Powerpoint Templates Page 1 Powerpoint Templates CS1306 - Networks Laboratory HANDLED BY, A.MAHESH PRIYA L/IT.

Slides:



Advertisements
Similar presentations
Lecture 12 Layer 2 – Data Link Layer Protocols
Advertisements

April 5, 2004 Prof. Paul Lin 1 CPET 355 Data Communications & Networking 6. The Transport Layer (Transmission Control Protocol) Paul I-Hai Lin, Professor.
Chapter 5: TCP/IP and OSI Business Data Communications, 5e.
6 UNIX Network Utilities Mauro Jaskelioff. Introduction Overview of computer networks Network related utilities –Accessing a remote computer –Transferring.
Chapter 6 Errors, Error Detection, and Error Control.
Socket Programming.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
1 Java Networking – Part I CS , Spring 2008/9.
Chapter 4 : TCP/IP and OSI Business Data Communications, 4e.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
1 School of Computing Science Simon Fraser University CMPT 771/471: Internet Architecture and Protocols Socket Programming Instructor: Dr. Mohamed Hefeeda.
TCP connection my Computertelnet client web server remote computer 1 character per transmission Telnet uses TCP connection.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
TCP connection my Computertelnet client web server remote computer 1 character per transmission * Telnet uses TCP connection * but Nagle's algorithm modifies.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
CS 356 Systems Security Spring Dr. Indrajit Ray
CEG3185 Tutorial 4 Prepared by Zhenxia Zhang Revised by Jiying Zhao (2015w)
Transmission Control Protocol Internet Protocol TCP/IP.
Process-to-Process Delivery:
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 16 Writing a Network Application.
Assignment 3 A Client/Server Application: Chatroom.
TCP/IP protocols Communication over Internet is mostly TCP/IP (Transmission Control Protocol over Internet Protocol) TCP/IP "stack" is software which allows.
Midterm Review - Network Layers. Computer 1Computer 2 2.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Presentation on Osi & TCP/IP MODEL
Socket Lab Info. Computer Network. Requirement Use TCP socket to implement a pair of programs, containing a server and a client. The server program shall.
1 ELEN602 Lecture 2 Review of Last Lecture Layering.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
Examining TCP/IP.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
Chapter 4 TCP/IP Overview Connecting People To Information.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP: A helper protocol to IP The Internet Control Message Protocol (ICMP) is the protocol used for error.
Transmission Control Protocol
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Network Protocols A network protocol defines the structure of messages sent over the network We will only talk about the Internet Network protocols need.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 14.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Remote Shell CS230 Project #4 Assigned : Due date :
AS Computing Data Transmission and Networks. Transmission error Detecting errors in data transmission is very important for data integrity. There are.
CS 158A1 1.4 Implementing Network Software Phenomenal success of the Internet: – Computer # connected doubled every year since 1981, now approaching 200.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
1 Introduction to TCP/IP. 2 OSI and Protocol Stack OSI: Open Systems Interconnect OSI ModelTCP/IP HierarchyProtocols 7 th Application Layer 6 th Presentation.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS470 Programming Assignment 1 Zilong Ye. A Chat Application Goal: learn socket programming and implement a chat application for exchanging messages between.
Chapter 9: Data Link Control
Network Tools and Utilities
Networking COMP
MCA – 405 Elective –I (A) Java Programming & Technology
Chap. 4 Data link layer 2.
Troubleshooting IP Communications
Data Link Layer What does it do?
TCP Transport layer Er. Vikram Dhiman LPU.
Data Networking Fundamentals
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Process-to-Process Delivery:
CS4470 Computer Networking Protocols
Computer Networks Bhushan Trivedi, Director, MCA Programme, at the GLS Institute of Computer Technology, Ahmadabad.
PART 5 Transport Layer.
46 to 1500 bytes TYPE CODE CHECKSUM IDENTIFIER SEQUENCE NUMBER OPTIONAL DATA ICMP Echo message.
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Chapter 9: Data Link Control
Presentation transcript:

Powerpoint Templates Page 1 Powerpoint Templates CS Networks Laboratory HANDLED BY, A.MAHESH PRIYA L/IT

Powerpoint Templates Page 2 LIST OF EXPERIMENTS 1.Write a socket Program for Echo / Ping / Talk commands. 2. Create a socket (TCP) between two computers and enable file transfer between them. 3. Write a program to implement Remote Command Execution (Two M/Cs must be used) 4. Write a program to implement CRC and Hamming code for error handling. 5. Write a code simulating Sliding Window Protocols.

Powerpoint Templates Page 3 6.A Client − Server application for chat. 7. Write a program for File Transfer in client–server architecture using following methods. a. USING RS232C b. TCP/IP 8. Perform a case study about the different routing algorithms to select the network path with its optimum and economical during data transfer.

Powerpoint Templates Page 4 a. Shortest path routing b. Flooding c. Link State d. Hierarchical 9 and 10 Study of Network Simulators like NS2 / Glomosim / OPNET.

Powerpoint Templates Page 5 Ex.1A Implementation of Echo Command Start the program. Get the input as command line. Display the input on the screen. Terminate the program.

Powerpoint Templates Page 6 SAMPLE OUTPUT ~]$ cc ec.c ~]$./a.out welcome to networks lab welcome to networks lab

Powerpoint Templates Page 7 Ex.No.1B Implementation of Ping Command 1.start the program. 2.Find the System IP address. 3.Execute the program with IP Address. 4.Check whether the system is eligible to connect with network. 5.Stop the program.

Powerpoint Templates Page 8 SAMPLE OUTPUT ~]$ cc rpcli.c ~]$ ping PING ( ) 56(84) bytes of data. 64 bytes from : icmp_seq=1 ttl=64 time=0.021 ms 64 bytes from : icmp_seq=2 ttl=64 time=0.009 ms 64 bytes from : icmp_seq=3 ttl=64 time=0.017 ms

Powerpoint Templates Page 9 Ex.No.3 REMOTE COMMAND EXECUTION 1.Start the Program. 2.write seperate program for server and client. 3.Declare the variable and structure of program. 4.Create socket using socket function. 5.Execute the server program. 6.Execute the client program. 7.enter the command to the server. 8.Get response from the server. 9.Stop the program.

Powerpoint Templates Page 10 SAMPLE OUTPUT Client: ~]$ cc rpcli.c ~]$./a.out Enter the command to server who Server: ~]$./a.out Command received from client 1 is who satheesh pts/ :31 ( ) staffs pts/ :34 ( )

Powerpoint Templates Page 11 Ex.No 4A CYCLIC REDUNDANCY CHECK Aim: Start the program. Get the data to be transmitted. Take it as dividend. Get the divisor. Add n-1 0’s with the data where n is the divisor. Divide the data by the divisor and append the remainder as CRC. Data + CRC is transmitted to receiver.

Powerpoint Templates Page 12 In the receiving end, the data received is divided by the same divisor and the remainder is checked whether all the bits are 0’s. If all the bits are 0’s, then there is no error. Stop the program.

Powerpoint Templates Page 13 SAMPLE OUTPUT 1.Without error 2.With error 3.Exit Enter the option: 1 Enter the dividend:11000 Enter the divisor:11 Computed data + CRC is:11000 Data is transmitted Data is received Received data+CRC:11000 Remainder is :00000 Data is received correctly

Powerpoint Templates Page 14 Ex.No.4B Hamming Code Implementation 1.Start the program. 2.Get the 7bit data to be tranmitted. 3.Add Parity check bits in 1,2,4,8th positions bit data is transmitted to receiver 5.In receiving end check the data using same process which is done by receiver. 6.find the corresponding error bit. 7.stop the program

Powerpoint Templates Page 15 SAMPLE OUTPUT Enter the data string The transmitting data is:

Powerpoint Templates Page 16 Received data: Error bit is:

Powerpoint Templates Page 17 Ex.No.5 Sliding Window Protocol Simulation Start the program. Get the frame size of the sender. Get the frame size of the receiver. Send the frames from sender. Receive the frames in receiver side. Send the acknowledgement. Terminate the program

Powerpoint Templates Page 18 SAMPLE OUTPUT Sending one frame... Sender Window | Received one frame.... Receiver Window | Sending ACK for received frames 1 Receiver Window --- |00| --- Received ACK 2 Sender window: --- |00| --- Sending ACK for received frames 0

Powerpoint Templates Page 19 Ex.No.6 A Client Server Application for Chat Start the program. Open the socket in server side. Open the socket in client side. Send the message to client using the socket. Receive the message in client and display as response. In the client side enter the host name before chat. Terminate the program.

Powerpoint Templates Page 20 SAMPLE OUTPUT cc chatclient.c opening fifo to server FIFO open waiting Enter the string set to send:Welcome To Networks Lab Starting FIFO server FIFO open waiting from client: Welcome To Networks Lab

Powerpoint Templates Page 21 Ex.No.7A File Transfer using RS-232 Interface Start the program. Initiate the port for input and output in two systems. Get the file name to be transferred. Open the file. Open the output port and send the data. Close the file. In the receiving end open the input port. Set the port to receive the data. Get the data and display on the screen. Close the ports. Terminate the program.

Powerpoint Templates Page 22 SAMPLE OUTPUT ~]$ cc cli.c ~]$./a.out source.txt 8000 File send over RS232 ~]$ ~]$cc ser.c ~]$./a.out 8000 File received from client. Socket closed. ~]$

Powerpoint Templates Page 23 Ex.No.7B File Transfer using TCP/IP Server side File transfer Algorithm 1.Start the program. 2.Declare the variables and structure for the socket. 3.Create socket using socket function. 4.socket is binded as specified port. 5.Using the object the port and address is declared. 6.Execute the server program.

Powerpoint Templates Page 24 Client side File transfer algorithm: 1.Start the program. 2. Declare the variables and structure. 3.Socket is created and connects function is executed. 4.If the connection is successful then server sends the message. 5.The file name that is to be transferred is specified in the client side. 6.The file is verified from server side. 7. Stop the program.

Powerpoint Templates Page 25 SAMPLE OUTPUT cc ClientTcp.c enter the serverip address socket created connected to server enter the file name crc3.c cc ServerTcp.c socket is created binded successfully The file has been transferred

Powerpoint Templates Page 26 CASE STUDY Shortest path routing Flooding Link State Hierarchical NETWORK SIMULATION: NS2 Glomosim OPNET.

Powerpoint Templates Page 27