You are on page 1of 3

List of Exercises:

Week 1. Study of different types of Network cables and practically implement the cross-wired
cable and straight through cable using Crimping tool.

Week 2. Study of different Network devices, IP in details.

Week 3. Connect the computers in LAN, Study of basic network commands and network
configuration commands.

Week 4. Study of Network simulator tool and implement IP Address configuration in Network
simulator tool.

Week 5. Configure different network topologies using packet tracer/Network Simulator tool.

Week 6.
a. Write a program to implement the Data link layer framing methods such as
character stuffing and bit stuffing.
b. Write a program to simulate Stop and wait protocol and Sliding Window
Protocols.

Week 7. Write a program to implement on a data set of characters using the three Cyclic
Redundancy Check Polynomials – CRC 12, CRC 16 and CRC-CCIP.

Week 8. Write a program to simulate Carrier Sense Multiple Access/Collision Detection


(CSMA/CD) and Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA).

Week 9. Configure a network using Distance Vector Routing protocol and Link State Routing
protocol using packet tracer tool.

Week 10. Implement Dijkstra’s algorithm to compute the shortest path through a graph.

Week 11.
a. Write a program to implement Client - Server communication for chat using
Transmission Control Protocol (TCP).
b. Using TCP/IP sockets, write a client - server program to make client sending the
file name and the server to send back the contents of the requested file if present.

Week 12. Configure FTP Server on a Linux/Windows machine using a FTP client/SFTP client.
characterize file transfer rate for a cluster of small files 100k each and a video file of
700mb.Use a TFTP client and repeat the experiment.

Week 13. Install Telnet on one of the systems connected by a switch and telnet to it from the
other system. Using Wireshark tool, capture the packets and analyze the TCP 3-way
Handshake for connection establishment and tear down.

Week 14. Using RSA Algorithm Encrypt a Text data and Decrypt the same.
Week 15. Develop a program to implement Ceasar/ Substitution/ Hill cipher techniques.

Sliding Window Protocol Automatic repeat request (ARQ)

#include<stdio.h>
 
int main()
{
    int w,i,f,frames[50];
 
    printf("Enter window size: ");
    scanf("%d",&w);
 
    printf("\nEnter number of frames to transmit: ");
    scanf("%d",&f);
 
    printf("\nEnter %d frames: ",f);
 
    for(i=1;i<=f;i++)
        scanf("%d",&frames[i]);
 
    printf("\nWith sliding window protocol the frames will be sent in the following manner (assuming no
corruption of frames)\n\n");
    printf("After sending %d frames at each stage sender waits for acknowledgement sent by the
receiver\n\n",w);
 
    for(i=1;i<=f;i++)
    {
        if(i%w==0)
        {
            printf("%d\n",frames[i]);
            printf("Acknowledgement of above frames sent is received by sender\n\n");
        }
        else
            printf("%d ",frames[i]);
    }
 
    if(f%w!=0)
        printf("\nAcknowledgement of above frames sent is received by sender\n");
 
    return 0;
}
Output

Enter window size: 3

Enter number of frames to transmit: 5

Enter 5 frames: 12 5 89 4 6

With sliding window protocol the frames will be sent in the following manner (assuming no
corruption of frames)

After sending 3 frames at each stage sender waits for acknowledgement sent by the receiver

12 5 89
Acknowledgement of above frames sent is received by sender

46
Acknowledgement of above frames sent is received by sender

You might also like