100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Networking and Operating System £6.11
Add to cart

Other

Networking and Operating System

 0 purchase

This document shows how the networking system works from router to device and how the wifi works.

Preview 4 out of 52  pages

  • April 4, 2022
  • 52
  • 2020/2021
  • Other
  • Unknown
All documents for this subject (1)
avatar-seller
prashantgurung
ACKNOWLEDGEMENT
The provided coursework came to an end with great progress and gaining of
knowledge. The course work was very fruitful for us. We were able to complete the
coursework with the help, support and proper guidance from our module leader, Mr.
Badri Lamichhane sir, who provided us with easy and understanding explanation about
the coursework giving us his valuable time and feedbacks on our work. With the proper
guidance and supervision, we were able to complete our coursework before the
deadline.
We are thankful for our college premises for providing us with online classes during the
pandemic of corona virus/ covid-19. The classes helped us to communicate properly
and efficiently with our module leader and helped us to get in touch with the module
leader regarding the coursework. We were able to gain a lot of knowledge with the help
of online classes which was very helpful.


ABSTRACT
The coursework is an individual work assigned for Network and Operating System. The
work was divided into two parts; Task A and Task B. For task A, our work was to create
a real time stimulation of point-to-point network and WAN using COMNET III. We had to
setup two ATM transactions in two branches of Asia Bank in Nepal which were Itahari
and Butwal. There are total 3 LANs: Edinburgh LAN, Itahari LAN, and Butwal LAN and 1
WAN Cloud. Edinburgh is Headquarter for Asia Bank.


For Task B, We are supposed to write a report about Wireless Network, its history,
advantages and disadvantages, IEEE 802.11 Architecture, priorities and about Wireless
Technologies. The question says that the report must not exceed 2500 words.

,Table of Contents
1. Task A...............................................................................................................................1
1.1. INTRODUCTION........................................................................................................1
1.2. WAN MODEL.............................................................................................................2
1.2.1. EDINBURG LAN..................................................................................................4
1.2.2. WAN CLOUD.......................................................................................................9
1.2.3. ITAHARI AND BUTWAL LAN............................................................................11
1.3. DESCRIPTION OF REPORTS................................................................................22
1.3.1. NODE REPORT: RECEIVED MESSAGE COUNT...........................................22
1.3.2. LINK REPORT: CHANNEL UTILIZATION........................................................23
1.3.3. WAN CLOUD REPORT: FRAME DELAY, FRAME COUNT, ACCESS LINK
STAT............................................................................................................................24
1.3.4. MESSAGE AND REPORT RESPONSE: MESSAGE DELAY FOR ALL
NODES........................................................................................................................27
1.4. CONCLUSION.........................................................................................................28
2. Task B.............................................................................................................................29
2.1. INTRODUCTION......................................................................................................29
2.2. BACKGROUND........................................................................................................29
2.2.1. WIRELESS NETWORKS...................................................................................29
2.2.2. IEEE 802.11 ARCHITECTURE.........................................................................32
2.2.3. IEEE 802.11 PRIORITIES.................................................................................35
2.2.4. WIRELESS TECHNOLOGIES...........................................................................36
2.3. CONCLUSION.........................................................................................................37
3. REFERENCES AND BIBLIOGRAPHY..........................................................................38
Bibliography........................................................................................................................38
4. APPENDIX......................................................................................................................40
APPENDIX – A Screenshots of Simulation Report.........................................................40
APPENDIX – B Additional Content of Task B................................................................48
APPENDIX – C Glossary (Difficult Words Used in CW Task B meaning).....................48




Table of Figure

,Figure 1: COMNET III ....................................................................................................... 1
Figure 2: WAN Model ........................................................................................................ 2
Figure 3: Edinburgh LAN ................................................................................................... 4
Figure 4 : Edinburgh LAN Properties .................................................................................. 5
Figure 5: Edinburgh Router Properties ................................................................................ 6
Figure 6: Edinburgh Server ................................................................................................ 6
Figure 7: Message Setting .................................................................................................. 7
Figure 8: Packets Setting .................................................................................................... 7
Figure 9: Triggered Sources in Advanced Setting .................................................................. 8
Figure 10: WAN Cloud ....................................................................................................... 9
Figure 11: Access Link Properties ..................................................................................... 10
Figure 12: Virtual Circuit Properties ................................................................................. 10
Figure 13: Itahari LAN .................................................................................................... 11
Figure 14: Butwal LAN .................................................................................................... 11
Figure 15: Itahari Router Properties ................................................................................. 12
Figure 16: Butwal Router Properties ................................................................................. 12
Figure 17: Link Type Setting of Itahari LAN ....................................................................... 13
Figure 18: Link Type Setting of Butwal LAN ....................................................................... 13
Figure 19: Itahari Single Teller ......................................................................................... 14
Figure 20: Butwal Single Teller ........................................................................................ 14
Figure 21: Itahari ATM Properties .................................................................................... 15
Figure 22: Butwal ATM Properties .................................................................................... 16
Figure 23: Scheduling Setting for Teller Request ................................................................ 17
Figure 24: Messages Setting for Teller Request .................................................................. 18
Figure 25: Destinations Setting for Teller Request .............................................................. 18
Figure 26: Packets Setting for Teller Request ..................................................................... 19
Figure 27: Scheduling Setting for ATM Request .................................................................. 20
Figure 28: Message Setting for ATM Request ..................................................................... 20
Figure 29: Destinations Setting for ATM Request ................................................................ 21
Figure 30: Packets Setting for ATM Request ....................................................................... 22
Figure 31: Nodes: Received Message Count ....................................................................... 23
Figure 32: Link: Average Channel Utilization .................................................................... 24
Figure 33: WAN CLOUD: FRAME DELAY ........................................................................ 25
Figure 34: WAN CLOUD: FRAME COUNT ....................................................................... 26
Figure 35: WAN CLOUDS: ACCESS LINK STATS ............................................................. 27
Figure 36: MESSAGE + RESPONSE SOURCE: AVERAGE MESSAGE DELAY .................... 28
Figure 37: BSS and ESS configuration of IEEE 802.11 WLAN ............................................. 33
Figure 38: Access point-based topology ............................................................................. 34
Figure 39: Traffic prioritization in IEEE 802.11aa. ............................................................. 35

, Table of Tables
Table 1: Node Report: Received Message Count ................................................................. 22
Table 2: LINK: Channel Utilization ................................................................................... 23
Table 3: WAN CLOUD: FRAME DELAY ........................................................................... 24
Table 4: WAN CLOUD: FRAME COUNT .......................................................................... 25
Table 5: WAN CLOUD: ACCESS LINK STATS .................................................................. 26
Table 6: MESSAGE + RESPONSE SOURCE: MESSAGE DELAY ........................................ 27

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller prashantgurung. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £6.11. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

64796 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 15 years now

Start selling
£6.11
  • (0)
Add to cart
Added