Skip to content

toxicbishop/Computer-Networks

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

5th Semester Computer Networks Lab Programs

This repository contains local lab programs for the 5th Semester Computer Networks course. The programs cover network simulations using NS-2 (TCL) and network protocols/algorithms implemented in Java.

Programs List

Part A: Simulation Exercises (NS-2/TCL)

  1. Program 1: Point-to-Point Network

    • Simulates a simple point-to-point network topology.
    • Demonstrates packet transmission between nodes.
  2. Program 2: Ethernet LAN

    • Simulates an Ethernet LAN with multiple nodes.
    • Demonstrates network traffic and behavior in a LAN environment.
  3. Program 3: Ping Utility

    • Simulates the functionality of the Ping command.
    • Demonstrates connectivity testing between network nodes.

Part B: Socket Programming & Algorithms (Java)

  1. Program 4: CRC (Cyclic Redundancy Check)

    • Java implementation of the CRC error detection mechanism.
    • Calculates the checksum for data integrity verification.
  2. Program 5: Sliding Window Protocol (Go-Back-N)

    • Implements the Go-Back-N ARQ protocol using Java Sockets.
    • Demonstrates reliable data delivery with window-based flow control.
  3. Program 6: Go-Back-N Simulation

    • Simulates the logic of the Go-Back-N protocol.
    • Shows frame transmission, acknowledgement handling, and retransmissions.
  4. Program 7: TCP Socket Programming

    • Implements a Client-Server model using TCP (Transmission Control Protocol).
    • Demonstrates reliable, connection-oriented communication.
  5. Program 8: UDP Socket Programming

    • Implements a Client-Server model using UDP (User Datagram Protocol).
    • Demonstrates connectionless, lower-overhead communication.
  6. Program 9: RSA Algorithm

    • Java implementation of the RSA (Rivest-Shamir-Adleman) algorithm.
    • Demonstrates public-key cryptography for encryption and decryption.
  7. Program 10: Leaky Bucket Algorithm

    • Implements the Leaky Bucket algorithm for traffic shaping and congestion control.
    • Simulates packet processing and buffering.

How to Run

NS-2 Programs

To run the TCL scripts, you typically use ns:

ns Program1/Point-to-Point.tcl

(Note: Requires NS-2 to be installed and configured in your environment)

Java Programs

Compile and run the Java programs using javac and java:

cd Program4
javac CRC1.java
java CRC1

About

5th Semester Computer Networks Lab Programs

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published