Date post: | 24-Feb-2018 |
Category: |
Documents |
Upload: | citharth-magendran |
View: | 214 times |
Download: | 0 times |
of 93
7/24/2019 Simulator.docx
1/93
Network Lab Manual
V.B MICRO ELECTRONICS
NO.13 POSTAL COLONY 3RD
STREET
EST MAMBALAM!
C"ENNAI#$%% %33.
7/24/2019 Simulator.docx
2/93
INTROD&CTION'
RS232 is the most known serial port used in transmitting the data in
communication and interface. Even though serial port is harder to program than the
parallel port, this is the most effective method in which the data transmission requires
less wires that yields to the less cost. The RS232 is the communication line which enales
the data transmission y only using three wire links. The three links provides !transmit",
!receive" and common ground...
The !transmit" and !receive" line on this connecter send and receive data etween
the computers. #s the name indicates, the data is transmitted serially. The two pins are
T$% & R$%. There are other lines on this port as RTS, 'TS, %SR, %TR, and RTS, R(.
The !)" and !*" are the data which defines a voltage level of 3+ to 2+ and -3+ to -2+
respectively.
The RS-232% has eisted in two types. i.e., %-T/0E 2 pin connector and %-
T/0E 1 pin connector, which are male connectors on the ack of the 0'. /ou need a
female connector on your communication from ost to uest computer. The pin outs of
oth %-1 & %-2 are show elow.
%-Type-1
pin no.
%-Type-
2
0in no.
0in outs 4unction
3 2 R% Receive %ata 5Serial data input6
2 3 T% Transmit %ata 5Serial data output6
7 8 RTS Request to send 5acknowledge to modem that
9#RT is ready to echange data
: 'TS 'lear to send 5i.e.; modem is ready to echange
data6< < %SR %ata ready state 59#RT estalishes a link6
7 S Signal ground
) : %'% %ata 'arrier detect 5This line is active whenmodem detects a carrier
8 2* %TR %ata Terminal Ready.
1 22 R( Ring (ndicator 5=ecomes active when modemdetects ringing signal from 0ST>
7/24/2019 Simulator.docx
3/93
7/24/2019 Simulator.docx
4/93
asserts the Request to Send high and as itBs hooked together with the 'lear to Send, (t
immediately gets a reply that it is ok to send and does so.
7/24/2019 Simulator.docx
5/93
PROCED&RE'
). 'onnect one end of the 1 pin %-type female to female connector to the serial port
of your 0'5system)6.
2. 'onnect other end to the 1 pin %-type female connector of the 0' to 0'
communication trainer kit.
3. Repeat step ) and 2 with the other 0'5system26.
8. 'onnect R$% pin of system) to T$% pin of system2.
. 'onnect R$% pin of system2 to T$% pin of system).
SA(T@ utton to transmit the typed content.
22. 'lick ?'FR S'REE>@ utton to clear the tet o.
To tran*)+t a ,+le'
7/24/2019 Simulator.docx
6/93
0'.
23. Type the message in the tet o.
28. Type the file path with file name to which the contents to e written.
2. 'lick ?DR(TES'REE>TG4(FE@ utton to write the contents.
2SA(T4(FE@ utton to transmit the file content.
NOTE' the transmitted file content will e stored in the path given in the receiving
21. 'lick ?'FR S'REE>@ to repeat the process.
3*. 'lick ?STG0@ utton to eit.
Conne-t+on ,or null )o(e) )eto('
To connect the systems using null modem method
). 'onnect %TR of system) to %SR of system)
2. 'onnect %TR of system2 to %SR of system2
3. 'onnect RTS of system) to 'TS of system)
8. 'onnect RTS of system2 to 'TS of system2
7/24/2019 Simulator.docx
7/93
/ILE TRANS/ER &SIN0 PARALLEL PORT
DESCRIPTIONH
The main aim of the eperiment is to transfer a file from a 0' to another 0'
using parallel port. The interface etween the 0'"s is done through the parallel port5F0T6
in the 0',a male to male 2 pin %-type connector is used to connect together. The
parallel port is configured to run in i-directional mode. The data lines %*-%: 5pins 2 to
16 are used to readIwrite a yte of data. The control line STRG=E and status line #'J
make the handshaking signal. The digital data pins are connected directly to the 78FS288
i-directional uffer. The output of the uffer is connected to the data lines of the parallel
port.
OPERATION'
). The data yte to e transmitted is placed on the data register 5*37:6.
2. The control pin STRG=E is made low to indicate a valid data on the data us.
3. The receiver 0' waits for status pin #'J5which is cross connected with the
STRG=E pin of transmitter 0'6 to go high.
8. Gnce the #'J pin goes high the data in the data register is read.
. The receiver 0' then acknowledges y giving a pulse in its STRG=E pin .The
width of the acknowledge pulse can e set y the user.
7/24/2019 Simulator.docx
8/93
PROCED&REH
3). 'onnect one end of the 2 pin %-type male to male connector to the parallel portof your 0'5F0T65system)6.
32. 'onnect other end to the 2 pin %-type female connector of the 0' to 0'
communication trainer kit.
33. Repeat step ) and 2 with the other 0'5system26.
38. 'onnect the STROBEpin of system) to the ACpin of system 2 in the trainer
kit.
3. 'onnect the STROBEpin of system2 to the ACpin of system ) in the trainer
kit.
3
7/24/2019 Simulator.docx
9/93
87. Repeat all the aove steps to send a new file.
PARALLEL PORT DETAILS'
P+nout*
Register DB-25 I/O
Signal Name Bit Pin Direction
7/24/2019 Simulator.docx
10/93
=========== ======== ===== =========
-Strobe C0 1 Ot!t
"Data Bit 0 D0 2 Ot!t
"Data Bit 1 D1 # Ot!t
"Data Bit 2 D2 $ Ot!t
"Data Bit # D# 5 Ot!t
"Data Bit $ D$ % Ot!t
"Data Bit 5 D5 & Ot!t
"Data Bit % D% ' Ot!t
"Data Bit & D& ( Ot!t
-)c*no+le,ge S% 10 In!t
"Bs S& 11 In!t
"Pa!er .n, S5 12 In!t
"Select In S$ 1# In!t
-)to ee, C1 1$ Ot!t
-.rror S# 15 In!t
-Initialie C2 1% Ot!t
-Select C# 1& Ot!tron, - 1'-25 -
5>ote again that the S7, '*, ') & '3 signals are inverted6
IBM#PC Parallel Pr+nter Port /e)ale DB#56 So-ket e7ternal P+n laout
/
1# 12 11 10 ( ' & % 5 $ # 2 1 /
/
25 2$ 2# 22 21 20 1( 1' 1& 1% 15 1$ / /
The used pins for this eperiment are as follows.
0in signals purpose) -stroe
2 Kdata it * %*
3 Kdata it ) %)8 Kdata it 2 %2
Kdata it 3 %3
< Kdata it 8 %8
7 Kdata it %: Kdata it < %et Finc Simulator L 9ser Aanual
E78t.1. Eternet
7/24/2019 Simulator.docx
14/93
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
In8ut Para)eter*
>o. of >odes - 2 to 8
4rame (nterval - 2* milliseconds. to )*** milliseconds.4rame SiMe -
7/24/2019 Simulator.docx
15/93
7/24/2019 Simulator.docx
16/93
Re*ult'
Result gives the following performance parameters
). 0ayloadH #mount of data delivered from sender to receiver2. GverheadH #mount of control information used to send the data from the sender
to the receiver
3. Nueuing timeH Total amount of time spent y packets in the sender queue8. Aedium #ccess TimeH Total amount of time spent y the head-of-line packet
efore transmission
. %ropped framesH >umer of frames dropped due to uffer overflowumer of frames lost in the network due to it errors
7. 'hecksum errorH >umer of frames dropped y receiver due to checksum error
:. Aean delayH The average time taken to transmit a packet successfully
1. #verage attemptsH #verage numer of attempts taken for a successfultransmission of a packet
)*. Simulation timeH Total duration of the simulation
)). ThroughputH The rate of transmission of data during the simulation)2. oodputH The rate of transmission of user data during the simulation
)3. %ata frames generatedH Total numer of data frames generated and delivered
during the simulation)8. 4rame transmission proailityH The proaility of successfully transmitting a
frame.
). 'ollision countH Total numer of packet collisions during the simulation)
7/24/2019 Simulator.docx
17/93
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
E78er+)ent* to be -arr+e( out
)a6 Select 2 >odes and perform data transfer from >ode ) to >ode 2 with one set of inputparameters and one fied file.
V+ew+n2 te 2ra8* an( 8r+nt+n2 te 2ra8*
(n order to view the 4rame sent +s Time graph and 'ollision +s Time graph, first, we
have to close the Simulator software. (n ' drive, inside the Simulator directory, in the
Ethernet directory, in >ode ), the graphs are stored as Ecel file. (n the computer
system, Aicrosoft Ecel software should e availale to view the graph y opening the
file ?Time-4rame.ls@. The graph can e seen and the data derived from the Trace can e
seen. The graph can e printed in Ecel software.
Similarly, y opening the file ?'ollision.ls@, the collision +s Time graph can e viewed.
(t can also e stored.
>oteH =efore conducting another simulation eperiment, the graphs and performance
must e printed or stored in some other place in the local disk. Gtherwise, the new
eperiment will overwrite all the Ecel files in the corresponding node.
)6 The Simulation Software is opened. The Ethernet option is chosen. Select 2 >odes
and carry out data transfer etween 2 nodes simultaneously keeping the same set of inputparameters and with the same file from the >ode ) and analyMe the results.
7/24/2019 Simulator.docx
18/93
7/24/2019 Simulator.docx
19/93
Aodel 'alculation
7/24/2019 Simulator.docx
20/93
). oodput O 5Total ytes L Gverhead6 I Transmission time
0ayload O Total ytes L Gverhead
O 3.32: Jytes
Transmission time O Simulation time O
7/24/2019 Simulator.docx
21/93
)d6 Select 3 nodes and carry out data transfer etween the nodes simultaneously and
analyMe the results. Repeat the eperiment y changing the input parameters
)e6 Select 8 nodes and do the data transfer and analyMe the results. Dhen the data
transfer is going on, disconnect one node and oserve and record the effect.
7/24/2019 Simulator.docx
22/93
7/24/2019 Simulator.docx
23/93
E78t.5. Token R+n2
7/24/2019 Simulator.docx
24/93
7/24/2019 Simulator.docx
25/93
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
In8ut Para)eter*
>umer of >odes - 2 to 8
4rame (nterval - 2* milliseconds y default
4rame SiMe - )2 =ytes to 2,*8: =ytes
Error eneration - )*-1, )*-< and )*-3
Tran*,err+n2 a (ata ,+le ,ro) one no(e to anoter
There are four nodes in the topology numer from ) through 8. Each node has a unique
(0 address. 4iles can e selected for transmission from a sender node to the receive node.
#ll four nodes can act as senders or receivers or oth for a single file transmission.
# monitoring window shows up during file transmission showing the current status of the
transmission. The progress ar in these windows shows the amount of data transferred
and received. The monitoring window also contains trace information for data sent or
received and other network events for the associated node. The nodes have to connect tothe Token ring efore they can communicate with other nodes.
Token "ol( on T+)e an( Token Pr+or+t
The default frame interval is 2* milliseconds. (n order to send many data packets
sequentially, the token hold on time can e changed to higher value. 9sing this facility,
the token can e retained in particular node for long time. The minimum hold on time is
** msec. #nd the maimum hold on time is *** msec. The priority of the node also
can e stated.
Conne-t an( D+*-onne-t ,a-+l+t
The simulator supports the feature of connecting or disconnecting specific nodes at any
time during, efore or after simulation test runs.
Pau*e an( re*et ,a-+l+t
There is a feature for pausing any simulation run and continuing the test at a later point in
time. The simulator also supports resetting a specific test and restarting it again.
Token r+n2 o8erat+on
(nitially, the (0 addresses of the nodes are given and nodes are connected to the ringnetwork. >ow, token is passed etween the nodes connected. 2 to 8 nodes can e
connected in the ring. #s per the priority of the nodes, the token will pass. The priority
of the node can e changed and then the token passing will take route as per the priority
allotment.
7/24/2019 Simulator.docx
26/93
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser AanualThe token hold on time can also e changed. Dhen the data is transferred, the numer of
frames that are transferred from the node depends upon the token hold on time of the
node. #fter the token hold on time, the token is passed on to the net priority node.
%uring the file transfer, suppose one node in the ring is disconnected, and then a message
window appears prompting for ring reconfiguration disconnecting the node. (f the
answer is yes, the particular node is disconnected and other nodes form a ring and
activities continue. (f the answer is no, then all the nodes are disconnected. (n this case,
all the nodes are to e reconnected using connect switch.
7/24/2019 Simulator.docx
27/93
7/24/2019 Simulator.docx
28/93
Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*
The token ring component creates a directory named ?TokenRing@ in the Simulator
%irectory in ' drive. The ?TokenRing@ directory contains four su-directoriescorresponding to the four nodes in the topology.
The destination node of a file transmission stores the received file in the directory
corresponding to the node. 4our separate directories >ode), >ode2, >ode3 and >ode8
are created. (n the sender node directory, 3 files are stored. 0erformance results are stored
as ?0erf.ls@, the Trace is stored as ?Trace.ls@, the graph 4rame sent +s Time and the
corresponding data derived from Trace.ls file is stored as ?Time-4rame.ls@.
E78er+)ent* to be -arr+e( out
2a6 Select 2 >odes and carryout data transfer from node to another node.
V+ew+n2 te 2ra8* an( 8r+nt+n2 te 2ra8*
(n order to view the 4rame sent +s Time graph, the Simulator software should e closed.
(n ' drive, inside the Simulator directory, in the TokenRing directory, in >ode ), the
graphs are stored as Ecel file. (n the computer system, Ecel Software should e
availale to view the graph y opening the file ?Time-4rame.ls@. The graph can e seen
and the data derived from the Trace can e seen. The graph can e printed in Ecelsoftware.
>oteH =efore conducting another simulation eperiment, the graph and performance
must e printed or stored in some other place in the local disk. Gtherwise, the new
eperiment will overwrite all the Ecel files in the corresponding node.
26 Gpen the Simulator Software and Token Ring option is chosen. Select 2 >odes and
carry out data transfer etween 2 nodes simultaneously with the same input parameters
and with same file from >ode ) and analyMe. 'arry out the calculations as we did inEthernet eperiment. Repeat the eperiment for different packet siMes and different error
generation and analyMe.
7/24/2019 Simulator.docx
29/93
2c6 Repeat the eperiment for different packet siMes, different maimum ack off time
and different error generation and analyMe the results.
2d6 Select 3 nodes and carry out data transfer etween the nodes simultaneously and
analyMe. Repeat the eperiment changing the input parameters. %isconnect one node and
answer to the question yes and oserve the operation and record it. %isconnect one node
and answer to the question no and oserve the operation and record it.
2e6 Select 8 nodes and do the data transfer. Dhen the data transfer is going on,
disconnect one node and oserve and record the effect.
Cal-ulat+on*'
). oodput O 5Total ytes L Gverhead6 I Transmission time
2. 4rame 0roaility O 5Successful attempts I Total attempts6
3. Total #ttempts O Successful attempts K failed attempts
8. failed attempts O defers due to token capture K errors
7/24/2019 Simulator.docx
30/93
. Aean delay O Total file transmission time I numer of transmissions
7/24/2019 Simulator.docx
31/93
E78t. 3. Token Bu*
7/24/2019 Simulator.docx
32/93
7/24/2019 Simulator.docx
33/93
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
In8ut Para)eter*
>umer of >odes - 2 to 8
4rame (nterval - 2* milliseconds to )*** milliseconds4rame SiMe - )2 =ytes to 2,*8: =ytes
Error eneration - )*-1
, )*-ow, token is passed etween the nodes connected. 2 to 8 nodes
can e connected in the =us. #s per the priority of the nodes, the token will pass. The
priority of the node can e changed and then the token passing will take route as per the
priority allotment.
7/24/2019 Simulator.docx
34/93
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual%uring the file transfer, suppose one node in the ring is disconnected, then that node is
automatically disconnected and the token us is reconfigured leaving that node
automatically. >o question is asked. The node can e reconnected using connect switch.
7/24/2019 Simulator.docx
35/93
7/24/2019 Simulator.docx
36/93
Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*
The token us simulator creates a directory named ?Token=us@ in the Simulator%irectory in ' drive. The ?Token=us@ directory contains four su-directories
corresponding to the four nodes in the topology.
The destination node of a file transmission stores the received file in the directory
corresponding to the node. 4our separate directories >ode), >ode2, >ode3 and >ode8
are created. (n the sender node directory, 3 files are stored. 0erformance results are stored
as ?0erf.ls@, the Trace is stored as ?Trace.ls@, the graph 4rame sent +s Time and the
corresponding data derived from Trace.ls file is stored as ?Time-4rame.ls@.
E78er+)ent* to be -arr+e( out
3a6 Select 2 >odes and carryout data transfer from one node to another node.
V+ew+n2 te 2ra8* an( 8r+nt+n2 te 2ra8*
(n order to view the 4rame sent +s Time graph, the Simulator software should e closed.
(n ' drive, inside the Simulator directory, in the Token=us directory, in >ode ), the
graphs are stored as Ecel file. (n the computer system, Ecel Software should eavailale to view the graph y opening the file ?Time-4rame.ls@. The graph can e seen
and the data derived from the Trace can e seen. The graph can e printed in Ecel
software.
>oteH =efore conducting another simulation eperiment, the graph and performance
must e printed or stored in some other place in the local disk. Gtherwise, the new
eperiment will overwrite all the Ecel files in the corresponding node.
36 Gpen the Simulator Software and Token =us option is chosen. Select 2 >odes andcarry out data transfer etween 2 nodes simultaneously with the same input parameters
and with same file from >ode ) and analyMe. 'arry out the calculations as we did in
Ethernet eperiment. Repeat the eperiment for different packet siMes and different error
generation and analyMe.
3c6 Repeat the eperiment for different packet siMes, different maimum ack off time
and different error generation and analyMe the results.
7/24/2019 Simulator.docx
37/93
3d6 Select 3 nodes and carry out data transfer etween the nodes simultaneously and
analyMe. Repeat the eperiment changing the input parameters. %isconnect one node and
see the effect and record it.
3e6 Select 8 nodes and do the data transfer. Dhen the data transfer is going on,
disconnect one node and oserve and record the effect.
7/24/2019 Simulator.docx
38/93
2*
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
Cal-ulat+on*'
). oodput O 5Total ytes L Gverhead6 I Transmission time
2. 4rame 0roaility O 5Successful attempts I Total attempts6
3. Total #ttempts O Successful attempts K failed attempts
8. failed attempts O defers due to token capture K errors
. Aean delay O Total file transmission time I numer of transmissions
7/24/2019 Simulator.docx
39/93
2)
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
E78t. :. +rele** LAN
7/24/2019 Simulator.docx
40/93
22
7/24/2019 Simulator.docx
41/93
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
In8ut Para)eter*
>umer of >odes - 2 to 8
4rame (nterval - 2* milliseconds to )*** milliseconds4rame SiMe - s use the 'arrier Sense Aultiple #ccess 5'SA#6
algorithm with a 'ollision #voidance 5'#6 mechanism in which each unit senses the
media efore it starts to transmit. (f the media is free for several microseconds, the unit
can transmit for a limited time. (f the media is usy, the unit will ack off for a random
time efore it senses again.
Coll+*+on A4o+(an-e
To avoid collisions with other incoming calls, each station transmits a short RTS
5Request-To-Send6 frame efore the data frame. The #ccess 0oint sends ack a 'TS
7/24/2019 Simulator.docx
42/93
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual5'lear-To-Send6 frame with permission to start the data transmission. This frame includes
the time and information that the particular station is going to transmit. #ll the stations in
the cell are informed that another unit will transmit, so they cannot transmit even if the
media seems to e free. (n this way, collision is avoided. Dhenever access point is
possile to transmit, it will transmit the received from the source to the destination.
7/24/2019 Simulator.docx
43/93
7/24/2019 Simulator.docx
44/93
Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*
The Direless simulator module creates a directory named ?Direless@ in the Simulator
%irectory in ' drive. The ?Direless@ directory contains four su-directoriescorresponding to the four nodes in the topology.
The destination node of a file transmission stores the received file in the directory
corresponding to the node. 4our separate directories >ode), >ode2, >ode3 and >ode8
are created. (n the sender node directory, 8 files are stored. 0erformance results are stored
as ?0erf.ls@, the Trace is stored as ?Trace.ls@, the graph 4rame sent +s Time and the
corresponding data derived from Trace.ls file is stored as ?Time-4rame.ls@ and the
graph collision +s Time and the corresponding data is stored as ?'ollision.ls@.
E78er+)ent* to be -arr+e( out
8a6 Select 2 >odes and carryout data transfer from >ode ) to >ode 2.
V+ew+n2 te 2ra8* an( 8r+nt+n2 te 2ra8*
(n order to view the 4rame sent +s Time graph and 'ollision +s Time graph, first, we
have to close the Simulator software.
(n ' drive, inside the Simulator directory, in the Direless directory, in >ode ), the graphs
are stored as Ecel file. (n the computer system, Ecel Software should e availale toview the graph y opening the file ?Time-4rame.ls@. The graph can e seen and the
data derived from the Trace can e seen. The graph can e printed in Ecel software.
Similarly, y opening the file ?'ollision.ls@, the collision +s Time graph can e viewed.
(t can also e stored.
>oteH =efore conducting another simulation eperiment, the graphs and performance
must e printed or stored in some other place in the Focal disk. Gtherwise, the new
eperiment will overwrite all the Ecel files in the corresponding node.
86 The Simulation Software is opened. Direless option is chosen. Select 2 >odes and
carry out data transfer etween 2 nodes simultaneously keeping the same set of input
parameters and with the same file from the >ode ). and analyMe the results.
8c6 Select 2 >odes and carry out data transfer etween 2 nodes simultaneously and
analyMe. Repeat the eperiment for different packet siMes, different maimum ack off
time and different error generation.
7/24/2019 Simulator.docx
45/93
8d6 Select 3 nodes and carry out data transfer etween the nodes simultaneously and
analyMe. Repeat the eperiment changing the input parameters
8e6 Select 8 nodes and do the data transfer. Dhen the data transfer is going on,
disconnect one node and oserve and record the effect.
7/24/2019 Simulator.docx
46/93
7/24/2019 Simulator.docx
47/93
Cal-ulat+on*'
). oodput O 5Total ytes L Gverhead6 I Transmission time
2. 4rame 0roaility O 5Successful attempts I Total attempts6
3. Total #ttempts O Successful attempts K failed attempts
8. 4ailed attempts O 'ollisions K errors
. Aean delay O Total file transmission time I numer of transmissions
7/24/2019 Simulator.docx
48/93
27
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
DATA TRANS/ER PROTOCOLS
%ata Transfer 0rotocols consist of the following eperiments
). Stop and wait
2. o ack n. Selective repeat
4rom the aove illustrated ?%ata Transfer 0rotocols@ screen, different eperiments can e
chosen.
7/24/2019 Simulator.docx
49/93
2:
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
E78t. 6. Sto8 an( a+t AR= Proto-ol
In8ut Para)eter*0acket SiMe - )2 =ytes to 2,*8: =ytes
Round Trip Time 5RTT6 - * msec. to )* msec.
Foss Rate - *Q to *Q
Retransmit Time out - )** msec. to )*** msec.
>oteH #t the time of giving input parameters, it is to e noted that the input value given
for Retransmit Time out parameter should e more than the RTT
Tran*,err+n2 a (ata ,+le ,ro) one **te) to anoter **te) )a+nl +n AN
(n this eperiment, there is one sender and one receiver.
4rom the sender, file from the system can e opened for transmission
This file can e sent to the receiver y using Start =utton. (n etween there is a network
of networks.
7/24/2019 Simulator.docx
50/93
21
There are trace windows in Sender, >etwork and Receiver and the data transfer
information with time stamp appears continuously. (n >etwork, the error information is
displayed.
#t the end of the data transfer, result appears with performance parameters in the ottom
of the page, namely, 0ayload, Transfer time, Throughput and Fosses.
7/24/2019 Simulator.docx
51/93
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*
The Stop and Dait simulator creates a directory named ?Stop#ndDait@ in the
Simulator %irectory in ' drive. The transmitted file is stored in this directory. Theperformance results are also stored as Ecel file ?0erf.ls@ . 9sing Store switch, the trace
of sender window is stored as ?SendTrace.ls@ and trace of receiver window is stored as
?RecvTrace.ls@. (n addition to this, another file ?Time-4rame.ls@is also stored. This
file has 4rame Sent +s Time graph and the data for the graph collected from the Sender
trace window.
Pau*e an( re*et ,a-+l+t
#t any time, the simulation can e stopped and can e continued. Reset can e used to
start from the eginning.
E78er+)ent* to be -arr+e( out
a6 Select a file from the system and transfer the file from sender to receiver. #ssign the
following input parameters. The data flow follows Stop and Dait algorithm in sending
the packets 5frames6 in the network.
0acket siMeH )*28 =ytes
RTT H )** msec.Foss RateH )*Q
Retransmit Time outH 2** msec.
'hoose a file and send.
>ote down the results. >ote down from the trace, when the packet error has occurred and
when the time out has happened and what the net action was. 'heck whether Stop and
wait algorithm is followed.
6 'hange the 0acket siMe to 2*8: ytes.Send the same file.
>ote down the results
'ompare the results.
c6 Similarly, 'hange the loss rate and compare the results
V+ew+n2 te 2ra8* an( 8r+nt+n2 te 2ra8*
7/24/2019 Simulator.docx
52/93
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual(n order to view the 4rame sent +s Time graph, first, we have to close the Simulator
software.
(n ' drive, inside the Simulator directory, in the Stop#ndDait directory, the graph is
stored as Ecel file. (n the computer system, Ecel Software should e availale to view
the graph y opening the file ?Time-4rame.ls@. The graph can e seen and the data
derived from the Trace can e seen. The graph can e printed in Ecel software. %uring
the time out, the packet is resent. (t can e clearly viewed in the graph.
7/24/2019 Simulator.docx
53/93
7/24/2019 Simulator.docx
54/93
E78t. $. 0o ba-k n AR= Proto-ol
In8ut Para)eter*
Dindow SiMe - ) to )* packets
=andwidth - ** Jps to Aps
0acket SiMe - )2 =ytes to 2,*8: =ytes
Round Trip Time 5RTT6 - * mSec. To ** mSec.
Foss Rate - *Q to *Q
Retransmit Time out - )** mSec. To )*** mSec.
>oteH #t the time of giving input parameters, it is to e noted that the input value given
for Retransmit Time out parameter should e more than the RTT
Tran*,err+n2 a (ata ,+le ,ro) one **te) to anoter **te) )a+nl +n AN
(n this eperiment, there is one sender and one receiver.
4rom the sender, file from the system can e opened for transmission
This file can e sent to the receiver. (n etween there is a network of networks.
7/24/2019 Simulator.docx
55/93
#t the time of sending, sender window and receiver window are opened. The progress ar
in these windows shows the amount of data transferred and received.
There are trace windows in Sender, >etwork and Receiver and the data transfer
information with time stamp appears continuously.
#t the end of the data transfer, result appears with performance parameters
7/24/2019 Simulator.docx
56/93
32
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*
The o ack n simulator creates a directory named ?o=ack>@ in the Simulator
%irectory in ' drive. The transmitted file is stored in this directory. The performance
results are also stored as Ecel file ?0erf.ls@. 9sing Store switch, the trace of sender
window is stored as ?SendTrace.ls@ and trace of receiver window is stored as
?RecvTrace.ls@. (n addition to this, another file ?Time-4rame.ls@is also stored. This
file has 4rame Sent +s Time graph and the data for the graph collected from the Sender
trace window.
Pau*e an( re*et ,a-+l+t
#t any time, the simulation can e stopped and can e continued. Reset can e used to
start from the eginning.
E78er+)ent* to be -arr+e( out
7/24/2019 Simulator.docx
57/93
33
(n order to view the 4rame sent +s Time graph, first, we have to close the Simulator
software.
(n ' drive, inside the Simulator directory, in the o=ack> directory, the graph is
stored as Ecel file. (n the computer system, Ecel Software should e availale to view
the graph y opening the file ?Time-4rame.ls@. The graph can e seen and the data
derived from the Trace can e seen. The graph can e printed in Ecel software. %uringthe time out, the packets are resent according to the o ack n algorithm. (t can e
clearly viewed in the graph.
7/24/2019 Simulator.docx
58/93
33
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
>oteH =efore conducting another simulation eperiment, the graphs and performance
must e printed or stored in some other place in the Focal disk. Gtherwise, the new
eperiment will overwrite the Ecel files in the directory.
7/24/2019 Simulator.docx
59/93
38
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
E78t.;. Sele-t+4e Re8eat AR= Proto-ol
In8ut Para)eter*Dindow SiMe - ) to )* packets
=andwidth - ** Jps to *** Jps
4rame SiMe - )2 =ytes to 2,*8: =ytes
Round Trip Time 5RTT6 - * mSec. To ** mSec.
Foss Rate - *Q to *Q
Retransmit Time out - )** mSec. To )*** mSec.
>oteH #t the time of giving input parameters, it is to e noted that the input value given
for Retransmit Time out parameter should e more than the RTT
Tran*,err+n2 a (ata ,+le ,ro) one no(e to anoter
(n this eperiment, there is one sender and one receiver.
4rom the sender, file from the system can e opened for transmission
7/24/2019 Simulator.docx
60/93
3
This file can e sent to the receiver. (n etween there is a network of networks.
There are trace windows in Sender, >etwork and Receiver and the data transfer
information with time stamp appears continuously.
#t the end of the data transfer, result appears with performance parameters
7/24/2019 Simulator.docx
61/93
3
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*
The Selective repeat simulator creates a directory named ?Selectiverepeat@ in the
Simulator %irectory in ' drive. The transmitted file is stored in this directory. The
performance results are also stored as Ecel file ?0erf.ls@ . 9sing Store switch, the trace
of sender window is stored as ?SendTrace.ls@ and trace of receiver window is stored as
?RecvTrace.ls@. (n addition to this, another file ?Time-4rame.ls@is also stored. This
file has 4rame Sent +s Time graph and the data for the graph collected from the Sender
trace window.
Pau*e an( re*et ,a-+l+t
#t any time, the simulation can e stopped and can e continued. Reset can e used to
start from the eginning.
E78er+)ent* to be -arr+e( out
7a6 Select a file from the system and transfer the file from sender to receiver. #ssign the
following input parameters. The data flow follows Selective repeat algorithm in sending
the packets 5frames6 in the network.
0acket siMeH )*28 =ytes
RTT H )** msec.
Foss RateH )*Q
Retransmit Time outH 2** msec.
=andwidth H 2*** Jps
Dindow siMe H packets
'hoose a file and send.
>ote down the results. >ote down from the trace, when the packet error has occurred and
when the time out has happened and what was the net action. 'heck whether it follows
the Selective repeat algorithm.
76 'hange the 0acket siMe to 2*8: ytes.
Send the same file.>ote down the results
'ompare the results.
7c6 Similarly, 'hange the loss rate, andwidth and compare the results
ive reason for congestion packet drop.
V+ew+n2 te 2ra8* an( 8r+nt+n2 te 2ra8*
7/24/2019 Simulator.docx
62/93
3et Finc Simulator L 9ser Aanual
>oteH =efore conducting another simulation eperiment, the graphs and performance
must e printed or stored in some other place in the Focal disk. Gtherwise, the new
eperiment will overwrite the Ecel files in the directory.
7d6 =y reducing the andwidth and y increasing the window siMe, we will e ale to see
congestion packet drop also in the network.
7/24/2019 Simulator.docx
64/93
37
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
RO&TIN0 AL0ORIT"MS
Routing #lgorithms consist of the following eperiments
). %istance +ector #lgorithm
2. Fink-State #lgorithm
4rom this Routing #lgorithms screen, different eperiments can e chosen.
7/24/2019 Simulator.docx
65/93
3:
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
E78t.
7/24/2019 Simulator.docx
66/93
31
7/24/2019 Simulator.docx
67/93
31
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
In8ut Para)eter*
Routers L 3 to 7
'onnectivity etween the Routers - to e given
Deightage or 'ost or %istance etween the routers L numer )-)*
Source Router L to e selected
Pro-e**
The %istance vector algorithm is eecuted.
(nitially, in iteration ), the source router creates the router tale with the distance
information of the neighouring routers. (t also gathers distance information of the otherrouters connected to the neighouring routers.
=y using >et switch, second iteration is done.
(n the second iteration, it calculates the shortest distance to the unconnected nodes from
the information gathered in the first iteration and refines the routing tale. (f there are n
routers, then n-) iterations are required to get shortest distance for all the routers.
The routing tale gives the shortest distance for all the routers from the source router and
also information to which router the packet should go net.
E78er+)ent* to be -arr+e( out
:a6 Select say routers and draw the connectivity. (nput the distance etween the
routers. Select Source router. Study the iteration and routing tale for each iteration.
'heck finally, whether the short distance is calculated and correct net est hop.
:6 Jeep the layout as it is. 'hange the distance etween the routers. %o the iterations
and for each iterations, study and check. +erify the result at the end.
:'6 Jeep the layout as it is. 'hange the Source router and do the eperiment. +erify the
result at the end.
:d6 %o different configuration and do the iterations and verify the result.
Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*
7/24/2019 Simulator.docx
68/93
8*
The %istance +ector simulator creates a directory named ?%istance+ector@ in the
Simulator %irectory in ' drive. #ll the iterations are stored in ?Results.tt@ file. (t can e
printed for analysis.
7/24/2019 Simulator.docx
69/93
7/24/2019 Simulator.docx
70/93
8)
7/24/2019 Simulator.docx
71/93
8)
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
In8ut Para)eter*
Routers L 3 to 7
'onnectivity etween the Routers - to e given
Deight or 'ost or %istance etween the routers L numer )-)*
Source Router L to e selected
Pro-e**
The Fink State algorithm is eecuted.
There are parent group and transitive group. (nitially, in iteration ), the source router is in
parent group and all the directly connected routers are in transitive group and router taleis created.
=y using >et switch, second iteration is done.
(n net iteration, the short distance neighoring router is taken into parent group and the
routers associated with the particular router are placed in the transitive group and routing
tale is constructed. (n this way, if there are n routers availale, then n numer of
iterations is required to find the shortest distance in this method.
4inally, the routing tale gives the shortest distance for all the routers from the source
router and also information to which router the packet should go net.
E78er+)ent* to be -arr+e( out
1a6 Select say < routers and draw the connectivity. (nput the distance etween the
routers. Select Source router. Study the iteration and the routing tale every time
created. 'heck finally, whether the short distance is calculated and correct net est hop.
16 Jeep the layout as it is. 'hange the distance etween the routers. %o the iterations
and for each iterations, study and check. +erify the result at the end.
1'6 Jeep the layout as it is. 'hange the Source router and do the eperiment. +erify the
result at the end.
1d6 %o different configuration and do the iterations and verify the result.
7/24/2019 Simulator.docx
72/93
82
Stor+n2 o, tran*,erre( ,+le*! re*ult* an( tra-e*
The Fink-State simulator creates a directory named ?FinkState@ in the Simulator
%irectory in ' drive. #ll the iterations are stored in ?Results.tt@ file. (t can e printed
for analysis.
7/24/2019 Simulator.docx
73/93
82
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
ENCRYPTION an( DECRYPTION
Encryption and %ecryption consist of the following eperiments
). Shifting #lgorithm2. RS# #lgorithm
4rom this Encryption and %ecryption screen, different eperiments can e chosen.
7/24/2019 Simulator.docx
74/93
83
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
E78t. 1%. S+,t+n2 Al2or+t)
In8ut Para)eter*
(nput Tet L to e given
Shift L numer is to e given
Pro-e**
The Shifting algorithm is eecuted at the time of encryption.
#t the time of decryption, again shifting algorithm is eecuted.
E78er+)ent to be -arr+e( out
Enter some tet in the tet o availale.
ive the shifting inde and use Shift key.
Encrypted message appears in the window.
Dhen re-shift key is used, re- shift algorithm is used with the encrypted message and the
re shifted message is displayed.
7/24/2019 Simulator.docx
75/93
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
E78t. 11 RSA Al2or+t)
(n this eperiment, the process of RS# #lgorithm is eplained with an eample.
In8ut Para)eter*
(nitially, a plain tet of )* characters 5ma6 is given.
Pro-e**
The RS# algorithm is used for encryption and decryption
E78er+)ent to be -arr+e( out
En-r8t+on
Encryption key is used in the menu ar. Then again Encryption key elow the tet
window is used to encrypt the message. RS# #lgorithm procedure is stage y stage
eecuted and the steps are shown in the output window. Secret Jey and 0ulic Jey are
generated and displayed.
7/24/2019 Simulator.docx
76/93
7/24/2019 Simulator.docx
77/93
NETOR SOCETS
>etwork Sockets consist of the following eperiments
). TT0 #pplication2. 4T0 #pplication
3. E-mail #pplication
4rom this >etwork Sockets screen, different eperiments can e chosen.
7/24/2019 Simulator.docx
78/93
87
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
E78t. 15. "tt8 ? eb Brow*+n2
The function port (% is :* for we rowsing. (n this eperiment, the user can access one
html file from a we server.
In8ut 8ara)eter*
'lient (% - (0 address
Server (% - (0 address
Pro-e**
(n the eperiment, at the time of connecting the client to the server, communication pipe
namely socket is created. The socket is characteriMed y 8 parameters.
- Server (%
- 'lient (%- Focal 0ort numer :*
- Remote 0ort numerDhen the client sends the connect request to the server, it generates a )< it random
numer which lies etween )*28 and
7/24/2019 Simulator.docx
79/93
8:
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
E78er+)ent to be -arr+e( out
). The client id L (0 address is entered.
2. Then the Server address is entered and activated
3. Then in the client side, to connect to the server, server address is entered and the
'onnect switch is used to connect the client to the server.
8. >ow the socket is created and the connection is made and log is given in the
server
. Then the user can send the request to the server y typinghttpHIInetlinc.comIinde.html and press go utton.
ow, the request goes to server and the server responds. (t accesses the file
namely ?inde.html@ and transfers it to the client. Then the client converts theTAF file into normal tet file and displays in a window.
7. There is an interaction etween the server and the client. The server sends the file
to the client and in the client window, the content of the file is displayed.
http://netlinc.com/index.htmlhttp://netlinc.com/index.html7/24/2019 Simulator.docx
80/93
81
:. The user can disconnect the client and server also. (n the server side, log is
generated for every activity
1. The simulator is closed. (n the Simulator directory in ' drive, the html file is
opened in notepad and the content is altered and saved.
)*. #gain the same application is run
)). (t is to e verified that the modified content is appearing in the client window.
7/24/2019 Simulator.docx
81/93
81
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
E78t. 13. /TP ? /+le Tran*,er
The function port (% is 2) for file transfer.
(n this eperiment, the user can do the file transfer from a ftp server.
In8ut 8ara)eter*
'lient (% - (0 address
Server (% - (0 address
Pro-e**
(n the eperiment, at the time of connecting the client to the server, communication pipe
namely socket is created. The socket is characteriMed y 8 parameters.
- Server (%
- 'lient (%- Focal 0ort numer 2)
- Remote 0ort numer
Dhen the client sends the connect request to the server, it generates a )< it random
numer which lies etween )*28 and
7/24/2019 Simulator.docx
82/93
*
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
E78er+)ent to be -arr+e( out
). The client id L (0 address is entered.
2. Then the Server address is entered and activated
3. Then in the client side, to connect to the server, server address is entered and the
'onnect switch is used to connect the client to the server.
8. >ow the socket is created and the connection is made and log is given in theserver
. Then the user can send the request to the server y typingftpHIInetlinc.comIinde.tt and press go utton.
ow, the request goes to server and the server responds. (t accesses the file
namely inde.html file and transfer it to the client. Then the client displays the
file.
7/24/2019 Simulator.docx
83/93
)
7. The user can disconnect the client and server also. (n the server side, log isgenerated for every activity
:. The simulator is closed. (n the Simulator directory in ' drive, the inde.tt file is
opened in notepad and the content is altered and saved.
1. #gain the same application is run
)*. (t is to e verified that the modified content is appearing in the client window.
7/24/2019 Simulator.docx
84/93
)
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
E78t. 1: SMTP # e#)a+l
The function port (% is 2 for file transfer.
(n this eperiment, the user can send e-mail to another address.
(nput parameters
'lient (% - (0 address
Server (% - (0 address
(n the eperiment, at the time of connecting the client to the server, communication pipe
namely socket is created. The socket is characteriMed y 8 parameters.
- Server (%
- 'lient (%- Focal 0ort numer 2
- Remote 0ort numer
Dhen the client sends the connect request to the server, it generates a )< it random
numer which lies etween )*28 and
7/24/2019 Simulator.docx
85/93
2
7/24/2019 Simulator.docx
86/93
2
+= Aicro Electronics 'hennai >et Finc Simulator L 9ser Aanual
E78er+)ent to be -arr+e( out
).The user is supposed to give the 'lient (0 address and the Server address in Server.Then in the 'lient configuration window, the server address is to e given and connectutton has to e used.
2. >ow, the control socket and data socket are created.
3.Then the user can send the request to the server y typing adminnetlinc.comandpress go utton.
8. The content in the client window is taken as the message for the mail.
. The mail reaches the mail o of the user.
7/24/2019 Simulator.docx
87/93
OSI Reference Model
The OSI reference model is a hierarchical structure of seven layers that defines the requirementsfor communications between two computers. This model was defined by International StandardsOrganization. The model allows all network elements to operate together, regardless of who builtthem. y the late !"#$%s, ISO was recommending the implementation of the OSI model as a
networking standard, but T&'(I' had been in use for years. T&'(I' was fundamental to)*')+T and the other networks that evolved into Internet. Only a subset of the whole OSImodel is used today.
Functions of the Layers)s data passes from an application and moves down the stack, each layer adds a headeraccording to the protocol that e-ists at that layer. This is known as encapsulation. The onlye-ception is that data link layer, a header and trailer is added. )fter the data has beentransmitted across whatever media in use, the process of deencapsulation begins in thereceiver. ach layer of the stack, at the destination, removes the header /or header and trailer inthe case of the data link layer0 that was placed by its corresponding source layer. The physicaland data link layers e-ists in hardware, all other layers are software driven.
Layer 7 ApplicationThis layer has protocols that support user applications, but it does not include applicationsthemselves. Strictly speaking, this layer deals with file access and management
Layer 6 PresentationThe presentation layer protocols deals with data synta- during transfer between two applicationprocess. If the client and server are using different file formats, this layer has conversionprotocols. Therefore, computers using different file formats can still communicate with eachother. 1ata encryption and decryption protocols also e-ist at the presentation layer.
Layer5 Session'rotocols at this layer are necessary for establishing, maintaining and ending sessions betweenuser applications
Layer4 ransportTransport layer protocols are responsible for the reliability of end to end connections. Theseprotocols assemble multiple network layer packets into coherent message. This layer alsoprovides flow control and error recovery.
Layer! "et#or$The network layer protocols route packets across the network/s0 between two computers.
Layer% &ata lin$1ata link protocols provide logical link control and medium access control. These protocolsprovide reliability to the physical layer transmission by arranging the data into frames and addingerror checking and addressing information. The +etwork Interface &ard /+I&0 assembles the
data link layer frames.
Layer' Physical'rotocols at the physical layer are responsible for establishing, maintaining and ending physicalconnections /point to point0 between computers. These protocols are manifested in the mediaacross which transmission occurs. These protocols do not specify the various cables andconnectors.
7/24/2019 Simulator.docx
88/93
(thernet
In early !"#$s, the 2ero- &ompany developed an e-perimental version of coa-ial thernet. In!"3$s, 2ero- published 4The thernet5 in collaboration with 1igital and Intel. It outlinedmethodology, physical topology and constraints. The I became responsible for thernetspecification. The I published standard 3$6.7 to establish thernet%s position in OSI model.
thernet was defined as e-isting across the data link and physical layers.
Mediu) Access *ontrol +MA*,In terms of nonswitched thernet, medium access control is an effective methodology that allowsdevices on a 8)+ to share their interconnecting media.
1ue to shared nature of the media, it is obvious that more than one device might send data at thesame time, therefore thernet 9)& has to be able to
decide when to send data what to do if its data collides with another device%s data how long to wait after a collision before retransmission
he (thernet MA* su-layer
The 9)& sublayer has two primary responsibilities: 1ata encapsulation, including frame assembly before transmission, and frame parsing (
error detection during and after reception 9edia access control, including initiation of frame transmission and recovery from
transmission failure.
he .asic (thernet Fra)e For)atThe I 3$6.7 standard defines a basic data frame format. The basic data frame formatcontains the seven fields as shown.
I((( /0%1! MA* &ata Fra)e For)at
Prea)-le+PR(,; &onsists of # bytes. The '* is an alternating pattern of ones and zeros thattells receiving stations that a frame is coming, and that provides a means to synchronize theframereception portions of receiving physical layers with the incoming bit stream.
Start2of fra)e deli)iter +SOF,; &onsists of ! byte. The SO< is an alternating pattern of onesand zeros, ending with two consecutive ! bits indicating that the ne-t bit is the leftmost bit in theleftmost byte of the destination address.
7/24/2019 Simulator.docx
89/93
7/24/2019 Simulator.docx
90/93
o$en Rin3
I9 originally developed the Token *ing network in the !"#$s. The I 3$6.? specification forToken *ing was modeled after I9 Token *ing.
o$en Rin3 Operation
In Token *ing network, a small frame, called a token is passed around the network. 'ossessionof the token grants the right to transmit. If a node receiving the token has no information to send,it passes the token to the ne-t end station. ach station can hold the token for a ma-imum periodof time.
If a station possessing the token does have information to transmit, it seizes the token, alters ! bitof the token /which turns the token into a startof frame sequence0, appends the information that itwants to transmit, and sends this information to the ne-t station on the ring. @hile the informationframe is circling the ring, no token is on the network, which means that other stations wanting totransmit must wait. Therefore, collisions cannot occur in Token *ing +etworks. If early tokenrelease is supported, a new token can be released when frame transmission is complete.
The information frame circulates the ring until it reaches the intended destination station, which
copies the information for further processing. The information frame continues to circle the ringand is finally removed when it reaches the sending station. The sending station can check thereturning frame to see whether the frame was seen and subsequently copied by the destination.
Anlike &S9)(&1 networks /such as thernet0, tokenpassing networks are deterministic whichmeans all the systems will have opportunity to transmit.
Priority Syste)Token *ing networks use a sophisticated priority system that permits certain usedesignated,highpriority stations to use the network more frequently. Token *ing frames have two fields thatcontrol priority: the priority field and the reservation field.
Only stations with a priority equal to or higher than the priority value contained in a token can
seize that token. )fter the token is seized and changed to an information frame, only stations witha priority value higher than that of the transmitting station can reserve the token for the ne-t passaround the network. @hen the ne-t token is generated, it includes the higher priority of thereserving station. Stations that raise a token%s priority level must reinstate the previous priorityafter their transmission is complete.
Fault2Mana3e)ent Mechanis)sToken *ing networks employ several mechanisms for detecting and compensating for networkfaults.
7/24/2019 Simulator.docx
91/93
I((( /0%15 and o$en Rin3 specify o$ens and &ata*o))and Fra)es
o$en fra)e fieldsStart deli)iter; )lerts each station of the arrival of a token /or data(command frame0.
Access2control -yte; contains the 'riority field /the most significant 7 bits0 and the *eservationfield /the least significant 7 bits0, as well as a token bit /used to differentiate a token from adata(command frame0 and a monitor bit /used by the active monitor to determine whether a frameis circling the ring endlessly0
(nd deli)iter ; Signals the end of the token or data(command frame. This field also containsbits to indicate a damaged frame and identify the frame that is the last in a logical sequence.
&ataco))and fra)e fields
Fra)e control -ytes ; indicates whether the frame contains data or control information. Incontrol frames, this byte specifies the type of control information.
&estination and source addresses ; consists of two = byte address fields that identify thedestination and source station addresses.
&ata; Indicates that the length of field is limited by the ring token holding time, which defines thema-imum time a station can hold the token.
Fra)e2chec$ seuence +F*S,; is filed by the source station with a calculated value dependenton the frame contents. The destination station recalculates the value to determine whether theframe was damaged in transit. If so, the frame is discarded.
Fra)e status ; is a ! byte field terminating a command(data frame. The
7/24/2019 Simulator.docx
92/93
;ireless LA" opolo3y
@ireless 8)+ allow workstations to communicate and to access the network using radiopropagation as transmission medium. The wireless 8)+ can be connected to an e-isting wired8)+ as an e-tension, or can form the basis of a new network while adoptable to both indoor andoutdoor environments, wireless 8)+s are especially suited to indoor locations such as office
buildings, manufacturing floors, hospitals and Aniversities.
The basic building block of the wireless is the cell. This is the area in which the wirelesscommunication takes place. The coverage area of a cell depends on the strength of thepropagated radio signal and the type and construction of walls, partitions and other physicalcharacteristics of the indoor environment.
ach wireless 8)+ cell requires some communications and traffic management. This iscoordinated by an )ccess 'oint /)'0 which communicates with wireless station in its convergearea.
Stations communicate with each other via )ccess 'oint.
Media Access@hen many users are located in the same area, performance becomes an issue. To address thisissue, wireless 8)+s use the &arrier Sense 9ultiple )ccess /&S9)0 algorithm with a &ollision
)voidance /&)0 mechanism in which each unit senses the media before it starts to transmit. Ifthe media is free for several microseconds, the unit can transmit for a limited time. If the media isbusy, the unit will back off for a random time before it senses again. Since transmitting unitscompete for airtime, the protocol should ensure equal fairness between the stations.
*ollision A
7/24/2019 Simulator.docx
93/93