+ All Categories
Home > Documents > Simulator.docx

Simulator.docx

Date post: 24-Feb-2018
Category:
Upload: citharth-magendran
View: 214 times
Download: 0 times
Share this document with a friend

of 93

Transcript
  • 7/24/2019 Simulator.docx

    1/93

    Network Lab Manual

    V.B MICRO ELECTRONICS

    NO.13 POSTAL COLONY 3RD

    STREET

    EST MAMBALAM!

    C"ENNAI#$%% %33.

  • 7/24/2019 Simulator.docx

    2/93

    INTROD&CTION'

    RS232 is the most known serial port used in transmitting the data in

    communication and interface. Even though serial port is harder to program than the

    parallel port, this is the most effective method in which the data transmission requires

    less wires that yields to the less cost. The RS232 is the communication line which enales

    the data transmission y only using three wire links. The three links provides !transmit",

    !receive" and common ground...

    The !transmit" and !receive" line on this connecter send and receive data etween

    the computers. #s the name indicates, the data is transmitted serially. The two pins are

    T$% & R$%. There are other lines on this port as RTS, 'TS, %SR, %TR, and RTS, R(.

    The !)" and !*" are the data which defines a voltage level of 3+ to 2+ and -3+ to -2+

    respectively.

    The RS-232% has eisted in two types. i.e., %-T/0E 2 pin connector and %-

    T/0E 1 pin connector, which are male connectors on the ack of the 0'. /ou need a

    female connector on your communication from ost to uest computer. The pin outs of

    oth %-1 & %-2 are show elow.

    %-Type-1

    pin no.

    %-Type-

    2

    0in no.

    0in outs 4unction

    3 2 R% Receive %ata 5Serial data input6

    2 3 T% Transmit %ata 5Serial data output6

    7 8 RTS Request to send 5acknowledge to modem that

    9#RT is ready to echange data

    : 'TS 'lear to send 5i.e.; modem is ready to echange

    data6< < %SR %ata ready state 59#RT estalishes a link6

    7 S Signal ground

    ) : %'% %ata 'arrier detect 5This line is active whenmodem detects a carrier

    8 2* %TR %ata Terminal Ready.

    1 22 R( Ring (ndicator 5=ecomes active when modemdetects ringing signal from 0ST>

  • 7/24/2019 Simulator.docx

    3/93

  • 7/24/2019 Simulator.docx

    4/93

    asserts the Request to Send high and as itBs hooked together with the 'lear to Send, (t

    immediately gets a reply that it is ok to send and does so.

  • 7/24/2019 Simulator.docx

    5/93

    PROCED&RE'

    ). 'onnect one end of the 1 pin %-type female to female connector to the serial port

    of your 0'5system)6.

    2. 'onnect other end to the 1 pin %-type female connector of the 0' to 0'

    communication trainer kit.

    3. Repeat step ) and 2 with the other 0'5system26.

    8. 'onnect R$% pin of system) to T$% pin of system2.

    . 'onnect R$% pin of system2 to T$% pin of system).

    SA(T@ utton to transmit the typed content.

    22. 'lick ?'FR S'REE>@ utton to clear the tet o.

    To tran*)+t a ,+le'

  • 7/24/2019 Simulator.docx

    6/93

    0'.

    23. Type the message in the tet o.

    28. Type the file path with file name to which the contents to e written.

    2. 'lick ?DR(TES'REE>TG4(FE@ utton to write the contents.

    2SA(T4(FE@ utton to transmit the file content.

    NOTE' the transmitted file content will e stored in the path given in the receiving

    21. 'lick ?'FR S'REE>@ to repeat the process.

    3*. 'lick ?STG0@ utton to eit.

    Conne-t+on ,or null )o(e) )eto('

    To connect the systems using null modem method

    ). 'onnect %TR of system) to %SR of system)

    2. 'onnect %TR of system2 to %SR of system2

    3. 'onnect RTS of system) to 'TS of system)

    8. 'onnect RTS of system2 to 'TS of system2

  • 7/24/2019 Simulator.docx

    7/93

    /ILE TRANS/ER &SIN0 PARALLEL PORT

    DESCRIPTIONH

    The main aim of the eperiment is to transfer a file from a 0' to another 0'

    using parallel port. The interface etween the 0'"s is done through the parallel port5F0T6

    in the 0',a male to male 2 pin %-type connector is used to connect together. The

    parallel port is configured to run in i-directional mode. The data lines %*-%: 5pins 2 to

    16 are used to readIwrite a yte of data. The control line STRG=E and status line #'J

    make the handshaking signal. The digital data pins are connected directly to the 78FS288

    i-directional uffer. The output of the uffer is connected to the data lines of the parallel

    port.

    OPERATION'

    ). The data yte to e transmitted is placed on the data register 5*37:6.

    2. The control pin STRG=E is made low to indicate a valid data on the data us.

    3. The receiver 0' waits for status pin #'J5which is cross connected with the

    STRG=E pin of transmitter 0'6 to go high.

    8. Gnce the #'J pin goes high the data in the data register is read.

    . The receiver 0' then acknowledges y giving a pulse in its STRG=E pin .The

    width of the acknowledge pulse can e set y the user.

  • 7/24/2019 Simulator.docx

    8/93

    PROCED&REH

    3). 'onnect one end of the 2 pin %-type male to male connector to the parallel portof your 0'5F0T65system)6.

    32. 'onnect other end to the 2 pin %-type female connector of the 0' to 0'

    communication trainer kit.

    33. Repeat step ) and 2 with the other 0'5system26.

    38. 'onnect the STROBEpin of system) to the ACpin of system 2 in the trainer

    kit.

    3. 'onnect the STROBEpin of system2 to the ACpin of system ) in the trainer

    kit.

    3

  • 7/24/2019 Simulator.docx

    9/93

    87. Repeat all the aove steps to send a new file.

    PARALLEL PORT DETAILS'

    P+nout*

    Register DB-25 I/O

    Signal Name Bit Pin Direction

  • 7/24/2019 Simulator.docx

    10/93

    =========== ======== ===== =========

    -Strobe C0 1 Ot!t

    "Data Bit 0 D0 2 Ot!t

    "Data Bit 1 D1 # Ot!t

    "Data Bit 2 D2 $ Ot!t

    "Data Bit # D# 5 Ot!t

    "Data Bit $ D$ % Ot!t

    "Data Bit 5 D5 & Ot!t

    "Data Bit % D% ' Ot!t

    "Data Bit & D& ( Ot!t

    -)c*no+le,ge S% 10 In!t

    "Bs S& 11 In!t

    "Pa!er .n, S5 12 In!t

    "Select In S$ 1# In!t

    -)to ee, C1 1$ Ot!t

    -.rror S# 15 In!t

    -Initialie C2 1% Ot!t

    -Select C# 1& Ot!tron, - 1'-25 -

    5>ote again that the S7, '*, ') & '3 signals are inverted6

    IBM#PC Parallel Pr+nter Port /e)ale DB#56 So-ket e7ternal P+n laout

    /

    1# 12 11 10 ( ' & % 5 $ # 2 1 /

    /

    25 2$ 2# 22 21 20 1( 1' 1& 1% 15 1$ / /

    The used pins for this eperiment are as follows.

    0in signals purpose) -stroe

    2 Kdata it * %*

    3 Kdata it ) %)8 Kdata it 2 %2

    Kdata it 3 %3

    < Kdata it 8 %8

    7 Kdata it %: Kdata it < %et Finc Simulator L 9ser Aanual

    E78t.1. Eternet

  • 7/24/2019 Simulator.docx

    14/93

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    In8ut Para)eter*

    >o. of >odes - 2 to 8

    4rame (nterval - 2* milliseconds. to )*** milliseconds.4rame SiMe -

  • 7/24/2019 Simulator.docx

    15/93

  • 7/24/2019 Simulator.docx

    16/93

    Re*ult'

    Result gives the following performance parameters

    ). 0ayloadH #mount of data delivered from sender to receiver2. GverheadH #mount of control information used to send the data from the sender

    to the receiver

    3. Nueuing timeH Total amount of time spent y packets in the sender queue8. Aedium #ccess TimeH Total amount of time spent y the head-of-line packet

    efore transmission

    . %ropped framesH >umer of frames dropped due to uffer overflowumer of frames lost in the network due to it errors

    7. 'hecksum errorH >umer of frames dropped y receiver due to checksum error

    :. Aean delayH The average time taken to transmit a packet successfully

    1. #verage attemptsH #verage numer of attempts taken for a successfultransmission of a packet

    )*. Simulation timeH Total duration of the simulation

    )). ThroughputH The rate of transmission of data during the simulation)2. oodputH The rate of transmission of user data during the simulation

    )3. %ata frames generatedH Total numer of data frames generated and delivered

    during the simulation)8. 4rame transmission proailityH The proaility of successfully transmitting a

    frame.

    ). 'ollision countH Total numer of packet collisions during the simulation)

  • 7/24/2019 Simulator.docx

    17/93

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    E78er+)ent* to be -arr+e( out

    )a6 Select 2 >odes and perform data transfer from >ode ) to >ode 2 with one set of inputparameters and one fied file.

    V+ew+n2 te 2ra8* an( 8r+nt+n2 te 2ra8*

    (n order to view the 4rame sent +s Time graph and 'ollision +s Time graph, first, we

    have to close the Simulator software. (n ' drive, inside the Simulator directory, in the

    Ethernet directory, in >ode ), the graphs are stored as Ecel file. (n the computer

    system, Aicrosoft Ecel software should e availale to view the graph y opening the

    file ?Time-4rame.ls@. The graph can e seen and the data derived from the Trace can e

    seen. The graph can e printed in Ecel software.

    Similarly, y opening the file ?'ollision.ls@, the collision +s Time graph can e viewed.

    (t can also e stored.

    >oteH =efore conducting another simulation eperiment, the graphs and performance

    must e printed or stored in some other place in the local disk. Gtherwise, the new

    eperiment will overwrite all the Ecel files in the corresponding node.

    )6 The Simulation Software is opened. The Ethernet option is chosen. Select 2 >odes

    and carry out data transfer etween 2 nodes simultaneously keeping the same set of inputparameters and with the same file from the >ode ) and analyMe the results.

  • 7/24/2019 Simulator.docx

    18/93

  • 7/24/2019 Simulator.docx

    19/93

    Aodel 'alculation

  • 7/24/2019 Simulator.docx

    20/93

    ). oodput O 5Total ytes L Gverhead6 I Transmission time

    0ayload O Total ytes L Gverhead

    O 3.32: Jytes

    Transmission time O Simulation time O

  • 7/24/2019 Simulator.docx

    21/93

    )d6 Select 3 nodes and carry out data transfer etween the nodes simultaneously and

    analyMe the results. Repeat the eperiment y changing the input parameters

    )e6 Select 8 nodes and do the data transfer and analyMe the results. Dhen the data

    transfer is going on, disconnect one node and oserve and record the effect.

  • 7/24/2019 Simulator.docx

    22/93

  • 7/24/2019 Simulator.docx

    23/93

    E78t.5. Token R+n2

  • 7/24/2019 Simulator.docx

    24/93

  • 7/24/2019 Simulator.docx

    25/93

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    In8ut Para)eter*

    >umer of >odes - 2 to 8

    4rame (nterval - 2* milliseconds y default

    4rame SiMe - )2 =ytes to 2,*8: =ytes

    Error eneration - )*-1, )*-< and )*-3

    Tran*,err+n2 a (ata ,+le ,ro) one no(e to anoter

    There are four nodes in the topology numer from ) through 8. Each node has a unique

    (0 address. 4iles can e selected for transmission from a sender node to the receive node.

    #ll four nodes can act as senders or receivers or oth for a single file transmission.

    # monitoring window shows up during file transmission showing the current status of the

    transmission. The progress ar in these windows shows the amount of data transferred

    and received. The monitoring window also contains trace information for data sent or

    received and other network events for the associated node. The nodes have to connect tothe Token ring efore they can communicate with other nodes.

    Token "ol( on T+)e an( Token Pr+or+t

    The default frame interval is 2* milliseconds. (n order to send many data packets

    sequentially, the token hold on time can e changed to higher value. 9sing this facility,

    the token can e retained in particular node for long time. The minimum hold on time is

    ** msec. #nd the maimum hold on time is *** msec. The priority of the node also

    can e stated.

    Conne-t an( D+*-onne-t ,a-+l+t

    The simulator supports the feature of connecting or disconnecting specific nodes at any

    time during, efore or after simulation test runs.

    Pau*e an( re*et ,a-+l+t

    There is a feature for pausing any simulation run and continuing the test at a later point in

    time. The simulator also supports resetting a specific test and restarting it again.

    Token r+n2 o8erat+on

    (nitially, the (0 addresses of the nodes are given and nodes are connected to the ringnetwork. >ow, token is passed etween the nodes connected. 2 to 8 nodes can e

    connected in the ring. #s per the priority of the nodes, the token will pass. The priority

    of the node can e changed and then the token passing will take route as per the priority

    allotment.

  • 7/24/2019 Simulator.docx

    26/93

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser AanualThe token hold on time can also e changed. Dhen the data is transferred, the numer of

    frames that are transferred from the node depends upon the token hold on time of the

    node. #fter the token hold on time, the token is passed on to the net priority node.

    %uring the file transfer, suppose one node in the ring is disconnected, and then a message

    window appears prompting for ring reconfiguration disconnecting the node. (f the

    answer is yes, the particular node is disconnected and other nodes form a ring and

    activities continue. (f the answer is no, then all the nodes are disconnected. (n this case,

    all the nodes are to e reconnected using connect switch.

  • 7/24/2019 Simulator.docx

    27/93

  • 7/24/2019 Simulator.docx

    28/93

    Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*

    The token ring component creates a directory named ?TokenRing@ in the Simulator

    %irectory in ' drive. The ?TokenRing@ directory contains four su-directoriescorresponding to the four nodes in the topology.

    The destination node of a file transmission stores the received file in the directory

    corresponding to the node. 4our separate directories >ode), >ode2, >ode3 and >ode8

    are created. (n the sender node directory, 3 files are stored. 0erformance results are stored

    as ?0erf.ls@, the Trace is stored as ?Trace.ls@, the graph 4rame sent +s Time and the

    corresponding data derived from Trace.ls file is stored as ?Time-4rame.ls@.

    E78er+)ent* to be -arr+e( out

    2a6 Select 2 >odes and carryout data transfer from node to another node.

    V+ew+n2 te 2ra8* an( 8r+nt+n2 te 2ra8*

    (n order to view the 4rame sent +s Time graph, the Simulator software should e closed.

    (n ' drive, inside the Simulator directory, in the TokenRing directory, in >ode ), the

    graphs are stored as Ecel file. (n the computer system, Ecel Software should e

    availale to view the graph y opening the file ?Time-4rame.ls@. The graph can e seen

    and the data derived from the Trace can e seen. The graph can e printed in Ecelsoftware.

    >oteH =efore conducting another simulation eperiment, the graph and performance

    must e printed or stored in some other place in the local disk. Gtherwise, the new

    eperiment will overwrite all the Ecel files in the corresponding node.

    26 Gpen the Simulator Software and Token Ring option is chosen. Select 2 >odes and

    carry out data transfer etween 2 nodes simultaneously with the same input parameters

    and with same file from >ode ) and analyMe. 'arry out the calculations as we did inEthernet eperiment. Repeat the eperiment for different packet siMes and different error

    generation and analyMe.

  • 7/24/2019 Simulator.docx

    29/93

    2c6 Repeat the eperiment for different packet siMes, different maimum ack off time

    and different error generation and analyMe the results.

    2d6 Select 3 nodes and carry out data transfer etween the nodes simultaneously and

    analyMe. Repeat the eperiment changing the input parameters. %isconnect one node and

    answer to the question yes and oserve the operation and record it. %isconnect one node

    and answer to the question no and oserve the operation and record it.

    2e6 Select 8 nodes and do the data transfer. Dhen the data transfer is going on,

    disconnect one node and oserve and record the effect.

    Cal-ulat+on*'

    ). oodput O 5Total ytes L Gverhead6 I Transmission time

    2. 4rame 0roaility O 5Successful attempts I Total attempts6

    3. Total #ttempts O Successful attempts K failed attempts

    8. failed attempts O defers due to token capture K errors

  • 7/24/2019 Simulator.docx

    30/93

    . Aean delay O Total file transmission time I numer of transmissions

  • 7/24/2019 Simulator.docx

    31/93

    E78t. 3. Token Bu*

  • 7/24/2019 Simulator.docx

    32/93

  • 7/24/2019 Simulator.docx

    33/93

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    In8ut Para)eter*

    >umer of >odes - 2 to 8

    4rame (nterval - 2* milliseconds to )*** milliseconds4rame SiMe - )2 =ytes to 2,*8: =ytes

    Error eneration - )*-1

    , )*-ow, token is passed etween the nodes connected. 2 to 8 nodes

    can e connected in the =us. #s per the priority of the nodes, the token will pass. The

    priority of the node can e changed and then the token passing will take route as per the

    priority allotment.

  • 7/24/2019 Simulator.docx

    34/93

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual%uring the file transfer, suppose one node in the ring is disconnected, then that node is

    automatically disconnected and the token us is reconfigured leaving that node

    automatically. >o question is asked. The node can e reconnected using connect switch.

  • 7/24/2019 Simulator.docx

    35/93

  • 7/24/2019 Simulator.docx

    36/93

    Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*

    The token us simulator creates a directory named ?Token=us@ in the Simulator%irectory in ' drive. The ?Token=us@ directory contains four su-directories

    corresponding to the four nodes in the topology.

    The destination node of a file transmission stores the received file in the directory

    corresponding to the node. 4our separate directories >ode), >ode2, >ode3 and >ode8

    are created. (n the sender node directory, 3 files are stored. 0erformance results are stored

    as ?0erf.ls@, the Trace is stored as ?Trace.ls@, the graph 4rame sent +s Time and the

    corresponding data derived from Trace.ls file is stored as ?Time-4rame.ls@.

    E78er+)ent* to be -arr+e( out

    3a6 Select 2 >odes and carryout data transfer from one node to another node.

    V+ew+n2 te 2ra8* an( 8r+nt+n2 te 2ra8*

    (n order to view the 4rame sent +s Time graph, the Simulator software should e closed.

    (n ' drive, inside the Simulator directory, in the Token=us directory, in >ode ), the

    graphs are stored as Ecel file. (n the computer system, Ecel Software should eavailale to view the graph y opening the file ?Time-4rame.ls@. The graph can e seen

    and the data derived from the Trace can e seen. The graph can e printed in Ecel

    software.

    >oteH =efore conducting another simulation eperiment, the graph and performance

    must e printed or stored in some other place in the local disk. Gtherwise, the new

    eperiment will overwrite all the Ecel files in the corresponding node.

    36 Gpen the Simulator Software and Token =us option is chosen. Select 2 >odes andcarry out data transfer etween 2 nodes simultaneously with the same input parameters

    and with same file from >ode ) and analyMe. 'arry out the calculations as we did in

    Ethernet eperiment. Repeat the eperiment for different packet siMes and different error

    generation and analyMe.

    3c6 Repeat the eperiment for different packet siMes, different maimum ack off time

    and different error generation and analyMe the results.

  • 7/24/2019 Simulator.docx

    37/93

    3d6 Select 3 nodes and carry out data transfer etween the nodes simultaneously and

    analyMe. Repeat the eperiment changing the input parameters. %isconnect one node and

    see the effect and record it.

    3e6 Select 8 nodes and do the data transfer. Dhen the data transfer is going on,

    disconnect one node and oserve and record the effect.

  • 7/24/2019 Simulator.docx

    38/93

    2*

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    Cal-ulat+on*'

    ). oodput O 5Total ytes L Gverhead6 I Transmission time

    2. 4rame 0roaility O 5Successful attempts I Total attempts6

    3. Total #ttempts O Successful attempts K failed attempts

    8. failed attempts O defers due to token capture K errors

    . Aean delay O Total file transmission time I numer of transmissions

  • 7/24/2019 Simulator.docx

    39/93

    2)

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    E78t. :. +rele** LAN

  • 7/24/2019 Simulator.docx

    40/93

    22

  • 7/24/2019 Simulator.docx

    41/93

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    In8ut Para)eter*

    >umer of >odes - 2 to 8

    4rame (nterval - 2* milliseconds to )*** milliseconds4rame SiMe - s use the 'arrier Sense Aultiple #ccess 5'SA#6

    algorithm with a 'ollision #voidance 5'#6 mechanism in which each unit senses the

    media efore it starts to transmit. (f the media is free for several microseconds, the unit

    can transmit for a limited time. (f the media is usy, the unit will ack off for a random

    time efore it senses again.

    Coll+*+on A4o+(an-e

    To avoid collisions with other incoming calls, each station transmits a short RTS

    5Request-To-Send6 frame efore the data frame. The #ccess 0oint sends ack a 'TS

  • 7/24/2019 Simulator.docx

    42/93

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual5'lear-To-Send6 frame with permission to start the data transmission. This frame includes

    the time and information that the particular station is going to transmit. #ll the stations in

    the cell are informed that another unit will transmit, so they cannot transmit even if the

    media seems to e free. (n this way, collision is avoided. Dhenever access point is

    possile to transmit, it will transmit the received from the source to the destination.

  • 7/24/2019 Simulator.docx

    43/93

  • 7/24/2019 Simulator.docx

    44/93

    Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*

    The Direless simulator module creates a directory named ?Direless@ in the Simulator

    %irectory in ' drive. The ?Direless@ directory contains four su-directoriescorresponding to the four nodes in the topology.

    The destination node of a file transmission stores the received file in the directory

    corresponding to the node. 4our separate directories >ode), >ode2, >ode3 and >ode8

    are created. (n the sender node directory, 8 files are stored. 0erformance results are stored

    as ?0erf.ls@, the Trace is stored as ?Trace.ls@, the graph 4rame sent +s Time and the

    corresponding data derived from Trace.ls file is stored as ?Time-4rame.ls@ and the

    graph collision +s Time and the corresponding data is stored as ?'ollision.ls@.

    E78er+)ent* to be -arr+e( out

    8a6 Select 2 >odes and carryout data transfer from >ode ) to >ode 2.

    V+ew+n2 te 2ra8* an( 8r+nt+n2 te 2ra8*

    (n order to view the 4rame sent +s Time graph and 'ollision +s Time graph, first, we

    have to close the Simulator software.

    (n ' drive, inside the Simulator directory, in the Direless directory, in >ode ), the graphs

    are stored as Ecel file. (n the computer system, Ecel Software should e availale toview the graph y opening the file ?Time-4rame.ls@. The graph can e seen and the

    data derived from the Trace can e seen. The graph can e printed in Ecel software.

    Similarly, y opening the file ?'ollision.ls@, the collision +s Time graph can e viewed.

    (t can also e stored.

    >oteH =efore conducting another simulation eperiment, the graphs and performance

    must e printed or stored in some other place in the Focal disk. Gtherwise, the new

    eperiment will overwrite all the Ecel files in the corresponding node.

    86 The Simulation Software is opened. Direless option is chosen. Select 2 >odes and

    carry out data transfer etween 2 nodes simultaneously keeping the same set of input

    parameters and with the same file from the >ode ). and analyMe the results.

    8c6 Select 2 >odes and carry out data transfer etween 2 nodes simultaneously and

    analyMe. Repeat the eperiment for different packet siMes, different maimum ack off

    time and different error generation.

  • 7/24/2019 Simulator.docx

    45/93

    8d6 Select 3 nodes and carry out data transfer etween the nodes simultaneously and

    analyMe. Repeat the eperiment changing the input parameters

    8e6 Select 8 nodes and do the data transfer. Dhen the data transfer is going on,

    disconnect one node and oserve and record the effect.

  • 7/24/2019 Simulator.docx

    46/93

  • 7/24/2019 Simulator.docx

    47/93

    Cal-ulat+on*'

    ). oodput O 5Total ytes L Gverhead6 I Transmission time

    2. 4rame 0roaility O 5Successful attempts I Total attempts6

    3. Total #ttempts O Successful attempts K failed attempts

    8. 4ailed attempts O 'ollisions K errors

    . Aean delay O Total file transmission time I numer of transmissions

  • 7/24/2019 Simulator.docx

    48/93

    27

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    DATA TRANS/ER PROTOCOLS

    %ata Transfer 0rotocols consist of the following eperiments

    ). Stop and wait

    2. o ack n. Selective repeat

    4rom the aove illustrated ?%ata Transfer 0rotocols@ screen, different eperiments can e

    chosen.

  • 7/24/2019 Simulator.docx

    49/93

    2:

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    E78t. 6. Sto8 an( a+t AR= Proto-ol

    In8ut Para)eter*0acket SiMe - )2 =ytes to 2,*8: =ytes

    Round Trip Time 5RTT6 - * msec. to )* msec.

    Foss Rate - *Q to *Q

    Retransmit Time out - )** msec. to )*** msec.

    >oteH #t the time of giving input parameters, it is to e noted that the input value given

    for Retransmit Time out parameter should e more than the RTT

    Tran*,err+n2 a (ata ,+le ,ro) one **te) to anoter **te) )a+nl +n AN

    (n this eperiment, there is one sender and one receiver.

    4rom the sender, file from the system can e opened for transmission

    This file can e sent to the receiver y using Start =utton. (n etween there is a network

    of networks.

  • 7/24/2019 Simulator.docx

    50/93

    21

    There are trace windows in Sender, >etwork and Receiver and the data transfer

    information with time stamp appears continuously. (n >etwork, the error information is

    displayed.

    #t the end of the data transfer, result appears with performance parameters in the ottom

    of the page, namely, 0ayload, Transfer time, Throughput and Fosses.

  • 7/24/2019 Simulator.docx

    51/93

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*

    The Stop and Dait simulator creates a directory named ?Stop#ndDait@ in the

    Simulator %irectory in ' drive. The transmitted file is stored in this directory. Theperformance results are also stored as Ecel file ?0erf.ls@ . 9sing Store switch, the trace

    of sender window is stored as ?SendTrace.ls@ and trace of receiver window is stored as

    ?RecvTrace.ls@. (n addition to this, another file ?Time-4rame.ls@is also stored. This

    file has 4rame Sent +s Time graph and the data for the graph collected from the Sender

    trace window.

    Pau*e an( re*et ,a-+l+t

    #t any time, the simulation can e stopped and can e continued. Reset can e used to

    start from the eginning.

    E78er+)ent* to be -arr+e( out

    a6 Select a file from the system and transfer the file from sender to receiver. #ssign the

    following input parameters. The data flow follows Stop and Dait algorithm in sending

    the packets 5frames6 in the network.

    0acket siMeH )*28 =ytes

    RTT H )** msec.Foss RateH )*Q

    Retransmit Time outH 2** msec.

    'hoose a file and send.

    >ote down the results. >ote down from the trace, when the packet error has occurred and

    when the time out has happened and what the net action was. 'heck whether Stop and

    wait algorithm is followed.

    6 'hange the 0acket siMe to 2*8: ytes.Send the same file.

    >ote down the results

    'ompare the results.

    c6 Similarly, 'hange the loss rate and compare the results

    V+ew+n2 te 2ra8* an( 8r+nt+n2 te 2ra8*

  • 7/24/2019 Simulator.docx

    52/93

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual(n order to view the 4rame sent +s Time graph, first, we have to close the Simulator

    software.

    (n ' drive, inside the Simulator directory, in the Stop#ndDait directory, the graph is

    stored as Ecel file. (n the computer system, Ecel Software should e availale to view

    the graph y opening the file ?Time-4rame.ls@. The graph can e seen and the data

    derived from the Trace can e seen. The graph can e printed in Ecel software. %uring

    the time out, the packet is resent. (t can e clearly viewed in the graph.

  • 7/24/2019 Simulator.docx

    53/93

  • 7/24/2019 Simulator.docx

    54/93

    E78t. $. 0o ba-k n AR= Proto-ol

    In8ut Para)eter*

    Dindow SiMe - ) to )* packets

    =andwidth - ** Jps to Aps

    0acket SiMe - )2 =ytes to 2,*8: =ytes

    Round Trip Time 5RTT6 - * mSec. To ** mSec.

    Foss Rate - *Q to *Q

    Retransmit Time out - )** mSec. To )*** mSec.

    >oteH #t the time of giving input parameters, it is to e noted that the input value given

    for Retransmit Time out parameter should e more than the RTT

    Tran*,err+n2 a (ata ,+le ,ro) one **te) to anoter **te) )a+nl +n AN

    (n this eperiment, there is one sender and one receiver.

    4rom the sender, file from the system can e opened for transmission

    This file can e sent to the receiver. (n etween there is a network of networks.

  • 7/24/2019 Simulator.docx

    55/93

    #t the time of sending, sender window and receiver window are opened. The progress ar

    in these windows shows the amount of data transferred and received.

    There are trace windows in Sender, >etwork and Receiver and the data transfer

    information with time stamp appears continuously.

    #t the end of the data transfer, result appears with performance parameters

  • 7/24/2019 Simulator.docx

    56/93

    32

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*

    The o ack n simulator creates a directory named ?o=ack>@ in the Simulator

    %irectory in ' drive. The transmitted file is stored in this directory. The performance

    results are also stored as Ecel file ?0erf.ls@. 9sing Store switch, the trace of sender

    window is stored as ?SendTrace.ls@ and trace of receiver window is stored as

    ?RecvTrace.ls@. (n addition to this, another file ?Time-4rame.ls@is also stored. This

    file has 4rame Sent +s Time graph and the data for the graph collected from the Sender

    trace window.

    Pau*e an( re*et ,a-+l+t

    #t any time, the simulation can e stopped and can e continued. Reset can e used to

    start from the eginning.

    E78er+)ent* to be -arr+e( out

  • 7/24/2019 Simulator.docx

    57/93

    33

    (n order to view the 4rame sent +s Time graph, first, we have to close the Simulator

    software.

    (n ' drive, inside the Simulator directory, in the o=ack> directory, the graph is

    stored as Ecel file. (n the computer system, Ecel Software should e availale to view

    the graph y opening the file ?Time-4rame.ls@. The graph can e seen and the data

    derived from the Trace can e seen. The graph can e printed in Ecel software. %uringthe time out, the packets are resent according to the o ack n algorithm. (t can e

    clearly viewed in the graph.

  • 7/24/2019 Simulator.docx

    58/93

    33

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    >oteH =efore conducting another simulation eperiment, the graphs and performance

    must e printed or stored in some other place in the Focal disk. Gtherwise, the new

    eperiment will overwrite the Ecel files in the directory.

  • 7/24/2019 Simulator.docx

    59/93

    38

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    E78t.;. Sele-t+4e Re8eat AR= Proto-ol

    In8ut Para)eter*Dindow SiMe - ) to )* packets

    =andwidth - ** Jps to *** Jps

    4rame SiMe - )2 =ytes to 2,*8: =ytes

    Round Trip Time 5RTT6 - * mSec. To ** mSec.

    Foss Rate - *Q to *Q

    Retransmit Time out - )** mSec. To )*** mSec.

    >oteH #t the time of giving input parameters, it is to e noted that the input value given

    for Retransmit Time out parameter should e more than the RTT

    Tran*,err+n2 a (ata ,+le ,ro) one no(e to anoter

    (n this eperiment, there is one sender and one receiver.

    4rom the sender, file from the system can e opened for transmission

  • 7/24/2019 Simulator.docx

    60/93

    3

    This file can e sent to the receiver. (n etween there is a network of networks.

    There are trace windows in Sender, >etwork and Receiver and the data transfer

    information with time stamp appears continuously.

    #t the end of the data transfer, result appears with performance parameters

  • 7/24/2019 Simulator.docx

    61/93

    3

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*

    The Selective repeat simulator creates a directory named ?Selectiverepeat@ in the

    Simulator %irectory in ' drive. The transmitted file is stored in this directory. The

    performance results are also stored as Ecel file ?0erf.ls@ . 9sing Store switch, the trace

    of sender window is stored as ?SendTrace.ls@ and trace of receiver window is stored as

    ?RecvTrace.ls@. (n addition to this, another file ?Time-4rame.ls@is also stored. This

    file has 4rame Sent +s Time graph and the data for the graph collected from the Sender

    trace window.

    Pau*e an( re*et ,a-+l+t

    #t any time, the simulation can e stopped and can e continued. Reset can e used to

    start from the eginning.

    E78er+)ent* to be -arr+e( out

    7a6 Select a file from the system and transfer the file from sender to receiver. #ssign the

    following input parameters. The data flow follows Selective repeat algorithm in sending

    the packets 5frames6 in the network.

    0acket siMeH )*28 =ytes

    RTT H )** msec.

    Foss RateH )*Q

    Retransmit Time outH 2** msec.

    =andwidth H 2*** Jps

    Dindow siMe H packets

    'hoose a file and send.

    >ote down the results. >ote down from the trace, when the packet error has occurred and

    when the time out has happened and what was the net action. 'heck whether it follows

    the Selective repeat algorithm.

    76 'hange the 0acket siMe to 2*8: ytes.

    Send the same file.>ote down the results

    'ompare the results.

    7c6 Similarly, 'hange the loss rate, andwidth and compare the results

    ive reason for congestion packet drop.

    V+ew+n2 te 2ra8* an( 8r+nt+n2 te 2ra8*

  • 7/24/2019 Simulator.docx

    62/93

    3et Finc Simulator L 9ser Aanual

    >oteH =efore conducting another simulation eperiment, the graphs and performance

    must e printed or stored in some other place in the Focal disk. Gtherwise, the new

    eperiment will overwrite the Ecel files in the directory.

    7d6 =y reducing the andwidth and y increasing the window siMe, we will e ale to see

    congestion packet drop also in the network.

  • 7/24/2019 Simulator.docx

    64/93

    37

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    RO&TIN0 AL0ORIT"MS

    Routing #lgorithms consist of the following eperiments

    ). %istance +ector #lgorithm

    2. Fink-State #lgorithm

    4rom this Routing #lgorithms screen, different eperiments can e chosen.

  • 7/24/2019 Simulator.docx

    65/93

    3:

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    E78t.

  • 7/24/2019 Simulator.docx

    66/93

    31

  • 7/24/2019 Simulator.docx

    67/93

    31

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    In8ut Para)eter*

    Routers L 3 to 7

    'onnectivity etween the Routers - to e given

    Deightage or 'ost or %istance etween the routers L numer )-)*

    Source Router L to e selected

    Pro-e**

    The %istance vector algorithm is eecuted.

    (nitially, in iteration ), the source router creates the router tale with the distance

    information of the neighouring routers. (t also gathers distance information of the otherrouters connected to the neighouring routers.

    =y using >et switch, second iteration is done.

    (n the second iteration, it calculates the shortest distance to the unconnected nodes from

    the information gathered in the first iteration and refines the routing tale. (f there are n

    routers, then n-) iterations are required to get shortest distance for all the routers.

    The routing tale gives the shortest distance for all the routers from the source router and

    also information to which router the packet should go net.

    E78er+)ent* to be -arr+e( out

    :a6 Select say routers and draw the connectivity. (nput the distance etween the

    routers. Select Source router. Study the iteration and routing tale for each iteration.

    'heck finally, whether the short distance is calculated and correct net est hop.

    :6 Jeep the layout as it is. 'hange the distance etween the routers. %o the iterations

    and for each iterations, study and check. +erify the result at the end.

    :'6 Jeep the layout as it is. 'hange the Source router and do the eperiment. +erify the

    result at the end.

    :d6 %o different configuration and do the iterations and verify the result.

    Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*

  • 7/24/2019 Simulator.docx

    68/93

    8*

    The %istance +ector simulator creates a directory named ?%istance+ector@ in the

    Simulator %irectory in ' drive. #ll the iterations are stored in ?Results.tt@ file. (t can e

    printed for analysis.

  • 7/24/2019 Simulator.docx

    69/93

  • 7/24/2019 Simulator.docx

    70/93

    8)

  • 7/24/2019 Simulator.docx

    71/93

    8)

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    In8ut Para)eter*

    Routers L 3 to 7

    'onnectivity etween the Routers - to e given

    Deight or 'ost or %istance etween the routers L numer )-)*

    Source Router L to e selected

    Pro-e**

    The Fink State algorithm is eecuted.

    There are parent group and transitive group. (nitially, in iteration ), the source router is in

    parent group and all the directly connected routers are in transitive group and router taleis created.

    =y using >et switch, second iteration is done.

    (n net iteration, the short distance neighoring router is taken into parent group and the

    routers associated with the particular router are placed in the transitive group and routing

    tale is constructed. (n this way, if there are n routers availale, then n numer of

    iterations is required to find the shortest distance in this method.

    4inally, the routing tale gives the shortest distance for all the routers from the source

    router and also information to which router the packet should go net.

    E78er+)ent* to be -arr+e( out

    1a6 Select say < routers and draw the connectivity. (nput the distance etween the

    routers. Select Source router. Study the iteration and the routing tale every time

    created. 'heck finally, whether the short distance is calculated and correct net est hop.

    16 Jeep the layout as it is. 'hange the distance etween the routers. %o the iterations

    and for each iterations, study and check. +erify the result at the end.

    1'6 Jeep the layout as it is. 'hange the Source router and do the eperiment. +erify the

    result at the end.

    1d6 %o different configuration and do the iterations and verify the result.

  • 7/24/2019 Simulator.docx

    72/93

    82

    Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*

    The Fink-State simulator creates a directory named ?FinkState@ in the Simulator

    %irectory in ' drive. #ll the iterations are stored in ?Results.tt@ file. (t can e printed

    for analysis.

  • 7/24/2019 Simulator.docx

    73/93

    82

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    ENCRYPTION an( DECRYPTION

    Encryption and %ecryption consist of the following eperiments

    ). Shifting #lgorithm2. RS# #lgorithm

    4rom this Encryption and %ecryption screen, different eperiments can e chosen.

  • 7/24/2019 Simulator.docx

    74/93

    83

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    E78t. 1%. S+,t+n2 Al2or+t)

    In8ut Para)eter*

    (nput Tet L to e given

    Shift L numer is to e given

    Pro-e**

    The Shifting algorithm is eecuted at the time of encryption.

    #t the time of decryption, again shifting algorithm is eecuted.

    E78er+)ent to be -arr+e( out

    Enter some tet in the tet o availale.

    ive the shifting inde and use Shift key.

    Encrypted message appears in the window.

    Dhen re-shift key is used, re- shift algorithm is used with the encrypted message and the

    re shifted message is displayed.

  • 7/24/2019 Simulator.docx

    75/93

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    E78t. 11 RSA Al2or+t)

    (n this eperiment, the process of RS# #lgorithm is eplained with an eample.

    In8ut Para)eter*

    (nitially, a plain tet of )* characters 5ma6 is given.

    Pro-e**

    The RS# algorithm is used for encryption and decryption

    E78er+)ent to be -arr+e( out

    En-r8t+on

    Encryption key is used in the menu ar. Then again Encryption key elow the tet

    window is used to encrypt the message. RS# #lgorithm procedure is stage y stage

    eecuted and the steps are shown in the output window. Secret Jey and 0ulic Jey are

    generated and displayed.

  • 7/24/2019 Simulator.docx

    76/93

  • 7/24/2019 Simulator.docx

    77/93

    NETOR SOCETS

    >etwork Sockets consist of the following eperiments

    ). TT0 #pplication2. 4T0 #pplication

    3. E-mail #pplication

    4rom this >etwork Sockets screen, different eperiments can e chosen.

  • 7/24/2019 Simulator.docx

    78/93

    87

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    E78t. 15. "tt8 ? eb Brow*+n2

    The function port (% is :* for we rowsing. (n this eperiment, the user can access one

    html file from a we server.

    In8ut 8ara)eter*

    'lient (% - (0 address

    Server (% - (0 address

    Pro-e**

    (n the eperiment, at the time of connecting the client to the server, communication pipe

    namely socket is created. The socket is characteriMed y 8 parameters.

    - Server (%

    - 'lient (%- Focal 0ort numer :*

    - Remote 0ort numerDhen the client sends the connect request to the server, it generates a )< it random

    numer which lies etween )*28 and

  • 7/24/2019 Simulator.docx

    79/93

    8:

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    E78er+)ent to be -arr+e( out

    ). The client id L (0 address is entered.

    2. Then the Server address is entered and activated

    3. Then in the client side, to connect to the server, server address is entered and the

    'onnect switch is used to connect the client to the server.

    8. >ow the socket is created and the connection is made and log is given in the

    server

    . Then the user can send the request to the server y typinghttpHIInetlinc.comIinde.html and press go utton.

    ow, the request goes to server and the server responds. (t accesses the file

    namely ?inde.html@ and transfers it to the client. Then the client converts theTAF file into normal tet file and displays in a window.

    7. There is an interaction etween the server and the client. The server sends the file

    to the client and in the client window, the content of the file is displayed.

    http://netlinc.com/index.htmlhttp://netlinc.com/index.html
  • 7/24/2019 Simulator.docx

    80/93

    81

    :. The user can disconnect the client and server also. (n the server side, log is

    generated for every activity

    1. The simulator is closed. (n the Simulator directory in ' drive, the html file is

    opened in notepad and the content is altered and saved.

    )*. #gain the same application is run

    )). (t is to e verified that the modified content is appearing in the client window.

  • 7/24/2019 Simulator.docx

    81/93

    81

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    E78t. 13. /TP ? /+le Tran*,er

    The function port (% is 2) for file transfer.

    (n this eperiment, the user can do the file transfer from a ftp server.

    In8ut 8ara)eter*

    'lient (% - (0 address

    Server (% - (0 address

    Pro-e**

    (n the eperiment, at the time of connecting the client to the server, communication pipe

    namely socket is created. The socket is characteriMed y 8 parameters.

    - Server (%

    - 'lient (%- Focal 0ort numer 2)

    - Remote 0ort numer

    Dhen the client sends the connect request to the server, it generates a )< it random

    numer which lies etween )*28 and

  • 7/24/2019 Simulator.docx

    82/93

    *

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    E78er+)ent to be -arr+e( out

    ). The client id L (0 address is entered.

    2. Then the Server address is entered and activated

    3. Then in the client side, to connect to the server, server address is entered and the

    'onnect switch is used to connect the client to the server.

    8. >ow the socket is created and the connection is made and log is given in theserver

    . Then the user can send the request to the server y typingftpHIInetlinc.comIinde.tt and press go utton.

    ow, the request goes to server and the server responds. (t accesses the file

    namely inde.html file and transfer it to the client. Then the client displays the

    file.

  • 7/24/2019 Simulator.docx

    83/93

    )

    7. The user can disconnect the client and server also. (n the server side, log isgenerated for every activity

    :. The simulator is closed. (n the Simulator directory in ' drive, the inde.tt file is

    opened in notepad and the content is altered and saved.

    1. #gain the same application is run

    )*. (t is to e verified that the modified content is appearing in the client window.

  • 7/24/2019 Simulator.docx

    84/93

    )

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    E78t. 1: SMTP # e#)a+l

    The function port (% is 2 for file transfer.

    (n this eperiment, the user can send e-mail to another address.

    (nput parameters

    'lient (% - (0 address

    Server (% - (0 address

    (n the eperiment, at the time of connecting the client to the server, communication pipe

    namely socket is created. The socket is characteriMed y 8 parameters.

    - Server (%

    - 'lient (%- Focal 0ort numer 2

    - Remote 0ort numer

    Dhen the client sends the connect request to the server, it generates a )< it random

    numer which lies etween )*28 and

  • 7/24/2019 Simulator.docx

    85/93

    2

  • 7/24/2019 Simulator.docx

    86/93

    2

    += Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual

    E78er+)ent to be -arr+e( out

    ).The user is supposed to give the 'lient (0 address and the Server address in Server.Then in the 'lient configuration window, the server address is to e given and connectutton has to e used.

    2. >ow, the control socket and data socket are created.

    3.Then the user can send the request to the server y typing adminnetlinc.comandpress go utton.

    8. The content in the client window is taken as the message for the mail.

    . The mail reaches the mail o of the user.

  • 7/24/2019 Simulator.docx

    87/93

    OSI Reference Model

    The OSI reference model is a hierarchical structure of seven layers that defines the requirementsfor communications between two computers. This model was defined by International StandardsOrganization. The model allows all network elements to operate together, regardless of who builtthem. y the late !"#$%s, ISO was recommending the implementation of the OSI model as a

    networking standard, but T&'(I' had been in use for years. T&'(I' was fundamental to)*')+T and the other networks that evolved into Internet. Only a subset of the whole OSImodel is used today.

    Functions of the Layers)s data passes from an application and moves down the stack, each layer adds a headeraccording to the protocol that e-ists at that layer. This is known as encapsulation. The onlye-ception is that data link layer, a header and trailer is added. )fter the data has beentransmitted across whatever media in use, the process of deencapsulation begins in thereceiver. ach layer of the stack, at the destination, removes the header /or header and trailer inthe case of the data link layer0 that was placed by its corresponding source layer. The physicaland data link layers e-ists in hardware, all other layers are software driven.

    Layer 7 ApplicationThis layer has protocols that support user applications, but it does not include applicationsthemselves. Strictly speaking, this layer deals with file access and management

    Layer 6 PresentationThe presentation layer protocols deals with data synta- during transfer between two applicationprocess. If the client and server are using different file formats, this layer has conversionprotocols. Therefore, computers using different file formats can still communicate with eachother. 1ata encryption and decryption protocols also e-ist at the presentation layer.

    Layer5 Session'rotocols at this layer are necessary for establishing, maintaining and ending sessions betweenuser applications

    Layer4 ransportTransport layer protocols are responsible for the reliability of end to end connections. Theseprotocols assemble multiple network layer packets into coherent message. This layer alsoprovides flow control and error recovery.

    Layer! "et#or$The network layer protocols route packets across the network/s0 between two computers.

    Layer% &ata lin$1ata link protocols provide logical link control and medium access control. These protocolsprovide reliability to the physical layer transmission by arranging the data into frames and addingerror checking and addressing information. The +etwork Interface &ard /+I&0 assembles the

    data link layer frames.

    Layer' Physical'rotocols at the physical layer are responsible for establishing, maintaining and ending physicalconnections /point to point0 between computers. These protocols are manifested in the mediaacross which transmission occurs. These protocols do not specify the various cables andconnectors.

  • 7/24/2019 Simulator.docx

    88/93

    (thernet

    In early !"#$s, the 2ero- &ompany developed an e-perimental version of coa-ial thernet. In!"3$s, 2ero- published 4The thernet5 in collaboration with 1igital and Intel. It outlinedmethodology, physical topology and constraints. The I became responsible for thernetspecification. The I published standard 3$6.7 to establish thernet%s position in OSI model.

    thernet was defined as e-isting across the data link and physical layers.

    Mediu) Access *ontrol +MA*,In terms of nonswitched thernet, medium access control is an effective methodology that allowsdevices on a 8)+ to share their interconnecting media.

    1ue to shared nature of the media, it is obvious that more than one device might send data at thesame time, therefore thernet 9)& has to be able to

    decide when to send data what to do if its data collides with another device%s data how long to wait after a collision before retransmission

    he (thernet MA* su-layer

    The 9)& sublayer has two primary responsibilities: 1ata encapsulation, including frame assembly before transmission, and frame parsing (

    error detection during and after reception 9edia access control, including initiation of frame transmission and recovery from

    transmission failure.

    he .asic (thernet Fra)e For)atThe I 3$6.7 standard defines a basic data frame format. The basic data frame formatcontains the seven fields as shown.

    I((( /0%1! MA* &ata Fra)e For)at

    Prea)-le+PR(,; &onsists of # bytes. The '* is an alternating pattern of ones and zeros thattells receiving stations that a frame is coming, and that provides a means to synchronize theframereception portions of receiving physical layers with the incoming bit stream.

    Start2of fra)e deli)iter +SOF,; &onsists of ! byte. The SO< is an alternating pattern of onesand zeros, ending with two consecutive ! bits indicating that the ne-t bit is the leftmost bit in theleftmost byte of the destination address.

  • 7/24/2019 Simulator.docx

    89/93

  • 7/24/2019 Simulator.docx

    90/93

    o$en Rin3

    I9 originally developed the Token *ing network in the !"#$s. The I 3$6.? specification forToken *ing was modeled after I9 Token *ing.

    o$en Rin3 Operation

    In Token *ing network, a small frame, called a token is passed around the network. 'ossessionof the token grants the right to transmit. If a node receiving the token has no information to send,it passes the token to the ne-t end station. ach station can hold the token for a ma-imum periodof time.

    If a station possessing the token does have information to transmit, it seizes the token, alters ! bitof the token /which turns the token into a startof frame sequence0, appends the information that itwants to transmit, and sends this information to the ne-t station on the ring. @hile the informationframe is circling the ring, no token is on the network, which means that other stations wanting totransmit must wait. Therefore, collisions cannot occur in Token *ing +etworks. If early tokenrelease is supported, a new token can be released when frame transmission is complete.

    The information frame circulates the ring until it reaches the intended destination station, which

    copies the information for further processing. The information frame continues to circle the ringand is finally removed when it reaches the sending station. The sending station can check thereturning frame to see whether the frame was seen and subsequently copied by the destination.

    Anlike &S9)(&1 networks /such as thernet0, tokenpassing networks are deterministic whichmeans all the systems will have opportunity to transmit.

    Priority Syste)Token *ing networks use a sophisticated priority system that permits certain usedesignated,highpriority stations to use the network more frequently. Token *ing frames have two fields thatcontrol priority: the priority field and the reservation field.

    Only stations with a priority equal to or higher than the priority value contained in a token can

    seize that token. )fter the token is seized and changed to an information frame, only stations witha priority value higher than that of the transmitting station can reserve the token for the ne-t passaround the network. @hen the ne-t token is generated, it includes the higher priority of thereserving station. Stations that raise a token%s priority level must reinstate the previous priorityafter their transmission is complete.

    Fault2Mana3e)ent Mechanis)sToken *ing networks employ several mechanisms for detecting and compensating for networkfaults.

  • 7/24/2019 Simulator.docx

    91/93

    I((( /0%15 and o$en Rin3 specify o$ens and &ata*o))and Fra)es

    o$en fra)e fieldsStart deli)iter; )lerts each station of the arrival of a token /or data(command frame0.

    Access2control -yte; contains the 'riority field /the most significant 7 bits0 and the *eservationfield /the least significant 7 bits0, as well as a token bit /used to differentiate a token from adata(command frame0 and a monitor bit /used by the active monitor to determine whether a frameis circling the ring endlessly0

    (nd deli)iter ; Signals the end of the token or data(command frame. This field also containsbits to indicate a damaged frame and identify the frame that is the last in a logical sequence.

    &ataco))and fra)e fields

    Fra)e control -ytes ; indicates whether the frame contains data or control information. Incontrol frames, this byte specifies the type of control information.

    &estination and source addresses ; consists of two = byte address fields that identify thedestination and source station addresses.

    &ata; Indicates that the length of field is limited by the ring token holding time, which defines thema-imum time a station can hold the token.

    Fra)e2chec$ seuence +F*S,; is filed by the source station with a calculated value dependenton the frame contents. The destination station recalculates the value to determine whether theframe was damaged in transit. If so, the frame is discarded.

    Fra)e status ; is a ! byte field terminating a command(data frame. The

  • 7/24/2019 Simulator.docx

    92/93

    ;ireless LA" opolo3y

    @ireless 8)+ allow workstations to communicate and to access the network using radiopropagation as transmission medium. The wireless 8)+ can be connected to an e-isting wired8)+ as an e-tension, or can form the basis of a new network while adoptable to both indoor andoutdoor environments, wireless 8)+s are especially suited to indoor locations such as office

    buildings, manufacturing floors, hospitals and Aniversities.

    The basic building block of the wireless is the cell. This is the area in which the wirelesscommunication takes place. The coverage area of a cell depends on the strength of thepropagated radio signal and the type and construction of walls, partitions and other physicalcharacteristics of the indoor environment.

    ach wireless 8)+ cell requires some communications and traffic management. This iscoordinated by an )ccess 'oint /)'0 which communicates with wireless station in its convergearea.

    Stations communicate with each other via )ccess 'oint.

    Media Access@hen many users are located in the same area, performance becomes an issue. To address thisissue, wireless 8)+s use the &arrier Sense 9ultiple )ccess /&S9)0 algorithm with a &ollision

    )voidance /&)0 mechanism in which each unit senses the media before it starts to transmit. Ifthe media is free for several microseconds, the unit can transmit for a limited time. If the media isbusy, the unit will back off for a random time before it senses again. Since transmitting unitscompete for airtime, the protocol should ensure equal fairness between the stations.

    *ollision A

  • 7/24/2019 Simulator.docx

    93/93