Observation Manual
Observation Manual
Copyright in the whole and every part of this manual belongs to tetcos and may not be
used, sold, transferred, copied or reproduced in whole or in part in any manner or in any
media to any person, without the prior written consent of tetcos. If you use this manual
you do so at your own risk and on the understanding that tetcos shall not be liable for any
loss or damage of any kind.
Tetcos may have patents, patent applications, trademarks, copyrights, or other intellectual
property rights covering subject matter in this document. Except as expressly provided in
any written license agreement from Tetcos, the furnishing of this document does not give
you any license to these patents, trademarks, copyrights, or other intellectual property.
Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no
association with any real company, organization, product, domain name, email address,
logo, person, place, or event is intended or should be inferred.
Contact us at –
TETCOS
E-Mail: [email protected]
Visit: www.tetcos.com
1. Experiment 1: …………………………….4
Analyzing Number of Transmitting Nodes vs. Collision count,
Mean Delay for an Ethernet LAN
2. Experiment 2: ……………………………15
Analyzing Bus vs. Star – Switch with respect to number of collisions
(for a fixed number of transmitting nodes) for Ethernet LAN
3. Experiment 3: …………………………...29
Analyzing the performance of Token Ring with Number of Nodes vs.
Response Time, Mean Delay using NetSim
4. Experiment 4: …………………………….43
Comparing the Throughput and Normalized Throughput for Token Ring
and Token Bus protocols for different transmitting nodes
5. Experiment 5: …………………………….54
Comparing CSMA/CA vs. CSMA/CD protocol (for a fixed number
of transmitting nodes)
6. Experiment 6: …………………………….71
Analyzing the difference between uni-cast and broadcast
transmission (for a fixed number of transmitting nodes)
7. Experiment 7: …………………………….81
Verification of Stop and Wait protocol
8. Experiment 8: ..…………………………..90
Verification of Go Back N protocol
9. Experiment 9: …………………………….95
Verification of Selective Repeat Protocol
Introduction:
Ethernet is a LAN (Local area Network) protocol operating at the MAC (Medium
Access Control) layer. Ethernet has been standardized as per IEEE 802.3. The underlying
protocol in Ethernet is known as the CSMA / CD – Carrier Sense Multiple Access /
Collision Detection. The working of the Ethernet protocol is as explained below,
• A node which has data to transmit senses the channel,
• If the channel is idle then the data is transmitted
• If the channel is busy then the station defers transmission until the channel is
sensed to be idle and then date is immediately transmitted.
• If more than one node starts data transmission at the same time, the data collides.
This collision is heard by the transmitting nodes which enter into contention
phase.
• The contending nodes resolve contention using an algorithm called truncated
binary exponential back off.
Performance Metrics:
Some of the important performance metrics which are recorded during simulation
are given below.
Utilization(%):
Also called as Throughput(%). Fraction of network capacity devoted to carrying
payload of the successful packets / frames /cells. In other words, it is the ratio of
current network traffic to the maximum traffic the network can handle. It is an
important indicator of the bandwidth usage in the network.
Formula :
Utilization (%) = Effective Utilization (%) + Overhead (%) + Loss (%).
Loss (%):
Fraction of network capacity devoted to carrying error packets/frames/cells. This
includes both payload and overhead of these packets.
Formula:
Network Loss (%) = ( Number of errored bits in the Network / Maximum number
of bits that could have been transmitted ) * 100
Where,
Maximum number of bits that could have been transmitted = Simulation End time
(µsec) * Network Capacity (Mbps).
Collision Count(s):
Total number of collisions occurring in a network.
1(a). Simulation
Study of Number of Transmitting Nodes vs. Collision count, Mean Delay for an
Ethernet LAN (NetSim)
Sample Questions
1. Measure and plot the variation in Mean Delay against Number of Transmitting
Nodes (varying from 1 to 6) using NetSim. Comment on the result.
2. Measure and plot the variation of collision count against Number of
Transmitting Nodes (varying from 1 to 6) using NetSim. Comment on the result.
Experiment 1(a):
Analyzing Number of Transmitting Nodes vs. Collision count, Mean Delay for an
Ethernet LAN
Description:
To begin with the experiment, run NetSim
Fig 1.1
Click on Simulation, select New, then LAN network, then Ethernet protocol and
then select Traditional from the sub menu. The simulation environment is now open.
Click here
to Simulate
Fig 1.2
i. Drag and drop the hub on the environment (depending on the number of nodes
required). 8 is the maximum number of nodes which can be connected to one hub.
ii. Drag and drop the node on the hub. Two is the minimum number of nodes
required for transmission to take place. This scenario would look like the one
shown.
Fig 1.3
In fig 1.3, right click on the 1st node and the following dialog box will appear.
Fig 1.4
On selecting Traffic type as Data, you will get the following window. In the
window shown below set Mean interval time as 1177 micro seconds, so that generation
rate will be 10 Mbps approximately.
Set Distribution
as Constant
Set Distribution
as Constant
Set Mean Inter
Arrival Time as
1177 micro sec
Click OK
Fig 1.5
Now you will get back the simulation environment. Here on the left panel we have
validate button followed by simulation button. First validate the experiment by clicking
validate button and then when you click simulate button a small window will appear, here
set the simulation time to 10 seconds and click ok.
Then, you will see the performance metrics screen as shown below.
Click here to
Save
Click here to
go to NetSim
Analytics
Click here to
Export data to
Excel
Click here to
View Network
Fig 1.6
When Save button is clicked, a dialog box will appear as shown below.
Fig 1.7
An example is shown in the above figure.
.
Retrieve:
Rather then creating new scenarios each time, previous scenarios can be opened
and modified.
After saving the experiment, click Simulation, Open and select Network from the
sub menu on the menu bar.
A Dialog box will appear as shown in the figure below.
Select Network
Select Protocol
Select Experiment
Fig 1.8
Set the Point to Point traffic on one additional node (total of 2 nodes), Click
Validate and Simulate. Follow the same procedure increasing the number of Point to
Point nodes by 1 every time, till 6 nodes generate traffic. Save the experiments each time.
Select LAN
Select Delay
Select the
experiments for
which you have to
make comparison
Fig 1.9
Experiment 1(b):
Real time file transfer and study of application and network performance. Compare
collision count for 1 Client 1 Server and for 2 Clients 2 Servers. (LAN Trainer)
Description:
To begin with the experiment, run Lan Trainer
Note: To view the details on how to proceed with the experiments click on the question
mark. This is the “Help” section for the respective protocol.
Select BUS topology to perform this experiment. For Bus topology, click on
in the file panel. Connect the cable from the system to the required topology in the kit.
Turn on the LT Kit by turning the manual switch to the Bus topology.
User should select one system/computer as the Server and one system as the
Client. Transfer the file between the two systems through the LAN Trainer and save the
received metrics.
Server Client
Fig 1.13
At the Server, 1500 as value for Packet Size (Bytes) and click Send. This is the
standard size of Ethernet Payload.
At the Client:
Note:
Only after the Server clicks Send, the Client should click Receive.
350
300
250
Packets Collided
200
Packets Collided
150
100
50
0
1 2
Client/ Server Pair
Fig 1.14
Introduction:
Ethernet is a LAN (Local area Network) protocol operating at the MAC (Medium
Access Control) layer. Ethernet has been standardized as per IEEE 802.3. The underlying
protocol in Ethernet is known as the CSMA / CD – Carrier Sense Multiple Access /
Collision Detection. The working of the Ethernet protocol is as explained below,
• A node which has data to transmit senses the channel,
• If the channel is idle then, the data is transmitted
• If the channel is busy then, the station defers transmission until the channel is
sensed to be idle and then immediately transmitted.
• If more than one node starts data transmission at the same time, the data collides.
This collision is heard by the transmitting nodes which enter into contention
phase.
• The contending nodes resolve contention using an algorithm called truncated
binary exponential back off.
Performance Metrics:
Some of the important performance metrics which are recorded during simulation
are given below.
Overhead (%):
Fraction of network capacity devoted to carrying Overhead of the successful
packets / frames/cells.
Formula:
Network Overhead = (Total number of overhead transmitted (bits) in the Network
/Maximum number of bits that could have been transmitted) * 100
Where,
Maximum number of bits that could have been transmitted = Simulation End time
(µsec) * Network Capacity (Mbps)
Loss (%):
Fraction of network capacity devoted to carrying error packets/frames/cells. This
includes both payload and overhead of these packets.
Formula:
Network Loss (%) = ( Number of errored bits in the Network / Maximum number
of bits that could have been transmitted ) * 100
Where,
Maximum number of bits that could have been transmitted = Simulation End time
(µsec) * Network Capacity (Mbps).
Collision Count(s):
Total number of collisions occurring in a network.
The definitions of all parameters / variables are available in NetSim.
2(a). Simulation
Study of Bus vs. Star – Switch with respect to number of collisions (for a fixed
number of transmitting nodes) (NetSim)
Sample Questions:
1. Compare and contrast the number of collisions between a Traditional (Hub - Bus)
and Fast (Switch-Star) network with 2 nodes broadcasting (Using NetSim).
Description:
To begin with the experiment, run NetSim
Click on Simulation, select New, then LAN network, then Ethernet protocol and then
select Traditional from the sub menu. The simulation environment is now open.
Click here
to Validate
Click here
to Simulate
Fig 2.2
iii. Drag and drop the hub on the environment (depending on the number of nodes
required). 8 is the maximum number of nodes which can be connected to one hub.
iv. Drag and drop the node on the hub. Two is the minimum number of nodes
required for transmission to take place. This scenario would look like the one
shown below.
In fig 2.3, right click on the both the nodes and the following dialog box will appear.
Set Transmission
Type as Point to Point
Fig 2.4
In fig 2.4 select Point to Point from the transmission Type option.
On selecting Traffic type as Data, you will get the following window. In the
window shown below set Mean interval time as 1177 micro seconds, so that generation
rate will be 10 Mbps approximately.
Set Distribution
as Constant
Set Mean Inter
Arrival Time as
1177 micro sec
Click OK
Fig 2.5
Then, you will see the performance metrics screen as shown below.
.
Click here to
Save
experiment
Click here to
go to NetSim
Analytics
Click here to
Export data to
Excel
Click here to
View Network
Fig 2.6
Save:
Give any name of your choice to save it and if you want to give any comments
you can give or else click No for comments and proceed to save your experiment by
clicking OK button.
Click OK
Fig 2.7
Fig 2.8
Click on Simulation, select New, then LAN network, then Ethernet protocol and
then select Fast from the sub menu. The simulation environment is now open.
Fig 2.9
v. Drag and drop the switch on the environment (depending on the number of nodes
required). 8 is the maximum number of nodes which can be connected to one
switch.
vi. Drag and drop the node on the switch. Two is the minimum number of nodes
required for transmission to take place. This scenario would look like the one
shown below.
Fig 2.10
In fig 2.10, right click on the both nodes and the following dialog box will appear.
Fig 2.11
On selecting Traffic type as Data, you will get the following window. In the
window shown below set Mean interval time as 1177 micro seconds, so that generation
rate will be 10 Mbps approximately.
Select Distribution
as Constant
Select Distribution
as Constant
Click OK
Fig 2.12
Now you will get back the simulation environment. Here on the left panel we
have validate button followed by simulation button. First validate the experiment by
clicking validate button and then when you click simulate button a small window will
appear, here set the simulation time to 10 seconds and click ok.
Then, you will see the performance metrics screen as shown below.
.
Click here to
Save experiment
Click here to
go to NetSim
Analytics
Click here to
Export data to
Excel
Click here to
View Network
Fig 2.13
Save:
Give any name of your choice to save it and if you want to give any comments
you can give or else click No for comments and proceed to save your experiment by
clicking OK button.
Fig 2.14
To view the output by using NetSim the Sample experiments need to be added
onto the Analytics interface. Given below is the navigation for analytics -“Simulation Æ
Analytics”.
Select the experiments by selecting your Fast Ethernet Protocols(STAR topology)
and Traditional Ethernet Protocols (BUS topology) experiments.
Select the Experiments (Note: Click on one experiment after the other to add
multiple experiments onto the Analytics interface).
Click on “Export to .csv” which is available in Metrics Screen to export data to
Excel sheet, using the Chart Wizard option in excel sheet plot a line graph with X axis as
topologies (STAR and BUS) and Y axis as Collision Count.
1800
1600
Collision Count
1400
1200
1000
Collision Count
800
600
400
200
0
BUS STAR
Topology
Fig 2.15
Inference (to be filled up by the students):
The difference between Traditional (hub) and Fast (switch) can be noted from this graph,
for a fixed number of transmitting nodes the collision count is high for hub whereas for
switch it is zero. This is because hub is a shared medium where as switch has collision
separated domains.
Experiment 2(b):
Compare throughput for Bus topology vs. Star Topology (LAN Trainer)
Description:
Fig 2.16
To view the details on how to proceed with the experiments click on the question
mark. This is the “Help” section for the respective protocol.
Server Client
Fig 2.17
At the Server, 1500 as value for Packet Size (Bytes) and click Send. This is the
standard size of Ethernet Payload.
At the Client:
For Star topology perform the experiment as given for the bus topology. The
cable should be connected to star topology in the kit.
From the metrics obtained at the receiver side export the values to the excel sheet.
Now, compare the throughput and collision count for the Bus and Star topology from the
values obtained in the excel sheet.
Depending on the experiment connect the cable from the system to the required
topology in the kit. Turn on the LT Kit by turning the manual switch to the Bus topology
or Star topology.
100 94.176
90
80
70
Throughput
60
50
40
30
20
8.808
10
0
Bus Star
Fig 2.18
Introduction:
Token ring is a LAN protocol operating in the MAC layer. Token ring is
standardized as per IEEE 802.5. Token ring can operate at speeds of 4mbps and 16 mbps.
The operation of token ring is as follows
When there is no traffic on the network a simple 3-byte token circulates the ring.
If the token is free (not reserved by a station of higher priority as explained later), then
the station which prefers to transmit data may seize the token and start sending the data
frame. As the frame travels around the ring ach station examines the destination address
and is either forwarded (if the recipient is another node) or copied. After copying data,
the four bits of the last byte is changed. This packet then continues around the ring till it
reaches the originating station. After the frame makes a round trip the sender receives the
frame and releases a new token onto the ring.
Performance Metrics:
Some of the important performance metrics which are recorded during simulation
are given below.
Utilization(%):
Also called as Throughput(%). Fraction of network capacity devoted to carrying
payload of the successful packets / frames /cells. In other words, it is the ratio of
current network traffic to the maximum traffic the network can handle. It is an
important indicator of the bandwidth usage in the network.
Formula :
Utilization (%) = Effective Utilization (%) + Overhead (%) + Loss (%).
Overhead (%):
Loss (%):
Fraction of network capacity devoted to carrying error packets/frames/cells. This
includes both payload and overhead of these packets.
Formula:
Network Loss (%) = ( Number of errored bits in the Network / Maximum number
of bits that could have been transmitted ) * 100
Where,
Maximum number of bits that could have been transmitted = Simulation End time
(µsec) * Network Capacity (Mbps).
3(a). Simulation:
Study the performance of Token Ring with Number of Nodes vs. Response Time, Mean
Delay (NetSim).
Sample Questions:
1. Measure and plot the variation in Mean Delay, Reponse time and Throughput
against Number of Transmitting Nodes (varying from 1 to 8) using NetSim.
Comment on the result.
Experiment 3(a):
Study the performance of Token Ring with Number of Nodes vs. Response Time, Mean
Delay (NetSim).
Description:
To begin with the experiment, open NetSim
Fig 3.1
Click on Simulation, select LAN network and Token Ring from the sub menu. The
simulation environment is now open.
Click here
to Simulate
Fig 3.2
i. Drag and drop the concentrator on the environment (depending on the number of
nodes required). 8 is the maximum number of nodes which can be connected to
the concentrator. Here, in some cases two concentrators are required.
ii. Drag and drop the nodes to the concentrator only. Two is the minimum number of
nodes required for transmission to take place.
iii. For a single concentrator click at the ends to make a ring connection. Whereas for
two or more concentrators, click at the ends of each concentrators to make a ring
connection.
For fig 3.1, right click on the 1st node and select Point to Point from the
transmission option. Right click on the 2nd node and again set the traffic to Point to point.
Fig3.5
On selecting Traffic type as Data, you will get the following window. In the
window shown below set Mean interval time as 8943 micro seconds, so that Generation
Rate will be 16 Mbps exactly.
Select Distribution
as Constant
Set Mean interval
time as 8943 micro
seconds
Fig 3.6
Now you will get back the simulation environment. Here on the left panel we
have validate button followed by simulation button. First validate the experiment by
clicking validate button and then when you click simulate button a small window will
appear, here set the simulation time to 10 seconds and click ok.
Then, you will see the performance metrics screen as shown below.
Click here to
go to NetSim
Analytics
Click here to
Export data to
Excel
Click here to
View Network
Fig 3.7
Save:
Give any name of your choice to save it and if you want to give any comments
you can give or else click No for comments and proceed to save your experiment by
clicking OK button.
Click Ok
Fig 3.8
Retrieve:
Rather then creating new scenarios each time, earlier scenarios can be modified
after saving the experiment. Click simulation and Open from the sub menu on the file
panel.
Select Topology
Select the
experiment
Fig 3.9
Select LAN, Token Ring- Protocol, token Ring Topology and the experiment
which you have saved for the Sample from fig a. Click Ok button you will obtain the
initial scenario.
Set the Point to Point traffic on one additional node (total of 2 nodes), Click
Validate and Simulate. Follow the same procedure increasing the number of Point to
Point nodes by 1 every time, till 6 nodes generate traffic.
Select LAN
Select Delay
Select the
experiments
for which you
have to make
comparison
Fig 3.10
60
Response time (ms)
50
40
30
20
10
0
2 3 4 5 6
No. of Transmitting nodes
Delay
Fig 3.11
Experiment 3(b):
Increase the number of nodes in a Token Ring network and transfer a file between a
client – server and observe throughput (LAN Trainer).
Description:
Fig 3.12
For Token Ring, select from the file panel. User should select one
system/computer as the Server and the other system as the Client.
Server Client
Fig 3.13
Enter the IP address of the neighbour for the system and click “Insert into the
Ring”.Set the Data Rate as 4Mbps.
At the Client, enter the File path of the server, select the file path where file has to
be saved and enter the Server’s IP address, click Receive.
Note: After the transfer of file between the systems if you want to receive another file
from the other system click Receive Again.
Now, connect system 1, system 2 and system 3 as a Ring. Here, system 1 is the
transmitter, system 2 as the receiver and system 3 is in idle state.
Fig 3.15
At system 1, enter the neighbour IP address of system 2 and click “Insert into the Ring”.
At system 2, enter the neighbour IP address of system 3 and click “Insert into the Ring”.
At the Client, enter the File path of the server, select the file path where file has to be
saved and enter the Server’s IP address, click Receive.
Note: After the transfer of file between the systems if you want to receive another file
from the other system click Receive Again.
Important:
Only 1 system will act as the Server and the 2nd system as Client. The 3rd system
will just have to enter the neighbour IP address, click “Insert into the Ring” and wait for
the file transfer to take place.
Fig 3.16
At system 1, enter the neighbour IP address of system 2 and click “Insert into the Ring”.
At system 2, enter the neighbour IP address of system 3 and click “Insert into the Ring”.
At system 3, enter the neighbour IP address of system 4 and click “Insert into the Ring”.
At system 4, enter the neighbour IP address of system 1 and click “Insert into the Ring”.
Note: After the transfer of file between the systems if you want to receive another file
from the other system click Receive Again.
Important:
Only 1 system will act as the Server and the 2nd system as Client. The 3rd and 4th
system will just have to enter the neighbour IP address and click “Insert into the Ring”
and wait for the file transfer to take place.
From the metrics obtained at the receiver side export the values to the excel sheet
and observe the throughput for the Token Ring network.
Fig 3.17
Note:
After the Server sets the value, it should wait for the Client to set up the required
address etc. Then, only after the Client is ready, the Server should click Send and the
receiver should click Receive.
Depending on the experiment connect the cable from the system to the required
topology in the kit. Turn on the LT Kit by turning the manual switch to the Ring
topology.
2
1.75
1.5
Throughput
1.13
1
0.8
0.5
0
2 3 4
Number of Nodes
Token Ring
Fig 3.18
Since token ring protocol operates on a ring topology the data is transmitted in the
network hop by hop. i.e node 1 sends data to node 2 if node 2 is the destination it sends
the ack to node 3 and node 3 sends the ack to node 4 and node 4 sends the ack to node 1.
if the number of nodes increase in the ring time taken for the data to reach the destination
and the ack to the source will increase which is reflected in delay.
Introduction:
Token bus is a LAN protocol operating in the MAC layer. Token bus is
standardized as per IEEE 802.4. Token bus can operate at speeds of 5Mbps, 10 Mbps and
20 Mbps. The operation of token bus is as follows
Unlike token ring, in token bus the ring topology is virtually created and
maintained by the protocol. A node can receive data even if it is not part of the virtual
ring. A node joins the virtual ring only if it has data to transmit. In token bus, data is
transmitted to the destination node only where as other control frames are forwarded hop
by hop. After each data transmission, a solicit_successsor control frame is transmitted
which reduces the performance of the protocol.
Performance Metrics:
Some of the important performance metrics which are recorded during simulation
are given below.
Utilization(%):
Also called as Throughput(%). Fraction of network capacity devoted to carrying
payload of the successful packets / frames /cells. In other words, it is the ratio of
current network traffic to the maximum traffic the network can handle. It is an
important indicator of the bandwidth usage in the network.
Formula :Utilization (%) = Effective Utilization (%) + Overhead (%) + Loss (%).
Overhead (%):
Fraction of network capacity devoted to carrying Overhead of the successful
packets / frames/cells.
Formula:
Loss (%):
Fraction of network capacity devoted to carrying error packets/frames/cells. This
includes both payload and overhead of these packets.
Formula:
Network Loss (%) = ( Number of errored bits in the Network / Maximum number
of bits that could have been transmitted ) * 100
Where,
Maximum number of bits that could have been transmitted = Simulation End time
(µsec) * Network Capacity (Mbps).
4(a). Simulation:
Comparing the Throughput and Normalized Throughput for Token Ring and Token Bus
protocols for different transmitting nodes (NetSim).
Experiment 4(a):
Comparing the Throughput and Normalized Throughput for Token Ring and Token Bus
protocols for different transmitting nodes using NetSim.
Description:
To begin with the experiment, open NetSim
Fig 4.1
Click on Simulation, select LAN network and Token Bus from the sub menu. The
simulation environment is now open.
Fig 4.2
Fig 4.3
For fig 4.3, right click on the 1st node and set the transmission to Point to Point.
Select Traffic type as Data.
Fig 4.4
On Selecting Data option, you will get the window shown below. Set the
Distribution value as Constant and set Mean interval time as 6510, so that Generation
Rate will be 10Mbps exactly
Constant
Distribution
Set Mean
interval time
as 6510
Fig 4.5
Now you will get back the simulation environment. Here on the left panel we
have validate button followed by simulation button. First validate the experiment by
clicking validate button and then when you click simulate button a small window will
appear, here set the simulation time to 10 seconds and click ok.
Click here to go
to NetSim
Analytics
Click here to
export data to
Excel
Click here to
view Network
Fig 4.6
Save
Give any name of your choice to save it and if you want to give any comments
you can give or else click No for comments and proceed to save your experiment by
clicking OK button.
Click Ok
Fig 4.7
Select Topology
Select the
experiment
Fig 4.8
Select LAN Token Bus - Protocol, Bus Topology and the experiment which you
have saved for the Sample from fig 4.8. Click Ok button, you will obtain the initial
scenario. Set the traffic on one additional node (total of 2 nodes)
Click Configure and Simulate. Follow the same procedure increasing the number
of transmitting node by 1 every time. Similarly generate traffic for 3 nodes. Follow the
same procedure for Token Ring.
99.9
Throughput(Mbps)
99.8
99.7
99.6
99.5
99.4
99.3
99.2
99.1
99
2 3 4 5
No. of nodes
Fig 4.9
99.9
Normalized Throughput (%)
99.8
99.7
99.6
99.5
99.4
99.3
1 2 3 4 5
Transmitting Node s
Fig 4.10
Experiment 4(b):
Create a common scenario in token ring and token bus, transfer a file between client -
server and measure the performance (LAN Trainer).
Description:
Fig 4.11
For Token Ring, select from the file panel. User should select one
system/computer as the Server and the other system as the Client.
Fig 4.12
At the Client, enter the File path of the server, select the file path where file has to
be saved and enter the Server’s IP address, click Receive.
In the same way, perform the above experiment for Token Bus between a server
and a client.
From the metrics obtained at the receiver side export the values to the excel sheet
and observe the throughput for the Token bus and Token Ring network.
Depending on the experiment connect the cable from the system to the required
topology in the kit. Turn on the LT Kit by turning the manual switch to the Bus topology
or Ring topology.
1.8 1.75
1.75
1.7
Throughput
1.65
1.6
1.55 1.51
1.5
1.45
1.4
1.35
Token Bus Token Ring
Fig 4.13
Introduction:
Wireless LAN is basically a LAN that transmits data over air, without any
physical connection between devices. The transmission medium is a form of
electromagnetic radiation. Wireless LAN is ratified by IEEE in the IEEE 802.11
standard. The underlying algorithm used in Wireless LAN is known as the CSMA / CA –
Carrier Sense Multiple Access / Collision Avoidance algorithm. The working of CSMA /
CA algorithm is given below.
• The node which has data to transmit senses the medium. If the medium has been
idle for longer than the DIFS (DCF Inter Frame Space), it finishes its back off
interval & transmits Request To Send (RTS) signal immediately.
• The access point responds with Clear to Send (CTS) signal .Now the node has
reserved the medium and transmits data.
• If the medium is busy, the node waits for the channel to become idle for the DIFS.
• If two nodes sense the medium at the same time & transmit RTS simultaneously,
RTS collision occurs and the transmission is retried. Hence data collision is
avoided.
• For each retransmission, contention window increases exponentially hence back
off time is selected from larger contention window.
This is explained in the timing diagram given below:
Fig 5.1
Utilization(%):
Also called as Throughput(%). Fraction of network capacity devoted to carrying
payload of the successful packets / frames /cells. In other words, it is the ratio of
current network traffic to the maximum traffic the network can handle. It is an
important indicator of the bandwidth usage in the network.
Formula :Utilization (%) = Effective Utilization (%) + Overhead (%) + Loss (%).
Overhead (%):
Fraction of network capacity devoted to carrying Overhead of the successful
packets / frames/cells.
Formula:
Network Overhead = (Total number of overhead transmitted (bits) in the Network
/Maximum number of bits that could have been transmitted) * 100
Where,
Maximum number of bits that could have been transmitted = Simulation End time
(µsec) * Network Capacity (Mbps)
Loss (%):
Fraction of network capacity devoted to carrying error packets/frames/cells. This
includes both payload and overhead of these packets.
Formula:
Network Loss (%) = ( Number of errored bits in the Network / Maximum number
of bits that could have been transmitted ) * 100
Where,
Maximum number of bits that could have been transmitted = Simulation End time
(µsec) * Network Capacity (Mbps).
Collision Count(s):
Total number of collisions occurring in a network.
5(a). Simulation:
Comparison of CSMA / CD vs. CSMA / CA protocols (for a fixed number of
transmitting nodes) (NetSim).
Sample Questions:
1. Simulate and plot a graph for throughput versus transmitting nodes (varying from
1 to 8) using NetSim. Analyze and comment on the results.
2. Simulate and compare the throughput of single BSS and multiple BSS by varying
number of transmitting nodes (from 1 to 8) using NetSim. What are the
inferences?
Description:
To begin with the experiment, open NetSim
Fig 5.12
Click on Simulation, select LAN network and Wireless LAN from the sub menu. The
simulation environment is now open.
i. Drag and drop the BSS and the Switch on the environment. Connect the BSS and
the Switch.
ii. Drag and drop the node near to the BSS only. Two is the minimum number of
nodes required for transmission to take place.
Now right click on the 1st node you will see the window shown below. Here set
the transmission to Point to Point and select Traffic type as Data.
Fig 5.14
On Selecting Data option, you will get the window shown below. Set the
Distribution value as Constant and set Mean interval time as 1070 micro seconds, so that
Generation Rate will be 11Mbps approximately.
Click OK button
Fig 5.15
Right click on AP and select properties as shown below.
Now you will get back the simulation environment. Here on the left panel we
have validate button followed by simulation button. First validate the experiment by
clicking validate button and then when you click simulate button a small window will
appear, here set the simulation time to 10 seconds and click ok.
Then, you will see the performance metrics screen. Click save to save the metrics.
Click to go to
Analytics screen.
Click to view
the Network.
Fig.5.17
Here click Save button to save the experiment.
Save:
Give any name of your choice to save it.
Fig 5.18
If you don’t want to add any comments Click on “No” Or else If You wants to
add comments click on “Yes” Then Finally click on Ok Button to proceed to save the
experiment.
Retrieve:
Rather then creating new scenarios each time, this can be done as follows.
After saving the experiment, SimulationÆOpenÆ Change protocol. Then following
window will appear.
Fig 5.20
Select Wireless LAN Protocol then select Traditional Ethernet protocol and then
select experiment which you have saved for the Sample
Click on the Ok button
CSMA\CD
Fig 5.21
Set the traffic to Point to Point on one additional node (total of 2 nodes)
Click Configure and Simulate. Follow the same procedure increasing the number of
nodes by 1 every time, till all 6 nodes transmit Point to Point.
120
Throughput(%)
100
80
60
40
20
0
2 3 4 5 6
Transmitting Nodes
Fig 5.22
The collision avoidance concept in wireless LAN protocol, avoids the possibility
of collision of data frames. The working of wireless LAN is such that when a node
transmits to the destination the data reaches the access point (coordination point) and
from there it is transmitted to the destination node. Due to its nature of double
transmission and protocol overheads, the throughput is reduced by 50% when compared
to Ethernet.
Fig 5.2
Fig 5.3
Click on the icon at the task bar to view the following screen.
Select
Fig 5.5
The available wireless networks will be listed on the screen. In this case one
wireless network is indicated.
Fig 5.7
Go to Start Menu and click . Enter the IP Address of the system you
want to access. Check that you can access all the systems which are involved to do
Wireless LAN experiments.
Fig 5.8
Fig 5.9
If you are unable to access the system, dialog boxes shown below may pop up.
Fig 5.11
Reason:
Wireless connection is not established properly.
Rectification:
Check if your access point is switched on.
Check if your system and destination system are connected to the same access point.
Check if the IP address is assigned properly for your system and the destination system.
Note: When you want to switch your experiment from Wired LAN to Wireless LAN it
is recommended to restart your system and unplug all the cables from the LAN
Trainer.
Experiment 5(b):
Real time file transfer (through LAN trainer) and study of application and network
performance. Compare throughput for 1 client server pair between Wireless LAN and
Star Topology. (LAN Trainer)
Description:
For Wireless LAN, click on in the file panel. User should select one
system/computer as the Server and the other system as the Client.
Server Client
Fig 5.24
At the Server, enter the any integer value for Packet Size (Bytes) and click Send.
At the Client:
Now for Star topology, perform the experiment as given for Wireless LAN. The
cable of the LAN Trainer kit should be connected to star topology.
Note:
After the Server sets the value, it should wait for the Client to set up the required
address etc. Then, only after the Client is ready, the Server should click Send and the
receiver should click Receive.
Depending on the experiment connect the cable from the system to the required
topology in the kit. Turn on the LT Kit by turning the manual switch to Star topology.
60
50
40
30
20
10 1.992
0
WirelessLAN Star
Fig 5.25
The collision avoidance concept in wireless LAN protocol, avoids the possibility
of collision of data frames. The working of wireless LAN is such that when a node
transmits to the destination the data reaches the access point (coordination point) and
from there it is transmitted to the destination node. Due to its nature of double
transmission, the lower data rate and protocol overheads, the throughput is reduced by
50% when compared to Ethernet.
Introduction:
Unicast packets are sent from host to host. The communication is from a single
host to another single host. There is one device transmitting a message destined for one
receiver.
Broadcast is when a single device is transmitting a message to all other devices in
a given address range. This broadcast could reach all hosts on the subnet, all subnets, or
all hosts on all subnets.
Broadcast transmission also known as a Best – Effort transmission. All the data
packet transmission consider like a successful transmission. And also before transmitting
the data packet, there is no more handshaking signal (RTS/CTS) process in CSMA/CA.
Account of this result, there is an opportunity to transmit more data packets.
Performance Metrics:
Some of the important performance metrics which are recorded during simulation
are given below.
Utilization(%):
Also called as Throughput(%). Fraction of network capacity devoted to carrying
payload of the successful packets / frames /cells. In other words, it is the ratio of
current network traffic to the maximum traffic the network can handle. It is an
important indicator of the bandwidth usage in the network.
Formula :
Utilization (%) = Effective Utilization (%) + Overhead (%) + Loss (%).
Overhead (%):
Fraction of network capacity devoted to carrying Overhead of the successful
packets / frames/cells.
Formula:
Loss (%):
Fraction of network capacity devoted to carrying error packets/frames/cells. This
includes both payload and overhead of these packets.
Formula:
Network Loss (%) = ( Number of errored bits in the Network / Maximum number
of bits that could have been transmitted ) * 100
Where,
Maximum number of bits that could have been transmitted = Simulation End time
(µsec) * Network Capacity (Mbps).
Collision Count(s):
Total number of collisions occurring in a network.
6(a). Simulation:
Study the difference between unicast and broadcast transmission (for a fixed
number of transmitting nodes) (NetSim).
Sample Questions:
1. Compare the throughput of 1 client 1 server & 2 clients 2 servers using LAN
Trainer and comment on the results.
2. Measure the signal strength, data rate at different distances between access point
and Wireless system using LAN Trainer. Plot the variation of these parameters
against distance.
Experiment 6(a):
Study the difference between unicast and broadcast transmission (for a fixed
number of transmitting nodes) (NetSim).
Description:
Fig 6.2
Click on Simulation, select LAN network and Wireless LAN from the sub menu. The
simulation environment is now open.
i. Drag and drop the BSS and the Switch on the environment. Connect the BSS and
the Switch.
ii. Drag and drop the node near to the BSS only. Two is the minimum number of
nodes required for transmission to take place.
For fig 6.2, right click on the 1st node and set the transmission to Point to Point.
Select Traffic type as Data.
Fig 6.4
On Selecting Data option, you will get the window shown below. Set the
Distribution value as Constant and set Mean interval time as 1070 micro seconds, so that
Generation Rate will be 11Mbps approximately.
Click OK button
Fig 6.5
Now you will get back the simulation environment. Here on the left panel we
have validate button followed by simulation button. First validate the experiment by
Then, you will see the performance metrics screen. Click save to save the
experiment metrics.
Select Save to
save the Metrics
Click to go to
Analytics screen
Fig 6.6
Give any name of your choice to save it.
Save:
Fig 6.7
Fig 6.8
If you don’t want to add any comments Click on “No” Or else If You want to add
comments click on “Yes” Then finally click on Ok button to proceed to save the
experiment.
Retrieve:
Rather then creating new scenarios each time, this can be done as follows.
After saving the experiment, SimulationÆOpenÆ Network.
Fig 6.9
Select Wireless LAN- Protocol, and the experiment which you have saved for the
Sample from 6.9. Click on the accept button.
For unicast, set the traffic (in the traffic Generator) to Point to Point and follow
the procedure as given for broadcast.
To view the output by using NetSim the Sample experiments need to be added
onto the Analytics interface. Given below is the navigation for analytics -“Simulation Æ
Analytics”.
Select the experiments by selecting your WLAN protocols experiments
Select the Experiments (Note: Click on one experiment after the other to add
multiple experiments need to be added onto the Analytics interface).
Click on “Export to .csv” which is available in Metrics Screen to export data to
Excel sheet, using the Chart Wizard option in excel sheet plot a line graph with X axis as
Number of nodes and Y axis as Throughput(%) of Unicast and Broadcast. The Graph
shows the Difference in Throughput for Unicast and Broadcast.
60
58
Throughput(%)
56
54
52
50
48
46
2 3 4 5 6
Transmitting Nodes
Unicast Broadcast
Fig 6.10
Description:
To begin with the experiment, run LAN Trainer.
Fig 6.11
To view the details on how to proceed with the experiments click on the question
mark. This is the “Help” section for the respective protocol.
For Wireless LAN, click on in the file panel. User should select one
system/computer as the Server and the other system as the Client
Server Client
Fig 6.12
At the Server, enter the any integer value for Packet Size (Bytes) and click Send.
At the Client:
Now, for 2 client- server pair, set 2 systems as the Client and 2 systems as the
Server (Total number of system used is 4). Set the File Transfer Agent as given above
for all the system. Let the 1st server transmit to 1 client and at the same time let the 2nd
server transmit to the other client.
From the metrics obtained at the receiver side export the values to the excel sheet
and compare the throughput v/s transmitting nodes for Wireless LAN.
Note:
After the Server sets the value, it should wait for the Client to set up the required
address etc. Then, only after the Client is ready, the Server should click Send and the
receiver should click Receive.
2
Throughput
1.5
0.5
0
1 2
Transmitting nodes
Wireless LAN
Fig 6.13
Introduction:
Stop and Wait is a reliable transmission flow control protocol. This protocol
works only in Connection Oriented (Point to Point) Transmission.
The Source node has window size of ONE. After transmission of a frame the
transmitting (Source) node waits for an Acknowledgement from the destination node.
If the transmitted frame reaches the destination without error, the destination
transmits a positive acknowledgement. If the transmitted frame reaches the Destination
with error, the receiver destination does not transmit an acknowledgement.
If the transmitter receives a positive acknowledgement it transmits the next frame
if any. Else if its acknowledgement receive timer expires, it retransmits the same frame.
Algorithm:
Start with the window size of 1 from the transmitting (Source) node.After
transmission of a frame the transmitting (Source) node waits for a reply
(Acknowledgement) from the receiving (Destination) node.
If the transmitted frame reaches the receiver (Destination) without error, the
receiver (Destination) transmits a Positive Acknowledgement.
If the transmitted frame reaches the receiver (Destination) with error, the receiver
(Destination) do not transmit acknowledgement.
If the transmitter receives a positive acknowledgement it transmits the next frame
if any. Else if the transmission timer expires, it retransmits the same frame again.
If the transmitted acknowledgment reaches the Transmitter (Destination) without
error, the Transmitter (Destination) transmits the next frame if any.
7(a). Simulation
Implement the stop and wait protocol using C / C++ program (NetSim)
Hardware/Software Requirements:
1. NetSim Academic Version simulation software (for C/C++ programming
implementation)
2. LAN trainer (Model LT 01) (for study)
3. LT Soft – Operational software for LAN Trainer (for study)
Sample Questions:
Netsim
1. Write a C/C++ program for stop and wait flow control.
a) Explain the algorithm in detail with relevant steps.
b) Draw the flow chart.
LAN Trainer
2. Plot the variation of error packets, ack count and window count in Stop and
Wait protocol as the error rate is increased while transferring the same file from
client to server (LAN trainer)
Experiment 7(a):
Implement the stop and wait protocol using C / C++ program (NetSim)
Description:
To begin with the experiment, open NetSim
Select
Programming
Fig 7.1
Select
Transmission
Flow Control
Fig 7.2
When you select the User mode, you have to write your own program in C/C++,
compile and link to NetSim software for validation. Click on the F1 (help) icon for details
on how to proceed with your own code.
Continue with the steps as given for sample mode. As soon as you begin to enter
the input data file the following window appears and you select the input data file from
where you have stored.
Fig 7.4
Output table
Fig 7.5
Experiment 7(b):
Study the performance of Stop and Wait protocol as the error rate is increased while
transferring the same file from client to server (LAN trainer).
Description:
Fig 7.6
To view the details on how to proceed with the experiments click on the question
mark. This is the “Help” section for the respective protocol.
Fig 7.7
The window size is constant for Stop and Wait Protocol. Vary the error rate. Click
Send to transfer the file.
At the Client, enter the internet protocol (IP) address of the source and the port id. Select
the file path where data has to be saved and click receive.
Analysis:
Click to view the analysis table. This is used to compare the performed
experiments of same or different protocols with the help of line chart and can also be
exported to excel.
Experiment:
Select the file of any size to be transmitted (Here file size is of 128Mb).Set the port
number. Vary the error rate from No Error to 10^-5.
Note:
After the Server sets the value, it should wait for the Client to set up the required
address etc. Then, only after the Client is ready, the Server should click Send and the
receiver should click Receive.
Analysis:
Click
Fig 7.8
Follow the Steps given below:
Step 1
Select the required details from the button for the User, Network, Protocol and
the Sample.
Fig 7.9
Example
Fig 7.10
Step 2
The selected sample value will be obtained in the table below.
Fig 7.11
Step 3
If it is the required sample value click on else .
Step 4
The added values will be obtained on the table
Example
Fig 7.12
Step 5
After the values are added, select the required input and output axis from the
browse button. Select either the Bar Chart or the Line Chart to view the graphs.
Example
Fig 7.13
31500000
31000000
30500000
M ean D e la y
30000000
29500000
29000000
28500000
28000000
10^-6 10^-7 10^-8 10^-9 No Error
Error Rate
Token Bus
Results
Inference
Due to increase in the error rate, no of errored packets also increase. If errored
packets increase no of retransmitted packets also increase.
Introduction:
Go Back N is a connection oriented transmission. The sender transmits the frames
continuously. Each frame in the buffer has a sequence number starting from 1 and
increasing up to the window size. The sender has a window i.e. a buffer to store the
frames. This buffer size is the number of frames to be transmitted continuously. The size
of the window depends on the protocol designer.
Operations:
A station may send multiple frames as allowed by the window size.
Receiver sends an negative ACK if frame i has an error. After that, the receiver
discards all incoming frames until the frame with error is correctly retransmitted.
If sender receives an negative ACK it will retransmit frame i and all packets i+1,
i+2,... which have been sent, but not been acknowledged.
Algorithm:
The source node transmits the frames continuously.
Each frame in the buffer has a sequence number starting from 1 and increasing up
to the window size.
The source node has a window i.e. a buffer to store the frames. This buffer size is
the number of frames to be transmitted continuously.
Sample Questions:
NetSim
Write a C/C++ program for Go Back N flow control.
a) Explain the algorithm in detail with relevant steps.
b) Draw the flow chart.
Hardware/Software Requirements:
NetSim Academic Version simulation software (for C/C++ programming
implementation)
Description:
To begin with the experiment, open NetSim.
Click on Programming from the file panel and select Transmission Flow Control.
The scenario will be as shown in the following two figures.
Fig 8.1
Select Transmission
Flow Control
Fig 8.2
Go Back N
Click Run to
execute program
When you select the User mode, you have to write your own program in C/C++,
compile and link to NetSim software for validation. Click on the F1 (help) for details on
how to proceed with your own code.
Continue with the steps as given for sample mode. As soon as you begin to enter
the input data file the following window appears and you select the input data file from
where you have stored.
Fig 8.4
Output table
Fig 8.5
Introduction:
Selective repeat is Similar to Go Back N. However, the sender only retransmits
that frame for which a negative ACK is received
Advantage over Go Back N:
Fewer retransmissions.
Disadvantages:
More complexity at sender and receiver.
Receiver may receive frames out of sequence.
Operations:
Fig 9.1
Algorithm:
The source node transmits the frames continuously.
9(a). Simulation
Implement the Selective repeat using a simple C / C++ program (NetSim)
Hardware/Software Requirements:
1. NetSim Academic Version simulation software (for C/C++ programming
implementation).
2. LAN trainer (Model LT 01) (for study)
3. LT Soft – Operational software for LAN Trainer (for study)
Sample Questions:
LAN Trainer
Experiment 9(a):
Implement the Selective repeat using a simple C / C++ program (NetSim)
Description:
To begin with the experiment, open NetSim.
Click on Programming from the file panel and select Transmission Flow Control.
The scenario will be as shown in the following two figures.
Select
Programming
Fig 9.2
Fig 9.3
Select mode
Selective Repeat
Enter input & bit
error rate
Fig 9.4
Fig 9.5
Fig 9.6
Experiment 9(b):
Compare and Contrast the performance of Go Back N and Selective protocols as the error
rate is increased while transferring the same file from client to server (LAN trainer).
Description:
Fig 9.7
Click on in the file panel. User should select one system/computer as the
Server and the rest of the system as the Client.
The window size varies for both Go Back N and Selective Repeat. Vary the error
rate. Click Send to transfer the file.
At the Client, enter the Port id of the source and the port id. Select the file path
where data has to be saved and click receive.
Analysis:
Click to view the analysis table. This is used to compare the performed
experiments of same or different protocols with the help of line chart and can also be
exported to excel.
Select the file of any size to be transmitted (Here file size is of 128Mb).Set the
port number. Vary the error rate from No Error to 10^-5.
Note:
After the Server sets the value, it should wait for the Client to set up the required
address etc. Then, only after the Client is ready, the Server should click Send and the
receiver should click Receive.
Depending on the experiment connect the cable from the system to the required
topology in the kit. Turn on the LT Kit by turning the manual switch to the Bus topology
or Star topology.
Inference:
Due to increase in the error rate, no of errored packets also increase. If errored
packets increase no of retransmitted packets also increase.
Introduction:
Distance Vector Routing is one of the routing algorithms used in a Wide Area
Network for computing shortest path between source and destination. The router is one
of the main devices used in a wide area network. The main task of the router is routing. It
forms the routing table and delivers the packets depending upon the routes in the table –
either directly or via an intermediate device (perhaps another router).
Each router initially has information about its all neighbors (i.e., it is directly
connected). After a period of time, each router exchanges its routing table among its
neighbors. After certain number of exchanges, all routers will have the full routing
information about the area of the network. After each table exchange, router re-computes
the shortest path between the routers. The algorithm used for this routing is called
Distance Vector Routing.
Algorithm:
Repeat the following steps until there is no change in the routing table for all
routers.
1. Take the Next Router routing table and its neighbor routing table.
2. Add the router entry that is not in your own routing table, but exists in any
one of the other routing tables. If the new router entry exists in more than
one neighbor, then find the minimum cost among them. The minimum
cost value details are taken as a new entry: such as source router,
intermediate router, destination router and cost value, etc.
3. Update the source router routing table cost value if both the destination
router and the intermediate router field value have the same value as any
one of the neighbors’ routing entry.
4. Update the source router’s routing table entry with the new advertised one
if the intermediate router value in the source table is not same, but the cost
value is greater than the its neighbor’s entry.
5. Write the next stage of routing table into the file.
Check whether any changes are made in any of the routers. If yes, then repeat the
above steps, otherwise, quit the process.
Sample Questions:
Netsim
Write a C/C++ program for stop and wait flow control.
a) Explain the algorithm in detail with relevant steps.
b) Draw the flow chart
Description:
Click on Programming from the file panel and select Distance Vector Routing
Fig 10.1
Connect the
Routers
Click Run to
execute the
Program
Fig 10.2
When you select the User mode, you have to write your own program in C/C++,
compile and link to NetSim software for validation. Click on the F1(Help) for details on
how to proceed with your own code.
Fig 10.3
Introduction:
The router is one of the main devices used in a wide area network. The main task
of the router is routing. It forms the routing table and delivers the packets depending upon
the routes in the table – either directly or via an intermediate device (perhaps another
router).
Link state algorithm is a method used to find the shortest path between a source
router and a destination router based on the distance and route the packets through that
route.
Algorithm:
Hardware/Software Requirements:
NetSim Academic Version simulation software (for C/C++ programming
implementation).
Sample Questions:
Netsim
Write a C/C++ program for stop and wait flow control.
a) Explain the algorithm in detail with relevant steps.
b) Draw the flow chart.
Description:
To begin with the experiment, open NetSim
Click on Programming from the file panel and select Link State Routing
Select
Mode
Select Link
State
Connect the
Routers
Click Run to
execute the
Program
Fig 11.2
When you select the User mode, you have to write your own program in C/C++,
compile and link to NetSim software for validation.
Click on the F1(Help) link for details on how to proceed with your own code.
Fig 11.3
Introduction:
A socket is a software entity that provides the basic building block for inter-
process communications. It is also an interface between the application and the network.
Once the socket is configured, the application can send the data using sockets for network
transmission and receive the data using sockets from the other host. A socket
communication can be connection oriented (TCP sockets) or connectionless (UDP
sockets).
There is a receiver (TCP/UDP) server, which listen the sender (TCP/UDP) client
communications. There can be two-way communication.
Algorithm:
Hardware/Software Requirements:
NetSim Academic Version simulation software (for C/C++ programming
implementation).
Sample Questions:
Netsim
Write a C/C++ program for socket programming.
a) Explain the algorithm in detail with relevant steps.
b) Draw the flow chart.
Description:
Click on Programming from the file panel and select Socket Programming.
Fig 12.1
Select Mode
Select Protocol
Select Operation
Enter Destination
IP Address
Click Send to
start transmission Enter data to be transmitted
Click here to
view Concept,
Algorithm,
Pseudo Code
& Flowchart
Fig 12.2
Click on the F1(Help) link for details on how to proceed with your own code.
Click Receive
to get the data
Received data