Final Project Report
Final Project Report
During this period, the students get the real, first-hand experience for working in the
actual environment. Most of the theoretical knowledge that has been gained during
the course of their studies is put to test here. It covers all that remains uncovered in
the classroom i.e. without it our studies remain ineffective and incomplete. Apart from
this, the students get an opportunity to learn the latest technology, which immensely
helps them in building their career.
I got the opportunity to get this industrial exposure which has increased my sphere of
knowledge to a great extent. All the credit goes to Ethical Hacking Tuition Centre for
providing me the opportunity and facility for making of this dissertation.
1.NETWORKING BASICS
1.1 COMPUTER NETWORK
Sharing files, data, and information. In a network environment, authorized user may
access data and information stored on other computers on the network. The capability
of providing access to data and information on shared storage devices is an important
feature of many networks.
Information preservation.
Security.
Speed up.
1.2 NETWORKING
Networking is a common synonym for developing and maintaining contacts and personal
connections with a variety of people who might be helpful to you and your career.
Networking is the practice of linking two or more computing devices together for the purpose
of sharing data. Networks are built with a mix of computer hardware and computer software.
It is an especially important aspect of career management in the financial services industry,
since it is helps you keep abreast of:
A Local Area Network (LAN) is a network that connects computers and devices in a limited
geographical area such as home, school, computer laboratory, office building, or closely
positioned group of buildings. Each computer or device on the network is a node. Current
wired LANs are most likely to be based on Ethernet technology, although new standards like
ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial
cables, phone lines and power lines)
A personal area network (PAN) is a computer network used for communication among
computer and different information technological devices close to one person. Some
examples of devices that are used in a PAN are personal computers, printers, fax machines,
telephones, PDAs, scanners, and even video game consoles. A PAN may include wired and
wireless devices. The reach of a PAN typically extends to 10 meters. A wired PAN is usually
constructed with USB and Firewire connections while technologies such as Bluetooth and
infrared communication typically form a wireless PAN.
A home area network (HAN) is a residential LAN which is used for communication between
digital devices typically deployed in the home, usually a small number of personal computers
and accessories, such as printers and mobile computing devices. An important function is the
sharing of Internet access, often a broadband service through a CATV or Digital Subscriber
Line (DSL) provider. It can also be referred to as an office area network (OAN).
Wide Area Network
A wide area network (WAN) is a computer network that covers a large geographic area such
as a city, country, or spans even intercontinental distances, using a communications channel
that combines many types of media such as telephone lines, cables, and air waves. A WAN
often uses transmission facilities provided by common carriers, such as telephone companies.
WAN technologies generally function at the lower three layers of the OSI reference model:
the physical layer, the data link layer, and the network layer.
Campus Network
In the case of a university campus-based campus network, the network is likely to link a
variety of campus buildings including; academic departments, the university library and
student residence halls.
A Metropolitan area network is a large computer network that usually spans a city or a large
campus.
A virtual private network (VPN) is a computer network in which some of the links between
nodes are carried by open connections or virtual circuits in some larger network (e.g., the
Internet) instead of by physical wires. The data link layer protocols of the virtual network are
said to be tunneled through the larger network when this is the case. One common application
is secure communications through the public Internet, but a VPN need not have explicit
security features, such as authentication or content encryption. VPNs, for example, can be
used to separate the traffic of different user communities over an underlying network with
strong security features.
2.NETWORK TOPOLOGY
Network topology is the layout pattern of interconnections of the various elements (links,
nodes, etc.) of a computer network. Network topologies may be physical or logical. Physical
topology means the physical design of a network including the devices, location and cable
installation. Logical topology refers to how data is actually transferred in a network as
opposed to its physical design.
Various topologies::
Bus topology
Many devices connect to a single cable "backbone". If the backbone is broken, the entire
segment fails. Bus topologies are relatively easy to install and don't require much cabling
compared to the alternatives.
Fig: 2.1
Ring Topology
In a ring network, every device has exactly two neighbours for communication purposes. All
messages travel through a ring in the same direction. Like the bus topology, a failure in any
cable or device breaks the loop and will take down the entire segment. A disadvantage of the
ring is that if any device is added to or removed from the ring, the ring is broken and the
segment fails until it is "reforged" (by dwarfish goldsmiths?) It is also considerably more
expensive than other topologies.
Fig: 2.2
Star Topology
A star network has a central connection point - like a hub or switch. While it takes more
cable, the benefit is that if a cable fails, only one node will be brought down.
All traffic emanates from the hub of the star. The central site is in control of all the nodes
attached to it. The central hub is usually a fast, self-contained computer and is responsible for
routing all traffic to other nodes. The main advantages of a star network is that one
malfunctioning node does not affect the rest of the network. However this type of network
can be prone to bottleneck and failure problems at the central site.
Fig: 2.3
Tree Topology
Also known as the 'Hierarchical topology', the tree topology is a combination of bus and star
topologies. They are very common in larger networks. A typical scenario is: a file server is
connected to a backbone cable (e.g. coaxial) that runs through the building, from which
switches are connected, branching out to workstations.
Fig: 2.4
Mesh topology
In the topologies shown above, there is only one possible path from one node to another
node. If any cable in that path is broken, the nodes cannot communicate.
Mesh topology uses lots of cables to connect every node with every other node. It is very
expensive to wire up, but if any cable fails, there are many other ways for two nodes to
communicate. Some WANs, like the Internet, employ mesh routing. In fact the Internet was
deliberately designed like this to allow sites to communicate even during a nuclear war.
Fig: 2.5
Hybrid Topology
Hybrid network is the combination of different topologies such as star, Ring, Mesh, Bus etc.
For example, if a department uses a Bus network, second department uses the ring network,
third department uses the Mesh network and fourth department uses the star network. All the
networks of different types (of four departments) can be connected together through a central
hub (in the form of star network) as shown in the figure above.
Fig: 2.6
3.BASIC NETWORKING DEVICES
Computer networking devices are units that mediate data in a computer network. Computer
networking devices are also called network equipment, Intermediate Systems (IS) or
InterWorking Unit (IWU). Units which are the last receiver or generate data are called hosts
or data terminal equipment.
3.1 Routers
A router is a communication device that is used to connect two logically and physically
different networks, two LANs, two WANs and a LAN with WAN. The main function of the
router is to sorting and the distribution of the data packets to their destinations based on their
IP addresses. Routers provides the connectivity between the enterprise businesses, ISPs and
in the internet infrastructure, router is a main device. Cisco routers are widely used in the
world. Every router has routing software, which is known as IOS. Router operates at the
network layer of the OSI model. Router does not broadcast the data packets.
Fig: 3.1
3.2 Switches
Like the router, a switch is an intelligent device that maps the IP address with the MAC
address of the LAN card. Unlike the hubs, a switch does not broadcast the data to all the
computers, it sends the data packets only to the destined computer. Switches are used in the
LAN, MAN and WAN. In an Ethernet network, computers are directly connected with the
switch via twisted pair cables. In a network, switches use the three methods to transmit the
data i.e. store and forward, cut through and fragment free.
Fig: 3.2
3.3 Hubs
The central connecting device in a computer network is known as a hub. There are two types
of a hub i.e. active hub and passive hub. Every computer is directly connected with the hub.
When data packets arrives at hub, it broadcast them to all the LAN cards in a network and the
destined recipient picks them and all other computers discard the data packets. Hub has five,
eight, sixteen and more ports and one port is known as uplink port, which is used to connect
with the next hub.
Fig: 3.3
3.4 Modems
A modem is a communication device that is used to provide the connectivity with the
internet. Modem works in two ways i.e. Modulation and Demodulation. It converts the
digital data into the analogue and analogue to digital.
Fig: 3.4
LAN cards or network adapters are the building blocks of a computer network. No computer
can communicate without a properly installed and configured LAN card. Every LAN card is
provided with a unique IP address, subnet mask, gateway and DNS (if applicable). An
UTP/STP cable connects a computer with the hub or switch. Both ends of the cable have the
RJ-45 connectors one is inserted into the LAN card and one in the hub/switch. LAN cards
are inserted into the expansion slots inside the computer. Different LAN cards support
different speed from 10/100 to 10/1000.
A repeater connects two segments of your network cable. It retimes and regenerates the
signals to proper amplitudes and sends them to the other segments. When talking about,
ethernet topology, you are probably talking about using a hub as a repeater. Repeaters require
a small amount of time to regenerate the signal. This can cause a propagation delay which
can affect network communication when there are several repeaters in a row. Many network
architectures limit the number of repeaters that can be used in a row. Repeaters work only at
the physical layer of the OSI network model.
Fig: 3.6
3.7 Bridge
A bridge reads the outermost section of data on the data packet, to tell where the message is
going. It reduces the traffic on other network segments, since it does not send all packets.
Bridges can be programmed to reject packets from particular networks. Bridging occurs at the
data link layer of the OSI model, which means the bridge cannot read IP addresses, but only
the outermost hardware address of the packet. In our case the bridge can read the ethernet
data which gives the hardware address of the destination address, not the IP address. Bridges
forward all broadcast messages.
Fig: 3.7
The hardware address is also called the MAC (media access control) address
3.8 Gateway
A gateway can translate information between different network data formats or network
architectures. It can translate TCP/IP to AppleTalk so computers supporting TCP/IP can
communicate with Apple brand computers. Most gateways operate at the application layer,
but can operate at the network or session layer of the OSI model. Gateways will start at the
lower level and strip information until it gets to the required level and repackage the
information and work its way back toward the hardware layer of the OSI model. To confuse
issues, when talking about a router that is used to interface to another network, the word
gateway is often used. This does not mean the routing machine is a gateway as defined here,
although it could be.
4.NETWORK MODELS
When dealing with networking, you may hear the terms "network model" and "network
layer" used often. Network models define a set of network layers and how they interact.
There are several different network models depending on what organization or company
started them. The most important two are:
TCP/IP Model: - This model is sometimes called the DOD model since it was designed for
the department of defence. It is also called the internet model because TCP/IP is the protocol
used on the internet.
OSI Network Model: - The International Standards Organization (ISO) has defined a
standard called the Open Systems Interconnection (OSI) reference model. This is a seven
layer architecture listed in the next section.
Fig: 4.1
4.1 Layers in the TCP/IP model
The OSI, or Open System Interconnection, model defines a networking framework for
implementing protocols in seven layers. Control is passed from one layer to the next, starting
at the application layer in one station, and proceeding to the bottom layer, over the channel to
the next station and back up the hierarchy.
Application (Layer 7): This layer supports application and end-user processes.
Communication partners are identified, quality of service is identified, user
authentication and privacy are considered, and any constraints on data syntax are
identified.
Presentation (Layer 6): This layer provides independence from differences in data
representation (e.g., encryption) by translating from application to network format,
and vice versa.
Session (Layer 5): This layer establishes, manages and terminates connections
between applications. The session layer sets up, coordinates, and terminates
conversations, exchanges, and dialogues between the applications at each end. It deals
with session and connection coordination.
Transport (Layer 4): This layer provides transparent transfer of data between end
systems, or hosts, and is responsible for end-to-end error recovery and flow control. It
ensures complete data transfer.
Network (Layer 3): This layer provides switching and routing technologies, creating
logical paths, known as virtual circuits, for transmitting data from node to node.
Data Link (Layer 2): At this layer, data packets are encoded and decoded into bits. It
furnishes transmission protocol knowledge and management and handles errors in the
physical layer, flow control and frame synchronization. The data link layer is divided
into two sub layers: The Media Access Control (MAC) layer and the Logical Link
Control (LLC) layer.
Physical (Layer 1): This layer conveys the bit stream - electrical impulse, light or
radio signal -- through the network at the electrical and mechanical level. .
Sr.
TCP/IP Reference Model OSI Reference Model
No.
Service interface and protocols were not Service interface and protocols are
2
clearly distinguished before clearly distinguished
Networking Cables are used to connect one network device to other or to connect two or
more computers to share printer, scanner etc. Different types of network cables like Coaxial
cable, Optical fiber cable,Twisted Pair cables are used depending on the
network's topology, protocol and size. The devices can be separated by a few meters (e.g.
via Ethernet) or nearly unlimited distances (e.g. via the interconnections of the Internet).
While wireless may be the wave of the future, most computer network today still utilize
cables to transfer signals from one point to another
1) Straight Cable
You usually use straight cable to connect different type of devices. This type of cable will be
used most of the time and can be used to:
2) Crossover Cable
A crossover cable connects two devices of the same type, for example DTE-DTE or DCE-
DCE, usually connected asymmetrically (DTE-DCE), by a modified cable called a crosslink.
Such distinction of devices was introduced by IBM
Sometimes you will use crossover cable, it's usually used to connect same type of devices. A
crossover cable can be used to:
Fig:5.1
Fig: 5.2
Fig: 5.3
INSTALLING CABLES
In today networks, UTP CABLES are commonly used to connect computers in a network.
Depending on the color codings, we have different cables like straight cable, cross cable and
roll-over cable.
STRAIGHT CABLE
The cable used between the PC and the hub/switch is called straight cable.
Straight cable can be used between
PC - SWITCH
PC- HUB
HUB(UPLINK PORT) - HUB
CROSS-OVER CABLE
The cable used to connect two PCs is called cross-over cable.
Cross cable can be used between:
PC - PC
HUB - HUB
SWITCH - SWITCH
ROUTER - PC
ROLL-OVER CABLE
The cable used between a hardware router and a PC is called roll-over cable.
In this cable, the color coding used in one end is reversed in the other end.
DATA TRAVEL ONLY GREEN OR ORANGE PAIR OF CABLE.
6.ADDRESSING IN COMPUTER NETWORKING
NOTE:We use only first three class which is provide by IANA in LAN.
IP Addresses are divided into two parts:
1. Private IP address
2. Public (live) IP address.
Range of Private IP Address:
But in case of your computer has no IP address then IP address is assigned to the
computer from APIPA Range, but communication is not possible when computer has IP
address from APIPA. 127.0.0.1 is the loop back address it is used for self-communication
and for troubleshooting purpose.
Subnet Mask: Subnet Mask is also 32 bit address, which tell us how many bits are used for
network and how many bits are used for host address.
In subnet mask network bits are always 1 and host bits are always 0.
IP Address invalid or reserve IP Address:
When we are going to assign IP Address to our computer interface then we have to follow
some rules:
Rules: -
1. All Host bits cannot be 0 (10.0.0.0), because it represent network address which is reserved
for router.
2. All Host bit cannot be 1 (10.255.255.255.), because it is broadcast address of that network
(10th)network.
3. All bits cannot be 0 (0.0.0.0), because this address is reserved for default routing.
Default routing is used in case of stub n/w (means our network has no exit point).
4. All bits cannot be 1 (255.255.255.255), because it reserved for Broadcasting
7.1 SIMULATOR
Network simulators serve a variety of needs. Compared to the cost and time involved in
setting up an entire test bed containing multiple networked computers, routers and data links,
network simulators are relatively fast and inexpensive. They allow engineers to test scenarios
that might be particularly difficult or expensive to emulate using real hardware- for instance,
simulating the effects of a sudden burst in traffic or a DoS attack on a network service.
The simulator that we have used to create a simulation of the network design of the Project is
CISCO PACKET TRACER.
SS: 7.1
8.PROJECT DESCRIPTION
8.1 Routing
Routing is the process of selecting paths in a network along which to send network
traffic. Routing is performed for many kinds of networks, including the telephone
network (Circuit switching) , electronic data networks (such as the Internet),
and transportation networks. This article is concerned primarily with routing in
electronic data networks using packet switching technology.
Dynamic Routing
Dynamic routing performs the same function as static routing except it is more robust. Static
routing allows routing tables in specific routers to be set up in a static manner so network
routes for packets are set. If a router on the route goes down the destination may become
unreachable. Dynamic routing allows routing tables in routers to change as the possible
routes change. There are several protocols used to support dynamic routing including RIP and
OSPF.
DYNAMIC ROUTING
Routed
Routing
Hybrid
Dist-V Link-S
RIPv1,2
OSPF
Novell RIP IGRP NLSP EIGRP BGPv4
RTMP IS-IS
Fig: 8.1.1
Routed protocols:
TCP/IP, IPX-SPX are protocols which are used in a Local Area Network (LAN) so
computers can communicate between with each other and with other computers on the
Internet.Chances are that in your LAN you are most probably running TCP/IP. This protocol
is what we call a "routed" protocol. The term "routed" refers to something which can be
passed on from one place (network) to another. In the example of TCP/IP, this is when you
construct a data packet and send it across to another computer on the Internet
Routing protocols:
Routing protocols were created for routers. These protocols have been designed to allow the
exchange of routing tables, or known networks, between routers. There are a lot of different
routing protocols, each one designed for specific network sizes, so I am not going to be able
to mention and analyse them all, but I will focus on the most popular.
There are 3 types of Dynamic routing protocols, these differ mainly in the way that they
discover and make calculations about routes (click to select):
1) Distance Vector
2) Link State
3) Hybrid
Distance Vector routers compute the best path from information passed to them from
neighbors
Fig: 8.1.2
DISTANCE VECTOR ROUTING PROTOCOLS
RIPV1:
RIP comes in two different versions. RIP version 1 uses only classful routing, which means
that all devices in the network must use the same subnet mask. This is because RIP version
1 does not include the subnet mask when it sends updates. RIP v1 uses broadcasts
(255.255.255.255).
RIP version 2 does, however, and this is what we call classless routing (check the Subnetting
section for more details). RIP v2 uses multicasts (224.0.0.9) to update its routing tables.
COMMANDS:-
Configure RIP:
Use the following command to enable RIP on RouterA:
RouterA(config)#router rip
Configure the router to receive and send only RIP Version 2 packets using the following
command:
RouterA(config-router)#version 2
Use the following commands to specify the networks directly connected to the router:
RouterA(config-router)#network 192.168.11.0
RouterA(config-router)#network 192.168.22.0
Cisco created this routing protocol to overcome the problems associated with RIP.
IGRP has a maximum hop count of 255 with a default of 100. This is helpful in larger
networks and solves the problem of there being only 15 hops maximum possible in
a RIP network. IGRPalso uses a different metric from RIP. IGRP uses bandwidth and delay
of the line by default as a metric for determining the best route to an internetwork. This is
called a composite metric. Reliability, load and Maximum Transmission Unit (MTU) can also
be used, although they are not used by default.
COMMANDS:-
RouterA#configure terminal
RouterA#(config-router)#network ip address
RouterA#(config-router)#exit
Open Shortest Path First (OSPF) is a routing protocol developed for Internet Protocol (IP)
networks by the interior gateway protocol (IGP) working group of the Internet Engineering
Task Force (IETF). The working group was formed in 1988 to design an IGP based on the
shortest path first (SPF) algorithm for use in the Internet. Similar to the Interior Gateway
Routing Protocol (IGRP), OSPF was created because in the mid-1980s, the Routing
Information Protocol (RIP) was increasingly unable to serve large, heterogeneous
internetworks.
OSPF is a classless routing protocol, which means that in its updates, it includes the subnet of
each route it knows about, thus, enabling variable-length subnet masks. With variable-length
subnet masks, an IP network can be broken into many subnets of various sizes. This provides
network administrators with extra network-configuration flexibility.These updates are
multicasts at specific addresses (224.0.0.5 and 224.0.0.6).
Router#config terminal
Router(config)#router ospf process-id
Example:
EIGRP:-
EIGRP is classless, meaning it does include the subnet mask in routing updates. However, by
default 'auto-summary' is enable. You must disable if you want subnet information from other
major networks.
COMMANDS:-
Router#config terminal
It calculates the best path to route the packet using hops as its metric.
Characteristics of rip:
RIP Timer:-
I. Route update timer:- It is a time interval for a router to sent its routing table
info to the connected router the default value is 30s.
II. Route invalid timer:- Determine the period after which the router declares
the rout as invalid. The default value is 180s.
III. Hold down timer:- Determine the time interval for which the routing info is
not passed to the neighbouring routers. The default value is 180s.
IV. Route flush timer:- calculates the time taken by route to the flushed from the
routing table after being invalid. The default values is 240s.
Configuration:-
Router(config)#router rip
Router(config)#version 2
Router(config)#network X.X.X.X
Servers
A server is primarily a program that runs on a machine, providing a particular and specific
service to other machines connected to the machine on which it is found.
Nowadays, server functionality has become so rich, complex and varied in nature that there
are whole very powerful computers dedicated to being exclusively servers. This has led many
non-technical people to denote servers as being machines that run services.
A network server is a computer designed to process requests and deliver data to other
(client) computers over a local network or the Internet. Network servers typically are
configured with additional processing, memory and storage capacity to handle the load of
servicing clients.
DHCP SERVER
DHCP (Dynamic Host Configuration Protocol) is a protocol that allows a central computer to
automatically assign the TCP/IP network configuration to individual work-stations on a
private network. With DHCP enabled it suffices to enable the "Obtain an IP address
automatically" in the TCP/IP configuration on the private network. The DHCP Server then
takes over the responsibility of assigning the TCP/IP parameters, significantly lowering the
task of network maintenance
Fig: 8.5.1
At boot time the computer has no network parameters assigned to it. The following list
provides an overview of the typical network parameters:
Default route/gateway ñ an IP address which will be used for forwarding packets whose
destinations are beyond local network
Static routes
IP forwarding setting
MTU size
Static configuration.
With static configuration, the client computer uses pre-configured network parameters. The
disadvantages of this approach include the possibility of IP address conflicts and the
administrative issues possible when manually configuring many internal clients.
With automatic configuration, the computer obtains its network parameters from the DHCP
Server. This way the IP addresses are automatically managed and accordingly address
conflicts are avoided. If manual and automatic network configurations are used together, the
administrator must ensure that the DHCP Server won’t assign IP addresses used by manually-
configured computers.
How to configure the DHCP server
Once you have considered the implications of DHCP in your network, you are ready to get
started with the simple configuration.
Fig: 8.5.2
For a small network, the configuration of the DHCP Server is not very challenging and the
InJoy DHCP Server Plugin is deliberately designed to be extremely simple. In fact, in the
InJoy Firewallô, you can immediately enable the DHCP Server and have it operational in less
than a minute. Here is how.
DNS SERVER
The Domain Name System (DNS) is a standard technology for managing the names of Web
sites and other Internet domains. DNS technology allows you to type names into your Web
browser like compnetworking.about.com and your computer to automatically find that
address on the Internet. A key element of the DNS is a worldwide collection of DNS servers.
What, then, is a DNS server?
Answer: A DNS server is any computer registered to join the Domain Name System. A DNS
server runs special-purpose networking software, features a public IP address, and contains a
database of network names and addresses for other Internet hosts.
DNS servers communicate with each other using private network protocols. All DNS servers
are organized in a hierarchy. At the top level of the hierarchy, so-called root servers store the
complete database of Internet domain names and their corresponding IP addresses. The
Internet employs 13 root servers that have become somewhat famous for their special role.
Maintained by various independent agencies, the servers are aptly named A, B, C and so on
up to M. Ten of these servers reside in the United States, one in Japan, one in London, UK
and one in Stockholm, Sweden.
The DNS is a distributed system, meaning that only the 13 root servers contain the complete
database of domain names and IP addresses. All other DNS servers are installed at lower
levels of the hierarchy and maintain only certain pieces of the overall database.
Most lower level DNS servers are owned by businesses or Internet Service Providers (ISPs).
For example, Google maintains various DNS servers around the world that manage the
google.com, google.co.uk, and other domains. Your ISP also maintains DNS servers as part
of your Internet connection setup.
Fig: 8.5.3
8.6User Configuration
In this project, we use DHCP (Dynamic Host Configuration Protocol) for configure
the IP Addresses to its PC’s. DHCP is a protocol that allows a central computer to
automatically assign the TCP/IP network configuration to individual work-stations on
a private network. With DHCP enabled it suffices to enable the "Obtain an IP address
automatically" in the TCP/IP configuration on the private network.
INTERNET CONNECTION SHARING
ICS provides networked computers with the ability to share a single connection to the
Internet.
If you have multiple computers, you can use ICS to allow you and others on your local area
network (LAN) to perform different tasks simultaneously. For example, one person can send
and receive e-mail messages, while another person downloads a file, and another person
browses the Internet. You can also gain access to your corporate e-mail accounts from a
client computer while others on your LAN cannot. You can use Web-enabled programs (such
as downloading updates) as well as Microsoft NetMeeting and other video conferencing
programs.
DHCP Allocator - A simplified DHCP service that assigns the IP address, gateway,
and name server on the local network.
DNS Proxy - Resolves names on behalf of local network clients and forwards queries.
Network Address Translation (NAT) - Maps a set of private addresses to a set of
public addresses. NAT tracks private-source IP addresses and public-destination IP
addresses for outbound flows. It changes the IP address information and edits the
required IP header information dynamically.
Auto-dial - Automatically dials connections.
Application programming interfaces (APIs) - For configuration, status, and dial
control for programs.
To use Internet Connection Sharing to share your Internet connection, the host computer must
have one network adapter that is configured to connect to the internal network, and one
network adapter or modem that is configured to connect to the Internet.
On the host computer, follow these steps to share the Internet connection:
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP
address 192.168.0.1. Your computer may lose connectivity with other computers on
your network. If these other computers have static IP addresses, it is a good idea to set
them to obtain their IP addresses automatically. Are you sure you want to enable
Internet Connection Sharing?
11. Click Yes.
To connect to the Internet by using the shared connection, you must confirm the LAN adapter
IP configuration, and then configure the client computer. To confirm the LAN adapter IP
configuration, follow these steps:
Fig: 8.3.1
9.1 PING
Ping can test the speed of your connection, "distance" to target, and whether or not your
connection is even up and running. It tells you how long a packet of data takes to travel from
your computer to a specified host, and back again(in this case, the packet is 32 bytes in size).
Ping Tests
Once you have your command prompt (or WhatRoute) open, enter ping 172.16.5.2 and press
Enter. You should receive 4 responses similar to the lines below. This ping test verifies the
operation of the base TCP/IP stack. If TCP/IP is working correctly, there will be no problems
with the ping. If you receive a timeout or error message, there is a problem with TCP/IP in
which case you may have to uninstall and reinstall TCP/IP.
9.2 TRACEROUTE
Traceroute tracks the path that a packet takes from your computer to a destination address. A
traceroute also shows how many times your packets are being rebroadcast by other servers
until it gets to the final destination. For windows users, the command is tracert. For
Macintosh OS X users, its traceroute.