10csl77 Network Lab
10csl77 Network Lab
10csl77 Network Lab
LAB MANUAL
PESIT-BSC
10CSL77
Note: Student is required to solve one problem from PART-A and one problem from PARTB. Both the parts have equal weightage.
PART A Simulation Exercises
The following experiments shall be conducted using either NS228/OPNET or any other
simulators.
1. Simulate a three nodes point-to-point network with duplex links between them. Set the
queue size vary the bandwidth and find the number of packets dropped.
2. Simulate a four node point-to-point network, and connect the links as follows: n0-n2, n1n2 and n2-n3. Apply TCP agent between n0-n3 and UDP n1-n3. Apply relevant
applications over TCP and UDP agents changing the parameter and determine the
number of packets sent by TCP/UDP.
3. Simulate the transmission of ping messages over a network topology consisting of 6 nodes
and find the number of packets dropped due to congestion.
4. Simulate an Ethernet LAN using N-nodes(6-10), change error rate and data rate and
compare the throughput.
5. Simulate an Ethernet LAN using N nodes and set multiple traffic nodes and plot
congestion window for different source/destination.
6. Simulate simple ESS and with transmitting nodes in wire-less LAN by simulation and
determine the performance with respect to transmission of packets.
PART B
The following experiments shall be conducted using C/C++.
1. Write a program for error detecting code using CRC-CCITT (16-bits).
2. Write a program for distance vector algorithm to find suitable path for transmission.
3. Using TCP/IP sockets, write a client-server program to make client sending the file name
and the server to send back the contents of the requested file if present.
4. Implement the above program using as message queues or FIFOs as IPC channels.
5. Write a program for simple RSA algorithm to encrypt and decrypt the data.
6. Write a program for congestion control using Leaky bucket algorithm.
PES - 1
PESIT-BSC
10CSL77
PESIT-BSC
10CSL77
PE
The Network Simulator can design and simulate a network with SNMP, TL1, TFTF,
FTP, Telnet and IOS devices, in four simple steps:
1. Add devices to the Device tree: Add devices with the required configuration to the device
tree in the Network Designer. Preconfigured devices are also bundled with the toolkit.
2. Create the Network: Create and add bulk devices to the network, at one shot.
3. Configure the Network devices: Configure the devices in the network, if required.
4. Start the Network: Start the network or start individual agents in the network. The MIB
Browser and TL1 Craft Interface test tools, can be used as the manager tools for testing.
Network Emulation
Network emulation refers to actual network traffic passing through some software which
might do some analysis or perhaps modify the traffic in some way. The Emulation Network in the
WAND group is used for testing and evaluation of networking software and hardware. The scale is
limited; it is made up 24 emulation machines and one central controlling computer. Setup of such a
network is time consuming and expensive: in addition to the aforementioned 25 computers, a Cisco
2950 switch and a Cyclades 32 port terminal server are included in the network. Each emulation
machine also has a 4 port network interface controller. The controlling machine includes special
capture cards (known as DAG [6] cards) to allow easier capture and processing of network traffic.
This network has no easy way of adding latency and bandwidth bottlenecks, which means creating
adverse conditions on the network is difficult. It is possible to use Dummynet to
PESIT-BSC
10CSL77
PESIT-BSC
10CSL77
MIT's NETSIM
NIST
CPSIM
INSANE
NEST
REAL
NS
OPNET
NCTUns
A brief explanation of some of the above simulators is as follows:-
REAL
REAL (REalistic And Large) is a network simulator written at Cornell University by
S. Keshav and based on a modified version of NEST 2.5.
Use
NEST is intended for studying the dynamic behavior of flow and congestion control
schemes in packet-switched data networks (namely TCP/IP).
The package
REAL provides 30 modules written in C that emulate flow-control protocols such as
TCP, and 5 scheduling disciplines such as FIFO, Fair Queuing, DEC congestion avoidance
and Hierarchical Round Robin.
PESIT-BSC
10CSL77
NCTUns
Introduction
NCTUns is open source, high quality, and supports many types of networks.The
NCTUns is a high-fidelity and extensible network simulator and emulator capable of
simulating various protocols used in both wired and wireless IP networks. Its core
technology is based on the novel kernel re-entering methodology invented by Prof. S.Y.
Wang [1, 2] when he was pursuing his Ph.D. degree at Harvard University. Due to this novel
methodology, NCTUns provides many unique advantages that cannot be easily achieved by
traditional network simulators such as ns-2 [3] and OPNET [4].
After obtaining his Ph.D. degree from Harvard University in September 1999, Prof.
S.Y. Wang returned to Taiwan and became an assistant professor in the Department of
Computer Science and Information Engineering, National Chiao Tung University (NCTU),
Taiwan, where he founded his Network and System Laboratory. Since that time, Prof. S.Y.
Wang has been leading and working with his students to design and implement NCTUns (the
NCTU Network Simulator) for more than five years.
can
be tested
under various
10CSL77
It can simulate various networking devices. For example, Ethernet hubs, switches,
routers, hosts, IEEE 802.11 (b) wireless stations and access points, WAN (for
purposely delaying/dropping/reordering packets), Wall (wireless signal obstacle),
GPRS base station, GPRS phone, GPRS GGSN, GPRS SGSN, optical circuit switch,
optical burst switch, QoS DiffServ interior and boundary routers, etc.
It can simulate various protocols. For example, IEEE 802.3 CSMA/CD MAC, IEEE 802.11
(b) CSMA/CA MAC, learning bridge protocol, spanning tree protocol, IP, Mobile IP,
Diffserv (QoS), RIP, OSPF, UDP, TCP, RTP/RTCP/SDP, HTTP, FTP, Telnet, etc.
PESIT-BSC
10CSL77
(1) draw network topologies, (2) configure the protocol modules used inside a node,
(3) specify the moving paths of mobile nodes, (4) plot network performance graphs,
(5) playing back the animation of a logged packet transfer trace, etc. All these
operations can be easily and intuitively done with the GUI.
Its simulation engine adopts an open-system architecture and is open source. By using
a set of module APIs provided by the simulation engine, a protocol module writer can
easily implement his (her) protocol and integrate it into the simulation engine.
NCTUns uses a simple but effective syntax to describe the settings and configurations
of a simulation job. These descriptions are generated by the GUI and stored in a suite
of files. Normally the GUI will automatically transfer these files to the simulation
engine for execution. However, if a researcher wants to try his (her) novel device or
network configurations that the current GUI does not support, he (she) can totally
bypass the GUI and generate the suite of description files by himself (herself) using
any text editor (or script program). The non-GUI-generated suite of files can then be
manually fed to the simulation engine for execution.
It supports remote and concurrent simulations. NCTUns adopts a distributed
architecture. The GUI and simulation engine are separately implemented and use the
client-server model to communicate. Therefore, a remote user using the GUI program
can remotely submit his (her) simulation job to a server running the simulation
engine. The server will run the submitted simulation job and later return the results
back to the remote GUI program for analyzes. This scheme can easily support the
cluster-computing model in which multiple simulation jobs are performed in parallel
on different server machines. This can increase the total simulation throughput.
It supports more realistic wireless signal propagation models. In addition to providing
the simple (transmission range = 250 m, interference range = 550 m) model that is
commonly used in the ns-2, NCTUns provides a more realistic model in which a
received bits BER is calculated based on the used modulation scheme, the bits
received power level, and the noise power level around the receiver. Large-scale path
loss and small-scale fading effects are also simulated.
CS / IS
06CSL77 - 8
PESIT-BSC
10CSL77
PESIT-BSC
10CSL77
6. Left-Click a host and hold the mouse button. Drag this link to the router and then release
the mouse left button on top of the router. Now a link between the selected host and the
router has been created.
7. Add the other, required number of links in the same way. This completes the creation of a
simple network topology.
8. Save this network topology by choosing Menu->File->Save. It is saved with a
.tpl extension.
9. Take the snapshot of the above topology.
Editing Node's Properties
1. A network node (device) may have many parameters to set. For example, we may have to
set the maximum bandwidth, maximum queue size etc to be used in a network interface.
For another example, we may want to specify that some application programs (traffic
generators) should be run on some hosts or routers to generate network traffic.
2. Before a user can start editing the properties of a node, he/she should switch the mode
from the Draw Topology to Edit Property mode. In this mode, topology changes can
no longer be made. That is, a user cannot add or delete nodes or links at this time.
3. The GUI automatically finds subnets in a network and generates and assigns IP and MAC
addresses to layer 3 network interfaces.
4. A user should be aware that if he/she switches the mode back to the Draw Topology mode
when he/she again switches the mode back to the Edit Topology mode, node's IP and MAC
addresses will be regenerated and assigned to layer 3 interfaces. Therefore the application
programs now may use wrong IP addresses to communicate with their partners.
PESIT-BSC
10CSL77
PESIT-BSC
10CSL77
3. After the loading process is finished, the user can use the control buttons located at the
bottom of the screen to view the animation.
Simulation Commands
The following explains the meaning of each job control command:
Abort: Abort the currently running simulation. The difference between stop and abort is
that a stopped simulation job's partial results will be transferred back to GUI files.
Reconnect: The Reconnect command can be executed to reconnect to a simulation job that was
previously disconnected. All disconnected jobs that have not finished their simulations or have
finished their simulations but the results have not been retrieved back to be a GUI program by
the user will appear in a session table next to the Reconnect command. When executing the
reconnect command, a user can choose a disconnected job to reconnect from this session table.
Disconnect: Disconnect the GUI from the currently running simulation job. The GUI now
can be used to service another simulation job. A disconnected simulation will be given a
session name and stored in a session table.
0 - 12
PESIT-BSC
10CSL77
Part A
EXPERIMENT 1
Simulate a three-node point-to-point network with a duplex link between them. Set
the queue size and vary the bandwidth and find the number of packets dropped.
STEPS:
Step1: Select the hub icon on the toolbar and drag it onto the working window.
Step2: Select the host icon on the toolbar and drag it onto the working window. Repeat this
for another host icon.
Step3: Select the link icon on the toolbar and drag it on the screen from host (node 1) to the
hub and again from host(node 2) to the hub. Here the hub acts as node 3 in the point-to-point
network. This leads to the creation of the 3-node point-to-point network topology. Save this
topology as a .tpl file.
Step4:Double-click on host(node 1), a host dialog box will open up. Click on Node editor and
you can see the different layers- interface, ARP, FIFO, MAC, TCPDUMP, Physical layers.
Select MAC and then select full-duplex for switches and routers and half duplex for hubs,
and in log Statistics, select Number of Drop Packets, Number of Collisions, Throughput of
incoming packets and Throughput of outgoing packets. Select FIFO and set the queue size to
50 and press OK. Then click on Add. Another dialog box pops up. Click on the Command
box and type the Command according to the following syntax:
stg [-t duration(sec)] [-p port number]HostIPaddr
and click OK.
Step 5: Double-click on host (node 2), and follow the same step as above with only change in
to some initial
value say, 10 Mbps. Repeat the same for the other node.
Step 7: Click on the E button (Edit Property) present on the toolbar in order to save the changes
made to the topology. Now click on the R button (RunSimulation). By doing so a user can
PESIT-BSC
10CSL77
the
results.
Step 12: To view the results, go to the filename. results folder.
Note: To get the syntax of any command, double click on the host icon. Host dialog boxes
appear and then choose App. Usage.
The screenshot below explain the topology.
PESIT-BSC
10CSL77
two
Step 4: Setup a UDP connection between node 2 and node 3 using the
following commands:
stg [-u payload size duration] [Host address]
PESIT-BSC
10CSL77
/ IS
06CSL77 - 19
PESIT-BSC
10CSL77
and the
for the
Step 3: In the edit mode, get the IP address of one of the hosts say, host 1 and then
other host say, host2 set the drop packet and no: of collisions
statistics as described
in the earlier experiments.
Step 4: Now run the simulation.
Step 5: Now click on any one of the hosts and click on command console and
the destination node.
ping
PESIT-BSC
10CSL77
For
PESIT-BSC
10CSL77
hub and
Step 2: Setup a TCP connection between a host on one hub and host on another
using the following command:
hub
Step 3: Setup the error rate, data rate in the physical layer, input and
output throughput in the mac layer as described above.
Step 4: Change error rate and data rate and compare the
throughputs. Step 5: View the results in the filename.results.
PESIT-BSC
10CSL77
06CSL77 - 23
- 24
PESIT-BSC
10CSL77
Step 3: Setup the collision log at the destination hosts in the MAC layer as described in the
earlier experiments.
Step 4: To plot the congestion window go to Menu->Tools->Plot Graph->File->open>filename.results->filename.coll.log
Step 5: View the results in the filename.results.
PESIT-BSC
10CSL77
PESIT-BSC
10CSL77
EXPERIMENT 6
Simulate simple ESS and with transmitting nodes in wireless LAN by simulation and
determine the performance with respect to transmission of packets.
STEPS:
Step 1: Connect a host and two WLAN access points to a router.
Step 2: Setup multiple mobile nodes around the two WLAN access points and set the path
for each mobile node.
Step 3: Setup a ttcp connection between the mobile nodes and host using the following command:
Mobile Host 1
ttcp t u s p 3000 IPAddrOf Receiver
Mobile Host 1
ttcp t u s p 4000 IPAddrOf Receiver
Host(Receiver)
ttcp r u s p 3000
ttcp r u s p 4000
Step 4: Setup the input throughput log at the destination host.
Step 5: To set the transmission range go to Menu->Settings->WLAN mobile
transmission range.
Step 5: View the results in the filename. results.
PESIT-BSC
10CSL77
node->Show
06CSL77 - 28
PESIT-BSC
10CSL77
Part B Programs
Experiment No 1
CRC
Problem Statement
Write a program for error detecting code using CRC-CCITT (16-bits).
Theory
It does error checking via polynomial division. In general, a bit string
b b b b b b
n-1
n-2
n-3
As
n-1
bn-1X
n-2
bn-2 X
n-3
bn-3 X
b2 X
+ b1
b0
Ex: 10010101110
As
10
+X +X +X +X +X
PESIT-BSC
10CSL77
Experiment No 2
Distance Vector Routing
Problem Statement
Write a program for distance vector algorithm to find suitable path for transmission.
Theory
Routing algorithm is a part of network layer software which is responsible for deciding which
output line an incoming packet should be transmitted on. If the subnet uses datagram internally, this
decision must be made anew for every arriving data packet since the best route may have changed
since last time. If the subnet uses virtual circuits internally, routing decisions are made only when a
new established route is being set up. The latter case is sometimes called session routing, because a
rout remains in force for an entire user session (e.g., login session at a terminal or a file).
Routing algorithms can be grouped into two major classes: adaptive and nonadaptive. Nonadaptive
algorithms do not base their routing decisions on measurement or estimates of current traffic and topology.
Instead, the choice of route to use to get from I to J (for all I and J) is compute in advance, offline, and
downloaded to the routers when the network ids booted. This procedure is sometime called static routing.
Adaptive algorithms, in contrast, change their routing decisions to reflect changes in the topology,
and usually the traffic as well. Adaptive algorithms differ in where they get information (e.g., locally,
from adjacent routers, or from all routers), when they change the routes (e.g., every T sec, when the
load changes, or when the topology changes), and what metric is used for optimization (e.g., distance,
number of hops, or estimated transit time).
Two algorithms in particular, distance vector routing and link state routing are the most popular.
Distance vector routing algorithms operate by having each router maintain a table (i.e., vector)
giving the best known distance to each destination and which line to get there. These tables are
updated by exchanging information with the neighbors.
The distance vector routing algorithm is sometimes called by other names, including the
distributed Bellman-Ford routing algorithm and the Ford-Fulkerson algorithm, after the researchers
who developed it (Bellman, 1957; and Ford and Fulkerson, 1962). It was the original ARPANET
routing algorithm and was also used in the Internet under the RIP and in early versions of DECnet
and Novells IPX. AppleTalk and Cisco routers use improved distance vector protocols.
In distance vector routing, each router maintains a routing table indexed by, and containing one entry
for, each router in subnet. This entry contains two parts: the preferred out going line to use for that
destination, and an estimate of the time or distance to that destination. The metric used might be number
of hops, time delay in milliseconds, total number of packets queued along the path, or something similar.
The router is assumed to know the distance to each of its neighbor. If the metric is hops, the
distance is just one hop. If the metric is queue length, the router simply examines each queue. If the
metric is delay, the router can measure it directly with special ECHO packets hat the receiver just
time stamps and sends back as fast as possible.
06CSL77 - 31
PESIT-BSC
10CSL77
A
B
C
D
E
_____ _____ _____ _____
1
1
1
1
2
2
2
3
3
A
B
C
D
E
_____ _____ _____ _____
Initially
After 1 exchange
After 2 exchange
After 3 exchange
After 4 exchange
1
3
3
5
5
7
7
2
2
3
3
6
6
8
:
3
3
3
5
5
7
7
4
4
4
4
6
6
8
Initially
After 1 exchange
After 2 exchange
After 3 exchange
After 4 exchange
After 5 exchange
After 6 exchange
Many ad hoc solutions to the count to infinity problem have been proposed in the literature, each one more
complicated and less useful than the one before it. The split horizon algorithm works the same way as distance
vector routing, except that the distance to X is not reported on line that packets for X are sent on (actually, it is
reported as infinity). In the initial state of right figure, for example, C tells D the truth about distance to A but C
tells B that its distance to A is infinite. Similarly, D tells the truth to E but lies to C.
PESIT-BSC
10CSL77
Overview
Unix sockets is just like two way FIFO's. All data communication will take place
through the socket's interface, instead of through the file interface. Although unix socket's
are a special file in the file system(just like FIFO's), there's usage of socket(), bind(),
recv(),etc and not open(), read().
When programming with socket's, usually there's creation of server and client
programs. The server will sit listening for incoming connections from clients and handling.
This is similar to the situation that exists with internet sockets but with fine differences.
For instance, when describing which unix socket that has to be used (i.e the path to the
special file that is the socket). The structure struct sockaddr_un has the following fields:
struct sockaddr_un{
unsigned short sa_family;
char
sa_data;
};
// Address family,AF_XXXX
// 14 bytes of protocol address
This is the structure you will be passing to the bind() function, which associates a socket
descriptor(a file descriptor) with a certain file(the name for which is in the sun_path field).
The structure struct sockaddr_in is used when we need IP address and Port number to
be binded to the Sockets. It has following fields:
struct sockaddr_in {
short int
sin_family; // Address family
unsigned short int sin_port;
// Port number
struct in_addr
sin_addr; // Internet address
unsigned char
sin_zero[8] // Same size as struct sockaddr
};
// Internet adress
struct in_addr
{
unsigned long s_addr;
// 32 bits or 4 bytes long
};
ii. BACKGROUND REQUIRED:
1. UNIX File I/O system calls
2. UNIX IPC system calls
IS
06CSL77 - 33
10CSL77
L77 - 34
PESIT-BSC
10CSL77
Start.
Create a socket using socket() system call.
Connect the socket to the address of the server using connect() system call.
Send the filename of required file using send() system call.
Read the contents of the file sent by server by recv() system call.
Stop.
Start.
Create a socket using socket() system call.
Bind the socket to an address using bind() system call.
Listen to the connection using listen() system call.
accept connection using accept()
Receive filename and transfer contents of file with client.
Stop.
PESIT-BSC
10CSL77
Start.
Open well known server FIFO in write mode.
Write the pathname of the file in this FIFO and send the request.
Open the client specified FIFO in read mode and wait for reply.
When the contents of the file are available in FIFO, display it on the terminal
Stop.
Start.
Create a well known FIFO using mkfifo()
Open FIFO in read only mode to accept request from clients.
When client opens the other end of FIFO in write only mode, then read the contents and store
it in buffer.
5. Create another FIFO in write mode to send replies.
6. Open the requested file by the client and write the contents into the client specified FIFO and
terminate the connection.
7. Stop.
PESIT-BSC
10CSL77
CS / IS
06CSL77 - 36
Experiment No 5
RSA Algorithm
Problem Statement
Write a program for simple RSA algorithm to encrypt and decrypt the data.
Theory
Cryptography has a long and colorful history. The message to be encrypted, known as the
plaintext, are transformed by a function that is parameterized by a key. The output of the encryption
process, known as the ciphertext, is then transmitted, often by messenger or radio. The enemy, or
intruder, hears and accurately copies down the complete ciphertext. However, unlike the intended
recipient, he does not know the decryption key and so cannot decrypt the ciphertext easily. The art of
breaking ciphers is called cryptanalysis the art of devising ciphers (cryptography) and breaking
them (cryptanalysis) is collectively known as cryptology.
There are several ways of classifying cryptographic algorithms. They are generally categorized
based on the number of keys that are employed for encryption and decryption, and further defined
by their application and use. The three types of algorithms are as follows:
1. Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption. It is also
known as symmetric cryptography.
2. Public Key Cryptography (PKC): Uses one key for encryption and another for decryption. It is
also known as asymmetric cryptography.
3. Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information
Public-key cryptography has been said to be the most significant new development in
cryptography. Modern PKC was first described publicly by Stanford University professor Martin
Hellman and graduate student Whitfield Diffie in 1976. Their paper described a two-key crypto
system in which two parties could engage in a secure communication over a non-secure
communications channel without having to share a secret key.
Generic PKC employs two keys that are mathematically related although knowledge of one key
does not allow someone to easily determine the other key. One key is used to encrypt the plaintext
and the other key is used to decrypt the ciphertext. The important point here is that it does not
matter which key is applied first, but that both keys are required for the process to work. Because
pair of keys is required, this approach is also called asymmetric cryptography.
In PKC, one of the keys is designated the public key and may be advertised as widely as the owner
wants. The other key is designated the private key and is never revealed to another party. It is
straight forward to send messages under this scheme.
The RSA algorithm is named after Ron Rivest, Adi Shamir and Len Adleman, who invented it in
1977. The RSA algorithm can be used for both public key encryption and digital signatures. Its
security is based on the difficulty of factoring large integers.
Algorithm
1.
2.
3.
4.
5.
06CSL77 - 37
PESIT-BSC
10CSL77
The public key is (N, E) and the private key is (N, D).
compute D = E
mod Z = 3
^-1
mod 20
= 343 mod
33 = 13.
Hence the ciphertext c = 13.
^D
PESIT-BSC
10CSL77
Theory
The congesting control algorithms are basically divided into two groups: open loop and closed loop.
Open loop solutions attempt to solve the problem by good design, in essence, to make sure it does not
occur in the first place. Once the system is up and running, midcourse corrections are not made. Open
loop algorithms are further divided into ones that act at source versus ones that act at the destination.
In contrast, closed loop solutions are based on the concept of a feedback loop if there is any
congestion. Closed loop algorithms are also divided into two sub categories: explicit feedback and
implicit feedback. In explicit feedback algorithms, packets are sent back from the point of congestion
to warn the source. In implicit algorithm, the source deduces the existence of congestion by making
local observation, such as the time needed for acknowledgment to come back.
The presence of congestion means that the load is (temporarily) greater than the resources (in part
of the system) can handle. For subnets that use virtual circuits internally, these methods can be used
at the network layer.
Another open loop method to help manage congestion is forcing the packet to be transmitted at a
more predictable rate. This approach to congestion management is widely used in ATM networks
and is called traffic shaping.
The other method is the leaky bucket algorithm. Each host is connected to the network by an
interface containing a leaky bucket, that is, a finite internal queue. If a packet arrives at the queue
when it is full, the packet is discarded. In other words, if one or more process are already queued, the
new packet is unceremoniously discarded. This arrangement can be built into the hardware interface
or simulate d by the host operating system. In fact it is nothing other than a single server queuing
system with constant service time.
The host is allowed to put one packet per clock tick onto the network. This mechanism turns an
uneven flow of packet from the user process inside the host into an even flow of packet onto the
network, smoothing out bursts and greatly reducing the chances of congestion.
Viva Questions
PESIT-BSC
10CSL77
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
PES
06CSL77 - 43
PESIT-BSC
10CSL77
77.
78.
79.
80.
What is simulation?
What are advantages of simulation?
Differentiate between Simulation and Emulation.
What is meant by router?
What is meant by bridge?
What is meant by switch?
What is meant by hub?
Differentiate between route, bridge, switch and hub.
What is ping and telnet?
What is FTP?
What is BER?
What is meant by congestion window?
What is BSS?
What is incoming throughput and outgoing throughput?
What is collision?
How do you generate multiple traffics across different sender-receiver pairs?
How do you setup Ethernet LAN?
What is meant by mobile host?
What is meant by NCTUns?
What are dispatcher, coordinator and nctunsclient?
Name few other Network simulators
Differentiate between logical and physical address.
Which address gets affected if a system moves from one place to another place?
What is ICMP? What are uses of ICMP? Name few.
Which layer implements security for data?
Install any Linux with kernel 2.6.9 (PCQ Linux 2004 is exception)
Recommended RED HAT LINUX ENTERPRISE EDITION
2.
3.
4.
To unzip use the following command:[root@localhost local] tar xvzf [the file name].tar
(Note there is no '-' before xvzf)
This will create a folder called NCTUns in the directory /bin/local...
5.
Now disable the Secure Linux option by running the following command :[root@localhost local] vi /etc/selinux/config
PESIT-BSC
10CSL77
6.
From the directory /bin/local change the current working directory to NCTUns by following
command :[root@localhost local] cd NCTUns
7.
Now from here execute the installation shell script that will do the required compilations and
settings for you:[root@localhost local] ./install.sh
During this part it will ask for installation of tunnel files. Please type yes and Enter to continue
8.
9.
If the installation is successful, it will display the success message at the end. Now restart your
computer. You will find a new entry in GRUB Menu "NCTUns kernel login". Boot into Linux
using this entry.
Log in as root. Now you have to modify any .bash_profile file
[root@localhost ~] vi .bash_profile
The Content of file should look like as follows.
# .bash_profile
# Get
if
the
aliases
and
-t ~/.bashrc
. ~/.bashrc
];
function
then
fi
#
User
specified
environment
variables
and
startup
programs
PATH=$PATH:$HOME/bin:/usr/local/nctuns/bin
export LD_LIBRARY_PATH=/usr/local/nctuns/lib
export NCTUNSHOME=/usr/local/nctuns
export PATH
export USERNAME
Now save this file and log off and then log on again.
Create another user account.
before using simulator, please execute the following command
[root@localhost ~] iptables -F
Run the simulator using three commands where each command should be executed in different
window.
[root@localhost ~] dispatcher
[root@localhost ~] coordinator
[root@localhost ~] nctunsclient
14. In the NCTUns window Settings Dispatcher. Provide the username and password of the user
account u created in step 11. Then Click OK.
PESIT-BSC
10CSL77
PESIT-BSC
10CSL77