Open Ended Experiment Problem Statement and Guidelines
Open Ended Experiments - CN Lab.pdf Size : 333.941 Kb Type : pdf |
|
Network Simulator PPT and Manual
Netwok Simulator.rar Size : 5007.536 Kb Type : rar |
|
REVISED CN SEE GUIDELINES
Click here to Download
If you have programs which is not uploaded then please mail me on azeemyarzari21@gmail.com along with problem statement.
Lab Programs
Program 1
----------------
Create Client Server Application to implement following Service using TCP- Sockets and service name is Echo Server.
Click here to download the program
----------------
Program 2.
----------------
Write an application to implement File content transfer using TCP sockets with suitable commands. Provide authentication mechanism to transfer file contents
Click here to download the program
----------------
Program 3.
----------------
Create client server application to facilitate error detection and correction
Click here to download the program
Click here to download the Programs (Checksum, Hamming, Parity)
PART A
----------------
Program 4.
----------------
Trace the route between your machine and www.iitb.ac.in as well as between your machine and www.com.ac.uk. Plot the graph of hops (X-Axis) Vs time taken for processing (Y-Axis) and highlight the place where maximum delay has occurred. Guess the cause for delay.
Click here to download the program
----------------
Program 5.
----------------
Create client server paradigm and provide security to client’s message by Diffie Helmann algorithm. Server should decrypt the message received and display original message.
Click here to download the program
PART B
click here to download Part B programs of A1
Batch A2
PART A
----------------
Program 4.
----------------
Create 2 client and 1 server paradigm to initiate BOOTSTRAP protocol. Send the message in the form of ARP packet structure. Make 2nd client to act as relay agent.
Click here to download the program
----------------
Program 5.
----------------
Create client server paradigm and provide security to client’s message by RSA algorithm. Server should decrypt the message received and display original message.
Click here to download the program
PART B
click here to download Part B programs of A2
PART A
----------------
Program 4.
----------------
Create client server paradigm to initiate RAR protocol. Server shall have a table (file) which contains mapping of physical to IP address of nearest 4 neighbors. Use APR packet structure for message Send the message in the form of ARP packet structure for message transfer.
Click here to download the program
----------------
Program 5.
----------------
Create client server paradigm where security is provided to message sent by client. After encryption of message at client side the message should change its form. For example message character the encrypted data shall be number or symbols. Server should decrypt the message and display.
Click here to download the program
PART B
Program 6.
Simulate a 6 node point to point N/w with link connected as below
1.Apply using UDP
2.Calculate packets received at n4 and n5(nodes that act as receivers)
3.Calculate the throughput at n2(1st router) and plot the graph by varying the parameters
Click here to download the Program
----------------
Program 7.
Simulate the topology given below where n1 is multicasting to group1(Members are n3,n4,R1,R2) while n2 is multicasting to group2(Members are n5,n6,R1,R2).Varying the Bandwidth b/w R1 and R2 from 50Mb to 150Mb in steps of 35Mb plot the graph of dropped packets at node R1.Both nodes start multicasting at t=5s.Run the simulation for 40s
Batch B2
PART A
----------------
Program 4.
----------------
Create client server paradigm where client seeks the IP address for
particular URL
(Web Address) from the server. Server runs suitable command and gets
IP address for the given URL. Server sends this IP address as reply
to client.
Click here to download the program
----------------
Program 5.
----------------
Create client server paradigm and provide security to client’s message by applying Transformation and Substitution encryption mechanism.Server should decrypt the message received and display original message.
Click here to download the program
PART B
----------------
Program 6.
Simulate a 4 node point to point network with links connected as follows
no to n2
n1 to n2
n2 to n3
and do the following
1) Apply the relevant application over UDP Agent changing the parameter and determine the number of packets sent by UDP.
2) Calculate in-throughput, out-throughput with respect to node n2
3) Apply traffic such a VBR over UDP Agent and analyse routing overhead
4) Plot a graph by changing different paragraph.
Click here to download the program
----------------
Program 7.
N0 is broadcastng wid cbr(packetsize=200bits).
queuing is droptail. limit maximum queuing size b/w r1-r2 has 20 packets.
calculate average arrival time and departure time of packets at r1, jitter at rf2. routing overhead.run this simulation for 20sec.let data transfer begin after 5sec.
Click here to download the program
------------------------------
Program 8 on wireless
Click here to download the program