B.M.S College of Engineering: "CCN Cycle-1 Experiments"
B.M.S College of Engineering: "CCN Cycle-1 Experiments"
B.M.S College of Engineering: "CCN Cycle-1 Experiments"
S COLLEGE OF
ENGINEERING
Bull Temple Road, Basavanagudi, Bangalore - 560 019, Karnataka, India
LABORATORY REPORT
ON
Submitted by
R.NITHYASREE
1BM12EC099
G.POORNIMA
ASSISTANT PROFESSOR
2015 – 16
1
INDEX
1. Configure network with the following topologies and analyze i) BUS ii) RING iii)
Fully connected mesh topology, disable a node in each of the topologies and find the
changes.
2. Simulate Ethernet LAN with 4 nodes , apply relevant TCP and UDP applications and
determine
i) The number of data packets sent by UDP and TCP
ii) Average jitter of UDP and TCP
iii) Number of periodic updates sent by the routing algorithm
iv) Number of ACK packets sent
3. Simulate a network of N nodes with point to point connection; apply TCP and UDP
applications vary the queue size and bandwidth and find
i) Number of packets dropped due to queue overflow
ii) Average hop count for data packets
iii) Average delay and jitter.
iv) Apply FTP and TELNET traffic between the nodes of the above network and
analyze the throughput.
4. Simulate Ethernet LAN with N nodes , configure multicast traffic and Determine
i) The total multicast data bytes received
ii)Total multicast data bytes transmitted
iii)Multicast average delay at the transport layer for UDP
iv)Packets sent by DVMRP
v)Neighbors for every node as determined by DVMRP
vi)packets dropped due to expired TTL
vii)Packets dropped due to no route.
5. Apply multiple UDP and TCP applications between any 2 nodes of N (N=4)node
Ethernet LAN and compare it with experiment number 4.(compare multiple unicast
with multicast )
6. Simulate a wireless ad hoc network apply relevant TCP and UDP applications
between any 2 nodes and determine
i) Number of packets dropped due to retransmission limit
ii) Number of CTS packets sent by the node
iii) Number of RTS packets sent and ACK packets sent by the node
iv) Determine the number of RTS retransmission due to timeout
v) Packet retransmission due to ACK time out
2
vi) Signals received with error
7. Simulate a network having 2 LANs connected by a switch. Apply relevant TCP and
UDP applications between nodes across the LANS (send data from a node in one
LAN to a node in another LAN) and determine application layer, transport layer,
network layer and MAC layer parameters.
8. Simulate a network with the topology as shown in the figure, apply TCP and UDP
applications between nodes shown in the figure. Modify the network to make
communication happen between node 1 and 9 and node 6 and 16
9. Configure a network of 5 routers with point to point connection. Apply RIP and OSPF
routing algorithms and compare.
10. Simulate a wireless infrastructure network with 6 nodes and analyze
11. Configure a wired network with 4 nodes and wireless infrastructure network with 4
nodes apply relevant TCP and UDP applications from a node in wired network to a
node in wireless network and analyze
12. a. Simulate wireless ad hoc network with 6 nodes give mobility to a node and analyze
b. give mobility to all the nodes.
3
1. Configure network with the following topologies and analyze i) BUS ii) RING iii)
Fully connected mesh topology, disable a node in each of the topologies and find
the changes.
4
ii) RING topology
5
Node 2 deactivated:
6
2. Simulate Ethernet LAN with 4 nodes , apply relevant TCP and UDP applications
and determine
7
i) The number of data packets sent by UDP and TCP:
8
TCP data packets:
10
iii) Number of periodic updates sent by the routing algorithm:
11
IMPORTANT DEFINITIONS:
To find the data packets sent and average jitter we used CBR for UDP application and
similarly TELNET for TCP application. UDP traffic is one-way and does not incur reverse
channel contention as TCP does. Our measurements show a maximum throughput for UDP
traffic, across a range of packet sizes. This is approximately double the maximum
throughput of TCP traffic. The jitter of a packet stream is defined as the mean deviation of
the difference in packet spacing at the receiver compared to the sender, for a pair of packets
and the average jitter for is simply the average value over n packets. We see that higher
transmission rates cause the jitter to increase. In case of ACK packets sent, only TCP has
ACK segments i.e. handshake etc. whereas in UDP there is no ACK segments since it is a
connectionless protocol.
12
3. Simulate a network of N nodes with point to point connection; apply TCP and
UDP applications vary the queue size and bandwidth and find
i) Number of packets dropped due to queue overflow
ii) Average hop count for data packets
iii) Average delay and jitter.
iv)Apply FTP and TELNET traffic between the nodes of the above network and
analyze the throughput.
13
i) Number of packets dropped due to queue overflow:
14
ii) Average hop count for data packets:
15
Node-4: 0.0012 s
Node-5: 0.0012 s
16
Node-4: 3.25x(e^-6) s
Node-5: 4.5x(e^-6) s
IMPORTANT DEFINITONS:
When a network of N nodes are connected point to point by applying TCP and UDP
applications we get above observed statistics with varying size in queue and bandwidth. And
same as the above inference except in changing the bandwidth to avoid congestion and queue
size is varied because in order to focus on the issues related to varying delay in a wireless
network.
17
4. Simulate Ethernet LAN with N nodes, configure multicast traffic and Determine
i) The total multicast data bytes received
ii) Total multicast data bytes transmitted
iii) Multicast average delay at the transport layer for UDP
iv) Packets sent by DVMRP
v) Neighbors for every node as determined by DVMRP
vi)Packets dropped due to expired TTL
vii)Packets dropped due to no route.
18
ii) Total multicast data bytes transmitted:
19
iv) Packets sent by DVMRP:
INFERENCE: Neighbours for every node 5 neighbours for every node in the
network as determined by DVMRP.
20
vi) packets dropped due to expired TTL:
21
IMPORTANT DEFINITIONS:
In Ethernet, the MAC sub layer governs the operation of the access method. Also frames the
data received from the upper layer and passes them to the physical layer. The multicast traffic
is a logical identifier for a group of hosts in a computer network, that are available to process
datagrams or frames intended to be multicast for a designated network service. The number
of frames received, sent and discarded are observed through the statistics.
5. Apply multiple UDP and TCP applications between any 2 nodes of N (N=4)node
Ethernet LAN and compare it with experiment number 4.(compare multiple unicast
with multicast).
SOLUTION: The graphs will be similar to the experiment 4 except with the slight
difference in the outputs and bandwidth of the nodes.
22
6. Simulate a wireless ad hoc network apply relevant TCP and UDP applications between
any 2 nodes and determine
i) Number of packets dropped due to retransmission limit
ii) Number of CTS packets sent by the node
iii) Number of RTS packets sent and ACK packets sent by the node
iv) Determine the number of RTS retransmission due to timeout
v) Packet retransmission due to ACK time out
vi) Signals received with error.
SOLUTION:
23
i) Number of packets dropped due to retransmission limit:
ii) Number of RTS packets sent and ACK packets sent by the node:
24
INFERENCE: Nodes 3 and 4: 28 RTS packets sent.
25
v) Signals received with error:
IMPORTANT DEFINITIONS:
A wireless ad hoc network (WANET) is a decentralized type of wireless network. The
network is ad hoc because it does not rely on a pre-existing infrastructure, such as routers in
wired networks or access points in managed (infrastructure) wireless networks. The number
of packets received and sent using TCP and UDP applications are more than the normal
wired network.
26
7. Simulate a network having 2 LANs connected by a switch. Apply relevant TCP and UDP
applications between nodes across the LANS (send data from a node in one LAN to a node in
another LAN) and determine application layer, transport layer, network layer and MAC layer
parameters.
SOLUTION:
27
INFERENCE: At node1: 12,000 unicast data bytes received.
28
INFERENCE: At node 8: 110 bytes received.
29
INFERENCE: At all nodes: 1.58x(e^-5) seconds.
30
INFERENCE: Average Jitter in seconds having different values at different node IDs
31
INFERENCE: At nodes 3 and 5: 24 unicast data segments sent from the transport layer.
32
8. Simulate a network with the topology as shown in the figure, apply TCP and UDP
applications between nodes shown in the figure. Modify the network to make
communication happen between node 1 and 9 and node 6 and 16.
SOLUTION:
33
INFERENCE:
The above network is the modified one with respect to the given network in the question. To
make communication between node 1and 9 and node 6 and 16, we use a node between two
networks configure it as a router connect to the switches.
34
9. Configure a network of 5 routers with point to point connection. Apply RIP and OSPF
routing algorithms and compare.
SOLUTION:
35
INFERENCE: Select a routing algorithm RIP and OSPFv2.
36
At node-2: 3000 packets sent
At node-3: 6000 packets sent
At node-4: 9000 packets sent
At node-5: 3000 packets sent
At node-6: 9000 packets sent
IMPORTANT DEFINITIONS:
RIP is a distance vector protocol which advertises network updates periodically; in RIP, the
advertisements are sent every 30 seconds, and it too triggers updates when a change in network
happens. It uses hop counts to calculate the metric value, which determines the best path to
reach a network. RIP supports maximum of 15 routers, and 16th hop is considered unreachable.
So, RIP can be used efficiently in small networks only.
OSPF is widely used as an Interior Gateway Protocol. After gathering information from
available routers it constructs a topology map of a network. OSPF communicate using areas;
they form neighbour relationship with routers in the same autonomous system first. OSPF
maintains routing table, neighbour table, and database table.
37
10. Simulate a wireless infrastructure network with 6 nodes and analyse.
SOLUTION:
METHOD:
1. Select the subnet.
2. Set station type to active
3. To set a node as an access point:
a. Select the node
b. From properties select ‘interface0”
c. Select MAC layer and set the access point field as yes.
IMPORTANT DEFINITIONS:
In infrastructure mode, a base station acts as a wireless access point hub, and nodes
communicate through the hub. The hub usually, but not always, has a wired or fibre network
connection, and may have permanent wireless connections to other nodes.
Wireless access points are usually fixed, and provide service to their client nodes within range.
Wireless clients, such as laptops, smart phones etc. connect to the access point to join the
network.
Sometimes a network will have a multiple access points, with the same 'SSID' and security
arrangement. In that case connecting to any access point on that network joins the client to the
network. In that case, the client software will try to choose the access point to try to give the
best service, such as the access point with the strongest signal.
38
11. Configure a wired network with 4 nodes and wireless infrastructure network with 4 nodes
apply relevant TCP and UDP applications from a node in wired network to a node in wireless
network and analyse.
SOLUTION:
INFERENCE: A wired network and a wireless network each with 4 nodes. TCP and UDP
applications between nodes of the two networks.
IMPORTANT DEFINITIONS:
Wired LAN offers better performance as compared to wireless networks. Wired network can
offer 100Mpbs bandwidth using Fast Ethernet technology. Ethernet cables, switches are used
in wired network are reliable. Security considerations for a wired network connected to the
internet are firewalls. With application of TCP and UDP the wired network and wireless
infrastructure works the same way when they operate individually.
39
12. a. Simulate wireless ad hoc network with 6 nodes give mobility to a node and analyse.
b. Give mobility to all the nodes.
SOLUTION:
40
INFERENCE: Setting mobility to the nodes- accessing mobility model.
IMPORTANT DEFINITIONS:
The fact that nodes move is probably the most important attribute of WANETs. Mobility
differentiates WANETs from their close cousins, the sensor networks. Mobility dictates
network and application level protocols. For example, rapid deployment in unexplored areas
with no infrastructure may require that some of the nodes form scouting teams/swarms. These
in turn coordinate among themselves to create a task force or a mission. We can have several
types of mobility models: individual random mobility, group mobility, motion along
preplanned routes, etc. The mobility model can have major impact on the selection of a
routing scheme and can thus influence performance.
41