Professional Documents
Culture Documents
Network Lab Manual PDF
Network Lab Manual PDF
NNCE
ECE / VI SEM
NETWORKS LAB - LM
LABORATORY MANUAL
FOR IV SEMESTER B.E (ECE)
ACADEMIC YEAR(2013-2014)
(FOR PRIVATE CIRCULATION ONLY)
ANNA UNIVERSITY CHENNAI-600 025
(REGULATION 2008)
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
20 marks
Practical examination =
80 marks
---------------------Total
100 marks
----------------------
=
10 marks
=
5 marks
=
5 marks
----------------------
Total
20 marks
----------------------
UNIVERSITY EXAMINATION
The exam will be conducted for 100 marks. Then the marks will be calculated to 80
marks
Split up of practical examination marks
Aim and Procedure
10 marks
Theory
10 Marks
Diagram
20 Marks
Tabulation
15 Marks
Verification
25 Marks
10 Marks
Viva Voce
10 Marks
-----------------
Total
100 Marks
----------------2
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
LIST OF EXPERIMETS
1. PC to PC Communication
2. Parallel Communication using 8 bit parallel cable
3. Serial communication using RS 232C
4. Ethernet LAN protocol
5. To create scenario and study the performance of CSMA/CD protocol through
simulation
6. Token bus and token ring protocols
7. To create scenario and study the performance of token bus and token ring protocols
through simulation
8. Wireless LAN protocols
9. To create scenario and study the performance of network with CSMA / CA protocol
and compare with CSMA/CD protocols.
3. Implementation and study of stop and wait protocol
4. Implementation and study of Goback-N and selective repeat protocols
5. Implementation of distance vector routing algorithm
6. Implementation of Link state routing algorithm
10.Implementation of Data encryption and decryption
11.Transfer of files from PC to PC using Windows / Unix socket processing
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
S.NO
01
02
LIST OF EXPERIMENTS
Ethernet
Page No
CONTENTS
a. Token Ring
b. Token Bus
03
14
04
17
05
20
21
06
25
07
28
08
09
31
34
10
a. PC to PC communication (Parallel)
b. PC to PC communication (Serial)
40
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 1
Title of the Exercise : ETHERNET
Date of the Exercise :
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
SPECIFICATION
-
INPUT PARAMETERS:
No of nodes
Frame interval
Frame size
Maximum back off time
Error generation
QUANTITY
1
-
: 2 to 4
: 250 ms to 1000ms
: 64 bytes to 1500bytes
: 4 to 32
: 10-9 10-6 and 10-3
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
RESULT:
Thus the performance of Ethernet LAN protocol through simulation and using
trainer kit was verified successfully.
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1.What is Ethernet?
Ethernet is a physical and data link layer technology for local area
networks (LANs).
2.What is meant Data Communication?
Data Communication is a exchange of data between two devices via some
form of transmission medium.
3.What are the fundamental characteristics of data communication?
Delivery:
The system must deliver data to the correct destination.
Accuracy:
The system must deliver data accurately.
Timeliness: The system must deliver data in a timely manner.
4.What are the components used in data communication?
Message, Sender, Receiver, Medium, Protocol.
5.How can you considered data communication ,what are they?
Data communication is considered ,
Local- if the communicating devices are in the same building
Remote Geographical area.
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
INPUT PARAMETER:
No of nodes
Frame Interval
Frame size
Error Generation
SPECIFICATION
-
QUANTITY
1
-
2 to 4
250ms by defeat
512bytes -2048bytes
10-9,10-6 and 10-3
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
RESULT:
Thus the performance of token ring LAN protocol through simulation and using
trainer kit was verified successfully.
10
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
S.NO APPARATUS
1.
PC
2.
LAN Trainerkit
3.
Network simulator
INPUT PARAMETERS:
No of nodes
Frame interval
Frame size
Error generation
SPECIFICATION
-
QUANTITY
1
-
-2 to 4
-250 ms to 1000 ms
-512 bytes to 2,4,8 bytes
-10-9,10-6 and 10-3
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
RESULT:
Thus the performance of token bus LAN protocol through simulation and
using trainer kit was verified successfully.
12
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1. What is token ring?
Token ring local area network (LAN) technology is a local area
network protocol which resides at the data link layer (DLL) of the OSI model. It uses a
special three-byte frame called a token that travels around the ring. Token-possession grants
the possessor permission to transmit on the medium. Token ring frames travel completely
around the loop.
2.What is token bus?
Token bus is a network implementing the token ring protocol over a "virtual
ring" on a coaxial cable. A token is passed around the network nodes and only the node
possessing the token may transmit. If a node doesn't have anything to send, the token is
passed on to the next node on the virtual ring. Each node must know the address of its
neighbour in the ring, so a special protocol is needed to notify the other nodes of connections
to, and disconnections from, the ring.
3.Define networks.
A network is a set of devices connected by media links.
4. Define Communication channels
The links connecting the devices are often called communication channel.
5.What is meant by distributed processing & write any two advantages.
Networks use distributed processing in which a task is divided among
multiple computers.
Advantages: Security, Faster problem sloving, Collaborative processing
13
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 3
Title of the Exercise :WIRELESS LAN PROTOCOL
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
To create scenario and study the performance of wireless LAN protocol through
simulation and verify using LAN trainer kit.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
INPUT PARAMETERS:
No of Nodes
Frame Interval
Frame size
Max. back off time
Error generation
SPECIFICATION
-
QUANTITY
1
-
- 2 to 4
- 250ms to 1000ms
- 128bytes to 1500bytes
- 4 to 32
- 0.01,0.1 and 1.5
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
There is a provision in every node to store the trace window information is the
respective node. They are also stored in excel format.
CONNECT AND DISCONNECT FACILITY:
At any instant one node can be disconnected from the shared medium. And later
whenever it necessary the node can be reconnected.
PAUSE AND RESET FACILITY:
At any time, the simulation can be stopped and can be continued there is reset
option in which the process will stop.
PROCEDURE:
Select 2 nodes and carryout data transfer from one node to another node.
Select 2 nodes and carryout data transfer between two nodes simultaneously and
analyze. Repeat the experiment for packet sizes. Different maximum back off time
and different error generation.
Select 3 nodes and carryout data transfer between the nodes simultaneously and
analyze. Repeat the experiment and changing the input parameter.
Select 4 nodes and do the data transfer when the transfer is going on. Disconnect one
node and observe and record the effect.
RESULT:
Thus the performance of wireless LAN protocol through simulation
and using trainer kit was verified successfully.
15
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1.What is wireless LAN protocol?
IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN)
computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and
maintained by theIEEE LAN/MAN Standards Committee (IEEE 802). The base version of
the standard IEEE 802.11-2007 has had subsequent amendments. These standards provide
the basis for wireless network products using the Wi-Fi brand name.
2.What is meant by Collaborative processing?
Both multiple computer and multiple users may interact on a task.
3.What are the factors that depends on the performance of a network criteria?
Performance of a network depends on a number of factors,
a. Number of users
b.Type of transmission medium
b. Capabilities of the connected hardware d.Efficiency of software
4. Write the application which we are used in data communication?
i. Marketing &Sales
ii. Financial services
iii.Cellular telephone
ivCable television
5.Define protocol.
Protocol is a set of rules that govern data communication.
16
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 4
Title of the Exercise : STOP AND WAIT ARQ PROTOCOL
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
To implement and study the performance of stop and wait protocol through
simulation and LAN trainer kit.
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
SPECIFICATION
-
QUANTITY
1
-
INPUT PARAMETERS
Packet size
: 512B to 2048B
Round trip time:50ms to 150ms
Less Rate
: 0% to 50%
Retransmit time out : 100ms to 1000ms.
NOTE
At the time of giving input parameters it is to be noted that output value given for
retransmit time out parameter should be more than RIT.
TRANSFERING DATA FILE FROM ONE SYSTEM TO ANOTHER SYSTEM
MAINLY in-WAN
In this experiement, there is one sender and one receiver.From the sender file the
system can be opened for transmission.
This can be send to the receiver by using start button .In between there is a
networks.There are trace windows in sender network and receiver and data through
information with the time stamp appears continuously.In networks the error information is
displayed.
At the end of the data transfer result appears with the performance parameters in the
bottom of the page namely payload, transform time throughput and losses.
STORING OF TRANSFERRED FILES AND TRACES.
At any time, the simulation can be stopped and can be continued, reset can be used to
start from the beginning.
17
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
124.416 Kbytes
207.53ms
4.8723kbps
4.7961 kbps
122
RESULT:
Thus the performance of stop and wait protocol through simulation and LAN trainer
kit was verified successfully.
18
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1.
19
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
INPUT PARAMETERS
Window size
Bandwidth
Frame size
Round trip time
Less Rate
Retransmit time out
SPECIFICATION
-
QUANTITY
1
-
:1 to 10 packets
: 5000 kbs to 5000kbps
: 512B to 2048B
:50ms to 500ms
: 0% to 50%
: 100ms to 1000ms.
Dr.NNCE
ECE / VI SEM
Packet size
RTT
Less rate
Retransmission time out
Window size
Bandwidth
:
NETWORKS LAB - LM
1024B
100ms
10%
200ms
:2000kbps
5 Packets
Choose a file and send data down the results.Note down from the trace, when packet error
has occurred and when the time out has stopped happened and what was the next
action.Check whether it follows the selective repeat algorithm
Change the packet size of 2048 bytes
Send the frame file
Note down the results.
Compare the results.
Similarly change the loss rate and compare the result.Give the reason for congestion packet
drop.
VIEWING THE GRAPH AND PRINTING THE GRAPH
In order to view the frame sent Vs time graph.First we have to close the simulator
software.In C: drive inside the simulator directory in the selective repeat directory .The
graph is stored as excel file.In the computer system excel software should be available to
view the graph by opening the file Time frame xls .The graph can be seen and data
derived from the trace can be seen.The graph can be printed in excel software .During the
time out, the packet is resent according to the Go-back n algorithm in the graph.
By reducing the BW and by increasing the window size we will be able to see
congestion packet drop also in the network.
PERFORMANCE
Payload delivered
Simulation time
Throughput
Good Put
Data frame
132.546 Kbytes
51.67ms
20.5981kbps
20.5214kbps
130
RESULT:
Thus the performance of selective ARQ protocol using simulation and LAN trainer
Kit was verified successfully.
21
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
INPUT PARAMETERS
Window size
Bandwidth
Packet size
Round trip time
Loss Rate
Retransmit time out
SPECIFICATION
-
QUANTITY
1
-
:1 to 10 packets
: 500 kbs to 5ms
: 512B to 2048B
:50ms to 500ms
: 0% to 50%
: 100ms to 1000ms.
22
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
1024 bytes
200ms
5 packets
132.546 Kbytes
56.78ms
18.7512kbps
18.675kbps
130
RESULT:
Thus the performance of Go Back N ARQ protocol using simulation and LAN
trainer Kit was verified successfully.
23
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1.
24
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 6
Title of the Exercise : ROUTING ALGORITHMS /
DISTANCE VECTOR ALGORITHM
Date of the Exercise :
OBJECTIVE (AIM) OF THE EXPERIMENT
To Implement and study the distance algorithm
FACILITIES REQUIRED AND PROCEDURE
a) FACILITIES REQUIRED TO DO THE EXPERIMENT:
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
SPECIFICATION
-
QUANTITY
1
-
INPUT PARAMETERS:
Router : 3 to 7
Connectivity between the routers to be given
Weight uncost
Some router to be selected
PROCESS:
The distance vector algorithm is executed initially in Iteration-1, the source router
creates the router table with the distance information of the other router connected to the
neighboring routers.
By using next switch second iteration is done. In the second iteration ,it calculates the
shortest distance to the unconnected notes then the information gathered in the first iteration
and defines the routing table. If there are n routers the n-1 iteration are required to get
shortest distance for all the routers.
The routing table gives us shortest distance for all the routers from the some rout ion
and also information to which router the packet should go next.
PROCEDURE:
Select say 5 routers and draw the connectivity .Input the distance between the routers.
Select source router study the iteration and routing table for each iteration check finally
whether the short distance is calculated and correct next.
Keep the layout as is change for distance between the routers, the creation and for
each operation study and check and verify the result at the end. Keep the layout as it is
change the source router and do the experiments verify the result at the end. Do the different
configuration and do iteration and verify the results.
25
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
RESULT:
Thus the implementation and performance of distance vector algorithm was
verified successfully.
26
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1.
27
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Exercise Number : 7
Title of the Exercise :
Date of the Exercise :
S.NO
APPARATUS
1.
PC
2.
LAN Trainerkit
3.
Network simulator
INPUT PARAMETERSS:
SPECIFICATION QUANTITY
1
-
Router : 3 to 7
Connectivity between the routers to be given
Weight uncost or distance between routers number 1 to 10
Source router to be selected.
PROCESS:
The link state algorithm is executed .There are parent group and transitive group.
Initially in iteration the source router is an parent group and all the directly connected routers
are in the transitive group and router table is created.
By using next switch 2nd Iteration is done .In what iteration the short distance
neighboring router is taken into parent group and the routers associated with the particular
router are placed in the transitive group and routing table is connected. In this way of there n
routers available. The n number of iteration is required to find the shortest distance in this
method.
Finally the routing table sizes the shortest distance for all routers from the source
routers and also information to which router the packet should go next.
PROCEDURE:
Select say to routers and draw the connectivity Input the distance between the routers
select some router study the iteration and routing table every time created.
Check finally whether the short distance is calculated and correct next best loop.
Keep the layout as it is change the distance vector between the routers.
Do the iteration and for each iteration study and check verify the result at the end
Do the different configuration and do iteration and verify the results.
28
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
RESULT:
Thus the implementation and performance of link state vector algorithm was
verified successfully.
29
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1. What is link state algorithm?
The basic concept of link-state routing is that every node constructs a map of
the connectivity to the network, in the form of a graph, showing which nodes are
connected to which other nodes. Each node then independently calculates the next
best logical path from it to every possible destination in the network. The collection
of best paths will then form the node's routing table.
2. List out the services provided by the network layer.
The network layer is responsible for the source-to-destination delivery of a packet
possibly across multiple networks specific responsibility of a network layer includes the
following.
a. logical addressing b.Routing.
3. What is a virtual circuit?
A logical circuit made between the sending and receiving computer. The
connection is made after both computers do handshaking. after the connection; all
packets follow the same route and arrive in sequence.
4. What are datagrams?
In datagram approach, each packet is treated independently from all others. Even
when one packet represents just a place of a multipacket transmission, the networks treat
if as though it existed alone. Packets in this technology are referred to as datagrams.
30
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
SPECIFICATION QUANTITY
1
-
INPUT PARAMETERS:
Input font to be given.
Shift no. of bits to be given.
PROCESS:
The shifting algorithm is executed at the time of encryption.
At the time of decryption, again shifting algorithm is executed.
PROCEDURE:
Enter the font is the text box available.
Give the Shifting index and use shift key.
Encryption message appears in the window.
When re-shift key is used re-shift algorithm is used with encrypted message and reshifted message is displayed.
RESULT:
Thus the performance of data encryption and decryption was verified successfully.
31
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
S.NO
1.
2.
3.
APPARATUS
PC
LAN Trainerkit
Network simulator
SPECIFICATION QUANTITY
1
-
INPUT PARAMETERS:
RESULT:
Thus the performance of data encryption and decryption using RSA algorithm was
verified successfully.
32
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1. What is meant by congestion?
Congestion in a network occurs if user sends data into the network at a rate
greater than that allowed by network resources.
2. Why the congestion occur in a network?
Congestion occurs because the switches in a network have a limited buffer
size to store arrived packets before processing.
3. What is data encryption ?
Data encryption refers to mathematical calculations and algorithmic schemes
that transform plaintext into cyphertext, a form that is non-readable to unauthorized
parties. The recipient of an encrypted message uses a key which triggers the algorithm
mechanism to decrypt the data, transforming it to the original plaintext version.
4.What is RSA algorithm?
An public-key encryption technology developed by RSA Data Security, Inc.
The acronym stands for Rivest, Shamir, and Adelman, the inventors of the technique.
The RSA algorithm is based on the fact that there is no efficient way to factor very
large numbers. Deducing an RSA key, therefore, requires an extraordinary amount of
computer processing power and time.The RSA algorithm has become the de facto
standard for industrial-strengthencryption, especially for data sent over the Internet.
5. What is the function of FECN?
The FECN bit is used to warn the receiver of congestion in the network. The
sender and receiver are communication with each other and are using some type of flow
control at a higher level.
33
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
S.NO
APPARATUS
1.
PC
2.
Network simulator
INPUT PARAMETERS:
Client ID IP address
Server ID- IP address
SPECIFICATION QUANTITY
2
-
PROCESS:
In the experiment at the time of connecting the client to the server communication
pipe namely socket is created. The socket is characterized by 4 parameters.
1. Server IP
2. Client IP
3. Local port number 80
4. Remote port number.
When the client sends the connect request to the server, it generates a 16 bit random and
send it as port no.
As for as the server is connected this port no. is remote port no. Once the socket is
created , the client can send the request to the server and set the file log is created in the
server.
PROCEDURE:
The client IP address is entered.
Then the server address is entered and activated.
Then in the client side , to connect to the server address is entered and the connect
switch is used to connect the client to the server.
Now the socket is created and the connection is made and log is given in the server.
Then the user can send the request to the server by typing #netline.com / index.html
and press go button.
How the request gives to server responds .It access the file namely index.html file and
transfer it to the client .Then the client hypertext made up language ,file and units.
There is an interaction between the server and the client the server sends the file to
the client and in the client window, the context of the file is displayed.
34
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
There is an interaction between the server and the client the server sends the file to
the client and in the client window, the context of the file is displayed.
The user can disconnect the client and server also. In the server side log is generated
to every activity.
The simulation is reused. In the simulation directory in C: drive the html file is
opened. In notepad and the content is altered and saved.
Again the same application is run.
It is to be verified that the modified context is appearing in the client window
RESULT:
Thus the function of PC to PC file transfer protocol HTTP web browsing was
verified successfully.
35
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
S.NO
1.
2.
APPARATUS
PC
Network simulator
SPECIFICATION QUANTITY
-
INPUT PARAMETERS:
Client IDIP address
Server ID- IP address
PROCESS:
In the experiment at the time of connecting the client to the server (It generally)
communication pipe namely socket is created. The socket is characterized by 4 parameters.
1. Server IP
2. Client IP
3. Local port number 80
4. Remote port number.
When the client sends the connect request to the server, it generates a 16 bit random which
lies between 1024 and 65.536 and send it as port no.
As for as the server is connected this port no. is remote port no.
In the FTP operation ,2 sockets are generated .They are control socket and data sockets.
Once the socket is created , the client can send the request to the server and set the file log is
created in the server.
RESULT:
Thus the performance of File transfer protocol was verified successfully.
36
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
STOP E-MAIL
S.NO
1.
2.
APPARATUS
PC
Network simulator
SPECIFICATION QUANTITY
-
INPUT PARAMETERS:
Client IDIP address
Server ID- IP address
PROCESS:
In the experiment at the time of connecting the client to the server (It generally)
communication pipe namely socket is created. The socket is characterized by 4 parameters.
1. Server IP
2. Client IP
3. Local port number 80
4. Remote port number.
When the client sends the connect request to the server, it generates a 16 bit random which
lies between 1024 and 65.536 and send it as port no.
As for as the server is connected this port no. is remote port no.
In the e-mail operation 2 socket are generated. They are control socket and data socket.
Once the socket is created, the client can send the request to the server and set the file
log is created in the server and get the file.
PROCEDURE:
user is supposed to given client IP address and server address in server. Then in
the client configuration window. The server address is address to be given and
connect button is to be used.
Now the control socket and data socket are created.
Then the user can send the request to the server by typing admin@netline.com
and progress go button.
The content in the client window is taken as the message for the mail.
The mail reaches the mail box of the user.
The user IP address 132.168.11 can check email by using check mail key.
37
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
Then the user systems interact with the server and of there any mail it gives as
message that user has got a mail.
The content of the mail is also displayed in the user window.
RESULT:
Thus the performance of stop E-mail was verified successfully.
38
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1. Define FTP.
File transfer protocol is the standard mechanism provided by the TCP/IP for
copying a file one host to another. Transferring files from one computer to another is one of
the most common takes expected from a networking or internetworking environment.
2. How does FTP differ from other client server applications?
FTP differs from other client server applications in that it establishes two
connections between the hosts. One connection is used for data transfer and other for
control information.
3. What is SMTP?
The TCP/IP protocol supports electronic mail on the internet is called Simple mail
transfer protocol. It is a system for sending messages to other computer users based on email addresses.
4.What is Http?
The Hypertext Transfer Protocol is a protocol used mainly to access data on the
World Wide Web. The protocol transfer data in the form of plaintext, hypertext, audio,
and video and so on.
5.How does HTTP differ from SMTP?
a. HTTP differs from SMTP in the way the messages are sent from the client to
the server and from the server to the client.
b. Unlike SMTP, the HTTP messages are not destined to be read by humans.
c. HTTP messages are delivered immediately.
6. Relate HTTP and FTP.
HTTP is similar to FTP, because it transfers files and uses the services of TCP.
However it is much simpler than FTP, because HTTP uses only one TCP connection.
There is not a separate control connection.
39
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
S.NO
1.
2.
3.
APPARATUS
PC
Network simulator
Parallel trainer kit
SPECIFICATION QUANTITY
2
2
DESCRIPTION
The main aim of the experiement is to transfer a file from PC to another PC using
parallel port.The interface between the PCs is done through the parallel port(Lpt) in the PC,
a male to male a 25 pin D-type connection is used to connect together.The parallel port is
configure to run in bi-directional mode.The data links D0-D8 are used to readline a type of
data.The connect line STROBE and status link.ACK make the handshaking signal.The
Digital data pin are connected directly to the 74LS244 bidirectional buffer..The output of the
buffer is connected to the datalines of the parallel port.
OPERATION
The data bytes to the transmitted is placed on the data register(0*378)
The control PIN STORE is made low to indicate a valid data on the data bus.
The receiver PC wait for the status pin FCK to go high.
Once the ACK pin goes high the data in the data register is read.
The receiver PC then acknowledges by giving a pulse can be set by user.
This Handshaking sequence is repeated for every byte until the end of the life.
40
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
PROCEDURE
Connect one end of the 25Pin n-type male and male connector to the parallel port of
your PC (LPT) signal.
Connect end to be 25 pin n-type female connector of the PC to PC communication.
Repeat the step1 and step2 with order.
Connect the STROBE pin of system 1 to the ACK pin of System 2 in the trainer kit.
Connect datapins D0-D7 of System1 to pins D0-D7 System2.
Common the ground terminals
Run Parallel 1 in both the PCs.
PC TRANSMITTING SYSTEM:
Select the file to be sent in the PC from which you want to transfer file.
FOR RECEIVING SYSTEM
Set the transmission rate.The user can choose the present rate it Choose Delay
option is selected or can assign only rate from 1 to 100ns it user Delay option is selected.
Select the path for the file to be stored.
NOTE:
The reactive file or receive files button is disable control the file path for the
receiving file is selected.
Click Send file button is the transmitting PC.
Clock Receive file Button in the receiver PC.
File through transfer Completer message appears both in the transmitter and
receiver PC once the transfer is complete.
The file is complete will be displayed on the textbook in the receiver PC.
Clock Clear button to clear the contents in the text Box.
Repeat all the above steps to send a new file.
RESULT:
Thus the performance of transfer a file from PC to another PC using parallel
port was verified successfully.
41
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
S.NO
1.
2.
3.
APPARATUS
PC
Network simulator
Parallel trainer kit
SPECIFICATION QUANTITY
2
2
PROCEDURE
Connect one end of the Pin n-type female to female connector to the serial port of
your PC signal.
Connect other end to the 9 pin n-type for female connector of the PC to PC
communication trainer.
Repeat the step1 and step2 with other PC system2.
Connect RXD pin of System1 to find pin of System 2
Connect RXD pin of System2 to TXD pin of System 1
Connect MXR pin of System2 to NSR pin of System 2
Connect RTS pin of System1 to MS pin of System 2
Connect RTS pin of System2 to MS pin of System 1
Common the ground terminals
Run Serial 1 in both the PCs.
Select the common terminal and Band rate.
42
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
NOTE:
Band rate selected should be same for both the PCs
Click set Serial-port button successively change message appears.
The status of the CTS pin will read nodal in both receiver and transmitter.
Clock RTS button in the transmitting Pc and receiver Pc.
The status of the CTS pin will read ok in both receiver an transmitter.
The status of the ASR pin will read ok in both receiver an transmitter.
Type the message to be transmitted in the text box.
Click Transmit button to transmit in the typed context.
Click CLR SCREEN button to clear the text box.
TO TRANSMIT A FILE
Type the message in the text box.
Type the file Port with name to which context to be written.
Click the WRITE-SCREEN-TO FILE button to the write context.
Click the READ-FILE-TO-SCREEN button to read context of the file.
Clock Transmit file button to transmit in the context.
NOTE
The tranmitted file content will be stored in the path given in the receiving PC.
Click CLR SCREEN to repeat the process.
Click STOP button to exit.
RESULT:
Thus the performance of transfer a file from PC to another PC using serial
port was verified successfully.
43
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
VIVA QUESTIONS:
1. What is parallel communication?
parallel communication is a method of sending several data signals simultaneously
over several parallel channels. It contrasts with serial communication; this distinction is one
way of characterizing a communications link.
2. What is serial communication?
serial communication is the process of sending data one bit at a time, sequentially,
over a communication channel or computer bus. This is in contrast to parallel
communication, where several bits are sent as a whole, on a link with several parallel
channels. Serial communication is used for all long-haul communication and most computer
networks, where the cost of cable and synchronization difficulties make parallel
communication impractical.
3. Define DNS?
System that can map a name to an address and conversely an address to a name.
In TCP/IP, this is the domain name system.
4. Name different sections used in internet DNS.
a. Generic domain b. Country domain c. Inverse domain
5. What does a generic domain define?
The generic domains define registered hosts according to their generic behaviour.
6. Mentions the usage of inverse domain.
a. Inverse domain is used to map an address to a name.
b. To determine if the client is on the authorized list , it can send a query to the
DNS server and ask for the mapping of address to name.
44
Dr.NNCE
ECE / VI SEM
NETWORKS LAB - LM
QUESTION BANK
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
45