0% found this document useful (0 votes)
16 views82 pages

BCA Computer Network Lab Guide

The Computer Network Lab Manual outlines assignments for BCA students, focusing on networking components, transmission media, and practical experiments. Key topics include familiarization with LAN devices, cable preparation, TCP/IP configuration, and network topologies. The manual also details various types of cables, their characteristics, and the use of tools like crimping tools and connectors.

Uploaded by

xomawe6409
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views82 pages

BCA Computer Network Lab Guide

The Computer Network Lab Manual outlines assignments for BCA students, focusing on networking components, transmission media, and practical experiments. Key topics include familiarization with LAN devices, cable preparation, TCP/IP configuration, and network topologies. The manual also details various types of cables, their characteristics, and the use of tools like crimping tools and connectors.

Uploaded by

xomawe6409
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 82

Lab Manual of Computer Network

UGCA 1916

COURSE: BCA
SESSION: July-Dec,2024
FACULTY: Ms. Anjali

Computer Network Lab Manual By Ms. Anjali


List of assignments:
1. Familiarization with networking components and devices: LAN Adapters, Hubs,
Switches, Routers etc
2. Familiarization with transmission media and tools: Coaxial cable, UTP cable,
Crimping tool, Connectors etc
3. Preparing straight and cross cables
4. Study of various LAN topologies and their creation using network devices, cables
and computers
5. Configuration of TCP/IP Protocols in Windows and Linux
6. Implementation of resource sharing (file, printer etc.)
7. Designing and implementing class A, B and C networks
8. Subnet planning and its implementation
9. To configure dynamic IP address for a computer connected to a LAN
10. Use of commands like ping, ipconfig for trouble shooting network related
Problems
11. Develop a program to compute the Hamming Distance between any two code
Words
12. Installation of FTP server and client
13. To configure proxy server
14. Familiarization with network simulation tools.

Computer Network Lab Manual By Ms. Anjali


Experiment 1.
AIM: Familiarization with Networking Components and
devices: LAN Adapters, Hubs, Switches, Routers etc.

LAN Adapter

An expansion board that is used to connect a computer or computing device to a network. LAN adapter
is the most common and generic alternate name for a Network Interface Card (NIC). However, many
similar products, such as a Wireless USB LAN Adapter is also called a LAN adapter.

Wireless USB LAN adapter

A high-speed wireless network card that is used to access a network through a USB port on a computer or
laptop. Most wireless USB LAN adapters look like small USB flash drives and usually are based on the
802.11g standard which provides a data rate up to 54-Mbps in a wireless LAN environment. Some
wireless USB LAN adapters may also support the 802.11b standard. A wireless USB LAN adapter
basically enables you to share files, folders, printers, other network resources and Internet access.

[Type text][Type text][Type text]


Network Hub

Definition: In computer networking, a hub is a small, simple, inexpensive device that joins
multiple computers together. Many network hubs available today support the Ethernet standard.
Other types including USB hubs also exist, but Ethernet is the type traditionally used in home
networking.

Technically speaking, two different types of hubs exist:

● passive

● active

Passive hubs do not amplify the electrical signal of incoming packets before broadcasting them out to the
network. Active hubs, on the other hand, do perform this amplification, as does a different type of
dedicated network device called a repeater. Some people use the terms concentrator when referring to a
passive hub and multiport repeater when referring to an active hub.

Network switch

A network switch (sometimes known as a switching hub) is a computer networking device that is used to
connect devices together on a computer network. A switch is considered more advanced than a hub
because a switch will only send a message to the device that needs or requests it, rather than broadcasting
the same message out of each of its ports.

A switch is a multi-port network bridge that processes and forwards data at the data link layer (layer 2)
of the OSI model. Some switches have additional features, including the ability to route packets. These
switches are commonly known as layer-3 or multilayer switches.

4
Router

Router: Routers are devices (computers) containing software that help in determining the best path out of
the available paths, for a particular transmission. They consist of a combination of hardware and
software. The hardware includes the physical interfaces to the various networks in the internet work. The
two main pieces of software in a router are the operating system and the routing protocol.

Routers use logical and physical addressing to connect two or more logically separate networks. They
accomplish this connection by organizing the large network into logical network segments or sub-
networks. Each of these sub networks is given a logical address. This allows the networks to be separate
but still access each other and exchange data when necessary. Data is grouped into packets, or blocks of
data. Each packet, in addition to having a physical device address, has a logical network address.

Routers are frequently used to interconnect identical networks as well as to interconnect networks with
different types of hardware.

How Routers Works

Routers are interconnectivity devices that are used to transfer the datum packets along networks by
visualizing the networks path. Routers visualizing the networks path to many networks such as
Electronic networks, Transport networks and phone networks. Two ways are exist for routers operation
using either control plane or forwarding plane. In control plane the router sends the precise data packets
to their specific location. On the other hand in forwarding plane router does not remember the sending or
receiving information about the packets.

Advantages of Routers

Routers route the data in an organized way. Routers generate a reliable connection between hosts. Routers
is used for alternatively incase the main is fail to transfer data.

5
SAMPLE VIVA QUESTION:
Q.1) How to connect LAN Cable with Routers?

Q.2)What is Network layer performance?


Q3How to establish connection between routers?

Q.4) what are the key notes of Application layer?

6
Experiment 2.
AIM: Familiarization with Transmission media and Tools: Co- axial cable, UTP Cable,
Crimping Tool, Connectors etc.

What is transmission media?

Transmission media is a pathway that carries the information from sender to receiver. We use different
types of cables or waves to transmit data. Data is transmitted normally through electrical or
electromagnetic signals.

An electrical signal is in the form of current. An electromagnetic signal is series of electromagnetic


energy pulses at various frequencies. These signals can be transmitted through copper wires, optical
fibers, atmosphere, water and vacuum Different Medias have different properties like bandwidth, delay,
cost and ease of installation and maintenance. Transmission media is also called Communication
channel.

Types of Transmission Media

1. Wired or Guided Media or Bound Transmission Media

2. Wireless or Unguided Media or Unbound Transmission Media

Wired or Guided Media or Bound Transmission Media: Bound transmission media are the cables that are
tangible or have physical existence and are limited by the physical geography. Popular bound
transmission media in use are twisted pair cable, co-axial cable and fiber optical cable. Each of them has
its own characteristics like transmission speed, effect of noise, physical appearance, cost etc.

Wireless or Unguided Media or Unbound Transmission Media: Unbound transmission media are the
ways of transmitting data without using any cables. These media are not bounded by physical geography.
This type of transmission is called Wireless communication. Nowadays wireless communication is
becoming popular. Wireless LANs are being installed in office and college campuses. This transmission
uses Microwave, Radio wave, Infra red are some of popular unbound transmission media

Guided Transmission Media

Types of Twisted Pair

The two types of twisted pairs are:


7
1. Unshielded twisted pair (UTP)

2. Shielded twisted pair (STP)

1. Unshielded Twisted Pair (UTP)

It consists of colour-coded copper wires, but does not include any foil or braiding as insulator to protect
against interference.

Wire pairs within each cable have varied amounts of twists per foot to produce cancellation. There are
different categories of UTP.

The following table shows the UTP categories, the no. of pairs in each, and the grade of cable each uses
and how they are implemented.

2. Shielded Twisted Pair (STP)

STP is made up of pairs of copper wires that are twisted together.

The pairs are covered in a foil or braided mesh, as well as outer PVC jacket.

This foil or mesh prevents the penetration of electromagnetic noise and eliminate cross talk.

8
This shielding must be grounded to prevent the foil or braided mesh from becoming a magnet for
electricity.

Advantage of STP over UTP

STP is less susceptible to noise as compared to UTP and therefore reduces the cross talk and interference.

Disadvantages of STP

1. It must be properly grounded.

2. It is more expensive than UTP.

3. It is difficult to terminate.

Advantages of Twisted pair cable

1. It can be used to carry both analog and digital data.

2. It is relatively easy to implement and terminate.

3. It is the least expensive media of transmission for short distances.

4. If portion of a twisted pair cable is damaged it does not effect the entire network.

Disadvantages of Twisted pair cable

1. It offers poor noise immunity as a result signal distortion is more?

2. Attenuation is very high.

3. It supports lower bandwidth as compared to other Medias. It supports 10 mbps upto a distance of
100 meters on a 10BASE-T.
4. It offers very poor security and is relatively easy to tap.
9
5. Being thin in size, they are likely to break easily.

Coaxial Cable

Coaxial cable has two wires of copper. The core wire lies in center and is made of solid conductor. Core
is enclosed in an insulating sheath. Over the sheath the second wire is wrapped around and that too in
turn encased by insulator sheath. This all is covered by plastic cover.

Because of its structure coax cables are capable of carrying high frequency signals than that of twisted
pair cables. The wrapped structure provides it a good shield against noise and cross talk. Coaxial cables
provide high bandwidth rates of up to 450 mbps.

There are three categories of Coax cables namely, RG-59 (Cable TV), RG-58 (Thin Ethernet) and RG-11
(Thick Ethernet. RG stands for Radio Government.

Cables are connected using BNC connector and BNC-T. BNC terminator is used to terminate the wire at
the far ends.

10
Fiber-Optics Cable

A cable with central glass tube covered with protective shield which transmit data using photons is fiber
optics cable. These cables transmit data via concentrated bursts of laser beams which are carried through
bundles of hair thin glass fibers.

They have advantages over electronic cables in transmission speed and volume. This technology has
revolutionized telecommunication applications which used electronic cables. Fiber optics cables as free
from electro-magnetic interference as well as wire tapping . fiber optics cable considered a broad band
communication channel.

Unguided Transmission Media

Unguided transmission media extend beyond the limiting confines of cabling. They provide an excellent
Communication Networks alternative for WANS. The lack of physical restrictions provides larger
bandwidth as well as wide area capabilities. Unbound media typically operate at very high frequencies.
The three types of unbound transmission media are:

● Radio wave.

● Micro wave.

● Infrared.

11
Radiowave Transmission
Although Radio waves are prevalent and well understood, we are just beginning to realize their enormous potential
as a networking medium. Radio waves can operate on a single or multiple frequency bands.

Radiowaves are omni directional i.e. they travel in all the directions from the source. Because of this
property, transmitter and receiver need not to be aligned. Radiowaves can penetrate buildings easily, so
they are widely use for communication both indoors outdoors.

At high frequencies, radiowaves tends to travel in straight line and bounce off the obstacles. They are also
absorbed by rain. Radiowaves are widely used for AM and FM radio, television, cordless telephone,
cellular phones, paging and wireless LAN.

Microwave Transmission

Microwaves have been used in data communications for a long time. They have a higher frequency than
radio waves and therefore can handle larger amounts of data.

Microwave transmission is line of sight transmission. The transmit station must be in visible contact with
the receive station. This sets a limit on the distance between stations depending on the local geography.
Typically the line of sight due to the Earth's curvature is only 50 km to the horizon! Repeater stations
must be placed so the data signal can hop, skip and jump across the country. microwave circuits
considered a broad band communication channel. Microwaves operate at high operating frequencies of 3
to 10 GHz. This allows them to carry large quantities of data due to their large bandwidth .

List the Advantages of microwaves.

They require no right of way acquisition between towers.

They can carry high quantities of information due to their high operating frequencies.

Low cost land purchase: each tower occupies only a small area.

High frequency/short wavelength signals require small antennae.

Disadvantages of Microwaves

● Attenuation by solid objects: birds, rain, snow and fog.

● Reflected from flat surfaces like water and metal.

● Diffracted (split) around solid objects.

● Refracted by atmosphere, thus causing beam to be projected away from receiver

12
Infrared

Infrared offers a great unbound photonic solution. Like fiber-optic cabling, infrared communications use
light, so they are not bound by the limitations of electricity.

Crimping tool

A crimping tool is a tool designed to crimp or connect a connector to the end of a cable. For example,
network cables and phone cables are created using a crimping tool to connect the RJ-45 and RJ-11
connectors to the end of the cable. In the example below picture, this crimper is capable of crimping a RJ-
11 (6-Pin) and RJ-45 (8-Pin) connectors and also includes a wire cutter near the handles that can be used
to cut phone or CAT5 cable.

Connectors

RJ-45 Connecter

The RJ-45 connector is a form of telephone connector. It sees its most frequent use as a local- area
network connector, and is frequently referred to simply as an Ethernet connector.

13
BNC Connecter

This connector is commonly used on a Token Ring network. BNC is also short for Bayonet Nut
Connector or British Naval/Navy Connector although more appropriately known as the Bayonet Neill
Concelman. In the picture to the right, is an example of a BNC connector on the end of a coaxial cable.

SAMPLE QUESTION:

Q.1)What is RJ-45?

Q.2) Differentiate between radiowave and microwave ?


Q.3) How to establish transmission medium to twisted pair?

Q.4)What is STP & UTP cable?

14
Experiment 3.
AIM: Preparing straight and cross cables.
Straight-Through Wired Cables

Straight-Through refers to cables that have the pin assignments on each end of the cable. In other words
Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2 ect. Straight-Through wired cables are
most commonly used to connect a host to client. When we talk about cat5e patch cables, the Straight-
Through wired cat5e patch cable is used to connect computers, printers and other network client devices
to the router switch or hub (the host device in this instance).

15
Crossover Wired Cables

An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices together
directly. Normal straight through or patch cables were used to connect from a host network interface
controller (a computer or similar device) to a network switch, hub or router. A cable with connections that
"cross over" was used to connect two devices of the same type: two hosts or two switches to each other.

SAMPLE QUESTION:
16
Q.) Define Crossover Wired Cables

Q.2)
How to prepare straight and wiring cable?

17
Experiment 4.
AIM:Study of various LAN topologies and their creation using network devices, cables and computers.
Types of Topology:-

Bus topology

Bus Topology is the simplest of network topologies. In this type of topology, all the nodes (computers as
well as servers) are connected to the single cable (called bus), by the help of interface connectors. This
central cable is the backbone of the network and is known as Bus (thus the name). Every workstation
communicates with the other device through this Bus.

18
Advantages (benefits) of Bus Topology

1. It is easy to set-up and extend bus network.

2. Cable length required for this topology is the least compared to other networks.

3. Bus topology costs very less.

4. Linear Bus network is mostly used in small networks. Good for LAN.

Disadvantages (Drawbacks) of Bus Topology

1) There is a limit on central cable length and number of nodes that can be connected.

2) Dependency on central cable in this topology has its disadvantages. If the main cable (i.e.
bus ) encounters some problem, whole network breaks down.

3) Proper termination is required to dump signals. Use of terminators is must.

4) It is difficult to detect and troubleshoot fault at individual station.

5) Maintenance costs can get higher with time.

6) Efficiency of Bus network reduces, as the number of devices connected to it increases.

7) It is not suitable for networks with heavy traffic.

8) Security is very low because all the computers receive the sent signal from the source.

Star topology

In Star topology, all the components of network are connected to the central device called “hub” which
may be a hub, a router or a switch. Unlike Bus topology (discussed earlier), where nodes were connected
to central cable, here all the workstations are connected to central device with a point-to-point connection.
So it can be said that every computer is indirectly connected to every other node by the help of “hub”.

18
Advantages of Star Topology

1) As compared to Bus topology it gives far much better performance, signals don’t necessarily
get transmitted to all the workstations.

2) Easy to connect new nodes or devices. In star topology new nodes can be added easily
without affecting rest of the network. Similarly components can also be removed easily.

3) Centralized management. It helps in monitoring the network.

4) Failure of one node or link doesn’t affect the rest of network. At the same time its easy to detectthe
failure and troubleshoot it.

Disadvantages of Star Topology

1) Too much dependency on central device has its own drawbacks. If it fails whole network goes down.

2) The use of hub, a router or a switch as central device increases the overall cost of the network.

3) Performance and as well number of nodes which can be added in such topology is depended
on capacity of central device.

Ring Topology

In Ring Topology, all the nodes are connected to each-other in such a way that they make a closed loop.
Each workstation is connected to two other components on either side, and it communicates with these
two adjacent neighbors. Data travels around the network, in one direction. Sending and receiving of data
takes place by the help of TOKEN.
Advantages of Ring Topology

1) This type of network topology is very organised. Each node gets to send the data when it receives an
empty token. This helps to reduces chances of collision. Also in ring topology all the traffic flows in
only one direction at very high speed.

2) Even when the load on the network increases, its performance is better than that of Bus topology.

3) There is no need for network server to control the connectivity between workstations.

4) Additional components do not affect the performance of network.

5) Each computer has equal access to resources.

Disadvantages of Ring Topology

1) Each packet of data must pass through all the computers between source and destination. This makes
it slower than Star topology.

2) If one workstation or port goes down, the entire network gets affected.

3) Network is highly dependent on the wire which connects different components.

4) MAU’s and network cards are expensive as compared to Ethernet cards and hubs.

Mesh Topology

In a mesh network topology, each of the network node, computer and other devices, are interconnected
with one another. Every node not only sends its own signals but also relays data from other nodes. In fact
a true mesh topology is the one where every node is connected to every other node in the network. This
type of topology is very expensive as there are many redundant connections, thus it is not mostly used in
computer networks. It is commonly used in wireless networks. Flooding or routing technique is used in
mesh topology.
Advantages of Mesh topology

1) Data can be transmitted from different devices simultaneously. This topology can withstand
high traffic.2) Even if one of the components fails there is always an alternative present. So data
transfer doesn’t get affected.

3) Expansion and modification in topology can be done without disrupting other nodes.

Disadvantages of Mesh topology

1) There are high chances of redundancy in many of the network connections.

2) Overall cost of this network is way too high as compared to other network topologies.

3) Set-up and maintenance of this topology is very difficult. Even administration of the network is tough.

Tree Topology

Tree Topology integrates the characteristics of Star and Bus Topology. Earlier we saw how in Physical
Star network Topology, computers (nodes) are connected by each other through central hub. And we also
saw in Bus Topology, work station devices are connected by the common cable called Bus. After
understanding these two network configurations, we can understand tree topology better. In Tree
Topology, the numbers of Star networks are connected using Bus. This main cable seems like a main
stem of a tree, and other star networks as the branches. It is also called Expanded Star Topology.
Ethernet protocol is commonly used in this type of topology. The diagram below will make it clear.
Advantages of Tree Topology

1. It is an extension of Star and bus Topologies, so in networks where these topologies can't be
implemented individually for reasons related to scalability, tree topology is the best
alternative.

2. Expansion of Network is possible and easy.

3. Here, we divide the whole network into segments (star networks), which can be easily managed
and maintained.

Disadvantages of Tree Topology

1. Because of its basic structure, tree topology, relies heavily on the main bus cable, if it breaks
whole network is crippled.

2. As more and more nodes and segments are added, the maintenance becomes difficult.

3. Scalability of the network depends on the type of cable used.

Hybrid Topology

Before starting about Hybrid topology, we saw that a network topology is a connection of various links
and nodes, communicating with each other for transfer of data. We also saw various advantages and
disadvantages of Star, Bus, Ring, Mesh and Tree topologies.

Now lets discuss what Hybrid Network topology is and why it finds its application in Wide Area
Networks. Hybrid, as the name suggests, is mixture of two different things. Similarly in this type of
topology we integrate two or more different topologies to form a resultant topology which has good
points (as well as weaknesses) of all the constituent basic topologies rather than having characteristics of
one specific topology. This combination of topologies is done according to the requirements of the
organization.
Let's see the benefits and drawbacks of this networking architecture

Advantages of Hybrid Network Topology

1) Reliable: Unlike other networks, fault detection and troubleshooting is easy in this type of
topology. The part in which fault is detected can be isolated from the rest of network and required
corrective measures can be taken, WITHOUT affecting the functioning of rest of the network.

2) Scalable: Its easy to increase the size of network by adding new components, without
disturbing existing architecture.

3) Flexible: Hybrid Network can be designed according to the requirements of the organization and
by optimizing the available resources. Special care can be given to nodes where traffic is high as well
as where chances of fault are high.

4) Effective: Hybrid topology is the combination of two or more topologies, so we can design it in such
a way that strengths of constituent topologies are maximized while there weaknesses are neutralized. For
example we saw Ring Topology has good data reliability (achieved by use of tokens) and Star topology
has high tolerance capability (as each node is not directly connected to other but through central device),
so these two can be used effectively in hybrid star-ring topology.

Disadvantages of Hybrid Topology

1) Complexity of Design: One of the biggest drawback of hybrid topology is its design. Its not easy to
design this type of architecture and its a tough job for designers. Configuration and installation
process needs to be very efficient.

2) Costly Hub: The hubs used to connect two distinct networks, are very expensive. These hubs are
different from usual hubs as they need to be intelligent enough to work with different architectures
and should be function even if a part of network is down.

3) Costly Infrastructure: As hybrid architectures are usually larger in scale, they require a lot of
cables, cooling systems, sophisticate network devices, etc.

SAMPLE QUESTION:

Q.1)Explain topology?

Q2) Difference between Mesh topology and hybrid topology?

Q.3)What are the main role of Bus Topology?

Q.4) What is T-Connector?


Experiment 5.
AIM: Configuration of TCP/IP Protocols in Windows and Linux.
For Windows XP

Step 1

Click Start->Control Panel->select and double click Network and internet connections-

>select and double click Network

Connections. Step 2

Double-click the Local Area Connection icon; highlight Internet Protocol (TCP/IP) tab in the

Local Area Connection Properties window that appears:

Step 3

Double click it or click Properties. The TCP/IP Properties window will display
Step 4

Now you have two ways to configure the TCP/IP protocol below:

1. Assigned by DHCP Sever

Select Obtain an IP address automatically and Obtain DNS Server address automatically, as shown in the
figure below. These may be selected by default. Then click OK to save setting.

2. Assigned manually

1) Select Use the following IP address, as shown in the following figure.

If the router’s LAN IP address is 192.168.1.1, please type in IP address 192.168.1.x (x is from 2 to 253
), subnet mask 255.255.255.0, and default gateway 192.168.1.1.

2) Select Use the following DNS server addresses, as shown in the following figure. And then type
the DNS server IP address, which should be provided by your ISP. Finally remember to click OK to
save settings.

Note: In most cases, type your local area DNS server IP addresses into it . The Preferred DNS server is
same to default gateway. For Secondary DNS server, you could leave it blank or type in 8.8.8.8.
Step 5

Click OK to save and apply your settings.

For Windows Vista & Windows 7 Step

Click on windows key+ R key on the keyboard at the same time.

Step 2

Type ncpa . cpl in the box, then press OK.


Step 3

Select the local area connection, right click it and select Properties.

Step 4

Select Internet Protocol Version 4(TCP/IPv4), double click it or click Properties.


Step 5

There are two ways to configure the TCP/IP Properties, Assigned by DHCP server

automatically or manually.

1. Assigned by DHCP server

Select Obtain an IP address automatically and Obtain DNS server address automatically. If necessary,
then click OK to save the settings.

2. Assigned manually

1) Select Use the following IP address, type IP address, subnet mask and default gateway IP address
into it.

If the router’s LAN IP address is 192.168.1.1, please type in IP address 192.168.1.x (x is from 2 to 253
), subnet mask 255.255.255.0, and default gateway 192.168.1.1.
2) Select Use the following DNS server addresses, as shown in the following figure. And then type
the DNS server IP address, which should be provided by your ISP. If necessary, then click OK to save
the settings.

Note: In most cases, type your local area DNS server IP addresses into it.

The Preferred DNS server is same to default gateway. For Secondary DNS server, you could leave it
blank or type in 8.8.8.8.

Step 6

Click OK to save and apply your settings

Configuration of TCP/IP protocols in Linux:-


This article covers the main TCP/IP network configuration files used by Linux to configure various
network services of the system such as IP Address, Default Gateway, Name servers - DNS, hostname and
much more. Any Linux Administrator must be well aware where these services are configured and to use
them. The good news is that most of the information provided on this article apply's to Red hat Fedora,
Enterprise Linux, Ubunto and other similar Linux distributions.

On most Linux systems, you can access the TCP/IP connection details within 'X Windows' from
Applications > Others > Network Connections. The same may also be reached through Application >
System Settings > Network > Configure. This opens up a window, which offers configuration of IP
parameters for wired, wireless, mobile broadband, VPN and DSL connections:

The Basic Commands for Networking

The basic commands used in Linux are common to every distro:

ifconfig - Configures and displays the IP parameters of a network interface

route - Used to set static routes and view the routing table

hostname - Necessary for viewing and setting the hostname of the system

netstat - Flexible command for viewing information about network statistics, current connections,
listening ports

arp - Shows and manages the arp table

ip - Multi-purpose command for viewing and setting TCP/IP parameters and routes.

tc - Traffic control command, used for classifying, prioritizing, sharing, and limiting both inbound and
outbound traffic.

SAMPLE QUESTION:
Q.1) How to configure of TCP/IP?

Q.2) Explain hostname and arpname of networking ?

Q.3) How to Assigned by DHCP server?

Q.4) What is Secondary DNS server?


Experiment 6.
AIM: Implementation of resource sharing(file,
printer etc).

You can turn your humble Windows client computer running Windows 7 or
Windows 8 into a server computer so that other computers on your network can
use your printer and any folders that you decide you want to share. In effect, your
computer functions as both a client and a server at the same time. A couple of
examples show how:

● It’s a client when you send a print job to a network printer or when you access a
file stored on another server’s hard drive.
● It’s a server when someone else sends a print job to your printer or accesses a file stored on
your computer’s hard drive.

Here are the steps to enable file and printer sharing in Windows 7:
1. Click the Start button, type Control Panel, and press Enter.

2. Double-click the Network and Sharing Center icon and then click Change
Advanced Sharing Settings.
This step opens the Advanced Sharing Settings page, which lists network
settings for each network you’re connected to.
o For a home computer running Windows 7: Two networks are listed: Home or
Work, and Public.
o In Windows 8: The Home or Work network is called Private.
o For a computer connected to a domain network: A third network named Domain
is listed.
3. Click the down arrow next to the network you want to enable file and printer sharing for.
o For a home computer: Click the down arrow next to Home or Work (Windows
7) or Private (Windows 8).
o For a computer connected to a domain network: Click the down arrow next
to Domain.

The figure shows the settings for a Domain network. The settings for a Home or
Work network are the same. Do not enable file or printer sharing for the Public
network. Enabling file or printer sharing on a public network exposes your
computer’s data to other users on the same public network.
4. Select the Turn on File and Printer Sharing option.
5. Click the Save Changes button.
This action saves your changes and closes the Advanced Sharing Settings page.

SAMPLE QUESTION:

Q.1) What are the steps to enable a file?


Q.2) Explain the implementation of resources sharing?
Experiment 7.
AIM: Designing and implementing class A , B ,
and C networks.

A B and C Classes of Networks

Internet addresses are allocated by the InterNIC (http://www.internic.net ), the


organization that administers the Internet. These IP addresses are divided into
classes. The most common of these are classes A, B, and C. Classes D and E exist,
but are not generally used by end users. Each of the address classes has a different
default subnet mask. You can identify the class of an IP address by looking at its
first octet. Following are the ranges of Class A, B, and C Internet addresses, each
with an example address:

Class A networks use a default subnet mask of 255.0.0.0 and have 0-127 as their
first octet. The address 10.52.36.11 is a class A address. Its first octet is 10, which
is between 1 and 126, inclusive.

Class B networks use a default subnet mask of 255.255.0.0 and have 128-191 as
their first octet. The address 172.16.52.63 is a class B address. Its first octet is
172, which is between 128 and 191, inclusive.

Class C networks use a default subnet mask of 255.255.255.0 and have 192-223 as
their first octet. The address 192.168.123.132 is a class C address. Its first octet is
192, which is between 192 and 223, inclusive.

Class A Network (/ 8 Prefixes)

This network is 8-bit network prefix. Its highest bit is set to 0, and contains a
7-bit network number and a 24-bit host number.

A maximum of 126, which is (2 7 -2,) networks can be defined; two is subtracted


because all an (0 and 1) subnet cannot be used in certain routers using RIP-1
Protocol. Each network supports a maximum of 16,777,214 (2 24 -2) hosts per
network. You must subtract two because the base network represents host “0”, and
the last host on the network is actually used for 1s (“broadcast”) and may not be
assigned to any host.
The class A network address block contains 2 31 power (2,147,483,648)
individual addresses. The IPv4 address space contains a maximum of 2 32
power (4,294,967,296) addresses, which mean that a class A network address
space is 50% of the total IPv4 unicast, address space.

Class B Networks (/16 Prefixes)

This network is a 16-bit network prefix; its highest bit order is set to 1-0. It is a
14-bit network number with a 16-bit host number.

This class defines 16,384 (2 14 ) /16 networks, and supports a maximum of


65,534 (2 16 -2) hosts per network. Class B /16 block address is
(1,073,741,824) = 2 30; therefore it represent 25% of the total IPV4.

Class C Networks (/24 Prefixes)

This is a 24-bit network prefix; it has a 3 bit set to the highest order 1-1-0. It is a
21-bit network number with 8-bit host number.

This class defines a maximum of 2,097,152 (2 21 ) /24 networks. And each


network supports up to 254 (2 8 -2) hosts. The entire class C network represents 2
29 (536,870,912) addresses; therefore it is only 12.5 % of the total IPv4.

SAMPLE QUESTION:

Q.1) How to design CLASS A network?

Q.20 How to design CLASS B & CLASS C?


EXPERIMENT 8 : Subnet planning and its
implementation.

A sub network, or subnet, is a logically visible subdivision of an IP network.

The practice of dividing a network into two or more networks is called sub

netting.

All computers that belong to a subnet are addressed with a common,

identical, most- significant bit-group in their IP address. This results in the

logical division of an IP address into two fields, a network or routing prefix

and the rest field or host identifier. The rest field is an identifier for a

specific host or network interface.

The routing prefix is expressed in CIDR notation. It is written as the first

address of a network, followed by a slash character (/), and ending with the

bit-length of the prefix. For example, 192.168.1.0/24 is the prefix of the

Internet Protocol Version 4 network starting at the given address, having 24

bits allocated for the network prefix, and the remaining 8 bits reserved for

host addressing. The IPv6 address specification 2001:db8::/32 is a large

address block with 2 96 addresses, having a 32-bit routing prefix. In IPv4


the routing prefix is also specified in the form of the subnet mask, which is

expressed in quad-dotted decimal representation like an address. For

example, 255.255.255.0 is the network mask for the 192.168.1.0/24 prefix.

Traffic between sub networks is exchanged or routed with special gateways

called routers which constitute


the logical or physical boundaries between the subnets.

The benefits of sub netting vary with each deployment scenario. In the

address allocation architecture of the Internet using Classless Inter-Domain

Routing (CIDR) and in large organizations, it is necessary to allocate

address space efficiently. It may also enhance routing efficiency, or have

advantages in network management when subnet works are

administratively controlled by different entities in a larger organization.

Subnets may be arranged logically in a hierarchical architecture, partitioning an

organization's network address space into a tree-like routing structure.

IPv4 sub netting

The process of sub netting involves the separation of the network and

subnet portion of an address from the host identifier. This is performed by

a bitwise AND operation between the IP address and the (sub) network

mask. The result yields the network address or prefix, and the remainder is

the host identifier.

Determining the network prefix

An IPv4 network mask consists of 32 bits, a sequence of ones (1) followed

by a block of 0s. The trailing block of zeros (0) designates that part as being

the host identifier.

The following example shows the separation of the network prefix and the host

identifier from an address (192.168.5.130) and its associated /24 network mask
(255.255.255.0). The operation is visualized in a table using binary address

formats.
The mathematical operation for calculating the network prefix is the bitwise

AND of IP address and subnet mask. The result of the operation yields the

network prefix 192.168.5.0 and the host number 130.

Subnetting

Subnetting is the process of designating some high-order bits from the host

part and grouping them with the network mask to form the subnet mask.

This divides a network into smaller subnets. The following diagram

modifies the example by moving 2 bits from the host part to the subnet

mask to form four smaller subnets one quarter the previous size:
Subnetting Classes

A Class A, B, or C TCP/IP network can be further divided, or subnetted,

by a system administrator. This becomes necessary as you reconcile the

logical address scheme of the Internet (the abstract world of IP addresses

and subnets) with the physical networks in use by the real world.

A system administrator who is allocated a block of IP addresses may be

administering networks that are not organized in a way that easily fits

these addresses. For example, you have a wide area network with 150

hosts on three networks (in different cities) that are connected by a

TCP/IP router. Each of these three networks has 50 hosts. You are

allocated the class C network 192.168.123.0. (For illustration, this address

is actually from a range that is not allocated on the Internet.) This means

that you can use the addresses 192.168.123.1 to 192.168.123.254 for your

150 hosts.

Two addresses that cannot be used in your example are 192.168.123.0 and

192.168.123.255 because binary addresses with a host portion of all ones

and all zeros are invalid. The zero address is invalid because it is used to

specify a network without specifying a host. The 255 address (in binary

notation, a host address of all ones) is used to broadcast a message to every

host on a network. Just remember that the first and last address in any

network or subnet cannot be assigned to any individual host.

You should now be able to give IP addresses to 254 hosts. This works fine if

all 150 computers are on a single network. However, your 150 computers
are on three separate physical networks. Instead of requesting more address

blocks for each network, you divide your network into subnets that enable

you to use one block of addresses on multiple physical networks.

In this case, you divide your network into four subnets by using a subnet

mask that makes the network address larger and the possible range of host

addresses smaller. In
other words, you are 'borrowing' some of the bits usually used for the
host address, and

using them for the network portion of the address. The subnet mask

255.255.255.192 gives you four networks of 62 hosts each. This works

because in binary notation, 255.255.255.192 is the same as

1111111.11111111.1111111.11000000.

The first two digits of the last octet become network addresses, so you get

the additional networks 00000000 (0), 01000000 (64), 10000000 (128)

and 11000000 (192). (Some administrators will only use two of the

subnetworks using 255.255.255.192 as a subnet mask. For more

information on this topic, see RFC 1878.) In these four networks, the last

6 binary digits can be used for host addresses.

Using a subnet mask of 255.255.255.192, your 192.168.123.0 network

then becomes the four networks 192.168.123.0, 192.168.123.64,

192.168.123.128 and

192.168.123.192.

These four networks would have as valid host

addresses: 192.168.123.1-62

192.168.123.65-126

192.168.123.129-190

192.168.123.193-254

Remember, again, that binary host addresses with all ones or all zeros
are invalid, so you cannot use addresses with the last octet of 0, 63, 64,

127, 128, 191, 192, or 255. You can see how this works by looking at

two host addresses, 192.168.123.71 and 192.168.123.133. If you used

the default Class C subnet mask of 255.255.255.0, both addresses are on

the 192.168.123.0 network. However, if you use the subnet mask of

255.255.255.192, they are on different networks; 192.168.123.71 is on

the
192.168.123.64 network, 192.168.123.133 is on the

192.168.123.128 network. Default gateways

If a TCP/IP computer needs to communicate with a host on another network,

it will usually communicate through a device called a router. In TCP/IP

terms, a router that is

specified on a host, which links the host's subnet to other networks, is called

a default gateway. This section explains how TCP/IP determines whether or not to

send packets

to its default gateway to reach another computer or device on the network.


When a host attempts to communicate with another device using TCP/IP,

it performs a comparison process using the defined subnet mask and the

destination IP address versus the subnet mask and its own IP address. The

result of this comparison tells the computer whether the destination is a

local host or a remote host.

If the result of this process determines the destination to be a local host,

then the computer will simply send the packet on the local subnet. If the

result of the comparison determines the destination to be a remote host,

then the computer will forward the packet to the default gateway defined in

its TCP/IP properties. It is then the responsibility of the router to forward

the packet to the correct subnet

SAMPLE QUESTION:
Q.1)How do you implement subnet?

Q.2)What is the Subnet mask of 172.16.0.0.16?

Q.3)How many subnets we can create?

Q.4) Is a subnet mask is always 255?


EXPERIMENT 9 :
AIM: To configure dynamic IP address for a
computer connected to a LAN.
Although static IP addresses can be used with workstations, most workstations use
dynamic or alternative IP addressing, or both. You configure dynamic and
alternative addressing by completing the following steps:

1. Click Start and then click Network. In Network Explorer, click Network And
Sharing Center on the toolbar.
2. In Network And Sharing Center, click Manage Network Connections.
3. In Network Connections, right-click the connection you want to work with and
then select Properties.
4. In the Local Area Connection Status dialog box, click Properties. This displays the
Local Area Connection Properties dialog box.
Note In the Local Area Connection Status dialog box, one LAN connection
is shown for each network adapter installed. These connections are created
automatically. If you don't see a LAN connection for an installed adapter,
check the driver for the adapter. It might be installed incorrectly.
5. Double-click Internet Protocol Version 6 (TCP/IPv6) or Internet Protocol Version
4 (TCP/IPv4) as appropriate for the type of IP address you are configuring.
6. Select Obtain An IPv6 Address Automatically or Obtain An IP Address Automatically
as appropriate for the type of IP address you are configuring. If desired, select Obtain
DNS Server Address Automatically. Or select Use The Following DNS Server
Addresses and then type a preferred and alternate DNS server address in the text boxes
provided.
7. When you use dynamic IPv4 addressing with desktop computers, you should configure
an automatic alternative address. To use this configuration, on the Alternate
Configuration tab, select Automatic Private IP Address. Click OK twice, click Close,
and then skip the remaining steps.
8. When you use dynamic IPv4 addressing with mobile computers, you'll usually want to
configure the alternative address manually. To use this configuration, on the Alternate
Configuration tab, select User Configured. Then in the IP Address text box, type the
IP address you want to use. The IP address that you assign to the computer should be a
private IP address, as shown in Table and it must not be in use anywhere else when the
settings are applied.
9. With dynamic IPv4 addressing, complete the alternate configuration by entering a
subnet mask, default gateway, DNS, and WINS settings. When you're finished, click
OK twice and then click Close.

SAMPLE QUESTION:

Q.1) What protocols is used to assigned computers on a LAN dynamics IP addressed?

Q.2) How do I setup a dynamics IP addresses on my computer?

Q.3) How can a computer connected to the network obtain an IP address dynamically using DHCP?

Q.4) Explain DHCP ?


Experiment 10.
AIM:Use of commands like ping, ipconfig etc for troubleshooting network related problems.
Ping
The most commonly used network tool is the ping utility. This utility is used to provide a basic
connectivity test between the requesting host and a destination host. This is done by using the Internet
Control Message Protocol (ICMP) which has the ability to send an echo packet to a destination host and a
mechanism to listen for a response from this host. Simply stated, if the requesting host receives a
response from the destination host, this host is reachable. This utility is commonly used to provide a basic
picture of where a specific networking problem may exist. For example, if an Internet connection is down
at an office, the ping utility can be used to figure out whether the problem exists within the office or
within the network of the Internet provider. Figure 1 below shows an example of the ping utility being
used to obtain the reachability status of the locally connected router.
Tracert / traceroute

Typically, once the ping utility has been used to determine basic connectivity, the tracert/traceroute utility
can used to determine more specific information about the path to the destination host including the route
the packet takes and the response time of these intermediate hosts. Figure 2 below shows an example of
the tracert utility being used to find the path from a host inside an office to www.google.com. The tracert
utility and traceroute utilities perform the same function but operate on different operating systems,
Tracert for Windows machines and traceroute for Linux/*nix based machines.

Ipconfig/ifconfig

One of the most important things that must be completed when troubleshooting a networking issue is to
find out the specific IP configuration of the variously affected hosts. Sometimes this information is
already known when addressing is configured statically, but when a dynamic addressing method is used,
the IP address of each host can potentially change often. The utilities that can be used to find out this IP
configuration information include the ipconfig utility on Windows machines and the ifconfig utility on
Linux/*nix based machines. Figure 3 below shows an example of the ifconfig utility showing the IP
configuration information of a queries host.
Nslookup

Some of the most common networking issues revolve around issues with Dynamic Name System (DNS)
address resolution issues. DNS is used by everyone using the Internet to resolve commonly known
domain names (i.e. google.com) to commonly unknown IP addresses (i.e. 74.125.115.147). When this
system does not work, most of the functionality that people are used to goes away, as there is no way to
resolve this information. The nslookup utility can be used to lookup the specific IP address(es) associated
with a domain name. If this utility is unable to resolve this information, there is a DNS issue. Along with
simple lookup, the nslookup utility is able to query specific DNS servers to determine an issue with the
default DNS servers configured on a host. Figure 4 below shows an example of how the nslookup utility
can be used to query the associated IP address information.
SAMPLE QUESTION:

Q.1) Which command is used to troubleshoot network connectivity?


Q.2) what is ipconnfig used for troubleshooting?
Q.3) Top 9 Commands Of Networks?
Q.4) Which command line contains a powerful suite tools?
Experiment 11 :
AIM: Develop a program to compute the
hamming distance between any node code words.

Hamming distance between two Integers


Given two integers, the task is to find the hamming distance between two integers.
Hamming Distance between two integers is the number of bits which are different
at same position in both numbers.

Examples:

Input: n1 = 9, n2 =

14 Output: 3

9 = 1001, 14 = 1110

No. of Different bits = 3

Input: n1 = 4, n2

= 8 Output: 2

Approach:

Calculate the XOR of two

numbers. Count the number of

set bits.

Below is the implementation of above approach:


C++

#include <bits/stdc+
+.h> using
namespace std;

// Function to calculate hamming


distance int hammingDistance(int
n1, int n2)
{
int x = n1 ^
n2; int
setBits = 0;

while (x > 0)
{ setBits += x
& 1; x >>= 1;
}

return setBits;
}

// Driver
code int
main()
{
int n1 = 9, n2 = 14;
cout << hammingDistance(9, 14) << endl;

return 0;
}
Python

def hammingDistance(n1,
n2) : x = n1 ^ n2
setBits = 0

while (x > 0) :
setBits += x
& 1 x >>= 1

return setBits

if name ==' main ':


n1 = 9
n2 = 14
print(hammingDistance(9, 14))

Output :

SAMPLE QUESTION:

Q.1) What is the hamming distance between two pairs of words 000 011 and 10101?
Q.2) How do you find the hamming distance for any set of code words?
Q.3) what is the hamming distance between 11011011 and 01001101?
Q.4) what is Hamming Code?
EXPERIMENT 12 :
AIM: Installation of FTP server and client.
Having your own FTP server gives a ton of benefits. For starters, it is private and
you have complete control over who is accessing it and what is being transferred.

It is also fast, though the exact speed depends on your Internet connection.
Besides, there is no restriction whatsoever on the amount and type of data you can
store or transfer. Due to these benefits, many people prefer to set up their own FTP
server.

If you’re one of them, the good news is Windows offers feature that makes it easy
to set up and manage your own FTP server.

In this guide, we’ll talk about the setup process and how you can manage a FTP
server on Windows 10. If you have older operating systems, the process is more or
less similar.

Setting up an FTP server in Windows 10


Below are step-by-step instructions on how you can setup an FTP server in Windows 10.

Installing an FTP server on Windows 10

● Open the Power User menu and navigate to “programs and features” section. You can
use the Windows + X keyboard shortcut to get to the Power User menu.
● On the left pane, you’ll find an option called “turn Windows features on or off.” Click
the link.
● You’ll get a list of folders. Expand the folder called “Internet information services”
and check the “FTP server” option.

● Make sure to check the option called “FTP extensibility” as well

● Below “Internet information services” folder, you’ll find another folder called
“Web management tools.” Check that folder too, and leave the default options.
● Finally, click the OK button to start the installation.

● Once the installation is done, click the close button.

Configuring an FTP server on Windows 10


● Once you have installed the FTP server, the next step is to configure it. The steps for
this process are as follows.

● power user menu with Windows + X shortcut.

● Open administrative tools.

● Double-click Internet information services (IIS) manager.

● In the next window, expand the folders on your left side pane and navigate to “sites.”

● Right-click “sites” and choose “add FTP site” option. This will create an FTP
connection for you.
● Give a name to your site and enter the path of the FTP folder that you want to use to
send and receive files. Alternately, you can also choose to create a new folder to store
your FTP files. Just depends on your personal preferences.
● Click “next.”
● In this screen, change SSL setting to “no SSL.” Leave the other default settings.
● If you’re configuring a business site, make sure to choose "require SSL" option, as it
will add an extra layer of security to the transfer.
● Click “next” and you’ll get the authentication screen.

● Navigate to the authentication section of this screen, and select the “basic” option.

● In the authorization section, type “specified users” from the drop-down menu.

● In the text box below, type the email ID of your Windows 10 account to give you
access to the FTP server. You can add more users too if you like.
● In the permission section, check both read and write boxes.
● Finally, click “finish.”
With this, you’re done setting up an FTP server on your Windows 10 machine.

However, you’ll have to do some more things to start using FTP server to send and
receive files.

Allowing FTP to pass through Windows Firewall

Windows Firewall doesn’t allow connections to access the FTP server. This means
you’ll have to specifically tell the firewall to give access to this server. You can do
that with the following steps.

● Search for Windows firewall in Windows start menu and press “enter.”

● On the left-side pane, you’ll see “allow an app or feature through Windows
Firewall” option. Click on it.
● When the next window opens, click on “change settings” button.

● From the list, check “FTP server” and allow it on both private and public networks.

● Once done, click OK


That’s it. Now, you should be able to connect to your FTP server from your local
network.

External connections
The above steps will allow you to connect to the newly created FTP server from
your local network. But if you want to access it through the Internet or from
another PC, you’ll have to configure it separately.

● Setting up external connections

● If you want to reach your FTP server through the Internet, do the following configuration.

● Open command prompt.

● Type “ipconfig” command and press enter.

● Note down the default gateway IP address. Typically, it starts with 192 and
looks something like this, 192.168.1.1.
● Next, open the default web browser and type the router’s IP address. Press enter.

● You’ll get a prompt for credentials. Enter your router username and password.

● Navigate to WAN or NAT settings and here you’ll find “port forwarding” section.
The exact location differs from router to router, so you’ll have to search for this
setting.
● Next, create a new port forwarding with the following details.
1. Service name - give a name to your service. It can be anything like “FTP_server”
or “my_ftp_Server” or just about anything you like.
2. Port range — Use only port 21.
3. Local IP - Type ipconfig again and the IP address of IPv4 is your local IP. Enter
that value here.
4. Local port - Use 21 again. No other port should be used.
5. Protocol — Enter TCP.

● Once you’ve configured port forwarding, apply the changes.


This should allow you to access FTP server through the Internet and also from other PCs

Now that your FTP server is set up, configured, and accessible from other
computers, you start sending and receiving files.

Next, we’ll see how you can upload and download files from your FTP server.

Uploading files on FTP server


To upload files on your FTP server,

● Open file explorer

● On the address bar, type your FTP address in the format “FTP://xxx.xxx.xxx.xxx.”

● You’ll get a prompt for username and password. Enter your credentials.

● You can even choose to save your password by checking the “save password” option.

● Click “log on.”

After you log in, you can upload or download files. Typically, it will be like
another drive on your computer.
Now, you might wonder how useful an FTP server is if it can be accessed only by
you to upload and download files. Though you can do it all on your drive itself,
why even go through the process of setting up and configuring an FTP server.

Well, the advantage is you can add as many users as you like and you can allow
them to access your server. You can even give specific permissions to each user.
Configuring multiple users
As with setup and configuration, there are multiple procedures involved to allow
other users to access your FTP server.
Create multiple FTP accounts
To allow other users to access your FTP server, you have to create separate
Windows 10 account for each user. To do that:

● Open settings app. You can do that with Windows key + I.

● Click accounts.

● Navigate to the left-side pane, where you’ll see an option called “family & other
users”. Click the link.
● On the right-hand side, look for the option “add someone else to this PC.”

● In the next screen, you’ll be prompted to enter that person’s email ID or phone number.
Look for a link called “I don’t have this person’s sign in information” at the bottom left.
Click the link.
● In the next screen, you’ll be asked to enter the personal details of the new user. If you
know the other person’s Microsoft account details, you can enter. Otherwise, look for
a link called “add a user without a Microsoft account” on the bottom left again.

● In the next screen, enter the details of the user. Choose a strong password for your
own security as this server can be accessed from the Internet.
These steps allow you to create a new user. Next, you’ll have to add this
user account to the FTP folder.

Add a new user to the FTP folder

You have to explicitly add a new user account to the FTP folder, in order
for that user to access it. The steps for the same are:

● Navigate to the FTP folder, right-click on it and select “properties.”

● Click the “security” tab and navigate to “edit” button.

● Look for “Add” button in the next screen and click on it.

● This will open the “select users or groups” dialog box. In this screen, enter the name
of the user you want to add in the text area. Click on “check names” button to make
sure that you have entered the right name. Click OK.
● This will take you back to the “add button” screen. But this time, you’ll find the new
user in group or user names list located just above the add button.
● Select the newly added user account and set the permissions for this user. Once
done, click “apply” and OK.
Configure the user to access the FTP folder
Once you’ve added the user, you have to configure to ensure that the user can access the folder. To do
that:

● Go to control panel and open administrative tools.

● Double-click Internet information services (IIS) manager.

● Expand the left-hand pane and navigate to sites. Click on sites and you’ll see your FTP
server. Select this server.
● On the right-hand pane, you’ll see many options. Look for authorization rules. Right-click on
it and select “add allow rules” from the context menu.
● In the next screen, choose “selected users” option and enter the Windows 10 account
you created earlier. Set the permission you’d like this user to have. Click OK
Now the user you created is all set to access your FTP folder.

SAMPLE QUESTION:

Q1)How to setup FTP server clients?

Q2) How does FTP clients server works?

Q.3) How many ports are used in FTP to connect client and server?

Q4) How to install and configure FTP Server?


EXPERIMENT 13 :
AIM: To configure proxy server.

Configure a proxy server on Windows, and Windows applications will send your
network traffic through the proxy server. For example, you may need to use a
proxy server provided by your employer.

The settings you choose will be used for Microsoft Edge, Google Chrome, Internet
Explorer, and other applications that use your system proxy settings. Some
applications, including Mozilla Firefox, allow you to set custom proxy settings
that override your system settings. Here’s how to set up a system-wide proxy in
Windows 10, 8, and 7.

Windows 8 and 10

On Windows 10, you’ll find these options under Settings > Network & Internet >
Proxy. On Windows 8, the same screen is available at PC Settings > Network
Proxy.
The settings here apply when you’re connected to Ethernet and Wi-FI network
connections, but won’t be used when you’re connected to a VPN.
By default, Windows attempts to automatically detect your proxy settings
with the “Automatically detect settings” option. Specifically, Windows uses
the Web Proxy Auto- Discovery Protocol, or WPAD. Business and school
networks may use this feature to automatically provide proxy settings to all
PCs on their networks. If the network you’re
connected to requires a proxy and it provides that proxy via WPAD, Windows will
automatically configure and use the proxy. If the network doesn’t provide a proxy,
it won’t use a proxy at all. If you don’t want Windows to automatically detect
proxy settings, set the “Automatically detect settings” option here to “Off”.
Windows will then only use a proxy if you configure one under Manual proxy
setup.

In some cases, you may need to manually enter the address of a setup script for
your proxy configuration. To do so, enable the “Use setup script” option here.
Plug the network address of the script into the “Script address” box, and click
“Save”. This script may also be referred to as a
.PAC file.
Your organization or proxy provider will provide you with the address of the setup
script, if you need one.

To enter manual proxy settings, enable “Use a proxy server” under Manual
proxy setup. Enter the address of the proxy server and the port it uses in the
“Address” and “Port” box.
Your organization or proxy service provider will provide you with the
network address and port number the proxy requires.
When you connect to any address, Windows will send the traffic through the
proxy server. However, you can configure a list of addresses that Windows won’t
use the proxy server for. By default, the list includes only *.local . The asterisk is a
wildcard and means “anything”. So, if you attempt to connect to server.local,
database.local, or anything else that ends with .local, Windows will bypass the
proxy and connect directly.

You can add more entries to this list. Just separate each with a semicolon ( ; )
and a space. For example, let’s say you wanted to bypass the proxy when
connecting to howtogeek.com. You’d enter:

*.local; howtogeek.com
You can also check the “Don’t use the proxy server for local (intranet) addresses”.
Windows will bypass the proxy server when you connect to resources on your
local network, or intranet. When you connect to addresses on the Internet,
Windows will use the proxy server.

Click “Save” when you’re done to change your proxy settings.

SAMPLE QUESTION:
Q.1) How to configure a proxy server?

Q.2) How to create a proxy configure scripts?


Q3) What is an example of a proxy server address?

Q4)How to proxy setting setting windows 10?


EXPERIMENT 14 :
AIM: Familiarization with network simulation
tools.

Networking Tools:

GNS3- Design and Configure:

GNS3 (Graphical Network System 3) is an emulation software that let’s you see
the interaction of network devices in a network topology. It is mainly used for
training in International Network Certifications and it is the Open source
alternative to the Cisco Packet Tracer Software and it has some additional
functions like interacting with Virtual Machines, Docker emulation, etc.

Below is the configuration:

The first step in the configuration of a device is to add it to the GNS3 map. Figure
1 shows the 7200 device that will be used in this example.
Figure 1 – Main GNS3 Map
Figure 2 shows the process of dragging the 7200 from the node types pane to the main
map pane.
Figure 2 – Dragging a Device to the Map Pane

Once the device has been dragged over to the main GNS3 pane it will be displayed
as shown in Figure 3.

Figure 3 – Complete Map


To configure the device it must be right-clicked and the Configure option must be
selected from the menu. Figure 4 shows the menu that will be displayed when a
device is right-clicked.
Figure 4 – Right-Clicked Menu
Once Configure is selected the Node configuration window shown in Figure 5 will be
displayed.

Figure 5 – Node Configuration Window


To configure the device select it from the left pane. Figure 6 shows how the right
pane changes when the device is selected. The general options available for the
selected device are shown including any hardware options, depending on the
platform. In this case the 7200 platform midplane (how the modules connect to the
NPE) and NPE (processor card) are configured from this screen.
Figure 6 – Device Configuration Node Window
The memories and disks tab offers the ability configure the memory and disk
allocation for the device. The size of the RAM required depends on the specific
image being used; generally 256 Mbytes is sufficient for most images (to be sure,
it can be checked at Cisco’s Feature Navigator Site (linkto:
http://tools.cisco.com/ITDIT/CFN/jsp/index.jsp). The typical default NVRAM size
is 128 Kbytes and the size of the disk depends on the specific requirements of the
lab; generally a disk is not required for a simple lab.

Figure 7 – Device Memory and Disk Configuration.

Figure 8 shows the “Slots” tab; the number of configurable slots that are available on each specific
platform will be shown. In this case the 7206 supports a total of 6 full module slots and another slot that
is part of the processor card (slot 0).
.Figure 8 – Device Slots Tab
Figure 9 shows the different options that are available in Slot 0 of the 7200
platform; as stated before, the options are limited because it is part of the
processor card.

Figure 9 – 7200 Slot 0 Adapter Options

Figure 10 shows the different options that are available on Slot 1 (which will be
the same with Slot 2 through Slot 6). From the options available, as shown in
Figures 9 and 10, select the modules that meet the network topology requirements
of the intended lab. For the purposes of this article it is not important.
Figure 10 – 7200 Slot 1 through Slot 6 Adapter Options.
The next tab allows the configuration of the configuration register; for normal operation this
is typically set to 0x2102. The base MAC address can also be configured as well; this is
handy if you are testing a feature that uses this value.

Figure 11 – Advanced Node Configuration Tab


Once the configuration has been completed, it is possible to see most of these options selected
by putting the mouse curser over the configured device as shown in Figure 12.

Figure 12 – Configuration Summary.

SAMPLE QUESTION:
Q.1) Which tools are used for network simulation?
Q.2) how is simulation playing a important role in networking?
Q3.) Why do we need network simulation tools?
Q.4) Define comparative study of wireless network simulations?

You might also like