To become familiar with networking accessories and facilities in the Department of Computer Science and Engineering: Find out what networking devices are installed in the department; Describe the network type and topology of the department; File and printer sharing in different OSs; Network address configuration in different OSs; Finding IP and MAC address in different OSs; Workgroup and domain configuration; Use of utilities: arp, ipconfig/ifconfig, tracert, nslookup
Examine packets flow across a network segment and see the operation of various Internet protocols across the different layers in TCP/IP stack. (Hint: Use utilities netstat, snoop, tcpdump, …)
Use UNIX sockets to implement a simple client and server that communicate over the network. (Reference: Unix Network Programming by W. Richard Stevens, Prentice Hall)
Simulate various multiple access protocols (Aloha, slotted Aloha, p-persistent and non-persistent) and compare their performance at different loads.
Write a program to display the IP address and MAC address of a machine.
Implement ARP and RARP protocols for CSE LAN.
Install Ethereal on a computer. Set Ethereal to capture with a filter option of your choice. Load a webpage or send an email to a friend and stop capturing. Analyze the packets. See if you can read any or all of the data transmitted. Write down your findings.
Write a program to simulate routing using flooding. Each packet should contain a counter that is decremented on each hop. When the counter gets to zero, the packet is discarded. Time is discrete, with each line handling one packet per time interval. Make three versions of the program: all lines are flooded, all lines except the input line are flooded, and only the (statically chosen) best k lines are flooded. Compare flooding with deterministic routing (k = 1) in terms of both delay and the bandwidth used.
Write a program that simulates a computer network using discrete time. The first packet on each router queue makes one hop per time interval. Each router has only a finite number of buffers. If a packet arrives and there is no room for it, it is discarded and not transmitted. Instead, there is an end-to-end protocol, complete with timeouts and acknowledgement a packet, which eventually regenerates the packet from the source router. Plot the throughput of the network as a function of the end-to-end timeout interval, parameterized by error rate.
Design and implement a chat system that allows multiple groups of users to chat. A chat coordinator resides at a well-known network address, uses UDP for communication with chat clients, sets up chat servers for each chat session, and maintains a chat session directory. There is one chat server per chat session. A chat server uses TCP for communication with clients. A chat client allows users to start, join, and leave a chat session. Design and implement coordinator, server, and client code
All information displayed belongs to NIT Hamirpur Made with ❤️ by Mohak