Networks Lab Manual
Networks Lab Manual
ENGINEERING COLLEGE
(An Autonomous Institution)
R.S.M. Nagar, Kavaraipettai -601 206
20CS501
NETWORKS LABORATORY (LAB INTEGRATED)
LAB MANUAL
Regulation 2022
[Link],
Associate Professor/CSE
R.M.K. ENGINEERING COLLEGE
(An Autonomous Institution)
R.S.M. Nagar, Kavaraipettai -601 206
OUTCOMES:
At the end of this course, the students will be able to:
CO1: Understand the various networking commands in different OS and troubleshoot it.
CO2: Perform error detection & correction and flow control mechanisms in network programming.
CO3: Program with raw sockets for network protocol implementation.
CO4: Understand the usage of various network programming APIs and application layer protocols.
CO5: Simulate various network protocols and analyze their behaviour in the network
[Link] Learn to use commands like tcpdump, netstat, ifconfig, nslookup and traceroute.
Capture ping and traceroute PDUs using a network protocol analyzer and examine.
AIM:
To Learn to use commands like tcpdump, netstat, ifconfig, nslookup and traceroute ping.
Tcpdump:
The tcpdump utility allows you to capture packets that flow within your network to assist in
network troubleshooting. The following are several examples of using tcpdump with different options.
Traffic is captured based on a specified filter.
Netstat
Netstat is a common command line TCP/IP networking available in most versions of
Windows, Linux, UNIX and other operating systems.
Netstat provides information and statistics about protocols in use and current TCP/IP network
connections.
ipconfig
ipconfig is a console application designed to run from the Windows command prompt. This
utility allows you to get the IP address information of a Windows computer.
From the command prompt, type ipconfig to run the utility with default options. The output of the
default command contains the IP address, network mask, and gateway for all physical and virtual
network adapter.
nslookup
The nslookup (which stands for name server lookup) command is a network utility program used
to obtain information about internet servers. It finds name server information for domains by querying
the Domain Name System.
Trace route:
Traceroute is a network diagnostic tool used to track the pathway taken by a packet on an IP network
from source to destination. Traceroute also records the time taken for each hop the packet makes during
its route to the destination
Commands:
Tcpdump:
Display traffic between 2 hosts:
To display all traffic between two hosts (represented by variables host1 and host2): # tcpdump
host host1 and host2
Display traffic from a source or destination host only:
To display traffic from only a source (src) or destination (dst) host:
# tcpdump src host
# tcpdump dst host
Display traffic for a specific protocol
Provide the protocol as an argument to display only traffic for a specific protocol, for example tcp,
udp, icmp, arp
# tcpdump protocol
For example to display traffic only for the tcp traffic :
# tcpdump tcp
Filtering based on source or destination port
To filter based on a source or destination port:
# tcpdump src port ftp
# tcpdump dst port http
Netstat
Netstat is a common command line TCP/IP networking available in most versions of
Windows, Linux, UNIX and other operating systems.
Netstat provides information and statistics about protocols in use and current TCP/IP network
connections. The Windows help screen (analogous to a Linux or UNIX for netstat reads as follows:
displays protocol statistics and current TCP/IP network connections.
#netstat
ipconfig
In Windows, ipconfig is a console application designed to run from the Windows command
prompt. This utility allows you to get the IP address information of a Windows computer.
Using ipconfig
From the command prompt, type ipconfig to run the utility with default options. The output of the default
command contains the IP address, network mask, and gateway for all physical and virtual network
adapter.
#ipconfig
nslookup
The nslookup (which stands for name server lookup) command is a network utility program used
to obtain information about internet servers. It finds name server information for domains by querying
the Domain Name System.
The nslookup command is a powerful tool for diagnosing DNS problems. You know you're
experiencing a DNS problem when you can access a resource by specifying its IP address but not its
DNS name.
#nslookup
Trace route:
Traceroute uses Internet Control Message Protocol (ICMP) echo packets with variable time to live (TTL)
values. The response time of each hop is calculated. To guarantee accuracy, each hop is queried multiple
times (usually three times) to better measure the response of that particular hop.
Traceroute is a network diagnostic tool used to track the pathway taken by a packet on an IP network
from source to destination. Traceroute also records the time taken for each hop the packet makes during
its route to the destination. Traceroute uses Internet Control Message Protocol (ICMP) echo packets
with variable time to live (TTL) [Link] response time of each hop is calculated. To guarantee
accuracy, each hop is queried multiple times (usually three times) to better measure the response of that
particular hop. Traceroute sends packets with TTL values that gradually increase from packet to packet,
starting with TTL value of one. Routers decrement TTL values of packets by one when routing and
discard packets whose TTL value has reached zero, returning the ICMP error message ICMP Time
Exceeded.
For the first set of packets, the first router receives the packet, decrements the TTL value and
drops the packet because it then has TTL value zero. The router sends an ICMP Time Exceeded message
back to the source. The next set of packets are given a TTL value of two, so the first router forwards the
packets, but the second router drops them and replies with ICMP Time Exceeded.
Proceeding in this way, traceroute uses the returned ICMP Time Exceeded messages to build a list of
routers that packets traverse, until the destination is reached and returns an ICMP Echo Reply
message.
With the tracert command shown above, we're asking tracert to show us the path from the local
computer all the way to the network device with the hostname
[Link].
#tracert [Link]
2. Ping:
The ping command sends an echo request to a host available on the network. Using this command,
you can check if your remote host is responding well or not. Tracking and isolating hardware and
software problems. Determining the status of the network and various foreign hosts. The ping command
is usually used as a simple way to verify that a computer can communicate over the networkwith another
computer or network device. The ping command operates by sending Internet Control Message Protocol
(ICMP) Echo Request messages to the destination computer and waiting for a response
# ping172.16.6.2
RESULT:
Thus the various networks commands like tcpdump, netstat, ifconfig,
nslookup and traceroute ping are executed successfully.
[Link] Learn to use Network configuration commands using Linux.
AIM:
[Link] Command
# ifconfig
1. Ping Command
Ping (Packet INternet Groper) command is the best way to test connectivity between
two nodes. Whether it is Local Area Network (LAN) or Wide AreaNetwork (WAN).
Ping uses ICMP (Internet Control Message Protocol) to communicate to other devices.
You can ping hostname or ip address using the below commands.
# ping [Link]
OR
# ping [Link]
2. Traceroute Command
traceroute is a network troubleshooting utility that shows the number of hops taken to
reach a destination also determines packets traveling path. Below we are tracing the
route to the global DNS server IP Address and able to reach destination also shows the
path of that packet is traveling.
# traceroute [Link]
3. Netstat Command
# netstat -r
5. Nslookup Command
nslookup command is also used to find out DNS-related queries. The following
examples show A Record (IP Address) of [Link].
# nslookup [Link]
Server: [Link]
Address: 4.2 2.2#53
Non-authoritative answer:
[Link] canonical name = [Link].
Name: [Link]
Address: [Link]
6. Route Command
route command also shows and manipulates the ip routing table. To see the default
routing table in Linux, type the following command.
# route
7. Host Command
# host [Link]
8. Arp Command
# arp -e
9. Ethtool Command
# ethtool eth0
# iwconfig [interface]
The hostname is to identify in a network. Execute the hostname command to see the
hostname of your box. You can set hostname permanently in /etc/sysconfig/network.
Need to reboot box once set a proper hostname.
# hostname
[Link]
RESULT:
Thus the various networks configuration commands are executed successfully.
EX.NO3 Simulation of Error CorrectionCode(CRC)
AIM
PROCEDURE
Cyclicredundancycheck(CRC)
ALGORITHM :
1. Open the editor and type the program for error detection
2. Get the input in the form of bits.
3. Append the redundancy bits.
4. Divide the appended data using a divisor polynomial.
5. The resulting data should be transmitted to the receiver.
6. At the receiver the received data is entered.
7. The same process is repeated at the receiver.
8. If the remainder is zero there is no error otherwise there is some error in the received bits
9. Run the program.
PSEUDOCODE
Since a CRC is fundamentally bit-oriented, the order that you assign to bits in bytes matters. You can do it
big-endian:
Or you can do it little-endian. This turns out to be more convenient in practice, and matches the order of bits
sent over RS-232 (so the CRC burst error detection property holds):
• The bit bitString[i] can be simply XORed into the shiftRegister before the test. It gets shifted away in
the next step anyway.
• The above can be thought of as looking up entry (shiftRegister & 1) in a two-entry table whose entries
are 0 and polynomial You can do multiple bits at the same time with a larger table.
RESULT:
Thus the error detection and error correction is implemented successfully
Flow control mechanisms
AIM:
ALGORITHM:
1. Start theprogram.
2. Get the frame size from the user
3. create the frame based on the user request. [Link] send frames toserver
from the client side.
5. If your frames reach the server it will send ACK signal to client otherwise it will send NACK signal
to client.
6. Stop the program
PSEUDOCODE
begin
frame s, r; //s and r denotes frames to be sent and received
SeqNo = 0; // Initialise sequence number of outbound frame
RSeqNo = 0; // Initialise sequence number of expected frame
while (true) //check repeatedly
do
Wait_For_Event(); //wait for availability of packet
if ( Event(Request_For_Transfer) AND canSend) then
Get_Data_From_Network_Layer();
s = Make_Frame(SeqNo);
Store_Copy_Frame(s);
Start_Timer(s);
SeqNo = SeqNo + 1;
end if;
Wait_For_Event(); //wait for arrival of frame
if ( Event(Frame_Arrival) then
r = Receive_Frame_From_Physical_Layer();
if ( [Link] = RSeqNo ) then
Extract_Data(r);
Deliver_Data_To_Network_Layer(r);
Stop_Timer(r);
RSeqNo = RSeqNo + 1;
end if
end if
[Link] = [Link];
Send_Frame_To_Physical_Layer(s);
Start_Timer(s);
SeqNo = SeqNo + 1;
end while
end
OUTPUT:
//SENDEROUTPUT
Enter the no. of frames :
4Enter 4 Messages to
besend
hiiihow
ru
i amfine
howisevryone
Acknowledgmentreceivedfor4frames
Doyouwantstosendsomemore frames : no
//RECEIVEROUTPUT
ThereceivedFrame0is:hiiiTherece
ived Frame 1is:howru
ThereceivedFrame2is:iamfine
Thereceived Frame 3is:howiseveryone
[Link](b) Implementation of Stop and Wait Protocol
AIM
ALGORITHM:
PSEUDOCODE
end
Receiver Site Algorithm of Simplex Stop andWait Protocol
begin
RSeqNo = 0; // Initialise sequence number of expected frame
while (true) //check repeatedly
do
Wait_For_Event(); //wait for arrival of frame
if ( Event(Frame_Arrival) then
Receive_Frame_From_Physical_Layer();
if ( Corrupted ( [Link] )
doNothing();
else if ( [Link] = RSeqNo ) then
Extract_Data();
Deliver_Data_To_Network_Layer();
RSeqNo = RSeqNo + 1;
end if
Send_ACK(ACKframe[RSeqNo]);
end if
end while
end
OUTPUT:
//SENDEROUTPUT
WaitingforConnection....
reciver>connected
.
Enter thedata tosend....
myname
data
sent>0mwaitingfo
rack.....
receiver
>packetrecievedd
ata sent>1y
waiting forack.....
receiver
>packetrecievedd
ata sent>0n
waiting forack.....
receiver
>packetrecievedd
ata sent>1a
waiting forack.....
Time outresendingdata....
data
sent>1awaitingfor
ack.....
receiver
>packetrecievedd
ata sent>0m
waiting forack.....
receiver
>packetrecievedd
ata sent>1e
waiting forack.....
receiver
>packetrecieved
All data sent. exiting.
//RECEIVEROUTPUT
waitingforconnection...
Connectionestablished:
receiver >0m
receiver >1y
receiver >0n
receiver >1a
receiver >1a duplicate
datareceiver >0m
receiver >1e
Data
recived=mynamewaitin
gforconnection...
RESULT:
Thus the flow control mechanism is implemented successfully.
EXNO:5 Multi-client chatting in TCP and UDP using Socket programming
AIM
To write a java program for application using TCP Sockets Links
PROCEDURE:
• In the TCP Echo client a socket is created. Using the socket a connection is made to the
server using the connect() function. After a connection is established, we send messages
input from the user and display the data received from the server using send() and read()
functions.
• In the TCP Echo server, we create a socket and bind to a advertized port number. After
binding the process listens for incoming connections. Then an infinite loop is started to
process the client requests for connections. After a connection is requested, it accepts the
connection from the client machine and forks a new process.
• The new process receives data from the lient using recv() function and echoes the same data
using the send() function. Please note hat this server is capable of handling multiple clients
as it forks a new process for every client trying to connect to the server. TCP socket
routines enable reliable IP communication using the transmission control protocol (TCP).
• The implementation of the Transmission Control Protocol (TCP) in the Network Component.
TCP runs on top of the Internet Protocol (IP). TCP is a connection- oriented and reliable,
full duplex protocol supporting a pair of byte streams, one for each
direction.
• A TCP connection must be established before exchanging data. TCP retransmits data that do
not reach the final destination due to errors or data corruption. Data is delivered in the
sequence of its transmission
a. Echo client and echo server
ALGORITHM
Client
1. Start
2. Create the TCP socket
3. Establish connection with the server
4. Get the message to be echoed from the user
5. Send the message to the server
6. Receive the message echoed by the server
7. Display the message received from the server
8. Terminate the connection
9. Stop
Server
1. Start
2. Create TCP socket, make it a listening socket
3. Accept the connection request sent by the client for connection establishment
4. Receive the message sent by the client
5. Display the received message
6. Send the received message to the client from which it receives
7. Close the connection when client initiates termination and server becomes a listening
server, waiting for clients.
8. Stop.
PSEUDOCODE
TCP client
Create socket, connectSocket
Do an active connect specifying the IP address and port number of server
Read and Write Data Into connectSocket to Communicate with server
Close connectSocket
TCP server
Create socket (serverSocket)
Bind socket to a specific port where clients can contact you
Register with the kernel your willingness to listen that on socket for client to contact you
Loop Accept new connection (connectSocket)
Read and Write Data Into connectSocket to Communicate with client
Close connectSocket
End Loop
Close serverSocket
OUTPUT
Server
C:\Program
Files\Java\jdk1.5.0\bin>[Link]:\Program
Files\Java\jdk1.5.0\bin>javaEServerC:\Program
Files\Java\jdk1.5.0\bin>
Client
C:\ProgramFiles\Java\jdk1.5.0\bin>[Link]
C:\ProgramFiles\Java\jdk1.5.0\bin>javaEClientClient:
HaiServer
Server:Hai
ServerClient:Hell
oServer:HelloCli
ent:endServer:en
dClient:ds
SocketClosed!
[Link]
ALGORITHM
Client
1. Start
2. Create the UDP datagram socket
3. Get the request message to be sent from the user
4. Send the request message to the server
5. If the request message is “END” go to step 10
6. Wait for the reply message from the server
7. Receive the reply message sent by the server
8. Display the reply message received from the server
9. Repeat the steps from 3 to 8
10. Stop
Server
1. Start
2. Create UDP datagram socket, make it a listening socket
3. Receive the request message sent by the client
4. If the received message is “END” go to step 10
5. Retrieve the client’s IP address from the request message received
6. Display the received message
7. Get the reply message from the user
8. Send the reply message to the client
9. Repeat the steps from 3 to 8.
10. Stop.
PSEUDOCODE
UDP server
Create socket
Bind socket to a specific port where clients can contact you
Loop (Receive UDP Message from client x)+ (Send UDP Reply to client x)*
Close Socket
UDP client
Create socket
Loop (Send Message To Well-known port of server)+ (Receive Message From Server)
Close Socket
OUTPUT:
Server
C:\ProgramFiles\Java\jdk1.5.0\bin>[Link]
C:\ProgramFiles\Java\jdk1.5.0\bin>javaUDPserver
press ctrl+c to quit the
programClient:Hai Server
Server:Hello
ClientClient:How
are YouServer:Iam
Fine
Client
C:\ProgramFiles\Java\jdk1.5.0\bin>[Link]:\Program
Files\Java\jdk1.5.0\bin>javaUDPclientserver waiting
Client:Hai
ServerServer:Hello
ClieClient:Howare
YouServer:IamFine
RESULT:
Multi-client chatting in TCP and UDP using Socket programming is executed successfully.
EXNO:6 Implementation of HTTP, Web Caching, FTP using socket programming
AIM
To write a java program for socket for HTTP for web page upload and download .
PROCEDURE:
• HTTP means HyperText Transfer Protocol. HTTP is the underlying protocol used by
the World Wide Web and this protocol defines how messages are formatted and
transmitted, and what actions Web servers and browsers should take in response to
various commands.
• For example, when you enter a URL in your browser, this actually sends an HTTP
command to the Web server directing it to fetch and transmit the requested Web page.
• The other main standard that controls how the World Wide Web works is HTML,
which covers how Web pages are formatted and displayed. HTTP functions as
a request–response protocol in the client–server computing model.
• A web browser, for example, may be the client and an application running on a
computer hosting a website may be the server.
• The client submits an HTTP request message to the server. The server, which
provides resources such as HTML files and other content, or performs other functions
on behalf of the client, returns a responsemessage to the client.
• The response contains completion status information about the request and may also
contain requested content in its message body.
PSEUDOCODE:
Client:
Begin
Create socket and establish the connection with the server.
Read the image to be uploaded from the disk
Send the image read to the server
Terminate the connection
End.
Server:
Begin
Create socket, bind IP address and port number with the created socket and make servera
listening server.
Accept the connection request from the client
Receive the image sent by the client.
Display the image.
Close the connection.
End.
OUTPUT:
When you run the client code, following output screen would appear on client side.
RESULT
Thus socket for HTTP for web page upload and download is executed successfully.
EXNO:7 Develop a DNS client server to resolve the given host name or IP address
AIM
To write a java program for DNS application
PROCEDURE:
• The Domain Name System (DNS) is a hierarchical decentralized naming system for
computers, services, or other resources connected to the Internet or a private network. It
associates various information with domain names assigned to each of the participating
entities.
• The domain name space refers a hierarchy in the internet naming structure. This
hierarchy has multiple levels (from 0 to 127), with a root at the top. The following
diagram shows the domain name space hierarchy.
• Name server contains the DNS database. This database comprises of various names and
their corresponding IP addresses. Since it is not possible for a single server to maintain
entire DNS database, therefore, the information is distributed among many DNS servers.
• DNS is a TCP/IP protocol used on different platforms. The domain name space is divided
into three different sections: generic domains, country domains, and inverse domain.
• The main function of DNS is to translate domain names into IP Addresses, which
computers can understand.
•
• It also provides a list of mail servers which accept Emails foreach domain name. Each
domain name in DNS will nominate a set of name servers to be
authoritative for its DNS records.
PSEUDOCODE
Server
1. Begin
2. Create UDP datagram socket
3. Create a table that maps host name and IP address
4. Receive the host name from the client
5. Retrieve the client’s IP address from the received datagram
6. Get the IP address mapped for the host name from the table.
7. Display the host name and corresponding IP address
8. Send the IP address for the requested host name to the client
9. End
Client
Begin
Create UDP datagram socket.
Get the host name from the client
Send the host name to the server
Wait for the reply from the server
Receive the reply datagram and read the IP address for the requested host name
Display the IP address.
End.
OUTPUT
Server
javac [Link]
java udpdnsserver
Press Ctrl + C to Quit Request for host [Link]
Request for host [Link]
Request for host [Link]
Client
>javac [Link]
>java udpdnsclient
Enter the hostname : [Link]
IP Address: [Link]
>java udpdnsclient
Enter the hostname : [Link]
IP Address: [Link]
>java udpdnsclient
Enter the hostname : [Link]
IP Address: Host Not Found
RESULT:
Thus the java application program using UDP Sockets to implement DNS was developed and
executed successfully
EXNO:8 Simulation of unicast routing protocols
AIM:
To write a ns2 program for implementing unicast routing protocol.
PROCEDURE:
• When a device has multiple paths to reach a destination, it always selects one path
by preferring it over others. This selection process is termed as Routing. Routing
is done by special network devices called routers or it can be done by means of
software processes.
• The software based routers have limited functionality and limited scope.A router
is always configured with some default route. A default route tells the router
where to forward a packet if there is no route found for specific destination.
• In case there are multiple path existing to reach the same destination, router can
make decision based on the following [Link] can be statically
configured or dynamically learnt. One route can be configured to be preferred over
[Link] of the traffic on the internet and intranets known as unicast data or
unicast traffic is sent with specified destination. Routing unicast data over the
internet is called unicast routing.
• It is the simplest form of routing because the destination is already known. Hence
the router just has to look up the routing table and forward the packet to next hop.
• Multicasting in computer network is a group communication, where a sender(s)
send data to multiple receivers simultaneously. It supports one – to – many and
many – to – many data transmission across LANs or WANs. Through the process
of multicasting, the communication and processing overhead of sending the same
data packet or data frame in minimized.
AIM:
To simulate the Distance vector and link state routing protocols using NS2.
A distance-vector routing protocol requires that a router informs its neighbors of topology
changes periodically. Compared to link-state protocols, which require a router to inform all the
nodes in a network of topology changes, distance-vector routing protocols have less computational
complexity and message overhead.
The term distance vector refers to the fact that the protocol manipulates vectors (arrays)
of distances to other nodes in the network. The vector distance algorithm was the original
ARPANET routing algorithm and was also used in the internet under the name of RIP (Routing
Information Protocol).Examples of distance-vector routing protocols include RIPv1 and RIPv2
and IGRP.
Method
Routers using distance-vector protocol do not have knowledge of the entire path to a
destination. Instead they use two methods:
1. Direction in which router or exit interface a packet should be forwarded.
2. Distance from its destination
Distance-vector protocols are based on calculating the direction and distance to any link in
a network. "Direction" usually means the next hop address and the exit interface. "Distance" isa
measure of the cost to reach a certain node. The least cost route between any two nodes is the route
with minimum distance. Each node maintains a vector (table) of minimum distance to
every node. The cost of reaching a destination is calculated using various route metrics. RIP uses
the hop count of the destination whereas IGRP takes into account other information such as node
delay and available bandwidth.
Updates are performed periodically in a distance-vector protocol where all or part of a
router's routing table is sent to all its neighbors that are configured to use the same distance- vector
routing protocol. RIP supports cross-platform distance vector routing whereas IGRP is a Cisco
Systems proprietary distance vector routing protocol. Once a router has this information it is able
to amend its own routing table to reflect the changes and then inform its neighbors of the changes.
This process has been described as ‗routing by rumor‘ because routers are relying on the
information they receive from other routers and cannot determine if the information is actually
valid and true. There are a number of features which can be used to help with instability and
inaccurate routing information.
EGP and BGP are not pure distance-vector routing protocols because a distance-vector
protocol calculates routes based only on link costs whereas in BGP, for example, the local route
preference value takes priority over the link cost.
Count-to-infinity problem
The Bellman–Ford algorithm does not prevent routing loops from happening and suffers
from the count-to-infinity problem. The core of the count-to-infinity problem is that if A tells B
that it has a path somewhere, there is no way for B to know if the path has B as a part of it. To see
the problem clearly, imagine a subnet connected like A–B–C–D–E–F, and let the metric between
the routers be "number of jumps". Now suppose that A is taken offline. In the vector- update-
process B notices that the route to A, which was distance 1, is down – B does not receive the vector
update from A. The problem is, B also gets an update from C, and C is still not aware of the fact
that A is down – so it tells B that A is only two jumps from C (C to B to A), which is false. This
slowly propagates through the network until it reaches infinity (in which case the algorithm
corrects itself, due to the relaxation property of Bellman–Ford).
ALGORITHM:
ALGORITHM:
1. Create a simulator object
2. Set routing protocol to Distance Vector routing
3. Trace packets on all links onto NAM trace and text trace file
4. Define finish procedure to close files, flush tracing and run NAM
5. Create eight nodes
6. Specify the link characteristics between nodes
7. Describe their layout topology as a octagon
8. Add UDP agent for node n1
9. Create CBR traffic on top of UDP and set traffic parameters.
10. Add a sink agent to node n4
11. Connect source and the sink
12. Schedule events as follows:
a. Start traffic flow at 0.5
b. Down the link n3-n4 at 1.0
c. Up the link n3-n4 at 2.0
d. Stop traffic at 3.0
e. Call finish procedure at 5.0
13. Start the scheduler
14. Observe the traffic route when link is up and down
15. View the simulated events and trace file analyze it
16. Stop
OUTPUT
$ ns [Link]
RESULT:
Thus the simulation for Distance vector and link state routing protocols was
done usingNS2.
EX NO:10 Simulation of Transport layer Protocols and analysis of congestion control
techniques inthe network.
AIM:
To Study Network simulator (NS).and Simulation of Congestion Control
Algorithms using NS
PROCEDURE:
Ad hoc routing,
mobile IP, sensor-
MAC Tracing,
visualization and
various utilitie
NS(Network
Simulators)
Packet loss
Throughput
Queue Length
A queuing system in networks can be described as packets arriving for
service, waiting for service if it is not immediate, and if having waited for
service, leaving the system after being served. Thus queue length is very
important characteristic to determine that how well the active queue
management of the congestion control algorithm has been working.
RESULT:
Thus we have Studied Network simulator (NS) and Simulation of Congestion Control
Algorithms using NS.