Sample CN Lab File Manual
Sample CN Lab File Manual
Semester – 4th
Assistant Professor
1
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
INDEX
SRNo. NAME OF PRACTICAL PAGE
NO
1 To study the different types of network cables and network 3-8
topologies
2 Implement and test the cross wired cable and straight through 9-12
cable using clamping tool and network lab cable tester
3 Study and familarization with various network devices 13-16
4 Familarization with packet tracer simulation tool 17-19
5 Study and implementation of IP addressing schemes 20-22
2
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
PRACTICAL NO. 1
OBJECTIVE: To study the different types of network cables and network topologies.
THEORY:
Network Cables: Networking cables are networking hardware used to connect one network device to other
network devices or to connect two or more computers to share printers, scanners etc. Different types of
network cables, such as coaxial cable, optical fiber cable, and twisted pair cables, are used depending on the
network's physical layer, topology, and size.
1. Twisted Pair Cables: Twisted pair cabling is a form of wiring in which pairs of wires are twisted
together for the purposes of canceling out electromagnetic interference (EMI) from other wire pairs
and from external sources. This type of cable is used for home and corporate Ethernet networks.
Twisted pair cabling is used in short patch cables and in the longer runs in structured cabling.
ADVANTAGES
• It can be used to carry both analog and digital data.
• It is the least expensive media of transmission for short distances.
• Attenuation is very high.
• It offers very poor security and is relatively easy to tap.
2. Coaxial Cable: Coaxial cables, commonly called coax, are copper cables with metal shielding
designed to provide immunity against noise and greater bandwidth. Coax can transmit signals over
larger distances at a higher speed as compared to twisted pair cables.
3
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
ADVANTAGES
• sufficient frequency range to support multiple channel, which allows for much greater throughput.
• lower error rates. because the inner conductor is in a Faraday shield, noise immunity is improved,
and coax has a lower error rates and therefore slightly better performance than twisted pair.
DISADVANTAGES
• more expensive to install compare to twisted pair cable.
• the thicker the cable, the more difficult to work with.
ADVANTAGES
• It has higher electrical resistance and gence can operate safely near to high voltage lines and
equipments.
• It is light in weight and hence easy to install.
DISADVANTAGES
• The initial installation cost is higher due to expensive optical transmitter and receiver. Moreover it
requires specific tools for maintenance and repair.
• It is difficult to splice compare to wires usually at the starting and end joints. Moreover interfacing
tools and connectors are costly.
4
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
NETWORK TOPOLOGIES: Geometric representation of how the computers are connected to each other
is known as topology. There are mainly five types of network topologies :
1. Mesh Topology: In mesh topology each device is connected to every other device on the network
through a dedicated point-to-point link. When we say dedicated it means that the link only carries
data for the two connected devices only.
ADVANTAGES
• No data traffic issues as there is a dedicated link between two devices which means the link is only
available for those two devices.
• Mesh topology is reliable and robust as failure of one link doesn’t affect other links and the
communication between other devices on the network.
DISADVANTAGES
2. Star Topology: In star topology each device in the network is connected to a central device called
hub. Unlike Mesh topology, star topology doesn’t allow direct communication between devices, a
device must have to communicate through hub. If one device wants to send data to other device, it
has to first send the data to hub and then the hub transmit that data to the designated device.
5
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
ADVANTAGES
• Less expensive because each device only need one I/O port and needs to be connected with hub with
one link.
• Easier to install
DISADVANTAGES
• If hub goes down everything goes down, none of the devices can work without hub.
• Hub requires more resources and regular maintenance because it is the central system of star
topology.
3. Bus Topology: In bus topology there is a main cable and all the devices are connected to this main
cable through drop lines. There is a device called tap that connects the drop line to the main cable.
Since all the data is transmitted over the main cable, there is a limit of drop lines and the distance a
main cable can have.
ADVANTAGES
6
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
4. Ring Topology: In ring topology each device is connected with the two devices on either side of it.
There are two dedicated point to point links a device has with the devices on the either side of it.
This structure forms a ring thus it is known as ring topology. If a device wants to send data to another
device then it sends the data in one direction, each device in ring topology has a repeater, if the
received data is intended for other device then repeater forwards this data until the intended device
receives it.
ADVANTAGES
• Easy to install.
• Managing is easier as to add or remove a device from the topology only two links are required to be
changed.
DISADVANTAGES
• A link failure can fail the entire network as the signal will not travel forward due to failure.
• Data traffic issues, since all the data is circulating in a ring.
5. Hybrid Topology: A combination of two or more topology is known as hybrid topology. For
example: a combination of star and mesh topology is known as hybrid topology.
ADVANTAGES
7
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
• We can choose the topology based on the requirement for example, scalability is our concern then
we can use star topology instead of bus technology.
• Scalable as we can further connect other computer networks with the existing networks with different
topologies.
DISADVANTAGES
8
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
PRACTICAL NO. 2
OBJECTIVE: Implement and test the cross-wired cable and straight through cable using clamping tool
and network lab cable network tester.
MATERIAL REQUIRED:
1. Cat5e Ethernet cable – I recommend purchasing a box of Cat5e cable. You will save money by purchasing
your cable in bulk.
2. RJ-45 connectors
3. Crimper Tool – capable of crimping 8 wires (RJ-45) and 6 wire (RJ-11). Most tools have built in cutters too.
4. Stripper Tool
5. Scissors – I prefer using a scissors
6. Cable Tester – For testing that your cable connections are good and there are not any open or crossed wires
1. Cut a piece of cable to the length you will need. Give a little extra to make room for mistakes.
2. Strip a half inch to an inch of the outer jacket away from the cable. If you use strippers make
sure not to nick the wire pairs and expose the copper, this could introduce crosstalk onto your wires.
I prefer to use a scissor and my fingers to tear away the jacket. Then I cut with the scissors to clean
up the edge.
9
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
3. Now you need to untwist the wire pairs (not too much, only undo one or two twists) so you can
align them according to the EIA-TIA568B wire color sequence. I use my fingers to straighten the
wires by bending them back and forth, straightening them as they warm up.
1 2 3 4 5 6 7 8
4. I usually have to trim the ends of the wires so they line up and create a straight edge.
5. Now holding an RJ-45 connector with the tab side facing down, push the 8 wires into the connector,
sliding each wire into a groove. While holding the connector tab side down the white/orange wire
should be on the far left and the brown wire should be on the far right. It is very important that the
wires push all the way up and into the connector so that when the pins are pushed down during
crimping they will make contact with the wires. The sleeve or jacket of the cable (light blue below)
should also be pushed in as far as it can go so it will be held in place once crimped. You may want
to pull the wires out and put them back in to make sure they are sliding in correctly, this will also
further straighten the wires.
10
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
6. Before crimping, examine the cable and connector from the side. Did the wires slide all the way up
in to the proper grooves? Are the colors in the proper order when observed from tab side down? Did
the jacket slide all the way into the connector? If not, you may need pull the cable out of the
connector, trim the wires or the jacket accordingly, and reinsert.
7. If everything looks good, using your crimper tool insert the connector and cable into the 8 wire slot
and press down tightly. This will cause a piece of plastic in the connector to press down on the jacket
and hold the cable in the connector preventing it from accidentally pulling out. Crimping also forces
copper pins in the connector to push down and make contact with the separate wires.
8. You are now finished terminating one end of the cable. Repeat the process on the other end of the
cable and when you are done, insert the cable into a cable tester and run a wire test to make sure that
none of the wires are accidentally crossed, by not being in the right order, or open by not touching
the connector pins. Depending on the cable tester you may need to read the manual to understand
the device output.
11
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
9. Lastly, test your cable by using it on your network. Attach the cable to your computer’s NIC and
the other end to your switch.
12
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
PRACTICAL NO. 3
OBJECTIVE: Study and familiarization with various network devices.
THEORY:
Network Devices: Network devices, or networking hardware, are physical devices that are required for
communication and interaction between hardware on a computer network.
• Hub
• Switch
• Router
• Bridge
• Gateway
• Modem
• Repeater
• Access Point
HUB:
Hubs connect multiple computer networking devices together. A hub also acts as a repeater in that it
amplifies signals that deteriorate after traveling long distances over connecting cables. A hub is the
simplest in the family of network connecting devices because it connects LAN components with identical
protocols.
A hub can be used with both digital and analog data, provided its settings have been configured to prepare
for the formatting of the incoming data. For example, if the incoming data is in digital format, the hub
must pass it on as packets; however, if the incoming data is analog, then the hub passes it on in signal
form.
Hubs do not perform packet filtering or addressing functions; they just send data packets to all connected
devices. Hubs operate at the Physical layer of the Open Systems Interconnection (OSI) model. There are
two types of hubs: simple and multiple port.
13
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
SWITCH:
Switches generally have a more intelligent role than hubs. A switch is a multiport device that improves
network efficiency. The switch maintains limited routing information about nodes in the internal network,
and it allows connections to systems like hubs or routers. Strands of LANs are usually connected using
switches. Generally, switches can read the hardware addresses of incoming packets to transmit them to the
appropriate destination.
Using switches improves network efficiency over hubs or routers because of the virtual circuit capability.
Switches also improve network security because the virtual circuits are more difficult to examine with
network monitors. You can think of a switch as a device that has some of the best capabilities of routers
and hubs combined. A switch can work at either the Data Link layer or the Network layer of the OSI
model. A multilayer switch is one that can operate at both layers, which means that it can operate as both a
switch and a router. A multilayer switch is a high-performance device that supports the same routing
protocols as routers.
Switches can be subject to distributed denial of service (DDoS) attacks; flood guards are used to prevent
malicious traffic from bringing the switch to a halt. Switch port security is important so be sure to secure
switches: Disable all unused ports and use DHCP snooping, ARP inspection and MAC address filtering.
ROUTER:
Routers help transmit packets to their destinations by charting a path through the sea of interconnected
networking devices using different network topologies. Routers are intelligent devices, and they store
information about the networks they’re connected to. Most routers can be configured to operate as packet-
filtering firewalls and use access control lists (ACLs). Routers, in conjunction with a channel service
unit/data service unit (CSU/DSU), are also used to translate from LAN framing to WAN framing. This is
needed because LANs and WANs use different network protocols. Such routers are known as border
routers. They serve as the outside connection of a LAN to a WAN, and they operate at the border of your
network.
Router are also used to divide internal networks into two or more subnetworks. Routers can also be
connected internally to other routers, creating zones that operate independently. Routers establish
communication by maintaining tables about destinations and local connections. A router contains
information about the systems connected to it and where to send requests if the destination isn’t known.
14
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Routers usually communicate routing and other information using one of three standard protocols: Routing
Information Protocol (RIP), Border Gateway Protocol (BGP) or Open Shortest Path First (OSPF).
Routers are our first line of defense, and they must be configured to pass only traffic that is authorized by
network administrators. The routes themselves can be configured as static or dynamic. If they are static,
they can only be configured manually and stay that way until changed. If they are dynamic, they learn of
other routers around them and use information about those routers to build their routing tables.
Routers are general-purpose devices that interconnect two or more heterogeneous networks. They are
usually dedicated to special-purpose computers, with separate input and output network interfaces for each
connected network. Because routers and gateways are the backbone of large computer networks like the
internet, they have special features that give them the flexibility and the ability to cope with varying
network addressing schemes and frame sizes through segmentation of big packets into smaller sizes that fit
the new network components. Each router interface has its own Address Resolution Protocol (ARP)
module, its own LAN address (network card address) and its own Internet Protocol (IP) address. The
router, with the help of a routing table, has knowledge of routes a packet could take from its source to its
destination. The routing table, like in the bridge and switch, grows dynamically. Upon receipt of a packet,
the router removes the packet headers and trailers and analyzes the IP header by determining the source
and destination addresses and data type, and noting the arrival time. It also updates the router table with
new addresses not already in the table. The IP header and arrival time information is entered in the routing
table. Routers normally work at the Network layer of the OSI model.
BRIDGE:
Bridges are used to connect two or more hosts or network segments together. The basic role of bridges in
network architecture is storing and forwarding frames between the different segments that the bridge
connects. They use hardware Media Access Control (MAC) addresses for transferring frames. By looking
at the MAC address of the devices connected to each segment, bridges can forward the data or block it
from crossing. Bridges can also be used to connect two physical LANs into a larger logical LAN.
Bridges work only at the Physical and Data Link layers of the OSI model. Bridges are used to divide larger
networks into smaller sections by sitting between two physical network segments and managing the flow
of data between the two.
15
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Bridges are like hubs in many respects, including the fact that they connect LAN components with
identical protocols. However, bridges filter incoming data packets, known as frames, for addresses before
they are forwarded. As it filters the data packets, the bridge makes no modifications to the format or
content of the incoming data. The bridge filters and forwards frames on the network with the help of a
dynamic bridge table. The bridge table, which is initially empty, maintains the LAN addresses for each
computer in the LAN and the addresses of each bridge interface that connects the LAN to other LANs.
Bridges, like hubs, can be either simple or multiple port.
Bridges have mostly fallen out of favor in recent years and have been replaced by switches, which offer
more functionality. In fact, switches are sometimes referred to as “multiport bridges” because of how they
operate.
16
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
PRACTICAL NO. 4
OBJECTIVE: Familiarization with packet tracer simulation tool.
THEORY:
Introduction to CISCO packet tracer
Packet Tracer is a powerful network simulator that can be utilized in training for Network certifications by
allowing students to create networks with an almost unlimited number of devices and to experience
troubleshooting without having to buy real Cisco routers or switches. The tool is created by Cisco Systems.
The purpose of Packet Tracer is to offer students a tool to learn the principles of networking as well as
develop Cisco technology specific skills. However, it is not be used as a replacement for Routers or Switches.
KEY FEATURES:
Packet Tracer Workspaces: Cisco Packet Tracer has two workspaces—logical and physical. The logical
workspace allows users to build logical network topologies by placing, connecting, and clustering virtual
network devices. The physical workspace provides a graphical physical dimension of the logical network,
giving a sense of scale and placement in how network devices such as routers, switches, and hosts would
look in a real environment. The physical view also provides geographic representations of networks,
including multiple cities, buildings, and wiring closets. The physical workspace provides a graphical view
of the logical network.
Packet Tracer Modes: Cisco Packet Tracer provides two operating modes to visualize the behavior of a
network—real-time mode and simulation mode. In real-time mode the network behaves as real devices do,
with immediate real-time response for all network activities. The real-time mode gives students a viable
alternative to real equipment and allows them to gain configuration practice before working with real
equipment. In simulation mode the user can see and control time intervals, the inner workings of data
transfer, and the propagation of data across a network. This helps students understand the fundamental
concepts behind network operations. A solid understanding of network fundamentals can help accelerate
learning about related concept
ADVANTAGES:
• It can be used anywhere, you don’t have to carry it. Once you install it in your laptop, it can be carried
even in USP.
• The noise level is minimum to none and the consumption of electricity is also less.
• The major advantage is “sum mode”. This is not available in real gear.
DISADVANTAGES:
• It may cause the loops by affecting the STP.
• It doesn’t support the ether channel regarding the access layer switches.
• With regard to the Frame relay it is low in command.
17
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
STEP 1 Once we have downloading the Packet Tracer exe file, Click on the exe file downloaded. Once
below Window will appears, click “Next”
STEP 2 On next screen, select “I accept the agreement” and click on “Next”.
STEP 3 Setup will show the folder in which the program’s shortcuts will be created. If You want to change
the folder, you can change it. Click on “Next”.
STEP 4 Then the program will ask whether to create a Desktop icon and create a Quick Launch icon. Make
your choice and click on “Next”.
STEP 5 The summary of the settings we selected is displayed. Click on “Install”.
STEP 6 The installation starts.
STEP 7 Packet Tracer is installed and ready to be used.
18
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Step3- Test connectivity. After configuring the addresses, you will have to test connectivity by opening a
command prompt window on the end devices and try pinging the address which the network operates on.
19
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
PRACTICAL NO. 5
OBJECTIVE: Study and implementation of IP addressing schemes.
THEORY:
Step1 Make a network i.e take two switches and connect the end devices with both the switches and then
connect switches with the router (as shown)
Step2 Give IP address and then give the gateways to all the end devices.
20
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
21
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
22
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
PRACTICAL NO. 6
Objective: Creation of simple networking topologies using hub and switch.
Theory:
Step1 Make a network i.e take switch and hub and then connect the end devices with both.
23
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Step3 Configure the IP addresses. After configuring our network is ready for transmission.
Step4 Sending message from PC0 to PC1 through Switch.
24
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
25
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
PRACTICAL NO. 7
Objective: Simulation of web traffic in packet tracer.
Theory:
Step1 Make a network i.e take switch then connect the end devices and server with it.
Step3 Configure the IP addresses. After configuring our network is ready for transmission.
26
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
27
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
PRACTICAL NO. 8
Objective: Study and implementation of various router configuration commands.
Theory:
Topology Diagram
Addressing Table
Device Interface IP Address Subnet Mask Def. Gateway
Fa0/0 192.168.1.1 255.255.255.0 N/A
R1 S0/0/0 192.168.2.1 255.255.255.0 N/A
Fa0/0 192.168.3.1 255.255.255.0 N/A
R2 S0/0/0 192.168.2.2 255.255.255.0 N/A
PC1 N/A 192.168.1.10 255.255.255.0 192.168.1.1
PC2 N/A 192.168.3.10 255.255.255.0 192.168.3.1
30
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
PRACTICAL NO. 9
Objective: Creation of Networks using routers.
Theory:
We already have the Packet Tracer download and have it installed in our computer. Open the program and
select the router from the lower left-hand corner, and drag it into the center of the sandbox screen as seen
below.
We will be setting up a very basic network that allows two computers to communicate, so the next step is to
select end devices from the bottom left-hand corner and drag it to the sandbox screen. Do this twice to make
two computers appear below the router. Now select connections from the same bottom left-hand corner.
When you connect like-devices (Such as a router and computer) you use a crossover cable, so you should
select copper cross-over cable from the second menu to the immediate right. Click on Router0, and connect
the cable via FastEthernet0/0 as seen below:
Now click the PC0 and select Fast Ethernet. You will notice that although a link is established, it is not
functional. You can tell by the red dots that are present on both ends of the connection. Once the router is
configured correctly, the red dots will turn green to indicate the devices are able to communicate.
31
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Do the same operation to PC1, only this time connect the cable to FastEthernet0/1 since FastEthernet0/0 is
already taken by PC0. Your network should be similar to the one below at this point:
Next we have to open the Ethernet ports to allow communication. Although they are physically connected,
they are in a state that is known as being in administrative shut down. Now click on the CLI tab to access
the configuration menu. If you’ve used the Cisco IOS before, you will notice it looks and acts the same way.
1. Press RETURN to start the session.
2. Type enable to get to privileged mode (this gives you more options in configuring the router)
3. Type config terminal (or config t for short) to access the configuration menu.
32
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
5. Type ip address 192.168.10.1 255.255.255.0 to assign an IP address and subnet mask to the
interface.
Do the same thing for PC1, only use 192.168.20.1 for the gateway address, 192.168.20.2 for the IP address,
and 255.255.255.0 for the subnet mask. We can confirm that your network works by sending out a packet
of information from PC0 to PC1, and vice versa. Click the packet icon on the right menu as seen below:
33
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Click on PC0 and then click PC1. On the lower right of the screen you will see a message box that says
“Successful.” If it doesn’t, we may have had a syntax error when putting in an IP address or router
configuration command.
34
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
PRACTICAL NO. 10
Objective: Configuring networks using the concept of sub netting.
Theory:
When we Subnet a network, we basically split it into smaller networks. For example, when a set of IP
Addresses is given to a company, e.g 254 they might want to "break" (the correct term is "partition") that
one network into smaller ones, one for each department. This way, their Technical department and
Management department can each have a small network of their own. By sub netting the network we can
partition it to as many smaller networks as we need and this also helps reduce traffic and hides the complexity
of the network.
By default, all type of Classes (A, B and C) have a subnet mask, we call it the "Default Subnet mask". You
need to have one because:
1) All computers need the subnet mask field filled when configuring IP
3) You should at least enter the default subnet mask for the Class you're using
The table below shows clearly the subnetmask that applies for each network Class.
When dealing with subnet masks in the real world, we are free in most cases to use any type of subnet mask
in order to meet our needs. If for example we require one network which can contain up to 254 computers,
35
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
then a Class C network with its default subnet mask will do fine, but if we need more, then we might consider
a Class B network with its default subnet mask.
Note that the default subnet masks have been set by the IEEE committee, the same guys that set and approve
the different standards and protocols.
The picture below shows our example network (192.168.0.0). All computers here have been configured with
the default Class C subnet mask (255.255.255.0):
Because of the subnet mask we used, all these computers are part of the one network marked in blue. This
also means that any one of these hosts (computers, router and server) can communicate with each other.
If we now wanted to partition this network into smaller segments, then we would need to change the subnet
mask appropriately so we can get the desired result. Let's say we needed to change the subnet mask from
255.255.255.0 to 255.255.255.224 on each configured host.
The picture below shows us how the computers will see the network once the subnet mask has changed:
36
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
37
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
PRACTICAL NO. 11
Objective: Implementation of basic network command and Network configuration commands like ping,
ipconfig, netstat , tracert etc. for trouble shooting network related problems.
Theory:
The various network related commands used in MS-DOS, Windows, Linux ,Unix and other operating
system are explained below.
• Arp
• Finger
• Hostname
• Ipconfig
• Pathping
• Ping
• Nbstat
• Net
• Netstat
• Nslookup
• Router
• Tracert and tracerouter
• Whois
• winipcfg
Arp:- ARP stands for Address Resolution Protocol.This protocol is used by network nodes to match IP
addresses to MAC addresses. The original specification was RFC 826. That has since been updated by RFC
5227, and RFC 5494.
arp [-a [InetAddr] [-N IfaceAddr]] [-g [InetAddr] [-N IfaceAddr]] [-d InetAddr [IfaceAddr]] [-s InetAddr
EtherAddr [IfaceAddr]]
Finger:- The finger command may also be used to look up users on a remote system. The format is to
specify the user as User@Host. If you omit the user name, the finger commandprovides the standard
format listing on the remote system.
Syntax:- { finger | f }[[ -b][ -h] [ -l][ -p]]|[ -i][ -q][ -s][ -w]] [ -f]
[ -m][ User| User @Host| @Host]
Item Description
-b- Gives a brief, long-form listing.
-f- Suppresses printing of header line on output (the first line that defines the fields that are being
displayed).
-h- Suppresses printing of .project files on long and brief long formats.
-i- Gives a quick listing with idle times.
-l- Gives a long-form listing.
-m- Assumes that the User parameter specifies a user ID (used for discretionary access control), not a user
login name.
-p- Suppresses printing of .plan files on long-form and brief long-form formats.
-q- Gives a quick listing.
-s- Gives a short format list.
39
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Hostname:-The hostname command is used to show or set a computer's host name and domain name. It is
one of the most basic of the network administrative utilities.
A host name is a name that is assigned to a host (i.e., a computer connected to the network) that uniquely
identifies it on a network and thus allows it to be addressed without using its full IP address. Domain names
are user-friendly substitutes for numeric IP addresses.
Syntax
IPCONFIG /release [adapter] Release the IP address for the specified adapter.
IPCONFIG /renew [adapter] Renew the IP address for the specified adapter.
IPCONFIG /registerdns Refresh all DHCP leases and re-register DNS names.
IPCONFIG /show class id adapter Display all the DHCP class IDs allowed for adapter.
Pathping:- Pathping sends multiple echo Request messages to each router between a source and destination
over a period of time and then computes results based on the packets returned from each router.
Because pathping displays the degree of packet loss at any given router or link, you can determine which
routers or subnets might be having network problems.
pathping performs the equivalent of the tracert command by identifying which routers are on the path. It
then sends pings periodically to all of the routers over a specified time period and computes statistics based
on the number returned from each. Used without parameters, pathping displays help.
Syntax:-
pathping [/n] [/h] [/g <Hostlist>] [/p <Period>] [/q <NumQueries> [/w <timeout>] [/i <IPaddress>] [/4
<IPv4>] [/6 <IPv6>][<TargetName>]
Parameter Description
/g <Hostlist> Specifies that the echo Request messages use the Loose
Source Route option in the IP header with the set of
intermediate destinations specified in Hostlist. With loose
source routing, successive intermediate destinations can be
41
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Parameter Description
42
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Ping:- The ping command verifies IP-level connectivity to another TCP/IP computer by sending Internet
Control Message Protocol (ICMP) echo Request messages. The receipt of corresponding echo Reply
messages are displayed, along with round-trip times. ping is the primary TCP/IP command used to
troubleshoot connectivity, reachability, and name resolution. Used without parameters, ping displays help.
Syntax:-
ping [/t] [/a] [/n <Count>] [/l <Size>] [/f] [/I <TTL>] [/v <TOS>] [/r <Count>] [/s <Count>] [{/j <Hostlist>
| /k <Hostlist>}] [/w <timeout>] [/R] [/S <Srcaddr>] [/4] [/6] <TargetName>
Nbstat:-The Nbstat command is a great command to use when you need to display the NetBIOS over
TCP/IP protocol statistics. The Nbstat command can also be used to display NetBIOS name tables for both
local and remote computers. The Nbstat command can also be used to display the NetBIOS name cache,
which will show you all of the NetBIOS names that have recently been associated with a specific IP
43
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
address. When you use the -R and -RR attributes along with the Nbstat command you can refresh or purge
the NetBIOS name cache (-R) and the names registered with WINS, Windows Internet Name Service, (-
RR). The NetBIOS name cache helps to reduce network traffic by eliminate the need for broadcasting or
long WINS queries
Syntax:
nbstat[-aRemoteName][-AIPAddress][-c][-n][-r][-R][-RR][-s][-S][Interval]
Net:-The net user command is used to add, delete, and otherwise manage the users on a
computer. Net view is used to show a list of computers and network devices on the network.
The net helpmsg is used to display more information about the numerical network messages you might
receive when using net commands.
44
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Netstat:-The netstat command is a Command Prompt command used to display very detailed information
about how your computer is communicating with other computers or network devices.
Specifically, the netstat command can show details about individual network connections, overall and
protocol-specific networking statistics, and much more, all of which could help troubleshoot certain kinds
of networking issues.
Syntax:-netstat [-a] [-e] [-n] [-o] [-p <Protocol>] [-r] [-s] [<Interval>]
Parameters:-
Parameter Description
-a Displays all active TCP connections and the TCP and UDP ports on which the
computer is listening.
-e Displays Ethernet statistics, such as the number of bytes and packets sent and
received. This parameter can be combined with -s.
-n Displays active TCP connections, however, addresses and port numbers are
expressed numerically and no attempt is made to determine names.
-o Displays active TCP connections and includes the process ID (PID) for each
connection. You can find the application based on the PID on the Processes
tab in Windows Task Manager. This parameter can be combined with -a, -n,
and -p.
-s Displays statistics by protocol. By default, statistics are shown for the TCP,
UDP, ICMP, and IP protocols. If the IPv6 protocol is installed, statistics are
shown for the TCP over IPv6, UDP over IPv6, ICMPv6, and IPv6 protocols.
The -p parameter can be used to specify a set of protocols.
45
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Parameter Description
-r Displays the contents of the IP routing table. This is equivalent to the route
print command.
46
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
PRACTICAL NO. 12
Objective: Configuration of networks using static and default routes.
Theory:
Topology Diagram
This topology represents a small WAN. Each device in this network has been configured with
IP addresses; however, no routing has been configured. The company management wants to
use static routes to connect the multiple networks.
Step 1: Test connectivity between the PCs and the default gateway.
To determine if there is connectivity from each PC to its configured gateway, first use a simple ping
test.
a. Click BOpc and go to Desktop > CommandPrompt.
b. From the command prompt, type the ipconfig command. Note the IP address for BOpc
and thedefault gateway address. The default gateway address is the IP address for the
Fast Ethernet interface on BranchOffice.
c. Ping 192.168.1.1, the default gateway address for the BranchOffice LAN, from the
commandprompt on BOpc. This ping should besuccessful.
d. Click PNpc and go to Desktop > CommandPrompt.
e. From the command prompt, type the ipconfig command. Note the IP address for PNpc
and thedefault gateway address. The default gateway address is the IP address for the
Fast Ethernet interface on PartnerNet.
f. Ping 192.168.3.1, the default gateway address for the PartnerNet LAN, from the
command prompton PNpc. This ping should besuccessful.
g. Repeat steps a, b, and c for MOpc and its respective default gateway, the Fast
Ethernet interfaceon MainOffice. Each of these ping tests should besuccessful.
Step 2: Ping between routers to test connectivity.
Use a console cable and terminal emulation software on BOpc to connect to BranchOffice.
47
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
g. Does each router know how to route to all networks in the topology? After
comparing therouting tables, close the window for each routing table by
clicking the x in the upper right corner of each window.
48
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
e. Move the cursor over the MainOffice router and note that the IP address
for Serial 2/0is 10.10.10.5.
f. Configure the static routes on both the BranchOffice and PartnerNet routers
using the CLI.Click the BranchOffice router, and click the CLItab.
g. At the BranchOffice>prompt, type enable to enter privileged EXECmode.
h. At the BranchOffice# prompt, type configureterminal.
i. The syntax for a default route is ip route 0.0.0.0 0.0.0.0
next_hop_ip_address. Type iproute 0.0.0.0 0.0.0.010.10.10.1.
j. Type end to get back to the BranchOffice#prompt.
k. Type copy run start to save the configurationchange.
l. Repeat steps f through k on the PartnerNet router, using 10.10.10.5 as the next hop
IPaddress.
49
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
c. Type ping 192.168.3.2. The ping should be successful, verifying that the static
routes areconfigured properly.
d. Type ping 192.168.2.2. Notice that the result is successful even though you did not
specifically addthe 192.168.2.0 network as a static route into any of the routers.
Because a default route was used on the BranchOffice and PartnerNet routers, a route
for the 192.168.2.0 network was not needed. The default route sends all traffic
destined off network to the MainOffice router. The 192.168.2.0 network is directly
connected to the MainOffice router; therefore, no additional routes needed to be
added to the routingtable
e. Click the Check Results button at the bottom of this instruction window to check yourwork.
50
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
PRACTICAL NO. 13
Objective: To demonstrate the sharing of resources from FTP Server to a desktop.
Theory:
The File Transfer Protocol (FTP) is a set of rules that computers on a network use to communicate with
one another. The tool allows users to transfer files over networks such as the internet. This article explains
how to;
1. Username and password Login: This is a restrictive method where only users with an account can access
the server. This is common when there is a need for users to upload or download files to and from the server.
2. Username only: Some sites only require a username to access. However, this will only allow
downloads and not uploads
3. Anonymous FTP access: This does not require the user to enter a username or password and is the
easiest. The access is usually for sites where users can only download files such as forms, software, and
others.
51
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
3.Type in the username and password for your new account in the Log In and Password boxes. If you
have several domains in your cPanel account, ensure that you select the correct one where you want the
FTP account
5.Specify the disk space if you want something different from the default 2000MB. You can either type
in the disk space, or select unlimited at the Quota section at the bottom.
52
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Once the process is complete, you will see a screen that shows the login names, path, and quota. To see
the details for each FTP account, click Configure FTP client. This will show you the FTP username, server,
and port.
53
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
• Web browser: Does not require a client and works directly from the browser, most used for
downloading files from the server.
• Command line FTP: All major operating systems have FTP client’s functionality available as a
command line.
• A GUI FTP client: These are usually easy-to-use third party application that allows users to connect
and transfer files over FTP.
Connecting to an FTP Server on a Web Browser
The web browser method works the same way as a website. However, instead of typing the HTTP at the
address bar, you replace it with FTP.
54
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
With the browser access, you do not need a client. You simply type the FTP server at the address bar in
this format: ftp://yourserver_name.com or ftp.yourserver_name.com
2.Type the FTP address of the server you wish to access. The syntax for FTP addresses is
ftp://ftp.domain_name.com or ftp://domain_name.com
4.Type the FTP username and password in the Log On As dialog prompt
You can also access the server by typing in your FTP username in the browser’s address bar. This will
give you a password required box where you will type your password and proceed
This allows you to open the FTP server and download files.
55
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
To use the command line FTP, open the DOS Prompt in Windows or Terminal in Linux and Mac.
In windows 7, click start and type command at the search programs and files. Click the Command
Prompt. Alternatively, click start, programs and then the Accessories where you will find
the Command Prompt.
56
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Alternatively, type FTP and press Enter at the command prompt in Windows. From here, use
the open command to connect to the server.
1. ftp> openftp.ftpserver_name.com
Once you login, it takes you to the default directory. You can move to the one where you want to copy
files to, and open it using the command.
1. ftp>cd directory_name
To upload files to the active folder of the remote machine or server, use the command in the format
57
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Similarly uses get to download single files and mget for multiple
Moving files is much easier when using an FTP client and you may consider one if you require regular
access to the FTP servers. Using these allows you to easily upload, download or transfer files much easier
than a command line or web browser. For the purpose of this article, we will look at two FTP clients for
Windows
5.Select port 21
6.Click Login
7.Click Save if you do not want the server to keep on asking you to log in every time.
58
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
A screen with two panes opens up after log successful logon. By default, the left-hand pane is the local
drive while the right is the root directory of the remote FTP location.
59
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
To upload files
1.Select the files on the left-hand pane. You can select one or more files or folders using the control and
shift buttons.
2.Click the Upload drop-down button to choose whether you just want to upload normally, in the
background or and whether to transfer the files and then delete from the source location.
Alternatively, transfer and then right-click, it gives the same options as clicking on the drop-down button.
60
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
The FTP Rush works almost the same way as the WinSCP. However, it has the option of transferring files
between two remote servers.
By default FTP Rush displays a local directory on the left pane and the remote on the right pane.
However, you can switch these the way you want them as well as connect to two remote servers. If you
want two remote servers, click on the computer /server on the icons bar under the name Local.
61
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
5.At the top of the page, enter the Host name, port, FTP Username and Password, and the Path. Click
the quick connect button just before the Host, or press Enter key to connect. Alternatively, click on the
drop-down button between the connect button and Host to open Quick Connect dialog box. Enter the
details FTP details and click OK to connect.
62
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
To copy files between different computers or server, go to the correct pane select the files you want to
upload to download and then click the Transfer button (Green arrow). Right-clicking on the highlighted
files will also give you the Transfer and other options such as Delete, Make directory, Advanced
Transfer, etc.
• To upload files, select the files from your Local pane and click the transfer arrow.
63
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
• To download files from the server to local, select the files in the Remote pane and click transfer arrow.
1.Go to the Local drive pane and click the icon to switch to remote.
2.Enter the FTP username and password for the second website and click OK.
3.Once you establish a connection to each server, select and transfer the files you want to copy to the other
server.
Conclusion:
64
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
FTP is a file transmission protocol that allows users to transfer files between servers or computers. To
perform a transfer, upload or download, a user requires a network connection, an FTP server, and an
account.
To access the FTP server, a user can use the inbuilt tools such as the command line which is available in
all major operating systems, a web browser, or a free or premium third-party FTP client or application.
Each of these has its benefits and limitations as well as different level of ease-of-use.
The command line can be a challenge for users who are not conversant while a browser access may have
its limits. The FTP clients are much easier to use suitable for users who are not comfortable with the
command lines.
65
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
PRACTICAL NO. 14
Objective: To study and demonstrate various features of TEAM VIEWER Application on
a. Two PCs
b. Two Mobiles
c. Two PC’s and Mobiles
Theory:
• Webserver
For controlling a remote machine, in this assignment we will have a look at how to use
Team Viewer. Team Viewer is a powerful program that will let you take remote control of
a PC over the internet. Team Viewer is a clever and very powerful program that will let
you take remote control of a PC over the internet. This makes it ideal for retrieving
forgotten files, and it’s also a great way of helping friends and family with their computer
problems without leaving the comfort of your desk.
If you’re a home user you can download and install the software for free. For business
use, see the licensing options. As you read on we’ll discover how to rescue that forgotten
file and also how to take remote control of your desktop PC. Here’s how to do it.
Team Viewer is like a telephone conversation made between two PCs, so both machines
will need to have the software installed. We’re going to assume you’ve a main desktop
PC and a laptop that you take out and about with you. To get started, download Team
Viewer on your desktop PC from www.teamviewer.com.
66
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Get configured
Now click ’Run’ at the bottom of the screen and, when prompted, accept the license agreement.
You’ll need to check the two tick boxes here as well. Finally, when prompted, choose ’Personal/
non-commercial use’ and click ’Next’. The next screen is called ’Setup unattended access’. All
you need do is click ’Next’ to proceed.
Make an account
On the next screen, you’ll need to give your computer a password. Once you’ve chosen one, click
’Next’. On the following screen you’ll be asked to provide your email address and a Team Viewer
password; make a note of this password, because you’ll need it later. Click ’Next’ when you’re
done.
67
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
You will now see a screen that looks like the one above. Don’t worry about the passwords
at this point - we’ll use those later. Your final job is to access your email inbox and find a
message from Team Viewer. You’ll need to open it and click on the long link, which will
activate your Team Viewer registration.
Next, it’s time to fire up your laptop and install Team Viewer there, too. When you’re done,
you’ll need to follow the same steps as before until you reach the screen above. This time,
select’ already have a Team Viewer account’ and enter the email address you registered
with, along with your Team Viewer password.
68
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
Take control
Let’s be adventurous and give full control of your desktop to your laptop. Looking at your main
PC, note down the number next to ’Your ID’. Now, working on your laptop, enter this number
into the ’Partner ID’ box. Click ’Connect to partner’ and enter your Team Viewer password.
You’ll see your desktop PC’s Windows desktop appear.
Access your PC remotely
Working on your laptop, you should now be able to move icons around on your other PC. You
can open programs, close programs and make system configuration changes too. In this mode,
Team Viewer is also ideal for troubleshooting PCs remotely. Set it up as before and you’ll be
able to help your friends without leaving your own home.
69
Roll Number
DEPARTMENT OF INFORMATION TECHNOLOGY
If you’ve forgotten to transfer a file from your desktop, close the windows that
control your other PC, then look under ’Control remote computer’ in the Team Viewer
display. Select ’File transfer >Connect >Log on’. Navigate to your file and se-
lectit.Click’Retrieve’anditwillbetransferredtoyourlaptop’sMyDocuments folder.
Conclusion:
In this assignment, we studied to install and setup Team Viewer for controlling remote
machine.
70
Roll Number