0% found this document useful (0 votes)
29 views18 pages

Cnlab 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views18 pages

Cnlab 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Computer Networks Lab

Experiment: 10
AIM:
Wireshark
i. Packet Capture Using Wire shark
ii. Starting Wire shark
iii. Viewing Captured Traffic
iv. Analysis and Statistics & Filters
Description:
Wireshark is an open-source network protocol analyzer developed by
Gerald Combs in 1998, supported by a community of network
professionals and developers. It's widely regarded as safe and is utilized
by various organizations for troubleshooting and educational purposes,
offering deep insights into networking. While Wireshark's capabilities
raise questions about legality, it is ethical and legal to use it on networks
where you have explicit permission to analyze traffic, ensuring respect
for privacy and security norms.
i) Packet Capturing Using
Wireshark How to download
Wireshark:
To download Wireshark for Windows, follow these simplified steps:
1. Visit the official Wireshark website at https://www.wireshark.org/.
and navigate to the Download page.

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

2. Select the version appropriate for your Windows operating system (32-bit or 64-bit).
Ensure you choose the version that matches your system architecture.
3. Download the installer for the current release, which might have updated from 3.0.3 to
a newer version since this writing.
4. Run the downloaded installer and follow the on-screen instructions to complete the
installation.
Select the Network Interface for Capture: When you start WireShark, the first screen lists
the available network interfaces on your computer. Choose the one corresponding to the
network you want to monitor. This could be your Ethernet connection, Wi-Fi, or any other
network interface. If you're unsure which one to select, look for the interface with the highest
amount of traffic.
Start the Capture: Click on the network interface to start capturing packets. You can also
click on the gear icon next to an interface to configure capture options before starting.
You can select one or more of the network interfaces using “shift left-click”. Once you have
the network interface selected, you can start the capture, and there are several ways to do that.
Click the first button on the toolbar, titled “Start Capturing Packets.”

You can select the menu item Capture -> Start Or you could use the keystroke Control – E.
During the capture, Wireshark will show you the packets that it captures in real-time.

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

Once you have captured all the packets you need, you use the same buttons or menu options to
stop the capture.
ii) Starting WireShark
 Open WireShark by clicking on its icon or typing wireshark in your command line or
terminal.
 The main window will show a list of network interfaces. Double-click on one to start
capturing packets on that interface.
 To stop the capture, click on the red square button at the top left corner of the window.

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

iii) Viewing Captured Traffic


 Main Window: Once the capture has started, packets will begin to appear in real-time
in the main window. You’ll see columns for the time, source and destination addresses,
protocol, and info about each packet.
 No.: This is the number order of the packet that got captured. The bracket
indicates that this packet is part of a conversation.
 Time: This column shows you how long after you started the capture that this
packet got captured. You can change this value in the Settings menu if you need
something different displayed.
 Source: This is the address of the system that sent the packet.
 Destination: This is the address of the destination of that packet.
 Protocol: This is the type of packet, for example, TCP, DNS, DHCPv6, or ARP.
 Length: This column shows you the length of the packet in bytes.
 Info: This column shows you more information about the packet contents, and
will vary depending on what kind of packet it is.
 Inspecting a Packet: Click on a packet to select it. Below the list of packets, details
about the selected packet will be displayed, broken down into layers (Ethernet, IP, TCP,
etc.). Further below, you can see the raw data of the packet.

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

 Follow Streams: For TCP/UDP streams, you can right-click a packet and select
"Follow" -> "TCP Stream" (or UDP) to see the entire conversation between the two

endpoints.

iv) Analysis and Statistics & Filters


 Using Filters: WireShark allows you to apply display filters to isolate packets based
on specific criteria. For example, tcp.port == 80 will display only packets sent to or
from TCP port 80. Display filters are applied in the bar at the top of the packet list

window.
 Statistics: The "Statistics" menu offers various options for analyzing the captured data,
such as endpoint lists, protocol hierarchy, and flow graphs.

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

 Exporting Data: You can export packets or data streams for further analysis. Right-
click on a packet or stream and select the appropriate export option

Experiment 11
AIM:
How to run Nmap scan
Procedure:
How to Run an Nmap Scan
Introduction to Nmap Nmap is a powerful network scanning tool that identifies devices on a
network and their operating systems and services. It's used for securing large and small
networks, especially with the rise of IoT devices.
What Nmap Does Nmap provides real-time information on networks, detailing every active
IP, offering insights on the network structure, and helping in securing websites by identifying
vulnerabilities.
How to Use Nmap Nmap is command-line oriented, suitable for users familiar with CLI. It
consolidates various network monitoring tools into one application.
Installing Nmap
To install Nmap on Windows, follow these steps:
Step 1: Download the official Nmap installer for Windows from the Nmap website
(https://nmap.org/download.html).
Step 2: Locate the downloaded file, typically named nmap-<version>-setup.exe, where
<version> is the version number of Nmap.
Step 3: Double-click the installer file to start the installation process.
Step 4: If prompted, approve the security warning to allow the installer to run.

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

Step 5: Follow the on-screen instructions provided by the setup wizard. This may include
accepting the license agreement, choosing installation options, and selecting an installation
directory.
Step 6: Complete the installation. The installer may optionally install WinPcap or Npcap
(required for packet capture capabilities) if it is not already installed on your system. It's
recommended to allow this installation.
Step 7: Once the installation is complete, you can launch Nmap from the Start menu or by
using the command line.
Nmap Tutorial and Examples
 Ping Scan: Identify active hosts without sending packets to the hosts (nmap -sp
192.100.1.1/24).
 Host Scan: Sends ARP requests to gather more detailed information about hosts (nmap
-sp <target IP range>).
 Using Nmap in Kali Linux: Kali includes a comprehensive Nmap suite with additional
tools for advanced scanning and analysis.
Nmap Commands
 Ping Scanning: nmap -sp <IP range>
 Port Scanning: Various commands for TCP and UDP scans, such as nmap -sS for a
TCP SYN scan.
 Host Scanning: Detailed scan on specific hosts or IP ranges (nmap -sp <target IP
range>).
 OS Scanning: Identifies operating systems of hosts (nmap -O <target IP>).
 Scan Popular Ports: Scans the most commonly targeted ports (nmap --top-ports 20
192.168.1.106).
 Output to File: Saves scan results to a file (-oN output.txt or -oX output.xml).
 Disable DNS Name Resolution: Speeds up scans by skipping DNS resolution (nmap
-sp -n 192.100.1.1/24).
Experiment 12
AIM:
Operating System Detection using Nmap
Procedure:
Operating System Detection with Nmap
How It Works
 TCP/IP Stack Fingerprinting: Nmap examines the intricacies of responses to TCP
and UDP packets it sends to the target host. This involves analyzing various aspects
like TCP Initial Sequence Number (ISN) sampling, support and ordering of TCP
options, and the initial window size.
 Database Comparison: The responses are compared with Nmap's nmap-os-db
database, which contains over 2,600 OS fingerprints. These fingerprints detail the
operating system's characteristics, including vendor, underlying OS, and device type.
Many fingerprints are associated with a Common Platform Enumeration (CPE)
identifier.
 Contribution: If Nmap cannot identify the OS but the conditions are right (at least one
open and one closed port found), it provides a URL for users to submit a new
fingerprint. This helps enhance the accuracy of Nmap for everyone.
Additional Features Enabled by OS Detection

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

 TCP Sequence Predictability Classification: Estimates the difficulty of establishing


a forged TCP connection, useful for assessing vulnerability to certain spoofing attacks.
This classification ranges from "trivial joke" to "worthy challenge" and is provided in
verbose mode.
 Uptime Guessing: Utilizes TCP timestamps to estimate when the machine was last
rebooted. This estimate might not always be accurate due to factors like timestamp
counter initialization or overflow.
Controlling OS Detection
 -O Option: Activates OS detection.
 -A Option: Enables OS detection among other advanced scanning features.
 --osscan-limit: Limits OS detection to targets that have at least one open and one closed
port, improving efficiency.
 --osscan-guess or --fuzzy: Makes Nmap guess the OS more aggressively when it
cannot find a perfect match, providing confidence levels for its guesses.
 --max-os-tries: Sets the maximum number of OS detection attempts Nmap will make,
allowing for either faster scans with fewer tries or more thorough scans with more
attempts.
Experiment 13
AIM:
Do the following using NS2 Simulator
i. NS2 Simulator-Introduction
ii. Simulate to Find the Number of Packets Dropped
iii. Simulate to Find the Number of Packets Dropped by TCP/UDP
iv. Simulate to Find the Number of Packets Dropped due to Congestion
v. Simulate to Compare Data Rate& Throughput.
vi. Simulate to Plot Congestion for Different Source/Destination
vii. Simulate to Determine the Performance with respect to Transmission of Packets
Procedure:
SIMULATION USING NS-2
i )Introduction to NS-2:
NS2 is an open-source simulation tool that runs on Linux. It is a discreet event simulator
targeted at networking research and provides substantial support for simulation of routing,
multicast protocols and IP protocols, such as UDP, TCP, RTP and SRM over wired and
wireless (local and satellite) networks. Widely known as NS2, is simply an event driven
simulation tool. Useful in studying the dynamic nature of communication networks. Simulation
of wired as well as wireless network functions and protocols (e.g., routing algorithms, TCP,
UDP) can be done using NS2. In general, NS2 provides users with a way of specifying such
network protocols and simulating their corresponding behaviors.

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

TCL – Tool Command Language


Tcl is a very simple programming language. If you have programmed before, you can learn
enough to write interesting Tcl programs within a few hours. This page provides a quick
overview of the main features of Tcl. After reading this you'll probably be able to start writing
simple Tcl scripts on your own; however, we recommend that you consult one of the many
available Tcl books for more complete information.
Basic syntax
Tcl scripts are made up of commands separated by newlines or semicolons.
Commands all have the same basic form illustrated by the following example: expr 20 + 10
This command computes the sum of 20 and 10 and returns the result, 30. You can try out this
example and all the others in this page by typing them to a Tcl application such as tclsh; after
a command completes, tclsh prints its result.
Each Tcl command consists of one or more words separated by spaces. In this example there
are four words: expr, 20, +, and 10. The first word is the name of a command and the other
words are arguments to that command. All Tcl commands consist of words, but different
commands treat their arguments differently. The expr command treats all of its arguments
together as an arithmetic expression, computes the result of that expression, and returns the
result as a string. In the expr command the division into words isn't significant: you could just
as easily have invoked the same command as expr 20+10
However, for most commands the word structure is important, with each word used for a
distinct purpose. All Tcl commands return results. If a command has no meaningful result then
it returns an empty string as its result.
Variables
Tcl allows you to store values in variables and use the values later in commands. The set
command is used to write and read variables. For example, the following command modifies
the variable x to hold the value 32:
set x 32
The command returns the new value of the variable. You can read the value of a variable by
invoking set with only a single argument:
set x

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

You don't need to declare variables in Tcl: a variable is created automatically the first time it
is set. Tcl variables don't have types: any variable can hold any value. To use the value of a
variable in a command, use variable substitution as in the following example:
expr $x*3
When a $ appears in a command, Tcl treats the letters and digits following it as a variable name,
and substitutes the value of the variable in place of the name. In this example, the actual
argument received by the expr command will be 32*3 (assuming that variable x was set as in
the previous example). You can use variable substitution in any word of any command, or even
multiple times within a word:
set cmd
expr set x 11
$cmd $x*$x
Command substitution You can also use the result of one command in an argument to another
command. This is called command substitution:
set a 44
set b [expr $a*4]
When a [ appears in a command, Tcl treats everything between it and the matching ] as a nested
Tcl command. Tcl evaluates the nested command and substitutes its result into the enclosing
command in place of the bracketed text. In the example above the second argument of the
second set command will be 176.
Quotes and braces Double-quotes allow you to specify words that contain spaces. For example,
consider the following script:
set x 24
set y 18
set z "$x + $y is [expr $x + $y]"
After these three commands are evaluated variable z will have the value 24 + 18 is 42.
Everything between the quotes is passed to the set command as a single word. Note that
(a) command and variable substitutions are performed on the text between the quotes, and
(b) the quotes themselves are not passed to the command. If the quotes were not present, the
set command would have received 6 arguments, which would have caused an error.
Curly braces provide another way of grouping information into words. They are different from
quotes in that no substitutions are performed on the text between the curly braces:
set z {$x + $y is [expr $x + $y]}
This command sets variable z to the value "$x + $y is [expr $x + $y]".
Control structures
Tcl provides a complete set of control structures including commands for conditional
execution, looping, and procedures. Tcl control structures are just commands that take Tcl
scripts as arguments. The example below creates a Tcl procedure called power, which raises a
base to an integer power:
proc power {base p} {
set result 1
while {$p > 0} {
set result [expr $result * $base]
set p [expr $p - 1]
}
return $result

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

}
This script consists of a single command, proc. The proc command takes three arguments: the
name of a procedure, a list of argument names, and the body of the procedure, which is a Tcl
script. Note that everything between the curly brace at the end of the first line and the curly
brace on the last line is passed verbatim to proc as a single argument. The proc command
creates a new Tcl command named power that takes two arguments. You can then invoke
power with commands like the following:
power 2 6
power 1.15 5
When power is invoked, the procedure body is evaluated. While the body is executing it can
access its arguments as variables: base will hold the first argument and p will hold the second.
The body of the power procedure contains three Tcl commands: set, while, and return. The
while command does most of the work of the procedure. It takes two arguments, an expression
($p > 0) and a body, which is another Tcl script. The while command evaluates its expression
argument using rules similar to those of the C programming language and if the result is true
(nonzero) then it evaluates the body as a Tcl script. It repeats this process over and over until
eventually the expression evaluates to false (zero). In this case the body of the while command
multiplied the result value by base and then decrements p. When p reaches zero the result
contains the desired power of base. The return command causes the procedure to exit with the
value of variable result as the procedure's result.
Where do commands come from?
As you have seen, all of the interesting features in Tcl are represented by commands.
Statements are commands, expressions are evaluated by executing commands, control
structures are commands, and procedures are commands.
Tcl commands are created in three ways. One group of commands is provided by the Tcl
interpreter itself. These commands are called builtin commands. They include all of the
commands you have seen so far and many more (see below). The builtin commands are present
in all Tcl applications.
The second group of commands is created using the Tcl extension mechanism. Tcl provides
APIs that allow you to create a new command by writing a command procedure in C or C++
that implements the command. You then register the command procedure with the Tcl
interpreter by telling Tcl the name of the command that the procedure implements. In the future,
whenever that particular name is used for a Tcl command, Tcl will call your command
procedure to execute the command. The builtin commands are also implemented using this
same extension mechanism; their command procedures are simply part of the Tcl library.
When Tcl is used inside an application, the application incorporates its key features into Tcl
using the extension mechanism. Thus the set of available Tcl commands varies from
application to application. There are also numerous extension packages that can be
incorporated into any Tcl application. One of the best known extensions is Tk, which provides
powerful facilities for building graphical user interfaces. Other extensions provide object-
oriented programming, database access, more graphical capabilities, and a variety of other
features. One of Tcl's greatest advantages for building integration applications is the ease with
which it can be extended to incorporate new features or communicate with other resources.
The third group of commands consists of procedures created with the proc command, such as
the power command created above. Typically, extensions are used for lower-level functions

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

where C programming is convenient, and procedures are used for higher-level functions where
it is easier to write in Tcl.
Wired TCL Script Components
Create the event scheduler
Open new files & turn on the tracing
Create the nodes
Setup the links
Configure the traffic type (e.g., TCP, UDP, etc)
Set the time of traffic generation (e.g., CBR, FTP)
Terminate the simulation
NS Simulator Preliminaries.
Initialization and termination aspects of the ns simulator.
Definition of network nodes, links, queues and topology.
Definition of agents and of applications.
The nam visualization tool.
Tracing and random variables.
Features of NS2
NS2 can be employed in most unix systems and windows. Most of the NS2 code is in C++. It
uses TCL as its scripting language, Otcl adds object orientation to TCL.NS(version 2) is an
object oriented, discrete event driven network simulator that is freely distributed and open
source.
 Traffic Models: CBR, VBR, Web etc
 Protocols: TCP, UDP, HTTP, Routing algorithms,MAC etc
 Error Models: Uniform, bursty etc
 Misc: Radio propagation, Mobility models , Energy Models
 Topology Generation tools
 Visualization tools (NAM), Tracing Structure of NS
 NS is an object oriented discrete event simulator
– Simulator maintains list of events and executes one event after another
– Single thread of control: no locking or race conditions
 Back end is C++ event scheduler
– Protocols mostly
– Fast to run, more control • Front end is OTCL
 Creating scenarios, extensions to C++ protocols fast to write and change
Platforms
It can be employed in most unix systems(FreeBSD, Linux, Solaris) and Windows.
Source code
Most of NS2 code is in C++
Scripting language
It uses TCL as its scripting language OTcl adds object orientation to TCL.
Protocols implemented in NS2
Transport layer(Traffic Agent) – TCP, UDP
Network layer(Routing agent)
Interface queue – FIFO queue, Drop Tail queue, Priority queue
Logic link contol layer – IEEE 802.2, AR
How to use NS2

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

Design Simulation – Determine simulation scenario


Build ns-2 script using tcl.
Run simulation
Simulation with NS2
Define objects of simulation.
Connect the objects to each other
Start the source applications. Packets are then created and are transmitted through network.
Exit the simulator after a certain fixed time.
NS programming Structure
 Create the event scheduler
 Turn on tracing
 Create network topology
 Create transport connections
 Generate traffic
 Insert errors
ii& iii) Simulate a three-node point-to-point network with a duplex link between
them. Set the queue size and vary the bandwidth and find the number of packets
dropped.
STEPS:
Step1: Select the hub icon on the toolbar and drag it onto the working window.
Step2: Select the host icon on the toolbar and drag it onto the working window. Repeat this for
another host icon.
Step3: Select the link icon on the toolbar and drag it on the screen from host (node 1) to the
hub and again from host(node 2) to the hub. Here the hub acts as node 3 in the point-to-point
network. This leads to the creation of the 3-node point-to-point network topology. Save this
topology as a .tpl file.
Step4: Double-click on host(node 1), a host dialog box will open up. Click on Node editor and
you can see the different layers- interface, ARP, FIFO, MAC, TCPDUMP, Physical layers.
Select MAC and then select full-duplex for switches and routers and half duplex for hubs, and
in log Statistics, select Number of Drop Packets, Number of Collisions, Throughput of
incoming packets and Throughput of outgoing packets. Select FIFO and set the queue size to
50 and press OK. Then click on Add. Another dialog box pops up. Click on the Command box
and type the Command according to the following syntax:
stg [-t duration(sec)] [-p port number]HostIPaddr
and click OK.
Step 5: Double-click on host (node 2), and follow the same step as above with only change in
command according to the following syntax: rtg [-t] [-w log] [-p port number] and click OK.
Step 6: Double click on the link between node 1 and the hub to set the bandwidth to some
initial 56 value say, 10 Mbps. Repeat the same for the other node.
Step 7: Click on the E button (Edit Property) present on the toolbar in order to save the changes
made to the topology. Now click on the R button (RunSimulation). By doing so a user can
run/pause/continue/stop/abort/disconnect/reconnect/submit a simulation. No simulation
settings can be changed in this mode.
Step 8: Now go to Menu->Simulation->Run. Executing this command will submit he current
simulation job to one available simulation server managed by the dispatcher. When the

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

simulation server is executing, the user will see the time knot at the bottom of the screen move.
The time knot reflects the current virtual time (progress) of the simulation case.
Step 9: To start the playback, the user can left-click the start icon( |>) of the time bar located
at the bottom. The animation player will then start playing the recorded packet animation.
Step 10: Change the bandwidth say, 9 Mbps, and run the simulation and compare the two
results.
Step 11: To view the results, go to the filename. results folder.
Note: To get the syntax of any command, double click on the host icon. Host dialog boxes
appear and then choose App. Usage.
The screenshot below explain the topology.

iv )Simulate the transmission of ping messages over a network topology consisting


of 6 nodes and find the number of packets dropped due to congestion.
STEPS:
Step 1: Click on the subnet icon on the toolbar and then click on the screen of the working
window.
Step 2: Select the required number of hosts and a suitable radius between the host and the
switch.
Step 3: In the edit mode, get the IP address of one of the hosts say, host 1 and then for the other
host say, host2 set the drop packet and no: of collisions statistics as described in the earlier
experiments.
Step 4: Now run the simulation.
Step 5: Now click on any one of the hosts and click on command console and ping the
destination node.
ping IP Address of the host

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

Note: The no: of drop packets are obtained only when the traffic is more in the network. For
checking the no of packets dropped press ctrl+C
The screenshot of the topology is shown below:

v)
Here is the Step-by-step guide on setting up and running a basic simulation in NS2 to compare
data rate and throughput for different network configurations.
Step 1: Install NS2
First, ensure that NS2 is installed on your computer. You can typically install NS2 using
package managers or compile it from source.
Step 2: Create a Tcl Script
NS2 simulations are controlled through Tcl (Tool Command Language) scripts. Here’s a basic
example to get you started:
1. Define your network topology: This involves setting up nodes, links, etc.
2. Setup traffic pattern: Define how data flows in the network (e.g., TCP, UDP).
3. Run the simulation: Define the simulation parameters and run it.
4. Output results: Gather results such as throughput.
Step 3: Run the Simulation
Run the simulation from the terminal:
Command: ns simple_network.tcl
Step 4: Analyze the Output

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

The simulation will output a trace file (simple_network.tr). You will need to analyze this file
to calculate throughput and other statistics.
Analyzing the trace file:
 You can write a separate script or use existing tools to parse the .tr trace file to calculate
throughput.
 Throughput is typically measured in bits per second (bps) and can be calculated as the
total number of bits received divided by the total simulation time.
Additional Steps
 Modify the topology and parameters: You can experiment with different topologies,
link bandwidths, and delays to see how they affect throughput.
 Use different protocols: Besides TCP, try using UDP and compare how it impacts the
network performance.
vi) Simulate an Ethernet LAN using N nodes and set multiple traffic nodes and
plot congestion window for different source/destination.
STEPS:
Step 1: Connect one set of hosts with a hub and another set of hosts also through a hub and
connect these two hubs through a switch. This forms an Ethernet LAN.
Step 2: Setup multiple traffic connections between the hosts on one hub and hosts on another
hub using the following command:
stcp [-p port] [-l writesize] hostIPaddr rtcp [-p port] [-l readsize]
Step 3: Setup the collision log at the destination hosts in the MAC layer as described in the
earlier experiments.
Step 4: To plot the congestion window go to Menu->Tools->Plot Graph->File->open-
>filename.results->filename.coll.log
Step 5: View the results in the filename.results.
The screenshot of the topology is shown below:

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

vii) Simulate simple ESS and with transmitting nodes in wireless LAN by
simulation and determine the performance with respect to transmission of packets.
STEPS:
Step 1: Connect a host and two WLAN access points to a router.
Step 2: Setup multiple mobile nodes around the two WLAN access points and set the path for
each mobile node.
Step 3: Setup a ttcp connection between the mobile nodes and host using the following
command:
Mobile Host 1
ttcp –t –u –s –p 3000 IPAddrOf Receiver
Mobile Host 1
ttcp –t –u –s –p 4000 IPAddrOf Receiver
Host(Receiver)
ttcp –r –u –s –p 3000 ttcp –r –u –s –p 4000
Step 4: Setup the input throughput log at the destination host.
Step 5: To set the transmission range go to Menu->Settings->WLAN mobile node- >Show
transmission range.
Step 5: View the results in the filename. results.
Screenshot:

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept


Computer Networks Lab

AITS | Prepared by Mrs.M.Surekha Asst.Prof of MCA Dept

You might also like