0% found this document useful (0 votes)
716 views152 pages

DCC Lab Manual Final Practicals PDF

This document describes a practical to configure a peer-to-peer network with at least three hosts. The key steps are to: 1. Name three computers as Computer-A, Computer-B, and Computer-C. 2. Connect the computers using Ethernet crossover cables. 3. Configure the IP addresses of each computer so they can communicate over TCP/IP (e.g. Computer A gets 192.168.1.1). 4. Use the ping command to verify IP connectivity between the computers and share files between them to confirm the network is functioning properly.

Uploaded by

Karan Lataye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
716 views152 pages

DCC Lab Manual Final Practicals PDF

This document describes a practical to configure a peer-to-peer network with at least three hosts. The key steps are to: 1. Name three computers as Computer-A, Computer-B, and Computer-C. 2. Connect the computers using Ethernet crossover cables. 3. Configure the IP addresses of each computer so they can communicate over TCP/IP (e.g. Computer A gets 192.168.1.1). 4. Use the ping command to verify IP connectivity between the computers and share files between them to confirm the network is functioning properly.

Uploaded by

Karan Lataye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 152

Practical No.

1: To Configure Peer to Peer network with at least three


hosts
I. Practical Significance:
Peer-to-peer computing or networking is a distributed application architecture that partitions
tasks or workloads between peers. Peers are equally privileged, equipotent participants in the
application. They are said to form a peer-to-peer network of nodes.

Stands for "Peer to Peer." In a P2P network, the "peers" are computer systems which are
connected to each other via the Internet. Files can be shared directly between systems on
the network without the need of a central server. In other words, each computer on a P2P
network becomes a file server as well as a client.

II. Relevant Program Outcome (PO)


PO1 – Basic knowledge
PO2 – Discipline knowledge
PO10 – Life Long Learning

III. Competency and Practical Skills :


Develop computer network architecture
This practical is expected to develop the following skills
• Understand computer network
• Configure Peer to peer LAN

IV. Relevant Course Outcomes:


• Analyze the functioning of data communication and computer networks.
• Select relevant transmission media and switching techniques as per need.
• Configure different TCP/IP services.

V. Practical Outcomes :
• Configure peer to peer networks with at least three hosts .

VI. Relevant Affective Domain related Outcomes :


• Follow safety practices.
• Handle network components carefully.
• Demonstrate as a team leader/a team member.
• Follow ethical practices.

VII. Minimum Theoretical Background:

In a peer-to-peer network, all computers have the same rights. Each computer can act as a client
and as a server.

DCC MANUAL BY BMM 1


A peer-to-peer network is almost always represented by a work group. Such a network is
appropriate if the number of computers does not exceed 20 and the security of your data is not so
critical. The majority of small business organizations use this type of local area network. It is
important to remember that configuration of a LAN must be performed using the administrator
account.

VIII. a) Block Diagram

Fig 1.1 Peer-to-peer Network

Fig 1.2 Block diagram showing Peer-to-peer Network

b) Actual Network used in laboratory

DCC MANUAL BY BMM 2


IX Resources required

X Precautions to be Followed
• Locate the various ports on the computer before making connections
• Make the connections with care
• Handle equipment with care
• Configure settings carefully to avoid conflict.

XI Procedure
1. The two computers are connected to each other using UTP cables as shown in the block schematic.
2. Name the three computers as Computer-A, Computer-B & Computer-C.
• Check the computer name settings for each PC and make adjustments as necessary. For
each Computer/PC, select Start and Control Panel.
• Double-click the System icon, and then click the Computer Name tab.
• Write the name of the computers as Computer-A, Computer-B, Computer-C on respective
machines

Fig 1.3: System Properties Window

• Click OK to close the System Properties window.


3. Connect the Ethernet cable
• Use the Ethernet crossover cable provided. Plug one end of the cable into the Ethernet NIC
of Compute-A. Plug the other end of the cable into the Ethernet NIC of Compute-B. Plug the
other end of the cable into the Ethernet NIC of Compute-C.

DCC MANUAL BY BMM 3


4. Verify physical connectivity
• After the Ethernet crossover cable is connected to both PCs, take a close look at each
Ethernet port. A light (usually green or amber) indicates that physical connectivity has been
established between the two NICs. Try unplugging the cable from one PC then reconnecting
it to verify that the light goes off then back on.
• Go to the Control Panel, double click the Network Connections icon, and confirm that the
local area connection is established. The following figure shows an active local area
connection. If physical connectivity problems exist, you will see a red X over the Local Area
Connection icon with the words “Network cable unplugged.”

Fig 1.4: Network Connection Window

5. Configure IP settings
• Configure the logical addresses for the two PCs so that they are able to communicate using
TCP/IP. On one of the PCs, go to the Control Panel, double click the Network Connections
icon, and then right click the connected Local Area Connection icon. Choose Properties from
the pull-down menu.
• Using the scroll bar in the Local Area Connection Properties window, scroll down to
highlight

Internet Protocol (TCP/IP). Click the Properties button.

DCC MANUAL BY BMM 4


Fig.1.5: Local Area Connection Properties Window
• Select the Use the following IP address radio button and enter the following information:

Change the properties of the TCP/IP v4 connection as follows

Fig 1.6: Internet Protocol Properties Window

• Click OK, which will close the Internet Protocol (TCP/IP) Properties window. Click the Close
button to exit the Local Area Connection Properties window.
• Repeat steps 5 for the second PC using the following information:

DCC MANUAL BY BMM 5


Step 6: Verify IP connectivity between the all PCs

NOTE: To test TCP/IP connectivity between the PCs, Windows Firewall must be disabled
temporarily on all PCs.
• On Computer-A, on the Windows desktop, click Start. From the Start menu, select Control
Panel, and double-click Network Connections.
• Right-click the Local Area Connection icon and select Properties. Click the Advanced tab.
Locate and click the Settings button.
• The ping command is a simple way to accomplish this task. The ping command is included
with the Windows operating system.
• On Computer-A, go to Start, then Run. Type cmd, and then click OK. A Windows
command prompt window will appear as shown in the figure below.

Fig. 1.7: Execution of Ping command at command prompt

• At the > prompt, type ping 192. 168.1.2 and press Enter. A successful ping will verify the IP
connectivity. It should produce results similar to those shown
• Repeat Steps 6 on Computer-B. The second PC will ping 192. 168.1.1
• Repeat Steps 6 on Computer-C. The second PC will ping 192. 168.1.3
• Close the Windows command prompt window on both PCs. Step 7: Verify connectivity
using My Network Places

DCC MANUAL BY BMM 6


• A PC can share its resources with other PCs on the network. PCs with shared resources
should be visible through My Network Places. On PC1, go to Start, click My Network Places,
and then click View workgroup computers in the left panel. Close any open window.
• Share file between connected computers and confirm the data transfer.

XII Resources used

Sr. Instrument /Components Specification Quantity


No.

1 Personal computers Standard computers 3


64 bit with NIC card

2 Connecting Cables and connectors UTP CAT5 Cable 6


(crossover cable) with
RJ-45 connectors

XIII Actual procedure followed

XIV Precautions followed (use blank sheet provided if space not sufficient)

XV Observations (use blank sheet provided if space not sufficient):


Make the following observations after step 7

DCC MANUAL BY BMM 7


a. Check the icon for the other PC in given peer-to-peer network.
b. Is it the same name of computer you recorded in Step 2?
c. Perform Step 7 on the second PC and third PC.

XVI Result
1. The packets/file sent by………………….. are received by the Computer-B
2. Folders can be shared from Computer-B to ……………………………………..

XVII Conclusions and Recommendations (Actions/decisions to be taken based on the


interpretation of results)

XIX Practical Related Questions


Note: Below given are few sample questions for reference. Teacher must design more such
questions so as to ensure the achievement of identified CO.
State the actual IP settings of computers used in the lab.
1. State the steps to add one more computer to the peer to peer network formed
2. State the advantages of the peer to peer model in comparison to the client server model.
3. Name type of networks shown in fig 1.8 and fig 1.9 following diagram

Fig 1.8 Fig 1.9

[Space for Answers]

DCC MANUAL BY BMM 8


Practical No. 2: To Create Desired standard network cable including cross
cable and test by using cable tester .
I. Practical Significance:
Transmission media is a medium over which information travels from the sender to receiver.
Different media have different properties and used in different environments for different
purpose. The purpose of physical layer is to transport a raw bit stream from one computer to
other. Ethernet cables can be wired as straight through or crossover. The straight through is the
most common type and is used to connect computers to hubs or switches. Patch cords are the
short lengths of modular, plugended cable that connect personal computers to wall outlets and
cross-connects to hubs.

The practical will enable students to prepare patch chords (Straight and crossover).

II. Relevant Program Outcome (PO)


PO2 – Discipline knowledge
PO3 – Experiments and practice
PO4 – Engineering tools
PO8 – Individual and team work

III. Competency and Practical Skills :


The aim of this course is to help the student to attain the following industry identified
competency through various teaching learning experiences:
Maintain computer network systems.
Able to prepare patch chords useful for computer networking Establish network connectivity
and troubleshoot fault in computer networking.
IV. Relevant Course Outcomes :

• Select relevant transmission media and switching techniques as per need.

V. Practical Outcomes :
• Configure peer to peer networks with at least three hosts.

VI. Relevant Affective Domain related Outcomes:


• Follow safety practices.
• Handle network components carefully.
• Demonstrate as a team leader/a team member.

DCC MANUAL BY BMM 9


• Follow ethical practices.

VII. Minimum Theoretical Background :


Cables and Connectors:

• Cable is one way of transmission media which can transmit communication signals
and data. The wired network typology uses special type of cable to connect computers
on a network. There are several types of cables as below:

✓ Unshielded Twisted Pair (UTP) Cable


✓ Shielded Twisted Pair (STP) Cable
✓ Coaxial Cable
✓ Fiber Optic Cable
• Shielded Twisted Pair Cable (STP) Shielded twisted pair cable has a metal foil or
braided-mesh covering that encases each pair of insulated conductors. The metal casing
prevents the penetration of electromagnetic noise.

a) Block Diagram

Fig 2.1 RJ Connector and cable

Fig 2.2 Crimping Tool

• LAN Tester:
Testers helps / assist in the installation and control of networks. LAN testers can determine IP
addresses; identify polarity, connected port and link connectivity. Even they can test fiber optic cables.
They also show cable break points, incorrect connections in fiber optic lines.

DCC MANUAL BY BMM 10


Fig. 2.3: LAN / Network cable Tester
• Network Cable / LAN Tester for RJ-12, RJ-11, RJ-45, Cat 5e, Cat 5, Cat 6, 10/100 Base-T, AT&T
258 A, TIA-568A/568B etc.
• Test correspondingly double-twisted cables 1, 2, 3, 4, 5, 6, 7, 8 and Ground.
• 9 LED lights to indicated wiring connection on both remote and master unit Grounding Test.
• Easy read LED display which indicates problems. Power: 9V battery (Battery not Included)
• Keep network running smoothly by testing wrong connection, short circuit and open circuit
• Suitable for network cable with RJ-45 connector and ADSL cable with RJ-11 connect
• Suitable for cat-5 and cat5e cable with 8p8c, 6p6c and 4p4c plugs
• For network installations up to 100 mbps 10base-t Ethernet and token ring
• Battery included

• Essential Components for Computer Networking:


i. Network Interface Card (NIC)
ii. Hub
iii. Switches
iv. Cables and connectors
v. Crimping Tool
vi. LAN tester
vii. Router
viii. Modem
ix. Bridge

Use straight through Ethernet cable for the following cabling:


• Switch to router
• Switch to PC or server
• Hub to PC or server

Use crossover cables for the following cabling:


• Switch to switch
• Switch to hub
• Hub to hub
DCC MANUAL BY BMM 11
• Router to router
• Router Ethernet port to PC NIC
• PC to PC

VIII a) Ethernet Cable Color Coding Diagram for Straight and Crossover cables:

Fig.2.4: T568A or T568B Wiring Standard (RJ-45 Specification)

Fig. 2.5: Identification mark printed on CAT-5E cable

Some of CAT cables are:


• Category-5 cables
• Category-5E cables
• Category-6 cables
• Category-6E cables

Ethernet Cable Tips:


Straight-through cable has both ends identical.
• A crossover cable has different ends.
• A straight-through cable is used as a patch cord in Ethernet connections.
• A crossover is used to connect two Ethernet devices without a hub or for connecting two hubs.
Crossover cable has both ends different: has one end with the Orange set of wires switched
with the Green set. Odd numbered pins are always striped, even numbered pins are always solid
colored.

DCC MANUAL BY BMM 12


• Looking at the RJ-45 with the clip facing away from student, Brown is always on the right,
and pin 1 is on the left.

Fig.2.6: Components of Cables

Fig. 2.7 : Crimped CAT-5 Cable with RJ-45 connectors

• Student shall draw straight and cross-over cables wires sequence with coloured sketch-pens or Pencils
shown in Fig 2.7

DCC MANUAL BY BMM 13


IX Resources required

X Precautions to be Followed
• Select proper specification of cables and connectors as per networking parameters need.
• Use a good quality crimping tool along with quality connectors.
• Arrange colour codes properly straightened neatly, fully pressed to connect to connectors for
correct connection (properly crimped) to avoid error n trouble in establishing connection.
There's a reason you need eye-protection: when cutting the copper wires, they can go flying
and potentially get your eye! Be smart, be safe!

DCC MANUAL BY BMM 14


• No more than 1/2″ of the Ethernet cable should be untwisted otherwise it will be susceptible
to crosstalk.
• Do not deform, do not bend, do not stretch, do not staple, do not run parallel with power
cables, and do not run Ethernet cables near noise inducing components.

XI Procedure
For Straight Cable:
1. Inspect available cable segment as per Straight cable sequence shown in Fig.2.4
2. Strip one end of Cable using cable stripper
3. Arrange the sequence of wires as given in Fig. 2.4 for Straight Cable
4. Push the Wires carefully in the RJ-Connector, Take precaution these shall not be bend
5. Align the connector with crimping tool proper and Crimp/Press the Connector with wire.
6. Follow this for other end as per cable type.
7. Test the cable using LAN tester.
8. Patch chord is ready

For Cross-over Cable:


1. Inspect available cable segment as per Cross-over cable sequence shown in Fig.2.4
2. Strip one end of Cable using cable stripper
3. Arrange the sequence of wires as given in Fig. 2.4 for Straight Cable
4. Push the Wires carefully in the RJ-Connector, Take precaution these shall not be bend
5. Align the connector with crimping tool proper and Crimp/Press the Connector with wire.
6. Follow this for other end as per cable type.

7. Test the cable using LAN tester.


8. Patch chord is ready

XII Resources used

DCC MANUAL BY BMM 15


XIII Actual procedure followed
Student shall write procedure:
For preparing straight cable:

For Cross-over cable: (At a Glance)

XIV Precautions followed (use blank sheet provided if space not sufficient)

XV Observations (use blank sheet provided if space not sufficient):


Features Availability in lab

Personal Computer

Switch/Hub

CISCO Packet Tracer (OPTIONAL)

Network Cable Tester

DCC MANUAL BY BMM 16


XVI Results
1. CAT stands for……………..
2. Cable consists of ………… (RJ-45/RJ-11 / Both of these) connector as part of patch chord.
3. Computer Laboratory / Internet Café is example of ………… (LAN/MAN/WAN).
4. Network inside the University is …………..type of network. (LAN/MAN/WAN).
5. Hub to hub and Router to router connection is made by ………….(Crossover/Straight Cable)

XVII Conclusions and Recommendations (Actions/decisions to be taken based on the interpretation


of results)

XVIII Practical Related Questions


Note: Below given are few sample questions for reference. Teacher must design more such
questions so as to ensure the achievement of identified CO.
1. The most popular type of twisted-pair cable is …….. (UTP/ STP).
2. UTP cable for data transmissions up to 100 Mbps is category ………… (5/3).
3. Telephone wire uses a………… (RJ-45/ RJ-11) connector.
4. ……………. (HUB/ Switch) is a device that splits a network connection into multiple computers.
5. ………… (RJ-45/ RJ-11) connectors are used for computer networking.

6. Enlist the network components in your lab and give use of four).
7. Name type of cable is used in networking of laboratory?
8. State the type of topology used in laboratory?...................….

[Space for Answers]

DCC MANUAL BY BMM 17


DCC MANUAL BY BMM 18
Practical No. 3: To connect computers using given topology with wired
media.
I. Practical Significance:
Network topology is the physical layout in which computers of a small area are connected to
each other. There are two types of topologies – Physical and Logical topology. Physical
topology refers to the positioning of the various network components and cable installation.
Logical topology shows how the data flows within a network. There are different types of
topologies like Bus, Star, Ring, Mesh, Tree and Hybrid to connect computers with each other.
In this practical, the student will be able to connect computer in star topology and test its
performance.

II. Relevant Program Outcome (PO)


PO2 – Discipline knowledge
PO3 – Experiments and practice
PO8 – Individual and team work

III. Competency and Practical Skills :


This practical is expected to develop the following skills for the industry identified competency:
Maintain computer network systems
Connecting computers in Star topology
Preparing CAT 6 cable patch cord of given length with RJ 45 connector on both sides

IV. Relevant Course Outcomes :


Analyze the transmission errors with respect to IEEE standards.

V. Practical Outcomes :
Configure peer to peer networks with at least three hosts .

VI. Relevant Affective Domain related Outcomes :


• Follow safety practices.
• Handle network components carefully.
• Follow ethical practices.

VII. Minimum Theoretical Background :


In star topology, every node (computer, workstation or any other peripheral) is connected to
the central node or a device called Hub or Switch. All the data on the star topology passes
through the central device before reaching the intended destination. A hub forwards data
DCC MANUAL BY BMM 19
packets to all the ports . A switch is intelligent. It recognizes which computer is connected to
which port based on the MAC address and saves this information in a table format. When a
switch receives the data packet, it determines the recipient and forwards the packet to the
correct computer. An advantage of the star topology is the simplicity of adding additional
nodes. The main disadvantage of star topology is that the central device represents a single
point of failure.

Fig 3.1: Star Topology

Packet Tracer Packet Tracer is a powerful network simulator that can be utilized to create
networks with an almost unlimited number of devices and to experience troubleshooting
without having to buy real Cisco routers or switches. The tool is created by Cisco Systems. The
purpose of Packet Tracer is to provide a tool to learn the principles of networking. Packet tracer
allows us to create network by just dragging and dropping devices and connection to specific
port of the devices so that necessary configuration shall be performed on each device and test
as per the requirement. Group of computers are connected to switch and are assigned IP
addresses of same network in which each computer in the network are directly reachable.
Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco
Systems. Packet Tracer (PT) is a powerful and dynamic tool that displays the various protocols
used in networking, in either Real Time or Simulation mode. This includes layer 2 protocols
such as Ethernet and PPP, layer 3 protocols such as IP, ICMP, and ARP, and layer 4 protocols
such as TCP and UDP. Routing protocols can also be traced.

DCC MANUAL BY BMM 20


VIII a) Block Diagram

Fig 3.2: Typical topology network

Fig 3.3 Star Topology physical connections

(b) Actual Network used in laboratory

DCC MANUAL BY BMM 21


IX Resources required

X Precautions to be Followed
• Handle computers with care.
• Use the network tools with care

XI Procedure
Physical formation of Star Topology
1. Power ON the computers that are to be connected in Star topology and confirm whether
operating system is installed and NIC card is connected
2. Consider a central device such as a switch or hub for the above connection.
3. Take Ethernet cables and connect one end of the cable to port of the switch or hub and
connect to computer's NIC port.
4. The lights of the switch or hub and computer's NIC port should turn on.
5. This is the physical formation of star topology.

To check the performance:


1. Check workgroup of computer under which all computers are connected to each other.
2. Assign IP Address to computer using TCP/IP configuration.
3. The computers should be connected to switch or Hub must come under same workgroup.
4. IP address of each computer must be unique.
5. Use ping command to check whether computers are connected in network.
6. Once whole network is formed, then go to network and check whether all computers are
connected in network or not.

XII Resources used

DCC MANUAL BY BMM 22


XIII Actual procedure followed

XIV Precautions followed (use blank sheet provided if space not sufficient)

XV Observations (use blank sheet provided if space not sufficient):


Name of Computer

MAC address

IP Address

Port number of switch/ hub where one


end of the computer’s NIC port is
connected

Total number of computers connected


in Star topology

DCC MANUAL BY BMM 23


XVI Results
The number of Patch Cables required to connect 4 computers in Star topology is ………
The arrangement of components in above network topology is done in (physical/ Logical) …………..

XVII Conclusions and Recommendations (Actions/decisions to be taken based on the


interpretation of results)

XIX Practical Related Questions


Note: Below given are few sample questions for reference. Teacher must design more such
questions so as to ensure the achievement of identified CO.
1. Give the method to check whether the physical formation of star topology is completed or
not?
2. State the difference between Hub and Switch
3. State the number of ports in the switch/ Hub that is used in the lab
[Space for Answers]

DCC MANUAL BY BMM 24


DCC MANUAL BY BMM 25
Practical No. 4: To connect computers using wireless media.
I Practical significance:

Wireless communication is the transfer of information or power between two or more points
that are not connected by an electrical conductor. The most common wireless technologies
use radio waves. With radio waves distances can be short, such as a few meters for Bluetooth or
as far as millions of kilometers for deep-space radio communications.

II Relevant Program Outcome (PO)

PO1 – Basic knowledge


PO2 – Discipline knowledge
PO3 – Life Long Learning

III Competency and Practical Skills:

1. The aim of this course is to help the student to attain the following identified competency through
various teaching learning experiences:
• Maintain data communication and computer network.
IV Relevant Course Outcomes:

• Analyze the functioning of data communication and computer network


• Select relevant transmission media and switching techniques as per need.
V Practical Outcomes:

• To connect computers using wireless media.


VI Relevant Affective Domain Related Outcomes:

a. Follow safety practices.


b. Demonstrate as a team leader/a team member.
c. Follow ethical practices.
VII Minimum Theoretical Background:

Before you can set up your wireless network, here’s what you’ll need:

Broadband Internet connection and modem. A broadband Internet connection is a high-speed


Internet connection. Digital Subscriber Line (DSL) and cable are two of the most common broadband
connections. You can get a broadband connection by contacting an Internet service provider (ISP).
Typically, ISPs that provide DSL are telephone companies and ISPs that provide cable are cable TV
companies. ISPs frequently offer broadband modems. Some ISPs also offer combination
modem/wireless routers. You can also find these at computer or electronics stores, and online.

Wireless router. A router sends info between your network and the Internet. With a wireless router,
you can connect PCs to your network using radio signals instead of wires. There are several different
DCC MANUAL BY BMM 26
kinds of wireless network technologies, which include 802.11a, 802.11b, 802.11g, 802.11n, and
802.11ac.

Wireless network adapter. A wireless network adapter is a device that connects your PC to a wireless
network. To connect your portable or desktop PC to your wireless network, the PC must have a
wireless network adapter. Most laptops and tablets—and some desktop PCs—come with a wireless
network adapter already installed.

VIII Block Diagram

Fig: 4.1 Setup a new wireless connection

Fig: 4.2 Manual Connection for Wireless Network


DCC MANUAL BY BMM 27
IX Resources Required:

S. No. Name of Specifications Qty


Resource/material

1 Personal Computer Standard computer with wireless adapter 3

2 Wireless media Router 1

X Precautions to be Followed
• Make sure the computer has wireless adapter
• Make the connections with care
• Handle equipment with care
• Setup security key for your network

XI Procedure:

To check whether your PC has a wireless network adapter:

1. Select the Start button, type device manager in the search box, and then select Device
Manager.
2. Expand Network adapters.
3. Look for a network adapter that might have wireless in the name.

Setting up the modem and Internet connection

After you have all the equipment, you'll need to set up your modem and Internet connection. If your
modem wasn't set up for you by your Internet service provider (ISP), follow the instructions that
came with your modem to connect it to your PC and the Internet. If you're using Digital Subscriber
Line (DSL), connect your modem to a phone jack. If you’re using cable, connect your modem to a
cable jack.

Positioning the wireless router

Put your wireless router somewhere where it will receive the strongest signal with the least amount
of interference. For better results, follow these tips:

Place your wireless router in a central location. Place the router as close to the center of your
home as possible to increase the strength of the wireless signal throughout your home.

Position the wireless router off the floor and away from walls and metal objects, such as metal
file cabinets. The fewer physical obstructions between your PC and the router's signal, the more
likely that you'll be using the router's full signal strength.

DCC MANUAL BY BMM 28


Reduce interference. Some networking equipment uses a 2.4 gigahertz (GHz) radio frequency. This
is the same frequency as most microwaves and many cordless phones. If you turn on the microwave

or get a call on a cordless phone, your wireless signal might be temporarily interrupted. You can
avoid most of these issues by using a cordless phone with a higher frequency, such as 5.8 GHz.

Securing your wireless network

Security is always important; with a wireless network, it's even more important because your network's
signal could be broadcast outside your home. If you don't help secure your network, people with PCs
nearby could access info stored on your network PCs and use your Internet connection.

To help make your network more secure:

Change the default user name and password. This helps protect your router. Most router
manufacturers have a default user name and password on the router and a default network name
(also known as the SSID). Someone could use this info to access your router without you knowing it.
To help avoid that, change the default user name and password for your router. See the documentation
for your device for instructions.

Set up a security key (password) for your network. Wireless networks have a network security key
to help protect them from unauthorized access. We recommend using Wi-Fi Protected Access 2
(WPA2) security if your router supports it. See the documentation for your router for more detailed
info, including what type of security is supported and how to set it up.

Some routers support Wi-Fi Protected Setup (WPS). If your router supports WPS and it’s connected
to the network, follow these steps to set up a network security key:

1. Do one of the following, depending on which version of Windows is running on your PC:
▪ In Windows 7 or Windows 8.1, select Start, start typing Network and Sharing
Center, and then choose it in the list.
▪ In Windows 10, select Start , then select Settings > Network &
Internet > Status > Network and Sharing Center.
2. Select Set up a new connection or network.
3. Select Set up a new network, then choose Next.
4. The wizard will walk you through creating a network name and a security key. If your router
supports it, the wizard will default to Wi-Fi Protected Access (WPA or WPA2) security. We
recommend that you use WPA2, because it offers better security than WPA or Wired
Equivalent Privacy (WEP) security. With WPA2 or WPA you can also use a passphrase, so
you don’t have to remember a cryptic sequence of letters and numbers.
5. Write down your security key and keep it in a safe place. You can also save your security
key on a USB flash drive by following the instructions in the wizard. (Saving your security key
to a USB flash drive is available in Windows 8 and Windows 7, but not in Windows 10.)
6. Use a firewall. A firewall is hardware or software that can help protect your PC
from unauthorized users or malicious software (malware). Running a firewall on each PC on
your network can help control the spread of malicious software on your network, and help
protect your PCs when you're accessing the Internet. Windows Firewall is included with this
version of Windows.

DCC MANUAL BY BMM 29


7. Connect a PC to your wireless network
8. Select the Network or icon in the notification area.
9. In the list of networks, choose the network that you want to connect to, and then
select Connect.
10. Type the security key (often called the password).
11. Follow additional instructions if there are any.

XII Resources Used:

S. No. Name of Specifications Qty


Resource/material

1 Personal Computer Standard computer with wireless adapter 3

2 Wireless media Router 1

XIII Actual procedure followed

XIV Precautions followed (use blank sheet provided if space not sufficient)

XV Observations (use blank sheet provided if space not sufficient):

DCC MANUAL BY BMM 30


XVI Result

XVII Conclusions and Recommendations (Actions/decisions to be taken based on the


interpretation of results)

XIX Practical Related Questions


Note: Below given are few sample questions for reference. Teacher must design more such
questions so as to ensure the achievement of identified CO.

1. Write steps to change wireless network connection priority in windows 10


2. What is Wireless Communication concept?
3. What are the different types of Transmission impairments?

DCC MANUAL BY BMM 31


DCC MANUAL BY BMM 32
Practical No. 5: Write a C Program for CRC Error Detection
IX. Practical Significance:
Error is a condition when the receiver’s information does not match with the sender’s
information. During transmission, digital signals suffer from noise that can introduce errors in
the binary bits travelling from sender to receiver. That means a 0 bit may change to 1 or a 1 bit
may change to 0. To avoid this, error-detecting codes are used which are additional data added
to a given digital message to detect any error that has occurred during transmission of the
message. The student will be able to detect errors in a given data stream.

II. Relevant Program Outcome (PO)

PO2 – Discipline knowledge


PO3 – Experiment & Practice
PO8 – Individual and team work

III. Competency and Practical Skills :

The aim of this course is to help the student to attain the following industry identified
competency through various teaching learning experiences:

Maintain computer network systems.

IV. Relevant Course Outcomes :

Analyze error detection/correction and flow control of data in the data network.
V. Practical Outcomes :

Locate the error bit in the given data stream by applying the different error detection methods.
VI. Relevant Affective Domain related Outcomes:

a. Demonstrate working as a leader/a team member.


b. Follow ethical practices.

VII. Theoretical Background:


Whenever a message is transmitted, it may get scrambled by noise and the data may get
corrupted. Basic approach used for error detection is the use of redundancy bits, where
additional bits are added to facilitate detection of errors.
Some of the techniques for error detection are:
1. Parity check
2. Two-dimensional Parity check
3. Checksum
4. Cyclic redundancy check

DCC MANUAL BY BMM 33


Parity check
A parity bit or a check bit is added to blocks of data from the source. A parity bit of: • 1 is
added to the block if it contains odd number of 1’s, and • 0 is added if it contains even number
of 1’s This scheme makes the total number of 1’s even, that is why it is called even parity
checking.
Two-dimensional Parity Check
Parity check bits are calculated for each row, which is equivalent to a simple parity check bit.
Parity check bits are also calculated for all columns, and then both are sent along with the data.
At the receiving end these are compared with the parity bits calculated on the received data.

Checksum
In checksum error detection scheme, the data is divided into k segments each of m bits. In the
sender’s end the segments are added using 1’s complement arithmetic to get the sum. The sum
is complemented to get the checksum. The checksum segment is sent along with the data
segments. At the receiver’s end, all received segments are added using 1’s complement
arithmetic to get the sum. The sum is complemented. If the result is zero, the received data is
accepted; otherwise the received data is discarded.

Cyclic redundancy check (CRC)


CRC is based on binary division. In CRC, a sequence of redundant bits, called cyclic
redundancy check bits, are appended to the end of data unit so that the resulting data unit
becomes exactly divisible by a second, predetermined binary number. At the destination, the
incoming data unit is divided by the same number. If at this step there is no remainder, the data
unit is assumed to be correct and is therefore accepted. A remainder indicates that the data unit
has been damaged in transit and therefore must be rejected.

VIII. Block Diagram

Fig. 5.1 Single Bit parity Check (Even Parity)

DCC MANUAL BY BMM 34


Fig 5.2 Two Dimensional Parity Check

Fig. 5.3 Checksum

DCC MANUAL BY BMM 35


Fig. 5.4 Cyclic Redundancy Code

1. Sample Code for Cyclic Redundancy Code

#include <stdio.h>
#include<conio.h>
void main()
{int i,f[20,n[50],divi[50],j,temp,quotient[20],z[10];
clrscr();
printf("enter the number\n")
for(i=0;i<8;i++)
{
scanf("%d",&n[i]);
}
printf("enter the divisor\n");
for(i=0;i<4;i++)
{
scanf("%d",&div[i]);
}
for(i=8;i<12;i++)
{
n[i]=0;
}
for(i=8;i,12;i++)
{
n[i]=0;
}

DCC MANUAL BY BMM 36


for(i=0;<8;i++)
{
temp=i;
if(n[i]==1)
{
for (j=0;j<4;j++)
{
if (n[temp]==div[j])
{n[temp]=0
f[j]=0;}
else
{n[temp]=1;
f[j]=1;}
temp=temp=1;

}
quotient[i]=1;
}
else
quotient[i]=0;
}
printf("\nthe quotient is \n");
for(i=0;i<8;i++)
printf("%d",quotient[i]);

Printf("\n and the remainder is \n ");

for(j=0;j<4;j++)
printf("%d",f[j]);

getch()
}

DCC MANUAL BY BMM 37


DCC MANUAL BY BMM 38
Output :-

DCC MANUAL BY BMM 39


IX. Resources Required

Sr. Instrument /Components Specification Quantity


No.

1 Personal computers Standard specification 1


connected in LAN

2 Turbo C/ Any simulation tool Free downloadable 1


available in the lab

X. Precautions:

• Selection of any drive for installation must be done carefully so as not to delete any useful data
or partition,
XI. Procedure:

Steps to Install Windows Operating System :


1. Open the “C” software.
2. Create New file in “C”
3. Type the program code in command window.
4. Save the file with .C extension.
5. Compile the program code using Alt+C or Alt+F9 command and remove the errors if any.
6. Run the program codes using Alt+R or Ctrl+F9.
7. Enter the valid input.
8. Observe the output
9. After completion of practical shut down the PC and switch off the supply

Note: The sample code is given in C programming. The teacher may conduct this experiment
in any other simulation tool.

XII. Resources used:

S. No. Name of Resource/material Specifications Qty

1 Personal computers Standard computers 5

2 Complier Turbo C 1

XIII. Actual procedure followed

1. Installed “Turbo C” software in PC


2. Open the “C” software.
3. Create New file in “C”

DCC MANUAL BY BMM 40


4. Type the program code for error detection in command window.
5. Save the file with .C extension.
6. Compile the program code using Alt+C or Alt+F9 command and remove the errors if any.
7. Run the program codes using Alt+R or Ctrl+F9.
8. Enter the valid input.
9. Observe the output
10. After completion of practical shut down the PC and switch off the supply

XIV Practical Related Questions

Note: Below given are few sample questions for reference. Teacher must design more such questions
so as to ensure the achievement of identified CO.

1. For the bit sequence 101000 and the generator polynomial used is x3 +1, determine the
data transmitted.

2. Consider the bit sequence 1101110, determine the parity bit for Odd Parity and for even
Parity

3. For the bit sequence 110101, 101010, 100100, 111100, determine the checksum.

DCC MANUAL BY BMM 41


Practical No. 6: Create a network using Bluetooth (Piconet/ Scatternet)
I. Practical Significance:

Bluetooth is a wireless technology standard for exchanging data over short distances using short-
wavelength UHF radio waves in the ISM band from 2.400 to 2.485 GHz from fixed and mobile
devices, and building personal area networks (PANs). It was originally conceived as a wireless
alternative to RS-232 data cables. One thing keeps skipping people's attention is Bluetooth. Before
portable hotspot and Wi-Fi tethering was a thing, which is shared in phone internet using Personal
Area Networks, also called Bluetooth Tethering. This experiment will help the students to setup
Personal Area Network, Bluetooth.

II. Relevant Program Outcome (PO)

PO2 – Discipline knowledge


PO3 – Experiments and practice
PO4 – Engineering tools
PO8 – Individual and team work

III. Competency and Practical Skills :

This practical is expected to develop the following skills for the industry identifiedcompetency
Maintain mobile communication systems.

• Use Bluetooth device to create a small network.


• Identify the various settings require for creating a network.

IV. Relevant Course Outcomes :

Configure various networking devices.

V. Practical Outcomes :
Build a Personal Area Network of mobile devices using Bluetooth.

VI. Relevant Affective Domain related Outcomes :


• Demonstrate working as a leader/a team member.
• Maintain tools and equipment.
• Follow ethical practices.

VII. Minimum Theoretical Background :

A personal area network (PAN) is a computer network for interconnecting devices centered
on an individual person's workspace. A PAN provides data transmission amongst devices
such as computers, smartphones, tablets and personal digital assistants. PANs can be
used for communication amongst the personal devices themselves, or for connecting to
a higher level network and the Internet where one master device takes up the role as
gateway. A PAN may be wireless or carried over wired interfaces such as USB.
A wireless personal area network (WPAN) is a PAN carried over a low-powered,

DCC MANUAL BY BMM 42


short-distance wireless network technology such as IrDA, Wireless USB, Bluetooth or
ZigBee. The reach of a WPAN varies from a few centimeters to a few meters. Today,
smartphone penetration is higher than it's ever been. These devices now offera lot of
functionality, border-line phasing out certain gadgets altogether. For instance, a phone
now stream music, meaning MP3 players and iPods no longer have a place. More
relevant to today's topic, Cellular dongles, popularly referred to as modems are
quickly becoming a thing of the past.
The main challenge of Bluetooth tethering , like with USB tethering, is that it only
supports one device at a time. That is the device that' s connected to the Android via
Bluetooth. But if needed more users to share phone's internet, then it can enable the
wireless hotspot as well. It turns Android supports USB tethering and wireless Hotspot
to run at the same time. This might put a huge strain battery and data on phone.

PICONET:
Bluetooth is a WPAn (Wireless Personal Area Network) open standard that provides an
adhoc way of connecting devices in the 10m range.

SCATTERNET:
Eight devices can be considered in a Bluetooth network called Piconet. One of them acts as
a master and other acts a slaves.

VIII Setup Diagram (Refer Figure 27.1 for Setup Diagram)

Figure 6.1 Personal Area Network using Bluetooth technology

DCC MANUAL BY BMM 43


IX Resources required

Sr. Instrument/ Component Specification Quantity


No
1 Mobile phone with Bluetooth Any basic phone having 02
device Bluetooth device

X Precautions to be Followed
• Check the battery status before connecting..
• Enter correct password for pairing
• Disconnect the connection after usage.

XI Procedure
(Note: This procedure may vary phone to phone)
(On the phone from where a person wants to transfer a file)
1. Go to Settings
2. Go to More
3. Select Tethering & Portable hotspot option
4. Select Bluetooth Tethering.
5. Wait for the receiver to connect to network.
6. The file will automatically transfer to another phone.

Figure 6.2: Screenshot of settings in a smart


phone
(On Receivers Phone)
• Go to Settings
• Go to More
• Turn on the Bluetooth
• Select the transmitters MAC(Physical address / Name)
• Insert correct password
• Wait for connection to be complete

DCC MANUAL BY BMM 44


XII Resources used

Sr. No Instrument/ Component Specification Quantity

1 Mobile phone with Bluetooth Any basic phone having 02


device Bluetooth device

XIII Actual procedure followed

XIV Observations (use blank sheet provided if space not sufficient):

XV Precautions followed (use blank sheet provided if space not sufficient)

DCC MANUAL BY BMM 45


XVI Results (Remedies for creating proper Bluetooth connection)

XVII Conclusions and Recommendations (Actions/decisions to be taken based on the interpretation


of results)

XVIII Practical Related Questions


Note: Below given are few sample questions for reference. Teacher must design more such
questions so as to ensure the achievement of identified CO.
1. State the frequency of Bluetooth technology.
2. What devices can be connected with the help of Bluetooth?
[Space for Answers]

DCC MANUAL BY BMM 46


Practical No. 7: Share Printer and Folder in a network and transfer a file from one
computer to another.

I. Practical Significance :
In computing, a shared resource, or network share, is a computer resource made available
from one host to other hosts on a computer network. It is a device or piece of information on a
computer that can be remotely accessed from another computer, typically via a local area
network or an enterprise intranet, transparently as if it were a resource in the local machine.
Network sharing is made possible by inter-process communication over the network. The
term file sharing traditionally means shared file access, especially in the context of operating
systems and LAN and Intranet services, for example in Microsoft Windows documentation.
II. Relevant Program Outcome (PO)

PO2 – Discipline knowledge


PO3 – Experiments and practice
PO10 – Life long learning

III. Competency and Practical Skills:

The aim of this course is to help the student to attain the following identified competency
through various teaching learning experiences:
• Maintain data communication and computer network.

IV. Relevant Course Outcomes:

a. Analyze the functioning of data communication and computer network.


b. Select relevant transmission media and switching techniques as per need.
c. Configure different TCP/IP services.

V. Practical Outcomes :

• Share Printer and folder in a network and transfer a file from one computer to another.

VI. Relevant Affective Domain related Outcomes:

a. Follow safety practices.


b. Handle network components carefully.
c. Demonstrate working as a leader/team member.
d. Follow ethical practices.

DCC MANUAL BY BMM 47


VII. Minimum Theoretical Background:

Printer sharing is the process of allowing multiple computers and devices connected to the
same network to access one or more printers. Each node or device on the network can print to
any shared printer and, to some extent, make changes to the printer settings, depending on the
permissions set by the administrator for each user.If a printer is attached to a computer that
supports printer sharing, the computer can share that printer with other computers on the same
network. It does not matter whether the shared printer is old or new, as long as it is properly
installed in one computer it can be shared by that computer. The sharing is facilitated by the
OS, which handles the communication between computers and devices within the network
and the printer itself.

VIII. Printer and folder sharing

Printers are Output devices used to prepare permanent Output devices on paper. Printers can be
divided into two main categories :
Impact Printers : In this hammers or pins strike against a ribbon and paper to print the text. This
mechanism is known as electro-mechanical mechanism.

Fig. 7.1: Types of Printer

Non-Impact Printers : There printers use non-Impact technology such as ink-jet or laser technology.
There printers provide better quality of O/P at higher speed.

DCC MANUAL BY BMM 48


Fig. 7.2: Printer Sharing process

Fig. 7.3: Printer properties window

DCC MANUAL BY BMM 49


Folder sharing - you can easily share data between different users, or access it remotely if you keep
it on other connected devices. Resource sharing - using network-connected peripheral devices like
printers, scanners and copiers, or sharing software between multiple users, saves money.

Fig. 7.4: Folder sharing window

IX. Resources Required :

Sr. Instrument /Components Specification Quantity


No.

1 Personal computers Standard computers with NIC card 5


connected in LAN

2 Printer Any of ink-jet or laser printer 1

3 Printer Driver Software 1

X. Precautions to be followed:

a. Handle components carefully.


b. Follow safety practices .

XI. Procedure :

Verify that the sharing component is installed


To verify that File and Printer Sharing is on your computer (typically installed by default):

DCC MANUAL BY BMM 50


1. Navigate to the Network and Sharing Center.
2. Click Change adapter settings.
3. Right-click the local connection icon and select Properties.
4. In the area below "This connection uses the following items:", look for File and Printer
Sharing for Microsoft Networks.
o If this component is not available:
1. Click Install. Select Service, and then click Add....
2. Select File and Printer Sharing for Microsoft Networks, and then click OK.
3. Click Close. If a dialog window appears telling you to restart your computer, do so.
o If the component is available, make sure it is checked.

Share a folder, drive, or printer


Once File and Printer Sharing is installed, to share a folder or drive:

1. Right-click the folder or drive you want to share.


2. Click Properties. From the Sharing tab, click Advanced Sharing.
3. Click Share this folder.
4. In the appropriate fields, type the name of the share (as it appears to other computers), the
maximum number of simultaneous users, and any comments that should appear beside it.
5. If you would like to grant access to particular groups or individuals, click Permissions to add
the appropriate groups or usernames.
6. If you are using NTFS, check the permissions in the Security tab to ensure that they are
properly set to allow access to the share. Because Security settings override Share
permissions, it is possible for people on the Permissions list to be denied access to the share
because they either are not specified or are denied specifically in the Security list.

FAT32 does not provide the same level of security as NTFS; if you're using FAT32, you will
not see the Security tab.

7. Click OK.
To share a printer:

1. From the Control Panel, open Devices and Printers.


2. Right-click the printer you want to share. Click Printer Properties, and then select
the Sharing tab.
3. Check Share this Printer. Under Share name, select a shared name to identify the printer.
Click OK.
Access a shared folder or printer
To find and access a shared folder or printer:

1. Search for Network, and click to open it.


2. Select Search Active Directory at the top of the window; you may need to first select
the Network tab on the upper left.
3. From the drop-down menu next to "Find:", select either Printers or Shared Folders.

DCC MANUAL BY BMM 51


4. You can now enter search terms in the appropriate fields to modify the search; to start the
search, click Find Now. To search for shared printers and folders that match any criteria,
click Find Now without entering any search terms.
5. You will see a list of shared printers and folders that are available on the network. Double-
click the item to which you want to connect.
If you know the exact name of the computer and the share, or the exact name of the printer, you can
enter it directly:

1. Navigate to a search field. Enter two backslashes, the name of the computer, another
backslash, and then the name of the share or printer. For example, if the name of the
computer is bl-iub-threepio.ads.iu.edu and the name of the share is r2d2, type:

\\bl-iub-threepio.ads.iu.edu\r2d2

2. Click OK.
If you need to repeatedly access a shared folder or network drive, you can map to it. Mapping creates
a persistent link to the share, allowing you to double-click its icon in My Computer whenever you
want access.

XII. Resources used:


Sr. Instrument /Components Specification Quantity
No.

1 Personal computers Standard computers with 64 bit 5


connected in LAN Windows 10

2 Printer with driver Canon LBP 2900B 1

XIII. Actual procedure followed:

XIV. Precautions followed (use blank sheet provided if space not sufficient)

DCC MANUAL BY BMM 52


XV. Observation
1. To share a printer in a network you physically connect the printer to a computer acting as a
………………..

2. Daisy wheel printer comes under …………………… type of printer.

3. ……………… is a collection of related files and subfolders.

4. …………………is a program that helps us to manage our files and folders.

XVI. Results

XV. Exercise
Note: Below given are few sample questions for reference. Teacher must design more such
questions so as to ensure the achievement of identified CO.
1. Give short note on Printer Sharing?
2. What are the various types of printer?
3. Advantages of Computer network sharing.

DCC MANUAL BY BMM 53


DCC MANUAL BY BMM 54
Practical No. 8: Install Operating system (Windows/Linux-RedHat
/Ubuntu)
X. Practical Significance:
An operating system is the most important software that runs on a computer. It manages the
computer's memory and processes, as well as all of its software and hardware. It also allows
you to communicate with the computer without knowing how to speak the computer's
language. Without an operating system, a computer is useless.

II. Relevant Program Outcome (PO)

PO1 – Basic knowledge


PO2 – Discipline knowledge
PO3 – Experiment & Practice

III. Competency and Practical Skills :

Technical skills
IV. Relevant Course Outcomes :

Configure various networking devices.

V. Practical Outcomes :

Installation & partition of an Operating system (Windows/Linux-RedHat /Ubuntu).

VI. Relevant Affective Domain related Outcomes:

1. Follow safety practices.


2. Handle components carefully.
3. Apply Logical thinking.
VII. Theoretical Background:
An Operating System (OS) is an interface between a computer user and computer hardware.
An operating system is a software which performs all the basic tasks like file management,
memory management, process management, handling input and output, and controlling
peripheral devices such as disk drives and printers.
Windows Operating System: Windows is a series of operating systems developed by
Microsoft. Each version of Windows includes a graphical user interface, with a desktop that
allows users to view files and folders in windows. For the past two decades, Windows has
been the most widely used operating system for personal computers PCs.
Linux is an open-source operating system like other operating systems such as
Microsoft Windows, Apple Mac OS, iOS, Google android, etc. An operating system is a

DCC MANUAL BY BMM 55


software that enables the communication between computer hardware and software. It conveys
input to get processed by the processor and brings output to the hardware to display it. This is
the basic function of an operating system. Although it performs many other important tasks,
let's not talk about that. Linux is around us since the mid-90s. It can be used from wristwatches
to supercomputers. It is everywhere in our phones, laptops, PCs, cars and even in refrigerators.
It is very much famous among developers and normal computer users.
Operating systems usually come pre-loaded on any computer you buy. Most people use
the operating system that comes with their computer, but it's possible to upgrade or even change
operating systems. The three most common operating systems for personal computers
are Microsoft Windows, macOS, and Linux.
Modern operating systems use a graphical user interface, or GUI (pronounced gooey).
A GUI lets you use your mouse to click icons, buttons, and menus, and everything is clearly
displayed on the screen using a combination of graphics and text.
Each operating system's GUI has a different look and feel, so if you switch to a different
operating system it may seem unfamiliar at first. However, modern operating systems are
designed to be easy to use, and most of the basic principles are the same.

VIII. Operating System Screens

Fig 8.1:Windows Operating System Fig 8.2: Linux Operating System

IX. Resources Required

S. No. Name of Specifications Qty


Resource/material

3 Personal computers Standard computers with attached hard 10


disk

4 Boot CD/ Any Any Such as Pendrive , HardDisk , CD- 1


bootable media DVD ROM Drive or external memory
drives/USB Flash Drive.

5 Operating System Licensed or others Windows/ 1


Software Linux(RedHat/UBUNTU).

DCC MANUAL BY BMM 56


X. Precautions:

• Selection of any drive for installation must be done carefully so as not to delete any useful data
or partition,
XI. Procedure:

Steps to Install Windows Operating System :


1. Insert the installation disk or flash drive.
2. Restart your computer. ...
3. Wait for the computer's first startup screen to appear. ...
4. Press and hold Del or F2 to enter the BIOS page. ...
5. Locate the "Boot Order" section. ...
6. Select the location from which you want to start your computer.
7. Move your selected location to the top of the list.
8. Save your settings and exit the BIOS. There should be a "Save and Exit" key listed in the BIOS' key
legend; press the key listed there to save your settings and exit the BIOS.
9. Restart your computer. Once your computer begins to start up again, it will select your disk or flash
drive as the boot location, which means that it will begin installing the operating system.
10. Follow the on-screen prompts. Each operating system will have different steps to take when installing
it, so just follow the on-screen directions to complete the installation.

Steps to Install Linux Operating System:


1. Download the Linux distribution of your choice. ...
2. Boot into the Live CD or Live USB. ...
3. Try out the Linux distribution before installing. ...
4. Start the installation process. ...
5. Create a username and password. ...
6. Set up the partition. ...
7. Boot into Linux. ...
8. Check your hardware.
9. Start using Linux. Once your installation is complete and you’ve verified that your hardware is
working, you’re ready to start using Linux. Most distros come with several popular programs installed,
and you can download many more from their respective file repositories.

XII. Resources used:

S. No. Name of Resource/material Specifications Qty

6 Personal computers Standard computers with attached hard disk 5

7 Boot CD/ Any bootable media CD-DVD ROM 1

8 Operating System Software Windows 10 1

DCC MANUAL BY BMM 57


XIII. Actual procedure followed

XIV Precautions followed (use blank sheet provided if space not sufficient)

XV. Observations

Windows:
1. Every drive must be ……………………. Before use.
2. A product key is a ………………………….. used to activate windows.
3. Indian Language supported in Windows installation: …………………….(specify for your
Windows version)
4. Time zone chosen:…………………………………..
5. Keyboard chosen:…………………………..
6. File format chosen:………………………..

Linux:
1. A product key is a ………………………….. used to activate windows.
2. Linux is ………………………. Source operating system.
3. Indian Language supported in Windows installation: …………………….(specify for your
Windows version)
4. Time zone chosen:…………………………………..
5. Keyboard chosen:…………………………..
6. File format chosen:………………………..

DCC MANUAL BY BMM 58


XVI. Results :

XVII Conclusions and Recommendations (Actions/decisions to be taken based on the interpretation


of results)

XVIII. Practical Related Questions:

Windows:
1. Is any partition automatically created during installation? If yes, mention size.
2. Name Formatting options displayed and chosen
3. State information about number and size of partitions created. Mention File system.
4. Name Windows Operating system with its specifications.
Linux:
5. How many partitions were created. Name them. State their size.
6. Name formatting options displayed and chosen.
7. Mention Linux File systems.
8. Name Linux Operating system installed with its specifications.
9. State if product key is compulsory in Linux?
[Space for Answers]

DCC MANUAL BY BMM 59


DCC MANUAL BY BMM 60
Practical No. 9: To Configure File Server
I. Practical Significance :
A file server is a central server instance in a computer network that enables connected clients
to access the servers stored capacities. The term encompasses both the hardware and software needed
to implement such a server. As long as they have received the corresponding authorization, accessing
users can open, read, change and delete files and folders on a file server as well as even upload their
own files to the server.

II. Relevant Program Outcome (PO)

PO2 – Discipline knowledge


PO3 – Experiment & Practice
P10 – Life long learning

III. Competency and Practical Skills:

Administration and configuration skills

IV. Relevant Course Outcomes :

Configure various networking devices.

V. Practical Outcomes :

Installation, configuration and manage the most common roles and features in Windows server
VI. Relevant Affective Domain related Outcomes :

a. Follow safety practices .


b. Handle network components carefully.
c. Demonstrate working as a leader/team member.
d. Follow ethical practices.

VII. Minimum Theoretical Background :

In computing, a file server (or fileserver) is a computer attached to a network that provides a location
for shared disk access, i.e. storage of computer files (such as text, image, sound, video) that can be
accessed by the workstations that are able to reach the computer that shares the access through a
computer network.

1. Storage
Since the crucial function of a file server is storage, technology has been developed to operate
multiple disk drives together as a team, forming a disk array. A disk array typically has cache
DCC MANUAL BY BMM 61
(temporary memory storage that is faster than the magnetic disks), as well as advanced functions like
RAID and storage virtualization.

2. Network-attached storage
Network-attached storage (NAS) is file-level computer data storage connected to a computer network
providing data access to a heterogeneous group of clients. NAS devices specifically are distinguished
from file servers generally in a NAS being a computer appliance – a specialized computer built from
the ground up for serving files – rather than a general purpose computer being used for serving files
(possibly with other functions).
3. Security
File servers generally offer some form of system security to limit access to files to specific users or
groups. In large organizations, this is a task usually delegated to directory services, such as
openLDAP, Novell's eDirectory or Microsoft's Active Directory.

VIII. Resources Required :

Sr. Instrument /Components Specification Quantity


No.

1 Personal computer / Server Standard computer with NIC card 1

2 Connecting Cables and connectors UTP CAT5 Cable (crossover cable) 3


with RJ-45 connectors

3 Boot CD/ Any bootable media Any Such as Pendrive, HardDisk , 1


CD-DVD ROM Drive or external
memory drives/USB Flash Drive.

4 Windows Server Operating System Licensed or others Windows Server 1


OS

IX. Precautions :

a. Handle network components carefully.


b. Follow safety practices .

DCC MANUAL BY BMM 62


X. Procedure :

1 Create the operating system media.

• Create the operating system media, if you do not already have a DVD with Windows Server
2012 R2; however, if you download it, be sure to copy the product key, because you will need it
for the installation.
• Download Windows Server 2012 R2 from Microsoft and save it onto your hard drive.
• Make a backup copy of the .iso file by copying it onto a DVD from the hard disk.

2 Start operating system installation.

• Place the Windows Server 2012 R2 DVD in the CD/DVD drive.


• Power on the machine to boot the operating system from the DVD.
• Watch the screen as the system boots from the Windows Server 2012 R2 DVD. After booting
begins, you will see the display Loading files… followed by the Windows Server 2012 R2 Setup
screen.
• Expand the drop down and review optional preferences; they include the language you can select
for the installation.
• Click Next to display the options, Install now or Repair your computer.
3 Install or Upgrade.

• Observe that with these Windows Setup options, you choose either first time install or repair
an existing operating system.
DCC MANUAL BY BMM 63
• Click Install now to display the product key request.

4 Type OS installation key.

• Take note that if you are using a DVD from a textbook, you may not need a key.
• Type the installation key.
• Click Next so you can choose the operating system version to install.
5 Select the OS version to install.

• Notice that depending on the DVD you are using, you may see a slightly different set of options.
However, regardless of which DVD, Windows Server 2012 R2 Server Cores is the default.
• Select Windows Server 2012 R2 Standard (GUI installation), with the arrow key or mouse.

• Click Next to display the license agreement.

6 Select license terms.

• Review the Microsoft license agreement.


• Click the checkbox next to I accept the license terms.
• Click Next to display options, upgrade or custom install.

7 Configure upgrade or custom install.

• Review the notes for these options because they are very different; upgrade lets you upgrade a
qualified Windows OS. Whereas with custom, you can install the OS on a newly created space.
• Click Custom to manage disk space and display the disk configuration.
• Highlight where you would like to install the operating system; you can use the arrow key, or
mouse.
• Click Next to display Installing Windows screen followed by password Settings.

8 Create password.

• Create Administrator password at Windows Setup Settings prompt..


• Type the password, such as Passworda10.
• Click Finish to display the Sign in screen.

9 Log on to the server.

• Note that this action, display the password prompt, will depend on the installed environment,
real or virtual.
DCC MANUAL BY BMM 64
• Click Ctrl+Alt+Delete to display the password prompt.
• Observe that this is the password you created earlier.
• Type the password for Administrator.
• Click the arrow to display Networks so you can tell setup how to configure network parameters.

10 Configure Network Settings.

• Configure network visibility is needed even if you plan to isolate the server; your intentions
must be know to network settings.
• Click Yes so your computer is visible to other network devices.

11 Verify Installation complete.

• Verify the display of Server Manager indicating the installation is complete.

• Continue to learn more.

• Configuring Network Parameters

• These steps demonstrate how to configure TCP/IP settings, which are needed to verify network
connectivity with another machine, such as Windows 7.

1 Minimize Server Manager.

• Click Minimize to minimize Server Manager, which is displayed when the OS completes
booting.

2 Display menu items.

• Notice that when Server Manager is minimized, you will see the Recycle Bin and Taskbar;
there are also menu items, such as Start, that are visible when the mouse is located at the bottom right.
• Move your mouse along the taskbar to the right and hover it to the right of the time and date;
this action displays a number of icons, and to see their names, such as Search, Start, and Settings move
the mouse straight up. If the icons are not shown, slightly move the mouse in any direction to display
them.
• Click Start to display its contents.

DCC MANUAL BY BMM 65


3 Display Control Panel contents.

• Notice that Start shows a number of icons, such as Control Panel.


• Click Control Panel to display its contents.

4 Display Network and Internet links.

• Notice that items are shown in categories, but you can change how they are displayed.
• Click Network and Internet to display the screen containing their links.

5 Display Network and Sharing links.

• Notice there are two options, but only the first lets you configure the network
adapter.
• Click Network and Sharing Center to display its options.
6 Display Network Connections (Ethernet) Properties.

• Notice there are several options in the left pane, but your main interest is on the adapter settings.
• Click Change adapter settings to display Network Connections.

• Notice that this computer has one NIC.


• Right click Ethernet and click Properties to display its properties.

7 Display TCP/IP Properties.

• Notice there are a number of protocol options for configuring network settings.
• Highlight Internet Protocol Version 4 (TCP/IPv4).
• Click Properties to display TCP/IP Properties.
• Notice that the default TCP/IPv4 configuration for network interface is DHCP client.
• Click Use the following IP address.
• Notice that the boxes are no longer grayed.

8 Configure TCP/IP settings.

• Notice there are a number of textboxes, but to test connectivity, only the IP address and subnet
mask are needed.
• Type 172.16.150.10 in IP address field.
• Change the entry in Subnet mask to 255.255.255.0.
• Click OK.

DCC MANUAL BY BMM 66


• Click Close.
• Click close (X) to close both Network Connections and Network and Sharing Center.

Testing Connectivity and Shutdown


• After the OS is installed and network parameters configured, it is time to test both activities;
an important test is to verify the server can communicate with another machine, such as a Windows 7
client, and the client can communicate with the server; you can do this using the Command Prompt,
and after testing is complete, you can shutdown the server.

1 Verify Connectivity.

• Display Start.
• Click the down arrow to display several Apps.ws
• Scroll right.
• Click the Command Prompt.
• Ping the second machine.
• From the second machine, ping the server.

2 Shutdown server.

• Display Start.
• Click Settings to display its contents.
• Click Power.
• Click Shutdown.

XI. Resources used :

Sr. Instrument /Components Specification Quantity


No.

1 Personal computer / Server Standard computer with NIC card 1

2 Connecting Cables and connectors UTP CAT5 Cable (crossover cable) 3


with RJ-45 connectors

3 Windows Server Operating System Windows Server 2012 R2 1

DCC MANUAL BY BMM 67


XII Actual procedure followed

XIII Precautions followed (use blank sheet provided if space not sufficient)

XIV Observations (use blank sheet provided if space not sufficient):

XV. Results:

DCC MANUAL BY BMM 68


XVI. Exercise:

1. What information is required when TCP/IP is configured on Window Server?


2. Explain what is RAID in Windows Server?
3. To check TCP/IP configurations and IP connectivity, what are the two command line utilities that
can be used?
[Space for Answers]

DCC MANUAL BY BMM 69


DCC MANUAL BY BMM 70
Practical No. 10: Configure Client To file Server and use file services

I. Practical Significance :
File server acts as dedicated system like as network attached storage (NAS) devices. This
dedicated server is commonly implemented in enterprise applications because they offer
fastest data access as well as offer higher storage capacity compare to non dedicated server.
II. Relevant Program Outcome (PO)

PO2 – Discipline knowledge


PO3 – Experiment & Practice
P10 – Life long learning

III. Competency and Practical Skills:

Technical skills

IV. Relevant Course Outcomes :

Configure various networking devices.

V. Practical Outcomes :

Manage the most common roles and features in Windows server and use the file services.

VI. Relevant Affective Domain related Outcomes :

e. Follow safety practices .


f. Handle network components carefully.
g. Demonstrate working as a leader/team member.
h. Follow ethical practices.

VII. Minimum Theoretical Background :

In computer network, file server is a super performing computer system that has responsible for
storing and fetching all types of files (audio file, images, video, database, and other documents), and
these files are used by all client machines which are linked over the network. A file server allows users
to transfer all files over the entire network without using any physical medium of file transfer such as
pen drive, floppy diskette or other external storage media. We can set up any computer as host that
plays role as a file server. In the other word, file server may be a simple computer system that has

DCC MANUAL BY BMM 71


abilities to send and retrieve all requests for files over the computer network.

Fig 10.1 File server

File server acts as dedicated system like as network attached storage (NAS) devices. This
dedicated server is commonly implemented in enterprise applications because they offer fastest data
access as well as offer higher storage capacity compare to non dedicated server.
A network server helps to store all central data files, which are access by other connected network
users. This stored all data on the server eliminates all replication of all files over individual computers,
so it needs less disk storage space them. This server plays major role in the network servers and
other network operating system like as Windows NT, Novell Netware, UNIX, etc.
Today, file servers are more advance with using enlarge power supplies, various racks for
installation of multiple hard disks, and more advance cooling system. It likes
as Multiprocessor machines, and configured along with more memory unit compare to single user
computer system.

VIII. Resources Required :

Sr. Instrument /Components Specification Quantity


No.

1 Personal computer / Server Standard computer with NIC card 1

2 Connecting Cables and connectors UTP CAT5 Cable (crossover cable) 3


with RJ-45 connectors

3 Boot CD/ Any bootable media Any Such as Pendrive, HardDisk , 1


CD-DVD ROM Drive or external
memory drives/USB Flash Drive.

4 Windows Server Operating System Licensed or others Windows Server 1


OS

IX. Precautions :

a. Handle network components carefully.


b. Follow safety practices .

DCC MANUAL BY BMM 72


X. Procedure :

There are different ways to share a folder in Server 2012. Most efficient way is to use the Server
Manager. Here, I will configure some shared folder from domain controller named MBG-DC1.
So, let’s setup some shared folders. To do so, open Server Manager. Click File and Storage
Services on the left pane. Then click Shares from the list. You will see the list of shared folders on
this server. As you can see below there are two folders, netlogon and sysvol shared by default. This
is because the server is AD DC.

We have a scenario. We want to share a folder named Marketing to Marketing users group. We
want only the marketing users to view and execute the contents of the folder. We already have
Marketing users group set up and assigned users into the group. So, let’s create the shared folder. To
create a new shared folder, click Tasks and click New share in Server Manager console.

New share wizard pops up. There are number of share profiles by default. You can choose any of
these share profiles as seen below. I will choose SMB Share – Quick and click Next.

DCC MANUAL BY BMM 73


Now you are asked to provide the share location of the folder that you want to share. I will choose
custom location as C:\Marketing. Then click Next.

Type the share name and description of the shared folder. Then click Next. Click OK to create the
new directory on path doesn’t exist warning.

DCC MANUAL BY BMM 74


Now configure other settings. Here, I will check to enable access-based enumeration. This option
makes the folder visible for users that have permission to access the folder otherwise the folder will be
hidden. Allow caching of share option makes the folder to be accessed even when the user is offline.
Click Next.

Here, configure the folder permission. The shared folder have shared folder permission and NTFS
permission. These both permission work together to allow/deny users to access the shared folder.

DCC MANUAL BY BMM 75


Microsoft recommends to allow full control for share permission and use NTFS permission to restrict
and configure folder access. As you can see below, Share permissions: Everyone Full Control. The
permission shown here, is the inherited NTFS permission from drive NTFS permission. To change the
permission, click Customize permission.

Click disable inheritance. Then select convert inherited permission into explicit permissions on
this object.

DCC MANUAL BY BMM 76


You can see the changes below. Remove both User groups from the permission. This Users group
contains all the users of the domain. We don’t want all the users of the domain to access this shared
folder so remove it. Click Add to add the marketing group. Click Select a principal and
add Marketing group. Select the basic permissions and click OK.

Now the overall permission for the Marketing folder looks like this. Users of marketing group can
only read the files of Marketing folder.

Now let’s come back to the wizard. Click Next.

DCC MANUAL BY BMM 77


Review the settings and click Create.

The shared folder is now created. You can view the shared folder in Server Manager console.

DCC MANUAL BY BMM 78


In this way you can configure shared folder using Server Manager. Remember, NTFS permissions
and shared folder permissions are different. If NTFS permission and shared folder permission are
conflicting, then the most restrictive permission is applied. For example, if you configure NTFS
permission to Full Control and shared permission to Read on a folder then the permission applied
will be Read only. Best practice to manage permissions for shared folder is, configure full control
permission for everyone and restrict the folder access using NTFS permission.
Clients can now access the shared folder by typing the UNC (Universal Naming Convention) path of
the shared folder in windows explorer. In our case, the UNC path is, \\MBG-DC1\Marketing.

In this way you can share a folder and access the shared folder contents.

XI. Resources Used:


Sr. Instrument /Components Specification Quantity
No.

1 Personal computer / Server Standard computer with NIC card 1

2 Connecting Cables and connectors UTP CAT5 Cable (crossover cable) 3


with RJ-45 connectors

3 Boot CD/ Any bootable media with Windows Server 2012 R2 1


Windows Server Operating System

DCC MANUAL BY BMM 79


XII Actual procedure followed

XIII Precautions followed (use blank sheet provided if space not sufficient)

XIV Observations (use blank sheet provided if space not sufficient):


1. One of your print devices is not working properly, so you want to temporarily prevent users from
sending jobs to the printer serving that device. Which of the following actions should you take?

a. Stop sharing the printer.


b. Remove the printer from Active Directory
c. Change the printer port.
d. Rename the share.
2. …………………. file system provides you quota and security.

XV Results:

XVI. Exercise:

1. You have a server named Print1 that runs Windows Server 2012 R2. On Print1, you share a
printer named Printer1. You need to ensure that only the members of the Server Operators group,
the Administrators group, and the Print Operators group can send print jobs to Printer1.
What should you do?

2. You have a print server named Server1. You install a printer on Server1. You share the printer as
Printer1. You need to configure Printer1 to be available only from 19:00 to 05:00 every day. Which
settings from the properties of Printer1 should you modify?
DCC MANUAL BY BMM 80
3. What are the advantages of File Server?
[Space for Answers]

DCC MANUAL BY BMM 81


Practical No. 11: Configure Static and Dynamic IP addresses
I. Practical Significance:

An IP address is an address used in order to uniquely identify a device on an IP network. The


address is made up of 32 binary bits, which can be divisible into a network portion and host
portion with the help of a subnet mask. The 32 binary bits are divided into four octets (1 octet
= 8 bits). Each octet is converted to decimal and separated by a period (dot). For this reason,
an IP address is said to be expressed in dotted decimal format (for example, 172.16.81.100).
The value in each octet ranges from 0 to 255 decimal, or 00000000 - 11111111 binary. The
student will be able to assign Static and Dynamic IP addresses to the machine.

II. Relevant Program Outcome (PO)

PO2 – Discipline knowledge


PO3 – Experiments and practice
PO8 – Individual and team work

III. Competency and Practical Skills :

This practical is expected to develop the following skills for the industry identified competency
Maintain Computer Network systems
Assign IP address to computer.

IV. Relevant Course Outcomes :

Configure different TCP/IP services.

V. Practical Outcomes :

Assign IP address to the PC connected to the internet.

VI. Relevant Affective Domain related Outcomes :

• Follow safety practices.


• Handle network components carefully.
• Follow ethical practices.
VII. Minimum Theoretical Background :

Internet Protocol address (IP address) is a numerical label assigned to each device connected
to a computer network that uses the Internet Protocol for communication. An IP address serves
two main functions: host or network interface identification and location addressing. Internet
Protocol version 4 (IPv4) defines an IP address as a 32- bit number. However, because of the
growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6),
using 128 bits for the IP address, is developed. IP addresses are assigned to a host either

DCC MANUAL BY BMM 82


dynamically as they join the network, or persistently by configuration of the host hardware or
software. Persistent configuration is also known as using a static IP address.When a computer's
IP address is assigned each time it restarts, this is known as using a dynamic IP address. Static
IP Address: It is manually configured for a device. Routers, phones, tablets, laptops, desktops
can be configured to have a static IP address. Dynamic IP Address: It is a temporary IP address
assigned to a computing device or node when it is connected to a network. A dynamic IP
address is an automatically configured IP address assigned by a DHCP server to every new
network node. They are normally implemented by internet service providers and network that
have a large number of connecting end nodes. The dynamic IP address is assigned to a node
until it is connected to the network and hence a device may have different IP address every
time it is connected to the network
IP address Classes

Fig 11.1: Classes of IP address

VIII Resources required

IX Precautions to be Followed
• Handle equipment with care
• Avoid the repeatation of similar IP addresses to two or more different PCs. It may cause IP
conflict error in networking.
• Try use address for same range for one computer network and preferably in sequence to
manage network easily

DCC MANUAL BY BMM 83


X Procedure
To set a static IP address on windows computer 1. Click Start menu> control panel>Network and
Internet >network and sharing center.

Fig 11.2: Settings→Control Panel→Media and Sharing center menu→

2. Click “ Change Adapter Settings”. Right Click “Local Area Connection” and then click on “
Properties”

DCC MANUAL BY BMM 84


Fig 11.3: Setting Control Panel →Media Center→Local a connection Properties Menu
3. Select Internet Protocol Version 4(TCP/IPv4). Click on “ Properties”
4. Select “ Use the following IP address” and enter the IP address, Subnet Mask, Default Gateway and
DNS server. Click”OK” and Close the Local Area Connection properties window.

Fig. 11.4 Setting →Media →Local a connection Properties→Internet Protocol Version 4


(TCP/IPV4) Properties Menu
DCC MANUAL BY BMM 85
To set a dynamic IP address
1. Open Control Panel.
2. Click on the Network and Sharing Center icon.
3. In the View your active networks section, click the Local Area Connection link.
4. In the Local Area Connection Status window, click the Properties button.
5. Highlight the Internet Protocol Version 4 option and click the Properties button. Perform the
following steps for the Internet Protocol Version 6 option as well.
6. If you want to enable DHCP, make sure Obtain an IP address automatically is selected, as well as
Obtain DNS server address automatically
7. Note the IP allocated in the observation.

XI. Resources used


Sr. No. Instrument/ Component Specification Quantity

1. Personal computer with Internet Standard computer with 64 bit 1


connectivity with 2 GB RAM

XII Actual procedure followed

XIII Precautions followed (use blank sheet provided if space not sufficient)
1. Avoid IP conflict.
2. Give ranges of addresses of same class of address.

XIV Observations (use blank sheet provided if space not sufficient):


The static IP address assigned is……………………………………..
Subnet Mask Assigned is ……………………………………………
The dynamic IP address assigned is …………………………………
Range of Addresses allotted………………………………………….

XV Results

DCC MANUAL BY BMM 86


XVI Practical Related Questions
Note: Below given are few sample questions for reference. Teacher must design more such
questions so as to ensure the achievement of identified CO.
1. State the number of networks allowed under Class C addresses in the IPv4 addressing
format.
2. State the size of an IP address.
3. Suggest class of IP address for a computer lab. Network.
4. Set www.google.com as default page in internet explorer.
[Space for Answers]

DCC MANUAL BY BMM 87


Practical No. 12: Configure DHCP server

II. Practical Significance :


Every device on the network needs an IP address to access network resources such as the internet,
applications and even making phone calls. With a DHCP server this entire process is automated and
can be managed from a centralized server. When mobile devices move from one office to another it
may require a new IP address. DHCP handles this automatically providing a new IP addresses when
the device moves to another location. Without a DHCP server there would be an overwhelming
amount of manual configuration assigning IP addresses to devices on the network. A DHCP server
is a huge time saver.

II. Relevant Program Outcome (PO)

PO2 – Discipline knowledge


PO3 – Experiment & Practice
P10 – Life long learning

III. Competency and Practical Skills:

Administration and configuration skills

IV. Relevant Course Outcomes :

Configure different TCP/IP services.

V. Practical Outcomes :

Installation, configuration and manage the most common roles and features in Windows server

VI. Relevant Affective Domain related Outcomes :

i. Follow safety practices .


j. Handle network components carefully.
k. Demonstrate working as a leader/team member.
l. Follow ethical practices.

VII. Minimum Theoretical Background :

DHCP is widely used in LAN environments to dynamically assign host IP addresses from a
centralized server, which significantly reduces the overhead of administration of IP addresses.
DHCP also helps conserve the limited IP address space because IP addresses no longer need to be
permanently assigned to hosts; only those hosts that are connected to the network consume IP
DCC MANUAL BY BMM 88
addresses. The DHCP server assigns IP addresses from specified address pools on a router or router
to DHCP clients and manages them.
VIII. Resources Required :

Sr. Instrument /Components Specification Quantity


No.

1 Personal computer / Server Standard computer with NIC card 1

2 Connecting Cables and connectors UTP CAT5 Cable (crossover cable) 3


with RJ-45 connectors

3 Boot CD/ Any bootable media Any Such as Pendrive, HardDisk , 1


CD-DVD ROM Drive or external
memory drives/USB Flash Drive.

4 Windows Server Operating System Licensed or others Windows Server 1


OS

IX. Precautions :

c. Handle network components carefully.


d. Follow safety practices .

X. Procedure :

As you know Dynamic Host Configuration Protocol (DHCP) is commonly implemented


network services in today’s network environments. DHCP is primarily used to automatically
distribute IP configuration settings to network clients, eliminating manually configuring hosts
on TCP/IP-based networks.
To Install DHCP role, you will have to follow the steps given below.
Step 1 − Go to “Server Manager” → Manage → Add Roles and Features.

DCC MANUAL BY BMM 89


Step 2 − Click Next.
Step 3 − Select the Role-based or feature-based installation option → click Next.
Step 4 − We will install a Local DHCP Role as it will Select a server from the Server Pool →
then click Next.
Step 5 − From the Roles lists, check the DHCP Server role → click Add Features on the
popup windows as shown in the following screenshots.
Step 6 − Click Next.
Step 7 − Click Next.
Step 8 − Click Install.
Step 9 − Click Close.

Post-deployment Configuration

In this section, we will see how to do the post-deployment configuration of the DHCP. Please
follow the steps given below.
Step 1 − Click on the warning icon and then click on “Complete DHCP Configuration”.

DCC MANUAL BY BMM 90


Step 2 − Click Next.
Step 3 − Select a domain user account that has permissions to create objects in the Net Services
container in Active directory or a domain admin account → click Next.
Step 4 − Click Close.

Scope Implementation of DHCP

Now we have to configure the service to make it useful for the computers. To do this, we need
to follow the steps given below.
Step 1 − Server Manager screen → Tools → DHCP.

DCC MANUAL BY BMM 91


Step 2 − Right-click on the DHCP Server → then click on “Add/Remove Bindings… “
Step 3 − Ensure the static IP address of the server should appear as shown in the following
screenshot.
Step 4 − Right-click on IPv4 → Select “New Scope”.
Step 5 − Click “Next”.
Step 6 − Enter Scope Name and description as shown in the following screenshot and then →
Next.
Step 7 − Enter the Start and End IP address, the Subnet mask, leave the Length as default “24”
for class C subnet → click Next.
Step 8 − Enter your IP range in the exclusion list. If you have devices on the network that
require static IP address and also ensure that the excluded range falls with the Start and End
range earlier specified, then → click Next.
Step 9 − Enter the desired lease duration for the assigned IP’s or leave as default → then click
Next.
Step 10 − Select → Yes, I want to configure these options now to configure the DHCP
options for the new scope → then click on Next.
Step 11 − Enter the default gateway which is the IP of your Router → then click Next.
Step 12 − Add DNS IP → click Next (we can put Google DNS or if it is a Domain environment
you can put the DC IP there) then click → Next.
Step 13 − Specify your WINS Server if any and then click → Next.
Step 14 − Select Yes, I want to activate this scope now option to activate the scope
immediately and then click → Next.
Step 15 − Click Finish.

DCC MANUAL BY BMM 92


XI. Resources Used:
Sr. Instrument /Components Specification Quantity
No.

1 Personal computer / Server Standard computer with NIC card 1

2 Connecting Cables and connectors UTP CAT5 Cable (crossover cable) 3


with RJ-45 connectors

3 Boot CD/ Any bootable media CD-DVD 1

4 Windows Server Operating System Windows Server 2012 R2 1

XII Actual procedure followed

XIII Precautions followed (use blank sheet provided if space not sufficient)

DCC MANUAL BY BMM 93


XIV Observations (use blank sheet provided if space not sufficient):
1. An IPv4 address consists of _______ bits.
2. DHCP (dynamic host configuration protocol) provides _____ to the client.
3.DHCP is used for………………….
a. IPv6
b. IPv4
c. Both a and b
d. none of the mentioned
4. Every DHCP server must have at least one active scope to grant leases to clients. True/False
5. ……………………….refreshes leased IP addresses and re-registers DNS

6. …………………………… Identifies with parts of the IP adddress belong to the network ID and
which parts belong to the host ID.

XV. Results:

XII. Exercise:

1.Explain what is the way to configure the DHCP server such that it allocates the same IP address to
certain devices each time the address is removed?

2. What are the advantages of DHCP server?

3. How to configure DHCP/ Static IP in the computer to the LAN?

[Space for Answers]

DCC MANUAL BY BMM 94


DCC MANUAL BY BMM 95
Practical No. 13 : Run Basic TCP/IP Utilities And Network Commands :
ipconfig, ping, tracert, netstat, pathping, rout.

I. Practical Significance :
The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol
suite. It originated in the initial network implementation in which it complemented the Internet
Protocol (IP). Therefore, the entire suite is commonly referred to as TCP/IP. TCP
provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between
applications running on hosts communicating via an IP network.

II. Relevant Program Outcome (PO)

PO2 – Discipline knowledge


PO3 – Experiments and practice
P10 – Life long learning

III. Competency and Practical Skills :


The aim of this course is to help the student to attain the following identified competency
through various teaching learning experiences.
Maintain computer network systems.
Able to troubleshoot connectivity, reachability, and name resolution.
Able to trace a path and provide network latency and packet loss for each router and link in the
path.
Able to trace travelling route of transmitted message or data packet
Able to modify entries of routing table.

IV. Relevant Course Outcomes :


a. Analyze the functioning of data communication and computer network.
b. Configure various networking devices.
c. Configure different TCP/IP services.

V. Practical Outcomes :
● Run Basic TCP/IP Utilities And Network Coommands: ipconfig, ping, tracert, netstat,
pathping, route.

VI. Relevant Affective Domain related Outcomes :


a. Follow safety practices .
b. Handle network components carefully.
c. Demonstrate working as a leader/team member.
d. Follow ethical practices.

DCC MANUAL BY BMM 96


VII. Minimum Theoretical Background :

1. Ping
The PING utility tests connectivity between two hosts. PING uses a special protocol called
the Internet Control Message Protocol (ICMP) to determine whether the remote machine (website,
server, etc.) can receive the test packet and reply. Ping is the primary TCP/IP command used to
troubleshoot connectivity, reachability, and name resolution.

To test a TCP/IP configuration by using the ping command:

• To quickly obtain the TCP/IP configuration of a computer, open Command Prompt, and then
type ipconfig . From the display of the ipconfig command, ensure that the network adapter for
the TCP/IP configuration you are testing is not in a Media disconnected state.
• At the command prompt, ping the loopback address by typing ping 127.0.0.1
• Ping the IP address of the computer.
• Ping the IP address of the default gateway. If the ping command fails, verify that the default
gateway IP address is correct and that the gateway (router) is operational.
• Ping the IP address of a remote host (a host that is on a different subnet). If the ping command
fails, verify that the remote host IP address is correct, that the remote host is operational, and
that all of the gateways (routers) between this computer and the remote host are operational.
• Ping the IP address of the DNS server. If the ping command fails, verify that the DNS server
IP address is correct, that the DNS server is operational, and that all of the gateways (routers)
between this computer and the DNS server are operational.

Syntax:
ping [/t] [/a] [/n <count>] [/l <size>] [/f] [/I <TTL>] [/v <TOS>] [/r <count>] [/s <count>] [{/j
<hostlist> | /k <hostlist>}] [/w <timeout>] [/R] [/S <Srcaddr>] [/4] [/6] <targetname>

Command: PING www.yahoo.com

2. Tracert
This diagnostic tool determines the path taken to a destination by sending Internet Control Message
Protocol (ICMP) echo Request or ICMPv6 messages to the destination with incrementally

DCC MANUAL BY BMM 97


increasing time to live (TTL) field values. Each router along the path is required to decrement the
TTL in an IP packet by at least 1 before forwarding it. Effectively, the TTL is a maximum link

counter. When the TTL on a packet reaches 0, the router is expected to return an ICMP time
Exceeded message to the source computer.

Syntax:
tracert [/d] [/h <maximumhops>] [/j <hostlist>] [/w <timeout>] [/R] [/S <srcaddr>] [/4][/6]
<targetname>
Command: tracert www.google.com

3. Netstat
Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the
IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics
(for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols). Used without parameters,
this command displays active TCP connections.
Syntax:
netstat [-a] [-b] [-e] [-n] [-o] [-p <Protocol>] [-r] [-s] [<interval>]
Command: netstat
Netstat provides statistics for the following:

• Proto - The name of the protocol (TCP or UDP).


• Local Address - The IP address of the local computer and the port number being used. The
name of the local computer that corresponds to the IP address and the name of the port is shown
unless the -n parameter is specified. If the port is not yet established, the port number is shown
as an asterisk (*).
• Foreign Address - The IP address and port number of the remote computer to which the socket
is connected. The names that corresponds to the IP address and the port are shown unless the -
n parameter is specified. If the port is not yet established, the port number is shown as an
asterisk (*).

DCC MANUAL BY BMM 98


(state) Indicates the state of a TCP connection. The possible states are as follows:

• CLOSE_WAIT
• CLOSED
• ESTABLISHED
• FIN_WAIT_1
• FIN_WAIT_2
• LAST_ACK
• LISTEN
• SYN_RECEIVED
• SYN_SEND
• TIMED_WAIT

Syntax:
netstat [-a] [-e] [-n] [-o] [-p Protocol] [-r] [-s] [Interval]

Command: netstat

4. IPConfig
Displays all current TCP/IP network configuration values and refreshes Dynamic Host
Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without
parameters, ipconfig displays Internet Protocol version 4 (IPv4) and IPv6 addresses, subnet mask,
and default gateway for all adapters.
Syntax:
ipconfig [/allcompartments] [/all] [/renew [<adapter>]] [/release [<adapter>]]
[/renew6[<adapter>]] [/release6 [<adapter>]] [/flushdns] [/displaydns] [/registerdns] [/showclassid
<adapter>] [/setclassid <adapter> [<classID>]]
Command: ipconfig

DCC MANUAL BY BMM 99


5. Pathping

pathping is an interesting command that's unique to Windows. It's sort of a cross between the ping
command and the tracert command, combining the features of both into one tool. When you run
pathping, it first traces the route to the destination address much the way tracert does. Then, it launches
into a 25-second test of each router along the way, gathering statistics on the rate of data loss to each
hop. If the route has a lot of hops, this can take a long time. However, it can help you to spot potentially
unreliable hops. If you're having intermittent trouble reaching a particular destination, using pathping
may help you pinpoint the problem.

The following command output is typical of the pathping command. (Using an -n switch causes the
display to use numeric IP numbers only, instead of DNS host names. Although fully qualified host
names are convenient, they tend to be very long for network routers, which makes the pathping output
very difficult to decipher.)

Syntax: pathping [/n] [/h <maximumhops>] [/g <hostlist>] [/p <Period>] [/q <numqueries> [/w
<timeout>] [/i <IPaddress>] [/4 <IPv4>] [/6 <IPv6>][<targetname>]

Command: pathping -n www.msbte.com

DCC MANUAL BY BMM 100


6.Route
Route command is only available if the TCP/IP protocol is installed as a component in the properties
of a network adapter. route command displays or modifies the computer's routing table information.
For a typical computer that has a single network interface and is connected to a local area network
(LAN) that has a router, the routing table is pretty simple. If user facing trouble in accessing other
computers or other networks, user can use the route command to investigate bad entry that affect in
the computer's routing table.

For a computer with more than one interface and that's configured to work as a router, the routing table
is often a major source of trouble. Setting up the routing table properly is a key part of configuring a
router to work. Earlier tracert command is used to trace the travel of packet from source to destination
over a network. This command is capable to modify routing table entries hence the route command is
established. To display the routing table (both IPv4 and IPv6) in Windows, use the route print
command.

For each entry in the routing table, five items of information are listed:

• The destination IP address Actually, this is the address of the destination subnet, and must be
interpreted in the context of the subnet mask.
• The subnet mask that must be applied to the destination address to determine the
destination subnet
• The IP address of the gateway to which traffic intended for the destination subnet will be
sent
• The IP address of the interface through which the traffic will be sent to the destination
subnet
• The metric, which indicates the number of hops required to reach destinations via the
gateway

DCC MANUAL BY BMM 101


Each packet that's processed by the computer is evaluated against the rules in the routing table. If the
packet's destination address matches the destination subnet for the rule, the packet is sent to the
specified gateway via the specified network interface. If not, the next rule is applied.

Syntax: route [/f] [/p] [<command> [<destination>] [mask <netmask>] [<gateway>] [metric
<metric>]] [if <interface>]]
Command: Route print

*Modifying the routing table


Besides displaying the routing table, the route command also lets you modify it by adding, deleting,
or changing entries.
Warning: User need to carefully use this command If you mess up the routing table, your computer
may not be able to communicate with anyone.

VIII. Resources Required :

Sr. Instrument /Components Specification Quantity


No.

1 Personal computers Standard computers 3


with NIC card

IX. Procedure :
1. Start Command Prompt
2. Type each network commands and utilities on it one by one.
3. Observe output of each command.

DCC MANUAL BY BMM 102


X. Resources used :

Sr. Instrument /Components Specification Quantity


No.

1 Personal computers Standard computers 64 bit 3


Windows 10 with NIC card

XI. Actual procedure followed

XII. Precautions followed (use blank sheet provided if space not sufficient)

XIII. Observations (use blank sheet provided if space not sufficient):


1. If you want to find the number of routers between a source and destination, the utility to be
used is …………………..

2. Steps to enter command prompt …………………………………………………………

………………………………………………………………………………………………..

3. ………………… key is used to get previously typed commands.

XIV. Results :

DCC MANUAL BY BMM 103


XV. Exercise:
1. What is TCP/IP utilities ?
2. List various network commands?
[Space for answers]

DCC MANUAL BY BMM 104


Practical No. 14: Install Wireshark and configure as packet sniffer
I. Practical Significance:

Wireshark captures network packets in real time and display them in human-readable format.
It provides many advanced features including live capture and offline analysis, three-pane
packet browser, coloring rules for analysis. This document uses Wireshark for the experiments,
and it covers Wireshark installation, packet capturing, and protocol analysis. Wireshark is a
free opensource network protocol analyzer. It is used for network troubleshooting and
communication protocol analysis.

II. Relevant Program Outcome (PO)

PO2 – Discipline knowledge


PO3 – Experiments and practice
PO4 – Engineering tools
PO8 – Individual and team work

III. Competency and Practical Skills :

The aim of this course is to help the student to attain the following industry identified
competency through various teaching learning experiences:
Maintain computer network systems.
Able to install Wireshark and use it to track the network packets.
Also, able to examine the network security problems.
IV. Relevant Course Outcomes :

Analyze the transmission errors with respect to IEEE standards.


Configure different TCP/IP services.
V. Practical Outcomes :

Install Wireshark and configure as packet sniffer


VI. Relevant Affective Domain related Outcomes :

• Follow safety practices.


• Handle network components carefully.
• Demonstrate as a team leader/a team member.
• Follow ethical practices.
VII. Minimum Theoretical Background :

Wireshark is an open-source packet analyzer, which is used for education, analysis, software
development, communication protocol development, and network troubleshooting.

DCC MANUAL BY BMM 105


It is used to track the packets so that each one is filtered to meet our specific needs. It is
commonly called as a sniffer, network protocol analyzer, and network analyzer. It is also
used by network security engineers to examine security problems. Wireshark is a free to use
application which is used to apprehend the data back and forth. It is often called as a free packet
sniffer computer application. It puts the network card into an unselective mode, i.e., to accept
all the packets which it receives.

Background

TCP/IP Network Stack

Fig 14.1: Encapsulation of Data in the TCP/IP Network Stack

This background section briefly explains the concept of TCP/IP network stack to help you better
understand the experiments. TCP/IP is the most commonly used network model for Internet services.
Because its most important protocols, the Transmission Control Protocol (TCP) and the Internet
Protocol (IP) were the first networking protocols defined in this standard, it is named as TCP/IP.
However, it contains multiple layers including application layer, transport layer, network layer, and
data link layer.

Application Layer: The application layer includes the protocols used by most applications for
providing user services. Examples of application layer protocols are Hypertext Transfer Protocol
(HTTP), Secure Shell (SSH), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol
(SMTP).

DCC MANUAL BY BMM 106


Transport Layer: The transport layer establishes process-to-process connectivity, and it provides end-
to-end services that are independent of underlying user data. To implement the process-to-process
communication, the protocol introduces a concept of port. The examples of transport layer protocols
are Transport Control Protocol (TCP) and User Datagram Protocol (UDP). The TCP provides flow
control, connection establishment, and reliable transmission of data, while the UDP is a connectionless
transmission model.

Internet Layer: The Internet layer is responsible for sending packets to across networks. It has two
functions: 1) Host identification by using IP addressing system (IPv4 and IPv6); and 2) packets routing
from source to destination. The examples of Internet layer protocols are Internet Protocol (IP), Internet
Control Message Protocol (ICMP), and Address Resolution Protocol (ARP).

Link Layer: The link layer defines the networking methods within the scope of the local network link.
It is used to move the packets between two hosts on the same link. An common example of link layer
protocols is Ethernet.

Basic concepts of the Network Traffic

IP Addresses: It was designed for the devices to communicate with each other on a local network or
over the Internet. It is used for host or network interface identification. It provides the location of the
host and capacity of establishing the path to the host in that network. Internet Protocol is the set of
predefined rules or terms under which the communication should be conducted. The types of IP
addresses are IPv4 and IPv6.

o IPv4 is a 32-bit address in which each group represents 8 bits ranging from 0 to 255.
o IPv6 is a 128-bit address.

IP addresses are assigned to the host either dynamically or static IP address. Most of the private users
have dynamic IP address while business users or servers have a static IP address. Dynamic address
changes whenever the device is connected to the Internet.

Computer Ports: The computer ports work in combination with the IP address directing all outgoing
and incoming packets to their proper places. There are well-known ports to work with like FTP (File
Transfer Protocol), which has port no. 21, etc. All the ports have the purpose of directing all packets
in the predefined direction.

Protocol: The Protocol is a set of predefined rules. They are considered as the standardized way of
communication. One of the most used protocol is TCP/IP. It stands for Transmission Control
Protocol/ Internet Protocol.

OSI model: OSI model stands for Open System Interconnect. OSI model has seven layers,
namely, Application layer, Presentation layer, Session layer, Transport layer, Network layer,
Data link layer, and the physical layer. OSI model gives a detail representation and explanation of
the transmission and reception of data through the layers. OSI model supports both connectionless and
connection-oriented communication mode over the network layer. The OSI model was developed by
ISO (International Standard Organization).

DCC MANUAL BY BMM 107


VIII Resources required

Instrument /Components Specification Quantity


Sr.
No.

1 Personal computers Standard computers with NIC card 5


connected in LAN

2 Wireshark software Open-source software 1

IX Precautions to be Followed
• Download and install the OS supported version only.
• Check that your installed version is supported and updated.

X Procedure

Installation of Wireshark Software

Below are the steps to install the Wireshark software on the computer:

o Open the web browser.


o Search for 'Download Wireshark.'
o Select the Windows installer according to your system configuration, either 32-bt or 64-bit.
Save the program and close the browser.
o Now, open the software, and follow the install instruction by accepting the license.
o The Wireshark is ready for use.
o On the network and Internet settings option, we can check the interface connected to our
computer.
o If you are Linux users, then you will find Wireshark in its package repositories.
o By selecting the current interface, we can get the traffic traversing through that interface. The
version used here is 3.0.3. This version will open as:

DCC MANUAL BY BMM 108


Fig 14.2: Wireshark on Windows
o The Wireshark software window is shown above, and all the processes on the network are
carried within this screen only.
o The options given on the list are the Interface list options. The number of interface options will
be present. Selection of any option will determine all the traffic. For example, from the above
fig. select the Wi-Fi option. After this, a new window opens up, which will show all the current
traffic on the network. Below is the image which tells us about the live capture of packets and
our Wireshark will look like:

DCC MANUAL BY BMM 109


Fig 14.3 Wireshark packet capture window

The above arrow shows the packet content written in hexadecimal or the ASCII format. And the
information above the packet content, are the details of the packet header. It will continue listening to
all the data packets, and you will get much data. If you want to see a particular data, then you can click
on the red button. The traffic will be stationary, and you can note the parameters like time, source,
destination, the protocol being used, length, and the Info. To view in-depth detail, you can click on that
particular address; a lot of the information will be displayed below that.

The Wireshark interface has five major components:


The command menus are standard pulldown menus located at the top of the window. Of interest to
us now is the File and Capture menus. The File menu allows you to save captured packet data or open
a file containing previously captured packet data, and exit the Wireshark application. The Capture
menu allows you to begin packet capture.
The packet-listing window displays a one-line summary for each packet captured, including the
packet number (assigned by Wireshark; this is not a packet number contained in any protocol’s header),
the time at which the packet was captured, the packet’s source and destination addresses, the protocol
type, and protocol-specific information contained in the packet. The packet listing can be sorted
according to any of these categories by clicking on a column name. The protocol type field lists the
highest level protocol that sent or received this packet, i.e., the protocol that is the source or ultimate
sink for this packet.
The packet-header details window provides details about the packet selected (highlighted) in the
packet-listing window. (To select a packet in the packet-listing window, place the cursor over the
packet’s one-line summary in the packet-listing window and click with the left mouse button.). These
details include information about the Ethernet frame and IP datagram that contains this packet. The
amount of Ethernet and IP-layer detail displayed can be expanded or minimized by clicking on the

DCC MANUAL BY BMM 110


right pointing or down-pointing arrowhead to the left of the Ethernet frame or IP datagram line in the
packet details window. If the packet has been carried over TCP or UDP, TCP or UDP details will also
be displayed, which can similarly be expanded or minimized. Finally, details about the highest-level
protocol that sent or received this packet are also provided.
The packet-contents window displays the entire contents of the captured frame, in both ASCII and
hexadecimal format.
Towards the top of the Wireshark graphical user interface, is the packet display filter field,
into which a protocol name or other information can be entered in order to filter the information
displayed in the packet-listing window (and hence the packet-header and packet-contents windows).
In the example below, we’ll use the packet-display filter field to have Wireshark hide (not display)
packets except those that correspond to HTTP messages. packet, i.e., the protocol that is the source or
ultimate sink for this packet.

Fig: 14.4(1) Wireshark Window

You can also select the connection to which your computer is connected. For example, in this PC, we
have chosen the current network, i.e., the ETHERNET.

After connecting, you can watch the traffic below:

DCC MANUAL BY BMM 111


Fig: 14.4(2) Wireshark Window

Wireshark packet sniffing


Packet sniffer is a basic tool for observing network packet exchanges in a computer. As the name
suggests, a packet sniffer captures (“sniffs”) packets being sent/received from/by your computer; it
will also typically store and/or display the contents of the various protocol fields in these captured
packets. A packet sniffer itself is passive. It observes messages being sent and received by applications
and protocols running on your computer, but never sends packets itself.

Fig: 14.5 Wireshark Structure

Wireshark is a packet sniffing program that administrators can use to isolate and troubleshoot problems
on the network. It can also be used to capture sensitive data like usernames and passwords. It can also
be used in wrong way (hacking) to ease drop.

Packet sniffing is defined as the process to capture the packets of data flowing across a computer
network. The Packet sniffer is a device or software used for the process of sniffing.

DCC MANUAL BY BMM 112


Below are the steps for packet sniffing:

o Open the Wireshark Application.


o Select the current interface. Here in this example, interface is Ethernet that we would be using.
o The network traffic will be shown below, which will be continuous. To stop or watch any
particular packet, you can press the red button below the menu bar.

Apply the filter by the name 'http.' After the filter is applied, the screen will look as:

DCC MANUAL BY BMM 113


The above screen is blank, i.e.; there is no network traffic as of now.

Open the browser. In this example, we have opened the 'Internet Explorer.' You can choose any
browser.

As soon as we open the browser, and type any address of the website, the traffic will start showing,
and exchange of the packets will also start. The image for this is shown below:

DCC MANUAL BY BMM 114


The above process explained is called as packet sniffing.

XI Resources used

Sr. Instrument /Components Specification Quantity


No.

1 Personal computers Standard computers with NIC card 5


connected in LAN

2 Wireshark software Open-source software 1

XII Actual procedure followed


Student shall write procedure:

DCC MANUAL BY BMM 115


XIII Precautions followed (use blank sheet provided if space not sufficient)

XIV Observations (use blank sheet provided if space not sufficient):


1. Wireshark is a ……………………….. tool.

2. _____________ is data interception method used by hackers.

3. _____________ are programs or devices that capture the vital information from the target network
or particular network.

4. Select ……………………… option on the menu bar and select 'Coloring Rules’.

5. If a packet is highlighted by black, what does it mean for the packet?


…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………….

XV Results

XVI Conclusions and Recommendations (Actions/decisions to be taken based on the interpretation


of results)

DCC MANUAL BY BMM 116


XVII Practical Related Questions
Note: Below given are few sample questions for reference. Teacher must design more such
questions so as to ensure the achievement of identified CO.
1. Can Wireshark Be Setup On A Cisco Router?
2. What Exactly Does Wireshark Do?
3. What are the uses of Wireshark?
[Space for Answers]

DCC MANUAL BY BMM 117


Practical No. 15: Set access rights and security permissions for user
I. Practical Significance:

Access control in Windows is the process of authorizing users, groups, and computers to access objects
on the network or computer. Key concepts that make up access control are permissions, ownership of
objects, inheritance of permissions, user rights, and object auditing.

II. Relevant Program Outcome (PO)

PO2 – Discipline knowledge


PO3 – Experiments and practice
PO8 – Individual and team work
P10 – Life long Learning

III. Competency and Practical Skills :

The aim of this course is to help the student to attain the following industry identified
competency through various teaching learning experiences:
Maintain computer network systems.
Able to granting access to files or folder.
Also, able to setting permissions to users.
IV. Relevant Course Outcomes :

Analyze the functioning of data communication and computer network.


Configure different TCP/IP services.
V. Practical Outcomes :

Set access rights and security permissions for user

VI. Relevant Affective Domain related Outcomes :

• Follow safety practices.


• Handle network components carefully.
• Demonstrate as a team leader/a team member.
• Follow ethical practices.
VII. Minimum Theoretical Background :

In many cases, you will need to change the permissions that a certain group or individual user has to a
file or folder. For example, you can designate a special folder on the W: drive within your department's
area called "Incoming" as a place where students can turn in their work. To do this, you would first
need to create a new folder on the W: drive. By default, the new folder will have the same permissions
as the parent folder, which would not allow students to submit their work, and may not allow students
to even access the folder. You would then need to allow students access to the new folder, and set
permissions for the folder. When you set permissions, you are specifying what level of access students
DCC MANUAL BY BMM 118
have to the folder and its files and what students can do within that folder such as save, delete, or read
files.

Background

✓ Standard Permission Types


✓ Create a New Folder
✓ Accessing the Properties Dialog Box
✓ Granting Access to a File or Folder
✓ Setting Permissions
✓ Advanced Folder Level Permissions

Standard Permission Types


There are six standard permission types which apply to files and folders in Windows: Full Control
Modify Read & Execute List Folder Contents Read Write Each level represents a different set of
actions users can perform. See the table below for more information. For folders you can also set
your own unique permissions or create a variation on any of the standard permission levels. Within
each of the permission levels are many possible variations. For information on some of these
advanced options, refer to Advanced Folder Level Permissions below. The following table
represents the available standard permission types.
Permissions Description
Full control Permits the user(s) to:
view file name and subfolders.
navigate to subfolders.
view data in the folder's files.
add files and subfolders to the folder.
change the folder's files.
delete the folder and its files.
change permissions.
take ownership of the folder and its files
Modify Permits the user(s) to:
view the file names and subfolders.
navigate to subfolders.
view data in the folder's files.
add files and subfolders to the folder.
change the folder's files.
delete the folder and its files.
open and change files.
Read & Execute Permits the user(s) to:
view file names and subfolder names.
navigate to subfolders.
view data in the folder's files.
run applications.
List folder contents Permits the user(s) to:
view the file names and subfolder names. navigate to subfolders.
DCC MANUAL BY BMM 119
view folders.
does not permit access to the folder's files.
Read Permits the user(s) to:
view the file names and subfolder names. navigate to subfolders.
open files.
copy and view data in the folder's files.
Write The Read permissions, plus permits the user(s) to:
create folders.
add new files. delete files.

VIII Resources required

Instrument /Components Specification Quantity


Sr.
No.

1 Personal computers Standard computers with NIC card 5


connected in LAN

2 Wireshark software Open-source software 1

IX Precautions to be Followed
• Check that operating system is installed.

X Procedure
Create a New Folder
In many cases you will need to create a new folder. If you are using an existing folder and do not wish
to create a new folder, continue with Accessing the Properties Dialog Box.
1. Click on the Start menu.
2. Click Computer.
3. From the Computer window, select the shared drive for your area or department (S Drive or W
Drive).
4. Navigate to the location you want the new folder to appear (e.g., within one of your existing folders).
5. On the menu bar, select New Folder.
OR
Right click » select New » select Folder.
A new folder is created which inherits the security permissions of its "parent."
6. In the newly created folder, type the desired folder name.
7. Press [Enter] or click off of the folder.

Accessing the Properties Dialog Box


When working with permissions in Windows 7, you are required to work from theProperties dialog
box. This dialog box for the file or folder you are working with can be accessed in a few steps.
1. Click on the Start menu.
2. Click Computer.
3. Select the folder or file you wish to adjust/view permissions for.
4. Right-click the folder or file.
5. Select Properties.

DCC MANUAL BY BMM 120


The Properties dialog box appears.

Granting Access to a File or Folder


After creating a new folder, or even if you will use an existing folder, you will need to determine who
will have access to it. Also, keep in mind that by default the same persons who have access to the
"parent" (original) folder also have access to the new folder, and vice versa. This may not be ideal. It
is a simple process to grant access to specific users for any folder you have created.

1. Access the Properties dialog box.


2. Select the Security tab.

Fig 15.1: The Properties Dialog box→Security tab


3. Click Edit.
The security tab opens in a new window.
4. Click Add...
The Select Users, Computers, or Groups dialog box appears.

DCC MANUAL BY BMM 121


Fig 15.2: The Select Users, Computers, or Groups dialog box

5. In the Enter the object names to select text box, type the name of the user or group that will have
access to the folder (e.g., 2125.engl.498.001 or [email protected]).

HINT: You may type the beginning of the name and then click Check Names. The name will either
be resolved or a list of users beginning with those characters will display for you to select from.

6. Click OK.
The Properties dialog box reappears.
7. Click OK on the Security window.
8. Continue with Setting Permissions below.

Setting Permissions
Once you have granted a group or individual user access to a folder, you will need to set permissions
for the new user(s). When you set permissions, you are specifying what level of access a user(s) has to
the folder and the files within it. Be careful about checking Deny for any permissions, as the Deny
permission overrides any other related to Allow permissions.
Folder permissions can be changed only by the owner of the folder (i.e., the creator) or by someone
who has been granted permission by the owner. If you are not the owner of the folder or have not been
granted permission by the owner, all checkboxes will be gray. Therefore, you will not be able to make
any changes until the owner grants you permission.
1. Access the Properties dialog box.
2. Select the Security tab.
The top portion of the dialog box lists the users and/or groups that have access to the file or folder.
3. Click Edit

DCC MANUAL BY BMM 122


Fig 15.3: Setting Permissions

4. In the Group or user name section, select the user(s) you wish to set permissions for
5. In the Permissions section, use the checkboxes to select the appropriate permission level
6. Click Apply
7. Click Okay The new permissions are added to the file or folder.

Advanced Folder Level Permissions


When you set permissions, you specify what users are allowed to do within that folder, such as save
and delete files or create a new folder. You are not limited to choosing one of the standard
permissions settings (Full Control, Modify, Read & Execute, List Folder Contents, Read, or Write).
Instead of choosing one of these settings, you may set your own unique permissions based on what
you would like users to be able to do. For an understanding of how options can be combined, refer to
Permission Types: An Overview.
Remember, folder permissions can only be changed by the owner of the folder (i.e., the creator) or by
someone who has been granted permission by the owner. If you are not the owner of the folder or
have not been granted permission by the owner, the checkboxes will be grayed out. Therefore, you
will not be able to make any changes until the owner grants you permission.
1. Access the Properties dialog box
2. Select the Security tab
3. Near the bottom right of theProperties dialog box, click Advanced
The Advanced Security Settings dialog box appears.

DCC MANUAL BY BMM 123


Fig 15.4: The Advanced Security Settings dialog box
4. (Optional) If you do not want the new folder to have the same permissions as the "parent"
(original) folder and wish to set unique permissions for the new folder, click the Change Permission
button near the bottom. This will bring up a similar window.
a. Uncheck the Include inheritable permissions from this object's parentcheckbox
A Windows Security warning dialog box will appear.

Fig 15.5: Windows Security warning dialog box


b. Click Remove if you want someone removed from permission all together NOTE: Read
the instructions carefully and choose the action you wish to have taken for permissions.
5. Click the Change Permissions button

DCC MANUAL BY BMM 124


6. Select the appropriate user
OR
Click Add and enter the name of the user or group that will have access to the folder.
7. Click Edit...

The Permissions Entry dialog box appears

Fig 15.6: The Permission Entry Dialogue Box

8. In the Permissions section, use the checkboxes to set the appropriate permissions NOTE: If you
are not the owner of the folder or have not been granted permission by the owner, all checkboxes will
be gray. Therefore you will not be able to make any changes until the owner grants you permission to
do so.
9. From the Apply to: pull-down list, select what level you wish to apply these permissions to
10. Click OK
11. In the Advanced Security Setting dialog box, click OK
12. Click OK from the duplicate Advanced Security Settings
13. In the Properties dialog box, click OK
The new folder permissions are added for your specified user(s).

DCC MANUAL BY BMM 125


XI Resources used

Sr. Instrument /Components Specification Quantity


No.

1 Personal computers Standard computers with NIC card 5


connected in LAN

XII Actual procedure followed


Student shall write procedure:

XIII Precautions followed (use blank sheet provided if space not sufficient)

XIV Observations (use blank sheet provided if space not sufficient):


1. The security principle of least privilege is…………….
2. A privileged user is someone who…………………
3. How to Set the folder permissions for Everyone on Windows 10?

XV Results

XVI Conclusions and Recommendations (Actions/decisions to be taken based on the interpretation


of results)

DCC MANUAL BY BMM 126


XVII Practical Related Questions
Note: Below given are few sample questions for reference. Teacher must design more such
questions so as to ensure the achievement of identified CO.

1. How to configure restrictions on a user account in Windows 10?


2. How to change the Attribute(s) of a file or folder in Windows 10?

[Space for Answers]

DCC MANUAL BY BMM 127


DCC MANUAL BY BMM 128
Practical No. 16: Create IPV6 based small computer network using a
simulator.

XI. Practical Significance:


IPv6 (Internet Protocol version 6) is a set of specifications from the Internet Engineering Task
Force (IETF) that is essentially an upgrade of IP version 4 (IPv4), a category of IP addresses in
IPv4-based routing. The basics of IPv6 are similar to those of IPv4 -- devices can use IPv6 as
source and destination addresses to pass packets over a network, and tools like ping work for
network testing as they do in IPv4, with some slight variations.

XII. Relevant Program Outcome (PO)


PO1 – Basic knowledge
PO2 – Discipline knowledge
PO3 – Experiments & Practice
PO10 – Life Long Learning

XIII. Competency and Practical Skills:


Understand and configure IPV6 protocol
This practical is expected to develop the following skills
• Understand IPV6 protocol
• Configure IPV6 protocol
• Able to assign IPV6 address to computers

XIV. Relevant Course Outcomes:


• Configure different TCP/IP services.

XV. Practical Outcomes :


• Using Cisco packet tracer

XVI. Relevant Affective Domain related Outcomes :


• Follow safety practices.
• Handle network components carefully.
• Demonstrate as a team leader/a team member.
• Follow ethical practices.

XVII. Minimum Theoretical Background:


IPv6 is the newest version of the IP protocol, which people often refer to as ‘the next-
generation Internet Protocol’. It was developed as an answer to many deficiencies of IPv4,

DCC MANUAL BY BMM 129


most notably the problem of IPv4 address exhaustion. IPv6 is used for the same general
functions as IPv4, though with a different implementation.

Fig. 16.1: IPV6 Format structure


Difference between IPv4 and IPv6
The most obvious improvement in IPv6 over IPv4 is that IP addresses are lengthened from
32 bits to 128 bits. This extension anticipates considerable future growth of the Internet and
provides relief for what was perceived as an impending shortage of network addresses. IPv6
also supports auto-configuration to help correct most of the shortcomings in version 4, and it
has integrated security and mobility features.

Benefits of IPv6
IPv6 benefits include:

• Supports source and destination addresses that are 128 bits (16 bytes) long
• Uses a link-local scope all-nodes multicast address
• Does not require manual configuration or DHCP.
• Uses host address (AAAA) resource records in DNS to map host names to IPv6 addresses.
• Uses Flow Label field to identify packet flow for quality of service (QoS) handling by
router.
• Uses Internet Control Message Protocol version 6 (ICMPv6) Router Solicitation and
Router Advertisement messages to determine the IP address of the best default gateway.

DCC MANUAL BY BMM 130


Features of IPv6

• There is a very large number of IPv6 addresses, since IPv6 addresses are 128-bit , unlike IPv4
addresses which are 32-bit.
• IPv6 has a simpler header – because there are no checksum bits as used in an IPv4 header.
For this reason, routers don’t need to calculate the checksum for every packet.
• There is Stateless address autoconfiguration in IPv6: – Hosts autoconfigure themselves with
IPv6 addresses.

• There is no need for NAT, since each device in an IPV6 network has a globally unique IPv6
address.

VIII. Resources required

Sr. No Instrument/ Specification Quantity


Components

1. Personal Computer Standard computer 1


with NIC card

2. Software Cisco Packet Tracer 1

IX. Precautions to be Followed

• Locate the various ports on the computer before making connections


• Make the connections with care
• Handle equipment with care
• Configure settings carefully to avoid conflict.

X. Procedure
Procedure-1
In this configuration lesson, we will follow the below IPv6 Configuration steps:

• Enable IPv6 Globally


• Enable IPv6 on Interface
• Configure EUI-64 Format Global Unicast Address
• Configure Manual Global Unicast Address
• IPv6 Ping
• Manual Link Local Address Configuration
• Auto IPv6 Address Configuration
• Enable DHCPv6 Client
• IPv6 Verification Commands

DCC MANUAL BY BMM 131


Enable IPv6 Globally

After going to the configuration mode with “configure terminal” command, to enable
IPv6 on a Cisco router, “ipv6 unicast-routing” command is used. With this Cisco command,
IPv6 is enabled globally on the router. This can be used before both interface configurations
and IPv6 Routing Protocol configurations.

Router 1# configure terminal


Router 1(config)# ipv6 unicast-routing
Router 2# configure terminal
Router 2(config)# ipv6 unicast-routing

Enable IPv6 on Interface

After enabling IPv6 globally, we should enable IPv6 under the Interfaces. To enable IPv6
under an interface, we will use “ipv6 enable” command. Let’s enable IPv6 on two interfaces
of each router.

Router 1 (config)# interface FastEthernet0/0


Router 1 (config-if)# ipv6 enable
Router 1 (config-if)# no shutdown
Router 1 (config)# interface FastEthernet0/1
Router 1 (config-if)# ipv6 enable
Router 1 (config-if)# no shutdown

Router 2 (config)# interface FastEthernet0/0


Router 2 (config-if)# ipv6 enable
Router 2 (config-if)# no shutdown
Router 2 (config)# interface FastEthernet0/1
Router 2 (config-if)# ipv6 enable
Router 2 (config-if)# no shutdown

DCC MANUAL BY BMM 132


Configure EUI-64 Format Global Unicast Address
EUI-64 format is the IPv6 format used to create IPv6 Global Unicast Addresses. It is a
specific format that we have also talked about before. With this format, basically, interface id
of the whole IPv6 adderess is ceated with the help of the MAC address. After that, this created
interface id is appended to the network id.

To configure an interface with EUI-64 format (Extended Unique Identifier), firstly we will
go under the interface, then we will use “ip address ipv6-address/prefix-length eui-64”
command. Here, our IPv6 address and prefix-length are 2001:AAAA:BBBB:CCCC::/64. The
real EUI-64 Global Unicast Address will be created with this address and MAC address after
IPv6 configuration.

Router 1 (config)# interface FastEthernet0/0


Router 1(config-if)# ipv6 address 2001:AAAA:BBBB:CCCC::/64 eui-64
Router 1(config-if)# end

Let’s check the IPv6 address that is created with EUI-64 format with “show ipv6 interface
brief” command.
Router 1# sho ipv6 interface brief
FastEthernet0/0 [up/up]
FE80::2E0:B0FF:FE0E:7701
2001:AAAA:BBBB:CCCC:2E0:B0FF:FE0E:7701
FastEthernet0/1 [up/up]
FE80::2E0:B0FF:FE0E:7702
Vlan1 [administratively down/down]
unassigned

Configure Manual Link Local Address


If we do not use EUI-64 format address, we have to write the whole IPv6 Address to the
configuration line. Let’s configure Gigabit Ethernet 0/0 interface of Router 2 manually.

Router 2 (config)# interface FastEthernet0/0


Router 2 (config-if)# ipv6 address 2001:AAAA:BBBB:CCCC:1234:1234:1234:1234/64
Router 2(config-if)# end
DCC MANUAL BY BMM 133
Here, both of these directly connected interfaces are in the same subnet, the Network ID is
same (2001:AAAA:BBBB:CCCC::/64).
Let’s check the IPv6 address that we have manually assigned with “show ipv6 interface
brief” command.

Router 2# show ipv6 interface brief


FastEthernet0/0 [up/up]
FE80::206:2AFF:FE15:BD01
2001:AAAA:BBBB:CCCC:1234:1234:1234:1234
FastEthernet0/1 [administratively up/up]
FE80::206:2AFF:FE15:BD02
Vlan1 [administratively down/down]
Unassigned

IPv6 Ping
To check the connectivity between two node, we use ping. As IPv4, with IPv6, we also use
ping, but this time it is called IPv6 Ping. The format of IPv6 Ping is a little difference than
IPv4 Ping. These differences are the format of the used IP address and the used keywords.
With IPv6 Ping, “ping ipv6” keywords are used before the destination IPv6 address.

Here, we will ping from Router 1 GigabitEthernet0/0 interface to Router 2


GigabitEthernet0/0 interface.

Router 1# ping ipv6 2001:AAAA:BBBB:CCCC:1234:1234:1234:1234

Type escape sequence to abort.


Sending 5, 100-byte ICMP Echos to 2001:AAAA:BBBB:CCCC:1234:1234:1234:1234,
timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/1 ms

DCC MANUAL BY BMM 134


To check the configured IPv6 Address, we can use “show ipv6 interface interface-name”
command.

Router 1# show ipv6 interface FastEthernet0/0


FastEthernet0/0 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::2E0:B0FF:FE0E:7701
No Virtual link-local address(es):
Global unicast address(es):
2001:AAAA:BBBB:CCCC:2E0:B0FF:FE0E:7701, subnet
is 2001:AAAA:BBBB:CCCC::/64 [EUI]
Joined group address(es):
FF02::1
FF02::2
FF02::1:FF0E:7701
MTU is 1500 bytes
ICMP error messages limited to one every 100 milliseconds

ICMP redirects are enabled


ICMP unreachables are sent
ND DAD is enabled, number of DAD attempts: 1
ND reachable time is 30000 milliseconds
ND advertised reachable time is 0 (unspecified)
ND advertised retransmit interval is 0 (unspecified)
ND router advertisements are sent every 200 seconds
ND router advertisements live for 1800 seconds
ND advertised default router preference is Medium
Hosts use stateless autoconfig for addresses.

Router 2# show ipv6 interface FastEthernet0/0


FastEthernet0/0 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::206:2AFF:FE15:BD01

DCC MANUAL BY BMM 135


No Virtual link-local address(es):
Global unicast address(es):
2001:AAAA:BBBB:CCCC:1234:1234:1234:1234, subnet
is 2001:AAAA:BBBB:CCCC::/64
Joined group address(es):
FF02::1
FF02::2
FF02::1:FF15:BD01
FF02::1:FF34:1234
MTU is 1500 bytes
ICMP error messages limited to one every 100 milliseconds
ICMP redirects are enabled
ICMP unreachables are sent
ND DAD is enabled, number of DAD attempts: 1
ND reachable time is 30000 milliseconds
ND advertised reachable time is 0 (unspecified)
ND advertised retransmit interval is 0 (unspecified)
ND router advertisements are sent every 200 seconds

ND router advertisements live for 1800 seconds


ND advertised default router preference is Medium
Hosts use stateless autoconfig for addresses.

Here, with ipv6 ping, there are some options that we can use. These are given below:

ping ipv6 [hostname | ip_address] [repeat repeat-count | size datagram-size | source


[interface-name | source-address]

▪ repeat : Ping packet count. The default ping repeat value is 5.


▪ size : Datagram size. The default value ping size is 56 bytes.
▪ source : Source Address of the ping. Default value is None.

DCC MANUAL BY BMM 136


So if we would like to send 10 IPv6 ping packet with 200 byte datagrams from
2001:AAAA:BBBB:CCCC:1234:1234:1234:1234 to
2001:AAAA:BBBB:CCCC:1111:2222:3333:4444, we will use the below command:
Router 2 # ping ipv6 2001:AAAA:BBBB:CCCC:1111:2222:3333:4444 repeat 10 size 200
source 2001:AAAA:BBBB:CCCC:1234:1234:1234:1234

Manual Link Local Address Configuration


To configure a Link Locak address manually, we use “ipv6 address link-local ipv6-
address” command. Here, we should write an IPv6 address in the range of Link Local
addresses. If you would like to learn more about a Link Local Address, you can check Link
Local Address lesson.

Let’s configure GigabitEthernet0/1 interface of Router 1 with Link Local


Address FE80::AAAA:BBBB:CCCC:DDDD. Here, there is no need to write a prefix
length but we will add link-local keyword at the end of the command.

Router 1 (config)# interface FastEthernet0/1


Router 1 (config-if)# ipv6 address FE80::AAAA:BBBB:CCCC:DDDD link-local
Router 1 (config-if)# end

Let’s check the manually configure ipv6 Link-Local address with “show ipv6 interface
brief” command.

Router 1# show ipv6 interface brief


FastEthernet0/0 [up/up]
FE80::2E0:B0FF:FE0E:7701
2001:AAAA:BBBB:CCCC:2E0:B0FF:FE0E:7701
FastEthernet0/1 [administratively down/down]
FE80::AAAA:BBBB:CCCC:DDDD
Vlan1 [administratively down/down]
unassigned

DCC MANUAL BY BMM 137


Auto IPv6 Address Configuration

IPv6 Addresses can be configured automatically. This is one of the most important
characteristics coming with IPv6. For IPv6 Auto configuration, we will use “ipv6 address
autoconfig” command. Let’s use it on Router 2 on GigabitEthernet0/1.

Router 2 (config)# interface FastEthernet0/1


Router 2 (config-if)# ipv6 address autoconfig
Router 2 (config-if)# end

This type of IPv6 address configuration is Sateless Auto Configuration.


Let’s check the Autoconfigured Link-Local ipv6 address with “show ipv6 interface brief”
command.

Router 2# show ipv6 interface brief


FastEthernet0/0 [up/up]
FE80::206:2AFF:FE15:BD01
2001:AAAA:BBBB:CCCC:1234:1234:1234:1234
FastEthernet0/1 [up/down]
FE80::206:2AFF:FE15:BD02
Vlan1 [administratively down/down]
unassigned

Let’s ping from Router 2 to Router 1 to test this second interfaces’ ipv6 connection.

Router 2# ping ipv6 FE80::AAAA:BBBB:CCCC:DDDD


Output Interface: FastEthernet0/1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to FE80::AAAA:BBBB:CCCC:DDDD, timeout is 2
seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/1 ms
DCC MANUAL BY BMM 138
Enable DHCPv6 Client

To enable DHCPv6 Client function on an interface, we use “ipv6 address dhcp” command
under this interface. With this command, interface gets its IPv6 address form the DHCPv6
server. Let’s enable DHCPv6 on GigabitEthernet0/2 of Router 2.

Router 1 (config)# interface FastEthernet0/1


Router 1 (config-if)# ipv6 address dhcp
Router 1 (config)# end

To verify DHCPv6 enabled interfaces, we can use “show ipv6 dhcp interface” command.

Router 1 # show ipv6 dhcp interface

IPv6 Verification Commands

To verify IPv6 Configuration, we can use different show commands. These IPv6 show
commands are given below

▪ To check IPv6 interface configuration and status we use “show ipv6


interface interface-id”.

Router 1# show ipv6 interface FastEthernet0/0


FastEthernet0/0 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::2E0:B0FF:FE0E:7701
No Virtual link-local address(es):
Global unicast address(es):
2001:AAAA:BBBB:CCCC:2E0:B0FF:FE0E:7701, subnet is 2001:AAAA:BBBB:CCCC::/64
[EUI]
Joined group address(es):
FF02::1
FF02::2
DCC MANUAL BY BMM 139
FF02::1:FF0E:7701
MTU is 1500 bytes
ICMP error messages limited to one every 100 milliseconds
ICMP redirects are enabled
ICMP unreachables are sent
ND DAD is enabled, number of DAD attempts: 1
ND reachable time is 30000 milliseconds
ND advertised reachable time is 0 (unspecified)
ND advertised retransmit interval is 0 (unspecified)
ND router advertisements are sent every 200 seconds
ND router advertisements live for 1800 seconds
ND advertised default router preference is Medium
Hosts use stateless autoconfig for addresses.

▪ To check IPv6 neighbor cache entries we use “show ipv6 neighbors”.

Procedure-2
Packet Tracer - Configuring IPv6 Addressing

Topology

DCC MANUAL BY BMM 140


Addressing Table

Device Interface IPv6 Address/Prefix Default Gateway

G0/0 2001:DB8:1:1::1/64 N/A


G0/1 2001:DB8:1:2::1/64 N/A
R1
S0/0/0 2001:DB8:1:A001::2/64 N/A
Link-local FE80::1 N/A
Sales NIC 2001:DB8:1:1::2/64 FE80::1
Billing NIC 2001:DB8:1:1::3/64 FE80::1
Accounting NIC 2001:DB8:1:1::4/64 FE80::1
Design NIC 2001:DB8:1:2::2/64 FE80::1
Engineering NIC 2001:DB8:1:2::3/64 FE80::1
CAD NIC 2001:DB8:1:2::4/64 FE80::1

Work divided into 4 parts:


Part 1: Configure IPv6 Addressing on the Router
Part 2: Configure IPv6 Addressing on Servers
Part 3: Configure IPv6 Addressing on Clients
Part 4: Test and Verify Network Connectivity

Background
In this activity, you will practice configuring IPv6 addresses on a router, servers, and clients. You will also practice
verifying your IPv6 addressing implementation.

Part 1: Configure IPv6 Addressing on the Router


Step 1: Enable the router to forward IPv6 packets.
a. Enter the ipv6 unicast-routing global configuration command. This command must be
configured to enable the router to forward IPv6 packets. This command will be discussed in a
later semester.
R1(config)# ipv6 unicast-routing

Step 2: Configure IPv6 addressing on GigabitEthernet0/0.


a. Click R1 and then the CLI tab. Press Enter.
b. Enter privileged EXEC mode.
c. Enter the commands necessary to transition to interface configuration mode for
GigabitEthernet0/0.
d. Configure the IPv6 address with the following command:
R1(config-if)# ipv6 address 2001:DB8:1:1::1/64

DCC MANUAL BY BMM 141


e. Configure the link-local IPv6 address with the following command:
R1(config-if)# ipv6 address FE80::1 link-local
f. Activate the interface.

Step 3: Configure IPv6 addressing on GigabitEthernet0/1.


a. Enter the commands necessary to transition to interface configuration mode for
GigabitEthernet0/1.
b. Refer to the Addressing Table to obtain the correct IPv6 address.
c. Configure the IPv6 address, the link-local address and activate the interface.

Step 4: Configure IPv6 addressing on Serial0/0/0.


a. Enter the commands necessary to transition to interface configuration mode for Serial0/0/0.
b. Refer to the Addressing Table to obtain the correct IPv6 address.
c. Configure the IPv6 address, the link-local and activate the interface.

Part 2: Configure IPv6 Addressing on the Servers


Step 1: Configure IPv6 addressing on the Accounting Server.
a. Click Accounting and click the Desktop tab > IP Configuration.
b. Set the IPv6 Address to 2001:DB8:1:1::4 with a prefix of /64.
c. Set the IPv6 Gateway to the link-local address, FE80::1.

Step 2: Configure IPv6 addressing on the CAD Server.


Repeat Steps 1a to 1c for the CAD server. Refer to the Addressing Table for the IPv6 address.

Part 3: Configure IPv6 Addressing on the Clients

Step 3: Configure IPv6 addressing on the Sales and Billing Clients.


a. Click Billing and then select the Desktop tab followed by IP Configuration.
b. Set the IPv6 Address to 2001:DB8:1:1::3 with a prefix of /64.
c. Set the IPv6 Gateway to the link-local address, FE80::1.
d. Repeat Steps 1a through 1c for Sales. Refer to the Addressing Table for the IPv6 address.

Step 4: Configure IPv6 Addressing on the Engineering and Design Clients.


a. Click Engineering and then select the Desktop tab followed by IP Configuration.
b. Set the IPv6 Address to 2001:DB8:1:2::3 with a prefix of /64.

DCC MANUAL BY BMM 142


c. Set the IPv6 Gateway to the link-local address, FE80::1.
d. Repeat Steps 1a through 1c for Design. Refer to the Addressing Table for the IPv6 address.

Part 4:Test and Verify Network Connectivity


Step 5: Open the server web pages from the clients.
a. Click Sales and click the Desktop tab. Close the IP Configuration window, if necessary.
b. Click Web Browser. Enter 2001:DB8:1:1::4 in the URL box and click Go. The Accounting
website should appear.
c. Enter 2001:DB8:1:2::4 in the URL box and click Go. The CAD website should appear.
d. Repeat steps 1a through 1d for the rest of the clients.

Step 6: Ping the ISP.


a. Open any client computer configuration window by clicking the icon.
b. Click the Desktop tab > Command Prompt.
c. Test connectivity to the ISP by entering the following command:
PC> ping 2001:DB8:1:A001::1
d. Repeat the ping command with other clients until full connectivity is verified.

XII Resources used

Sr. Instrument /Components Specification Quantity


No.

XIII Actual procedure followed

DCC MANUAL BY BMM 143


XIV Precautions followed (use blank sheet provided if space not sufficient)

XV Observations (use blank sheet provided if space not sufficient):

XVI Result

XVII Practical Related Questions


Note: Below given are few sample questions for reference. Teacher must design more such
questions so as to ensure the achievement of identified CO.
1. Name the various IPV6 network simulator for Windows operating system.
2. Compare IPV4 and IPV6.
3. Draw IPV6 Packet Header format
[Space for Answers]

DCC MANUAL BY BMM 144


DCC MANUAL BY BMM 145
Practical No. 17: Setting up a wireless network
I. Practical Significance:
The Internet is a really powerful tool. It gives us access to all kinds of information at a moment's
notice—think email, Google search, and Wikipedia. So there's something a little counterintuitive about
only being able to use the Internet when you sit down at a desktop computer. If you already have high-
speed (broadband) Internet service at your house, it's pretty easy to create your own home wireless
network. Commonly known as Wi-Fi, a wireless network allows you to connect laptops, smartphones,
and other mobile devices to your home Internet service without an Ethernet cable.

II. Relevant Program Outcome (PO)

PO2 – Discipline knowledge


PO3 – Experiments and practice
PO8 – Individual and team work
P10 – Life long Learning

III. Competency and Practical Skills :

The aim of this course is to help the student to attain the following industry identified
competency through various teaching learning experiences:
Maintain computer network systems.
Able to setting up the modem and internet connection
IV. Relevant Course Outcomes :
Analyze the transmission errors with respect to IEEE standards.
Configure different TCP/IP services.

V. Practical Outcomes :

Setting up a wireless network.

VI. Relevant Affective Domain related Outcomes :

• Follow safety practices.


• Handle network components carefully.
• Demonstrate as a team leader/a team member.
• Follow ethical practices.
VII. Minimum Theoretical Background :

A wireless network at home lets you get online from more places in your house. This article describes
the basic steps for setting up a wireless network and starting to use it.

DCC MANUAL BY BMM 146


Get the right equipment

Before you can set up your wireless network, here’s what you’ll need:

Broadband Internet connection and modem. A broadband Internet connection is a high-speed


Internet connection. Digital Subscriber Line (DSL) and cable are two of the most common broadband
connections. You can get a broadband connection by contacting an Internet service provider (ISP).
Typically, ISPs that provide DSL are telephone companies and ISPs that provide cable are cable TV
companies. ISPs frequently offer broadband modems. Some ISPs also offer combination
modem/wireless routers. You can also find these at computer or electronics stores, and online.

Wireless router. A router sends info between your network and the Internet. With a wireless router,
you can connect PCs to your network using radio signals instead of wires. There are several different
kinds of wireless network technologies, which include 802.11a, 802.11b, 802.11g, 802.11n, and
802.11ac.

Wireless network adapter. A wireless network adapter is a device that connects your PC to a wireless
network. To connect your portable or desktop PC to your wireless network, the PC must have a
wireless network adapter. Most laptops and tablets—and some desktop PCs—come with a wireless
network adapter already installed.

VIII Resources required

Instrument /Components Specification Quantity


Sr.
No.

1 Personal computers with Standard computers 5


wireless network adapter

2 Wi-Fi supported Modem Wi-Fi supported 1

IX Precautions to be Followed
• Check that PC has wireless network adapter.
• Check that modem is Wi-Fi supported.

X Procedure

To check whether your PC has a wireless network adapter:

1. Select the Start button, type device manager in the search box, and then select Device
Manager.
2. Expand Network adapters.
3. Look for a network adapter that might have wireless in the name.

DCC MANUAL BY BMM 147


Setting up the Modem and Internet connection

After you have all the equipment, you'll need to set up your modem and Internet connection. If your
modem wasn't set up for you by your Internet service provider (ISP), follow the instructions that came
with your modem to connect it to your PC and the Internet. If you're using Digital Subscriber Line
(DSL), connect your modem to a phone jack. If you’re using cable, connect your modem to a cable
jack.

Positioning the wireless router

Put your wireless router somewhere where it will receive the strongest signal with the least amount of
interference. For better results, follow these tips:

Place your wireless router in a central location. Place the router as close to the center of your home
as possible to increase the strength of the wireless signal throughout your home.

Position the wireless router off the floor and away from walls and metal objects, such as metal
file cabinets. The fewer physical obstructions between your PC and the router's signal, the more likely
that you'll be using the router's full signal strength.

Reduce interference. Some networking equipment uses a 2.4 gigahertz (GHz) radio frequency. This
is the same frequency as most microwaves and many cordless phones. If you turn on the microwave
or get a call on a cordless phone, your wireless signal might be temporarily interrupted. You can avoid
most of these issues by using a cordless phone with a higher frequency, such as 5.8 GHz.

Securing your wireless network

Security is always important; with a wireless network, it's even more important because your network's
signal could be broadcast outside your home. If you don't help secure your network, people with PCs
nearby could access info stored on your network PCs and use your Internet connection.

To help make your network more secure:

Change the default user name and password. This helps protect your router. Most router
manufacturers have a default user name and password on the router and a default network name
(also known as the SSID). Someone could use this info to access your router without you knowing it.
To help avoid that, change the default user name and password for your router. See the documentation
for your device for instructions.

Set up a security key (password) for your network. Wireless networks have a network security key
to help protect them from unauthorized access. We recommend using Wi-Fi Protected Access 2
(WPA2) security if your router supports it. See the documentation for your router for more detailed
info, including what type of security is supported and how to set it up.

DCC MANUAL BY BMM 148


Some routers support Wi-Fi Protected Setup (WPS). If your router supports WPS and it’s connected
to the network, follow these steps to set up a network security key:

1. Do one of the following, depending on which version of Windows is running on your PC:
▪ In Windows 7 or Windows 8.1, select Start, start typing Network and Sharing
Center, and then choose it in the list.
▪ In Windows 10, select Start , then select Settings > Network &
Internet > Status > Network and Sharing Center.

2. Select Set up a new connection or network.


3. Select Set up a new network, then choose Next.

The wizard will walk you through creating a network name and a security key. If your router supports
it, the wizard will default to Wi-Fi Protected Access (WPA or WPA2) security. We recommend that
you use WPA2, because it offers better security than WPA or Wired Equivalent Privacy (WEP)
security. With WPA2 or WPA you can also use a passphrase, so you don’t have to remember a cryptic
sequence of letters and numbers.

Write down your security key and keep it in a safe place. You can also save your security key on a
USB flash drive by following the instructions in the wizard. (Saving your security key to a USB flash
drive is available in Windows 8 and Windows 7, but not in Windows 10.)

Use a firewall. A firewall is hardware or software that can help protect your PC from unauthorized
users or malicious software (malware). Running a firewall on each PC on your network can help
control the spread of malicious software on your network, and help protect your PCs when you're
accessing the Internet. Windows Firewall is included with this version of Windows. (Verify that your
PC’s software firewall is turned on, and that Window’s file-sharing feature is off; it’s off by default in
Window’s XP with Service Pack 2.)

Connect a PC to your wireless network

1. Select the Network or icon in the notification area.


2. In the list of networks, choose the network that you want to connect to, and then
select Connect.
3. Type the security key (often called the password).
4. Follow additional instructions if there are any.

XI Resources used

Sr. Instrument /Components Specification Quantity


No.

1 Personal computers with Standard computers 5


wireless network adapter

DCC MANUAL BY BMM 149


2 Wi-Fi supported Modem Wi-Fi supported 1

XII Actual procedure followed


Student shall write procedure:

XIII Precautions followed (use blank sheet provided if space not sufficient)

XIV Observations (use blank sheet provided if space not sufficient):


1. Routing table contains……………………..

2. Wireless networking, or Wi-Fi, can be used to connect computers in a home, and many cities are
using technologies to offer free or low cost internet access to residents, what is another name for Wi-
Fi?

3. How to enter into the router’s setting page?

XV Results

XVI Conclusions and Recommendations (Actions/decisions to be taken based on the interpretation


of results)

DCC MANUAL BY BMM 150


XVII Practical Related Questions
Note: Below given are few sample questions for reference. Teacher must design more such
questions so as to ensure the achievement of identified CO.
1. How to change your router’s Wi-Fi password as ‘Pass@4321’
2. How do you secure a wireless network?
3. Who are the providers of Wi-Fi and what are the assets available for wireless?
4. What is Wi-Fi technology and over which frequency band it operates?
[Space for Answers]

DCC MANUAL BY BMM 151


DCC MANUAL BY BMM 152

You might also like