ACN Practical Manual Done
ACN Practical Manual Done
Let Assume IP Address of one of the subnet is = 141.14.120.77 and Network Mask =
255.255.192.0/18
Number of hosts:-N = (232-n) 232- 18 in which n is the prefix length and N is the number
of addresses in the block. = 232-18 =214 = 16382 hosts.
b) The Broadcast Address of this Subnet: (any address) OR [NOT (network mask)]
VIII. Precautions
1. Handle computer system carefully
2. Note down the exact output.
IX. Additional Resources used
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
Practical No. 2:a. Capture ICMPv4 packets generated by utility programs like
ping, traceroute and tabulate all the captured parameters using
relevant software.
b. Investigate IP Protocol by capturing IP datagrams and
tabulate all the captured parameters using relevant software.
I. Practical significance
Capture ICMPv4 packets generated by utility programs like ping, traceroute and
tabulate all the captured parameters using relevant software. Learn about the ICMP
protocol, one of the internet's most commonly used protocols, and how it can be
exploited to carry out DDoS attacks or used to perform.
Echo request
The echo request ("ping") is an ICMP/ICMP6 message.
The Identifier and Sequence Number can be used by the client to match the reply with
the request that caused the reply. In practice, most Linux systems use a unique identifier
for every ping process, and sequence number is an increasing number within that
process. Windows uses a fixed identifier, which varies between Windows versions, and
a sequence number that is only reset at boot time.
Echo reply
The echo reply is an ICMP message generated in response to an echo request; it is
mandatory for all hosts, and must include the exact payload received in the request.
The identifier and sequence number can be used by the client to associate each echo
request with its reply.
Packet Analysis:-
Wireshark is an open source cross-platform packet capture and analysis tool, with
versions for Windows and Linux. The GUI window gives a detailed breakdown of the
network protocol stack for each packet, colorising packet details based on protocol, as
well as having functionality to filter and search the traffic, and pick out TCP streams.
Wireshark can also save packet data to files for offline analysis and export/import
packet captures to/from other tools. Statistics can also be generated for packet capture
files.
Wireshark is a network packet sniffer (and protocol analyzer) that runs on many
platforms, including Windows XP and Vista. If Wireshark is not currently available on
your PC, you can download the Latest Windows Version from [here] Wireshark 1.2.6
WindownInstaller. Other Versions of Wireshark from
http://www.wireshark.org/download.html. The current version of Wireshark, at time of
writing, is version 1.2.6. The initial Wireshark installation screen is shown in Figure1
Click the I Agree button to the License agreement, then select options (or accept
defaults) clicking the Next button on each screen when prompted.
Procedure:-
Select a Network Interface to Capture Packets through.
Start the Wireshark application. When Wireshark is first run, a default, or blank
window is shown. To list the available network interfaces, select the Capture->Interfaces
menu option.
Wireshark should display a popup window such as the one shown in Figure 2. To
capture network traffic click the Start button for the network interface you want to capture
traffic on. Windows can have a long list of virtual interfaces, before the Ethernet Network
Interface Card (NIC).
Note: The total incoming packets, for each interface, are displayed in the column to the left
of the Start buttons.
Generate some network traffic with a Web Browser, such as Internet Explorer or
Chrome. Your Wireshark window should show the packets, and now look something like
Select the Capture->Stop menu option, Ctrl+E, or the Stop toolbar button. What you
have created is a Packet Capture or „pcap‟, which you can now view and analyse using the
Wireshark interface, or save to disk to analyse later.
The capture is split into 3 parts:
1. Packet List Panel – this is a list of packets in the current capture. It colours the packets
based on the protocol type. When a packet is selected, the details are shown in the two panels
below.
2. Packet Details Panel – this shows the details of the selected packet. It shows the
different protocols making up the layers of data for this packet. Layers include Frame,
Ethernet, IP, TCP/UDP/ICMP, and application protocols such as HTTP.
3. Packet Bytes Panel – shows the packet bytes in Hex and ASCII encodings.
To select more detailed options when starting a capture, select the Capture-
>Options menu option, or Ctrl+K, or the Capture Options button on the toolbar (the
wrench). This should show a window such as shown in Figure 4.
· Capture Options > Capture File – useful to save a file of the packet capture in real time,
in case of a system crash.
· Display Options > Update list of packets in real time – A display option, which should be
checked if you want to view the capture as it happens (typically switched off to capture
straight to a file, for later analysis).
· Name Resolution > MAC name resolution – resolves the first 3 bytes of the MAC
Address, the Organisation Unique Identifier (OUI), which represents the Manufacturer of the
Card.
· Name Resolution > Network name resolution – does a DNS lookup for the IP Addresses
captured, to display the network name. Set to off by default, so covert scans do not generate
this DNS traffic, and tip off who‟s packets you are sniffing. Make sure the MAC name
resolution is selected. Start the capture, and generate some Web traffic again, then stop the
capture.
Wireshark Display Filters.
Right click on the Source Port field in the Packet Details Panel. Select Prepare a
Filter->Selected
Wireshark automatically generates a Display Filter, and applies it to the capture. The
filter is shown in the Filter Bar, below the button toolbar. Only packets captured with a
Source Port of the value selected should be displayed. The window should be similar to that
shown in Figure 6. This same process can be performed on most fields within Wireshark,
and can be used to include or exclude traffic.
Often captures should be saved to disc, for later analysis. To save a capture, select
File->Save As and save the trace. By default this creates a Wiresharkpcapng file, or if you
select pcap a file many tools can read and write this. For example a tcpdump output file is in
this format and can be read into Wireshark for analysis. This saves all the captured packets to
the file. Paste the display filter back into the Filter Bar, and Apply it.
To save only the displayed packets, select File-> Export Specified Packets, and make
sure the Displayed radio button is selected rather than the Captured option. This creates a
pcap file, with only the packets filtered by the current display filter.
IX. Precautions
1. Handle computer system carefully
2. Note down the exact output.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
Proposition 1.
The characteristics of IPv6.
• Quality of service (QoS) capabilities:QoS markings of packets and flow labels that
help identify priority traffic
• Anycast: Redundant services using nonunique addresses
• Mobility: Simpler handling of mobile or roaming nodes
Proposition 2.
Router>en
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#ipv6 unicast-routing
Router(config)#int Gig0/0
Router(config-if)#ipv6 address FE80::1 link-local
Router(config-if)#no shut
Router(config)#int Gig0/1
Router(config-if)#ipv6 address FE80::1 link-local
Router(config-if)#no shut
Router#en
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int Gig0/0
Router(config-if)#ipv6 address 2001:DB8:AAAA:A::1/64
Router(config-if)#no shut
Router(config-if)#int Gig0/1
Router(config-if)#ipv6 address 2001:DB8:AAAA:B::1/64
Router(config-if)#no shut
Step 4: We have configured the router now change the settings of hosts in IPv6
configuration:
• First, click on PC0 and go to desktop then IP configuration.
• Now find the IPv6 configuration.
• Change the settings from static to automatic and then after a few seconds, the IPv6
address and default gateways are displayed.
Step 5: Now we have to verify the connection by pinging the IPv6 address of PC0 in
PC1.
• First, click on PC1 and go to the command prompt, and type ping <ipv6
address>
• command: ping 2001:DB8:AAAA:A:20D:BDFF:FE1A:D121
VIII. Precautions
1. Handle computer system carefully
2. Note down the exact output.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
I. Practical significance
Learn how to enable, configure, manage and delete static route in Cisco router with
practical example in packet tracer.
Static routing is a type of network routing technique. Static routing is not a routing
protocol; instead, it is the manual configuration and selection of a network route, usually
managed by the network administrator. It is employed in scenarios where the network
parameters and environment are expected to remain constant.
Static routing is only optimal in a few situations. Network degradation, latency and
congestion are inevitable consequences of the non-flexible nature of static routing
because there is no adjustment when the primary route is unavailable.
Routing is one of the most essential procedures in data communication. It ensures that
data travels from one network to another with optimal speed and minimal delay, and that
its integrity is maintained in the process.
• Dynamic routing continuously updates its routing table with paths and their
cost/metric, while making optimal routing decisions based on changing
network operating environments.
• Static routing performs routing decisions with preconfigured routes in the
routing table, which can be changed manually only by administrators. Static
routes are normally implemented in those situations where the choices in route
selection are limited, or there is only a single default route available. Also,
static routing can be used if you have only few devices for route configuration
and there is no need for route change in the future.
Static routing is considered the simplest form of routing.
Step 1: First open the Cisco packet tracer desktop and create a network topology
something like the image.
• First, we will configure First Router the FastEthernet0/0 and 0/1using CLI.
• Click on router0 and go to CLI and type the commands are given below:
Route> en
Router#conft
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#host R1
R1(config)#int fa0/0
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#no shut
R1(config-if)#int fa0/1
R1(config-if)#ip address 10.1.1.1 255.0.0.0
R1(config-if)#no shut
R1(config-if)#exit
• Now, we will configure Second Router the FastEthernet0/0 and 0/1using CLI.
• Click on router1 and go to CLI and type the commands are given below:
Route> en
Router#conft
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#host R2
R2(config)#int fa0/0
R2(config-if)#ip address 10.1.1.2 255.0.0.0
R2(config-if)#no shut
R2(config-if)#int fa0/1
R2(config-if)#ip address 192.168.2.1 255.255.255.0
R2(config-if)#no shut
R2(config-if)#exit
• Now, we will configure Static Route on first Router R1 the using CLI.
• Click on router R1 and go to CLI and type the commands are given below:
R1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#ip route 192.168.2.0 255.255.255.0 10.1.1.2
R1(config)#no shut
• Now, we will configure Static Route on second Router R2 the using CLI.
• Click on router R2 and go to CLI and type the commands are given below:
R2#conf t
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#ip route 192.168.1.0 255.255.255.0 10.1.1.1
R1(config)#no shut
• Now, To check Static Route click on any Router and using CLItype the
commands are given below.
R2#show ip route
Step 5: Now we have to verify the connection by pinging the IPv4 address of
Router R1 Interface
• First, click on PC1 of Router R2 and go to the command prompt, and type ping
• command: ping 10.1.1.1
Sr. Name of
Specification Quantity Remarks
No. Resource
Hardware Computer(i3-i5 preferable), RAM
1 Computer minimum 2 GB and onwards, HDD
System free space 1GB or More For All
Windows 7 or latest/LINUX Practical of
2 Operating system As per Batch
version 5.0 or later ACN
Size
Command Prompt (Windows),
3 Software/ Website
Cisco Packet Tracer
VIII. Precautions
1. Handle computer system carefully
2. Note down the exact output.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
XII. Assessment Scheme
I. Practical significance
Learn how to enable and configure RIP routing in Cisco router with practical example
in packet tracer. To explain RIP Routing, I will use packet.
The Routing Information Protocol (RIP) uses broadcast UDP data packets to
exchange routing information. Cisco software sends routing information updates every
30 seconds, which is termed advertising. If a device does not receive an update from
another device for 180 seconds or more, the receiving device marks the routes served by
the nonupdating device as unusable. If there is still no update after 240 seconds, the
device removes all routing table entries for the nonupdatingdevice.A device that is
running RIP can receive a default network via an update from another device that is
running RIP, or the device can source the default network using RIP. In both cases, the
default network is advertised through RIP to other RIP neighbors. Features of RIP
Routing Protocol Some of the of key features of RIP protocol are:
• It supports maximum 15 hops in a path.
• It uses hops count metric to calculate the best path from a source to a
destination network.
• It sends routing updates (entire routing table) after every 30 seconds and when
the network changes.
• It uses UDP broadcast packets to exchange routing information.
• The Administrative Distance (AD) value of the RIP protocol is 120.
• It has two versions: RIPv1 and RIPv2.
Routing Loops
If you want to configure RIP protocol on your network, you have to be familiar
with the routing loops. Sometimes routing loops create a big issue on an RIP-based
network. However, RIP protocol has some mechanisms that can be used to prevent the
routing loops and maintain the network stability. These mechanisms are:
• Split horizon: In the split horizon, route information is not sent back out
through the interface from which it was received. Thus, allowing to prevent
routing loops.
• Hop-count limit: Limiting the hop-count prevents routing loops from
continuing indefinitely.
• Poison reverse: In this mechanism, a router marks a route (that is not
accessible) as unreachable and set the hop count to 16. The router then passes
this route out to the neighbor router, and the neighbor router removes the
unreachable route from its routing table.
• Hold-down timers: When the hold-down timers are set, routers ignore the
routing update information for the set period of time.
RIP Timers
Routing protocols use timers to optimize the network performance. The following
table lists the various types of timers used by the RIP protocol to optimize the network
performance.
RIP Configuration
To demonstrate how to configure RIP in Cisco Packet Tracer, we will use the
following network topology. If you are using a simulator, such as Cisco Packet Tracer
or GNS3, create the following topology and configure the IP addresses as mentioned in
the topology.
If you are using a simulator, such as Cisco Packet Tracer or GNS3, create the
preceding topology and configure the devices as per the values mentioned in the
following table
192.168.1.0
VIII. Precautions
1. Handle computer system carefully
2. Note down the exact output.
IX. Additional Resources used
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
Assessment Scheme
I. Practical significance
Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks.
It uses a link state routing (LSR) algorithm and falls into the.
OSPF (Open Shortest Path First) is a link state routing protocol. Because it is an open
standard, it is implemented by a variety of network vendors. OSPF will run on most
routers that don‟t necessarily have to be Cisco routers (unlike EIGRP which can be run
only on Cisco routers). Here are the most important features of OSPF:
A classless routing protocol
Supports VLSM, CIDR, manual route summarization, equal cost load balancing
Incremental updates are supported
Uses only one parameter as the metric – the interface cost.
OSPF neighbors
OSPF routers need to establish a neighbor relationship before exchanging routing
updates. OSPF neighbors are dynamically discovered by sending Hello packets out each
OSPF-enabled interface on a router. Hello packets are sent to the multicast IP address of
224.0.0.5.
The process is explained in the following figure:
Routers R1 and R2 are directly connected. After OSFP is enabled both routers send
Hellos to each other to establish a neighbor relationship. You can verify that the
neighbor relationship has indeed been established by typing the show
ipospfneighborscommand.
In the example above, you can see that the router-id of R2 is 2.2.2.2. Each OSPF router
is assigned a router ID. A router ID is determined by using one of the following:
The following fields in the Hello packets must be the same on both routers in order for
routers to become neighbors:
• subnet
• area id
• hello and dead interval timers
• authentication
• area stub flag
• MTU
By default, OSPF sends hello packets every 10 second on an Ethernet network (Hello
interval). A dead timer is four times the value of the hello interval, so if routers on an
Ethernet network don‟t receive at least one Hello packet from an OSFP neighbor for 40
seconds, the routers declares that neighbor to be down.
OSPF areas
OSPF uses the concept of areas. An area is a logical grouping of contiguous networks
and routers. All routers in the same area have the same topology table, but they don‟t
know about routers in the other areas. The main benefits of creating areas is that the size
of the topology and the routing table on a router is reduced, less time is required to run
the SFP algorithm and routing updates are also reduced. Each area in the OSPF network
has to connect to the backbone area (area 0). All router inside an area must have the
same area ID to become OSPF neighbors. A router that has interfaces in more than one
area (area 0 and area 1, for example) is called Area Border Router (ABR). A router that
connects an OSPF network to other routing domains (EIGRP network, for example) is
called Autonomous System Border Router (ASBR).
NOTE In OSPF, manual route summarization is possible only on ABRs and
ASBRs.
using the routerospf PROCESS-ID global configuration command. Next, you need to
define on which interfaces OSPF will run and what networks will be advertised.
Let‟s get started with some basic OSPF configuration. We will use the following
network topology:
First, we need to enable OSPF on both routers. Then we need to define what network
will be advertised into OSPF. This can be done by using the following sequence of
commands on both routers:
The network commands entered on both routers include subnets directly connected to
both routers. We can verify that the routers
To verify if the routing updated were exchanged, we can use the show ip route
command. All routes marked with the character O are OSPF routes. For example, here is
the output of the command on R1:
Configuring OSPF 2
Although basic OSPF configuration can be very simple, OSPF provides many extra
features that can get really complex. In this example, we will configure multiarea OSPF
network and some other OSPF features. Consider the following multiarea OSPF
network:
In this example we have two OSPF areas – area 0 and area 1. As you can see from
the network topology depicted above, routers R1 and R3 are in the area 0 and area 1,
respectively. Router 2 connects to both areas, which makes him an ABR (Area Border
Router). Our goal is to advertise the subnets directly connected to R1 and R3. To do
that, the following configuration on R1 will be used:
NOTE We have used the router-id 1.1.1.1 command to manually specify the router ID
of this router. OSPF process will use that RID (router-id) when communicating with
other OSPF neighbors. Because R1 connects only to R2, we only need to establish a
neighbor relationship with R2 and advertise directly connected subnet into OSPF.
Configuration of R3 looks similar, but with one difference, namely area number. R3 is
in the area 1.
Now R2 should have neighbor relationship with both R1 and R3. We can verify that by
using the show ipospf neighbor command:
To verify if directly connected subnets are really advertised into the different area, we
can use the show ip route ospf command on both R1 and R3:
IX. Precautions
1. Handle computer system carefully
2. Note down the exact output.
X. Additional Resources used
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
XIII. Exercise
1. What is OSPF?
2. Compare RIP and OSPF.
3. Configure Given Network by using OSPF routing protocol
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
Practical No. 7: Configure User Datagram Protocol (UDP) Part-I using relevant
software.
I. Practical significance
Know the use of UDP, Configure User Datagram Protocol.
network overhead than TCP. UDP is useful in situations where the reliability
mechanisms of TCP are not necessary, such as in cases where a higher-layer protocol
might provide error and flow control. UDP is the transport protocol for several well-
known application-layer protocols, including Network File System (NFS), Simple
Network Management Protocol (SNMP), Domain Name System (DNS), and Trivial File
Transfer Protocol (TFTP).
Description:
UDP is one of the core protocols of the Internet protocol suite. Using UDP, programs
on networked computers can send short messages sometimes known as datagrams
(using Datagram Sockets) to one another. UDP is sometimes called the Universal
Datagram Protocol. The protocol was designed by David P. Reed in 1980.
UDP does not guarantee reliability or ordering in the way that TCP does. Datagrams
may arrive out of order, appear duplicated, or go missing without notice. Avoiding the
overhead of checking whether every packet actually arrived makes UDP faster and more
efficient, for applications that do not need guaranteed delivery. Time-sensitive
applications often use UDP because dropped packets are preferable to delayed packets.
UDP's stateless nature is also useful for servers that answer small
queries from huge numbers of clients. Unlike TCP, UDP is compatible with packet
broadcast (sending to all on local network) and multicasting (send to all subscribers).
UDP is part of the TCP/IP protocol suite.
UDP is a simpler message-based connectionless protocol. In connectionless protocols,
there is no effort made to setup a dedicated end-to-end connection. Communication is
achieved by transmitting information in one direction, from source to destination
without checking to see if the destination is still there, or if it is prepared to receive the
information. With UDP messages (packets) cross the network in independent units.
Unreliable - When a message is sent, it cannot be known if it will reach its destination;
it could get lost along the way. There is no concept of acknowledgment, retransmission
and timeout.
Not ordered - If two messages are sent to the same recipient, the order in which they
arrive cannot be predicted.
Lightweight - There is no ordering of messages, no tracking connections, etc. It is a
small transport layer designed on top of IP.
Datagrams - Packets are sent individually and are guaranteed to be whole if they arrive.
Packets have definite bounds and no split or merge into data streams may exist.
UDP packet format:
Source port - This is the source port of the packet, describing where a reply packet
should be sent. This can actually be set to zero if it doesn't apply. For example,
sometimes we don't require a reply packet, and the packet can then be set to source port
zero. In most implementations, it is set to some port number.
Destination port - The destination port of the packet. This is required for all packets, as
opposed to the source port of a packet.
Length -The length field specifies the length of the whole packet in octets, including
header and data portions. The shortest possible packet can be 8 octets long.
Length is the length in octets of this user datagram including this header and the data.
(This means the minimum value of the length is eight.)
Checksum - The checksum is the same kind of checksum as used in the TCP header,
except that it contains a different set of data. In other words, it is a one's complement of
the one's complement sum of parts of the IP header, the whole UDP header, the UDP
data and padded with zeroes at the end when necessary.
This User Datagram Protocol (UDP) is defined to make available a datagram mode of
packet-switched computer communication in the environment of an interconnected set of
computer networks. This protocol assumes that the Internet Protocol (IP) is used as the
underlying protocol. This protocol provides a procedure for application programs to send
messages to other programs with a minimum of protocol mechanism. The protocol is
transaction oriented, and delivery and duplicate protection are not guaranteed.
Applications requiring ordered reliable delivery of streams of data should use the
Transmission Control Protocol (TCP)
User Interface
A user interface should allow
• The creation of new receive ports,
• Receive operations on the receive ports that return the data octets and an indication of
source port and source address,
• An operation that allows a datagram to be sent, specifying the data, source and
destination ports and addresses to be sent.
• Procedure
To configure UDP port:
Step 1. Navigate to your Control Panel menu by clicking "Start" and "Control Panel."
Step 2. Click the preference that says "System and Security."
Step 3.Click "Windows Defender Firewall" and then click the preference displayed on
the upper-left corner that says "Advance setting".
Step 3. Click the icon that says "Inbound Rules/Outbound Rules." and then click “New
Rules” Give the UDP port any name you want,and then enter it in the "Name" text bar.
This can be the name of the service using the port.
Step 4. Type the number of the port you want to enable UDP process for in the "Port
number" field. Click the "UDP" check-mark in the "Protocol" section, then click "OK"
to save the changes. You have enabled UDP process for the desired port.
IX. Precautions
1. Handle computer system carefully
2. Note down the exact output.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
Practical No. 8: Configure User Datagram Protocol (UDP) Part-II using relevant
software.
I. Practical significance
UDP Protocol (User Datagram Protocol) with tutorial, features, types of computer
Intranet, Uses of Computer Network, Hub, Software and Hardware.
User Datagram Protocol (UDP) is transportation protocols which are some of the core
protocols of the Internet protocol suite. Both TCP and UDP work at the transport layer
of the TCP/IP model. TCP uses a three-way handshake to establish the reliable
connection, whereas UDP is unreliable but faster when compared to TCP. The network
device offers some of the services which use either TCP or UDP for easy management
of the device. The services can be enabled or disabled based on the requirement.
The TCP and UDP services information are shown in the TCP and UDP Service
tables of the web-based utility page of the switch. The information showed in these
tables depicts the current status of the enabled TCP and UDP services. You can use this
information to manage and troubleshoot any of the enabled services on the Router.
Procedure
To configure UDP port at Router:
Note:- Steps may be vary from Router to Router
Step 1.Open Google chrome or any Browser.
Step 2.Insert the IP address of router on Browser URL and Login in Router by using
Username and Password
Step 3.Click on "Security" tab and then click on "Port Filter".Inside “Security" tab.
Step 4.Enable the UDP process (TFTP) you want and insertin the "Port number" field.
Click the "LAN/WAN" and check-mark in the "Protocol" section, then click "Apply" to
save the changes. You have enabled UDP process for the desired port.
VIII. Precautions
1. Handle computer system carefully
2. Note down the exact output.
IX. Additional Resources used
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are
transportation protocols which are some of the core protocols of the Internet protocol
suite. Both TCP and UDP work at the transport layer of the TCP/IP model. TCP uses a
three-way handshake to establish the reliable connection, whereas UDP is unreliable but
faster when compared to TCP. The network device offers some of the services which
use either TCP or UDP for easy management of the device. The services can be enabled
or disabled based on the requirement.
The TCP and UDP services information are shown in the TCP and UDP Service tables
of the web-based utility page of the switch. The information showed in these tables
depicts the current status of the enabled TCP and UDP services. You can use this
information to manage and troubleshoot any of the enabled services on the switch.
Procedure
To configure TCP port at Router:
Note:- Steps may be vary from Router to Router
Step 1.Open Google chrome or any Browser.
Step 2.Insert the IP address of router on Browser URL and Login in Router by using
Username and Password
Step 3.Click on "Security" tab and then click on "Port Filter".Inside “Security" tab.
Step 4.Enable the TCP process (TELNET,SMTP, FTP, HTTP) you want and insertin the
"Port number" field. Click the "LAN/WAN" and check-mark in the "Protocol" section,
then click "Apply" to save the changes. You have enabled UDP process for the desired
port.
Step 5.Check the Enable HTTP to enable the Hyper Text Transfer Protocol (HTTP)
service and many services like TELNET, SMTP, FTP on your router. By default, Cisco
Small Business Switches can be configured through the web-based utility using a web
browser thus this service is checked by default.
Step 5.Check the Enable Telnet Service check box to enable the Telnet service on your
switch. Telnet is a network protocol that allows a device to be controlled by a command
line interface over the Internet or a LAN. When Telnet is enabled, an administrator can
configure the switch through the use of a Telnet client application. However, since
Telnet messages are not encrypted, it is recommended that you use SSH service.
Step 4.Check the Enable SSH Service check box to enable the Secure Shell (SSH)
service on your switch. SSH allows the administrator to configure the switch through a
command line interface (CLI) with a third party program.
VIII. Precautions
1. Handle computer system carefully
2. Note down the exact output.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
XII. Assessment Scheme
Practical No. 11: Configure Dynamic Host Configuration Protocol (DHCP) using
relevant software.
I. Practical significance
It is a Client server protocol which uses UDP services. IP address is assigned from a
pool of addresses. In DHCP, the client and the Dynamic host configuration protocol
simplifies and improves the accuracy when working with DHCP, it's important to
understand all of the dynamic host configuration protocol.
manually set up every client that joins the network, which can be cumbersome,
especially in large networks. DHCP servers usually assign each client with a unique
dynamic IP address, which changes when the client‟s lease for that IP address has
expired.
The Benefits of a dedicated DHCP Server
VIII. Procedure
Steps to Configure and Verify DHCP Server in Cisco Packet Tracer:
Step 1: First, open the cisco packet tracer desktop and select the devices given
below:
Step 2: Configure the Server with IPv4 address and Subnet Mask according to the
Data given above.
POOL1 and POOL2 and fill the data as shown in the images below.
Repeat the same procedure with other PCs to configure them thoroughly.
IX. Precautions
1. Handle computer system carefully
2. Note down the exact output.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
Practical No. 12: Configure Domain Name Server (DNS) using relevant software.
I. Practical significance
The Domain Name System (DNS) is the hierarchical and decentralized naming
system used to identify computers, services, and other resources reachable.
A Domain Name System (DNS) server resolves host names into IP addresses.
Although we can access a network host using its IP address, DNS makes it easier by
allowing us use domain names which are easier to remember. For example it‟s much
easier to access Government Polytechnic Gondia website by typing
http://www.gpgondia.ac.in.com as compared to typing http://192.162.0.2In either case,
you‟ll access Government Polytechnic Gondia website, but using domain name is
obviously easier.
Now, before any host can use a DNS service, we must configure a DNS server first.
For example, when you type the URL http://www.gpgondia.ac.in.com in your browser,
the host will query the DNS server for the IP address of http://www.gpgondia.ac.in.com.
XIV. Procedure
Steps to Configure and Verify DNS Server in Cisco Packet Tracer:
Step 1: First, open the cisco packet tracer desktop and select the devices given
below and Build the network topology.
Step 2: Now, Configure static IP addresses on the PCs and the server
PC IP Configuration
Repeat the same procedure with Different IP on other PCs to configure them
thoroughly.
Step 3: Now, Configure DNS on server and Click on ―ADD‖ Button then enable
DNS service button.
VIII. Precautions
1. Handle computer system carefully
2. Note down the exact output.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
Practical No. 13: a. Configure File Transfer Protocol (FTP) using relevant
software.
b. Configure Hypertext Transfer Protocol (HTTP) using
relevant software.
I. Practical significance
Know the use of FTP, Create FTP Environment,Know the use of HTTP,
Create HTTP Environment
II. Relevant Program Outcomes (POs)
Basic Knowledge: Apply knowledge of basic mathematics, sciences and basic
engineering to solve the broad computer engineering problem.
Discipline Knowledge: Apply computer engineering discipline – specific
knowledge to solve core computer engineering related problems
Experiments and practice: Plan to perform experiments and practices to use the
results to solve broad based computer engineering problems.
Engineering tools: Apply relevant computer technologies and tools with an
understanding of the limitations.
Individual and team work: Function effectively as a loader and team member
in diverse and multidisciplinary teams.
Communication: communicate effectively in oral and written form.
Life-long learning: engage in independent and life-long learning activities in the
context of technological changes in the computer engineering field and allied
industry.
III. Relevant Course Outcome(s)
Configure various Application Layer Protocols
VIII. Procedure
a. Configure File Transfer Protocol (FTP)
Step 1.Build the network topology
Step 3.Now try using an FTP client built in the Laptop to send files to an FTP
server configured in the Server.
From the Laptop‟s command prompt, FTP the server using the server IP address
by typing:
ftp 192.168.1.2
Provide the username (cisco) and password (cisco) [which are the defaults] for
ftp login.
Step 4.Create a file in the Laptop then upload it to the server using FTP.
To do this, open the Text Editor in the Laptop, create a file and give it your
name of choice.
Type any text in the editor then save your file. e.g. myFile.txt.
Step 5.Now upload the file from the Laptop to the server using FTP. (An FTP
connection has to be started first. But this is what we‟ve done in step 3)
Step 6.Once file upload is successful, go to the Server FTP directory to verify if
the file sent has been received. To do this, go to Server-> Services->FTP. Here
look for MyFile.txt sent from the laptop.
Step 7.To check other FTP commands supported by the FTP client running on
the Laptop (or PC), you can use a question mark (?) on the Laptop‟s command
prompt as shown below:
You can see the put command that we used to upload our file to the FTP
server. Other commands listed include:
get-used to get(download) a file from the server.
For example: get MyFile.txt
delete– to delete a file in the FTP directory with the server
For example: delete MyFile.txt
Rename– used to Rename a file
cd – used to change directory.
b. Configure Hyper Text Transfer Protocol (HTTP)
Step 1.We can open an HTTP directory in the server by typing: cd /http. This
will change the current directory from FTP directory to HTTP directory
Once the http directory is open, you can upload a file to the HTTP server.
You‟re now uploading a file to an HTTP folder (directory) using FTP.
You can now check up in the HTTP directory in the server and verify that the
file uploaded from the Laptop (MyFile.txt) is well received:
Step 2.We‟ll create an html file in our Laptop, upload it to HTTP server
directory using FTP, and then try to access the file from the Laptop‟s browser.
On the Laptop, open the text editor, then type some markup(html) and save the
file with the extension .html. See all this below:
Now upload the file (File2.html) to the HTTP server using FTP.
If you‟re already in the HTTP directory, you just need to type: put File2.html. If
no, first ftp theserver (ftp 192.168.1.2), provide the login username (cisco) and
password (cisco); change the current directory to HTTP (cd /http), and finally
upload the html file onto the HTTP directory (put File2.html)
Step 3.Check whether the html file uploaded has been received in the HTTP
directory:
Go to Server->Services-> HTTP.
Then look up for the file in the File Manager.
Now edit index.html file in the HTTP directory so as to include a link to File2
that we‟ve just uploaded. This will make File2 accessible from the Laptop‟s
browser. To do this, locate index.html then click edit. Proceed to edit it as shown
below. Then save and accept overwrite.
Step 4.
Finally, try to access the newly uploaded file from the Laptop‟s browser.
So go to the Laptop‟s browser and access the server using the server‟s IP
address. By doing this, the browser is making an http request to the server. The
server will respond to the Laptop with the index.html file containing a link to
File2 which we‟ve uploaded from the Laptop using FTP.
Click File2 link to view the contents of the file in the browser.
IX. Precautions
1. Handle computer system carefully
2. Note down the exact output.
X. Additional Resources used
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
XIII. Assessment Scheme
a. Telnet
Telnet is an application layer protocol that allows a network administrator to access
and manage remote devices. A user on a client machine can use software (also known as
a Telnet client) to access a command-line interface of another, remote machine that is
running a Telnet server program.
b. SSH
Secure Shell, just like Telnet, enables a user to access a remote device and
manage it remotely. However, with SSH, all data transmitted over a network (including
usernames and passwords) is encrypted and secure from eavesdropping.
SSH is a client-server protocol, with a SSH client and a SSH server. The client
machine (such as a PC) establishes a connection to a SSH server running on a remote
device (such as a router). Once the connection has been established, a network admin can
execute commands on the remote device.
Accessing machines remotely became a necessity a long time ago and we can barely
imagine how it would be if we couldn‟t control computers from remote locations. There
are many ways to establish a connection with a remote machine depending on the
operating system you are running. The two most used protocols are:
• Secure Shell (SSH) for Linux-based machines.
• Remote Desktop Protocol (RDP) for Windows-based machines.
• The two protocols use the client and server applications to establish a remote
connection. These tools allow you to gain access and remotely manage other computers,
transfer files, and do virtually anything you can do while physically sitting in front of the
machine.
VIII. Procedure
Router>en
Router#config term
Router(config)#enable password admin
Step 3.Configure IP addresses on the admin PC and interface fa0/0 of the router
Router
Router(config)#int fa0/0
Router(config-if)#ip address 10.0.0.1 255.0.0.0
Router(config-if)#no shut
Admin PC
IP address 10.0.0.10 Subnet mask 255.0.0.0 Default gateway 10.0.0.1
Step 4.Configure VLAN interface on the router. This interface allows for remote
access on a switch or router via protocols such as Telnet or Secure Shell(SSH)
Router(config)#int VLAN 1
Router(config-if)#no shutdown
As you can see, we‟ve not configured the VLAN interface with an IP address.
We could do this but it unnecessary. We already have an interface fa0/0 of the router
with an IP address through which we can Telnet the router from the PC.
Step 5. Configure Telnet password on VTY lines and configure remote login.
Router(config)#
Router(config)#line vty 0 15
Router(config-line)#password cisco
Router(config-line)#login
Step 6. We can now telnet the router using the IP address of fa0/0 interface. So, in
the command prompt of the admin PC type telnet 10.0.0.1 then hit enter
key.
Step 7. Provide Telnet Password (that you set in step 5), then hit enter. Correct
password allows you access the CLI of the router.
Step 8. Now provide the enable password (that you set in step 2) to be allowed
intoprivileged executive mode of the router.
Router
Router(config)#int fa0/0
Router(config-if)#ip add 10.0.0.1 255.0.0.0
Router(config-if)#no shut
Router(config)#exit
PC:
IP address 10.0.0.10 Subnet mask 255.0.0.0 Default gateway 10.0.0.1
Router(config)#hostname myRouter
Both the hostname and domain name will be used in the process of generating
encryption keys.
Steps 5.Now generate encryption keys for securing the session using the
command crypto key generate rsa.
myRouter(config)#crypto key generate rsa
The name for the keys will be: myRouter.admin
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.
How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]
Note that this password is not for use with SSH. Its only for use in accessing
the privileged executive mode of the router after you are able to access its CLI
remotely via SSH.
The password will have to be provided before you can access the CLI of the
router when using SSH.
myRouter(config)#ipssh version 2
Step 9.Now connect to VTY lines of the Router and configure the SSH
protocol.
myRouter(config)#line vty 0 15
myRouter(config-line)#transport input ssh
myRouter(config-line)#login local
That‟s all for configuration. Move on to see if you can access the router
remotely from the PC.
Step 10. On the command prompt of the PC, open a SSH session to the remote
router by typing the command: ssh -l admin 10.0.0.1
Step 11. Provide the loginpassword which you set in step 7 and press enter.
You‟re now probably in the CLI of the router. Provide the enable password
(the one you set in step 6) to access the privileged executive mode.
You can proceed and do configurations on the Router. You‟re now managing the
router remotely from the PC.
IX. Precautions
1. Handle computer system carefully
2. Note down the exact output.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
Practical No. 15: Configure SMTP and POP3 using relevant software.
I. Practical significance
Student should be able to study servers like SMTP, POP and IMAP
II. Relevant Program Outcomes (POs)
Basic Knowledge: Apply knowledge of basic mathematics, sciences and basic
engineering to solve the broad computer engineering problem.
Discipline Knowledge: Apply computer engineering discipline – specific
knowledge to solve core computer engineering related problems
Experiments and practice: Plan to perform experiments and practices to use the
results to solve broad based computer engineering problems.
Engineering tools: Apply relevant computer technologies and tools with an
understanding of the limitations.
Individual and team work: Function effectively as a loader and team member
in diverse and multidisciplinary teams.
Communication: communicate effectively in oral and written form.
Life-long learning: engage in independent and life-long learning activities in the
context of technological changes in the computer engineering field and allied
industry.
III. Relevant Course Outcome(s)
Configure various Application Protocols
VIII. Precautions
1. Handle computer system carefully
2. Note down the exact output.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
1.0 Topology
3.0 Objectives
Part 1: Cable the network as per the given topology.
Part 2: Assign IP address to Server and PC’s.
Part 3: Register the Router to SNMP Server community.
Part 4: Get details (such as Router name ,location, etc) from Management Information
Base (MIB) in PC.
Part 5: Set details (such as Router name, location, etc) from Management Information Base
(MIB) in PC.
4.0 Background/Scenario
Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting
and organizing information about managed devices on IP networks and for modifying that
information to change device behavior. SNMP is widely used in network management for network
monitoring. SNMP exposes management data in the form of variables on the managed systems
organized in a management information base (MIB) which describe the system status and
configuration.
In this practical, you will register the Router into SNMP server’s community and try to
retrieve and change some router parameters.
5.0 Procedure
Part 1: Cable the Network as shown in Topology
Use Copper Straight Through Cable to connect all the devices in the given topology
Part 4: Get details (such as Router name ,location, etc) from Management Information Base
(MIB) in PC.
a. Select any PC, go to Desktop -> MIB Browser.
b. In the Address field, type the IP address of Router
c. Click Advanced button. Type read and write password provided before while
configuring Router with SNMP protocol and click OK.
Part 5: Set details (such as Router name, location, etc) from Management Information Base (MIB)
in PC.
a. Select the Value attribute, and select Set from the list of Operations.
b. Type a new router name in Name field of SNMP set dialog.
7.0 Outputs
8.0 Exercise
1. MIME protocol is used at Sender end or Receiver end?
2. Why SNMP protocol is used?
3. Write the command used to register a Router to SNMP protocol.
4. SNMP protocol operates at which layer in TCP/IP protocol?
5. MIME protocol operates at which layer in TCP/IP protocol?
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
Maharashtra State Board of Technical Education 128
…………………………………
……………………………………………………………………………………………………………
Advance Computer Network (22520)
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
Maharashtra State Board of Technical Education 130
Advance Computer Network (22520)
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
Dated signature of
Marks Obtained
Teacher
Process Product Total
Related(30) Related(20) (50)