Computer Network Lab Manual Lnctu
Computer Network Lab Manual Lnctu
4. CO2
Implementing an IP Addressing Scheme
5. CO3
Configuring and Troubleshooting a Switched Network
6. CO3
Performing an Initial Switch Configuration
7. CO4
To construct a Wireless LAN and make the PC’s communicate
wirelessly
8. CO4
Study of basic network command and Network configuration
commands.
9. CO5
Study of Application layer protocols-DNS, HTTP, HTTPS, FTP
and TelNet
10. CO5
. Study & Simulation of MAC Protocols like Aloha, CSMA,
CSMA/CD and CSMA/CA using Standard Network Simulators
Experiment No. 1
Aim : Study of Different Type of LAN & Network Equipment’s
Theory:
Network Equipment’s
2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or
concentrator is a device for connecting multiple twisted pair or fiber optic Ethernet
devices together and making them act as a single network segment. Hubs work at the
physical layer of the OSI model. The device is a form of multiport repeater. Repeater
hubs also participate in collision detection, forwarding a jam signal to all ports if it
detects a collision.
Bus Topology:
1. Click on the PC symbol and drag drop the 4 PCs.
2. Click on the network devices and select hubs and drag and drop the 4 hubs.
3. Connect the entire hub with copper cross – over wire, and then connect the PCs with
hub by Copper Straight –Through cable respectively.
4. Click on any one PC then select the desktop menu then go to the IP Configuration.
5. Provide the IP address to all the PCs.
6. Select the message symbol and then select source and destination.
7. It can be seen that message is transfer from one PC to another PC successfully.
Ring Topology:
Result: I have performed the different types of topologies like Star, Bus, Ring successfully
on Cisco Packet Tracer.
Experiment No. 3
Aim : Write a program to implement various types of framing methods
Theory:
#include<stdio.h> b[j+1]='l';
#include<string.h> b[j+2]='e';
#include<process.h> b[j+3]=ch;
void main() b[j+4]='d';
{ b[j+5]='l';
int i=0,j=0,n,pos; b[j+6]='e';
char a[20],b[50],ch; j=j+7;
printf("Enter string\n"); }
scanf("%s",&a); if(a[i]=='d' && a[i+1]=='l' &&
n=strlen(a); a[i+2]=='e')
printf("Enter position\n"); {
scanf("%d",&pos); b[j]='d';
if(pos>n) b[j+1]='l';
{ b[j+2]='e';
printf("invalid position, Enter j=j+3;
again :"); }
scanf("%d",&pos);} b[j]=a[i];
printf("Enter the character\n"); i++;
ch=getche(); j++;
b[0]='d'; }
b[1]='l'; b[j]='d';
b[2]='e'; b[j+1]='l';
b[3]='s'; b[j+2]='e';
b[4]='t'; b[j+3]='e';
b[5]='x'; b[j+4]='t';
j=6; b[j+5]='x';
while(i<n) b[j+6]='\0';
{ printf("\nframe after stuffing:\n");
if(i==pos-1) printf("%s",b);
{ }
b[j]='d';
Program for Bit Stuffing
Security and Error detection are the most prominent features that are to be provided by any
application which transfers data from one end to the other end. One of such a mechanism in
tracking errors which may add up to the original data during transfer is known as Stuffing. It
is of two types namely Bit Stuffing and the other Character Stuffing. Coming to the Bit
Stuffing, 01111110 is appended within the original data while transfer of it. The following
program describes how it is stuffed at the sender end and de-stuffed at the reciever end.
#include<stdio.h> b[j]=a[k];
#include<string.h> count++;
void main() if(count==5)
{ {
int a[20],b[30],i,j,k,count,n; j++;
printf("Enter frame length:"); b[j]=0;
scanf("%d",&n); }
printf("Enter input frame (0's & i=k;
1's only):"); }}
for(i=0;i<n;i++) else
scanf("%d",&a[i]); {
i=0; count=1; j=0; b[j]=a[i];
while(i<n) }
{ i++;
if(a[i]==1) j++;
{ }
b[j]=a[i]; printf("After stuffing the frame
for(k=i+1;a[k]==1 && k<n && is:");
count<5;k++) for(i=0;i<j;i++)
{ printf("%d",b[i]);
j++; }
Experiment No. 4
Aim : Implementing an IP Addressing Scheme
Theory:
Background / Preparation
In this activity, you will subnet the private address space 192.168.1.0/24 to provide enough
host addresses for the two LANs attached to the router. You will then assign valid host
addresses to the appropriate devices and interfaces. Finally, you will test connectivity to
verify your IP address implementation.
Step 1: Subnet an address space based on the host requirements.
a. You are given the private address space 192.168.1.0/24. Subnet this address space based on
the following requirements:
LAN-A needs enough addresses for 50 hosts.
LAN-B needs enough addresses for 40 hosts.
Step 2: Configure the new switch with the required options.
Step 2: Assign host addresses to devices
What is the subnet address for subnet 0? ______________________________
What is the subnet address for subnet 1? ______________________________
Assign subnet 0 to LAN-A, and assign subnet 1 to LAN-B.
What is the first address in subnet 0? ______________________________
This address is assigned the FastEthernet0/0 interface on Customer Router.
What is the first address in subnet 1? ______________________________
This address is assigned the FastEthernet0/1 interface on Customer Router.
What is the last address in subnet 0? ______________________________
This address is assigned to HostA.
What is the last address in subnet 1? ______________________________
This address is assigned to HostB.
What is the default gateway for HostA? ______________________________
What is the default gateway for HostB? ______________________________
Step 3: Configure devices with IP addressing.
Configure HostA and HostB with IP addressing, including the subnet mask and default
gateway.
a. Click HostA. On the Desktop tab, choose IP Configuration. Enter the correct addressing
for HostA
according to your answers in Step 1 and Step 2.
b. Click HostB. On the Desktop tab, choose IP Configuration. Enter the correct addressing
for HostB
according to your answers in Step 1 and Step 2.
c. Check results. On the Assessment Items tab, your configurations for HostA and HostB
should have
green checkmarks. If not, read the provided feedback for a hint on how to correct the
problem.
Note: If you cannot see all the feedback, place your mouse pointer over the right side of the
Activity Results window. When the cursor turns into a double-headed arrow, click and drag
to resize thewindow until you can see all the feedback text.
Configure the LAN interfaces on Customer Router with IP addresses and a subnet mask.
a. Click Customer Router. Click the Config tab.
b. On the left side under Interface, click FastEthernet0/0. Enter the IP address and subnet
mask, and then set the Port Status to On.
c. On the left side under Interface, click FastEthernet0/1. Enter the IP address and subnet
mask, and then set the Port Status to On.
d. Notice in the Equivalent IOS Commands window that your actions produced actual
commands. You can scroll through the command window. In the next chapter, you will learn
how to enter these commands directly into the router instead of using the Config tab. For a
better view of the commands, you can increase the size of the window. To resize the window,
place your mouse pointer over the bottom border of the window. When the cursor turns into a
doubleheadedarrow, click and drag.
Check results. On the Assessment Items tab, your configurations for Customer Router should
have green
checkmarks. If not, read the provided feedback for a hint on how to correct the problem.
Step 4: Verify the addressing configuration.
a. Test connectivity between HostA, HostB, ISP Workstation, and ISP Server. You can use
the Add Simple PDU tool to create pings between the devices. You can also click HostA or
HostB, then the Desktop tab, and then Command Prompt. Use the ping command to test
connectivity to other devices. To obtain the IP address of another device, place your mouse
pointer over the device.
b. Check results. On the Connectivity Tests tab, the status of each test should be successful.
Reflection
a. How many subnets are still available for future expansion?
b. What would be the two subnet addresses if the host requirement was 80 hosts per LAN?
c. Challenge: Create your own Packet Tracer network using the same topology, but
implement an addressing scheme based on 80 hosts per LAN. Have another student or your
instructor check your work.
Topology Diagram
Experiment No. 5
Aim : Configuring and Troubleshooting a Switched Network
Background / Preparation
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:
Host name
Console password
vty password
Privileged EXEC mode password
Privileged EXEC mode secret
IP address on VLAN1 interface
Default gateway
Note: Not all commands are graded by Packet Tracer.
Step 1: Configure the switch host name.
a. From the Customer PC, use a console cable and terminal emulation software to
connect to the console of the customer Cisco Catalyst 2960 switch.
b. Set the host name on the switch to CustomerSwitchusing these commands.
Switch>enable
Switch#configure terminal
Switch(config)#hostname CustomerSwitch
Step 2: Configure the privileged mode password and secret.
a. From global configuration mode, configure the password as cisco.
CustomerSwitch(config)#enable password cisco
b. From global configuration mode, configure the secret as cisco123.
CustomerSwitch(config)#enable secret cisco123
Step 3: Configure the console password.
a. From global configuration mode, switch to configuration mode to configure the
console line. CustomerSwitch(config)#line console 0
b. From line configuration mode, set the password to cisco and require the password to
be entered at
login.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit
Step 4: Configure the vty password.
a. From global configuration mode, switch to the configuration mode for the vty lines 0
through 15. CustomerSwitch(config)#line vty 0 15
b. From line configuration mode, set the password to cisco and require the password to
be entered at
login.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit
Step 5: Configure an IP address on interface VLAN1.
From global configuration mode, switch to interface configuration mode for VLAN1,
and assign the IP address
192.168.1.5 with the subnet mask of 255.255.255.0.
CustomerSwitch(config)#interface vlan 1
CustomerSwitch(config-if)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config-if)#no shutdown
CustomerSwitch(config-if)#exit
Step 6: Configure the default gateway.
a. From global configuration mode, assign the default gateway to 192.168.1.1.
CustomerSwitch(config)#ip default-gateway 192.168.1.1
b. Click the Check Results button at the bottom of this instruction window to check your
work.
Step 7: Verify the configuration.
The Customer Switch should now be able to ping the ISP Server at 209.165.201.10. The
first one or two pings may fail while ARP converges.
CustomerSwitch(config)#end
CustomerSwitch#ping 209.165.201.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 209.165.201.10, timeout is 2 seconds:
..!!!
Success rate is 60 percent (3/5), round-trip min/avg/max = 181/189/197 ms
CustomerSwitch#
Reflection
a. What is the significance of assigning the IP address to the VLAN1 interface instead of
any of the Fast Ethernet interfaces?
b. What command is necessary to enforce password authentication on the console and
vty lines?
c. How many gigabit ports are available on the Cisco Catalyst 2960 switch that you
used in the activity?
Topology Diagram
Experiment No. 6
Aim : Performing an Initial Switch Configuration
Background / Preparation
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:
Host name
Console password
IP address on VLAN1 interface
Default gateway
Background / Scenario
In this activity, you will perform basic switch configuration tasks. You will secure access
to the command-line interface (CLI) and console ports using encrypted and plain text
passwords. You will also learn how to configure messages for users logging into the
switch. These message banners are also used to warn unauthorized users that access is
prohibited.
Note: In Packet Tracer, the Catalyst 2960 switch uses IOS version 12.2 by default. If
required, the IOS version can be updated from a file server in the Packet Tracer topology.
The switch can then be configured to boot to IOS version 15.0, if that version is required.
Instructions
24
0-15
Show startup-configuration
It displays this message because the configuration file was not saved to NVRAM. Currently it is
only located in RAM.
Step 7: Verify that the enable secret password is added to the configuration file.
Enter the show running-config command again to verify the new enable secret password
is configured.
Note: You can abbreviate show running-config as
S1# show run
Questions:
What is displayed for the enable secret password?
$1$mERr$ILwq/b7kc.7X/ejA4Aosn0
Why is the enable secret passworddisplayed differently from what we configured?
The enable secret is shown in encrypted form, whereas the enable password is in plain text.
Every switch should have a banner to warn unauthorized users that access is prohibited. Banners
can also be used for sending messages to network personnel/technicians (such as impending system
shutdowns or who to contact for access).
Step 1: Verify that the configuration is accurate using the show run command.
Save the configuration file. You have completed the basic configuration of the switch.
Now back up the running configuration file to NVRAM to ensure that the changes made
are not lost if the system is rebooted or loses power.
S1#copy running-configstartup-config
Destination filename [startup-config]?[Enter]
Building configuration…
[OK]
Questions:
What is the shortest, abbreviated version of the copy running-configstartup-
config command?
cop r s
show startup-config
Are all the changes that were entered recorded in the file?
Part 5: Configure S2
You have completed the configuration on S1. You will now configure S2. If you cannot
remember the commands, refer to Parts 1 to 4 for assistance.
Configure S2 with the following parameters:
Open Configuration Window for S2
a. Device name: S2
b. Protect access to the console using the letmein password.
c. Configure an enable password of c1$c0and an enable secret password of itsasecret.
d. Configure an appropriate message to those logging into the switch.
e. Encrypt all plain text passwords.
f. Ensure that the configuration is correct.
g. Save the configuration file to avoid loss if the switch is powered down.
Switch> enable
Switch# config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# hostname S2
S2(config)# line console 0
S2(config-line)# password letmein
S2(config-line)# login
S2(config-line)# enable password c1$c0
S2(config)# enable secret itsasecret
S2(config)# banner motd $any text here$
S2(config)# service password-encryption
S2(config)# exit
S2#copy running-configstartup-config
Topology
Experiment No. 7
Aim: To construct a Wireless LAN and make the PC’s communicate wirelessly
Requirements
Windows pc – 2 Nos
CISCO Packet Tracer Software ( Student Version)
8 port switch – 1 No
Cat-5 LAN cable
Procedure
Open the CISCO Packet tracer software
Drag and drop 2 Laptop pcs using End Device Icons on the left corner
Select Access point and server from wireless devices
Select laptop-> physical-> OFF laptop-> remove LAN Module & replace WPC 300N
Wireless module -> ON Laptop
Observe the wireless connections between access point and laptops
Give IP address of the PCs as per table, ping between PCs and observe the transfer of
data packets in real and simulation mode.
Theory
Experiment No. 8
Aim: Study of basic network command and Network configuration commands
ping: ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you get an ICMP packet back. Sound strange? Well, you can “ping” an IP address
to see if a machine is alive. If there is no response, you know something is wrong.
Traceroute: Tracert is a command which can show you the path a packet of information
takes from yourcomputer to one you specify. It will list all the routers it passes through until
it reaches its destination, or fails to and is discarded. In addition to this, it will tell you how
long each 'hop' from router to router takes.
nslookup: Displays information from Domain Name System (DNS) name servers.
NOTE :If you write the command as above it shows as default your pc's server name firstly.
pathping: A better version of tracert that gives you statics about packet lost and latency.
Getting Help In any command mode, you can get a list of available commands by entering a
question mark (?).
Router>?
To obtain a list of commands that begin with a particular character sequence, type in those
haracters followed immediately by the question mark (?).
Router#co?
Aim: Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and TelNet
Theory:
Application layer protocols:
Protocols in each layer of the network model provide a mechanism for devices to identify
and connect. They also contain formatting rules specifying how data is packaged when the
messages are sent and received.
There are several protocols in the application layer used for different services like email
services, file transfers, etc. We will look at each one of them one by one.
1. DNS: Domain Name System (DNS)
DNS is a hierarchy and distributed naming system for computers, services, and other Internet
resources or IP networks. DNS is responsible for translating domain names into IP addresses
for locating and identifying computer services and devices with the underlying network
protocols. It is responsible for assigning domain names to authoritative name servers for each
domain, providing distributed and fault-tolerant service.
DNS defines the DNS protocol, which specifies the technical functionality of the database
service at its core and the data structures and communication exchanges used.
'dig', 'host', and 'nslookup' are frequently used DNS protocol commands. You can use these
commands to ask DNS servers questions and get data on domains, IP addresses, and other
related topics. Using the '+short' option with the 'dig' or 'host' command will provide a
concise response to a DNS query.
Common characteristics of the DNS protocol include:
Translates domain names into IP addresses.
Operates over UDP/TCP on port 53.
Utilizes hierarchical distributed naming system.
Provides domain name resolution for internet resources.
2. Hypertext Transfer Protocol (HTTP)
HTTP/HTTPS
HTTP stands for Hypertext Transfer Protocol and HTTPS is the more secured version of
HTTP, that’s why HTTPS stands for Hypertext Transfer Protocol Secure. This protocol is
used to access data from the World Wide Web. The Hypertext is the well-organized
documentation system that is used to link pages in the text document.
HTTP is based on the client-server model.
It uses TCP for establishing connections.
HTTP is a stateless protocol, which means the server doesn’t maintain any information
about the previous request from the client.
HTTP uses port number 80 for establishing the connection.
The World Wide Web's foundational protocol is HTTP. It supports web client and server
communication and loads web pages using hypertext links. An individual, known as the user-
agent, requests a server using the client-server protocol known as HTTP. The user agent is
typically a web browser.
The protocol outlines the message transmission and reception between the client and server
and how to exchange resources like HTML or hypertext documents.
JavaScript programmers can use the fetch() API or the Axios library to send HTTP requests.
Here is an example of how to make the request using the fetch() API:
3. File Transfer Protocol (FTP)
FTP is an application layer protocol that transfers files between local and remote systems. It
runs on TCP/IP and uses separate control and data connections. The end user's computer is
the local host in an FTP transaction. FTP can be used to transmit files from one host to
another. FTP is often secured with SSL/TLS or replaced with SSH File Transfer Protocol
(SFTP) to encrypt the content and protect the username and password.
The FTP protocol is widely used to exchange data between hosts, update websites, and
deliver content. ALG (application layer gateway) can be enabled or disabled for the FTP
protocol for a DS-Lite configuration.
The FTP protocol can be used with several commands,
including PORT, PWD, LIST, CD, PUT, and GET.
Common characteristics of the FTP (File Transfer Protocol) protocol include:
1. FTP operates over TCP/IP and is used for transferring files between a client and a
server.
2. It uses separate control and data connections: the control connection for sending
commands and receiving responses, and the data connection for transferring files.
3. FTP supports various authentication methods, including username/password
authentication and anonymous FTP.
4. It allows for both ASCII and binary file transfer modes, enabling the transfer of text and
binary files with appropriate handling of line breaks and character encoding.
4. Telnet
"Teletype network" is what Telnet stands for. A remote terminal access application layer
protocol is used. Telnet enables users to sign in to a distant computer as if they were
physically nearby. TCP port 23 is used for transmission.
Telnet is a text-based protocol where the client and server exchange commands and answers.
Telnet is insecure because it transmits data and login credentials in clear text, leaving it open
to interception.
The central command to use Telnet is to connect to a remote server with telnet
<serverIP> command.
Common characteristics of the Telnet protocol include:
Telnet is a protocol used for remotely accessing and managing devices over a network.
Operates over TCP on port 23.
Provides a text-based interface for logging into remote systems and executing
commands.
Lacks encryption and security features, making it vulnerable to eavesdropping and
interception.
Historically widely used for remote administration of servers and network devices but
now considered insecure due to its lack of encryption, often replaced by more secure
protocols like SSH (Secure Shell).
5. Simple Mail Transfer Protocol (SMTP)
It is a widely used Internet protocol for sending emails between servers. When sending
emails from one mail server to another, SMTP uses other protocols like POP3 or IMAP to
get the emails to their destinations. SMTP establishes the format for email messages and
transmits them using TCP port 25 or 587.
STARTTLS or SSL/TLS are two encryption protocols that can be used with SMTP to protect
email transmission. SMTP provides a dependable and effective method for sending and
receiving emails online. The client and server exchange commands and responses using the
text-based SMTP protocol.
The SMTP protocol's standard commands include EHLO, MAIL FROM, RCPT TO,
DATA, and QUIT. These commands are used in the above order to open communication
between the client and the email server, send an email, and end the session.
Common characteristics of the SMTP protocol include:
Used for sending email messages between servers.
Operates over TCP on port 25.
Follows a client-server model for email transmission.
Supports basic email delivery and forwarding functionalities.
Result: The Application layer protocols was successfully studied.
Experiment No. 10
Aim: Study of MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA using
Standard Network Simulators
Theory:
Multiple Access Protocols in Computer Network
The Data Link Layer is responsible for transmission of data between two nodes. Its main
functions
are-
Data Link Control
Multiple Access Control
Data Link Layer: The data link layer is used in a computer network to transmit the data
between two devices or nodes. It divides the layer into parts such as data link control and
the multiple access resolution/protocol. The upper layer has the responsibility to flow
control and the error control in the data link layer, and hence it is termed as logical of data
link control. Whereas the lower sub-layer is used to handle and reduce the collision or
multiple access on a channel. Hence it is termed as media access control or the multiple
access resolutions.
Data Link Control: A data link control is a reliable channel for transmitting data over a
dedicated link using various techniques such as framing, error control and flow control of
data packets in the computer network.
o Aloha
o CSMA
o CSMA/CD
o CSMA/CA
It is designed for wireless LAN (Local Area Network) but can also be used in a shared
medium to transmit data. Using this method, any station can transmit data across a network
simultaneously when a data frameset is available for transmission.
Aloha Rules
Pure Aloha:Whenever data is available for sending over a channel at stations, we use Pure
Aloha. In pure Aloha, when each station transmits data to a channel without checking
whether the channel is idle or not, the chances of collision may occur, and the data frame can
be lost. When any station transmits the data frame to a channel, the pure Aloha waits for the
receiver's acknowledgment. If it does not acknowledge the receiver end within the specified
time, the station waits for a random amount of time, called the backoff time (Tb). And the
station may assume the frame has been lost or destroyed. Therefore, it retransmits the frame
until all the data are successfully transmitted to the receiver.
Slotted Aloha:The slotted Aloha is designed to overcome the pure Aloha's efficiency
because pure Aloha has a very high possibility of frame hitting. In slotted Aloha, the shared
channel is divided into a fixed time interval called slots. So that, if a station wants to send a
frame to a shared channel, the frame can only be sent at the beginning of the slot, and only
one frame is allowed to be sent to each slot. And if the stations are unable to send data to the
beginning of the slot, the station will have to wait until the beginning of the slot for the next
time. However, the possibility of a collision remains when trying to send a frame at the
beginning of two or more station time slot.
1-Persistent: In the 1-Persistent mode of CSMA that defines each node, first sense the shared
channel and if the channel is idle, it immediately sends the data. Else it must wait and keep
track of the status of the channel to be idle and broadcast the frame unconditionally as soon
as the channel is idle.
Non-Persistent: It is the access mode of CSMA that defines before transmitting the data,
each node must sense the channel, and if the channel is inactive, it immediately sends the
data. Otherwise, the station must wait for a random time (not continuously), and when the
channel is found to be idle, it transmits the frames.
CSMA/ CD: It is a carrier sense multiple access/ collision detection network protocol to
transmit data frames. The CSMA/CD protocol works with a medium access control
layer. Therefore, it first senses the shared channel before broadcasting the frames, and
if the channel is idle, it transmits a frame to check whether the transmission was
successful. If the frame is successfully received, the station sends another frame. If any
collision is detected in the CSMA/CD, the station sends a jam/ stop signal to the shared
channel to terminate data transmission. After that, it waits for a random time before
sending a frame to a channel.
CSMA/ CA:It is a carrier sense multiple access/collision avoidance network protocol for
carrier transmission of data frames. It is a protocol that works with a medium access
control layer. When a data frame is sent to a channel, it receives an acknowledgment to
check whether the channel is clear. If the station receives only a single (own)
acknowledgments, that means the data frame has been successfully transmitted to the
receiver. But if it gets two signals (its own and one more in which the collision of
frames), a collision of the frame occurs in the shared channel. Detects the collision of the
frame when a sender receives an acknowledgment signal.
Following are the methods used in the CSMA/ CA to avoid the collision:
Interframe space: In this method, the station waits for the channel to become idle, and if it
gets the channel is idle, it does not immediately send the data. Instead of this, it waits for
some time, and this time period is called the Interframe space or IFS. However, the IFS time
is often used to define the priority of the station.
Contention window: In the Contention window, the total time is divided into different slots.
When the station/ sender is ready to transmit the data frame, it chooses a random slot number
of slots as wait time. If the channel is still busy, it does not restart the entire process, except
that it restarts the timer only to send data packets when the channel is inactive.
Acknowledgment: In the acknowledgment method, the sender station sends the data frame to
the shared channel if the acknowledgment is not received ahead of time.
It is a method of reducing data frame collision on a shared channel. In the controlled access
method, each station interacts and decides to send a data frame by a particular station
approved by all other stations. It means that a single station cannot send the data frames
unless all other stations are not approved. It has three types of controlled
access: Reservation, Polling, and Token Passing.
C. Channelization Protocols
It is a channelization protocol that allows the total usable bandwidth in a shared channel to be
shared across multiple stations based on their time, distance and codes. It can access all the
stations at the same time to send the data frames to the channel.
Following are the various methods to access the channel based on their time, distance and
codes:
FDMA: It is a frequency division multiple access (FDMA) method used to divide the
available bandwidth into equal bands so that multiple users can send data through a different
frequency to the subchannel. Each station is reserved with a particular band to prevent the
crosstalk between the channels and interferences of stations.
TDMA:Time Division Multiple Access (TDMA) is a channel access method. It allows the
same frequency bandwidth to be shared across multiple stations. And to avoid collisions in
the shared channel, it divides the channel into different frequency slots that allocate stations
to transmit the data frames. The same frequency bandwidth into the shared channel by
dividing the signal into various time slots to transmit it. However, TDMA has an overhead of
synchronization that specifies each station's time slot by adding synchronization bits to each
slot.
CDMA: The code division multiple access (CDMA) is a channel access method. In CDMA,
all stations can simultaneously send the data over the same channel. It means that it allows
each station to transmit the data frames with full frequency on the shared channel at all times.
It does not require the division of bandwidth on a shared channel based on time slots. If
multiple stations send data to a channel simultaneously, their data frames are separated by a
unique code sequence. Each station has a different unique code for transmitting the data over
a shared channel. For example, there are multiple users in a room that are continuously
speaking. Data is received by the users if only two-person interact with each other using the
same language. Similarly, in the network, if different stations communicate with each other
simultaneously with different code language.
Next Topic