0% found this document useful (0 votes)
21 views

Sample CN Lab File Manual

The document discusses network cables and topologies. It describes twisted pair cables, coaxial cable, and fiber-optic cable as the main types of network cables. It then explains five common network topologies: mesh, star, bus, ring, and hybrid. For each topology and cable type, it provides brief details about their advantages and disadvantages. The document appears to be part of a computer networks lab manual for students.

Uploaded by

Shivali Kumari
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Sample CN Lab File Manual

The document discusses network cables and topologies. It describes twisted pair cables, coaxial cable, and fiber-optic cable as the main types of network cables. It then explains five common network topologies: mesh, star, bus, ring, and hybrid. For each topology and cable type, it provides brief details about their advantages and disadvantages. The document appears to be part of a computer networks lab manual for students.

Uploaded by

Shivali Kumari
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 70

DEPARTMENT OF INFORMATION TECHNOLOGY

DEPARTMENT OF INFORMATION TECHNOLOGY

PRACTICAL LAB MANUAL


COMPUTER NETWORKs LAB
BTIT-404-18

Semester – 4th

SUBMITTED TO: SUBMITTED BY:

Mr. Amitabh Sharma

Assistant Professor

1
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

INDEX
SRNo. NAME OF PRACTICAL PAGE
NO
1 To study the different types of network cables and network 3-8
topologies
2 Implement and test the cross wired cable and straight through 9-12
cable using clamping tool and network lab cable tester
3 Study and familarization with various network devices 13-16
4 Familarization with packet tracer simulation tool 17-19
5 Study and implementation of IP addressing schemes 20-22

6 Creation of simple networking topologies using hub and 23-25


switch
7 Simulation of web traffic in packet tracer 26-27

8 Study and implementation of various routers and 28-30


configuration commands
9 Creation of network using routers 31-34

10 Configuring network using the concept of subnetting 35-37

11 Implementation of basic network configuration commands 38-46


like ping, ipconfig, netstat, tracert, etc. for trouble shooting
network related problems
12 Configuration of network using static and default routes 47-50

13 To demonstrate the sharing of resources from FTP server to a 51-65


desktop
14 To study and demonstrate the various features of TEAM 66-70
VIEWER
a. two PC’s
b. two mobiles
two PC’s and mobiles

2
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

PRACTICAL NO. 1
OBJECTIVE: To study the different types of network cables and network topologies.
THEORY:
Network Cables: Networking cables are networking hardware used to connect one network device to other
network devices or to connect two or more computers to share printers, scanners etc. Different types of
network cables, such as coaxial cable, optical fiber cable, and twisted pair cables, are used depending on the
network's physical layer, topology, and size.
1. Twisted Pair Cables: Twisted pair cabling is a form of wiring in which pairs of wires are twisted
together for the purposes of canceling out electromagnetic interference (EMI) from other wire pairs
and from external sources. This type of cable is used for home and corporate Ethernet networks.
Twisted pair cabling is used in short patch cables and in the longer runs in structured cabling.

ADVANTAGES
• It can be used to carry both analog and digital data.
• It is the least expensive media of transmission for short distances.
• Attenuation is very high.
• It offers very poor security and is relatively easy to tap.

2. Coaxial Cable: Coaxial cables, commonly called coax, are copper cables with metal shielding
designed to provide immunity against noise and greater bandwidth. Coax can transmit signals over
larger distances at a higher speed as compared to twisted pair cables.

3
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

ADVANTAGES
• sufficient frequency range to support multiple channel, which allows for much greater throughput.
• lower error rates. because the inner conductor is in a Faraday shield, noise immunity is improved,
and coax has a lower error rates and therefore slightly better performance than twisted pair.
DISADVANTAGES
• more expensive to install compare to twisted pair cable.
• the thicker the cable, the more difficult to work with.

3. Fiber-Optic Cable: A fiber-optic cable, also known as an optical-fiber cable, is an assembly


similar to an electrical cable, but containing one or more optical fibers that are used to carry light. The
optical fiber elements are typically individually coated with plastic layers and contained in a protective
tube suitable for the environment where the cable will be deployed.

ADVANTAGES
• It has higher electrical resistance and gence can operate safely near to high voltage lines and
equipments.
• It is light in weight and hence easy to install.
DISADVANTAGES

• The initial installation cost is higher due to expensive optical transmitter and receiver. Moreover it
requires specific tools for maintenance and repair.
• It is difficult to splice compare to wires usually at the starting and end joints. Moreover interfacing
tools and connectors are costly.

4
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

NETWORK TOPOLOGIES: Geometric representation of how the computers are connected to each other
is known as topology. There are mainly five types of network topologies :
1. Mesh Topology: In mesh topology each device is connected to every other device on the network
through a dedicated point-to-point link. When we say dedicated it means that the link only carries
data for the two connected devices only.

ADVANTAGES

• No data traffic issues as there is a dedicated link between two devices which means the link is only
available for those two devices.
• Mesh topology is reliable and robust as failure of one link doesn’t affect other links and the
communication between other devices on the network.
DISADVANTAGES

• Amount of wires required to connected each system is tedious and headache.


• Since each device needs to be connected with other devices, number of I/O ports required must be
huge.

2. Star Topology: In star topology each device in the network is connected to a central device called
hub. Unlike Mesh topology, star topology doesn’t allow direct communication between devices, a
device must have to communicate through hub. If one device wants to send data to other device, it
has to first send the data to hub and then the hub transmit that data to the designated device.

5
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

ADVANTAGES

• Less expensive because each device only need one I/O port and needs to be connected with hub with
one link.
• Easier to install
DISADVANTAGES

• If hub goes down everything goes down, none of the devices can work without hub.
• Hub requires more resources and regular maintenance because it is the central system of star
topology.

3. Bus Topology: In bus topology there is a main cable and all the devices are connected to this main
cable through drop lines. There is a device called tap that connects the drop line to the main cable.
Since all the data is transmitted over the main cable, there is a limit of drop lines and the distance a
main cable can have.

ADVANTAGES

• Easy installation, each cable needs to be connected with backbone cable.


• Less cables required than Mesh and star topology
DISADVANTAGES

• Difficultly in fault detection.


• Not scalable as there is a limit of how many nodes you can connect with backbone cable.

6
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

4. Ring Topology: In ring topology each device is connected with the two devices on either side of it.
There are two dedicated point to point links a device has with the devices on the either side of it.
This structure forms a ring thus it is known as ring topology. If a device wants to send data to another
device then it sends the data in one direction, each device in ring topology has a repeater, if the
received data is intended for other device then repeater forwards this data until the intended device
receives it.

ADVANTAGES

• Easy to install.
• Managing is easier as to add or remove a device from the topology only two links are required to be
changed.
DISADVANTAGES

• A link failure can fail the entire network as the signal will not travel forward due to failure.
• Data traffic issues, since all the data is circulating in a ring.

5. Hybrid Topology: A combination of two or more topology is known as hybrid topology. For
example: a combination of star and mesh topology is known as hybrid topology.

ADVANTAGES
7
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

• We can choose the topology based on the requirement for example, scalability is our concern then
we can use star topology instead of bus technology.
• Scalable as we can further connect other computer networks with the existing networks with different
topologies.
DISADVANTAGES

• Fault detection is difficult.


• Installation is difficult.

8
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

PRACTICAL NO. 2
OBJECTIVE: Implement and test the cross-wired cable and straight through cable using clamping tool
and network lab cable network tester.

MATERIAL REQUIRED:

1. Cat5e Ethernet cable – I recommend purchasing a box of Cat5e cable. You will save money by purchasing
your cable in bulk.
2. RJ-45 connectors
3. Crimper Tool – capable of crimping 8 wires (RJ-45) and 6 wire (RJ-11). Most tools have built in cutters too.
4. Stripper Tool
5. Scissors – I prefer using a scissors
6. Cable Tester – For testing that your cable connections are good and there are not any open or crossed wires

Cat5E Ethernet cable and RJ-45 connectors cable testers

Scissors, a crimping tool, and a stripping tool

Steps to make a straight through Ethernet cable:

1. Cut a piece of cable to the length you will need. Give a little extra to make room for mistakes.
2. Strip a half inch to an inch of the outer jacket away from the cable. If you use strippers make
sure not to nick the wire pairs and expose the copper, this could introduce crosstalk onto your wires.
I prefer to use a scissor and my fingers to tear away the jacket. Then I cut with the scissors to clean
up the edge.

9
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

3. Now you need to untwist the wire pairs (not too much, only undo one or two twists) so you can
align them according to the EIA-TIA568B wire color sequence. I use my fingers to straighten the
wires by bending them back and forth, straightening them as they warm up.

1 2 3 4 5 6 7 8

White/Orange Orange White/Green Blue White/Blue Green White/Brown Brown

4. I usually have to trim the ends of the wires so they line up and create a straight edge.

5. Now holding an RJ-45 connector with the tab side facing down, push the 8 wires into the connector,
sliding each wire into a groove. While holding the connector tab side down the white/orange wire
should be on the far left and the brown wire should be on the far right. It is very important that the
wires push all the way up and into the connector so that when the pins are pushed down during
crimping they will make contact with the wires. The sleeve or jacket of the cable (light blue below)
should also be pushed in as far as it can go so it will be held in place once crimped. You may want
to pull the wires out and put them back in to make sure they are sliding in correctly, this will also
further straighten the wires.

10
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

6. Before crimping, examine the cable and connector from the side. Did the wires slide all the way up
in to the proper grooves? Are the colors in the proper order when observed from tab side down? Did
the jacket slide all the way into the connector? If not, you may need pull the cable out of the
connector, trim the wires or the jacket accordingly, and reinsert.

7. If everything looks good, using your crimper tool insert the connector and cable into the 8 wire slot
and press down tightly. This will cause a piece of plastic in the connector to press down on the jacket
and hold the cable in the connector preventing it from accidentally pulling out. Crimping also forces
copper pins in the connector to push down and make contact with the separate wires.

8. You are now finished terminating one end of the cable. Repeat the process on the other end of the
cable and when you are done, insert the cable into a cable tester and run a wire test to make sure that
none of the wires are accidentally crossed, by not being in the right order, or open by not touching
the connector pins. Depending on the cable tester you may need to read the manual to understand
the device output.

11
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

9. Lastly, test your cable by using it on your network. Attach the cable to your computer’s NIC and
the other end to your switch.

12
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

PRACTICAL NO. 3
OBJECTIVE: Study and familiarization with various network devices.

THEORY:

Network Devices: Network devices, or networking hardware, are physical devices that are required for
communication and interaction between hardware on a computer network.

Types Of Network Devices:

• Hub
• Switch
• Router
• Bridge
• Gateway
• Modem
• Repeater
• Access Point

HUB:

Hubs connect multiple computer networking devices together. A hub also acts as a repeater in that it
amplifies signals that deteriorate after traveling long distances over connecting cables. A hub is the
simplest in the family of network connecting devices because it connects LAN components with identical
protocols.

A hub can be used with both digital and analog data, provided its settings have been configured to prepare
for the formatting of the incoming data. For example, if the incoming data is in digital format, the hub
must pass it on as packets; however, if the incoming data is analog, then the hub passes it on in signal
form.

Hubs do not perform packet filtering or addressing functions; they just send data packets to all connected
devices. Hubs operate at the Physical layer of the Open Systems Interconnection (OSI) model. There are
two types of hubs: simple and multiple port.

13
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

SWITCH:

Switches generally have a more intelligent role than hubs. A switch is a multiport device that improves
network efficiency. The switch maintains limited routing information about nodes in the internal network,
and it allows connections to systems like hubs or routers. Strands of LANs are usually connected using
switches. Generally, switches can read the hardware addresses of incoming packets to transmit them to the
appropriate destination.

Using switches improves network efficiency over hubs or routers because of the virtual circuit capability.
Switches also improve network security because the virtual circuits are more difficult to examine with
network monitors. You can think of a switch as a device that has some of the best capabilities of routers
and hubs combined. A switch can work at either the Data Link layer or the Network layer of the OSI
model. A multilayer switch is one that can operate at both layers, which means that it can operate as both a
switch and a router. A multilayer switch is a high-performance device that supports the same routing
protocols as routers.

Switches can be subject to distributed denial of service (DDoS) attacks; flood guards are used to prevent
malicious traffic from bringing the switch to a halt. Switch port security is important so be sure to secure
switches: Disable all unused ports and use DHCP snooping, ARP inspection and MAC address filtering.

ROUTER:

Routers help transmit packets to their destinations by charting a path through the sea of interconnected
networking devices using different network topologies. Routers are intelligent devices, and they store
information about the networks they’re connected to. Most routers can be configured to operate as packet-
filtering firewalls and use access control lists (ACLs). Routers, in conjunction with a channel service
unit/data service unit (CSU/DSU), are also used to translate from LAN framing to WAN framing. This is
needed because LANs and WANs use different network protocols. Such routers are known as border
routers. They serve as the outside connection of a LAN to a WAN, and they operate at the border of your
network.

Router are also used to divide internal networks into two or more subnetworks. Routers can also be
connected internally to other routers, creating zones that operate independently. Routers establish
communication by maintaining tables about destinations and local connections. A router contains
information about the systems connected to it and where to send requests if the destination isn’t known.

14
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Routers usually communicate routing and other information using one of three standard protocols: Routing
Information Protocol (RIP), Border Gateway Protocol (BGP) or Open Shortest Path First (OSPF).

Routers are our first line of defense, and they must be configured to pass only traffic that is authorized by
network administrators. The routes themselves can be configured as static or dynamic. If they are static,
they can only be configured manually and stay that way until changed. If they are dynamic, they learn of
other routers around them and use information about those routers to build their routing tables.

Routers are general-purpose devices that interconnect two or more heterogeneous networks. They are
usually dedicated to special-purpose computers, with separate input and output network interfaces for each
connected network. Because routers and gateways are the backbone of large computer networks like the
internet, they have special features that give them the flexibility and the ability to cope with varying
network addressing schemes and frame sizes through segmentation of big packets into smaller sizes that fit
the new network components. Each router interface has its own Address Resolution Protocol (ARP)
module, its own LAN address (network card address) and its own Internet Protocol (IP) address. The
router, with the help of a routing table, has knowledge of routes a packet could take from its source to its
destination. The routing table, like in the bridge and switch, grows dynamically. Upon receipt of a packet,
the router removes the packet headers and trailers and analyzes the IP header by determining the source
and destination addresses and data type, and noting the arrival time. It also updates the router table with
new addresses not already in the table. The IP header and arrival time information is entered in the routing
table. Routers normally work at the Network layer of the OSI model.

BRIDGE:

Bridges are used to connect two or more hosts or network segments together. The basic role of bridges in
network architecture is storing and forwarding frames between the different segments that the bridge
connects. They use hardware Media Access Control (MAC) addresses for transferring frames. By looking
at the MAC address of the devices connected to each segment, bridges can forward the data or block it
from crossing. Bridges can also be used to connect two physical LANs into a larger logical LAN.

Bridges work only at the Physical and Data Link layers of the OSI model. Bridges are used to divide larger
networks into smaller sections by sitting between two physical network segments and managing the flow
of data between the two.

15
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Bridges are like hubs in many respects, including the fact that they connect LAN components with
identical protocols. However, bridges filter incoming data packets, known as frames, for addresses before
they are forwarded. As it filters the data packets, the bridge makes no modifications to the format or
content of the incoming data. The bridge filters and forwards frames on the network with the help of a
dynamic bridge table. The bridge table, which is initially empty, maintains the LAN addresses for each
computer in the LAN and the addresses of each bridge interface that connects the LAN to other LANs.
Bridges, like hubs, can be either simple or multiple port.

Bridges have mostly fallen out of favor in recent years and have been replaced by switches, which offer
more functionality. In fact, switches are sometimes referred to as “multiport bridges” because of how they
operate.

16
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

PRACTICAL NO. 4
OBJECTIVE: Familiarization with packet tracer simulation tool.
THEORY:
Introduction to CISCO packet tracer
Packet Tracer is a powerful network simulator that can be utilized in training for Network certifications by
allowing students to create networks with an almost unlimited number of devices and to experience
troubleshooting without having to buy real Cisco routers or switches. The tool is created by Cisco Systems.
The purpose of Packet Tracer is to offer students a tool to learn the principles of networking as well as
develop Cisco technology specific skills. However, it is not be used as a replacement for Routers or Switches.

KEY FEATURES:
Packet Tracer Workspaces: Cisco Packet Tracer has two workspaces—logical and physical. The logical
workspace allows users to build logical network topologies by placing, connecting, and clustering virtual
network devices. The physical workspace provides a graphical physical dimension of the logical network,
giving a sense of scale and placement in how network devices such as routers, switches, and hosts would
look in a real environment. The physical view also provides geographic representations of networks,
including multiple cities, buildings, and wiring closets. The physical workspace provides a graphical view
of the logical network.

Packet Tracer Modes: Cisco Packet Tracer provides two operating modes to visualize the behavior of a
network—real-time mode and simulation mode. In real-time mode the network behaves as real devices do,
with immediate real-time response for all network activities. The real-time mode gives students a viable
alternative to real equipment and allows them to gain configuration practice before working with real
equipment. In simulation mode the user can see and control time intervals, the inner workings of data
transfer, and the propagation of data across a network. This helps students understand the fundamental
concepts behind network operations. A solid understanding of network fundamentals can help accelerate
learning about related concept

ADVANTAGES:
• It can be used anywhere, you don’t have to carry it. Once you install it in your laptop, it can be carried
even in USP.
• The noise level is minimum to none and the consumption of electricity is also less.
• The major advantage is “sum mode”. This is not available in real gear.

DISADVANTAGES:
• It may cause the loops by affecting the STP.
• It doesn’t support the ether channel regarding the access layer switches.
• With regard to the Frame relay it is low in command.

Installation of CISCO packet tracer:

17
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

STEP 1 Once we have downloading the Packet Tracer exe file, Click on the exe file downloaded. Once
below Window will appears, click “Next”
STEP 2 On next screen, select “I accept the agreement” and click on “Next”.
STEP 3 Setup will show the folder in which the program’s shortcuts will be created. If You want to change
the folder, you can change it. Click on “Next”.
STEP 4 Then the program will ask whether to create a Desktop icon and create a Quick Launch icon. Make
your choice and click on “Next”.
STEP 5 The summary of the settings we selected is displayed. Click on “Install”.
STEP 6 The installation starts.
STEP 7 Packet Tracer is installed and ready to be used.

CREATING BUS TOPOLOGY USING CISCO PACKET TRACER


Step1 Open your Network Topology.
Step2 Complete the cabling between four different switches and PCs.
Step3 Configure the IP addresses on the end devices.

Now for networking


Step1-Configure the IP addresses on your routers and switches.
Step2-Configure your default gateway

18
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Step3- Test connectivity. After configuring the addresses, you will have to test connectivity by opening a
command prompt window on the end devices and try pinging the address which the network operates on.

Sending message from Laptop0 to Laptop3

19
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

PRACTICAL NO. 5
OBJECTIVE: Study and implementation of IP addressing schemes.
THEORY:
Step1 Make a network i.e take two switches and connect the end devices with both the switches and then
connect switches with the router (as shown)

Step2 Give IP address and then give the gateways to all the end devices.

20
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Step3 Configure the IP addresses and gateway given

Step4 After configuring our network is ready for transmission.


Step5 Sending message from PC1 to PC3
Message is successfully sent (as shown)

21
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

22
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

PRACTICAL NO. 6
Objective: Creation of simple networking topologies using hub and switch.
Theory:
Step1 Make a network i.e take switch and hub and then connect the end devices with both.

Step2 Give IP address to all the end devices.

23
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Step3 Configure the IP addresses. After configuring our network is ready for transmission.
Step4 Sending message from PC0 to PC1 through Switch.

Step5 Sending message from PC2 to PC3 through Hub.

24
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Differences in performance of hubs and switches:


A switch is effectively a higher-performance alternative to a hub. People tend to benefit from a switch
over a hub if their home network has four or more computers, or if they want to use their home
network for applications that generate significant amounts of network traffic, like multiplayer games
or heavy music file sharing. Technically speaking, hubs operate using a broadcast model and switches
operate using a virtual circuit model. When four computers are connected to a hub, for example, and
two of those computers communicate with each other, hubs simply pass through all network traffic to
each of the four computers. Switches, on the other hand, are capable of determining the destination of
each individual traffic element (such as an Ethernet frame) and selectively forwarding data to the one
computer that actually needs it. By generating less network traffic in delivering messages, a switch
performs better than a hub on busy networks.

25
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

PRACTICAL NO. 7
Objective: Simulation of web traffic in packet tracer.
Theory:
Step1 Make a network i.e take switch then connect the end devices and server with it.

Step2 Give IP address to all the end devices.

Step3 Configure the IP addresses. After configuring our network is ready for transmission.
26
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Step4 Sending message from PC0 to PC3.

27
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

PRACTICAL NO. 8
Objective: Study and implementation of various router configuration commands.
Theory:
Topology Diagram

Addressing Table
Device Interface IP Address Subnet Mask Def. Gateway
Fa0/0 192.168.1.1 255.255.255.0 N/A
R1 S0/0/0 192.168.2.1 255.255.255.0 N/A
Fa0/0 192.168.3.1 255.255.255.0 N/A
R2 S0/0/0 192.168.2.2 255.255.255.0 N/A
PC1 N/A 192.168.1.10 255.255.255.0 192.168.1.1
PC2 N/A 192.168.3.10 255.255.255.0 192.168.3.1

Task 1 : Perform Basic Configuration of Router R1.

Step 1: Establish a HyperTerminal session to router R1.

Step 2: Enter privileged EXEC mode.


Router>enable Router#

Step 3: Enter global configuration mode.


Router#configure terminal
Enter configuration commands, oneperline.
End with CNTL/Z.
Router(config)#

Step 4: Configure the router name as R1.


Enter the command hostname R1at the prompt.
Router(config)#hostname R1
R1(config)#

Step 5: Disable DNS lookup.


28
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Disable DNS lookup with the no ip domain-lookupcommand.


R1(config)#no ip domain-lookup
R1(config)#

Step 6: Configure the EXEC mode password.


Configure the EXEC mode password using the enable secret passwordcommand.
Use classfor the password.
R1(config)#enable secret class
R1(config)#

Step 7: Configure a message-of-the-day banner.


Configure a message-of-the-day banner using the banner motdcommand.
R1(config)#banner motd&
EnterTEXTmessage.
End with the character'&'.
R1(config)#

Step 8: Configure the console password on the router.


Use ciscoas the password. When you are finished, exit from line configuration mode.
R1(config)#line console 0 R1(config-line)#password cisco R1(config-line)#login
R1(config-line)#exit R1(config)#

Step 9: Configure the password for the virtual terminal lines.


Use ciscoas the password. When you are finished, exit from line configuration mode.
R1(config)#line vty 0 4 R1(config-line)#password cisco R1(config-line)#login R1(config-
line)#exit R1(config)#

Step 10: Configure the FastEthernet0/0 interface.


Configure the FastEthernet0/0 interface with the IP address 192.168.1.1/24.
R1(config)#interface fastethernet 0/0
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#no shutdown

Step 11: Configure the Serial0/0/0 interface.


Configure the Serial0/0/0 interface with the IP address 192.168.2.1/24. Set the clock rate
to 64000.
R1(config-if)#interface serial 0/0/0
R1(config-if)#ip address 192.168.2.1 255.255.255.0
R1(config-if)#clock rate 64000 R1(config-if)#no shutdown R1(config-if)#

Step 12: Return to privileged EXEC mode.


Use the endcommand to return to privileged EXEC mode.
R1(config-if)#end R1#

Step 13: Save the R1 configuration.


Save the R1 configuration using the copy running-config startup-configcommand.
R1#copy running-config startup-config
29
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Building configuration... [OK]


R1#

Task 2: Perform Basic Configuration of Router R2.

Step 1: For R2, repeat Steps 1 through 9 from Task 1.

Step 2: Configure the Serial 0/0/0 interface.


Configure the Serial 0/0/0 interface with the IP address 192.168.2.2/24.
R2(config)#interface serial 0/0/0
R2(config-if)#ip address 192.168.2.2 255.255.255.0
R2(config-if)#no shutdown

Step 3: Configure the FastEthernet0/0 interface.


Configure the FastEthernet0/0 interface with the IP address 192.168.3.1/24.
R2(config-if)#interface fastethernet 0/0
R2(config-if)#ip address 192.168.3.1 255.255.255.0
R2(config-if)#no shutdown
R2(config-if)#

Step 4: Return to privileged EXEC mode.


Use the endcommand to return to privileged EXEC mode.
R2(config-if)#end R2#

Step 5: Save the R2 configuration.


Save the R2 configuration using the copy running-config startup-config command.
R2#copy running-config startup-config
Building configuration... [OK]
R2#

30
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

PRACTICAL NO. 9
Objective: Creation of Networks using routers.
Theory:
We already have the Packet Tracer download and have it installed in our computer. Open the program and
select the router from the lower left-hand corner, and drag it into the center of the sandbox screen as seen
below.

We will be setting up a very basic network that allows two computers to communicate, so the next step is to
select end devices from the bottom left-hand corner and drag it to the sandbox screen. Do this twice to make
two computers appear below the router. Now select connections from the same bottom left-hand corner.
When you connect like-devices (Such as a router and computer) you use a crossover cable, so you should
select copper cross-over cable from the second menu to the immediate right. Click on Router0, and connect
the cable via FastEthernet0/0 as seen below:

Now click the PC0 and select Fast Ethernet. You will notice that although a link is established, it is not
functional. You can tell by the red dots that are present on both ends of the connection. Once the router is
configured correctly, the red dots will turn green to indicate the devices are able to communicate.
31
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Do the same operation to PC1, only this time connect the cable to FastEthernet0/1 since FastEthernet0/0 is
already taken by PC0. Your network should be similar to the one below at this point:

CONFIGURING THE ROUTER IN PACKET TRACER


A router that is turned off doesn’t work very well! Click on your router to bring up the configuration menu
and verify that it is turned on.When on, there will be a small green light below the switch as seen in the
diagram.

Next we have to open the Ethernet ports to allow communication. Although they are physically connected,
they are in a state that is known as being in administrative shut down. Now click on the CLI tab to access
the configuration menu. If you’ve used the Cisco IOS before, you will notice it looks and acts the same way.
1. Press RETURN to start the session.

2. Type enable to get to privileged mode (this gives you more options in configuring the router)

3. Type config terminal (or config t for short) to access the configuration menu.

4. Type interface fastethernet0/0 to access Ethernet0/0

32
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

5. Type ip address 192.168.10.1 255.255.255.0 to assign an IP address and subnet mask to the
interface.

6. Type no shutdown to open the interface up for business.

That’s it! We now see a message similar to the following:

%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up


%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
Now we have to do the same thing for fastethernet0/1. If you don’t, there still won’t be a connection to PC1!
Make sure to enter the IP address carefully as seen below:
1. Press Ctrl + Z to go back to the previous mode.
2. Type interface fastethernet0/1
3. Type ip address 192.168.20.1 255.255.255.0
4. Type no shutdown
At this point our router is configured properly. If you test out a ping, you will notice that the computers still
don’t communicate, however!

CONFIGURING THE GATEWAY IN PACKET TRACER


Our last step is to configure the gateway on each desktop computer. The gateway is the address we assigned
to the Ethernet port that the desktop is connected to. It will allow the computer to interface with another
network, so our ping won’t work without it!
Click on PC0 to bring up the configuration menu. Under global settings you will find a field for the gateway.
Enter the corresponding IP address of the router’s interface, which is 192.168.10.1. Then click the
FastEthernet tab on the left column to set the actual computer’s IP address to be on the network.
Use 192.168.10.2 for the IP address, and 255.255.255.0 for the subnet mask.

Do the same thing for PC1, only use 192.168.20.1 for the gateway address, 192.168.20.2 for the IP address,
and 255.255.255.0 for the subnet mask. We can confirm that your network works by sending out a packet
of information from PC0 to PC1, and vice versa. Click the packet icon on the right menu as seen below:

33
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Click on PC0 and then click PC1. On the lower right of the screen you will see a message box that says
“Successful.” If it doesn’t, we may have had a syntax error when putting in an IP address or router
configuration command.

34
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

PRACTICAL NO. 10
Objective: Configuring networks using the concept of sub netting.
Theory:
When we Subnet a network, we basically split it into smaller networks. For example, when a set of IP
Addresses is given to a company, e.g 254 they might want to "break" (the correct term is "partition") that
one network into smaller ones, one for each department. This way, their Technical department and
Management department can each have a small network of their own. By sub netting the network we can
partition it to as many smaller networks as we need and this also helps reduce traffic and hides the complexity
of the network.

By default, all type of Classes (A, B and C) have a subnet mask, we call it the "Default Subnet mask". You
need to have one because:

1) All computers need the subnet mask field filled when configuring IP

2) You need to set some logical boundaries in your network

3) You should at least enter the default subnet mask for the Class you're using

Default Subnet Masks of Each Class

The table below shows clearly the subnetmask that applies for each network Class.

When dealing with subnet masks in the real world, we are free in most cases to use any type of subnet mask
in order to meet our needs. If for example we require one network which can contain up to 254 computers,
35
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

then a Class C network with its default subnet mask will do fine, but if we need more, then we might consider
a Class B network with its default subnet mask.

Note that the default subnet masks have been set by the IEEE committee, the same guys that set and approve
the different standards and protocols.

Understanding The Concept


Partitioning one network into smaller ones by using different subnet masks.

The picture below shows our example network (192.168.0.0). All computers here have been configured with
the default Class C subnet mask (255.255.255.0):

Because of the subnet mask we used, all these computers are part of the one network marked in blue. This
also means that any one of these hosts (computers, router and server) can communicate with each other.

If we now wanted to partition this network into smaller segments, then we would need to change the subnet
mask appropriately so we can get the desired result. Let's say we needed to change the subnet mask from
255.255.255.0 to 255.255.255.224 on each configured host.

The picture below shows us how the computers will see the network once the subnet mask has changed:

36
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

37
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

PRACTICAL NO. 11
Objective: Implementation of basic network command and Network configuration commands like ping,
ipconfig, netstat , tracert etc. for trouble shooting network related problems.
Theory:
The various network related commands used in MS-DOS, Windows, Linux ,Unix and other operating
system are explained below.

• Arp
• Finger
• Hostname
• Ipconfig
• Pathping
• Ping
• Nbstat
• Net
• Netstat
• Nslookup
• Router
• Tracert and tracerouter
• Whois
• winipcfg

Arp:- ARP stands for Address Resolution Protocol.This protocol is used by network nodes to match IP
addresses to MAC addresses. The original specification was RFC 826. That has since been updated by RFC
5227, and RFC 5494.

The protocol functionally divided into two parts:

• One part determines a physical address when sending a packet


• Other part answers requests from other machines
So ARP provides method for hosts send message to destination address on physical network. Ethernet hosts
must convert a 32-bit IP address into a 48-bit Ethernet address. The host checks its ARP cache to see if
address mapping from IP to physical address is known:

• If mapping is known, physical address is placed in frame and sent


• If mapping is not known, broadcast message is sent and awaits a reply
38
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

• Target machine, recognizing IP address matches its own, returns answer


ARP is transparent to bridging - bridging will send ARP broadcasts. Routers do not propagate Ethernet
broadcasts – a router is Network Level device

Syntax (Inet means Internet address)

arp [-a [InetAddr] [-N IfaceAddr]] [-g [InetAddr] [-N IfaceAddr]] [-d InetAddr [IfaceAddr]] [-s InetAddr
EtherAddr [IfaceAddr]]

Finger:- The finger command may also be used to look up users on a remote system. The format is to
specify the user as User@Host. If you omit the user name, the finger commandprovides the standard
format listing on the remote system.

Syntax:- { finger | f }[[ -b][ -h] [ -l][ -p]]|[ -i][ -q][ -s][ -w]] [ -f]
[ -m][ User| User @Host| @Host]

Item Description
-b- Gives a brief, long-form listing.
-f- Suppresses printing of header line on output (the first line that defines the fields that are being
displayed).
-h- Suppresses printing of .project files on long and brief long formats.
-i- Gives a quick listing with idle times.
-l- Gives a long-form listing.
-m- Assumes that the User parameter specifies a user ID (used for discretionary access control), not a user
login name.
-p- Suppresses printing of .plan files on long-form and brief long-form formats.
-q- Gives a quick listing.
-s- Gives a short format list.

39
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Hostname:-The hostname command is used to show or set a computer's host name and domain name. It is
one of the most basic of the network administrative utilities.

A host name is a name that is assigned to a host (i.e., a computer connected to the network) that uniquely
identifies it on a network and thus allows it to be addressed without using its full IP address. Domain names
are user-friendly substitutes for numeric IP addresses.

The basic syntax for the hostname command is

hostname [options] [new_host_name]

Ipconfig:-Configure IP (Internet Protocol configuration). In Windows, ipconfig is a console application


designed to run from the Windows command prompt. This utility allows you to get the IP address
information of a Windows computer. It also allows some control over active TCP/IP connections.
ipconfig replaced the older winipcfg utility.

Syntax

IPCONFIG /all Display full configuration information.

IPCONFIG /release [adapter] Release the IP address for the specified adapter.

IPCONFIG /renew [adapter] Renew the IP address for the specified adapter.

IPCONFIG /flushdns Purge the DNS Resolver cache.


40
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

IPCONFIG /registerdns Refresh all DHCP leases and re-register DNS names.

IPCONFIG /displaydns Display the contents of the DNS Resolver Cache.

IPCONFIG /show class id adapter Display all the DHCP class IDs allowed for adapter.

IPCONFIG /setclassid adapter [classid] Modify the dhcp class id.

Pathping:- Pathping sends multiple echo Request messages to each router between a source and destination
over a period of time and then computes results based on the packets returned from each router.
Because pathping displays the degree of packet loss at any given router or link, you can determine which
routers or subnets might be having network problems.

pathping performs the equivalent of the tracert command by identifying which routers are on the path. It
then sends pings periodically to all of the routers over a specified time period and computes statistics based
on the number returned from each. Used without parameters, pathping displays help.

Syntax:-
pathping [/n] [/h] [/g <Hostlist>] [/p <Period>] [/q <NumQueries> [/w <timeout>] [/i <IPaddress>] [/4
<IPv4>] [/6 <IPv6>][<TargetName>]

Parameter Description

/n Prevents pathping from attempting to resolve the IP


addresses of intermediate routers to their names. This might
expedite the display of pathping results.

/h Specifies the maximum number of hops in the path to search


<MaximumHops> for the target (destination). The default is 30 hops.

/g <Hostlist> Specifies that the echo Request messages use the Loose
Source Route option in the IP header with the set of
intermediate destinations specified in Hostlist. With loose
source routing, successive intermediate destinations can be

41
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Parameter Description

separated by one or multiple routers. The maximum number


of addresses or names in the host list is 9. The Hostlist is a
series of IP addresses (in dotted decimal notation) separated
by spaces.

/p <Period> Specifies the number of milliseconds to wait between


consecutive pings. The default is 250 milliseconds (1/4
second).

/q <NumQueries> Specifies the number of echo Request messages sent to each


router in the path. The default is 100 queries.

/w <timeout> Specifies the number of milliseconds to wait for each reply.


The default is 3000 milliseconds (3 seconds).

/i <IPaddress> Specifies the source address.

/4 <IPv4> Specifies that pathping uses IPv4 only.

/6 <IPv6> Specifies that pathping uses IPv6 only.

<TargetName> Specifies the destination, which is identified either by IP


address or host name.

/? Displays help at the command prompt.

42
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Ping:- The ping command verifies IP-level connectivity to another TCP/IP computer by sending Internet
Control Message Protocol (ICMP) echo Request messages. The receipt of corresponding echo Reply
messages are displayed, along with round-trip times. ping is the primary TCP/IP command used to
troubleshoot connectivity, reachability, and name resolution. Used without parameters, ping displays help.

Syntax:-

ping [/t] [/a] [/n <Count>] [/l <Size>] [/f] [/I <TTL>] [/v <TOS>] [/r <Count>] [/s <Count>] [{/j <Hostlist>
| /k <Hostlist>}] [/w <timeout>] [/R] [/S <Srcaddr>] [/4] [/6] <TargetName>

Nbstat:-The Nbstat command is a great command to use when you need to display the NetBIOS over
TCP/IP protocol statistics. The Nbstat command can also be used to display NetBIOS name tables for both
local and remote computers. The Nbstat command can also be used to display the NetBIOS name cache,
which will show you all of the NetBIOS names that have recently been associated with a specific IP
43
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

address. When you use the -R and -RR attributes along with the Nbstat command you can refresh or purge
the NetBIOS name cache (-R) and the names registered with WINS, Windows Internet Name Service, (-
RR). The NetBIOS name cache helps to reduce network traffic by eliminate the need for broadcasting or
long WINS queries

Syntax:

nbstat[-aRemoteName][-AIPAddress][-c][-n][-r][-R][-RR][-s][-S][Interval]

Net:-The net user command is used to add, delete, and otherwise manage the users on a
computer. Net view is used to show a list of computers and network devices on the network.
The net helpmsg is used to display more information about the numerical network messages you might
receive when using net commands.

44
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Netstat:-The netstat command is a Command Prompt command used to display very detailed information
about how your computer is communicating with other computers or network devices.

Specifically, the netstat command can show details about individual network connections, overall and
protocol-specific networking statistics, and much more, all of which could help troubleshoot certain kinds
of networking issues.

Syntax:-netstat [-a] [-e] [-n] [-o] [-p <Protocol>] [-r] [-s] [<Interval>]

Parameters:-

Parameter Description

-a Displays all active TCP connections and the TCP and UDP ports on which the
computer is listening.

-e Displays Ethernet statistics, such as the number of bytes and packets sent and
received. This parameter can be combined with -s.

-n Displays active TCP connections, however, addresses and port numbers are
expressed numerically and no attempt is made to determine names.

-o Displays active TCP connections and includes the process ID (PID) for each
connection. You can find the application based on the PID on the Processes
tab in Windows Task Manager. This parameter can be combined with -a, -n,
and -p.

-p Shows connections for the protocol specified by Protocol. In this case,


the Protocol can be tcp, udp, tcpv6, or udpv6. If this parameter is used with -
s to display statistics by protocol, Protocol can be tcp, udp, icmp, ip, tcpv6,
udpv6, icmpv6, or ipv6.

-s Displays statistics by protocol. By default, statistics are shown for the TCP,
UDP, ICMP, and IP protocols. If the IPv6 protocol is installed, statistics are
shown for the TCP over IPv6, UDP over IPv6, ICMPv6, and IPv6 protocols.
The -p parameter can be used to specify a set of protocols.

45
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Parameter Description

-r Displays the contents of the IP routing table. This is equivalent to the route
print command.

Redisplays the selected information every Interval seconds. Press CTRL+C to


stop the redisplay. If this parameter is omitted, netstat prints the selected
information only once.

/? Displays help at the command prompt.

46
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

PRACTICAL NO. 12
Objective: Configuration of networks using static and default routes.
Theory:
Topology Diagram

This topology represents a small WAN. Each device in this network has been configured with
IP addresses; however, no routing has been configured. The company management wants to
use static routes to connect the multiple networks.
Step 1: Test connectivity between the PCs and the default gateway.
To determine if there is connectivity from each PC to its configured gateway, first use a simple ping
test.
a. Click BOpc and go to Desktop > CommandPrompt.
b. From the command prompt, type the ipconfig command. Note the IP address for BOpc
and thedefault gateway address. The default gateway address is the IP address for the
Fast Ethernet interface on BranchOffice.
c. Ping 192.168.1.1, the default gateway address for the BranchOffice LAN, from the
commandprompt on BOpc. This ping should besuccessful.
d. Click PNpc and go to Desktop > CommandPrompt.
e. From the command prompt, type the ipconfig command. Note the IP address for PNpc
and thedefault gateway address. The default gateway address is the IP address for the
Fast Ethernet interface on PartnerNet.
f. Ping 192.168.3.1, the default gateway address for the PartnerNet LAN, from the
command prompton PNpc. This ping should besuccessful.
g. Repeat steps a, b, and c for MOpc and its respective default gateway, the Fast
Ethernet interfaceon MainOffice. Each of these ping tests should besuccessful.
Step 2: Ping between routers to test connectivity.
Use a console cable and terminal emulation software on BOpc to connect to BranchOffice.
47
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

a. Test connectivity with MainOffice by pinging 10.10.10.1, the IP address of the


directlyconnected serial 3/0 interface. This ping should succeed.
b. Test connectivity with MainOffice by pinging 10.10.10.5, the IP address of the
serial 2/0interface. This ping shouldfail.
c. Issue the show ip route command from the terminal window of BOpc. Note
that only directly connected routes are shown in the BranchOffice routing
table. The ping to 10.10.10.5 failed because the BranchOffice router has no
routing table entry for10.10.10.5.
d. Repeat steps a through d on the other two PCs. The pings to directly
connected networkswill succeed. However, pings to remote networks
willfail.
e. What steps must be taken to reach all the networks from any PC in theactivity?

Step 3: Viewing the routing tables.


You can view routing tables in Packet Tracer using the Inspect tool. The Inspect tool is in
the Common Tools bar to the right of the topology. The Inspect tool is the icon that appears
as a magnifying glass.
a. In the Common Tools bar, click on the Inspecttool.
b. Click the MainOffice router and choose RoutingTable.
c. Click the BranchOffice router and choose RoutingTable.
d. Click the PartnerNet router and choose RoutingTable.
e. Move the routing table windows around so that you can see all three atonce.
f. What networks do each of the routers already knowabout?

g. Does each router know how to route to all networks in the topology? After
comparing therouting tables, close the window for each routing table by
clicking the x in the upper right corner of each window.

Step 4: Configure default routes on the BranchOffice and PartnerNet routers.


To configure static routes for each router, first determine which routes need to be added for
each device. For the BranchOffice and the PartnerNet routers, a single default route allows
these devices to route traffic for all networks not directly connected. To configure a default
route, you must identify the IP address of the next hop router, which in this case is the
MainOffice router.
a. From the Common toolbar, click the Selecttool.
b. Move the cursor over the red serial link between the BranchOffice router
and theMainOffice router. Notice that the interface of the next hop isS3/0.
c. Move the cursor over the MainOffice router and note that the IP address
for Serial 3/0is 10.10.10.1.
d. Move the cursor over the red serial link between the PartnerNet router and the
MainOffice router. Notice that the interface of the next hop isS2/0.

48
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

e. Move the cursor over the MainOffice router and note that the IP address
for Serial 2/0is 10.10.10.5.
f. Configure the static routes on both the BranchOffice and PartnerNet routers
using the CLI.Click the BranchOffice router, and click the CLItab.
g. At the BranchOffice>prompt, type enable to enter privileged EXECmode.
h. At the BranchOffice# prompt, type configureterminal.
i. The syntax for a default route is ip route 0.0.0.0 0.0.0.0
next_hop_ip_address. Type iproute 0.0.0.0 0.0.0.010.10.10.1.
j. Type end to get back to the BranchOffice#prompt.
k. Type copy run start to save the configurationchange.
l. Repeat steps f through k on the PartnerNet router, using 10.10.10.5 as the next hop
IPaddress.

Step 5: Configure static routes at Main Office.


The configuration of static routes at the Main Office is a bit more complex because the
MainOffice router is responsible for routing traffic to and from the Branch Office and
PartnerNet LAN segments.
The MainOffice router knows only about routes to the 10.10.10.0/30, 10.10.10.4/30, and
192.168.2.0/24 networks because they are directly connected. Static routes to the
192.168.1.0/24 and 192.168.3.0/24 networks need to be added so that the MainOffice router
can route traffic between the networks behind the BranchOffice and PartnerNet routers.
a. Click the MainOffice router, and then click the CLItab.
b. At the MainOffice> prompt, type enable to enter privileged EXECmode.
c. At the MainOffice# prompt, type configureterminal.
d. The syntax for a static route is ip route network subnet_masknext_hop_ip_address:

ip route 192.168.1.0 255.255.255.010.10.10.2


ip route 192.168.3.0 255.255.255.010.10.10.6

e. Type end to return to the MainOffice#prompt.


f. Type copy run start to save the configurationchange.
g. Repeat steps a through e from Step 3. View the routing tables and notice the difference in
therouting
tables. The routing table for each router should have an “S” for each static route.

Step 6: Test connectivity.


Now that each router in the topology has static routes configured, all hosts should have
connectivity to all other hosts. Use ping to verify connectivity.
a. Click BOpcand click the Desktoptab.
b. Choose the Command promptoption.

49
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

c. Type ping 192.168.3.2. The ping should be successful, verifying that the static
routes areconfigured properly.
d. Type ping 192.168.2.2. Notice that the result is successful even though you did not
specifically addthe 192.168.2.0 network as a static route into any of the routers.
Because a default route was used on the BranchOffice and PartnerNet routers, a route
for the 192.168.2.0 network was not needed. The default route sends all traffic
destined off network to the MainOffice router. The 192.168.2.0 network is directly
connected to the MainOffice router; therefore, no additional routes needed to be
added to the routingtable
e. Click the Check Results button at the bottom of this instruction window to check yourwork.

50
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

PRACTICAL NO. 13
Objective: To demonstrate the sharing of resources from FTP Server to a desktop.
Theory:
The File Transfer Protocol (FTP) is a set of rules that computers on a network use to communicate with
one another. The tool allows users to transfer files over networks such as the internet. This article explains
how to;

• Create FTP user accounts


• Use different methods, including command line, web browser or an FTP client to connect servers or
computers and transfer files.
• Copy files between servers and local machines.
• Copy files between two servers
To transfer files using FTP, you require to an FTP server, a user account, and an FTP client or
application. Generally, most FTP servers require a username and a password in order to make a
connection. However, some servers may allow users to connect as anonymous users with no username or
password.

The common methods of making an FTP connection are;

1. Username and password Login: This is a restrictive method where only users with an account can access
the server. This is common when there is a need for users to upload or download files to and from the server.

2. Username only: Some sites only require a username to access. However, this will only allow
downloads and not uploads

3. Anonymous FTP access: This does not require the user to enter a username or password and is the
easiest. The access is usually for sites where users can only download files such as forms, software, and
others.

Creating FTP User Accounts

1.Log in to the domain cPanel

2.Navigate to Files and click FTP accounts

51
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

3.Type in the username and password for your new account in the Log In and Password boxes. If you
have several domains in your cPanel account, ensure that you select the correct one where you want the
FTP account

4.Type in a directory if you want different one from the default

5.Specify the disk space if you want something different from the default 2000MB. You can either type
in the disk space, or select unlimited at the Quota section at the bottom.

52
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

3.Click Create FTP Account

Once the process is complete, you will see a screen that shows the login names, path, and quota. To see
the details for each FTP account, click Configure FTP client. This will show you the FTP username, server,
and port.

53
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Different Methods of Using FTP to Transfer FIles

The three common methods are

• Web browser: Does not require a client and works directly from the browser, most used for
downloading files from the server.
• Command line FTP: All major operating systems have FTP client’s functionality available as a
command line.
• A GUI FTP client: These are usually easy-to-use third party application that allows users to connect
and transfer files over FTP.
Connecting to an FTP Server on a Web Browser

The web browser method works the same way as a website. However, instead of typing the HTTP at the
address bar, you replace it with FTP.

54
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

With the browser access, you do not need a client. You simply type the FTP server at the address bar in
this format: ftp://yourserver_name.com or ftp.yourserver_name.com

Connect to an FTP server with a username and password on a web browser

1.Open the browser (in our case we will use Firefox)

2.Type the FTP address of the server you wish to access. The syntax for FTP addresses is
ftp://ftp.domain_name.com or ftp://domain_name.com

3.Dismiss the error dialogs the server returns if necessary.

4.Type the FTP username and password in the Log On As dialog prompt

5.Click OK or Log In to access the server (depending on the type of browser)

You can also access the server by typing in your FTP username in the browser’s address bar. This will
give you a password required box where you will type your password and proceed

Add FTP Credentials in the Browser Address Bar


Instead of waiting for the logon dialog box, you can enter the username and password in the address bar.
This will open the FTP server without prompting for a password.

1.Open the web browser

2.In the address bar, type ftp://username:[email protected]_name.com

This allows you to open the FTP server and download files.

55
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Command Line FTP

To use the command line FTP, open the DOS Prompt in Windows or Terminal in Linux and Mac.

In windows 7, click start and type command at the search programs and files. Click the Command
Prompt. Alternatively, click start, programs and then the Accessories where you will find
the Command Prompt.

56
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

1.Type the command ftp ftp.yourdomain_name.com at the

ftpftp.yourdomain_name.com> at the C:> prompt.

2.Enter your username and password.

Alternatively, type FTP and press Enter at the command prompt in Windows. From here, use
the open command to connect to the server.

1. ftp> openftp.ftpserver_name.com

Once you login, it takes you to the default directory. You can move to the one where you want to copy
files to, and open it using the command.

1. ftp>cd directory_name
To upload files to the active folder of the remote machine or server, use the command in the format

1. ftp> put filename+extension


For example ftp> put readme.txt will upload the file readme.txt from your local folder to the remote
server.

ftp> mput *.xlsx , uploads all excel files.

You can also use send instead of put.

57
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Similarly uses get to download single files and mget for multiple

1. ftp> get readme.txt


1. ftp>mget *.pdf

Using an FTP Client to Transfer Files over FTP Connections

Moving files is much easier when using an FTP client and you may consider one if you require regular
access to the FTP servers. Using these allows you to easily upload, download or transfer files much easier
than a command line or web browser. For the purpose of this article, we will look at two FTP clients for
Windows

Winscp FTP Client for Windows

1.Download and install the WinSCP client here

2.Open the application

3.Type your FTP server name in the format ftp.server_name.com

4.Type your Host name in the format user1@server_name.com

5.Select port 21

6.Click Login

7.Click Save if you do not want the server to keep on asking you to log in every time.

58
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

You may choose Anonymous login if the server allows it.

A screen with two panes opens up after log successful logon. By default, the left-hand pane is the local
drive while the right is the root directory of the remote FTP location.

59
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

To upload files

1.Select the files on the left-hand pane. You can select one or more files or folders using the control and
shift buttons.

2.Click the Upload drop-down button to choose whether you just want to upload normally, in the
background or and whether to transfer the files and then delete from the source location.

To download files from the server,

1.Select folder or files on the right-hand pane

2.Click download (use the drop-down arrow to select the option)

Alternatively, transfer and then right-click, it gives the same options as clicking on the drop-down button.

60
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Use FTP Rush to Transfer Files Between Two Servers

The FTP Rush works almost the same way as the WinSCP. However, it has the option of transferring files
between two remote servers.

1.Download the FTP Rushhere

2.Install the application on your Windows computer

3.Open the application.

By default FTP Rush displays a local directory on the left pane and the remote on the right pane.
However, you can switch these the way you want them as well as connect to two remote servers. If you
want two remote servers, click on the computer /server on the icons bar under the name Local.

61
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

4.To connect to remote machine, click on the (2) Remote bar.

5.At the top of the page, enter the Host name, port, FTP Username and Password, and the Path. Click
the quick connect button just before the Host, or press Enter key to connect. Alternatively, click on the
drop-down button between the connect button and Host to open Quick Connect dialog box. Enter the
details FTP details and click OK to connect.

62
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Alternatively, click the connect/disconnect icon and enter the details.

To copy files between different computers or server, go to the correct pane select the files you want to
upload to download and then click the Transfer button (Green arrow). Right-clicking on the highlighted
files will also give you the Transfer and other options such as Delete, Make directory, Advanced
Transfer, etc.

• To upload files, select the files from your Local pane and click the transfer arrow.

63
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

• To download files from the server to local, select the files in the Remote pane and click transfer arrow.

To transfer files between two remote servers,

1.Go to the Local drive pane and click the icon to switch to remote.

2.Enter the FTP username and password for the second website and click OK.

3.Once you establish a connection to each server, select and transfer the files you want to copy to the other
server.

Conclusion:

64
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

FTP is a file transmission protocol that allows users to transfer files between servers or computers. To
perform a transfer, upload or download, a user requires a network connection, an FTP server, and an
account.

To access the FTP server, a user can use the inbuilt tools such as the command line which is available in
all major operating systems, a web browser, or a free or premium third-party FTP client or application.
Each of these has its benefits and limitations as well as different level of ease-of-use.

The command line can be a challenge for users who are not conversant while a browser access may have
its limits. The FTP clients are much easier to use suitable for users who are not comfortable with the
command lines.

65
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

PRACTICAL NO. 14
Objective: To study and demonstrate various features of TEAM VIEWER Application on
a. Two PCs
b. Two Mobiles
c. Two PC’s and Mobiles

Theory:

• Webserver
For controlling a remote machine, in this assignment we will have a look at how to use
Team Viewer. Team Viewer is a powerful program that will let you take remote control of
a PC over the internet. Team Viewer is a clever and very powerful program that will let
you take remote control of a PC over the internet. This makes it ideal for retrieving
forgotten files, and it’s also a great way of helping friends and family with their computer
problems without leaving the comfort of your desk.
If you’re a home user you can download and install the software for free. For business
use, see the licensing options. As you read on we’ll discover how to rescue that forgotten
file and also how to take remote control of your desktop PC. Here’s how to do it.

• Step-by-step: Get files from your PC remotely


Grab the software

Figure 14.1: Grab the software

Team Viewer is like a telephone conversation made between two PCs, so both machines
will need to have the software installed. We’re going to assume you’ve a main desktop
PC and a laptop that you take out and about with you. To get started, download Team
Viewer on your desktop PC from www.teamviewer.com.

66
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Get configured

Figure 14.2: Get configured

Now click ’Run’ at the bottom of the screen and, when prompted, accept the license agreement.
You’ll need to check the two tick boxes here as well. Finally, when prompted, choose ’Personal/
non-commercial use’ and click ’Next’. The next screen is called ’Setup unattended access’. All
you need do is click ’Next’ to proceed.
Make an account

Figure 14.3: Make an account

On the next screen, you’ll need to give your computer a password. Once you’ve chosen one, click
’Next’. On the following screen you’ll be asked to provide your email address and a Team Viewer
password; make a note of this password, because you’ll need it later. Click ’Next’ when you’re
done.

67
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Activate your team

Figure 14.4: Activate your team

You will now see a screen that looks like the one above. Don’t worry about the passwords
at this point - we’ll use those later. Your final job is to access your email inbox and find a
message from Team Viewer. You’ll need to open it and click on the long link, which will
activate your Team Viewer registration.

Set up your laptop

Figure 14.5: Set up your laptop

Next, it’s time to fire up your laptop and install Team Viewer there, too. When you’re done,
you’ll need to follow the same steps as before until you reach the screen above. This time,
select’ already have a Team Viewer account’ and enter the email address you registered
with, along with your Team Viewer password.

68
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Take control

Figure 14.6: Take control

Let’s be adventurous and give full control of your desktop to your laptop. Looking at your main
PC, note down the number next to ’Your ID’. Now, working on your laptop, enter this number
into the ’Partner ID’ box. Click ’Connect to partner’ and enter your Team Viewer password.
You’ll see your desktop PC’s Windows desktop appear.
Access your PC remotely

Figure 14.7: Access your PC remotely

Working on your laptop, you should now be able to move icons around on your other PC. You
can open programs, close programs and make system configuration changes too. In this mode,
Team Viewer is also ideal for troubleshooting PCs remotely. Set it up as before and you’ll be
able to help your friends without leaving your own home.

69
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY

Retrieve that file

Figure 14.8: Retrieve that file

If you’ve forgotten to transfer a file from your desktop, close the windows that
control your other PC, then look under ’Control remote computer’ in the Team Viewer
display. Select ’File transfer >Connect >Log on’. Navigate to your file and se-
lectit.Click’Retrieve’anditwillbetransferredtoyourlaptop’sMyDocuments folder.

Conclusion:
In this assignment, we studied to install and setup Team Viewer for controlling remote
machine.

70
Roll Number

You might also like