecture. The 93&and simulation engine are separately implemented and use the client!server model to communicate.Therefore, a remote user using the 93& program can remotely submit his (her" simulation Uob to aserver running the simulation engine. The server will run the submitted simulation Uob and later returnthe results back to the remote 93& program for analyIes. This scheme can easily support the cluster!computing model in which multiple simulation Uobs are performed in parallel on different servermachines. This can increase the total simulation throughput.

    * &t supports more realistic wireless signal propagation models. &n addition to providing the simple(transmission range Z +;% m, interference range Z ;;% m" model that is commonly used in the ns!+,8CT3ns provides a more realistic model in which a received bitNs )@R is calculated based on the

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    14/24

    used modulation scheme, the bitNs received power level, and the noise power level around thereceiver. arge!scale path loss and small!scale fading effects are also simulated.

    4ETTIN4 STARTE3

    Settin! u% t#e environment 5 user using the 8CT3ns in single machine mode, needs to do the following steps before he2she

    starts the 93& program: 

    *. 7tart up the dispatcher on terminal *.

    +. 7tart up the coordinator on terminal +.

    >. 7tart up the nctunsclient on terminal >.

    5fter the above steps are followed, the starting screen of 8CT3ns disappears and the user is presentedwith the working window.

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    15/24

    EXPERIMENT '

    Aim: Simuate a t#ree5node %oint5to5%oint networ wit# a du%ex in 6etween t#em7 Set t#e

    8ueue si9e and vary t#e 6andwidt# and find t#e num6er of %acets dro%%ed7

    T#eory:

    STEPS:7tep*: Create a topology as shown in the below figure.

    7tep +: 7elect the hub icon on the toolbar and drag it onto the working window.

    7tep >: 7elect the host icon on the toolbar and drag it onto the working window. Repeat this for another host icon.

    7tep ?: 7elect the link icon on the toolbar and drag it on the screen from host (node *" to the hub andagain from host(node +" to the hub. ere the hub acts as node > in the point!to!point network.This leads to the creation of the >!node point!to!point network topology. 7ave this topology as a.tpl file.

    7tep ;:6ouble!click on host(node *", a host dialog bo# will open up. Click on Node editor and you cansee the different layers! interface, 5R',D&D4, 5C, TC'63', 'hysical layers. 7elect 5Cand then select full!duple# for switches and routers and half duple# for hubs, and in log7tatistics, select 8umber of 6rop 'ackets, 8umber of Collisions, Throughput of incomingpackets and Throughput of outgoing packets. Then click on 5dd. 5nother dialog bo# pops up.

    Click on the Command bo# and type the following Command. 

    stcp Vp >%%% Vl *%+? *.%.*.+ click ok.ere, *.%.*.+ is &' address of the host + (8ode +", and >%%% is the port 8o.

    7tep =: 6ouble!click on host (node +", and follow the same step as above with only change in commandaccording to the following synta#:

      rtcp Vp >%%% Vl *%+? and click 4M.

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    16/24

    7tep : Click on the E 6utton (@dit 'roperty" present on the toolbar in order to save the changes made tothe topology. 8ow click on the R 6utton (Run 7imulation". )y doing so a user can

    run2pause2continue2stop2abort2disconnect2reconnect2submit a simulation. 8o simulationsettings

    can be changed in this mode.

    7tep F: 8ow go to Menu5Simuation5Run. @#ecuting this command will submit the current7imulation Uob to one available simulation server managed by the dispatcher. When thesimulation server is e#ecuting, the user will see the time knot at the bottom of the screen move.The time knot reflects the current virtual time (progress" of the simulation case.

    7tep A: 5fter the simulation is completed, click on the play button and mean while plot the graphs of thedrop packets and through put input and through put output. These log files are created infiename7resuts folder.

    7tep *%. 8ow click on the link (connecting the hub and host+" and change the bandwidth say, A bps, and run the simulation and compare the two results.

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    17/24

    EXPERIMENT (

    Aim: Simuate a four5node %oint5to5%oint networ and connect t#e in as foows: A%%y a T"Pa!ent 6etween n/ to n' and a%%y a 23P a!ent 6etween n1 and n'7 A%%y reevant a%%icationsover T"P and 23P a!ents c#an!in! t#e %arameters and determine t#e num6er of %acets sent 6ytwo a!ents7

    T#eory:

    STEPS:7tep*: Create a topology as shown in the below figure.

    7tep +: 7elect > 8odes (*,+,>" and connect them using a hub(?" as shown in above.7tep >: 9o to edit mode and save the topology.

    7tep ? a : 6ouble click on host (8ode *" and goto node editor; and click on 5C F%+> and put a check on the Throughput of 4utgoing 'ackets. Click ok. Then click on A33 and type the following command.

    stcp Vp >%%% Vl *%+? *.%.*.> and click 4Mere *.%.*.> is the &' address of the ost > (Receiver" and >%%% is the port no.

    7tep ? b : 6ouble!click on host (node +", and follow the same step as above with only change in command according to the following synta#:

     stg Vu *%+? *%% *.%.*.> and click 4M

    ere, *.%.*.> is Receiver &' and *%% is the bandwidth. This forms the 36' connection.7tep ;: 6ouble!click on host (node >", and follow the same step as above and check on Throughput of

     &ncoming 'ackets. 5nd type the following commands:rtcp Vp >%%% Vl *%+? click ok ( for TC'"rtg Vu Vw log* click ok ( for 36'"

    ere, w is bandwidth and log* is the name of the file.

    7tep =: Click R

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    18/24

    Throughput &nput and Throughput 4utput. These log files are created in fiename7resuts folder. 

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    19/24

    EXPERIMENT )

    Aim: Simuate t#e different ty%es of Internet traffic suc# as =TP; TELNET over a networ and  Anay9e t#e t#rou!#%ut7

    T#eory:STEPS :7tep*: Create a topology as shown in the below figure.

    7tep +: 7elect > 8odes (*,+,>" and connect them using a hub(?" as shown in above.7tep >: 9o to edit mode and save the topology.7tep ? a : 6ouble click on host (8ode *" and goto node editor, and click on 5C F%+> and put a check

    on the Throughput of 4utgoing 'ackets. Click ok. Then click on add and type the followingcommand.

    stcp Vp +* Vl *%+? *.%.*.> and click 4M

    ere *.%.*.> is the &' address of the ost > (Receiver" and +* is the DT' port no.7tep ? b : 6ouble!click on host (node +", and follow the same step as above with only change in

    command according to the following synta#: 

    stcp Vp +> Vl *%+? *.%.*.> and click 4M

      ere *.%.*.> is the &' address of the ost > (Receiver" and +* is the T@8@T port no.7tep ;: 6ouble!click on host (node >", and follow the same step as above and check on Throughput of

    &ncoming 'ackets. 5nd type the following commands :rtcp Vp +* Vl *%+? click ok ( for DT'"rtcp Vp +> Vl *%+? click ok ( for T@8@T"

    7tep =: Click on R

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    20/24

    EXPERIMENT *

    Aim: Simuate t#e transmission of %in! messa!es over a networ to%oo!y consistin! of * nodesand find t#e num6er of %acets dro%%ed due to con!estion7

    T#eory:

    STEPS:

    7tep*: Create a topology as shown in the below figure.

    7tep +: 7elect = 8odes (*!=" and connect them using a hub(" as shown in above.7tep >: 9o to edit mode and save the topology.7tep ? a : et us say, 8ode* and node = are source and destination. 6ouble click on host (8ode *" and

    goto node editor, and click on 5C F%+> and put a check on the "oision and %acetsdro%%ed. Click ok. Then click on A33 and type the following command.

    stcp Vp >%%% Vl *%+? *.%.*.= click ok.ere *.%.*.= is the &' address of the ost = (Receiver" and >%%% is the port no.

    7tep ? b : 6ouble!click on host (node = ", and follow the same step as above and type the followingcommands:

      rtcp Vp >%%% Vl *%+? and click 4M

    7tep ;: Click on R

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    21/24

    EXPERIMENT +

    Aim: Simuate an Et#ernet LAN usin! N nodes 0*51/$; c#an!e error rate and data rate andcom%are t#rou!#%ut7

    STEPS:7tep*: Create a topology as shown in the below figure.

    7tep +: 7elect = 8odes (*!=" and connect them using a hub(" as shown in above.7tep >: 9o to edit mode and save the topology.7tep ? a : et us say, 8ode* and node = are source and destination. 6ouble click on host (8ode *" and

    goto node editor, and click on 5C F%+> and put a check on the T#rou!#%ut of >ut!oin!Pacets. Click ok. Then click on A33 and type the following command.

    stcp Vp >%%% Vl *%+? *.%.*.=

    ere *.%.*.= is the &' address of the ost = (Receiver" and >%%% is the port no.7tep ? b : 6ouble!click on host (node = ", and follow the same step as above and check on T#rou!#%ut

    >f Incomin! Pacets. 5nd type the following commands: rtcp Vp >%%% Vl *%+?7tep ;: Click on R ut%ut. These log files are created in fiename7resuts

    folder.7tep : Change error rate and data rate in 'hysical layer and then run the simulation again and compare

    the T#rou!#%ut In%ut and T#rou!#%ut >ut%ut of *st and +nd reading.

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    22/24

    EXPERIMENT ,

    Aim: Simuate an Et#ernet LAN usin! N nodes and set muti%e traffic nodes and determinecoisions across different nodes7

    T#eory:

    STEPS :

    7tep*: Create a topology as shown in the below figure.

    7tep +: 7elect = 8odes (*!=" and connect them using a hub(" as shown in above.7tep >: 9o to edit mode and save the topology.7tep ? a : et us say, 8ode* and node = are source and destination. 6ouble click on host (8ode *" and

    goto node editor, and click on 5C F%+> and put a check on the "oision and Pacets3ro%%ed. Click ok. Then click on A33 and type the following command.

    stcp Vp >%%% Vl *%+? *.%.*.=

    ere *.%.*.= is the &' address of the ost = (Receiver" and >%%% is the port no.7tep ? b : 6ouble!click on host (node = ", and follow the same step as above 5nd type the following

    commands: rtcp Vp >%%% Vl *%+?

    7tep ;: Click on R

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    23/24

    EXPERIMENT .

    Aim: Simuate an Et#ernet LAN usin! N nodes and set muti%e traffic nodes and %ot con!estionwindow for different source?destination7

    T#eory:

    STEPS:

    7tep*: Create a topology as shown in the below figure.

    7tep +: 7elect = 8odes (*!=" and connect them using a hub(" as shown in above.7tep >: 9o to edit mode and save the topology.7tep ? a : et us say, 8ode* and node = are source and destination. 6ouble click on host (8ode *" and

    goto node editor, and click on 5C F%+> and put a check on the "oision and Pacets3ro%%ed. Click ok. Then click on A33 and type the following command.

    stcp Vp >%%% Vl *%+? *.%.*.=

    ere *.%.*.= is the &' address of the ost = (Receiver" and >%%% is the port no.7tep ? b : 6ouble!click on host (node = ", and follow the same step as above 5nd type the following

    commands: rtcp Vp >%%% Vl *%+?

    7tep ;: Click on R

  • 8/18/2019 Computer Networks,EC-803, Lab Manual

    24/24