Lab Manual
Lab Manual
surat
under
Gujarat Technological University
In the fair record, the index page should be filled properly by writing the corresponding experiment number, experiment
name , date on which it was done and the page number.
1. Always wear tight shirt/lab coat , pants and shoes inside workshops.
2. REMOVE ALL METAL JEWELLERY since rings, wrist watches or bands, necklaces, etc. make excellent electrodes in
the event of accidental contact with electric power sources.
3. DO NOT MAKE CIRCUIT CHANGES without turning off the power.
4. Make sure that equipment working on electrical power are grounded properly.
5. Avoid standing on metal surfaces or wet concrete. Keep your shoes dry.
6. Never handle electrical equipment with wet skin.
7. Hot soldering irons should be rested in its holder. Never leave a hot iron unattended.
8. Avoid use of loose clothing and hair near machines and avoid running around inside lab .
DO: 1. SET MULTIRANGE METERS to highest range before connecting to an unknown source.
2. INFORM YOUR INSTRUCTOR about faulty equipment so that it can be sent for repair.
DO NOT: 1. Do not MOVE EQUIPMENT around the room except under the supervision of an instructor.
Index
Sr No. Name of Experimet CO Date (PU) (PP) (D) (SI) Total Sign
1 Measure modulation index of CO1
an AM signal.
2 Investigate the generation of CO1
Frequency Modulation &
Demodulation
3 Study about Computer CO2
Networks, Network Topologies
and Reference models.
4 Implement the cross-wired CO3
cable and straight through UTP
cable using clamping tool.
5 To study the Time Division CO3
Multiplexing (TDM) and draw
its waveforms
6 Study router, repeater & CO3
bridge.
7 Create Home group and set CO4
/change sharing options
8 To study network property of CO4
LAN card on windows and
machine. Study PING and
IPCONFIG / IFCONFIG
command.
9 Use TRACERT, ARP, NETSTAT, CO4
PATHPING commands on
windows.
10 To install and customize web CO5
browser and internet oprtions
11 Identify the different class of IP CO4
address.
12 Study the different types of CO3
transmission media.
13 To Connect the computers in CO2
Local Area Network.
PU - Problem Understanding PP - Problem/Task Practice D - Documentation / Presentation SI
- Student Involvement
APPARATUS:
Amplitude Modulation and Demodulation Trainer kit, Function Generator, Oscilloscope, CRO probes, Wires
etc.
THEORY:
A message signal (audio or video signal) cannot be transmitted over long distances directly due to attenuation,
distortion, interference and noise in any medium either wired or wireless. A suitable high frequency signal
called carrier signal needs to be modulated by the low frequency message signal so that the message can be
transmitted efficiently over long distances. MODULATION: Modulation is a scheme which alters some
characteristics (amplitude, frequency or phase) of the high frequency signal, called the carrier signal in
accordance with the instantaneous value of the low frequency message signal called the modulating signal. The
resultant signal is called modulated signal. The carrier signal is periodic and Fig. AM Modulation continuous
wave, it is termed as Analog Modulation and when the carrier signal is in the form of pulse, it is termed as
Digital Modulation. When the amplitude of carrier signal is varied in accordance with the instantaneous value
of amplitude of the message signal, the resultant modulation is termed as Amplitude Modulation.
AMPLITUDE MODULATION (AM): It is a process in which the maximum amplitude of the carrier wave is
varied linearly in accordance with instantaneous amplitude of modulating signal or base band signal. The waves
can be voltage or current signals. The waveforms of the carrier wave, modulating wave and the resultant
modulated wave are shown below. If the base band signal consists of single frequency it is called as single tone
modulation. If the base band signal consists of more than one frequency it is called as multi tone modulation.
EXPRESSION FOR AMWAVE AND FREQUENCY COMPONENTS :
Single tone modulating signal
X (t) = Vm Cos 2Πfm t = Vm Cos wmt……..(1)
Carrier signal C (t) = Vc Cos 2Π fct = Vc Cos wct …....... (2)
Then the modulated signal is given by
S (t) = (Vc + Vm Cos wmt) Cos wct……............ (3)
On simplification we get
S (t) = Vc {1+ (Vm / Vc )Cos wmt }Cos wct
= Vc {1+ ma Cos wmt }Cos wct ; ( ma = Vm / Vc ; Modulation Index)
= Vc Cos wct + Vcma Cos wmt Cos wct = Vc Cos wct + Vc/2ma Cos (wm + wc)t + Vc/2ma Cos (wm─
wc)t
= Vc Cos2Πfct + Vc/2ma(Cos 2Π (fc + fm)t +Cos 2Π (fc─ fm)t)
FREQUENCYSPECTRUM: It is evident from the equation (4) that the frequency spectrum of the resultant
modulated signal in case of single tone modulation consists of the original carrier frequency fc as well as
additional frequencies (fc + fm) called as upper side frequency and (fc─ fm) called as lower side frequency.
In case of multi tone modulation the base band contains a range of frequencies from ( fm +Δ fm) . In this case
the frequency spectrum of the resultant modulated signal consists of the original carrier frequency fc, an upper
side band of frequencies (fc + fm) to (fc + fm +Δ fm) and a lower side band of frequencies (fc─ fm) to
(fc ─ fm─Δ fm).
MODULATION INDEX: The ratio of maximum amplitude of the modulating signal to the maximum amplitude
of carrier wave is defined as the amplitude modulation index and denoted by ‘m’. The modulation index is also
known as depth of modulation or degree of modulation or modulation factor. Normally the value of ‘m’ lies
between 0 and 1. The modulation index is given by expression m = Vm / Vc whereVm =Maximum amplitude
of the modulating signal and Vc=Maximum amplitude of the carrier wave It can be seen from the resultant of
AM(single tone modulation) waveform
Vm = (Vmax-Vmin)/2…………………….(5)
Vc = (Vmax + Vmin)/ 2…………………..(6)
From (5) & (6)
m=.(Vmax – Vmin)/ (Vmax + Vmin)………………….(7)
BLOCK DIAGRAM:
PROCEDURE:
1. Make the connections according to the block diagram shown in Figure .
2. Connect 1 KHz, 2VAF Generator to CRO and note the frequency and amplitude of AF output.
OBSERVATION TABLE:
CONCLUSION:
QUESTIONS:
Q. 1. What is modulation?
Q. 2.Which are the three discrete frequencies in AM?
Q. 3. How many sidebands in AM?
Q. 4. True or false? The carrier frequency is usually lower than the modulating frequency
Q. 5. True or false? The carrier frequency remains constant during AM.
AIM:
APPARATUS: BCT-02 FM kit, CRO, CRO Probes, Wires etc.
PROCEDURE
1.Connect the AC Supply to the Kit
2.Make connections and settings as shown in block diagram No. 1.
3. Connect the MODULATING SIGNAL output from SINE WAVE GENERATOR BLOCK to the
MODULATING Input post of FM Modulator block. Trigger CRO w.r.t. CH1. Adjust amplitude of the
modulating signal unit we get undistorted FM output. It is difficult to trigger FM on analog CRO. That is
why you adjust modulating signal amplitude unit small distortion notified in FM output.
4. Switch ON the power
5. Connect the FM MOD O/P to the FM MOD I/P of FM DEMODULATOR section. In this
condition decrease the amplitude of the modulating signal generator until we get undistorted
demodulated output. Adjust the potentiometer in demodulation section until we get
demodulated output.
6. Observe the following waveforms on oscilloscope.
QUESTIONS:
Q. 1 Define modulation. Give comparison between AM and FM in three points.
Q. 2 Derive mathematical equation for Frequency Modulation.
Q. 3 State two strengths and two limitations of FM.
Q. 4 Explain frequency modulation with necessary diagrams and equations.
Network Protocols
The software on the individual personal computers and the software on the server have to cooperate
with each other to provide access to the shared resources. This is done by designing the software to
use an agreed set of conventions (a "protocol") that is standardized so that multiple vendors can
provide interoperable systems.
[B] Types of networks based on physical scope
Common types of computer networks may be identified by their scale.
All interconnected devices must understand the network layer (layer 3), because they are handling multiple
subnets (the different colors). Those inside the library, which have only 10/100 Mbit/s Ethernet connections
to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches"
because they only have Ethernet interfaces and must understand IP. It would be more correct to call them
access routers, where the router at the top is a distribution router that connects to the Internet and academic
networks' customer access routers.
The defining characteristics of LANs, in contrast to WANs (Wide Area Networks), include their higher data
transfer rates, smaller geographic range, and no need for leased telecommunication lines. Current Ethernet
or other IEEE 802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data transfer rate. IEEE
has projects investigating the standardization of 40 and 100 Gbit/s.[5]
Campus network
A campus network is a computer network made up of an interconnection of local area networks (LAN's)
within a limited geographical area. The networking equipments (switches, routers) and transmission media
Sample EPN made of Frame relay WAN Sample VPN used to interconnect 3 offices
connections and dialup remote access. and remote users
Internetwork
An internetwork is the connection of two or more private computer networks via a common routing
technology (OSI Layer 3) using routers. The Internet is an aggregation of many internetworks, hence its
name was shortened to Internet.
Backbone network
A Backbone network (BBN) A backbone network or network backbone is part of a computer network
infrastructure that interconnects various pieces of network, providing a path for the exchange of information
between different LANs or sub networks. A backbone can tie together diverse networks in the same building,
in different buildings in a campus environment, or over wide areas. Normally, the backbone's capacity is
greater than the networks connected to it.
IT Dept, GPG, Surat DYV
A large corporation that has many locations may have a backbone network that ties all of the locations
together, for example, if a server cluster needs to be accessed by different departments of a company that are
located at different geographical locations. The pieces of the network connections (for example: Ethernet,
wireless) that bring these departments together is often mentioned as network backbone. Network congestion
is often taken into consideration while designing backbones.
Backbone networks should not be confused with the Internet backbone.
Network Topology is the arrangement of the nodes of the network. The biggest example of this is
LAN i.e. Local Area Network. In Computer Networking Topology refers to the layout of the connected
devices. Topologies can be physical or logical. The physical and logical topologies might be identical in any
particular network but they may be different also. The network topology is determined by the mapping of
the physical or logical connections between nodes graphically.
Following are different types of basic Topologies:
• Bus
• Ring
• Star
• Tree
• Mesh
When we think of the complex networks we can make use of more than two network topologies as Hybrids.
Bus Topology:
In this Topology the nodes are connected to a single common backbone. This common medium proves to be
a shared communication path for the nodes that are connected to it. A device which wants to communicate
to other device sends a broadcast message on to the communication path, this message is read by every node
in the network. It checks for which node it was intended and only the destination message actually accepts
that message and interprets it. This topologies are easy to install as it doesn’t require too much of cabling. It
works best when number of PC are less in the network. Performance is the issue when the nodes grow and
if the backbone fails the whole network fails.
IT Dept, GPG, Surat DYV
Ring Topology:
In this mapping of network each device has two neighbors for communication purpose. The message travels
through the ring in either clockwise or anti-clockwise direction. A failure in the cable can breakdown the
whole network. To implement this kind of network FDDI or Token ring technology is used. found in some
offices and schools.
Star Topology:
This network topology introduces a new node called as HUB in the network. It can be Router,
Switch or a HUB. All the devices are connected to the central Hub by unshielded Twisted Pair Ethernet.
Compared to Bus it requires more cables, however the performance is better than bus and ring. The whole
network fails when only the central Hub fails. and the failure in a cable will take down only one PC and not
the entire network as in the bus or ring.
Tree Topology:
This topology integrates more than one star topologies onto a Bus. Only the Hub devices are connected to
the tree Bus, each Hub functions as the Root of the tree. This hybrid approach supports expandability of the
network. It is also called as Hierarchical topology
Mesh Topology:
Now, In this topology the concept of route is introduced. In this topology the data passed on to the network
can take several paths to reach the destinations, unlike the other topologies. Here every device is connected
to every other device called as Full Mesh. we can summarize this topologies, we can build a home or a small
business network without understanding of the topologies, however if we understand each topology in a
better way it can definitely help us in building a good network. A misconfigured network can result in a
waste of time and energy as well as a lots of troubleshooting methods to resolve the issue. So the basic
understanding of the network topologies and network devices is a must to build a good network.
CONCLUSION:
Q. 3 Draw the OSI reference model and write down the function of each layer.
Cables
Cabling play an important role in networking and the type of network media used determines how
fast the data travels along the media, and also the maximum data rate that can be carried. The four main
types of networking media are:
• Shielded twisted-pair (STP)
• Unshielded twisted-pair (UTP)
• Coaxial cable
• Fiber-optic cable
Shielded twisted-pair:
This is a type of copper telephone wiring in which each of the two copper wires that are twisted together and
are coated with an insulating coating that functions as a ground for the wires.
Unshielded twisted-pair:
Unshielded Twisted-pair are not shielded and thus interfere with nearby cables.
They are used in LANs to bit rates of 100Mbps and with maximum length of 100m.
UTP cables are typically used to connect a computer to a network.
There are several classifications of cable used for twisted-pair networks. But, use of Category 5 (or CAT 5)
cable for all new installations is recommended. Likewise, there are several fire code classifications for the
outer insulation of CAT 5 cable. Use of CMR cable, or "riser cable," for most of the wiring is done. You
should also be aware of CMP or plenum cable (a plenum is used to distribute air in a building). You may be
required by local, state or national codes to use the more expensive plenum-jacketed cable if it runs through
suspended ceilings, ducts, or other areas, if they are used to circulate air or act as an air passage from one
room to another. If in doubt, use plenum. CMR cable is generally acceptable for all applications not
requiring plenum cable.
Stranded wire patch cables are often specified for cable segments running from a wall jack to a PC and for
patch panels. They are more flexible than solid core wire. However, the rational for using it is that the
constant flexing of patch cables may wear-out solid core cable--break it. I don't think this is a real concern
in the average small network. For example, I have one solid core cable going to my work bench. It has
probably flexed and average person's lifetime of flexes from the many times I have connected customer
computers to my network. Also, stranded cable is susceptible to degradation from moisture infiltration, may
use an alternate color code, and should not be used for cables longer than 3 Meters (about 10 feet).
Most of the wiring I do simply connects computers directly to other computers or hubs. Solid core cable is
quite suitable for this purpose and for many home and small business networks. I find it also quite
acceptable for use as patch cables. You might consider stranded wire patch cables if you have a notebook
computer you are constantly moving around.
CAT 5 cable has four twisted pairs of wire for a total of eight individually insulated wires. Each pair is
color coded with one wire having a solid color (blue, orange, green, or brown) twisted around a second wire
with a white background and a stripe of the same color. The solid colors may have a white stripe in some
cables. Cable colors are commonly described using the background color followed by the color of the stripe;
e.g., white-orange is a cable with a white background and an orange stripe.
The straight through and cross-over patch cables are terminated with CAT 5 RJ-45 modular plugs. RJ-45
plugs are similar to those you'll see on the end of your telephone cable except they have eight versus four or
six contacts on the end of the plug and they are about twice as big. Make sure they are rated for CAT 5
wiring. (RJ means "Registered Jack"). Also, there are RJ-45 plugs designed for both solid core wire and
stranded wire. Others are designed specifically for one kind of wire or the other. Be sure you buy plugs
appropriate for the wire you are going to use. Mostly plugs designed to accommodate both kinds of wire are
used.
QUESTIONS:
Q. 1 Explain twisted pair cable.
Q. 2 Differentiate straight through and crossover UTP cable.
Q. 3 Compare STP and UTP.
Q. 4 Give the reason why the pair of cable are twisted in twisted pair cable.
THEORY:
Time division multiplexing (TDM) is the process of sending more than one source
information over a same channel in different time slot which helps in efficient channel utilization
and saves bandwidth.
PROCEDURE:
1. Open Matlab version R2014a.
2. Open new file and enter the program and save it.
3. Add the path to the location of the file in the system.
4. Compile the program and check for any error and debug it.
5. Note down the output.
MATLAB CODING:
n1=input ('Enter the length= ');
n2=input ('Enter the length= ');
n3=input ('Enter the length= ');
t=0:0.01:n1;
t1=1:0.01:n2;
t2=2:0.01:n3;
x=sin (2*pi*t);
y=sin (4*pi*t1);
z=sin (6*pi*t2);
subplot (4,1,1);
plot (t,x,'g');
title ('USER 1');
grid on;
Subplot (4, 1, 2);
Plot (t1, y,'r');
title ('USER 2');
gridon;
subplot(4,1,3);
plot(t2,z);
title('USER 3');
gridon;
subplot(4,1,4);
plot(t,x,'g',t1,y,'r',t2,z);
TITLE('TIME DIVISION MULTIPLEXING');
grid on;
INPUT:
Enter the length 1
Enter the length 2
Enter the length 3
OUTPUT WAVEFORM:
QUESTIONS:
Q. 1 Write down the need of Multiplexing.
Q. 2 List out types of Multiplexing.
Q. 3 Explain time division multiplexing in brief.
Repeaters
A repeater connects two segments of your network cable. It retimes and regenerates the signals to proper
amplitudes and sends them to the other segments. When talking about, Ethernet topology, you are probably
talking about using a hub as a repeater. Repeaters require a small amount of time to regenerate the signal.
This can cause a propagation delay which can affect network communication when there are several
repeaters in a row. Many network architectures limit the number of repeaters that can be used in a row.
Repeaters work only at the physical layer of the OSI network model.
As a network grows, its cable can easily exhaust the network constraint, and any further loads on this network
can leads to attenuation and digital pulse distortion. To overcome these limitations, repeaters are used to
increase the maximum interconnection length, and may do the following:
• Reshape signal pulses
• Pass all signals between attached segments
• Boost signal power
• Possibly translate between two different media (such as between fiber-optic and twisted-pair cable)
• Transmit to more than one network. These are multi-port repeaters and send data frames from any
received segment to all the others. Multi-port repeaters do not filter the traffic, as they blindly send
received data frames to all the physical connected network segments.
Hubs
A hub is a repeater with multiple ports, and can be thought of as being the centre point of a star topology
network. It is often known as a multi-port repeater (or as a concentrator in Ethernet). Hubs can be active
(where they repeat signal sent through them) or passive (where they do not repeat, but merely split, signals
sent through them). Hub generally:
• Amplify signals.
• Propagate the signal through the network.
• Do not filter traffic. This is a major disadvantage with hubs and repeaters as data arriving at any of
the ports is automatically transmitted to all the other ports connected to the hub.
• Do not determine path.
• Centralize the connection to the network
Figure illustrate a star topology with hub as the central server and fig. 1b shows the real hub as used in
networking.
Bridges
These examine the destination MAC address (or station address) of the transmitted data frames, and will not
retransmit data frames which are not destined for another network segment. They maintain a table with
connected MAC address, and do not forward any data frames if the MAC address is on the network that
originated it, else it forward to all connected segment. Thus a bridge does not actually determine on which
segment the destination is on, and blindly forwards data frames to all other connected segments.
Bridges are an excellent method of reducing traffic on network segment and it does this by examining the
destination address of the frame before deciding how to handle it. Consider the figure below; if the
destination address of a data frame (from segment 1) is that of station A or B, then there is no need for the
frame to appear on segment 2. But if the destination address (data frame from segment 1) is that of station C
or D, or if it is the broadcast address, then the bridge will transmit, or forward the frame on to segment 2. By
forwarding packets, the bridge allows any of the four devices in the figure to communicate.
A bridge reads the outermost section of data on the data packet, to tell where the message is going. It reduces
the traffic on other network segments, since it does not send all packets. Bridges can be programmed to reject
packets from particular networks. Bridging occurs at the data link layer of the OSI model, which means the
bridge cannot read IP addresses, but only the outermost hardware address of the packet. In our case the
bridge can read the Ethernet data which gives the hardware address of the destination address, not the IP
address. Bridges forward all broadcast messages. Only a special bridge called a translation bridge will allow
two networks of different architectures to be connected. Bridges do not normally allow connection of
networks with different architectures. The hardware address is also called the MAC (media access control)
address. To determine the network segment a MAC address belongs to, bridges use one of:
Switches
A switch is a very fast, low-latency, multi-port bridge that is used to segment LANs. They are typically used
to increase communication rates between segments with multiple parallel conversation and also
communication between different networking technologies (such as between ATM and 100Base-TX). r
A vital difference between a hub and a switch is that all the nodes connected to a hub share the bandwidth
among themselves, while a device connected to a switch port has the full bandwidth all to itself. For example,
if 10 nodes are communicating using a hub on a 10-Mbps network, then each node may only get a portion
of the 10 Mbps if other nodes on the hub want to communicate as well. But with a switch, each node could
possibly communicate at the full 10 Mbps. [1]
Figure (a) below represent a typical switch and (b) illustrates a network using a switch.
Fig (a)
Fig (b)
Routers
A router is used to route data packets between two networks. It reads the information in each packet to tell
where it is going. If it is destined for an immediate network it has access to, it will strip the outer packet,
readdress the packet to the proper Ethernet address, and transmit it on that network. If it is destined for
another network and must be sent to another router, it will re-package the outer packet to be received by the
next router and send it to the next router. The section on routing explains the theory behind this and how
routing tables are used to help determine packet destinations. Routing occurs at the network layer of the OSI
model. They can connect networks with different architectures such as Token Ring and Ethernet. Although
they can transform information at the data link level, routers cannot transform information from one data
format such as TCP/IP to another such as IPX/SPX. Routers do not send broadcast packets or corrupted
packets. If the routing table does not indicate the proper address of a packet, the packet is discarded.
Brouter
There is a device called a brouter which will function similar to a bridge for network transport protocols that
are not routable, and will function as a router for routable protocols. It functions at the network and data link
layers of the OSI network model.
These are network devices that examine the network address (IP address) field and determine the best route
for a data packet, and will only transmit it out of a network segment if it is destined for a node on another
network. Routers do the following:
• Do not forward broadcast
• Do not forward traffic to unknown addresses
• Modify data packet header
• Build tables of network addresses.
Gateway
A gateway can translate information between different network data formats or network architectures. It can
translate TCP/IP to AppleTalk so computers supporting TCP/IP can communicate with Apple brand
computers. Most gateways operate at the application layer, but can operate at the network or session layer
of the OSI model. Gateways will start at the lower level and strip information until it gets to the required
level and repackage the information and work its way back toward the hardware layer of the OSI model. To
confuse issues, when talking about a router that is used to interface to another network, the word gateway is
often used. This does not mean the routing machine is a gateway as defined here, although it could be.
CONCLUSION:
A homegroup makes it easier to share files and printers on a home network. You can share pictures, music,
videos, documents, and printers with other people in your homegroup. Other people can't change the files
that you share, unless you give them permission to do so.
When you set up a computer with this version of Windows, a homegroup is created automatically if one
doesn't already exist on your home network. If a homegroup already exists, you can join it. After you
create or join a homegroup, you can select the libraries that you want to share. You can prevent specific
files or folders from being shared, and you can share additional libraries later. You can help protect your
homegroup with a password, which you can change at any time.
CONCLUSION:
QUESTIONS:
Q.1 What is Homegroup?
Q.2 How to configure windows for joining the homegroup.
Q.3 How to change homegroup password?
PING: The Ping command is a network tool used to determine if you are able to send packets between
your network computer on the internet to another computer without losing packets along the way. By
doing this you can determine if you're online or if a website is down. It also calculates round trip time and
Time to Live. This can let you know if your NIC card is working properly and if you're able to reach your
router or modem. Hence it can be used as a network tool for troubleshooting.
Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS] [-r count] [-s count] [[-j host-list] | [-k host-
list]] [-w timeout] [-R] [-S srcaddr] [-4] [-6 target_name
Options:
Example:
ping yahoo.com
ping -r 3 192.168.230.1
ping –n 25 www.gtu.ac.in
ping –l 2000 www.google.co.in
ping –n 20 –l 1000 www.edrawsoft.com
ping -4 www.gtu.ac.in
Note: For loopback address, you can ping it and get returns even when you are offline (not connected to
any network). If you don't get any valid replies, then there's a problem with the computer's Network
settings.
• Configure of LAN Card:
1. First go to network places then right click on connected network and go to properties:
• Ping Command:
1. ping /?
• The ping command is useful for determining the status of the network and various foreign hosts, tracking and
isolating hardware and software problems, and testing, measuring, and managing networks
Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
Options:
2. ping –t 172.16.11.56
• Specifies that ping continue sending Echo Request messages to the destination until interrupted.
• To interrupt and display statistics, press CTRL-BREAK. To interrupt and quit ping, press CTRL-C.
3. ping -a 172.11.16.56
4. ping –n 6 172.16.11.56
5. ping –n 2 172.16.11.56
6. ping –l 64 172.16.11.56
• Specifies the length, in bytes, of the Data field in the Echo Request messages sent.
• The default is 32. The maximum size is 65,527.
IP related command
1. ipconfig
Windows IP Configuration
Ethernet adapter Local Area Connection:
2. ipconfig /all
CONCLUSION:
QUESTIONS:
Experiment – 9
Aim : Use TRACERT, ARP, NETSTAT, PATHPING commands on windows.
LOGIN
Purpose of login is to invoke your login script for a particular file server and access that server
Login [ / option][ file server]/[name][parameter]
Options : /script / No- attach, / Clear screen
LOGOUT
Purpose is to log you out of file server you were attached to
Logout [ file server]
SLIST
Lists file servers on your network Slist [ file server] [/c]
Cast on/ cast off to enable/ prevent messege reaching your station
WHOAMI List your file name / server name/software version/ login date and time/ groups you belong to,
rights and security equivalences
IPCONFIG:
Ipconfig is a utility that can be used to display the network settings currently assigned and given by a
network. This command can be utilized to verify a network connection as well as to verify your network
settings. It is used to find out your current TCP/IP settings. With IPCONFIG you can find out your IP
Address, find your Default Gateway and find your Subnet Mask. This is a very handy network tool for
finding your local IP address.
Syntax
ipconfig [/? | /all | /release [adapter] | /renew [adapter] |/displaydns |/showclassid adapter | /setclassid
adapter [classidtoset] ]
Nslookup: nslookup is like a Domain Name Lookup from the IP Address. You can also do a reverse
lookup from Domain Name to IP Address. It can be a way to find out if your DNS is properly working or
if the site is having problems. You can obtain an IP from a site and try to visit the IP directly, bypassing
the Domain Name Servers that would usually resolve the Domain name to IP name.
IT Dept, GPG, Surat DYV
nslookup yahoo.com
nslookup xxx.xxx.xxx.xxx
NETSTAT: netstat can be used to view active network connections and TCP/IP connections. You can
determine what ports are open and being used, what programs are using your ports and what kind of TCP
and UDP connections are present.
Syntax NBTSTAT [-a RemoteName] [-A IP address] [-c] [-n] [-r] [-R] [-RR] [-s] [-S] [interval]
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
-c (cache) Lists NBT's cache of remote [machine] names and their IP addresses
-n (names) Lists local NetBIOS names.
-r (resolved) Lists names resolved by broadcast and via WINS
-R (Reload) Purges and reloads the remote cache name table
-S (Sessions) Lists sessions table with the destination IP addresses
-s (sessions) Lists sessions table converting destination IP addresses to computer NETBIOS names.
-RR (ReleaseRefresh) Sends Name Release packets to WINs and then, starts Refresh
RemoteName Remote host machine name.
IP address Dotted decimal representation of the IP address.
Interval Redisplays selected statistics, pausing interval seconds between each display. Press Ctrl + C to
stop redisplaying statistics.
Example:
netstat -a
netstat -e
netstat -r --> try to find out which network card your PC is actually using. [routing table]
Note: always use -a so as to see UDP packets also. When you are offline, you shouldn't see any connection
data!
Open a broswer connection to http and ftp server and see 'netstat -an'. Can be while offline and online.
Getmac DOS command used to show both local and remote MAC addresses. When run with no
parameters (ie. getmac) it displays MAC addresses for the local system. When the /v parameter is used, it
also displays the associated connection name and network adapter name. When run with the /s parameter it
displays MAC addresses for the remote computer.
-a Displays current ARP entries by interrogating the current protocol data. If inet_addr is specified, the IP
and Physical addresses for only the specified computer are displayed. If more than one network interface
uses ARP, entries for each ARP table are displayed.
IT Dept, GPG, Surat DYV
-g (Same as -a)
inet_addr Specifies an internet address.
-N if_addr Displays the ARP entries for the network interface specified by if_addr.
-d Deletes the host specified by inet_addr.
-s Adds the host and associates the Internet address inet_addr with the Physical address
eth_addr. The Physical address is given as 6 hexadecimal bytes separated by hyphens. The entry is
permanent.
eth_addr Specifies a physical address.
if_addr If present, this specifies the Internet address of the interface whose address translation
table should be modified. If not present, the first applicable interface will be used.
Example:
nbtstat -a ics-ibm-srv --> gives information about each card, its services and mac address.
nbtstat -A 192.168.230.251 --> gives information about that concern that ip address along with mac
address.
nbtstat -c --> finding cache entries for NetBios
nbtstat -S --> gives NetBios session information.
Result:
(a) For Windows Machine.
(1) arp/?
arp –a Displays IP and MAC address of the hosts and servers to which the pc is connected
and displays the type of connection.
(2) nbtstat/?
It is designed to help troubleshoot NetBIOS name resolution problems.
nbtstat –A Displays the type of connections and status that a host/server has to a PC specified
by its IP address.
netstat –a Shows the active connections and the listening ports and their status for the
TCP and UDP protocol of that PC.
netstat –r Shows the route table, MAC address, Default gateway, netmask and interfaces
of the PC.
netstat –n Shows the IP addresses of the active connections for the PC without resolving
their names.
netstat –s Shows the statistics for protocols at network and transport layer.
tracert -d Traces the route to a given IP address from the PC without resolving the host
names.
tracert -h Traces the route to a given IP address from the PC with the maximum number
of hops specified.
(5) nslookup/?
Nslookup is a useful tool for troubleshooting DNS problems, such as the host name resolution.
(7) pathping
Pathping tool is a route tracing tool that combines features of ping and tracert with additional
information that neither of those tools provides.
(8) Hostname
To identify the name of the host you are working on.
CONCLUSION
While there are many Internet browsers such as Internet Explorer, Firefox and Google Chrome that can be
downloaded and installed on your computer for free, creating web browsers yourself gives you more control
over how you want to browse the Internet. With a custom web browser you can not only decide how the
appearance should be but also add custom buttons and features. Visual Basic is 1 of the most common
programs used to make a web browser.
BrowsingMadeEasyMozilla-Firefox
Gotohttp://www.mozilla.org/en-US/products/download.html?product=firefox-stub&os=win&lang=en-US
Get to your favorite sites quickly – even if you don’t remember the URLs. Type your term into the location
bar (aka the Awesome Bar) and the autocomplete function will include possible matches from your
browsing history, bookmarked sites and open tabs.
Google Chrome
Go to https://www.google.com/intl/en_uk/chrome/browser/
Opera
Make Opera your own — customize it
The Opera browser is highly customizable, so you can change a lot of the settings to suit you. This section
shows some of the more common ways you can customize Opera.
The topics in this section are listed below. Select the arrow to view each topic, or select the Expand
All button to view all topics at once.
You can set Opera as your default browser so that Opera automatically opens when you request any
information from the Internet. Choose your operating system below to display the steps to follow.
Windows
The second time you run Opera, it displays a dialog asking if you want Opera to be your default browser.
Select OK to confirm.
If you have cancelled this dialog previously, follow these steps to set Opera as the default browser:
1. Go to Preferences > Advanced > Programs.
2. Check the Check if Opera is default browser on startup option.
3. The next time you start Opera, answer Yes when the dialog asks you if you want Opera to be the
default browser on your computer.
Internet Options:
General: In this tab options of Home page setting, start up option, browsinh history and appearance of the
webpage are available.
Content: Access control such as parental control can be set using this tab.
Programs: Default programs for opening various types of web content can be set here.
CONCLUSION
IP address is an address having information about how to reach a specific host, especially outside the LAN.
An IP address is a 32 bit unique address having an address space of 232.
Generally, there are two notations in which IP address is written, dotted decimal notation and hexadecimal
notation.
Hexadecimal Notation:
1. The value of any segment (byte) is between 0 and 255 (both included).
2. There are no zeroes preceding the value in any segment (054 is wrong, 54 is correct).
Classful Addressing
The 32 bit IP address is divided into five sub-classes. These are:
• Class A
• Class B
Each of these classes has a valid range of IP addresses. Classes D and E are reserved for multicast and
experimental purposes respectively. The order of bits in the first octet determine the classes of IP address.
IPv4 address is divided into two parts:
• Network ID
• Host ID
The class of IP address is used to determine the bits used for network ID and host ID and the number of
total networks and hosts possible in that particular class. Each ISP or network administrator assigns IP
address to each device that is connected to its network.
Note: IP addresses are globally managed by Internet Assigned Numbers Authority(IANA) and regional
Internet registries(RIR).
Note: While finding the total number of host IP addresses, 2 IP addresses are not counted and are
therefore, decreased from the total count because the first IP address of any network is the network number
and whereas the last IP address is reserved for broadcast IP.
IP address belonging to class A are assigned to the networks that contain a large number of hosts.
The higher order bit of the first octet in class A is always set to 0. The remaining 7 bits in first octet are
used to determine network ID. The 24 bits of host ID are used to determine the host in any network. The
default subnet mask for class A is 255.x.x.x. Therefore, class A has a total of:
• 2^7-2= 126 network ID(Here 2 address is subracted because 0.0.0.0 and 127.x.y.z are special
address. )
• 2^24 – 2 = 16,777,214 host ID
Class B:
IP address belonging to class B are assigned to the networks that ranges from medium-sized to large-sized
networks.
The higher order bits of the first octet of IP addresses of class B are always set to 10. The remaining 14 bits
are used to determine network ID. The 16 bits of host ID is used to determine the host in any network. The
default sub-net mask for class B is 255.255.x.x. Class B has a total of:
The higher order bits of the first octet of IP addresses of class C are always set to 110. The remaining 21
bits are used to determine network ID. The 8 bits of host ID is used to determine the host in any network.
The default sub-net mask for class C is 255.255.255.x. Class C has a total of:
Class D:
IP address belonging to class D are reserved for multi-casting. The higher order bits of the first octet of IP
addresses belonging to class D are always set to 1110. The remaining bits are for the address that interested
hosts recognize.
Class D does not posses any sub-net mask. IP addresses belonging to class D ranges from 224.0.0.0 –
239.255.255.255.
Class E:
IP addresses belonging to class E are reserved for experimental and research purposes. IP addresses of
class E ranges from 240.0.0.0 – 255.255.255.254. This class doesn’t have any sub-net mask. The higher
Host ID’s are used to identify a host within a network. The host ID are assigned based on the following
rules:
Hosts that are located on the same physical network are identified by the network ID, as all host on the
same physical network is assigned the same network ID. The network ID is assigned based on the
following rules:
• The network ID cannot start with 127 because 127 belongs to class A address and is
reserved for internal loop-back functions.
• All bits of network ID set to 1 are reserved for use as an IP broadcast address and
therefore, cannot be used.
• All bits of network ID set to 0 are used to denote a specific host on the local network
and are not routed and therefore, aren’t used.
The problem with this classful addressing method is that millions of class A address are wasted, many of
the class B address are wasted, whereas, number of addresses available in class C is so small that it cannot
cater the needs of organizations. Class D addresses are used for multicast routing and are therefore
available as a single block only. Class E addresses are reserved.
Since there are these problems, Classful networking was replaced by Classless Inter-Domain Routing
(CIDR) in 1993.
Observation Table
24.46.8.95
112.46.15.154
192.16.45.140
175.45.47.96
128.78.65.129
127.16.15.78
221.52.16.221
132.7.21.84
221.46.75.64
172.16.45.140
172.16.47.159
195.145.129.45
220.129.154.78
45.15.189.76
79.87.254.13
CONCLUSION
Transmission Media:
A transmission medium can be broadly defined as anything that can carry information from a source
to a destination. For example, the transmission medium for two people having a dinner conversation is the
air. The air can also be used to convey the message in a smoke signal or semaphore. For a written message,
the transmission medium might be a mail carrier, a truck, or an airplane.
data communications the definition of the information and the transmission medium is more specific.
The transmission medium is usually free space, metallic cable, or fiber-optic cable. The information is
usually a signal that is the result of a conversion of data from another form.
In telecommunications, transmission media can be divided into two broad categories: guided and
unguided. Guided media include twisted-pair cable, coaxial cable, and fiber-optic cable. Unguided medium
is free space.
GUIDED MEDIA:
Guided media, which are those that provide a conduit from one device to another, include twisted-
pair cable, coaxial cable, and fiber-optic cable. A signal traveling along any of these media is directed and
contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic (copper)
conductors that accept and transport signals in the form of electric current. Optical fiber is a cable that accepts
and transports signals in the form of light.
Twisted-Pair Cable:
A twisted pair consists of two conductors (normally copper), each with its own plastic insulation,
twisted together, as shown in Figure.
One of the wires is used to carry signals to the receiver, and the other is used only as a ground reference.
The receiver uses the difference between the two.
In addition to the signal sent by the sender on one of the wires, interference (noise) and crosstalk may affect both
wires and create unwanted signals.
If the two wires are parallel, the effect of these unwanted signals is not the same in both wires because
they are at different locations relative to the noise or crosstalk sources (e.g., one is closer and the other is farther).
This results in a difference at the receiver. By twisting the pairs, a balance is maintained.
The most common twisted-pair cable used in communications is referred to as unshielded twisted-
pair (UTP). IBM has also produced a version of twisted-pair cable for its use called shielded twisted-pair
(STP). STP cable has a metal foil or braided – mesh covering that encases each pair of insulated conductors.
Although metal casing improves the quality of cable by preventing the penetration of noise or crosstalk, it is
bulkier and more expensive. Figure shows the difference between UTP and STP.
The Electronic Industries Association (EIA) has developed standards to classify unshielded twisted-
pair cable into seven categories. Categories are determined by cable quality, with 1 as the lowest and 7 as
the highest. Each EIA category is suitable for specific uses.
One way to measure the performance of twisted-pair cable is to compare attenuation versus frequency
and distance. A twisted-pair cable can pass a wide range of frequencies. However, Figure shows that with
increasing frequency, the attenuation, measured in decibels per kilometer (dB/km), sharply increases with
frequencies above 100 kHz. Note that gauge is a measure of the thickness of the wire.
Applications:
Twisted-pair cables are used in telephone lines to provide voice and data channels. The local loop-
the line that connects subscribers to the central telephone office---commonly consists of unshielded twisted-
pair cables.
The DSL lines that are used by the telephone companies to provide high-data-rate connections also
use the high-bandwidth capability of unshielded twisted-pair cables.
Local-area networks, such as lOBase-T and lOOBase-T, also use twisted-pair cables.
Coaxial cable (or coax) carries signals of higher frequency ranges than those in twisted – pair cable,
in part because the two media are constructed quite differently. Instead of having two wires, coax has a
central core conductor of solid or stranded wire (usually copper) enclosed in an insulating sheath, which is,
in turn, encased in an outer conductor of metal foil, braid, or a combination of the two. The outer metallic
wrapping serves both as a shield against noise and as the second conductor, which completes the circuit.
This outer conductor is also enclosed in an insulating sheath, and the whole cable is protected by a
plastic cover.
Coaxial cables are categorized by their radio government (RG) ratings. Each RG number denotes a
unique set of physical specifications, including the wire gauge of the inner conductor, the thickness and type
of the inner insulator, the construction of the shield, and the size and type of the outer casing. Each cable
defined by an RG rating is adapted for a specialized function.
To connect coaxial cable to devices, we need coaxial connectors. The most common type of
connector used today is the Bayone-Neill-Concelman (BNe), connector. Figure shows three popular types
of these connectors: the BNC connector, the BNC T connector, and the BNC terminator.
Performance:
As we did with twisted-pair cables, we can measure the performance of a coaxial cable. We notice
in Figure that the attenuation is much higher in coaxial cables than in twisted-pair cable. In other words,
although coaxial cable has a much higher bandwidth, the signal weakens rapidly and requires the frequent
use of repeaters.
Coaxial cable was widely used in analog telephone networks where a single coaxial network could
carry 10,000 voice signals. Later it was used in digital telephone networks where a single coaxial cable could
carry digital data up to 600 Mbps. However, coaxial cable in telephone networks has largely been replaced
today with fiber-optic cable.
Cable TV networks (see Chapter 9) also use coaxial cables. In the traditional cable TV network, the
entire network used coaxial cable. Later, however, cable TV providers replaced most of the media with fiber-
optic cable; hybrid networks use coaxial cable only at the network boundaries, near the consumer premises.
Cable TV uses RG-59 coaxial cable.
Fiber-Optic Cable:
A fiber-optic cable is made of glass or plastic and transmits signals in the form of light. Optical fibers
use reflection to guide light through a channel. A glass or plastic core is surrounded by a cladding of less
dense glass or plastic. The difference in density of the two materials must be such that a beam of light moving
through the core is reflected off the cladding instead of being refracted into it.
Current technology supports two modes (multimode and single mode) for propagating light along
optical channels, each requiring fiber with different physical characteristics. Multimode can be implemented
in two forms: step-index or graded-index.
Multimode: Multimode is so named because multiple beams from a light source move through the
core in different paths. How these beams move within the cable depends on the structure ofthe core, as shown
in Figure.
In multimode step-index fiber, the density of the core remains constant from the center to the edges.
A beam of light moves through this constant density in a straight line until it reaches the interface of the core
and the cladding. At the interface, there is an abrupt change due to a lower density; this alters the angle of
the beam's motion. The term step index refers to the suddenness of this change, which contributes to the
distortion of the signal as it passes through the fiber.
A second type of fiber, called multimode graded-index fiber, decreases this distortion of the signal
through the cable. The word index here refers to the index of refraction. As we saw above, the index of
Single-Mode: Single-mode uses step-index fiber and a highly focused source of light that limits
beams to a small range of angles, all close to the horizontal. The single – mode fiber itself is manufactured
with a much smaller diameter than that of multimode fiber, and with substantially lower density (index of
refraction). The decrease in density results in a critical angle that is close enough to 90° to make the
propagation of beams almost horizontal. In this case, propagation of different beams is almost identical, and
delays are negligible. All the beams arrive at the destination "together" and can be recombined with little
distortion to the signal.
Fiber Sizes
Optical fibers are defined by the ratio of the diameter of their core to the diameter of their cladding,
both expressed in micrometres. Note that the last size listed is for single-mode only. The common sizes are
shown in Table.
The outer jacket is made of either PVC or Teflon. Inside the jacket are Kevlar strands to strengthen
the cable. Kevlar is a strong material used in the fabrication of bulletproof vests. Below the Kevlar is another
plastic coating to cushion the fiber. The fiber is at the center of the cable, and it consists of cladding and core.
Applications:
Fiber-optic cable is often found in backbone networks because its wide bandwidth is cost-effective.
Today, with wavelength-division multiplexing (WDM), we can transfer data at a rate of 1600 Gbps.
Some cable TV companies use a combination of optical fiber and coaxial cable, thus creating a hybrid
network. Optical fiber provides the backbone structure while coaxial cable provides the connection to the
user premises.
Local-area networks such as 100Base-FX network (Fast Ethernet) and 1000Base-X also use fiber-
optic cable.
Advantages Fiber-optic cable has several advantages over metallic cable (twisted – pair or coaxial).
Higher bandwidth. Fiber-optic cable can support dramatically higher bandwidths (and hence data
rates) than either twisted-pair or coaxial cable. Currently, data rates and bandwidth utilization over fiber-
optic cable are limited not by the medium but by the signal generation and reception technology available.
Less signal attenuation. Fiber-optic transmission distance is significantly greater than that of other
guided media. A signal can run for 50 km without requiring regeneration. We need repeaters every 5 km for
coaxial or twisted-pair cable.
Resistance to corrosive materials. Glass is more resistant to corrosive materials than copper.
Light weight. Fiber-optic cables are much lighter than copper cables.
Greater immunity to tapping. Fiber-optic cables are more immune to tapping than copper cables.
Copper cables create antenna effects that can easily be tapped.
Installation and maintenance. Fiber-optic cable is a relatively new technology. Its installation and
maintenance require expertise that is not yet available everywhere.
Cost. The cable and the interfaces are relatively more expensive than those of other guided media.
Unguided media transport electromagnetic waves without using a physical conductor. This type of
communication is often referred to as wireless communication. Signals are normally broadcast through free
space and thus are available to anyone who has a device capable of receiving them.
Figure shows the part of the electromagnetic spectrum, ranging from 3 kHz to 900 THz, used for
wireless communication.
Unguided signals can travel from the source to destination in several ways: ground propagation, sky
propagation, and line-of-sight propagation.
In ground propagation, radio waves travel through the lowest portion of the atmosphere, hugging the
earth. These low-frequency signals emanate in all directions from the transmitting antenna and follow the
curvature of the planet. Distance depends on the amount of power in the signal: The greater the power, the
greater the distance. In sky propagation, higher-frequency radio waves radiate upward into the ionosphere
where they are reflected back to earth. This type of transmission allows for greater distances with lower
output power.
In line-or-sight propagation, very high-frequency signals are transmitted in straight lines directly
from antenna to antenna. Antennas must be directional, facing each other, and either tall enough or close
enough together not to be affected by the curvature of the earth. Line-of-sight propagation is tricky because
radio transmissions cannot be completely focused.
We can divide wireless transmission into three broad groups: radio waves, microwaves, and infrared
waves.
Radio Waves:
Electromagnetic waves ranging in frequencies between 3 kHz and 1 GHz are normally called radio
waves; waves ranging in frequencies between 1 and 300 GHz are called microwaves. However, the
behaviour of the waves, rather than the frequencies, is a better criterion for classification.
Radio waves, for the most part, are omnidirectional. When an antenna transmits radio waves, they
are propagated in all directions. This means that the sending and receiving antennas do not have to be aligned.
propagate in the sky mode, can travel long distances. This makes radio waves a good candidate for
long-distance broadcasting such as AM radio.
Omnidirectional Antenna:
Radio waves use omnidirectional antennas that send out signals in all directions. Based on the
wavelength, strength, and the purpose of transmission, we can have several types of antennas.
Applications:
The omnidirectional characteristics of radio waves make them useful for multicasting, in which there is
one sender but many receivers. AM and FM radio, television, maritime radio, cordless phones, and paging are
examples of multicasting.
Microwaves:
Electromagnetic waves having frequencies between 1 and 300 GHz are called microwaves. Microwaves are
unidirectional. When an antenna transmits microwave waves, they can be narrowly focused. This means that the
sending and receiving antennas need to be aligned. The unidirectional property has an obvious advantage. A pair
of antennas can be aligned without interfering with another pair of aligned antennas. The following describes
some characteristics of microwave propagation:
Microwave propagation is line-of-sight. Since the towers with the mounted antennas need to be in direct
sight of each other, towers that are far apart need to be very tall. The curvature of the earth as well as other
blocking obstacles do not allow two short towers to communicate by using microwaves. Repeaters are often
needed for long distance communication.
Unidirectional Antenna:
Microwaves need unidirectional antennas that send out signals in one direction. Two types of antennas are used
for microwave communications: the parabolic dish and the horn.
A parabolic dish antenna is based on the geometry of a parabola: Every line parallel to the line of symmetry (line
of sight) reflects off the curve at angles such that all the lines intersect in a common point called the focus. The
parabolic dish works as a funnel, catching a wide range of waves and directing them to a common point. In this
way, more of the signal is recovered than would be possible with a single-point receiver.
Outgoing transmissions are broadcast through a horn aimed at the dish. The microwaves hit the dish and are
deflected outward in a reversal of the receipt path.
Applications:
Microwaves, due to their unidirectional properties, are very useful when unicast (one-to-one) communication is
needed between the sender and the receiver.
Infrared:
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm to 770 nm), can be used
for short-range communication. Infrared waves, having high frequencies, cannot penetrate walls. This
advantageous characteristic prevents interference between one system and another; a short-range communication
system in one room cannot be affected by another system in the next room. When we use our infrared remote
control, we do not interfere with the use of the remote by our neighbours. However, this same characteristic
makes infrared signals useless for long-range communication. In addition, we cannot use infrared waves outside
a building because the sun's rays contain infrared waves that can interfere with the communication.
Applications:
Infrared signals can be used for short-range communication in a closed area using line-of-sight propagation.
CONCLUSION
QUESTIONS:
Experiment – 13
Aim: To Connect the computers in Local Area Network.
Procedure:
On the host computer, follow these steps to share the Internet connection:
5. Right-click the connection that you use to connect to the Internet. For example, if you
connect to the Internet by using a modem, right-click the connection that you want under
6. Click Properties.
8. Under Internet Connection Sharing, select the Allow other network users to connect
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up connection
whenever a computer on my network attempts to access the Internet check box if you
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address
192.168.0.1. Your computer may lose connectivity with other computers on your network. If
addresses automatically. Are you sure you want to enable Internet Connection Sharing?
The connection to the Internet is shared to other computers on the local area network (LAN).
The network adapter that is connected to the LAN is configured with a static IP address of
To connect to the Internet by using the shared connection, you must confirm the LAN adapter
IP configuration, and then configure the client computer. To confirm the LAN adapter IP
6. Click the General tab, click Internet Protocol (TCP/IP) in the connection uses the
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
192.168.0.254. For example, you can assign the following static IP address, subnet mask, and
default gateway:
8. IP Address 192.168.31.202
11. In the Local Area Connection Properties dialog box, click OK.
CONCLUSION:
QUESTIONS:
4. Internet access by transmitting digital data over the wires of a local telephone network is provided
by _______
a) leased line
b) digital subscriber line
c) digital signal line
d) digital leased line
10. _____________ allows LAN users to share computer programs and data.
a) Communication server
b) Print server
c) File server
d) Network
11. With respect to physical media, STP cables stands for _________
a) Shielded Twisted Pair Cable
b) Spanning Tree Protocol Cable
c) Static Transport Protocol Cable
d) Shielded Two Power Cable
12. A standalone program that has been modified to work on a LAN by including concurrency
controls such as file and record locking is an example of ___________
a) LAN intrinsic software
b) LAN aware software
c) Groupware
d) LAN ignorant software
14. What is the max length of the Shielded twisted pair cable?
a) 100 ft
b) 200 ft
c) 100 m
d) 200 m
17. What is the max data transfer rate for optical fiber cable?
a) 10 Mbps
b) 100 Mbps
c) 1000 Mbps
d) 10000 Mbps