You are on page 1of 41

B.M.

S COLLEGE OF
ENGINEERING
Bull Temple Road, Basavanagudi, Bangalore - 560 019, Karnataka, India

COMPUTER COMMUNICATION NETWORKS

LABORATORY REPORT

ON

“CCN CYCLE-1 EXPERIMENTS”


Submitted in partial fulfilment of the requirement for completion of
COMPUTER COMMUNICATION NETWORKS [12EC7DCCCN]

Submitted by

R.NITHYASREE
1BM12EC099

Under the guidance of

G.POORNIMA
ASSISTANT PROFESSOR

2015 – 16

Department of Electronics and Communication


Engineering

1
INDEX

1. Configure network with the following topologies and analyze i) BUS ii) RING iii)
Fully connected mesh topology, disable a node in each of the topologies and find the
changes.

2. Simulate Ethernet LAN with 4 nodes , apply relevant TCP and UDP applications and
determine
i) The number of data packets sent by UDP and TCP
ii) Average jitter of UDP and TCP
iii) Number of periodic updates sent by the routing algorithm
iv) Number of ACK packets sent

3. Simulate a network of N nodes with point to point connection; apply TCP and UDP
applications vary the queue size and bandwidth and find
i) Number of packets dropped due to queue overflow
ii) Average hop count for data packets
iii) Average delay and jitter.
iv) Apply FTP and TELNET traffic between the nodes of the above network and
analyze the throughput.

4. Simulate Ethernet LAN with N nodes , configure multicast traffic and Determine
i) The total multicast data bytes received
ii)Total multicast data bytes transmitted
iii)Multicast average delay at the transport layer for UDP
iv)Packets sent by DVMRP
v)Neighbors for every node as determined by DVMRP
vi)packets dropped due to expired TTL
vii)Packets dropped due to no route.

5. Apply multiple UDP and TCP applications between any 2 nodes of N (N=4)node
Ethernet LAN and compare it with experiment number 4.(compare multiple unicast
with multicast )

6. Simulate a wireless ad hoc network apply relevant TCP and UDP applications
between any 2 nodes and determine
i) Number of packets dropped due to retransmission limit
ii) Number of CTS packets sent by the node
iii) Number of RTS packets sent and ACK packets sent by the node
iv) Determine the number of RTS retransmission due to timeout
v) Packet retransmission due to ACK time out

2
vi) Signals received with error

7. Simulate a network having 2 LANs connected by a switch. Apply relevant TCP and
UDP applications between nodes across the LANS (send data from a node in one
LAN to a node in another LAN) and determine application layer, transport layer,
network layer and MAC layer parameters.

8. Simulate a network with the topology as shown in the figure, apply TCP and UDP
applications between nodes shown in the figure. Modify the network to make
communication happen between node 1 and 9 and node 6 and 16

9. Configure a network of 5 routers with point to point connection. Apply RIP and OSPF
routing algorithms and compare.
10. Simulate a wireless infrastructure network with 6 nodes and analyze

11. Configure a wired network with 4 nodes and wireless infrastructure network with 4
nodes apply relevant TCP and UDP applications from a node in wired network to a
node in wireless network and analyze
12. a. Simulate wireless ad hoc network with 6 nodes give mobility to a node and analyze
b. give mobility to all the nodes.

3
1. Configure network with the following topologies and analyze i) BUS ii) RING iii)
Fully connected mesh topology, disable a node in each of the topologies and find
the changes.

SOLUTION: i) BUS topology

Transmission scenario when node 2 is deactivated:

4
ii) RING topology

Ring topology with node 2 deactivated:

iii) MESH topology

5
Node 2 deactivated:

INFERENCE AND OBSERVATION:


BUS topology: Bus topology uses multipoint cabling i.e. by means of connectors or drop
cables. One long cable is a backbone to link all the devices in the network. Here CBR acts as
a bus so when node 2 is deactivated also it didn’t disturb the whole network. But failure of
CBR affects failure of all devices on the network.
RING topology: In Ring topology each device is connected by a dedicated point to point
connection to its adjacent devices, forming a ring type structure. The signal travels along the
ring in one direction from device to device till it reaches the destination. Here node 2 is
deactivated so the connection made by node 2 with neighbouring nodes disconnected, but the
other nodes start working normally. Because every node is given equal access to the token no
one node can monopolize the network.
MESH topology: In Mesh topology every node has a dedicated point to point link to all the
nodes within the network. The link shares traffic between the two nodes only. Here node 2 is
deactivated so the traffic linked with node 2 stops i.e. the transmission between node 2 with its
dedicated nodes doesn’t function.

6
2. Simulate Ethernet LAN with 4 nodes , apply relevant TCP and UDP applications
and determine

i) The number of data packets sent by UDP and TCP


ii) Average jitter of UDP and TCP
iii) Number of periodic updates sent by the routing algorithm
iv) Number of ACK packets sent

SOLUTION: An Ethernet LAN with 4 nodes-

7
i) The number of data packets sent by UDP and TCP:

UDP data packets:

INFERENCE: Number of data packets sent by UDP= From node-3 is 12,500

8
TCP data packets:

INFERENCE: Number of data packets sent by TCP:


From node-2: 80 data packets in sequence
From node-4: 79 data packets in sequence

ii) Average jitter of UDP and TCP:


UDP average jitter:

INFERENCE: Average jitter of UDP: At node-1 is 7.5x(e^-7) second


9
TCP average jitter:

INFERENCE: Average jitter of TCP:


At node-2 is 7x(e^-6) seconds
At node-4 is 1.5x(e^-6) seconds

10
iii) Number of periodic updates sent by the routing algorithm:

INFERENCE: No. of periodic updates sent by the routing algorithm:


Bellman-Ford: At node-1: 3 periodic updates sent
At node-2: 3 periodic updates sent
At node-3: 3 periodic updates sent
At node-4: 3 periodic updates sent

iv) Number of ACK packets sent:

INFERENCE: No. of ACK packets sent:


TCP: Node-2: 80 ACK-only packets sent
Node-4: 80 ACK-only packets sent

11
IMPORTANT DEFINITIONS:
To find the data packets sent and average jitter we used CBR for UDP application and
similarly TELNET for TCP application. UDP traffic is one-way and does not incur reverse
channel contention as TCP does. Our measurements show a maximum throughput for UDP
traffic, across a range of packet sizes. This is approximately double the maximum
throughput of TCP traffic. The jitter of a packet stream is defined as the mean deviation of
the difference in packet spacing at the receiver compared to the sender, for a pair of packets
and the average jitter for is simply the average value over n packets. We see that higher
transmission rates cause the jitter to increase. In case of ACK packets sent, only TCP has
ACK segments i.e. handshake etc. whereas in UDP there is no ACK segments since it is a
connectionless protocol.

12
3. Simulate a network of N nodes with point to point connection; apply TCP and
UDP applications vary the queue size and bandwidth and find
i) Number of packets dropped due to queue overflow
ii) Average hop count for data packets
iii) Average delay and jitter.
iv)Apply FTP and TELNET traffic between the nodes of the above network and
analyze the throughput.

SOLUTION: 5-nodes network with Point-to-Point communication-

13
i) Number of packets dropped due to queue overflow:

INFERENCE: Number of packets lost due to queue overflow:


Queue size 10: 9000 packets

INFERENCE: Number of packets lost due to queue overflow:


Queue size 500: 38 packets

14
ii) Average hop count for data packets:

INFERENCE: Average hop count for data packets:


Queue size 10: All nodes average hop count is approx. 1

INFERENCE: Average hop count for data packets:


Queue size 500: All nodes average hop count is approx. 1

iii) Average delay:

INFERENCE: Queue size 10: Average delay


Node-1: 0.00115 s
Node-2: 0.00115 s
Node-3: 0.00115 s

15
Node-4: 0.0012 s
Node-5: 0.0012 s

INFERENCE: Queue size 500: Average delay


Node-1,2 and 3: 0.00115 s
Node-4,5: 0.001175 s
Average Jitter:

INFERENCE: Queue size 10: Average jitter


Node-1 and 2: 0 s
Node-3: 1.25x(e^-6) s
Node-4: 6x(e^-6) s
Node-5: 4x(e^-6) s

INFERENCE: Queue size 500: Average jitter


Node-1: 1.5x(e^-6) s
Node-2: 0 s
Node-3: 0 s

16
Node-4: 3.25x(e^-6) s
Node-5: 4.5x(e^-6) s

iv) Throughput after applying TELNET and FTP:

INFERENCE: Queue size 10:


Throughput after applying FTP and TELNET traffic

INFERENCE: Queue size 500:


Throughput after applying FTP and TELNET traffic

IMPORTANT DEFINITONS:
When a network of N nodes are connected point to point by applying TCP and UDP
applications we get above observed statistics with varying size in queue and bandwidth. And
same as the above inference except in changing the bandwidth to avoid congestion and queue
size is varied because in order to focus on the issues related to varying delay in a wireless
network.

17
4. Simulate Ethernet LAN with N nodes, configure multicast traffic and Determine
i) The total multicast data bytes received
ii) Total multicast data bytes transmitted
iii) Multicast average delay at the transport layer for UDP
iv) Packets sent by DVMRP
v) Neighbors for every node as determined by DVMRP
vi)Packets dropped due to expired TTL
vii)Packets dropped due to no route.

SOLUTION: Ethernet LAN with 6-nodes-

i) The total multicast data bytes received:

INFERENCE: At node-2 24 multiccast fragments sent.

18
ii) Total multicast data bytes transmitted:

INFERENCE: At nodes 1, 3 and 4 24 multicast fragments received

iii) Multicast average delay at the transport layer for UDP:

INFERENCE: At nodes 1, 3 and 4: 4.75x(e^-5) seconds.

19
iv) Packets sent by DVMRP:

INFERENCE: At all nodes 33,000 packets sent by DVMRP.

v) Neighbors for every node as determined by DVMRP:

INFERENCE: Neighbours for every node 5 neighbours for every node in the
network as determined by DVMRP.

20
vi) packets dropped due to expired TTL:

INFERENCE: At node-2: zero packets dropped due to expired TTL


At nodes-1, 3, 4, 5 and 6: 33,000 packets are dropped due to expired TTL

vii) Packets dropped due to no route:

INFERENCE: At node-2: zero packets dropped due to no route


At nodes-1, 3, 4, 5 and 6: 24 packets dropped due to no route.

21
IMPORTANT DEFINITIONS:
In Ethernet, the MAC sub layer governs the operation of the access method. Also frames the
data received from the upper layer and passes them to the physical layer. The multicast traffic
is a logical identifier for a group of hosts in a computer network, that are available to process
datagrams or frames intended to be multicast for a designated network service. The number
of frames received, sent and discarded are observed through the statistics.

5. Apply multiple UDP and TCP applications between any 2 nodes of N (N=4)node
Ethernet LAN and compare it with experiment number 4.(compare multiple unicast
with multicast).

SOLUTION: The graphs will be similar to the experiment 4 except with the slight
difference in the outputs and bandwidth of the nodes.

22
6. Simulate a wireless ad hoc network apply relevant TCP and UDP applications between
any 2 nodes and determine
i) Number of packets dropped due to retransmission limit
ii) Number of CTS packets sent by the node
iii) Number of RTS packets sent and ACK packets sent by the node
iv) Determine the number of RTS retransmission due to timeout
v) Packet retransmission due to ACK time out
vi) Signals received with error.

SOLUTION:

23
i) Number of packets dropped due to retransmission limit:

INFERENCE: Zero packets dropped due to retransmission limit.

i) Number of CTS packets sent by the node:

INFERENCE: Nodes 1 and 2: 24 CTS packets sent.

ii) Number of RTS packets sent and ACK packets sent by the node:

24
INFERENCE: Nodes 3 and 4: 28 RTS packets sent.

iii) Determine the number of RTS retransmission due to timeout:

INFERENCE: At nodes 3 and 4: 4 RTS retransmissions due to timeout.

iv) Packet retransmission due to ACK time out:

INFERENCE: Zero packet retransmission due to ACK timeout.

25
v) Signals received with error:

INFERENCE: At nodes 1 and 2: 4 signals received with errors.

IMPORTANT DEFINITIONS:
A wireless ad hoc network (WANET) is a decentralized type of wireless network. The
network is ad hoc because it does not rely on a pre-existing infrastructure, such as routers in
wired networks or access points in managed (infrastructure) wireless networks. The number
of packets received and sent using TCP and UDP applications are more than the normal
wired network.

26
7. Simulate a network having 2 LANs connected by a switch. Apply relevant TCP and UDP
applications between nodes across the LANS (send data from a node in one LAN to a node in
another LAN) and determine application layer, transport layer, network layer and MAC layer
parameters.

SOLUTION:

INFERENCE: At nodes 3 and 5: 12,000 unicast data bytes sent.

27
INFERENCE: At node1: 12,000 unicast data bytes received.

INFERENCE: At node7: 110 bytes sent.

28
INFERENCE: At node 8: 110 bytes received.

INFERENCE: Number of retransmissions in half-duplex.

29
INFERENCE: At all nodes: 1.58x(e^-5) seconds.

INFERENCE: At all nodes: 1 hop

30
INFERENCE: Average Jitter in seconds having different values at different node IDs

INFERENCE: FIFO: Total packets dropped


At node 9: 10,000 packets dropped

31
INFERENCE: At nodes 3 and 5: 24 unicast data segments sent from the transport layer.

INFERENCE: At node-1: 24 unicast data segments received at the transport layer.

32
8. Simulate a network with the topology as shown in the figure, apply TCP and UDP
applications between nodes shown in the figure. Modify the network to make
communication happen between node 1 and 9 and node 6 and 16.

SOLUTION:

33
INFERENCE:
The above network is the modified one with respect to the given network in the question. To
make communication between node 1and 9 and node 6 and 16, we use a node between two
networks configure it as a router connect to the switches.

34
9. Configure a network of 5 routers with point to point connection. Apply RIP and OSPF
routing algorithms and compare.

SOLUTION:

35
INFERENCE: Select a routing algorithm RIP and OSPFv2.

INFERENCE: OSPFv2: Packets sent:


At node-1: 6000 packets sent

36
At node-2: 3000 packets sent
At node-3: 6000 packets sent
At node-4: 9000 packets sent
At node-5: 3000 packets sent
At node-6: 9000 packets sent

IMPORTANT DEFINITIONS:
RIP is a distance vector protocol which advertises network updates periodically; in RIP, the
advertisements are sent every 30 seconds, and it too triggers updates when a change in network
happens. It uses hop counts to calculate the metric value, which determines the best path to
reach a network. RIP supports maximum of 15 routers, and 16th hop is considered unreachable.
So, RIP can be used efficiently in small networks only.
OSPF is widely used as an Interior Gateway Protocol. After gathering information from
available routers it constructs a topology map of a network. OSPF communicate using areas;
they form neighbour relationship with routers in the same autonomous system first. OSPF
maintains routing table, neighbour table, and database table.

37
10. Simulate a wireless infrastructure network with 6 nodes and analyse.

SOLUTION:

METHOD:
1. Select the subnet.
2. Set station type to active
3. To set a node as an access point:
a. Select the node
b. From properties select ‘interface0”
c. Select MAC layer and set the access point field as yes.
IMPORTANT DEFINITIONS:

In infrastructure mode, a base station acts as a wireless access point hub, and nodes
communicate through the hub. The hub usually, but not always, has a wired or fibre network
connection, and may have permanent wireless connections to other nodes.

Wireless access points are usually fixed, and provide service to their client nodes within range.

Wireless clients, such as laptops, smart phones etc. connect to the access point to join the
network.

Sometimes a network will have a multiple access points, with the same 'SSID' and security
arrangement. In that case connecting to any access point on that network joins the client to the
network. In that case, the client software will try to choose the access point to try to give the
best service, such as the access point with the strongest signal.

38
11. Configure a wired network with 4 nodes and wireless infrastructure network with 4 nodes
apply relevant TCP and UDP applications from a node in wired network to a node in wireless
network and analyse.
SOLUTION:

INFERENCE: A wired network and a wireless network each with 4 nodes. TCP and UDP
applications between nodes of the two networks.

IMPORTANT DEFINITIONS:
Wired LAN offers better performance as compared to wireless networks. Wired network can
offer 100Mpbs bandwidth using Fast Ethernet technology. Ethernet cables, switches are used
in wired network are reliable. Security considerations for a wired network connected to the
internet are firewalls. With application of TCP and UDP the wired network and wireless
infrastructure works the same way when they operate individually.

39
12. a. Simulate wireless ad hoc network with 6 nodes give mobility to a node and analyse.
b. Give mobility to all the nodes.
SOLUTION:

40
INFERENCE: Setting mobility to the nodes- accessing mobility model.

IMPORTANT DEFINITIONS:
The fact that nodes move is probably the most important attribute of WANETs. Mobility
differentiates WANETs from their close cousins, the sensor networks. Mobility dictates
network and application level protocols. For example, rapid deployment in unexplored areas
with no infrastructure may require that some of the nodes form scouting teams/swarms. These
in turn coordinate among themselves to create a task force or a mission. We can have several
types of mobility models: individual random mobility, group mobility, motion along
preplanned routes, etc. The mobility model can have major impact on the selection of a
routing scheme and can thus influence performance.

41

You might also like