Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
11 views93 pages

Computer Network Manual

The document outlines the process of executing a DHCP server using Cisco Packet Tracer, detailing the necessary steps for configuration and the theoretical background of DHCP. It also discusses encryption and decryption methods in network security, including symmetric and public key cryptography, with a focus on the RSA algorithm. The document serves as a guide for setting up DHCP servers and understanding network security principles.

Uploaded by

poojanighojkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views93 pages

Computer Network Manual

The document outlines the process of executing a DHCP server using Cisco Packet Tracer, detailing the necessary steps for configuration and the theoretical background of DHCP. It also discusses encryption and decryption methods in network security, including symmetric and public key cryptography, with a focus on the RSA algorithm. The document serves as a guide for setting up DHCP servers and understanding network security principles.

Uploaded by

poojanighojkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 93

Aim:-

Executing DHCP Server Using Simulator.


Software:-
PC with CISCO Packet Tracer, printer.
Theory:-
Information About Cisco Packet Tracer:

Packet Tracer offers an effective, interactive environment for learning networking concepts
and protocols. Most importantly, Packet Tracer helps students and instructors create their own
virtual “network worlds” for exploration, experimentation, and explanation of networking
concepts and technologies. This software is built by Cisco and can be used to practice
networking related labs virtually. Packet tracer is an excellent tool for having hands-on
experience on devices like Cisco Routers, Switches, HUB, and end devices like PC, Laptop,
Server, and many more.

Features of Cisco Packet Tracer:

Some of the key features of Packet Tracer are:

 E-learning
 Visualizing Networks
 Real-time and simulation mode
 Compatible on various platforms
 Support to all languages

Department of E&TC Engineering, SGOI COE, Belhe Page 73


DHCP: (Dynamic Host Configuration Protocol):-
DHCP configuration is performed on routers to assign an IP address, subnet mask, gateway
address ad DNS server address to the host systems. With this configuration, the dynamic IP
address is assigned, which enables the administrator to easily connect a new host in the
configured network.

How to Configure DHCP Server on a Cisco Router:-


Step 1:

A network topology is created in the Cisco Packet Tracer, which includes a router, a switch, and
three host systems connected to a network.

Department of E&TC Engineering, SGOI COE, Belhe Page 74


Step-2 :
Command Line Interface of the router is accessed and high-lighted commands are executed to
successfully configure the DHCP. At first, the „IP DHCP pool pool_name‟ command is executed.
After this, the network address is defined along with its subnet mask. And further, the „default-router
IP-address‟ command is used to define the default route address.
Step-3:
In this step, a range of IP addresses is excluded from the addresses defined in the subnet mask of the
DHCP pool. Excluded IP addresses will be not assignedto any host system in the network.

Step-4:
The interface of the router connected with the switch is assigned with the IP address defined as the
default router during the DHCP configuration. This route will be taken by the data packets to reach
their destination system. Also, the „no shutdown command is used to change the state of the
connectedinterface to up.

Step-5 :
A successful connection is established between all the devices connected in a network. In further
steps, host systems in the network are assigned with dynamic IP and default gateway address by the
DHCP service configured on the router.

Step-6 :
Desktop settings of a host system are accessed and the DHCP option is selected. DHCP request
forwarded by the system is acknowledged and IP address, associated subnet mask, and default
gateway address are assigned toit.

Step-7 :
To check the connectivity between the host systems, the „ping‟ command is used to exchange data
packets. All the data packets are successfully transferred,which ensures that a communication channel
is established.

Conclusion:-

Department of E&TC Engineering, SGOI COE, Belhe Page 75


Department of E&TC Engineering, SGOI COE, Belhe Page 76
Department of E&TC Engineering, SGOI COE, Belhe Page 77
Aim:-
Installation and configuring DHCP server.
Theory: -
Write IP classes & all the types of IP Address formats. Windows 2000 uses/installs as default
TCP/IP protocol. While in a small home network it is easy to assign manually the IP- addresses
(or use the Windows98/ME Auto-IP-configuration and / or the Windows2000 Auto- IP-
configuration), you will on an office network like to use the "comfort" of using a DHCP- server
to control and manage the distribution of IP-addresses. Like on Windows NT4, where the DHCP-
server is only available on NT4-Server and not with Windows NT4-workstation, the DHCP-
server is not included in windows2000 Professional, but only on the Windows 2000 Server
versions.:

Department of E&TC Engineering, SGOI COE, Belhe Page 1


Like with allother Server relatedcomponents, you can start the setup of the DHCP- server from
"Configure Your Server", which is part ofthe "Administrative Tools"

On the left side, expand on "Networking" , select "DHCP" and then start the "Windows
Component Wizard" :

Department of E&TC Engineering, SGOI COE, Belhe Page 2


To start the "Windows Component Wizard", you could also have used in the Control-Panel the
applet for "Add / Remove Programs" and selected to "Add / Remove Windows Components":

Select (click on) the line "Networking Services" and then click on the button "Details" :

Department of E&TC Engineering, SGOI COE, Belhe Page 3


Locate and select the line by placing the checkmark on : "Dynamic Host Configuration
Protocol (DHCP)", (other ite ms may already be selected), continue with "OK"

Back in the window of "Windows Component Wizard", continue now with "Next"

Department of E&TC Engineering, SGOI COE, Belhe Page 4


The system will rumble while configuring the network components. and then you are "Finished"

Department of E&TC Engineering, SGOI COE, Belhe Page 5


You will need to configure the DHCP-server before it can be used

After installing the DHCP-server, you will need to configure it before you can use it:

Select "DHCP" , which is part of the Windows menu "Administrative Tools". In the left plane,
you will see the name and IP-address of the DHCP-server.

After installation, a DHCP server is not authorized. Do not forget this later ! (see below)

You need to define the range of IP-addresses to be assigned (=distributed) by the DHCP-
server. A definition of a range of IP-addresses (with or without additional options) is called a
"Scope": select your DHCP-server and then either with a right-click or from the menu "Actions"
select to define a "New Scope":

Department of E&TC Engineering, SGOI COE, Belhe Page 6


Up comes the Wizard select "Next"

Department of E&TC Engineering, SGOI COE, Belhe Page 7


Define a name for your scope continue with "Next"

Department of E&TC Engineering, SGOI COE, Belhe Page 8


Define the range of IP-address and the subnet-mask. Select a range, which does not
include the IP-address of the server itself or any other device with a manually assigned IP-
address (like: network printers). Although you could exclude them in the next step, usually a
range is reserved for such manually assigned addresses and then the rest (in this case: 100 - 199 )
is given to the DHCP-server for automatic distribution.

If you could not define separate ranges for manually assigned and DHCP-assigned IP-
addresses, then you could here define IP-addresses or ranges of IP-addresses to be excluded: not
to be used by the DHCP-server.

Department of E&TC Engineering, SGOI COE, Belhe Page 9


Typically, an IP-address is assigned (= "leased" ) for a limited time. This avoid running
out of addresses, when visitors to you office connect to the network and get an IP-address
assigned. Without a time-limit, such an IP-address could not be reused. usually, 8 days is a
good choice and will ensure that people every day in the office will continue to use the same IP-
address once assigned to them, since their systems will in time extend the "lease". And if they
come back from a 2 week vacation and the "lease" has expired, then the DHCP-server will assign
a new IP- address to them.

In addition to the IP-address and Sub-Netmask, a DHCP-server can also be use to define
other TCP/IP configuration items on the Client systems.

Department of E&TC Engineering, SGOI COE, Belhe Page 10


Is your office network part of a larger company Wide-Area network (WAN )? Then you need to
configure the client computers with the IP-address of the Gateway (or Router) to be able to
communicate with systems on the WAN. Enter the IP-address and then click on "Add" to enter
the address to the list of Gateways.

Are you using a WAN and need to help your clients to locate the IP-addresses of servers
(like WebServers) on the WAN? Or do you intend to have clients connected to the
Windows2000 server via the new: "Active Directory" method? Then you must configure the
clients for use of a DNS-server. Enter the name of your server and the IP-address and click on
"Add" to enter the value on the list.

Department of E&TC Engineering, SGOI COE, Belhe Page 11


You can also configure the WINS server address

You need to activate the scope, (which you can do later with a right-click on the scope and
selecting: "Activate"/"Deactivate"

Department of E&TC Engineering, SGOI COE, Belhe Page 12


Finished.

You still have to "Authorize" the DHCP-server: select the server and either right-click or from
the menu "Action" select "Authorize" :

Note: on my system, I had to close now the DHCP-windows and open it up again to see, that the
DHCP-server is now "Running" :

Department of E&TC Engineering, SGOI COE, Belhe Page 13


A quick check on the "Scope Options", which we have configured already:

Department of E&TC Engineering, SGOI COE, Belhe Page 14


If required, you can change or add the options of the scope.You can configure in the "Properties"
of the scope, tab: DNS, that once the DHCP-server has assigned an IP-address the address will be
updated in the DNS-server, allowing now other systems on the network to locate your system:

Once the DHCP-server is configured and authorized and the scope is activated IP-
addresses will be distributed . You can then view the list of assigned IP-addresses.

Observation / Output-:

Department of E&TC Engineering, SGOI COE, Belhe Page 15


Department of E&TC Engineering, SGOI COE, Belhe Page 16
Department of E&TC Engineering, SGOI COE, Belhe Page 17
Department of E&TC Engineering, SGOI COE, Belhe Page 18
Department of E&TC Engineering, SGOI COE, Belhe Page 19
Department of E&TC Engineering, SGOI COE, Belhe Page 20
Aim: -
Study of encryption & decryption.

Software : -

PC with C compiler, printer

Theory: -

Network Security is one of the most essential thing in computer network as the computer
network has very good use of secret data transfer & security to each user forgetting its
data.There are certain algorithms present for Network security out of which widely use algorithm is
Encryption & Decryption in network enhance security.In encryption, using some sort of
unrecognizable computing on plain text. So that plain text is not recognizable by anyone & vice
versa procedure is used by decryption for getting the encrypted data to receiver in exact plain text
format.Encryption occurs normally at transmitting side & at receiving decryption occurs.
Encryption is classified in two methods:
1. Substitution cipher
2. Transposition cipher
Substitution is cipher from encryption. It does the replacement of a letter on group letters. The
simple lest form of substitution cipher is called eases cipher with this approach the letter of alphabet
are simply is substituted & with elements of alphabet are simply substituted with either a letter or
alphabet.
EXAMPLE: plain text is : ABCD
Sub text is : PQRS
This approach is called monophatic substitution cipher because each key is substituted with
another letter other method improved upon substitution cipher approach.
EXAMPLE: Photo phabic cipher is found in some system. They allow for multiple cipher which
can be used in rotation. A random bit stream is generated as a key and then changes a key
periodically.

Department of E&TC Engineering, SGOI COE, Belhe Page 16


PRINCIPLES OF CRYPTOGRAPHY:

(1) Message must contain some redundancy i.e. the recipients must he able to tell whether it is
valid by simply inspecting it and perhaps performing a small computation.
(2) Some method is needed to reply attacks. This is required to maintain the freshness of the
message and prohibiting the intruder from replaying an old message. This can be done by
include time stamp in every message which will be valid only for, say 10 seconds. So any
message much older will be rejected.
(3)

TYPES OF CRYPTOGRAPHY ALGORITHMS:

1. Symmetric key or secret key cryptography algorithms.


2. Public key or asymmetric cryptography.

(1) SYMMETRIC KEY CRYPTOGRAPHY:

In this the same key (shared secret key) is used by the sender and receiver. The sender uses this
key along with encryption algorithm to encrypt the data and receiver uses it along with the
description algorithm to decrypt the data.
The encryption algorithm makes use of a combination of addition and multiplication whereas
the description algorithm uses of combination of substruction and division.

(2) PUBLIC KEY CRYPTOGRAPHY:

This is also called as asymmetric key cryptography. In this type of cryptography there are two
keys:
1. Private key
2. Public key

1. PRIVATE KEY:

It is kept by receiver whereas the public key is announced to the public.

Department of E&TC Engineering, SGOI COE, Belhe Page 17


2. PUBLIC KEY:

In this system sender uses the public key to encrypt the message to be sent. At the receiver,
this message is decrypted with the help of receivers private key.The public key used for
encryption is different from the private key used for decryption. The public key is known to every
one but the private key is available only to an individual.

RSA ALGORITHM (NETWORK SECURITY):-

The name of algorithm given by initials of three developers of the algorithm. Rivert, Shamir,
Adleman. This algorithm is based on the principle from number theory.
For data security, we have encryption at transmitting end and decryption at receiving end. The
method used by RSA is as follows:
1. Choose to large primes p & q(typically greater than 10100).
2. Compute n=p*q, and z=(p-1)*(q-1).
3. Choose a number a relatively prime to z, call it d.
4. Find e, such that e*d=1mod z.

Taking this data now plain text is taken, integer p falls in interval 0 ? p<n, it can be done by
grouping plain text into block of k bits, where k is longest integer for which k<n is true.
Compute c=pe (mod n) for encrypt
Do p=cd (mod n) for decrypt
For encryption we require e & n. and for decryption we require d & n. So that, public key
algorithm consist of (e,n) and private key consist of (d,n).
Security can be achieved by means of function large numbers.
Cryptology comes from the Greek words for ”secret writing. ” historically four group of
people contributed to the art of cryptology. They are the military, the diplomatic corps, diarist, and

lovers. Of these the military has the most important role and shaped the field over the centuries.
The messages to be encrypted, known as the plain text, are transmitted by a function that is
parameterized by a key. The output of the encryption process is known as the cipher text is then
transmitted, often by a messenger or radio. The difference between a cipher text and a code is that
a code replaces one word with another word or symbol whereas a cipher is a bit for bit for

Department of E&TC Engineering, SGOI COE, Belhe Page 18


character transmission independent of the nature of the message. We assume that a enemy or a
intruder, hears and copies know what the complete cipher text.

We can represent this mathematically as :


C=e k(p); pis the plain text using key k gives the cipher text c . Simillarly p=d k(c)
represents the decryption of e to get the plain text again.
Therefore,dk(ek(p)=q)
1. Messages must contain some redundancy,i.e. the recipients must be able to tell whether it is
valid by simply inspecting it & perhaps performing a simple computation. This is required to
prevent the acting intruders from treaking the receiver into decrypting the garbage ad acting on
the plain text.
2. Some methods is needed to foil replay attacks. This is required to maintain the freshness of the
message & prohibiting the intruder fro replaying old message. This can be done by including
the time slab every message which will be valid only for say,10 seconds. So, any message
much older will be rejected.

Algorithm:-

1. Start.
2. Declare the integral values i=0,1 j.ran.
3. Declare character values ch*s.
4. Random variable is declared to take any random values for encryption.
5. The string to be encrypted is taken.
6. Pointer is set at the 1st character of the string.
7. Random value is added to the 1st character to encrypt it.
8. Random value is increased to r=r+2.
9. goto step 6 until i<1.
10. Print the encrypted string.
11. Similarly reverse process is followed during decryption.
12. Stop.

Department of E&TC Engineering, SGOI COE, Belhe Page 19


Program:-

Program for Encryption and Decryption

#include<stdio.h>
#include<conio.h>
#include<string.h>
#include<stdlib.h>
#include<time.h>
void main()
{
int i=0,l,j,ran;
char ch,*s;
clrscr();
randomize();
ran=random(32);
printf("\n\nEnter the string to be encrypted : ");
gets(s);
l=strlen(s);
//Encryption
while(i<l)
{
ch=s[i];
ch=ch+ran;
s[i]=ch;
i++;
ran=ran+2;
}

Department of E&TC Engineering, SGOI COE, Belhe Page 20


printf("\n\nEncrypted string is : ");
for(j=0;j<l;j++)
printf("%c",s[j]);

//Decryption
while(i>=0)
{

ch=s[i];
ch=ch-ran;
s[i]=ch;
i--;

ran=ran-2;

printf("\n\nOriginal string is : ");


for(j=0;j<l;j++)
printf("%c",s[j]);

getch();

Conclusion:-
.

Department of E&TC Engineering, SGOI COE, Belhe Page 21


Department of E&TC Engineering, SGOI COE, Belhe Page 22
Department of E&TC Engineering, SGOI COE, Belhe Page 23
Aim: -
To install and configure FTP services.

Requirements: -

1. PC with WIN XP.


2. CD of WIN XP service pack 2

Theory:-

The World Wide Web is an architectural framework for accessing linked documents spread out
over thousands of machines all over the Internet. The web is basically a client-servers system.

Client side:
The web consists of a vast, worldwide collection of documents, usually called pages. Each page
may contain links to other, related pages, anywhere in the world. Strings of texts that are links to
other pages are called hyperlinks.

Server side:
Every website has a server process. It is listening to TCP port 80 on which incoming clients are
connected. Once a connection is established, the client sends a request and the server sends a
reply for that. Then the connection is released. The protocol used for defining the legal request
and replies is called HTTP. HTTP transfers data in the form of plaintext, hypertext, audio, video
etc.

Key points: -

1. Installation of Internet Information Service from CD and activating it


2. Designing the web page and its uploading
3. Downloading the web page

Department of E&TC Engineering, SGOI COE, Belhe Page 22


Procedure: -

1. Installation of Internet Information Service from CD and activating it

i) Go to Add and Remove programs in Control Panel and select


Add/Remove Windows component.

ii) Select only Internet Information Service component from the listed components.

Department of E&TC Engineering, SGOI COE, Belhe Page 23


Department of E&TC Engineering, SGOI COE, Belhe Page 24
(i) Go to the properties of My Network Places and proceed as follows:-

Department of E&TC Engineering, SGOI COE, Belhe Page 25


Department of E&TC Engineering, SGOI COE, Belhe Page 26
(ii) Tick the web server service

Department of E&TC Engineering, SGOI COE, Belhe Page 27


(iv) Go to Administrative tools in Control Panel and check for Internet Information Service
icon in it.

(v) Go to Services and start IIS Admin service.

Department of E&TC Engineering, SGOI COE, Belhe Page 28


2. Designing the web page and its uploading:-

(i) Right click on Default Web Servers and select Virtual Directory from new option.

Department of E&TC Engineering, SGOI COE, Belhe Page 29


ii) Type the name to be used to access the Web virtual directory

iii) Browse to select C:\Intepub\wwwroot.

Department of E&TC Engineering, SGOI COE, Belhe Page 30


Department of E&TC Engineering, SGOI COE, Belhe Page 31
(iv) Copy the files to be uploaded to C:\Intepub\wwwroot

Department of E&TC Engineering, SGOI COE, Belhe Page 32


3. Downloading the web page:-

Department of E&TC Engineering, SGOI COE, Belhe Page 33


Department of E&TC Engineering, SGOI COE, Belhe Page 34
Department of E&TC Engineering, SGOI COE, Belhe Page 35
CONCLUSION :-

Department of E&TC Engineering, SGOI COE, Belhe Page 36


Aim: -
Implementation of LAN using suitable multiuser Windows operating System and demonstrating
client-server and peer to peer mode of configuration.

Requirements: -
1. Personal computers with Network Interface Cards connected through category 5 UPT
cables.
2. Windows 2003 lab Server or Windows XP/Vista/7/8 with 192.168.1.1.
3. Windows XP/Vista/7/8 client operating system installed on each computer with unique IP
addresses from the same IP Class.
4. Network switch connected to all peer computers.
5. Cross over cable used to connect two computers on LAN.
6. A shared folder available on one computer to access from other computer.

Theory: -

Network Interface Card:-


1. Each PC or workstation or printer, in short each station that is to be connected in a
network has its own network interface card (NIC).
2. The NIC fits inside the station and provides the station with a 6-byte physical address.
3. The Ethernet address is 6 bytes (48 bits) and it is normally written in hexadecimal
notation using a hyphen to separate bytes from each other as shown.
06-02-03-04-4C-2B
4. NIC is housed inside the computer on the computer on the motherboard. It provides the
physical connection between the network and the computer station.
5. The speed of the NIC is important in determining the speed and efficiency of a network.
6. There are three common types of NICs:
a. Ethernet cards b. Local talk connectors c. Token ring cards
7. NIC is available in ISA, PCMCIA and PCI bus varieties. The NIC contains both BNC
and RJ-45 connectors. So it is also called as combo card.

Department of E&TC Engineering, SGOI COE, Belhe Page 37


Star Topology: -

In a star topology all the cables run from the computers to a central location where they
are all connected by a device called ‘Hub’.

1. Stars are used in concentrate networks, where the endpoints are directly reachable from a
central location; when the greater reliability of a star topology is needed.
2. Each computer on a star network communicates with a central hub that resends the
message either to all the computers in a broadcast star network or only to the destination
computer in a switched star network.
3. The hub in a broadcast star network can be active or passive. An active hub generates the
electrical signal and sends it to all computers connected to it.
4. This type of hub is usually called a multiport repeater. Active hubs require external
power supply.
5. A passive hub is a wiring panel or punch down block, which acts as a connection point. It
does not amplify or regenerate the signal. Passive hubs do not require electrical power
supply.
6. Several types of cables can be used to implement a star network. A hybrid hub can use
different types of cable in the same star network.

Star LANs: -
1. In the star type LANs, the unshielded twisted pair is used as he transmission medium.
a. This is because the unshielded twisted pair is a telephone wire, which is available in
each and every office building. The other advantages of using twisted wires are as
follows:
b. So no additional installation cost is required for the installation of LAN.
c. Since the telephone wires cover the entire building, it is possible to spread the
networkin every part of each building.
2. The central element of the star topology is an active element called hub or repeater.
Each station is connected to the hub with the help of two links one for transmitting
and the other for reception of the data.
3. When a single station transmits, the hub repeats the signal and sends it to each station.
4. Typically the length of each link is 100m. If the twisted pair is used.

Department of E&TC Engineering, SGOI COE, Belhe Page 38


Straight Through Network Cable: -

A straight through network cable acts as an extension enabling a device with a network
interface card to be attached to a network. A common form of network media is the UTP
Cat5 (Unshielded Twisted Pair Category 5) cable. In this assignment I will explain how to
make a UTP Cat5 cable and what circumstances it is best used in as well as its capabilities.

Crossover Cable Wire Configuration


8-PORT HUB: -
Hubs also known as concentrators or multiport repeaters, are used in star networks to
connect the multiple stations.
There are two main types of hubs:-
1. Passive hub: a passive hub simply combines the signals of network segments. There is
no signal regeneration. A passive hub reduces by half the maximum cabling distances
permitted.
2. Active hub: - active hub regenerates or amplifies the signals. Because of this the distance
between the devices can be increased. These are expensive than the passive hubs.
3. Intelligent hubs: - Intelligent hubs regenerate the signal and performs the network
management and intelligent path selection. Intelligent hubs include switching hubs. An
advantage of thuis hub is all transmission media segment connecting to the hub because
each segment will be used only when a signal is sent to a device usind that segment.
Hubs operate on the physical layer of the OSI model.

Department of E&TC Engineering, SGOI COE, Belhe Page 39


RJ-45:-

The RJ-45 connector is commonly used for network cabling and for telephony
applications. It's also used for serial connections in special cases

The following chart shows the pinout for RJ-45 connectors

Pin Name/Description
1 Request To Send
2 Data Terminal Ready
3 Ground
4 Transmit Data
5 Receive Data
6 Data Carrier Detect
7 Data Set Ready
8 Clear To Send

Department of E&TC Engineering, SGOI COE, Belhe Page 40


Crossover Cable:-

The following figure shows the correct wiring for a 10Base-T crossover cable (assuming you're
using RJ-45 connectors).

 Pins 1 and 2 at B, must be a twisted pair wired through to pins 6 and 3, respectively, at A.
 Pins 3 and 6 at A, must be a twisted pair wired through to pins 2 and 1, respectively, at B.
 Pins 4, 5, 7, and 8 on cable B are not used in this application, although they may be wired
in the cable.

This cable can be used to connect two computers together without a hub, or to connect two hubs
together (without using an uplink port). If you're connecting two hubs together and one of them
has an uplink port, use a straight cable (rather than the crossover) to connect the uplink port of
one hub to one of the (non-uplink) ports of the other hub.

Procedure: -
1. Check for the NIC:-

i) Right click on ‘MY COMPUTER’ to view the properties.

ii) Select Device Manager in Hardware.

Department of E&TC Engineering, SGOI COE, Belhe Page 41


Presence of Network Adapter in Device Manager indicate that NIC is present.

Department of E&TC Engineering, SGOI COE, Belhe Page 42


2. Set IP address:-
i) Right click on ‘My Network Places’ to view the properties.

Select properties of Internet Protocol (TCP/IP).

Department of E&TC Engineering, SGOI COE, Belhe Page 43


ii) Set the IP address to be used.

Department of E&TC Engineering, SGOI COE, Belhe Page 44


3. To run the Network setup wizard:-

i) Select setup for home or small office network in My Network Places and proceed
as shown below:

Department of E&TC Engineering, SGOI COE, Belhe Page 45


Department of E&TC Engineering, SGOI COE, Belhe Page 46
Department of E&TC Engineering, SGOI COE, Belhe Page 47
Department of E&TC Engineering, SGOI COE, Belhe Page 48
Department of E&TC Engineering, SGOI COE, Belhe Page 49
Department of E&TC Engineering, SGOI COE, Belhe Page 50
View the PCs connected using cross cable in entire network:-

Conclusion:-

Department of E&TC Engineering, SGOI COE, Belhe Page 51


Department of E&TC Engineering, SGOI COE, Belhe Page 52
Aim:-
Write Program to simulate leaky bucket.

Software:

PC with C compiler, printer

Theory:-

In the network layer, before the network can make Quality of service guarantees, it must know
whattraffic is being guaranteed. One of the main causes of congestion is that traffic is often bursty.

To understand this concept first we have to know little about traffic shaping. Traffic Shaping is
a mechanism to control the amount and the rate of traffic sent to the network. Approach of congestion
management is called Traffic shaping. Traffic shaping helps to regulate the rate of data transmission
andreduces congestion.

There are 2 types of traffic shaping algorithms:

1. Leaky Bucket
2. Token Bucket

Suppose we have a bucket in which we are pouring water, at random points in time, but we have
to get water at a fixed rate, to achieve this we will make a hole at the bottom of the bucket. This will
ensure that the water coming out is at some fixed rate, and also if the bucket gets full, then we will
stop pouring water into it.

The input rate can vary, but the output rate remains constant. Similarly, in networking, a
technique called leaky bucket can smooth out bursty traffic. Bursty chunks are stored in the bucket
and sent out at anaverage rate.

In the below figure, we assume that the network has committed a bandwidth of 3 Mbps for a host.
The use of the leaky bucket shapes the input traffic to make it conform to this commitment. In the
above figure, the host sends a burst of data at a rate of 12 Mbps for 2s, for a total of 24 Mbits of data.
The host is silent for 5 s and then sends data at a rate of 2 Mbps for 3 s, for a total of 6 Mbits of
data. In all, the host has sent 30 Mbits of data in 10 s. The leaky bucket smooth’s out the traffic by
sending out data at a rate of 3 Mbps during the same 10 s. Without the leaky bucket, the beginning

Department of E&TC Engineering, SGOI COE, Belhe Page 52


burst may have hurt the network by consuming more bandwidth than is set aside for this host. We
can also see that the leaky bucket may prevent congestion.

A simple leaky bucket algorithm can be implemented using FIFO queue. A FIFO queue holds
the packets. If the traffic consists of fixed-size packets (e.g., cells in ATM networks), the process
removes a fixed number of packets from the queue at each tick of the clock. If the traffic consists of
variable-length packets, the fixed output rate must be based on the number of bytes or bits.

The following is an algorithm for variable-length packets:

1. Initialize a counter to n at the tick of the clock.


2. Repeat until n is smaller than the packet size of the packet at the head of the queue.
1. Pop a packet out of the head of the queue, say P.
2. Send the packet P, into the network
3. Decrement the counter by the size of packet P.
4. Reset the counter and go to step 1.

Algorithm:-

Department of E&TC Engineering, SGOI COE, Belhe Page 53


Program:-

Program for leaky bucket:

#include <bits/stdc++.h>
using namespace std;
int main()

{
int no_of_queries, storage, output_pkt_size;int
input_pkt_size, bucket_size, size_left;

// initial packets in the bucketstorage = 0;

// total no. of times bucket content is checked


no_of_queries = 4;

// total no. of packets that can


// be accommodated in the bucketbucket_size = 10;

// no. of packets that enters the bucket at a time


input_pkt_size = 4;

// no. of packets that exits the bucket at a timeoutput_pkt_size = 1;


for (int i = 0; i < no_of_queries; i++) // space left
{
size_left = bucket_size - storage;if (input_pkt_size <= size_left)
{
// update storage
storage += input_pkt_size;
}
else
{
printf("Packet loss = %d\n", input_pkt_size);
}
printf("Buffer size= %d out of bucket size= %d\n",
storage, bucket_size);
storage -= output_pkt_size;
}
return 0;
}

Department of E&TC Engineering, SGOI COE, Belhe Page 54


Output: -

Buffer size= 4 out of bucket size= 10 Buffer size= 7


out of bucket size= 10 Buffer size= 10 out of
bucket size= 10Packet loss = 4
Buffer size= 9 out of bucket size= 10

Department of E&TC Engineering, SGOI COE, Belhe Page 55


Department of E&TC Engineering, SGOI COE, Belhe Page 56
.

Department of E&TC Engineering, SGOI COE, Belhe Page 57


Department of E&TC Engineering, SGOI COE, Belhe Page 58
Aim:-
Installation and configuration of Telnet server for telnet communication.

Requirements:-

PC with windows XP and communication cable [cable/hub].

Theory: -

Telnet is a client/server application program used for logging into remote systems. It
allows you to login in system for any operation & FTP is used only for file transfer. Telnet is an
application used on the internet to connect to a remote computer, enabling access to the computer
& its resources. A user can use different application programs at a remote site & create results that
can be transferred to his local computer.
Telnet is used for a number of activities such as telneting to a site or checking email at
another account, other on-line services or an internet & many such applications. It is an example
of cyberspace extension or cyber travel, which enables the user to travel all across the internet
accessing machines or databases that may offer different services or information.
Telnet can be used only by using specific address & now it is possible to access telnet
connections through hyperlinks on the web i.e., browsing. When a user wants to access an
application program utility located on a remote machine he performs remote login operation. After
logging on, a user can use the services available on the remote site & create results that can be
transferred to his local computer. As a user types at a terminal or a workstation running a terminal
emulator, the keystrokes are accepted by the terminal driver. The terminal passes the characters to
the operating system. The local operating system accepts the characters but does not interpret
them. The characters are sent to the TELNET client, which transforms the characters to a
universal set called Network Virtual Terminal (NVT) characters & delivers them to the TCP/IP
stack. From the TCP/IP stack the characters are delivered to the operating system & passed to the
TELNET server.

Department of E&TC Engineering, SGOI COE, Belhe Page 56


Procedure:-

Key points to be remembered:-


1. Check for the NIC.
2. Set password for the computer administrator login on both computers.
3. Start telnet service on both computers.
4. Set IP address.

1. Check for the NIC:-

i) Right click on ‘MY COMPUTER’ to view the properties.

ii) Select Device Manager in Hardware.

iii) Presence of Network Adapter in Device Manager indicates that NIC is present.

Department of E&TC Engineering, SGOI COE, Belhe Page 57


2. Set password for the computer administrator login on both computers:-

i) Go to User Accounts in Control Panel.

ii) Select the computer administrator login for which the password has to be set and
proceeds shown below:

Department of E&TC Engineering, SGOI COE, Belhe Page 58


3.To start telnet service:-

i) Go to Administrative Tools in Control Panel.

ii) Click on Services icon.

Department of E&TC Engineering, SGOI COE, Belhe Page 59


iii) Double click on Telnet, listed in the list of services and make settings as shown below:

Department of E&TC Engineering, SGOI COE, Belhe Page 60


Department of E&TC Engineering, SGOI COE, Belhe Page 61
2. Right click on ‘My Network Places’ to view the properties.

Department of E&TC Engineering, SGOI COE, Belhe Page 62


3. Set IP address:-

i) Select properties of Internet Protocol (TCP/IP).

ii) Set the IP address to be used.

Department of E&TC Engineering, SGOI COE, Belhe Page 63


To use Telnet service:-

i) Go to command prompt.

ii) Use ping command to check if the connection has been made.

Department of E&TC Engineering, SGOI COE, Belhe Page 64


iii) Enter the login and password of remote PC.

Department of E&TC Engineering SGOI, COE, Belhe Page 65


CONCLUSION: -

Department of E&TC Engineering SGOI, COE, Belhe Page 66


Department of E&TC Engineering SGOI, COE, Belhe Page 66
Aim:-
Simulating various Network (LAN/WAN) using relvant network devices onsimulator.
a) Ping
b) Ipconfig
c) ARP
d) Tracert/Traceroute.

Software:

PC with CISCO Packet Tracer, printer.

Theory:

Information About Cisco Packet Tracer:

Packet Tracer offers an effective, interactive environment for learning networking concepts
and protocols. Most importantly, Packet Tracer helps students and instructors create their own
virtual “network worlds” for exploration, experimentation, and explanation of networking
concepts and technologies. This software is built by Cisco and can be used to practice
networking related labs virtually. Packet tracer is an excellent tool for having hands-on
experience on devices like Cisco Routers, Switches, HUB, and end devices like PC, Laptop,
Server, and many more.

Features of Cisco Packet Tracer:

Some of the key features of Packet Tracer are:

 E-learning
 Visualizing Networks
 Real-time and simulation mode
 Compatible on various platforms
 Support to all languages
 Most networking protocols are supported.

Department of E&TC Engineering, SGOI COE, Belhe Page 67


Ping (Packet Internet or Inter-Network Groper):-

A ping is a basic Internet program that allows a user to test and verify if a particular destination
IP address exists and can accept requests in computer network administration.
How to run a ping network test:
1. Type “ping” in the black box and hit the space bar.

2. Type the IP address you'd like to ping (e.g., 192. XXX. X.X). 3.Review the ping results
displayed.

ipconfig (IP Configuration):-

The ipconfig displays a computer's IP address, subnet mask and the default gateway (which is
typically the IP address of your router or network firewall).
ipconfig - Retrieves Basic TCP/IP Network Information (IP, subnet mask, gateway)
ipconfig /all - Retrieves All TCP/IP Network Information (MAC address, adapter description,
DHCPdetails)
ipconfig /release - Releases the IPv4 Address of All Network Adapters.

ARP():-

The arp command displays and modifies the Internet-to-adapter address translation tables used
by the Address in Networks and communication management. The arp command displays the
current ARP entry for the host specified by the Hostname variable.
Example - If Host A wants to transmit data to Host B, which is on the different network, then
Host A sends an ARP request message to receive a MAC address for Host B. The router
responds to Host A with its own MAC address pretend itself as a destination.

Tracert/Traceroute:-

The time duration for this transfer to happen is also recorded with the IP addresses of all
routers encounteredduring its movement returned. Hop is the movement of the packet from one
router to another. The number ofrouters encountered is the hop count.

Department of E&TC Engineering, SGOI COE, Belhe Page 68


Conclusion:-

Department of E&TC Engineering, SGOI COE, Belhe Page 69


Department of E&TC Engineering, SGOI COE, Belhe Page 70
.

Department of E&TC Engineering, SGOI COE, Belhe Page 71


Aim:-
Using a network simulator configure router using RIP.
Software:-
PC with CISCO Packet Tracer, printer.
Theory:
Information About Cisco Packet Tracer:

Packet Tracer offers an effective, interactive environment for learning networking concepts
and protocols. Most importantly, Packet Tracer helps students and instructors create their own
virtual “network worlds” for exploration, experimentation, and explanation of networking
concepts and technologies. This software is built by Cisco and can be used to practice
networking related labs virtually. Packet tracer is an excellent tool for having hands-on
experience on devices like Cisco Routers, Switches, HUB, and end devices like PC, Laptop,
Server, and many more.

Features of Cisco Packet Tracer:

Some of the key features of Packet Tracer are:

 E-learning
 Visualizing Networks
 Real-time and simulation mode
 Compatible on various platforms
 Support to all languages

Department of E&TC Engineering, SGOI COE, Belhe Page 70


RIP: (Routing Information Protocol)

RIP is a distance-vector routing protocol. Routers running the distance- vector protocol send
all or a portion of their routing tables in routing-update messages to their neighbors. You can use
RIP to configure the hosts as part of a RIPnetwork.

When the router sends the packet to the network segment, then it is counted as asingle hop.In
the above figure, when the router 1 forwards the packet to the router 2 then it will count as 1 hop
count. Similarly, when the router 2 forwards the packet to the router 3 then it will count as 2 hop
count, and when the router 3 forwards the packet to router 4, it will count as 3 hop count. In the
same way, RIP can support maximum upto 15 hops, which means that the 16 routers can be
configured in a RIP.

Working of RIP:

If there are 8 routers in a network where Router 1 wants to send the data to Router 3. If the
network is configured with RIP, it will choose the route which has the least number of hops. There
are three routes in the above network, i.e., Route 1, Route 2,and Route 3.

Department of E&TC Engineering, SGOI COE, Belhe Page 71


Conclusion:-

Department of E&TC Engineering, SGOI COE, Belhe Page 72


.

Department of E&TC Engineering, SGOI COE, Belhe Page 73

You might also like