0% found this document useful (0 votes)
19 views3 pages

CN 04

computer network

Uploaded by

Aashman Verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views3 pages

CN 04

computer network

Uploaded by

Aashman Verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

DEPARTMENT OF

COMPUTER SCIENCE &

Experiment 2.1
Student Name: Ansh Jain UID: 22BCS15216
Branch: BE-CSE Section/Group: 603 - B
Semester: 5th Date of Performance:6/09/24
Subject Name: Computer Network Subject Code: 22CSH-312

1. Aim: - Implement Data link Layer Protocols such as


CSMA,CSMA/CD etc

2. Requirements (Hardware/Software): 3PCs with NIU card,


Network Emulation Unit, Jumper cables

3. Theory –
Carrier Sense Multiple Access With Collision Avoidance (CSMA/CA), in
computer networking, is a wireless network multiple access method in
which: • a carrier sensing scheme is used. • a node wishing to transmit
data has to first listen to the channel for a predetermined amount of time
to determine whether or not another node is transmitting on the channel
within the wireless range. If the channel is sensed "idle," then the node is
permitted to begin the transmission process. If the channel is sensed as
"busy," the node defers its transmission for a random period of time. Once
the transmission process begins, it is still possible for the actual
transmission of application data to not occur. CSMA/CA is a modification
of pure Carrier Sense Multiple Access (CSMA). Collision avoidance is
used to improve CSMA performance by not allowing wireless
transmission of a node if another node is transmitting, thus reducing the
probability of collision due to the use of a random time. Optionally, but
almost always implemented, an IEEE 802.11 RTS/CTS exchange can be
required to better handle situations such as the hidden node problem in
wireless networking.
DEPARTMENT OF
COMPUTER SCIENCE &

4. Procedure:
1. Launch Packet Tracer and create a new network topology.
2. Place PCs or end devices on the workspace.
3. Connect each device to a central switch using Ethernet cables.
Alternatively, use a hub for early Ethernet simulation.
4. Double-click on each PC or end device to configure basic network
settings (IP address, subnet mask, gateway). Focus on Layer 2 settings
as IP configuration is secondary to CSMA/CD operations.
5. CSMA/CD operates primarily at the data-link layer (Layer 2).
6. Ensure all Ethernet interfaces on devices and the switch/hub are
operational (indicated by green lights).
7. Open a command prompt or terminal on one PC.
8. Initiate a ping command to another PC/device in the network to
simulate data transmission.
9. When a PC/device wishes to transmit data, it first senses (Carrier Sense)
if the Ethernet medium is free.
10. If the medium is busy, the device waits for a random period
(Multiple Access) before attempting to transmit.
11. Upon successful transmission, continue to monitor for collisions
(Collision Detection).
12. If a collision occurs (detected by simultaneous transmissions from
multiple devices), devices stop transmitting, wait for a random backoff
period, and re-attempt transmission
13. Use Packet Tracer's interface to observe activities such as lights on
switch ports (indicating activity and collisions).
14. Monitor the command prompt or terminal for ping responses and
any delays due to collisions.
15. Experiment with different numbers of devices or varying traffic
loads to observe how CSMA/CD adapts to changing network conditions.

5. Output:
DEPARTMENT OF
COMPUTER SCIENCE &

6. Learning Outcome:

1. Understand Data Link Layer Fundamentals: Gain a deep


understanding of the role of the Data Link Layer in the OSI model,
focusing on framing, error detection, and flow control.
2. Explore CSMA Mechanisms: Learn how Carrier Sense Multiple Access
(CSMA) works by sensing the medium before transmitting data to avoid
collisions in shared communication channels.
3. Efficiency Comparison: Analyze the efficiency and limitations of
different protocols, such as comparing CSMA to CSMA/CD and
understanding their usage scenarios in different network topologies.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy