DCC Lab Manual Final Practicals PDF
DCC Lab Manual Final Practicals PDF
Stands for "Peer to Peer." In a P2P network, the "peers" are computer systems which are
connected to each other via the Internet. Files can be shared directly between systems on
the network without the need of a central server. In other words, each computer on a P2P
network becomes a file server as well as a client.
V. Practical Outcomes :
• Configure peer to peer networks with at least three hosts .
In a peer-to-peer network, all computers have the same rights. Each computer can act as a client
and as a server.
X Precautions to be Followed
• Locate the various ports on the computer before making connections
• Make the connections with care
• Handle equipment with care
• Configure settings carefully to avoid conflict.
XI Procedure
1. The two computers are connected to each other using UTP cables as shown in the block schematic.
2. Name the three computers as Computer-A, Computer-B & Computer-C.
• Check the computer name settings for each PC and make adjustments as necessary. For
each Computer/PC, select Start and Control Panel.
• Double-click the System icon, and then click the Computer Name tab.
• Write the name of the computers as Computer-A, Computer-B, Computer-C on respective
machines
5. Configure IP settings
• Configure the logical addresses for the two PCs so that they are able to communicate using
TCP/IP. On one of the PCs, go to the Control Panel, double click the Network Connections
icon, and then right click the connected Local Area Connection icon. Choose Properties from
the pull-down menu.
• Using the scroll bar in the Local Area Connection Properties window, scroll down to
highlight
• Click OK, which will close the Internet Protocol (TCP/IP) Properties window. Click the Close
button to exit the Local Area Connection Properties window.
• Repeat steps 5 for the second PC using the following information:
NOTE: To test TCP/IP connectivity between the PCs, Windows Firewall must be disabled
temporarily on all PCs.
• On Computer-A, on the Windows desktop, click Start. From the Start menu, select Control
Panel, and double-click Network Connections.
• Right-click the Local Area Connection icon and select Properties. Click the Advanced tab.
Locate and click the Settings button.
• The ping command is a simple way to accomplish this task. The ping command is included
with the Windows operating system.
• On Computer-A, go to Start, then Run. Type cmd, and then click OK. A Windows
command prompt window will appear as shown in the figure below.
• At the > prompt, type ping 192. 168.1.2 and press Enter. A successful ping will verify the IP
connectivity. It should produce results similar to those shown
• Repeat Steps 6 on Computer-B. The second PC will ping 192. 168.1.1
• Repeat Steps 6 on Computer-C. The second PC will ping 192. 168.1.3
• Close the Windows command prompt window on both PCs. Step 7: Verify connectivity
using My Network Places
XIV Precautions followed (use blank sheet provided if space not sufficient)
XVI Result
1. The packets/file sent by………………….. are received by the Computer-B
2. Folders can be shared from Computer-B to ……………………………………..
The practical will enable students to prepare patch chords (Straight and crossover).
V. Practical Outcomes :
• Configure peer to peer networks with at least three hosts.
• Cable is one way of transmission media which can transmit communication signals
and data. The wired network typology uses special type of cable to connect computers
on a network. There are several types of cables as below:
a) Block Diagram
• LAN Tester:
Testers helps / assist in the installation and control of networks. LAN testers can determine IP
addresses; identify polarity, connected port and link connectivity. Even they can test fiber optic cables.
They also show cable break points, incorrect connections in fiber optic lines.
VIII a) Ethernet Cable Color Coding Diagram for Straight and Crossover cables:
• Student shall draw straight and cross-over cables wires sequence with coloured sketch-pens or Pencils
shown in Fig 2.7
X Precautions to be Followed
• Select proper specification of cables and connectors as per networking parameters need.
• Use a good quality crimping tool along with quality connectors.
• Arrange colour codes properly straightened neatly, fully pressed to connect to connectors for
correct connection (properly crimped) to avoid error n trouble in establishing connection.
There's a reason you need eye-protection: when cutting the copper wires, they can go flying
and potentially get your eye! Be smart, be safe!
XI Procedure
For Straight Cable:
1. Inspect available cable segment as per Straight cable sequence shown in Fig.2.4
2. Strip one end of Cable using cable stripper
3. Arrange the sequence of wires as given in Fig. 2.4 for Straight Cable
4. Push the Wires carefully in the RJ-Connector, Take precaution these shall not be bend
5. Align the connector with crimping tool proper and Crimp/Press the Connector with wire.
6. Follow this for other end as per cable type.
7. Test the cable using LAN tester.
8. Patch chord is ready
XIV Precautions followed (use blank sheet provided if space not sufficient)
Personal Computer
Switch/Hub
6. Enlist the network components in your lab and give use of four).
7. Name type of cable is used in networking of laboratory?
8. State the type of topology used in laboratory?...................….
V. Practical Outcomes :
Configure peer to peer networks with at least three hosts .
Packet Tracer Packet Tracer is a powerful network simulator that can be utilized to create
networks with an almost unlimited number of devices and to experience troubleshooting
without having to buy real Cisco routers or switches. The tool is created by Cisco Systems. The
purpose of Packet Tracer is to provide a tool to learn the principles of networking. Packet tracer
allows us to create network by just dragging and dropping devices and connection to specific
port of the devices so that necessary configuration shall be performed on each device and test
as per the requirement. Group of computers are connected to switch and are assigned IP
addresses of same network in which each computer in the network are directly reachable.
Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco
Systems. Packet Tracer (PT) is a powerful and dynamic tool that displays the various protocols
used in networking, in either Real Time or Simulation mode. This includes layer 2 protocols
such as Ethernet and PPP, layer 3 protocols such as IP, ICMP, and ARP, and layer 4 protocols
such as TCP and UDP. Routing protocols can also be traced.
X Precautions to be Followed
• Handle computers with care.
• Use the network tools with care
XI Procedure
Physical formation of Star Topology
1. Power ON the computers that are to be connected in Star topology and confirm whether
operating system is installed and NIC card is connected
2. Consider a central device such as a switch or hub for the above connection.
3. Take Ethernet cables and connect one end of the cable to port of the switch or hub and
connect to computer's NIC port.
4. The lights of the switch or hub and computer's NIC port should turn on.
5. This is the physical formation of star topology.
XIV Precautions followed (use blank sheet provided if space not sufficient)
MAC address
IP Address
Wireless communication is the transfer of information or power between two or more points
that are not connected by an electrical conductor. The most common wireless technologies
use radio waves. With radio waves distances can be short, such as a few meters for Bluetooth or
as far as millions of kilometers for deep-space radio communications.
1. The aim of this course is to help the student to attain the following identified competency through
various teaching learning experiences:
• Maintain data communication and computer network.
IV Relevant Course Outcomes:
Before you can set up your wireless network, here’s what you’ll need:
Wireless router. A router sends info between your network and the Internet. With a wireless router,
you can connect PCs to your network using radio signals instead of wires. There are several different
DCC MANUAL BY BMM 26
kinds of wireless network technologies, which include 802.11a, 802.11b, 802.11g, 802.11n, and
802.11ac.
Wireless network adapter. A wireless network adapter is a device that connects your PC to a wireless
network. To connect your portable or desktop PC to your wireless network, the PC must have a
wireless network adapter. Most laptops and tablets—and some desktop PCs—come with a wireless
network adapter already installed.
X Precautions to be Followed
• Make sure the computer has wireless adapter
• Make the connections with care
• Handle equipment with care
• Setup security key for your network
XI Procedure:
1. Select the Start button, type device manager in the search box, and then select Device
Manager.
2. Expand Network adapters.
3. Look for a network adapter that might have wireless in the name.
After you have all the equipment, you'll need to set up your modem and Internet connection. If your
modem wasn't set up for you by your Internet service provider (ISP), follow the instructions that
came with your modem to connect it to your PC and the Internet. If you're using Digital Subscriber
Line (DSL), connect your modem to a phone jack. If you’re using cable, connect your modem to a
cable jack.
Put your wireless router somewhere where it will receive the strongest signal with the least amount
of interference. For better results, follow these tips:
Place your wireless router in a central location. Place the router as close to the center of your
home as possible to increase the strength of the wireless signal throughout your home.
Position the wireless router off the floor and away from walls and metal objects, such as metal
file cabinets. The fewer physical obstructions between your PC and the router's signal, the more
likely that you'll be using the router's full signal strength.
or get a call on a cordless phone, your wireless signal might be temporarily interrupted. You can
avoid most of these issues by using a cordless phone with a higher frequency, such as 5.8 GHz.
Security is always important; with a wireless network, it's even more important because your network's
signal could be broadcast outside your home. If you don't help secure your network, people with PCs
nearby could access info stored on your network PCs and use your Internet connection.
Change the default user name and password. This helps protect your router. Most router
manufacturers have a default user name and password on the router and a default network name
(also known as the SSID). Someone could use this info to access your router without you knowing it.
To help avoid that, change the default user name and password for your router. See the documentation
for your device for instructions.
Set up a security key (password) for your network. Wireless networks have a network security key
to help protect them from unauthorized access. We recommend using Wi-Fi Protected Access 2
(WPA2) security if your router supports it. See the documentation for your router for more detailed
info, including what type of security is supported and how to set it up.
Some routers support Wi-Fi Protected Setup (WPS). If your router supports WPS and it’s connected
to the network, follow these steps to set up a network security key:
1. Do one of the following, depending on which version of Windows is running on your PC:
▪ In Windows 7 or Windows 8.1, select Start, start typing Network and Sharing
Center, and then choose it in the list.
▪ In Windows 10, select Start , then select Settings > Network &
Internet > Status > Network and Sharing Center.
2. Select Set up a new connection or network.
3. Select Set up a new network, then choose Next.
4. The wizard will walk you through creating a network name and a security key. If your router
supports it, the wizard will default to Wi-Fi Protected Access (WPA or WPA2) security. We
recommend that you use WPA2, because it offers better security than WPA or Wired
Equivalent Privacy (WEP) security. With WPA2 or WPA you can also use a passphrase, so
you don’t have to remember a cryptic sequence of letters and numbers.
5. Write down your security key and keep it in a safe place. You can also save your security
key on a USB flash drive by following the instructions in the wizard. (Saving your security key
to a USB flash drive is available in Windows 8 and Windows 7, but not in Windows 10.)
6. Use a firewall. A firewall is hardware or software that can help protect your PC
from unauthorized users or malicious software (malware). Running a firewall on each PC on
your network can help control the spread of malicious software on your network, and help
protect your PCs when you're accessing the Internet. Windows Firewall is included with this
version of Windows.
XIV Precautions followed (use blank sheet provided if space not sufficient)
The aim of this course is to help the student to attain the following industry identified
competency through various teaching learning experiences:
Analyze error detection/correction and flow control of data in the data network.
V. Practical Outcomes :
Locate the error bit in the given data stream by applying the different error detection methods.
VI. Relevant Affective Domain related Outcomes:
Checksum
In checksum error detection scheme, the data is divided into k segments each of m bits. In the
sender’s end the segments are added using 1’s complement arithmetic to get the sum. The sum
is complemented to get the checksum. The checksum segment is sent along with the data
segments. At the receiver’s end, all received segments are added using 1’s complement
arithmetic to get the sum. The sum is complemented. If the result is zero, the received data is
accepted; otherwise the received data is discarded.
#include <stdio.h>
#include<conio.h>
void main()
{int i,f[20,n[50],divi[50],j,temp,quotient[20],z[10];
clrscr();
printf("enter the number\n")
for(i=0;i<8;i++)
{
scanf("%d",&n[i]);
}
printf("enter the divisor\n");
for(i=0;i<4;i++)
{
scanf("%d",&div[i]);
}
for(i=8;i<12;i++)
{
n[i]=0;
}
for(i=8;i,12;i++)
{
n[i]=0;
}
}
quotient[i]=1;
}
else
quotient[i]=0;
}
printf("\nthe quotient is \n");
for(i=0;i<8;i++)
printf("%d",quotient[i]);
for(j=0;j<4;j++)
printf("%d",f[j]);
getch()
}
X. Precautions:
• Selection of any drive for installation must be done carefully so as not to delete any useful data
or partition,
XI. Procedure:
Note: The sample code is given in C programming. The teacher may conduct this experiment
in any other simulation tool.
2 Complier Turbo C 1
Note: Below given are few sample questions for reference. Teacher must design more such questions
so as to ensure the achievement of identified CO.
1. For the bit sequence 101000 and the generator polynomial used is x3 +1, determine the
data transmitted.
2. Consider the bit sequence 1101110, determine the parity bit for Odd Parity and for even
Parity
3. For the bit sequence 110101, 101010, 100100, 111100, determine the checksum.
Bluetooth is a wireless technology standard for exchanging data over short distances using short-
wavelength UHF radio waves in the ISM band from 2.400 to 2.485 GHz from fixed and mobile
devices, and building personal area networks (PANs). It was originally conceived as a wireless
alternative to RS-232 data cables. One thing keeps skipping people's attention is Bluetooth. Before
portable hotspot and Wi-Fi tethering was a thing, which is shared in phone internet using Personal
Area Networks, also called Bluetooth Tethering. This experiment will help the students to setup
Personal Area Network, Bluetooth.
This practical is expected to develop the following skills for the industry identifiedcompetency
Maintain mobile communication systems.
V. Practical Outcomes :
Build a Personal Area Network of mobile devices using Bluetooth.
A personal area network (PAN) is a computer network for interconnecting devices centered
on an individual person's workspace. A PAN provides data transmission amongst devices
such as computers, smartphones, tablets and personal digital assistants. PANs can be
used for communication amongst the personal devices themselves, or for connecting to
a higher level network and the Internet where one master device takes up the role as
gateway. A PAN may be wireless or carried over wired interfaces such as USB.
A wireless personal area network (WPAN) is a PAN carried over a low-powered,
PICONET:
Bluetooth is a WPAn (Wireless Personal Area Network) open standard that provides an
adhoc way of connecting devices in the 10m range.
SCATTERNET:
Eight devices can be considered in a Bluetooth network called Piconet. One of them acts as
a master and other acts a slaves.
X Precautions to be Followed
• Check the battery status before connecting..
• Enter correct password for pairing
• Disconnect the connection after usage.
XI Procedure
(Note: This procedure may vary phone to phone)
(On the phone from where a person wants to transfer a file)
1. Go to Settings
2. Go to More
3. Select Tethering & Portable hotspot option
4. Select Bluetooth Tethering.
5. Wait for the receiver to connect to network.
6. The file will automatically transfer to another phone.
I. Practical Significance :
In computing, a shared resource, or network share, is a computer resource made available
from one host to other hosts on a computer network. It is a device or piece of information on a
computer that can be remotely accessed from another computer, typically via a local area
network or an enterprise intranet, transparently as if it were a resource in the local machine.
Network sharing is made possible by inter-process communication over the network. The
term file sharing traditionally means shared file access, especially in the context of operating
systems and LAN and Intranet services, for example in Microsoft Windows documentation.
II. Relevant Program Outcome (PO)
The aim of this course is to help the student to attain the following identified competency
through various teaching learning experiences:
• Maintain data communication and computer network.
V. Practical Outcomes :
• Share Printer and folder in a network and transfer a file from one computer to another.
Printer sharing is the process of allowing multiple computers and devices connected to the
same network to access one or more printers. Each node or device on the network can print to
any shared printer and, to some extent, make changes to the printer settings, depending on the
permissions set by the administrator for each user.If a printer is attached to a computer that
supports printer sharing, the computer can share that printer with other computers on the same
network. It does not matter whether the shared printer is old or new, as long as it is properly
installed in one computer it can be shared by that computer. The sharing is facilitated by the
OS, which handles the communication between computers and devices within the network
and the printer itself.
Printers are Output devices used to prepare permanent Output devices on paper. Printers can be
divided into two main categories :
Impact Printers : In this hammers or pins strike against a ribbon and paper to print the text. This
mechanism is known as electro-mechanical mechanism.
Non-Impact Printers : There printers use non-Impact technology such as ink-jet or laser technology.
There printers provide better quality of O/P at higher speed.
X. Precautions to be followed:
XI. Procedure :
FAT32 does not provide the same level of security as NTFS; if you're using FAT32, you will
not see the Security tab.
7. Click OK.
To share a printer:
1. Navigate to a search field. Enter two backslashes, the name of the computer, another
backslash, and then the name of the share or printer. For example, if the name of the
computer is bl-iub-threepio.ads.iu.edu and the name of the share is r2d2, type:
\\bl-iub-threepio.ads.iu.edu\r2d2
2. Click OK.
If you need to repeatedly access a shared folder or network drive, you can map to it. Mapping creates
a persistent link to the share, allowing you to double-click its icon in My Computer whenever you
want access.
XIV. Precautions followed (use blank sheet provided if space not sufficient)
XVI. Results
XV. Exercise
Note: Below given are few sample questions for reference. Teacher must design more such
questions so as to ensure the achievement of identified CO.
1. Give short note on Printer Sharing?
2. What are the various types of printer?
3. Advantages of Computer network sharing.
Technical skills
IV. Relevant Course Outcomes :
V. Practical Outcomes :
• Selection of any drive for installation must be done carefully so as not to delete any useful data
or partition,
XI. Procedure:
XIV Precautions followed (use blank sheet provided if space not sufficient)
XV. Observations
Windows:
1. Every drive must be ……………………. Before use.
2. A product key is a ………………………….. used to activate windows.
3. Indian Language supported in Windows installation: …………………….(specify for your
Windows version)
4. Time zone chosen:…………………………………..
5. Keyboard chosen:…………………………..
6. File format chosen:………………………..
Linux:
1. A product key is a ………………………….. used to activate windows.
2. Linux is ………………………. Source operating system.
3. Indian Language supported in Windows installation: …………………….(specify for your
Windows version)
4. Time zone chosen:…………………………………..
5. Keyboard chosen:…………………………..
6. File format chosen:………………………..
Windows:
1. Is any partition automatically created during installation? If yes, mention size.
2. Name Formatting options displayed and chosen
3. State information about number and size of partitions created. Mention File system.
4. Name Windows Operating system with its specifications.
Linux:
5. How many partitions were created. Name them. State their size.
6. Name formatting options displayed and chosen.
7. Mention Linux File systems.
8. Name Linux Operating system installed with its specifications.
9. State if product key is compulsory in Linux?
[Space for Answers]
V. Practical Outcomes :
Installation, configuration and manage the most common roles and features in Windows server
VI. Relevant Affective Domain related Outcomes :
In computing, a file server (or fileserver) is a computer attached to a network that provides a location
for shared disk access, i.e. storage of computer files (such as text, image, sound, video) that can be
accessed by the workstations that are able to reach the computer that shares the access through a
computer network.
1. Storage
Since the crucial function of a file server is storage, technology has been developed to operate
multiple disk drives together as a team, forming a disk array. A disk array typically has cache
DCC MANUAL BY BMM 61
(temporary memory storage that is faster than the magnetic disks), as well as advanced functions like
RAID and storage virtualization.
2. Network-attached storage
Network-attached storage (NAS) is file-level computer data storage connected to a computer network
providing data access to a heterogeneous group of clients. NAS devices specifically are distinguished
from file servers generally in a NAS being a computer appliance – a specialized computer built from
the ground up for serving files – rather than a general purpose computer being used for serving files
(possibly with other functions).
3. Security
File servers generally offer some form of system security to limit access to files to specific users or
groups. In large organizations, this is a task usually delegated to directory services, such as
openLDAP, Novell's eDirectory or Microsoft's Active Directory.
IX. Precautions :
• Create the operating system media, if you do not already have a DVD with Windows Server
2012 R2; however, if you download it, be sure to copy the product key, because you will need it
for the installation.
• Download Windows Server 2012 R2 from Microsoft and save it onto your hard drive.
• Make a backup copy of the .iso file by copying it onto a DVD from the hard disk.
• Observe that with these Windows Setup options, you choose either first time install or repair
an existing operating system.
DCC MANUAL BY BMM 63
• Click Install now to display the product key request.
• Take note that if you are using a DVD from a textbook, you may not need a key.
• Type the installation key.
• Click Next so you can choose the operating system version to install.
5 Select the OS version to install.
• Notice that depending on the DVD you are using, you may see a slightly different set of options.
However, regardless of which DVD, Windows Server 2012 R2 Server Cores is the default.
• Select Windows Server 2012 R2 Standard (GUI installation), with the arrow key or mouse.
• Review the notes for these options because they are very different; upgrade lets you upgrade a
qualified Windows OS. Whereas with custom, you can install the OS on a newly created space.
• Click Custom to manage disk space and display the disk configuration.
• Highlight where you would like to install the operating system; you can use the arrow key, or
mouse.
• Click Next to display Installing Windows screen followed by password Settings.
8 Create password.
• Note that this action, display the password prompt, will depend on the installed environment,
real or virtual.
DCC MANUAL BY BMM 64
• Click Ctrl+Alt+Delete to display the password prompt.
• Observe that this is the password you created earlier.
• Type the password for Administrator.
• Click the arrow to display Networks so you can tell setup how to configure network parameters.
• Configure network visibility is needed even if you plan to isolate the server; your intentions
must be know to network settings.
• Click Yes so your computer is visible to other network devices.
• These steps demonstrate how to configure TCP/IP settings, which are needed to verify network
connectivity with another machine, such as Windows 7.
• Click Minimize to minimize Server Manager, which is displayed when the OS completes
booting.
• Notice that when Server Manager is minimized, you will see the Recycle Bin and Taskbar;
there are also menu items, such as Start, that are visible when the mouse is located at the bottom right.
• Move your mouse along the taskbar to the right and hover it to the right of the time and date;
this action displays a number of icons, and to see their names, such as Search, Start, and Settings move
the mouse straight up. If the icons are not shown, slightly move the mouse in any direction to display
them.
• Click Start to display its contents.
• Notice that items are shown in categories, but you can change how they are displayed.
• Click Network and Internet to display the screen containing their links.
• Notice there are two options, but only the first lets you configure the network
adapter.
• Click Network and Sharing Center to display its options.
6 Display Network Connections (Ethernet) Properties.
• Notice there are several options in the left pane, but your main interest is on the adapter settings.
• Click Change adapter settings to display Network Connections.
• Notice there are a number of protocol options for configuring network settings.
• Highlight Internet Protocol Version 4 (TCP/IPv4).
• Click Properties to display TCP/IP Properties.
• Notice that the default TCP/IPv4 configuration for network interface is DHCP client.
• Click Use the following IP address.
• Notice that the boxes are no longer grayed.
• Notice there are a number of textboxes, but to test connectivity, only the IP address and subnet
mask are needed.
• Type 172.16.150.10 in IP address field.
• Change the entry in Subnet mask to 255.255.255.0.
• Click OK.
1 Verify Connectivity.
• Display Start.
• Click the down arrow to display several Apps.ws
• Scroll right.
• Click the Command Prompt.
• Ping the second machine.
• From the second machine, ping the server.
2 Shutdown server.
• Display Start.
• Click Settings to display its contents.
• Click Power.
• Click Shutdown.
XIII Precautions followed (use blank sheet provided if space not sufficient)
XV. Results:
I. Practical Significance :
File server acts as dedicated system like as network attached storage (NAS) devices. This
dedicated server is commonly implemented in enterprise applications because they offer
fastest data access as well as offer higher storage capacity compare to non dedicated server.
II. Relevant Program Outcome (PO)
Technical skills
V. Practical Outcomes :
Manage the most common roles and features in Windows server and use the file services.
In computer network, file server is a super performing computer system that has responsible for
storing and fetching all types of files (audio file, images, video, database, and other documents), and
these files are used by all client machines which are linked over the network. A file server allows users
to transfer all files over the entire network without using any physical medium of file transfer such as
pen drive, floppy diskette or other external storage media. We can set up any computer as host that
plays role as a file server. In the other word, file server may be a simple computer system that has
File server acts as dedicated system like as network attached storage (NAS) devices. This
dedicated server is commonly implemented in enterprise applications because they offer fastest data
access as well as offer higher storage capacity compare to non dedicated server.
A network server helps to store all central data files, which are access by other connected network
users. This stored all data on the server eliminates all replication of all files over individual computers,
so it needs less disk storage space them. This server plays major role in the network servers and
other network operating system like as Windows NT, Novell Netware, UNIX, etc.
Today, file servers are more advance with using enlarge power supplies, various racks for
installation of multiple hard disks, and more advance cooling system. It likes
as Multiprocessor machines, and configured along with more memory unit compare to single user
computer system.
IX. Precautions :
There are different ways to share a folder in Server 2012. Most efficient way is to use the Server
Manager. Here, I will configure some shared folder from domain controller named MBG-DC1.
So, let’s setup some shared folders. To do so, open Server Manager. Click File and Storage
Services on the left pane. Then click Shares from the list. You will see the list of shared folders on
this server. As you can see below there are two folders, netlogon and sysvol shared by default. This
is because the server is AD DC.
We have a scenario. We want to share a folder named Marketing to Marketing users group. We
want only the marketing users to view and execute the contents of the folder. We already have
Marketing users group set up and assigned users into the group. So, let’s create the shared folder. To
create a new shared folder, click Tasks and click New share in Server Manager console.
New share wizard pops up. There are number of share profiles by default. You can choose any of
these share profiles as seen below. I will choose SMB Share – Quick and click Next.
Type the share name and description of the shared folder. Then click Next. Click OK to create the
new directory on path doesn’t exist warning.
Here, configure the folder permission. The shared folder have shared folder permission and NTFS
permission. These both permission work together to allow/deny users to access the shared folder.
Click disable inheritance. Then select convert inherited permission into explicit permissions on
this object.
Now the overall permission for the Marketing folder looks like this. Users of marketing group can
only read the files of Marketing folder.
The shared folder is now created. You can view the shared folder in Server Manager console.
In this way you can share a folder and access the shared folder contents.
XIII Precautions followed (use blank sheet provided if space not sufficient)
XV Results:
XVI. Exercise:
1. You have a server named Print1 that runs Windows Server 2012 R2. On Print1, you share a
printer named Printer1. You need to ensure that only the members of the Server Operators group,
the Administrators group, and the Print Operators group can send print jobs to Printer1.
What should you do?
2. You have a print server named Server1. You install a printer on Server1. You share the printer as
Printer1. You need to configure Printer1 to be available only from 19:00 to 05:00 every day. Which
settings from the properties of Printer1 should you modify?
DCC MANUAL BY BMM 80
3. What are the advantages of File Server?
[Space for Answers]
This practical is expected to develop the following skills for the industry identified competency
Maintain Computer Network systems
Assign IP address to computer.
V. Practical Outcomes :
Internet Protocol address (IP address) is a numerical label assigned to each device connected
to a computer network that uses the Internet Protocol for communication. An IP address serves
two main functions: host or network interface identification and location addressing. Internet
Protocol version 4 (IPv4) defines an IP address as a 32- bit number. However, because of the
growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6),
using 128 bits for the IP address, is developed. IP addresses are assigned to a host either
IX Precautions to be Followed
• Handle equipment with care
• Avoid the repeatation of similar IP addresses to two or more different PCs. It may cause IP
conflict error in networking.
• Try use address for same range for one computer network and preferably in sequence to
manage network easily
2. Click “ Change Adapter Settings”. Right Click “Local Area Connection” and then click on “
Properties”
XIII Precautions followed (use blank sheet provided if space not sufficient)
1. Avoid IP conflict.
2. Give ranges of addresses of same class of address.
XV Results
V. Practical Outcomes :
Installation, configuration and manage the most common roles and features in Windows server
DHCP is widely used in LAN environments to dynamically assign host IP addresses from a
centralized server, which significantly reduces the overhead of administration of IP addresses.
DHCP also helps conserve the limited IP address space because IP addresses no longer need to be
permanently assigned to hosts; only those hosts that are connected to the network consume IP
DCC MANUAL BY BMM 88
addresses. The DHCP server assigns IP addresses from specified address pools on a router or router
to DHCP clients and manages them.
VIII. Resources Required :
IX. Precautions :
X. Procedure :
Post-deployment Configuration
In this section, we will see how to do the post-deployment configuration of the DHCP. Please
follow the steps given below.
Step 1 − Click on the warning icon and then click on “Complete DHCP Configuration”.
Now we have to configure the service to make it useful for the computers. To do this, we need
to follow the steps given below.
Step 1 − Server Manager screen → Tools → DHCP.
XIII Precautions followed (use blank sheet provided if space not sufficient)
6. …………………………… Identifies with parts of the IP adddress belong to the network ID and
which parts belong to the host ID.
XV. Results:
XII. Exercise:
1.Explain what is the way to configure the DHCP server such that it allocates the same IP address to
certain devices each time the address is removed?
I. Practical Significance :
The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol
suite. It originated in the initial network implementation in which it complemented the Internet
Protocol (IP). Therefore, the entire suite is commonly referred to as TCP/IP. TCP
provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between
applications running on hosts communicating via an IP network.
V. Practical Outcomes :
● Run Basic TCP/IP Utilities And Network Coommands: ipconfig, ping, tracert, netstat,
pathping, route.
1. Ping
The PING utility tests connectivity between two hosts. PING uses a special protocol called
the Internet Control Message Protocol (ICMP) to determine whether the remote machine (website,
server, etc.) can receive the test packet and reply. Ping is the primary TCP/IP command used to
troubleshoot connectivity, reachability, and name resolution.
• To quickly obtain the TCP/IP configuration of a computer, open Command Prompt, and then
type ipconfig . From the display of the ipconfig command, ensure that the network adapter for
the TCP/IP configuration you are testing is not in a Media disconnected state.
• At the command prompt, ping the loopback address by typing ping 127.0.0.1
• Ping the IP address of the computer.
• Ping the IP address of the default gateway. If the ping command fails, verify that the default
gateway IP address is correct and that the gateway (router) is operational.
• Ping the IP address of a remote host (a host that is on a different subnet). If the ping command
fails, verify that the remote host IP address is correct, that the remote host is operational, and
that all of the gateways (routers) between this computer and the remote host are operational.
• Ping the IP address of the DNS server. If the ping command fails, verify that the DNS server
IP address is correct, that the DNS server is operational, and that all of the gateways (routers)
between this computer and the DNS server are operational.
Syntax:
ping [/t] [/a] [/n <count>] [/l <size>] [/f] [/I <TTL>] [/v <TOS>] [/r <count>] [/s <count>] [{/j
<hostlist> | /k <hostlist>}] [/w <timeout>] [/R] [/S <Srcaddr>] [/4] [/6] <targetname>
2. Tracert
This diagnostic tool determines the path taken to a destination by sending Internet Control Message
Protocol (ICMP) echo Request or ICMPv6 messages to the destination with incrementally
counter. When the TTL on a packet reaches 0, the router is expected to return an ICMP time
Exceeded message to the source computer.
Syntax:
tracert [/d] [/h <maximumhops>] [/j <hostlist>] [/w <timeout>] [/R] [/S <srcaddr>] [/4][/6]
<targetname>
Command: tracert www.google.com
3. Netstat
Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the
IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics
(for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols). Used without parameters,
this command displays active TCP connections.
Syntax:
netstat [-a] [-b] [-e] [-n] [-o] [-p <Protocol>] [-r] [-s] [<interval>]
Command: netstat
Netstat provides statistics for the following:
• CLOSE_WAIT
• CLOSED
• ESTABLISHED
• FIN_WAIT_1
• FIN_WAIT_2
• LAST_ACK
• LISTEN
• SYN_RECEIVED
• SYN_SEND
• TIMED_WAIT
Syntax:
netstat [-a] [-e] [-n] [-o] [-p Protocol] [-r] [-s] [Interval]
Command: netstat
4. IPConfig
Displays all current TCP/IP network configuration values and refreshes Dynamic Host
Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without
parameters, ipconfig displays Internet Protocol version 4 (IPv4) and IPv6 addresses, subnet mask,
and default gateway for all adapters.
Syntax:
ipconfig [/allcompartments] [/all] [/renew [<adapter>]] [/release [<adapter>]]
[/renew6[<adapter>]] [/release6 [<adapter>]] [/flushdns] [/displaydns] [/registerdns] [/showclassid
<adapter>] [/setclassid <adapter> [<classID>]]
Command: ipconfig
pathping is an interesting command that's unique to Windows. It's sort of a cross between the ping
command and the tracert command, combining the features of both into one tool. When you run
pathping, it first traces the route to the destination address much the way tracert does. Then, it launches
into a 25-second test of each router along the way, gathering statistics on the rate of data loss to each
hop. If the route has a lot of hops, this can take a long time. However, it can help you to spot potentially
unreliable hops. If you're having intermittent trouble reaching a particular destination, using pathping
may help you pinpoint the problem.
The following command output is typical of the pathping command. (Using an -n switch causes the
display to use numeric IP numbers only, instead of DNS host names. Although fully qualified host
names are convenient, they tend to be very long for network routers, which makes the pathping output
very difficult to decipher.)
Syntax: pathping [/n] [/h <maximumhops>] [/g <hostlist>] [/p <Period>] [/q <numqueries> [/w
<timeout>] [/i <IPaddress>] [/4 <IPv4>] [/6 <IPv6>][<targetname>]
For a computer with more than one interface and that's configured to work as a router, the routing table
is often a major source of trouble. Setting up the routing table properly is a key part of configuring a
router to work. Earlier tracert command is used to trace the travel of packet from source to destination
over a network. This command is capable to modify routing table entries hence the route command is
established. To display the routing table (both IPv4 and IPv6) in Windows, use the route print
command.
For each entry in the routing table, five items of information are listed:
• The destination IP address Actually, this is the address of the destination subnet, and must be
interpreted in the context of the subnet mask.
• The subnet mask that must be applied to the destination address to determine the
destination subnet
• The IP address of the gateway to which traffic intended for the destination subnet will be
sent
• The IP address of the interface through which the traffic will be sent to the destination
subnet
• The metric, which indicates the number of hops required to reach destinations via the
gateway
Syntax: route [/f] [/p] [<command> [<destination>] [mask <netmask>] [<gateway>] [metric
<metric>]] [if <interface>]]
Command: Route print
IX. Procedure :
1. Start Command Prompt
2. Type each network commands and utilities on it one by one.
3. Observe output of each command.
XII. Precautions followed (use blank sheet provided if space not sufficient)
………………………………………………………………………………………………..
XIV. Results :
Wireshark captures network packets in real time and display them in human-readable format.
It provides many advanced features including live capture and offline analysis, three-pane
packet browser, coloring rules for analysis. This document uses Wireshark for the experiments,
and it covers Wireshark installation, packet capturing, and protocol analysis. Wireshark is a
free opensource network protocol analyzer. It is used for network troubleshooting and
communication protocol analysis.
The aim of this course is to help the student to attain the following industry identified
competency through various teaching learning experiences:
Maintain computer network systems.
Able to install Wireshark and use it to track the network packets.
Also, able to examine the network security problems.
IV. Relevant Course Outcomes :
Wireshark is an open-source packet analyzer, which is used for education, analysis, software
development, communication protocol development, and network troubleshooting.
Background
This background section briefly explains the concept of TCP/IP network stack to help you better
understand the experiments. TCP/IP is the most commonly used network model for Internet services.
Because its most important protocols, the Transmission Control Protocol (TCP) and the Internet
Protocol (IP) were the first networking protocols defined in this standard, it is named as TCP/IP.
However, it contains multiple layers including application layer, transport layer, network layer, and
data link layer.
Application Layer: The application layer includes the protocols used by most applications for
providing user services. Examples of application layer protocols are Hypertext Transfer Protocol
(HTTP), Secure Shell (SSH), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol
(SMTP).
Internet Layer: The Internet layer is responsible for sending packets to across networks. It has two
functions: 1) Host identification by using IP addressing system (IPv4 and IPv6); and 2) packets routing
from source to destination. The examples of Internet layer protocols are Internet Protocol (IP), Internet
Control Message Protocol (ICMP), and Address Resolution Protocol (ARP).
Link Layer: The link layer defines the networking methods within the scope of the local network link.
It is used to move the packets between two hosts on the same link. An common example of link layer
protocols is Ethernet.
IP Addresses: It was designed for the devices to communicate with each other on a local network or
over the Internet. It is used for host or network interface identification. It provides the location of the
host and capacity of establishing the path to the host in that network. Internet Protocol is the set of
predefined rules or terms under which the communication should be conducted. The types of IP
addresses are IPv4 and IPv6.
o IPv4 is a 32-bit address in which each group represents 8 bits ranging from 0 to 255.
o IPv6 is a 128-bit address.
IP addresses are assigned to the host either dynamically or static IP address. Most of the private users
have dynamic IP address while business users or servers have a static IP address. Dynamic address
changes whenever the device is connected to the Internet.
Computer Ports: The computer ports work in combination with the IP address directing all outgoing
and incoming packets to their proper places. There are well-known ports to work with like FTP (File
Transfer Protocol), which has port no. 21, etc. All the ports have the purpose of directing all packets
in the predefined direction.
Protocol: The Protocol is a set of predefined rules. They are considered as the standardized way of
communication. One of the most used protocol is TCP/IP. It stands for Transmission Control
Protocol/ Internet Protocol.
OSI model: OSI model stands for Open System Interconnect. OSI model has seven layers,
namely, Application layer, Presentation layer, Session layer, Transport layer, Network layer,
Data link layer, and the physical layer. OSI model gives a detail representation and explanation of
the transmission and reception of data through the layers. OSI model supports both connectionless and
connection-oriented communication mode over the network layer. The OSI model was developed by
ISO (International Standard Organization).
IX Precautions to be Followed
• Download and install the OS supported version only.
• Check that your installed version is supported and updated.
X Procedure
Below are the steps to install the Wireshark software on the computer:
The above arrow shows the packet content written in hexadecimal or the ASCII format. And the
information above the packet content, are the details of the packet header. It will continue listening to
all the data packets, and you will get much data. If you want to see a particular data, then you can click
on the red button. The traffic will be stationary, and you can note the parameters like time, source,
destination, the protocol being used, length, and the Info. To view in-depth detail, you can click on that
particular address; a lot of the information will be displayed below that.
You can also select the connection to which your computer is connected. For example, in this PC, we
have chosen the current network, i.e., the ETHERNET.
Wireshark is a packet sniffing program that administrators can use to isolate and troubleshoot problems
on the network. It can also be used to capture sensitive data like usernames and passwords. It can also
be used in wrong way (hacking) to ease drop.
Packet sniffing is defined as the process to capture the packets of data flowing across a computer
network. The Packet sniffer is a device or software used for the process of sniffing.
Apply the filter by the name 'http.' After the filter is applied, the screen will look as:
Open the browser. In this example, we have opened the 'Internet Explorer.' You can choose any
browser.
As soon as we open the browser, and type any address of the website, the traffic will start showing,
and exchange of the packets will also start. The image for this is shown below:
XI Resources used
3. _____________ are programs or devices that capture the vital information from the target network
or particular network.
4. Select ……………………… option on the menu bar and select 'Coloring Rules’.
XV Results
Access control in Windows is the process of authorizing users, groups, and computers to access objects
on the network or computer. Key concepts that make up access control are permissions, ownership of
objects, inheritance of permissions, user rights, and object auditing.
The aim of this course is to help the student to attain the following industry identified
competency through various teaching learning experiences:
Maintain computer network systems.
Able to granting access to files or folder.
Also, able to setting permissions to users.
IV. Relevant Course Outcomes :
In many cases, you will need to change the permissions that a certain group or individual user has to a
file or folder. For example, you can designate a special folder on the W: drive within your department's
area called "Incoming" as a place where students can turn in their work. To do this, you would first
need to create a new folder on the W: drive. By default, the new folder will have the same permissions
as the parent folder, which would not allow students to submit their work, and may not allow students
to even access the folder. You would then need to allow students access to the new folder, and set
permissions for the folder. When you set permissions, you are specifying what level of access students
DCC MANUAL BY BMM 118
have to the folder and its files and what students can do within that folder such as save, delete, or read
files.
Background
IX Precautions to be Followed
• Check that operating system is installed.
X Procedure
Create a New Folder
In many cases you will need to create a new folder. If you are using an existing folder and do not wish
to create a new folder, continue with Accessing the Properties Dialog Box.
1. Click on the Start menu.
2. Click Computer.
3. From the Computer window, select the shared drive for your area or department (S Drive or W
Drive).
4. Navigate to the location you want the new folder to appear (e.g., within one of your existing folders).
5. On the menu bar, select New Folder.
OR
Right click » select New » select Folder.
A new folder is created which inherits the security permissions of its "parent."
6. In the newly created folder, type the desired folder name.
7. Press [Enter] or click off of the folder.
5. In the Enter the object names to select text box, type the name of the user or group that will have
access to the folder (e.g., 2125.engl.498.001 or [email protected]).
HINT: You may type the beginning of the name and then click Check Names. The name will either
be resolved or a list of users beginning with those characters will display for you to select from.
6. Click OK.
The Properties dialog box reappears.
7. Click OK on the Security window.
8. Continue with Setting Permissions below.
Setting Permissions
Once you have granted a group or individual user access to a folder, you will need to set permissions
for the new user(s). When you set permissions, you are specifying what level of access a user(s) has to
the folder and the files within it. Be careful about checking Deny for any permissions, as the Deny
permission overrides any other related to Allow permissions.
Folder permissions can be changed only by the owner of the folder (i.e., the creator) or by someone
who has been granted permission by the owner. If you are not the owner of the folder or have not been
granted permission by the owner, all checkboxes will be gray. Therefore, you will not be able to make
any changes until the owner grants you permission.
1. Access the Properties dialog box.
2. Select the Security tab.
The top portion of the dialog box lists the users and/or groups that have access to the file or folder.
3. Click Edit
4. In the Group or user name section, select the user(s) you wish to set permissions for
5. In the Permissions section, use the checkboxes to select the appropriate permission level
6. Click Apply
7. Click Okay The new permissions are added to the file or folder.
8. In the Permissions section, use the checkboxes to set the appropriate permissions NOTE: If you
are not the owner of the folder or have not been granted permission by the owner, all checkboxes will
be gray. Therefore you will not be able to make any changes until the owner grants you permission to
do so.
9. From the Apply to: pull-down list, select what level you wish to apply these permissions to
10. Click OK
11. In the Advanced Security Setting dialog box, click OK
12. Click OK from the duplicate Advanced Security Settings
13. In the Properties dialog box, click OK
The new folder permissions are added for your specified user(s).
XIII Precautions followed (use blank sheet provided if space not sufficient)
XV Results
Benefits of IPv6
IPv6 benefits include:
• Supports source and destination addresses that are 128 bits (16 bytes) long
• Uses a link-local scope all-nodes multicast address
• Does not require manual configuration or DHCP.
• Uses host address (AAAA) resource records in DNS to map host names to IPv6 addresses.
• Uses Flow Label field to identify packet flow for quality of service (QoS) handling by
router.
• Uses Internet Control Message Protocol version 6 (ICMPv6) Router Solicitation and
Router Advertisement messages to determine the IP address of the best default gateway.
• There is a very large number of IPv6 addresses, since IPv6 addresses are 128-bit , unlike IPv4
addresses which are 32-bit.
• IPv6 has a simpler header – because there are no checksum bits as used in an IPv4 header.
For this reason, routers don’t need to calculate the checksum for every packet.
• There is Stateless address autoconfiguration in IPv6: – Hosts autoconfigure themselves with
IPv6 addresses.
• There is no need for NAT, since each device in an IPV6 network has a globally unique IPv6
address.
X. Procedure
Procedure-1
In this configuration lesson, we will follow the below IPv6 Configuration steps:
After going to the configuration mode with “configure terminal” command, to enable
IPv6 on a Cisco router, “ipv6 unicast-routing” command is used. With this Cisco command,
IPv6 is enabled globally on the router. This can be used before both interface configurations
and IPv6 Routing Protocol configurations.
After enabling IPv6 globally, we should enable IPv6 under the Interfaces. To enable IPv6
under an interface, we will use “ipv6 enable” command. Let’s enable IPv6 on two interfaces
of each router.
To configure an interface with EUI-64 format (Extended Unique Identifier), firstly we will
go under the interface, then we will use “ip address ipv6-address/prefix-length eui-64”
command. Here, our IPv6 address and prefix-length are 2001:AAAA:BBBB:CCCC::/64. The
real EUI-64 Global Unicast Address will be created with this address and MAC address after
IPv6 configuration.
Let’s check the IPv6 address that is created with EUI-64 format with “show ipv6 interface
brief” command.
Router 1# sho ipv6 interface brief
FastEthernet0/0 [up/up]
FE80::2E0:B0FF:FE0E:7701
2001:AAAA:BBBB:CCCC:2E0:B0FF:FE0E:7701
FastEthernet0/1 [up/up]
FE80::2E0:B0FF:FE0E:7702
Vlan1 [administratively down/down]
unassigned
IPv6 Ping
To check the connectivity between two node, we use ping. As IPv4, with IPv6, we also use
ping, but this time it is called IPv6 Ping. The format of IPv6 Ping is a little difference than
IPv4 Ping. These differences are the format of the used IP address and the used keywords.
With IPv6 Ping, “ping ipv6” keywords are used before the destination IPv6 address.
Here, with ipv6 ping, there are some options that we can use. These are given below:
Let’s check the manually configure ipv6 Link-Local address with “show ipv6 interface
brief” command.
IPv6 Addresses can be configured automatically. This is one of the most important
characteristics coming with IPv6. For IPv6 Auto configuration, we will use “ipv6 address
autoconfig” command. Let’s use it on Router 2 on GigabitEthernet0/1.
Let’s ping from Router 2 to Router 1 to test this second interfaces’ ipv6 connection.
To enable DHCPv6 Client function on an interface, we use “ipv6 address dhcp” command
under this interface. With this command, interface gets its IPv6 address form the DHCPv6
server. Let’s enable DHCPv6 on GigabitEthernet0/2 of Router 2.
To verify DHCPv6 enabled interfaces, we can use “show ipv6 dhcp interface” command.
To verify IPv6 Configuration, we can use different show commands. These IPv6 show
commands are given below
Procedure-2
Packet Tracer - Configuring IPv6 Addressing
Topology
Background
In this activity, you will practice configuring IPv6 addresses on a router, servers, and clients. You will also practice
verifying your IPv6 addressing implementation.
XVI Result
The aim of this course is to help the student to attain the following industry identified
competency through various teaching learning experiences:
Maintain computer network systems.
Able to setting up the modem and internet connection
IV. Relevant Course Outcomes :
Analyze the transmission errors with respect to IEEE standards.
Configure different TCP/IP services.
V. Practical Outcomes :
A wireless network at home lets you get online from more places in your house. This article describes
the basic steps for setting up a wireless network and starting to use it.
Before you can set up your wireless network, here’s what you’ll need:
Wireless router. A router sends info between your network and the Internet. With a wireless router,
you can connect PCs to your network using radio signals instead of wires. There are several different
kinds of wireless network technologies, which include 802.11a, 802.11b, 802.11g, 802.11n, and
802.11ac.
Wireless network adapter. A wireless network adapter is a device that connects your PC to a wireless
network. To connect your portable or desktop PC to your wireless network, the PC must have a
wireless network adapter. Most laptops and tablets—and some desktop PCs—come with a wireless
network adapter already installed.
IX Precautions to be Followed
• Check that PC has wireless network adapter.
• Check that modem is Wi-Fi supported.
X Procedure
1. Select the Start button, type device manager in the search box, and then select Device
Manager.
2. Expand Network adapters.
3. Look for a network adapter that might have wireless in the name.
After you have all the equipment, you'll need to set up your modem and Internet connection. If your
modem wasn't set up for you by your Internet service provider (ISP), follow the instructions that came
with your modem to connect it to your PC and the Internet. If you're using Digital Subscriber Line
(DSL), connect your modem to a phone jack. If you’re using cable, connect your modem to a cable
jack.
Put your wireless router somewhere where it will receive the strongest signal with the least amount of
interference. For better results, follow these tips:
Place your wireless router in a central location. Place the router as close to the center of your home
as possible to increase the strength of the wireless signal throughout your home.
Position the wireless router off the floor and away from walls and metal objects, such as metal
file cabinets. The fewer physical obstructions between your PC and the router's signal, the more likely
that you'll be using the router's full signal strength.
Reduce interference. Some networking equipment uses a 2.4 gigahertz (GHz) radio frequency. This
is the same frequency as most microwaves and many cordless phones. If you turn on the microwave
or get a call on a cordless phone, your wireless signal might be temporarily interrupted. You can avoid
most of these issues by using a cordless phone with a higher frequency, such as 5.8 GHz.
Security is always important; with a wireless network, it's even more important because your network's
signal could be broadcast outside your home. If you don't help secure your network, people with PCs
nearby could access info stored on your network PCs and use your Internet connection.
Change the default user name and password. This helps protect your router. Most router
manufacturers have a default user name and password on the router and a default network name
(also known as the SSID). Someone could use this info to access your router without you knowing it.
To help avoid that, change the default user name and password for your router. See the documentation
for your device for instructions.
Set up a security key (password) for your network. Wireless networks have a network security key
to help protect them from unauthorized access. We recommend using Wi-Fi Protected Access 2
(WPA2) security if your router supports it. See the documentation for your router for more detailed
info, including what type of security is supported and how to set it up.
1. Do one of the following, depending on which version of Windows is running on your PC:
▪ In Windows 7 or Windows 8.1, select Start, start typing Network and Sharing
Center, and then choose it in the list.
▪ In Windows 10, select Start , then select Settings > Network &
Internet > Status > Network and Sharing Center.
The wizard will walk you through creating a network name and a security key. If your router supports
it, the wizard will default to Wi-Fi Protected Access (WPA or WPA2) security. We recommend that
you use WPA2, because it offers better security than WPA or Wired Equivalent Privacy (WEP)
security. With WPA2 or WPA you can also use a passphrase, so you don’t have to remember a cryptic
sequence of letters and numbers.
Write down your security key and keep it in a safe place. You can also save your security key on a
USB flash drive by following the instructions in the wizard. (Saving your security key to a USB flash
drive is available in Windows 8 and Windows 7, but not in Windows 10.)
Use a firewall. A firewall is hardware or software that can help protect your PC from unauthorized
users or malicious software (malware). Running a firewall on each PC on your network can help
control the spread of malicious software on your network, and help protect your PCs when you're
accessing the Internet. Windows Firewall is included with this version of Windows. (Verify that your
PC’s software firewall is turned on, and that Window’s file-sharing feature is off; it’s off by default in
Window’s XP with Service Pack 2.)
XI Resources used
XIII Precautions followed (use blank sheet provided if space not sufficient)
2. Wireless networking, or Wi-Fi, can be used to connect computers in a home, and many cities are
using technologies to offer free or low cost internet access to residents, what is another name for Wi-
Fi?
XV Results