0% found this document useful (0 votes)
154 views5 pages

Wired and Wireless LAN Setup Guide

The document contains 5 assignments related to computer networking. The first assignment involves setting up a wired LAN using a layer 2 switch, testing cables and configuring IP addresses. The second assignment involves setting up a WAN using packet tracer with both wired and wireless LANs. The third assignment involves implementing Hamming codes and CRC for error detection and correction. The fourth assignment involves simulating Go back N and Selective Repeat sliding window protocols. The fifth assignment asks students to answer questions related to data link layer protocols, error control, flow control and sliding window protocols.

Uploaded by

Parth Gadewar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
154 views5 pages

Wired and Wireless LAN Setup Guide

The document contains 5 assignments related to computer networking. The first assignment involves setting up a wired LAN using a layer 2 switch, testing cables and configuring IP addresses. The second assignment involves setting up a WAN using packet tracer with both wired and wireless LANs. The third assignment involves implementing Hamming codes and CRC for error detection and correction. The fourth assignment involves simulating Go back N and Selective Repeat sliding window protocols. The fifth assignment asks students to answer questions related to data link layer protocols, error control, flow control and sliding window protocols.

Uploaded by

Parth Gadewar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

CNSL Lab (2019 pattern)

Assignment A1
Title: Wired LAN

Objective/s: To learn basics of computer network.

Problemstatement: Setup a wired LAN using Layer 2 Switch. Prepare and test cable using line tester,
configure machine using IP addresses, test using PING utility and demonstrate the PING packets
captured using wireshark.

Software&/hardware requirements: CAT5 cables, line tester, wireshark, cisco packet tracer.

Theory: //Here write answers to FAQ questions given below.

1. Explain following networking devices:

Repeater, Hubs, Switch, Bridge, Router, Gateway, Access point

2. Refer question 1 and State on which layer of network model do these devices work?
3. In order to increase bandwidth per node which device will you use- A hub or a switch? Explain
why?
4. What is a LAN?
5. What is a MAN?
6. What is a WAN?
7. What is a PAN?
8. Explain in brief guided/wired medium along with its types.
9. Explain in brief unguided/wireless medium along with its types.
10. What is the maximum length allowed for a UTP cable?

Conclusion: Studied wired LAN using Layer 2 Switch.


Assignment A3
Title: WAN

Objective/s: To learn WAN setup using packet tracer tool.

Problemstatement: Setup aWAN which contains wired as well as wireless LAN by using a packet tracer
tool. Demonstrate transfer of a packet from LAN1(wired) to LAN2(wireless).

Software&/hardware requirements: cisco packet tracer tool.

Theory: //Here write answers to FAQ questions given below.

1. Explain Bus Topology.


2. Explain Star Topology.
3. Explain Ring Topology.
4. Explain Mesh Topology.
5. Explain Tree / hierarchical Topology.
6. Explain Hybrid Topology.
7. What is NIC? Explain MAC address.
8. State layers of OSI reference model and explain their functions in brief.
9. State layers of TCP/IP model and explain their functions in brief.
10. Compare and differentiate TCP/IP and OSI reference model.

Conclusion: Studied setup and configuration of WAN using packet tracer.


Assignment A4

Title: Hamming code & CRC method.


Objectives: To understand the concept of Hamming code & CRC method in datalink layer
Problem Statement:
Write a program for error correction & detection for 7/8 bit ASCII codes using Hamming codes
or CRC.
Outcomes:
Demonstrate Hamming code & CRC method
Software&/hardware requirements:

Hardware: PC-2
Software: gcc, JDK compiler and Wireshark.
Theory: //Here write answers to FAQ questions given below.

1. What are the different types of errors?


2. What is Hamming code?
3. What is CRC method?
4. What is difference between Hamming code & CRC method?
5. Define hamming distance and calculate its value for two code words 11100 and 11011.
6. State any four desirable properties of line code.
7. Define parity check.
8. A bit stream 10011101 is transmitted using the standard CRC method. The generator polynomial
is x3+1.

a. What is the actual bit string transmitted?


b. Suppose the third bit from the left is inverted during transmission. How will
receiver detect this error? 
9. What is redundancy?

10. Test if this code words are correct 010101100011, assuming this is created using an even parity
Hamming Code. If it is incorrect, indicate what the correct code word should have been. Also,
indicate what the original data was.
Assignment A5
Title: Go back N and Selective Repeat Modes of Sliding Window Protocol.

Objectives:To develop an understanding of various protocolsat datalink layer


Problem Statement:
Write a program to simulate Go back N and Selective Repeat Modes of Sliding Window Protocol
in peer to peer mode

Outcomes:
Demonstrate Go Back N and Selective Repeat protocols
Software&/hardware requirements:

Hardware: PC-2
Software: JDK compiler and Wireshark.
Theory: //Here write answers to FAQ questions given below.

1. What is the difference between flow control and error control?


2. What Automatic Repeat Request (ARQ)?
3. Describe briefly stop and wait ARQ.
4. Describe briefly Go-Back-N ARQ?
5. Describe briefly Selective Repeat ARQ?
6. What do you mean by pipelining, is there any pipelining in error control?
7. What is piggybacking?
8. Explain how flow control and error control is achieved using GBN and SR ARQ protocol.
9. What is sliding window protocol? Differentiate between stop-and wait ARQ and Go-Back-
N protocol.
10. Complete the table :
Protocol/parameters Pipelining Sender window Receiver
No/Yes size window size
Stop and wait
Go back N
Selective repeat

Common questions

Powered by AI

Selective Repeat ARQ improves flow and error control over Go-Back-N ARQ by allowing the sender to retransmit only the erroneous or lost frames rather than all frames from the erroneous point onwards, as with Go-Back-N. This approach reduces unnecessary data transmission and bandwidth usage, leading to higher efficiency especially over unreliable networks .

Hamming code is designed primarily for error correction and can correct single-bit errors and detect two-bit errors using parity bits placed at specific positions in the data stream. CRC (Cyclic Redundancy Check) is used for error detection, particularly for detecting burst errors by generating a checksum that is appended to the data. While CRC can detect errors effectively, it does not inherently correct errors, unlike Hamming code .

The TCP/IP model consists of four layers: the Application layer, where network applications and their services work; the Transport layer, which is responsible for providing communication services directly to the application processes running on different hosts; the Internet layer, handling the movement of packets around the network; and the Network Access layer, which is responsible for managing the hardware addressing and the physical transmission of data .

A switch should be used to increase bandwidth per node as it can filter and forward data to a specific destination on the network, unlike hubs which send data to all devices on a network segment. This means that switches avoid collisions and efficiently manage data traffic, leading to better bandwidth usage .

CAT5 cables support network speeds up to 100 Mbps for Ethernet data transmission. The maximum length for a CAT5 cable without sacrificing signal integrity is 100 meters. This limitation is important for network planning and maintaining quality data transmission over organized distances .

Pipelining in sliding window protocols improves data transmission by allowing multiple frames to be in transit simultaneously between the sender and the receiver before the receiver must send an acknowledgment for earlier frames. This makes effective use of available bandwidth and reduces wait times, leading to increased throughput, especially beneficial in high-latency networks .

The main types of guided mediums in networking include twisted pair cables, coaxial cables, and fiber optic cables. Twisted pair cables are used for telephone and most Ethernet networks; they are susceptible to electromagnetic interference. Coaxial cables provide a shield against interference and are used in cable TV networks. Fiber optic cables offer high speed and are used for data communications over long distances due to their resistance to electromagnetic interference and high bandwidth capabilities .

The OSI model has seven layers including physical, data link, network, transport, session, presentation, and application, whereas the TCP/IP model has four layers. The OSI model provides a more detailed framework and is more theoretical, focusing on ensuring all aspects of network communications are addressed. TCP/IP is more practical and is built to avoid unnecessary complexity, implementing only as many layers as needed for efficient communications .

The Datalink layer is crucial for error detection and correction as it ensures that the data frames are error-free before they are forwarded to higher layers. It employs techniques such as CRC and Hamming code, managing errors at a fundamental level by performing error checking immediately as data is transmitted across physical links. This reduces error propagation and enhances the reliability of network communications by addressing issues like frame duplication and loss .

In a bus topology, all devices are connected to a single central cable; this simple architecture is easy to install and cost-effective, but if the main cable fails, the entire network goes down. Conversely, a mesh topology involves each device connecting to every other, allowing redundancy and high fault tolerance since data can be rerouted across alternative paths if one connection fails. However, mesh topology is more complex to configure and more costly due to the increased number of cables and ports required .

You might also like