CN Lab Manual
CN Lab Manual
1.
Explore all ISP in your area/locality and select best internet ISP/plan based on cost and
performance.
An Internet service provider (ISP) is a company or an organization that lets your computer
connect to the World Wide Web. It provides customers access to one or more high-speed
Internet lines.
ISP across globe: Xfinity , Version , AT& T , Spectrum , RCN , Cox , Mediacom, HughesNet ,
Frontier , CenturyLink ,Viasat , Suddenlink Internet .
ISP in my locality , -Jio , jio fiber , airtel and airtel fibre , BSNL. Jio
plans
Airtel plans
BSNL plans
2. Test the download/upload speed in your computer/mobile phone and also check type,
bandwidth and ISP.
An internet speed test is a website or web application that measures a user’s internet
connection speed. It reports on:
• Upload speed
• Download speed
• Bandwidth
• Ping
• Jitter
• Packet loss
Bluetooth is a short-range wireless technology standard that is used for exchanging data
between fixed and mobile devices over short distances using UHF radio waves in the ISM
bands, from 2.402 GHz to 2.48 GHz, and building personal area networks (PANs).
Bluetooth works by using radio frequencies, rather than the infrared spectrum used by traditional
remote controls. As a result, Bluetooth eliminates the need not only for a wire connection but also for
maintaining a clear line of sight to communicate between devices.
WIFI
Wi-Fi is similar to Bluetooth in that it also usesradio wavesfor high-speed data transfer over short
distances without the need for a wire connection. Wi-Fi works by breaking a signal into pieces and
transmitting those fragments over multiple radio frequencies. This technique enables the signal to be
transmitted at a lower power per frequency and also allows multiple devices to use the same Wi-Fi
transmitter.
NFC
NFC tends to be more secure than Bluetooth, as it operates on a shorter range allowing for a more
stable connection. Therefore, NFC tends to be a better solution for crowded and busy places, where a
lot of different devices are trying to communicate with each other, creating signal interference.
WIFI Range
Wi-Fi IEEE 802.11 is used by very many devices from smartphones to laptops and tablets
to remote sensors, actuators televisions and many more. It is used as the main wireless
communications bearer in wireless LANs as well as for small home WLANs as well.
There are several frequency bands within the radio spectrum that are used for the Wi-Fi and
within these there are many channels that have been designated with numbers so they can
be identified.
Although many Wi-Fi channels and Wi-Fi bands are normally selected automatically by
home Wi-FI routers, for larger wireless LANs and systems it is often necessary to plan the
frequencies used. Using many Wi-Fi access points around a large building or area,
frequency planning is essential so that the best performance can be obtained from the
wireless LAN.
Range of Bluetooth
That's the measurement of data rate between network devices within your home or small
business network, also referred to as your LAN (Local Area Network—different from your
Internet bandwidth, or WAN (Wide Area Network) connection speed.
With the 802.11n standard, Wi-Fi became even faster and more reliable. It supported a maximum
theoretical transfer rate of 300 Mbps.
Throughput of Bluetooth :
data throughput represent the maximum amount of data that can be transferred between two
applications in a given time.
Protocol Event length Method Maximum data
throughput
NFC throughput :
NFC operates in unlicensed ISM frequency band of about 13.56 MHz. It supports data rate
of 106 Kbps , 212 kbps and 424 Kbps. NFC uses bandwidth of 14KHz to map data on the
RF carrier.
Infrastructure Ad hoc
Characteristics
1.SNIFF, HOLD and PARK modes of operation: These are the three power saving modes of
operation for Bluetooth devices which are connected to a piconet. These modes are used when
no data is to be transmitted.
i. SNIFF mode:
• The slave device listens to the piconet in this mode, but at a reduced rate. Thus reducing its
duty cycle.
• The SNIFF interval is programmable and depends on application.
• The master unit can put a slave unit into HOLD mode or a slave unit can demand to be put into
HOLD mode.
• Data transfer restarts instantly when units transition out of HOLD mode.
• The HOLD is used when connecting several piconets or managing a low-power device such as
temperature sensor.
• The device is still synchronized to the piconet but does not participate in traffic.
PARKED devices have given up their MAC address and occasionally listen to the traffic of the master
to resynchronize and check on broadcast messages. In the increasing order of power efficiency, the
SNIFF mode has higher duty cycle, followed by HOLD mode with a lower duty cycle, and PARK
mode with lowest duty cycle.
NFC devices are unique in that they support four modes of operation: reader/writer, peer-to-peer, card
emulation and wireless charging.
o In reader/writer mode, the NFC device is capable of reading NFC Forum-mandated tag
types, such as a tag embedded in an NFC smart poster. The reader/writer mode on the
RF interface is compliant with the ISO 14443 and FeliCa schemes.
o In Peer-to-Peer mode, two NFC devices can exchange data. For example, you can share
Bluetooth or WiFi link set-up parameters or you can exchange data such as virtual
business cards or digital photos. Peer-to-Peer mode is standardized on the ISO/IEC
18092 standard.
o In Card Emulation mode, the NFC device appears to an external reader much the same
as a traditional contactless smart card. This enables contactless payments and ticketing
by NFC devices without changing the existing infrastructure.
o In Wireless Charging mode, small IoT devices such as a Bluetooth headset, fitness
tracker or smartwatch can be charged with the contact-less transfer of up to1 W of
power.
Bluetooth technology makes our lives easier, but it doesn’t always work as seamlessly as we’d like.
Often, Bluetooth gadgets interfere with other devices – especially those that use the same frequency.
Interference can take many forms, making it that much more difficult to determine the source of the
problem. The following are among the most common sources of interference:
• Wi-Fi
• Phones with a Processing Speed of 2.4 and 5 GHz
• Satellite Dishes
• Microwaves
• Wireless Speakers
• Baby Monitors
In theory, interference should be rare, as the frequency for most devices is fairly weak. Unfortunately,
this phenomenon still occurs regularly. Because a myriad of causes can be at play, it helps to follow a
detailed troubleshooting process before declaring the situation hopeless. The following suggestions
may help:
• Move Bluetooth devices away from building materials that act as barriers. These include
metal, concrete, plaster, and brick.
• Avoid placing Bluetooth gadgets near microwaves or fluorescent lights. These use the same
frequency as Bluetooth devices and are therefore best avoided.
• Reboot your router and try a different channel. Depending on your router, channel surfing
may occur automatically – or manual selection may be required. If possible, try multiple
channels to determine if a particular option is a better fit. •Move devices closer to your
router. By altering your device’s placement, you could dramatically improve the strength of
your Wi-Fi connection.
Start by making sureBluetooth is actually enabledon your Windows PC. Just because the symbol is in
the taskbar doesn’t mean your Bluetooth radio is actually turned on.
If Bluetooth is enabled, switching it off and on again might resolve some underlying issues of which
you’re unaware.
To do this, click the notification icon in your Windows taskbar to access your quick settings. Click the
“Bluetooth” tile to turn it off. Once it goes gray, click it again to turn it back on.
If you aren’t keeping track of the battery level on your Bluetooth device, you might not even be aware
when it runs out of power.
Before you try a more serious solution, you might want to replace the batteries in your Bluetooth
device or charge it, and then try it again.
Restart Your PC
The best fixes are sometimes the easiest, and if you haven’t tried it already, give your PC a quick
restart.
ADVERTISEMENT
When you you wipe the slate clean, and clear out any idle processes or memory leaks.
It’s not a miracle fix, but it can rectify some issues with the hardware, so give it a go.
Take a moment to survey the area. How far away is your Bluetooth device from your PC? The bigger
the distance, the weaker the signal.
Move your device closer to your PC and see if it impacts the Bluetooth connectivity. If not, try (if
possible) to use your Bluetooth device in another location. You can also use third-party apps, like
theBennett Bluetooth Monitor, to check your Bluetooth’s signal strength.
Press “Windows
+ R”, then a Run box comes out. Input control panel and press Enter to open the control panel.
You can also type control panel in the search bar at the lower left of the screen and press Enter to
open the control panel.
Right click the Ethernet icon and select Status from the context menu.
Select Use the Following IP address: and type in the IP address, Subnet mask and Default gateway.
Click OK to apply the settings.
Use the table below to fill in the description of the Ethernet adapter and the Physical (MAC) Address:
8.Identify the NIC types in the PC that you are using. How do you explore different ways
to extract information about these NICs and how to activate and deactivate them.
9. Wired network vs Wireless network | Difference between Wired network and Wireless
network.
Following table compares Wired network vs Wireless network and mentions difference between wired
network and wireless network types.
10.If you want to communicate with the internet which is the most important task to
be done ? and how do you accomplish it?
Short for Network Interface Card, a NIC is also commonly referred to as a network adapter and is an
expansion card that enables a computer to connect to a network such as a home network and/or the
Internet using a Ethernet cable with a RJ-45 connector.
This section discuss the process of installing a Network Interface Card/Network Adapter.
4. Find an available Peripheral Component Interconnect (PCI) slot on the motherboard and
remove slot insert if one exists.
5. Carefully remove the network card from its static-proof plastic envelope, and slide it into
the slot.
6. Seat the card in the slot firmly with gentle pressure along the length of the card, especially
right about the slot itself.
7. Snugly, screw the card to the computer frame, but do not over tighten.
11.In Category View (vs. Classic View) click Performance and Maintenance.
18.If the text in the "Device Status" box says "This device is working properly.", then you
successfully installed the card and are finished.
19.If the text in the "Device status" box doesn't say "This device is working properly.", then
write down on a piece of paper what it says and continue with next step.
20.Click the Troubleshoot. Button and follow instructions. Double check you followed the
directions above. Install the most up to date device drivers.
To create a simple LAN connection between two PCs/Laptops, the only hardware requisite is an
Ethernet Crossover Cable. Ethernet Crossover Cables are easily available in the market.
5. Choose “Use the following IP Address” radio box and enter the following details
6. Click OK
7. Follow steps 1-4 on the other PC, and enter it’s IP & Subnet Mask as:
Workgroup Name
If both the PCs use the same Workgroup name “WORKGROUP” (by default), you may leave step 8
and
9.
8. Finally you’ll have set up a Workgroup name on both the PCs/Laptops. To do so, right-click My
Computer, click Properties, select the Computer Name tab and click Change and enter a name.
Remember, the name should be the *same* on both PCs.
Vista users, My Computer -> Properties. Under Computer name, click Change Settings.
Click Change button and enter a name. Remember, the name should be the *same* on both PCs.
GPT Bidar (115)
Computer Network 20CS33P (3 sem CS )
9. Click OK
10. Restart both the PCs
You can now share folder or play multiplayer games via LAN. To share a folder, right-click the folder
you wish to share and click Properties. Select Sharing tab and enable Sharingfor folder. Open
Network to access the files that are shared by the other PC.
To play multiplayer via LAN, all you need is a game that supports Multiplayer. Proceed with
Multiplayer mode, host a game and the other PC should join the game.
Setting a static IP can be natively done on Android. But the way to do it might be different on every
phone due to the manufacturer skin. We will see how to do it on Pixel3 and the process should be
similar on other phones as well. So head over to the Settings menu and tap on “Network & Internet”.
On top of the menu, you will see Wi-Fi, tap on it to get to the Wi-Fi Settings.
The network which you are connected to should be on top of the list. Tap on the settings icon beside
the Wi-Fi network name.
Once the pop-up opens, you will see IP settings at the bottom of the menu. The default option is
“DHCP”. Tap on it to change the IP configuration.
In almost all the Android version, you get the option to set static IP Address. For some rare older
Android versions, you can use a third-party app likeWiFi Static. It’s free and it doesn’t require ROOT.
To switch back to dynamic IP, repeat the same procedure and select “DHCP” from the IP settings
instead.
Hubs:
A hub is a device that operates only in the physical layer. Signals that carry information within a network
can travel a fixed distance before attenuation endangers the integrity of the data. A repeater (Hub) receives
a signal and, before it becomes too weak or corrupted, regenerates and retains the original bit pattern.
The repeater then sends the refreshed signal. In the past, when Ethernet LANs were using bus topology, a
repeater was used to connect two segments of a LAN to overcome the length restriction of the coaxial cable.
Today, Ethernet LANs use star topology. In a star topology, a repeater is a multiport device, often called a
hub, that can be used to serve as the connecting point and at the same time function as a repeater.
Switch:
Internet is a switched network in which a switch connects at least two links together. A switch needs to
forward data from a network to another network when required. The two most common types of
switched networks are circuit-switched and packet-switched networks.
A switched network consists of a series of interlinked nodes, called switches. Switches are devices capable
of creating temporary connections between two or more devices linked to the switch. In a switched network,
some of these nodes are connected to the end systems (computers or telephones, for example). Others are
used only for routing. Figure shows a switched network.
The end systems (communicating devices) are labelled A, B, C, D, and so on, and the switches are labeled I,
II, III, IV, and V. Each switch is connected to multiple links.
.
Step 4
Straighten the 4 pairs twisted wires and rank the wires between fingers
Step 5
Cut off about 0.5cm of the wires and keep the left wires neat
The left wires must be very neat, and easy to wire into the connectors Step
6
Be careful and make sure that the turns of the wires doesn’t misplace
If you have inserted cable into a RJ45 boot, after inserted the wire,please insert RJ45 boot into
connector, keep two claw to be inserted in the connector.
GPT Bidar (115)
Computer Network 20CS33P (3 sem CS )
Step 7
Crimp the RJ45 connectors to the cable
By using the crimping tool, and press hardly, make sure the contacts of the connectors entirely
connected with the wires
The Ethernet cables are categorized as Cat 5, Cat 5e, Cat 6, and UTP cable. Cat 5 cable can support a
10/100 Mbps Ethernet network while Cat 5e and Cat 6 cable to support Ethernet network running at
10/100/1000 Mbps.
Crossover Cable
Skip Ad
A Crossover cable is a type of CAT 5 where one end isT568A configuration and the other end as
T568BConfiguration. In this type of cable connection, Pin 1 is crossed with Pin 3, and Pin 2 is crossed
with Pin 6.
Crossover cable is used to connect two or more computing devices. The internal wiring of crossover
cables reverses the transmission and receive signals. It is widely used to connect two devices of the
same type: e.g., two computers or two switches to each other.
In regard to physical appearance, Crossover Ethernet cables are very much similar to regular Ethernet
cables. Still, they are different with regard to the order with which the wires are arranged. This type of
Ethernet cable is made to connect to network devices of the same kind over Ethernet directly.
Crossover cables are mostly used to connect two hosts directly.
KEY DIFFERENCES:
• Crossover cable, Pin 1 is crossed with Pin 3, and Pin 2 is crossed with Pin 6 while in
Straightthrough cable Pin connection is one to one.
• Straight-through cables are mainly used for connecting non-similar devices while crossover
cables are mostly used for connecting similar devices.
• Straight through cable connects a computer with a DSL modem while Crossover cable connects
Router to Router and Computer to Computer.
When to use Straight Through Cable?
Computer
to network switch/hub
Here are applications where you should use Crossover Cable:
Use of
Cross over cable- computer to computer
Router to Router
You can also connect it to the router’s LAN port to You can connect it to a router’s LAN port to a
switch/hub’s uplink port. a switch or hub’s regular port
Straight through cable connects a computer with a Crossover cable connects with a router’s cable or
DSL modem’s LAN port. LAN port with switch/hub normal port.
You should use straight-through cable when you You should use a crossover cable when you want
to connect two devices of different types. want to connect two devices of the same type.
It helps you connect a router’s WAN port to a cable You can connect two switches/hubs by using
or DSL modem’s LAN port. the normal port in both switches/hubs.
Straight-through cables are mainly used for While crossover cables are mostly used for connecting,
unlike devices. connecting like devices.
To connect the Xilinx® Zynq®hardware board to the development computer, you must configure an
available network connection on the development computer. Follow the steps outlined for your specific
operating system.
Windows
1. Open the Control Panel.
2. Set View by to Category.
3. Click Network and Internet.
4. Click Network and Sharing Center.
5. On the left pane, click Change adapter settings.
6. Right-click the local area network connection that is connected to the radio hardware and
select Properties.
o If an unused network connection is available, the local area connection appears as
Unidentified network.
o If you plan to reuse your network connection, select the local area connection that
you plan to use for the radio hardware.
o If you have only one network connection, check if you can connect wirelessly to the
existing local area network. If you can, you can use the network connection for the
radio hardware.
o You can use a pluggable USB to Gigabit Ethernet LAN adapter instead of a NIC.
The instructions are the same.
7. On the Networking tab of the Properties dialog box, clear all options except Internet
Protocol Version 4 (TCP/IPv4). Other services, particularly antiviral software, can cause
intermittent connection problems with the radio hardware.
8. Double-click Internet Protocol Version 4 (TCP/IPv4).
9. On the General tab, select Use the following IP Address.
10. The default IP address of the Xilinx Zynq hardware board is 192.168.1.101. The
development computer network connection must be on the same subnet as the hardware
board. To meet this requirement, a compatible IP address must be assigned to the
development computer network connection. Set the network IP address to 192.168.1.x,
where x is any number in the range 1 through 255, apart from 101.
11. Leave the subnet mask set to the default value of 255.255.255.0 and click OK.
Role in Education :
Packet Tracer allows students to design complex and large networks, which is often not feasible with
physical hardware, due to costs. Packet Tracer is commonly used by NetAcad students, since it is
available to them for free. However, due to functional limitations, it is intended by Cisco to be used
only as a learning aid, not a replacement for Ciscoroutersandswitches.[9]The application itself only has
a small number of features found within the actual hardware running a currentCisco IOSversion.
Significance of packet tracer:
Packet Tracer offers an effective, interactive environment for learning networking concepts and
protocols. Most importantly, Packet Tracer helps students and instructors create their own virtual
“network worlds” for exploration, experimentation, and explanation of networking concepts and
technologies.
Step 2:
Step 3:
Chose the end devices icon as shown on the Picher, and extract 4 desktops.
Notice: we can extract the devices which we need by click on it, after that drag it at the place
which we need.
Step 4:
Add switch device to connect between the desktops. We can extract the switch device from the
icon which it shown on the picture.
Step 5:
We can use the Cross-Over cable from connection icon, to connect each desktop to the switch.
Step 6:
Click on Cross-Over cable, then click on desktop (PC0), after that click on the switch.
Do this step with all desktops.
Step 7:
Step 8:
The IP address for (PC0) is 192.168.1.2, and the subnet mask is 255.255.255.0.
The IP address for (PC1) is 192.168.1.3, and the subnet mask is 255.255.255.0.
The IP address for (PC2) is 192.168.1.4, and the subnet mask is 255.255.255.0.
The IP address for (PC3) is 192.168.1.5, and the subnet mask is 255.255.255.0.
18.
Create/Model a simple ethernet network using 3 hosts and a switch, observe traffic
GPT Bidar (115)
Computer Network 20CS33P (3 sem CS )
.
behaviour in network and observe data flow of ARP broadcasts and pings
Objectives
• Develop an understanding of the basic functions of Packet Tracer.
• Create/model a simple Ethernet network using 3 hosts and a switch.
• Observe traffic behavior on the network.
• Observer data flow of ARP broadcasts and pings.
Part 1: Create a logical network diagram with 3 PCs and a switch.
During an activity, to ensure that the instructions always remain visible, click the “top” check box
in the instruction box window.
The bottom left-hand corner of the Packet tracer screen displays the icons that represent device
categories or groups, such as Routers, Switches, or End Devices.
Moving the cursor over the device categories will show the name of the category in the box. To
select a device, first select the device category. When the device category is selected, the options
within that category appear in the box next to the category listings. Select the device option that is
required.
1. Select End Devices from the options in the bottom left-hand corner. Drag and drop 3
generic PCs onto your design area.
2. Select Switch from the options in the bottom left-hand corner. Add a 2960 switch to your
prototype network by dragging it onto your design area.
3. Select Connections from the bottom left-hand corner. Choose a copper straight-through
cable type. Click the first host (PC0) and assign the cable to the FastEthernet0
connector. Click the switch (Switch0) and select a connection FastEthernet0/1 for PC0.
4. Repeat step c for PC1 and PC2. Select FastEthernet0/2 on the Switch0 for PC1 and
FastEthernet0/3 for PC2.
There should be green dots at both ends of each cable connection after the network has converged.
If not, double check the cable type selected.
Part 2: Configure host names and IP addresses on the PCs.
1. Click PC0. Select the Config tab. Change the PC Display Name to PC-A. Select
FastEthernet tab on the left and add 192.168.1.1 as the IP address and 255.255.255.0 as
the subnet mask. Close PC-A when done.
2. Click PC1. Select the Config tab. Change the PC Display Name to PC-B. Select
FastEthernet tab on the left and add 192.168.1.2 as the IP address and 255.255.255.0 as
the subnet mask. Close PC-B when done.
3. Click PC2. Select the Config tab. Change the PC Display Name to PC-C. Select
FastEthernet tab on the left and add 192.168.1.3 as the IP address and 255.255.255.0 as
the subnet mask. Close PC-C when done.
Part 3: Observe the flow of data from PC-A to PC-C by creating network traffic.
1. Switch to Simulation Mode in the bottom right-hand corner.
2. Click Edit Filter in the Edit List Filter area. In the event list filter, click All/None to
deselect every filter. Click Edit Filter. Select ARP and ICMP filters under IPv4 tab.
3. Select a Simple PDU by clicking the closed envelope in the upper toolbar. With the
envelop icon, click PC-A to establish the source. Click PC-C to establish the destination.
Note: Notice that two envelopes are now positioned beside PC-A. One envelop is ICMP,
while the other is ARP. The Event List in the Simulation Panel will identify exactly
which envelop represents ICMP and which represents ARP.
4. Select Play from the Play Controls in the Simulation Panel. You can speed up the
simulation using the Play Speed Slider. The Play Speed Slider is located below Play
19.
Build a simple peer-to-peer network and verify physical connectivity and Assign various IPv4
addresses to hosts and observe the effects on network communication.
• Go to the command prompt and ping all the PCs. Ex: ping 192.168.1.1
• Go to tool bar & take a packet (PDU) & place it into source device and mention the destination
device.
• We can start the simulation & we can see the message going from one PC to another PC.
20.Configure IP addresses of a network (real or simulated) and ping across to test and
troubleshoot.
• Click on PC, go to desktop and select IP configuration and assign IP address to all the individual
PCs.
• Go to the command prompt and ping all the PCs. Ex: ping 192.168.1.1
• Go to tool bar & take a packet (PDU) & place it into source device and mention the destination
device.
• We can start the simulation & we can see the message going from one PC to another PC.
• It is the process of dividing a network into two or more smaller networks. It increases the
network performance and routing efficiency.
• In class C network, the first three octets(24 bits) represents network address and the last octet (8
bits) represents the host address. Therefore the subnet address can be created by modifying the
bits of the last octet.
• When subnets are created, the number of subnets is a power of 2. The value of the exponent
gives the number of bits that represent the subnet mask.
• Click on the connection category and select Automatically choose connection type to connect
PC to Switch and switch to router
• Click on PC, go to desktop and select IP configuration and assign IP address to all the individual
PCs.
• Go to the command prompt and ping all the PCs. Ex: ping 192.168.1.1
For first Network
PC1 PC2 PC3
For Router
• Click on router
• Go to config
• Click on GigabitEthernet0/0
• Click the on check box in the right corner and assign IP Address : 192.168.1.4 And subnet
mask: 255.255.255.128
• Click on GigabitEthernet0/1
• Click the on check box in the right corner and assign IP Address : 192.168.1.132 And subnet
mask: 255.255.255.128
• Click on PC, go to desktop and select IP configuration and assign IP address to all the individual
PCs and a server.
• Go to tool bar & take a packet (PDU) & place it into source device (PC) and mention the
destination device (Server).
• We can start the simulation & we can see the message going from one PC to another Server.
PC1 PC2 PC3 Server
• Click on PC, go to desktop and select IP configuration and assign IP address to all the
individual PCs and a Routers
• Go to tool bar & take a packet (PDU) & place it into source device (PC) and mention the
destination device (Server).
• We can start the simulation & we can see the message going from one PC to another Server.
For Router
GPT Bidar (115)
Computer Network 20CS33P (3 sem CS )
• Click on router
• Go to config
• Click on Static and mention Network, Mask and Next Hop
Router1 Router2
• Click on PC/Laptop, select PC Wireless, click on connect, select Wireless Network Name and
click on connect and enter WEP Key, click on connect.
• Go to tool bar & take a packet (PDU) & place it into source device (PC) and mention the
destination device (Server).
• We can start the simulation & we can see the message going from one PC to another.
25. Create a client – server model in simulator and observe the client interaction between
the server and PC using packet tracer.
• Click on first server, select service tab, choose HTTP and edit the index,html file and write
welcome to Facebook and save the changes.
• Click on second server, select service tab, choose HTTP and edit the index,html file and write
welcome to Youtube and save the changes.
• Click on PC, goto Command prompt and ping all the IP address.
• Click on Third server (DNS), select service tab, choose DNS, Switch on the DNS Service and
Fill Resource Records which includes Name of the server and IP address of all servers and
click on add button.
Ex: Name: facebook.com
IP address: 192.168.1.101
Name: youtube.com
IP address: 192.168.1.102
• Click on PC go to web browser, in the URL type facebook.com or youtube.com and observe
the response
A) ipconfig
The “ipconfig” displays the current information about your network such as your your IP
and MAC address, and the IP address of yourrouter. It can also display information about
your DHCP and DNS servers. Let’s see the basic output of “ipconfig”:
Depending on your network connection type, you may see different output for different
connection. For example, if you are connected to the network using Ethernet (you plug in
your network cable to the RJ45 jack), you’ll see IP information in the “Ethernet adapter”
section. In our case we are connected to the WIFI (wireless) connection so we our
information there. In our case, the local IP (IPv4) of our computer is 192.168.8.103. We also
see the Subnet Mask (255.255.255.0) which we can use to find the network address. We also
see the Default Gateway IP (192.168.8.1), which is our router
However, we don’t see DHCP and DNS information. To see detailed IP information we can
use the “/all” switch together with “ipconfig” command (ipconfig /all).
This time there’s much more information present. The IP address, the Subnet Mask and and
the Default Gateway address is still here, but this time you can also see your DHCP server
and DNS server. In our case the DHCP IP address is the same as the router address, which
means that DHCP server is currently residing on the router. DNS server is also the same as
router address which means it is also DNS server.
The “ping” command ping command allows you to send a signal to another device, and if
that device is active, it will send a response back to the sender. The “ping” command is a
subset of the ICMP (Internet Control Message Protocol), and it uses what is called an “echo
request”. So, when you ping a device you send out an echo request, and if the device you
pinged is active or online, you get an echo response.
For example, if your local computer has Internet connectivity issues, you can try to ping
your router. If you get no response then you know that the router is what is giving you
problems. Let’s ping our router IP, which is 192.168.8.1 in our example, and let’s analyze
the the printout.
What happens is we send out four packets to the destination and the destination responds
back with the same four packets. We sent out 32 bytes of data and we got back 32 bytes of
data, and we got it back in 9 milliseconds average. From this we see that the device is alive
and see the connection stability (4 of 4 packets received). Let us ping www.google.com and
see what happens.
We got a similar printout, however, since we used domain name, we now see the resolved IP
address of www.google.com. We sent out 32 bytes of data but, because Google server is far
away it took 82 milliseconds to send and receive 4 packets from Google. We sent and
received 4 packets so the connection was stable. Finally let’s ping a device that doesn’t
exist.
Tracert :
This command lets you see all steps a packet takes to the destination. For example, if we send a
packet to www.google.com, it actually goes through a couple of routers to reach the destination.
The packet will first go to your router, and then it will go to all kinds of different routers before
it reaches Google servers. We can also use the term “hops” instead of routers. Let’s run the
command and see what kind of results we get.
We have traced the route to www.utilizewindows.com, and we’re getting a list of each of the
routers that we’re hitting. At the end we see the IP address for utilizewindows.com server so
the trace is complete. In our case we have 13 hops before we actually reached the intended
server. The first router that we hit was our own router (we can tell by the IP address
192.168.8.1). So what is the significance of this? Let’s say your home network was perfectly
GPT Bidar (115)
Computer Network 20CS33P (3 sem CS )
fine but there was a problem with some router in the between, for example with your ISP
router. If there’s any problems it will try to indicate what the problem is. It could say things
like “request timed out”, “destination unreachable” or similar. However, different messages
don’t necessarily mean that there is a real problem with the device. There are several
reasons why a “Request timed out” message may appear at the end of a trace route. This is
typically because a device doesn’t respond to ICMP or traceroute requests. Also, the device
firewall or other security device could be blocking the request.
nslookup :
The nslookup command will fetch the DNS records for a given domain name or an IP
address. Remember the IP addresses and domain names are stored in DNS servers, so the
nslookup command lets you query the DNS records to gather information.
Let’s say you wanted to know the IP address of www.utilizewindows.com. You could simply
type in nslookup and type in www.utilizewindows.com. Let’s analyze this printout.
The first two lines show you which DNS server was used to get these results. Our DNS
server happens to reside on our router, so our router is also our DNS server. The answer that
we got was the IP address of the www.utilizewindows.com server.
******************************************