Updated CCN Lab Expts
Updated CCN Lab Expts
COLLEGE OF ENGINEERING
Department of Electronics and Communication Engineering
Bull Temple Road, Basavanagudi, Bangalore - 560 019
LAB REPORT
Submitted by
Name of the Student USN
Deviprasad H 1BM19EC044
Faculty In Charge
Dr. K. N. Madhusudan
Assistant Professor
Part A
1. Write a program to demonstrate framing.
2. Write a program to generate CRC code for checking error.
3. Write a program to simulate Shortest Path Routing Algorithm.
4. To study the Basic Networking Commands.
5. To demonstrate the Connection of computers in Local Area Network.
6. Configure Host IP, Subnet Mask and Default Gateway in a System in LAN (TCP/IP Configuration).
7. Write a program to encrypt and decrypt a given message using substitution cipher method.
8. Write a program to implement Diffie-Hellman Algorithm.
Part B
1. Configure network with the following topologies and analyze
i) BUS ii) RING iii) Fully connected mesh topology, disable a node in each of the topologies and find the
changes.
2. Simulate Ethernet LAN with 4 nodes , apply relevant TCP and UDP applications and determine
i) the number of data packets sent by UDP and TCP
ii)Average jitter of UDP and TCP
iii)Number of periodic updates sent by the routing algorithm
iv)number of ACK packets sent
3. Simulate a network of N nodes with point to point connection; apply TCP and UDP applications vary the
queue size and bandwidth and find
i) Number of packets dropped due to queue overflow
ii) Average hop count for data packets
iii) Average delay and jitter.
iv)Apply FTP and TELNET traffic between the nodes of the above network and analyze the throughput.
4. Simulate Ethernet LAN with N nodes , configure multicast traffic and Determine
i)the total multicast data bytes received
ii) Total multicast data bytes transmitted
iii) Multicast average delay at the transport layer for UDP
iv)Packets sent by DVMRP
v)Neighbors for every node as determined by DVMRP
vi)packets dropped due to expired TTL
vii)Packets dropped due to no route.
5. Apply multiple UDP and TCP applications between any 2 nodes of N (N=4)node Ethernet LAN and
compare it with experiment number 4.(compare multiple unicast with multicast )
6. Simulate a wireless ad hoc network apply relevant TCP and UDP applications between any 2 nodes and
determine
i) Number of packets dropped due to retransmission limit
ii) Number of CTS packets sent by the node
iii) Number of RTS packets sent and ACK packets sent by the node
iv) Determine the number of RTS retransmission due to timeout
v) Packet retransmission due to ACK timeout
vi) Signals received with error
7. Simulate a network having 2 LANs connected by a switch. Apply relevant TCP and UDP applications
between nodes across the LANS (send data from a node in one LAN to a node in another LAN) and
determine application layer, transport layer, network layer and MAC layer parameters.
8. Simulate a network with the topology as shown in the figure, apply TCP and UDP applications between
nodes shown in the figure. Modify the network to make communication happen between node 1 and 9 and
node 6 and 16
9. Configure a network of 5 routers with point to point connection. Apply RIP and OSPF routing algorithms
and compare.
11. Configure a wired network with 4 nodes and wireless infrastructure network with 4 nodes apply relevant
TCP and UDP applications from a node in wired network to a node in wireless network and analyze
12. a. Simulate wireless ad hoc network with 6 nodes give mobility to a node and analyze b. give mobility to
all the nodes.
PART A
Experiment 1:
Aim: Write a program to demonstrate framing.
Introduction:
Framing in the data link layer separates a message from one source to a destination, or from
other messages to other destinations, by adding a sender address and a destination address.
Although the whole message could be packed in one frame, that is not normally done. One
the reason is that a frame can be very large, making flow and error control very inefficient. When
a message is carried in one very large frame, even a single bit error would require the
retransmission of the whole message. When a message is divided into smaller frames, a single
bit error affects only that small frame.
There are two types of framing:
a. Fixed Size Framing
b. Variable Size Framing
Theory:
Variable Size Framing involves two approaches: Bit oriented and Character Oriented.
1. Bit-Oriented Protocols
In a bit-oriented protocol, the data section of a frame is a sequence of bits to be interpreted
by the upper layer as text, graphic, audio, video and so on. In addition to headers and possible
trailers, there is a flag (01111110) to separate one frame from other. If this flag sequence
appears in the data, bit stuffing is done to inform the receiver that this is not the end of the
frame. Bit stuffing is the process of stuffing one extra bit 0 to the data sequence whenever 0 followed by five
1s regardless of the value of the next bit. This extra stuffed bit is eventually removed from the data at the
receiver. This guarantees that the flag field sequence does not
inadvertently appear in the frame.
2. Character-Oriented Protocols
In a character-oriented protocol, the data to be carried are 8-bit characters from a coding
system such as ASCII. In addition to headers and possible trailers, there is a flag (01111110)
to separate one frame from another. If this flag sequence appears in the data, byte stuffing is
done to inform the receiver that this is not the end of the frame. Byte stuffing is the process of stuffing one
extra byte (escape character - ESC) whenever there is a flag or escape character in the text. Whenever the
receiver encounters the ESC character, it removes the ESC character from the data section and treats the
next character as data, not a delimiting flag.
Code:
#include <iostream>
using namespace std;
}
else stuffed[i]=data[j];
}
return stuffed;
}
int main()
{
int sz;
cout<<"enter frame size: ";
cin>>sz;
char data[sz];
cout<<"enter data frame: ";
cin>>data;
char* stuffed = stuff(data, sz);
cout<<"stuffed data:\t"<<stuffed<<endl;
cout<<"framed data: 0111110"<<stuffed<<"0111110\n";
char* destuffed= destuff(stuffed, sz);
cout<<"destuffed data:\t"<<destuffed<<endl;
return 0;
}
Output:
Code:
#include<iostream>
using namespace std;
Output:
Experiment 2:
Aim: Write a program to generate CRC code for checking error.
Introduction:
When bits are transmitted through the network, they might get corrupted due to interference. This results in
error and it is wrongly decoded at the receiver. Error detection techniques are used to check whether any
error has occurred or not. It is responsible only for the error detection and does not take into account the
number of error bits. This error detection is possible by adding some extra bits to the data. Sender sends the
original data along with some additional bits called the redundant bits. The receiver examines these
redundant bits and finds out if the data is free from error. These redundant bits are removed before passing it
to the upper layers. Cyclic Redundancy Check (CRC) is one of the techniques for detecting error in data
frames.
Theory:
CRC is a category of cyclic codes that is used in networks such as LANs and WANs. If the dataword is k
bits and codeword is n bits, then the augmented dataword is obtained by adding (n-k) zero's to the right hand
side of the dataword or it is obtained by adding (divisor length - 1) number of zero's to the RHS of dataword.
The augmented dataword is divided by the divisor (modulo-2 division). The quotient of the division is
discarded. The remainder of the division is appended to the dataword to create the codeword. At the
receiver, the decoder checks the redundant bits. Again, the codeword are divided with the same divisor. The
remainder of the division is the syndrome. If the syndrome bits are all 0's, it means that during the
transmission the data bits are not changed. Hence, redundant bits are removed and the dataword is accepted.
Otherwise, it is understood that data is corrupted and the dataword is discarded.
Code:
#include <stdio.h>
#include <conio.h>
#include <string.h>
void main()
{
int i,j,keylen,msglen;
char input[100], key[30],temp[30],quot[100],rem[30],key1[30];
printf("Enter Dataword: "); //Read dataword from user
gets(input);
}
rem[keylen-1]=input[i+keylen]; //next bit of input is assigned to last bit of rem
strcpy(temp,rem); //Copy rem to temp. Temp is dividend for next iteration
}
strcpy(rem,temp); //Copy final temp to rem
strcat(output,rem); //Concatenating remainder to dataword
int codelen=strlen(output);
printf("\nCodeword is ");
for(i=0;i<codelen;i++)
printf("%c",output[i]); //Print codeword
char rec_input[msglen+strlen(key1)];
char temp1[30],quot1[100],rem1[30];
char key_r[30],key1_r[30];
strcpy(key_r,key1);
printf("\nEnter received codeword: "); //Reads Received codeword
gets(rec_input);
int rec_len=strlen(rec_input);
for (i=0;i<keylen;i++) //Copy of user input of received bits after transmission to temp1
temp1[i]=rec_input[i];
for (i=0;i<msglen;i++)
{
quot1[i]=temp1[0];
if(quot1[i]=='0') //If quot1 is 0, then divide it by 0
{
for (j=0;j<keylen;j++)
key_r[j]='0';
}
else //If quot1 is 1, then divisor remains the same
{
for (j=0;j<keylen;j++)
key_r[j]=key1[j];
}
for (j=keylen-1;j>0;j--) //Perform XOR operation
{
if(temp1[j]==key_r[j]) //If two bits are same, then rem1=0
rem1[j-1]='0';
else //If two bits are different, rem1=1
rem1[j-1]='1';
}
rem1[keylen-1]=rec_input[i+keylen];//next bit of received data is assigned to last bit of rem1
strcpy(temp1,rem1);//Copy rem1 to temp1. Temp1 is dividend for next iteration
}
strcpy(rem1,temp1);//Copy temp1 to rem1
int rem1_len=strlen(rem1);
printf("Remainder is ");
for (i=0;i<rem1_len;i++)
printf("%c",rem1[i]);
int flag=0;
for(i=0;i<keylen-1;i++)
{ /*Check rem1 bits
If all bits are not zero, then the data is corrupted during transmission
If all bits are zero then there is no error during transmission*/
if(rem1[i]!='0')
{
flag=1;
break;
}
}
if(flag)
printf("\nDataword is discarded");
else
printf("\nDataword is accepted");
getch();
}
Output:
When the receiver receives correct dataword:
Theory:
Dijkstra's algorithm is an algorithm for finding the shortest paths between nodes in a graph, which may
represent, for example, road networks. For a given source node in the graph, the algorithm finds the shortest
path between that node and every other. It can also be used for finding the shortest paths from a single node
to a single destination node by stopping the algorithm once the shortest path to the destination node has been
determined. Routing is a process of finding the path between source and destination upon request of data
transmission. Dijkstra’s algorithm is used to build a routing table for routers in link state routing. The
algorithm divides the nodes into two sets that are tentative and permanent sets. It finds the neighbours of a
current node and makes them tentative examines them and if they pass the criteria makes them permanent
node. The criteria for making the node permanent is that the cost of the node from the source node must be
minimum compared to all other nodes present in the tentative list. The OSPF protocol i.e., open shortest path
first protocol which is inter-domain routing protocol is based on this link state routing.
Code:
#include <iostream>
using namespace std;
void dijkstra(int g[10][10],int n,int s)
{
int cost[10][10],dist[10],pred[10];
int v[10],count,min_dist,next_node;
for(int i=0;i<n;i++)
{
for(int j=0;j<n;j++)
{
if(g[i][j]==0)
cost[i][j]=9999;
else
cost[i][j]=g[i][j];
}
}
for(int i=0;i<n;i++)
{
dist[i]=cost[s][i];
pred[i]=s;
v[i]=0;
}
dist[s]=0;
v[s]=1;
count=1;
while(count<n-1)
{
min_dist=9999;
for(int i=0;i<n;i++)
{
if(dist[i]<min_dist && !v[i])
{
min_dist=dist[i];
next_node=i;
}
}
v[next_node]=1;
for(int i=0;i<n;i++)
{
if(!v[i])
{
if(min_dist+cost[next_node][i]<dist[i])
{
dist[i]=min_dist+cost[next_node][i];
pred[i]=next_node; } } }
count++;
}
for(int i=0;i<n;i++)
{
if(i!=s)
{
cout<<"\ndist of node "<<i<<"= "<<dist[i];
cout<<"\npath= "<<i;
int j=i;
do{
j=pred[j];
cout<<"<-"<<j;
}while(j!=s); } } }
int main()
{
int g[10][10],n,u;
cout<<"enter no. of vertices:";
cin>>n;
cout<<"enter matrix\n";
for(int i=0;i<n;i++)
{ for(int j=0;j<n;j++)
cin>>g[i][j];
}
cout<<"enter staring node:";
cin>>u;
dijkstra(g,n,u);
}
Output:
Experiment 4:
Theory:
Stop-and-wait ARQ, also referred to as alternating bit protocol, is a method in telecommunications to send
information between two connected devices. It ensures that information is not lost due to dropped packets
and that packets are received in the correct order. It is the simplest automatic repeat-request (ARQ)
mechanism. A stop-and-wait ARQ sender sends one frame at a time; it is a special case of the general sliding
window protocol with transmit and receive window sizes equal to one and greater than one respectively.
After sending each frame, the sender doesn't send any further frames until it receives an acknowledgement
(ACK) signal. After receiving a valid frame, the receiver sends an ACK. If the ACK does not reach the
sender before a certain time, known as the timeout, the sender sends the same frame again. The timeout
countdown is reset after each frame transmission. The above behaviour is a basic example of Stop-and-Wait.
However, real-life implementations vary to address certain issues of design.
Code:
#include <iostream>
#include <unistd.h>
using namespace std;
int main()
{
int x,x1=10,x2;
int frame = 0;
int frame_num = 10;
cout<<"\nnumber of frames is:"<<frame;
while(frame < frame_num)
{
cout<<"\nsending frame:"<<frame;
x = rand()%10;
if(x%10 == 0)
{
cout<<"waiting for 1 second\n";
sleep(1);
cout<<"\nsending frame :"<<frame<<"\n";
}
cout<<"\nack for frame :"<<frame<<"\n";
frame++;
}
printf("\n end of stop and wait protocol\n");
return 0;
}
Output:
b. Go back N Protocol
Theory:
Go–Back–N ARQ uses the concept of protocol pipelining, i.e. sending multiple frames before receiving the
acknowledgment for the first frame. The frames are sequentially numbered and a finite number of frames.
The maximum number of frames that can be sent depends upon the size of the sending window. If the
acknowledgment of a frame is not received within an agreed upon time period, all frames starting from that
frame are retransmitted.
Code:
#include<stdio.h>
#include<iostream>
int main()
{
int w,i,f,frames[50];
int start=0, ack;
cout<<"Enter window size:";
cin>>w;
cout<<"\nEnter number of frames to transmit:";
cin>>f;
cout<<"\nEnter "<<f<<" frames:";
for(i=0;i<f;i++)
cin>>frames[i];
while(ack != f)
{
cout<<"\nTransmitted frames:";
for(i=start;i<(start+w);i++)
{
if(i < f)
cout<<frames[i]<<" ";
}
cout<<"\nEnter last acknowledgement:";
cin>>ack;
start = ack;
}
cout<<"\nAll frames sent and received\n";
return 0;
}
Output:
Theory:
Selective Repeat protocol provides for sending multiple frames depending upon the availability of frames in
the sending window, even if it does not receive acknowledgement for any frame in the interim. The
maximum number of frames that can be sent depends upon the size of the sending window. The receiver
records the sequence number of the earliest incorrect or un-received frame .It then fills the receiving window
with the subsequent frames that it has received. It sends the sequence number of the missing frame along
with every acknowledgement frame. The sender continues to send frames that are in its sending window.
Once it has sent all the frames in the window, it retransmits the frame whose sequence number is given by
the acknowledgements. It then continues sending the other frames.
Code:
#include<stdio.h>
#include<iostream>
int main()
{
int windowsize,sent=0,ack,i;
cout<<"enter window size\n";
cin>>windowsize;
while(1)
{
for( i = 0; i < windowsize; i++)
{
cout<<"Frame "<<sent<<" has been transmitted\n";
sent++;
if(sent == windowsize)
break;
}
cout<<"\nPlease enter the last Acknowledgement received\n";
cin>>ack;
if(ack == windowsize)
break;
else
sent = ack; }
return 0;
}
Output:
Experiment 5:
Code:
#include <iostream>
using namespace std;
int main()
{
system("ipconfig");
return 0;
}
Output:
Experiment 6:
Aim: Configure Host IP, Subnet Mask and Default Gateway in a System in LAN (TCP/IP Configuration).
Theory:
Both MAC Address and IP Address are used to uniquely define a device on the internet. NIC Card’s
Manufacturer provides the MAC Address, on the other hand Internet Service Provider provides IP Address.
MAC Address stands for Media Access Control Address and IP Address stands for Internet Protocol
Address. MAC address is a six bytes hexadecimal address. IP address is a 4 bytes (IPv4) or 6 bytes (IPv6)
address. MAC Address is a physical address whereas, IP Address is a logical address. The MAC Address of
a device can be figured out using ARP Protocol. The IP address of a device is figured out using RARP
protocol. MAC Addresses can’t be found easily by third parties. MAC Address helps in simply identifying
the device. IP Address identifies the connection of the device on the network.
Code:
//To discover IP Address, subnet mask, default gateway of a system
#include <iostream>
int main()
{
system("ipconfig");
return 0;
}
Experiment 7:
Aim: Write a program to encrypt and decrypt a given message using substitution cipher method.
Introduction:Plain text is the message or data that can be readable by the sender, receiver or any third party.
When the plain text is modified by using some algorithms or techniques, the resulting data or message is
called ciphertext. In short, converting plain text, i.e. readable text, into non-readable text is called ciphertext.
Theory:
In Caesar cipher, the set of plain text characters is replaced by any other character, symbols or numbers. It is
a very weak technique of hiding text. In Caesar’s cipher, each alphabet in the message is replaced by a fixed
number (key) places down.
Code:
#include<iostream>
using namespace std;
int main()
{
char message[100];
int key;
cout<<"Enter a message to encrypt:";
gets(message);
cout<<"Enter key:";
cin>>key;
{
message[i] = message[i] - 'z' + 'a' - 1;
}
}
else if(message[i] >= 'A' && message[i] <= 'Z')
{
message[i] = message[i] + key;
if(message[i] > 'Z')
{
message[i] = message[i] - 'Z' + 'A' - 1;
}
}
}
cout<<endl<<"Encrypted message:"<<message<<endl;
for(int i=0; message[i] != '\0'; i++)
{
if(message[i] >= 'a' && message[i] <= 'z')
{
message[i] = message[i] - key;
if(message[i] < 'a')
{
message[i] = message[i] + 'z' - 'a' + 1;
}
}
else if(message[i] >= 'A' && message[i] <= 'Z')
{
message[i] = message[i] - key;
if(message[i] < 'A')
Output:
Experiment 8:
Aim: Write a program to implement Diffie-Hellman Algorithm.
Introduction:
The Diffie-Hellman algorithm is being used to establish a shared secret that can be used for
secret communications while exchanging data over a public network using the elliptic curve to generate
points and get the secret key using the parameters.
Theory:
The Diffie-Hellman algorithm is being used to establish a shared secret that can be used for
secret communications while exchanging data over a public network using the elliptic curve to generate
points and get the secret key using the parameters.
For the sake of simplicity and practical implementation of the algorithm, we will consider only 4
variables, one prime P and G (a primitive root of P) and two private values a and b.
P and G are both publicly available numbers. Users (say end user1 and end user2) pick private values a
and b and they generate a key and exchange it publicly. The opposite person receives the key and that
generates a secret key, after which they have the same secret key to encrypt.
Code:
#include<iostream>
#include<math.h>
AIM: Configure network with the following topologies and analyze i) BUS ii) RING iii)
Fully connected mesh topology, disable a node in each of the topologies and find the
changes.
PROCEDURE:
1. Select the nodes and connect them using link option.
2. Select CBR and connect the nodes which are to be observed as client and server.
3. After the connections are made save, simulate and run.
4. To deactivate a node after running, right click on the node that has to be deactivated and click on the
deactivate option.
5. To analyse the throughput and other performance variables, click on analysis option.
6. Repeat the same for all topologies.
OBSERVATIONS:
i) BUS
CBR Client
CBR Server
Throughput
WITH DEACTIVATED NODE
CBR Client
Throughput
ii) RING
CBR Client
CBR Server
Throughput
CBR Client
CBR Server
Throughput
CBR Server
Throughput
WITH DEACTIVATED NODE
CBR Client
CBR Server
Throughput
RESULTS:
1. Bus topology does not work after one of the nodes is deactivated.
2. Ring topology works fine until the server or the client node is not deactivated as one or the other
connecting nodes will complete the path.
3. Mesh topology works perfectly even when one of the nodes is deactivated as all of the nodes are
connected to every other node.
Experiment 2:
AIM: Simulate Ethernet LAN with 4 nodes, apply relevant TCP and UDP applications and
Determine:
i) The number of data packets sent by UDP and TCP
ii) Average jitter of UDP and TCP
iii) Number of periodic updates sent by the routing algorithm
iv) Number of ACK packets sent
PROCEDURE:
1. Select the nodes and connect them to the hub using links.
2. Select CBR and also a TCP application such as FTP or TELNET and connect them as shown.
3. Save, simulate and run and check the performance parameters by going to analysis.
4. Select transport layer and appropriate application (UDP or TCP) to find the jitter and throughput.
OBSERVATIONS:
UDP data sent
UDP throughput
TCP throughput
RESULTS:
AIM: Simulate a network of N nodes with point to point connection; apply TCP and UDP applications
vary the queue size and bandwidth and find
i) Number of packets dropped due to queue overflow
ii) Average hop count for data packets
iii) Average delay and jitter.
iv) Apply FTP and TELNET traffic between the nodes of the above network and analyse the throughput.
PROCEDURE:
Average delay
Average jitter
RESULTS:
Number of packets dropped due to queue overflow: 3 packets at node 2
Average jitter
Node id number of packets
1 4 e-05
2 4.5 e-05
3 5 e-05
4 0.00032
5 0.00018
6 9 e-05
Experiment 4:
AIM: Simulate Ethernet LAN with N nodes, configure multicast traffic and Determine
i) The total multicast data bytes received
ii) Total multicast data bytes transmitted
iii) Multicast average delay at the transport layer for UDP
iv) Packets sent by DVMRP
v) Neighbors for every node as determined by DVMRP
vi) Packets dropped due to expired TTL
vii) Packets dropped due to no route.
PROCEDURE:
RESULTS:
The outputs are
AIM: Apply multiple UDP and TCP applications between any 2 nodes of N (N=4)node Ethernet
LAN and compare it with experiment number 4.(compare multiple unicast with multicast )
PROCEDURE:
OBSERVATIONS:
Total multiple unicast data bytes received
Total multiple unicast data bytes sent
RESULTS:
The neighbors and packets sent by dvmrp not there as in multicast.
The outputs are
AIM: Simulate a wireless ad hoc network apply relevant TCP and UDP applications between any 2 nodes
and determine
i) Number of packets dropped due to retransmission limit
ii) Number of CTS packets sent by the node
iii) Number of RTS packets sent and ACK packets sent by the node
iv) Determine the number of RTS retransmission due to timeout
v) Packet retransmission due to ACK timeout
vi) Signals received with error
PROCEDURE:
1. Click on the scenario generator and change the terrain dimensions as follows.
OBSERVATIONS:
Number of packets dropped due to retransmission limit
RESULTS:
1 0
2 24
3 87
4 47
1 0
2 24
3 87
4 47
The number of RTS retransmission due to timeout
AIM: Simulate a network having 2 LANs connected by a switch. Apply relevant TCP and UDP
applications between nodes across the LANS (send data from a node in one LAN to a node in another LAN)
and determine application layer, transport layer, network layer and MAC layer parameters.
PROCEDURE:
OBSERVATIONS:
APPLICATION LAYER
TRANSPORT LAYER
IP average delay
IP average jitter
MAC LAYER
802.3 Half duplex Unicast data bytes sent to the physical layer
802.3 Half duplex Unicast data bytes received to the physical layer
802.3 Half duplex average medium delay at the mac layer for Unicast packets
802.3 Half duplex average jitter at the mac layer for Unicast packets
RESULTS:
TELNET client total bytes sent
Node id number of bytes
5 1300
802.3 Half duplex Unicast data bytes sent to the physical layer
Node id number of packets
3 13000
5 7000
8 5000
11 26000
802.3 Half duplex Unicast data bytes received to the physical layer
Node id number of packets
5 5000
7 13000
8 7000
11 26000
802.3 Half duplex average medium delay at the mac layer for Unicast packets
Node id number of packets
5 1.5 e-05
7 5 e-05
8 1.25 e-05
11 5 e-06
AIM: Simulate a network with the topology as shown in the figure, apply TCP and UDP applications
between nodes shown in the figure. Modify the network to make communication happen between node 1
and 9 and node 6 and 16.
PROCEDURE:
OBSERVATIONS:
RESULTS:
The above network is simulated and verified.
Experiment 9:
AIM: Configure a network of 5 routers with point to point connection. Apply RIP and OSPF routing
algorithms and compare.
PROCEDURE:
RIP protocol
OSPF protocol
RESULTS:
Regular update event
Node id number of packets
1 1
2 1
3 1
4 1
5 1
6 1
PROCEDURE:
1. Make connections as given in figure
a. Select the subnet Set station association type to Dynamic Station scan type to active
b. To set a node as access point
c. Select the node and from properties select interface0
d. Select MAC layer and set access point field to yes
OBSERVATIONS:
Message segments received at transport layer
RESULTS:
Hence, the wireless infrastructure network is simulated and it’s various parameters is observed.
Experiment 11:
AIM: Configure a wired network with 4 nodes and wireless infrastructure network with 4 nodes apply
relevant TCP and UDP applications from a node in wired network to a node in wireless network and
analyze.
PROCEDURE:
1. Make necessary connections as shown in the figure
IP
Average delay
Average jitter
RESULTS:
The devices communicates with each other through an access point. Here node 3 is the AP. The access point
communicates with LAN with the help of a switch. The required parameters are recorded above.
Experiment 12:
AIM:
a. Simulate wireless ad hoc network with 6 nodes give mobility to a node and analyze.
b. give mobility to all the nodes.
PROCEDURE:
4. To give mobility to all the nodes Select the nodes Go to properties, node configuration
choose the mobility model
OBSERVATIONS:
Unicast data bytes sent from transport layer
RESULTS:
1. Here the mobility is given to only one node and observations were made.
2. Mobility to all nodes were given and all the nodes and data transfer is observed.