Computer Network Manual
Computer Network Manual
Packet Tracer offers an effective, interactive environment for learning networking concepts
and protocols. Most importantly, Packet Tracer helps students and instructors create their own
virtual “network worlds” for exploration, experimentation, and explanation of networking
concepts and technologies. This software is built by Cisco and can be used to practice
networking related labs virtually. Packet tracer is an excellent tool for having hands-on
experience on devices like Cisco Routers, Switches, HUB, and end devices like PC, Laptop,
Server, and many more.
E-learning
Visualizing Networks
Real-time and simulation mode
Compatible on various platforms
Support to all languages
A network topology is created in the Cisco Packet Tracer, which includes a router, a switch, and
three host systems connected to a network.
Step-4:
The interface of the router connected with the switch is assigned with the IP address defined as the
default router during the DHCP configuration. This route will be taken by the data packets to reach
their destination system. Also, the „no shutdown command is used to change the state of the
connectedinterface to up.
Step-5 :
A successful connection is established between all the devices connected in a network. In further
steps, host systems in the network are assigned with dynamic IP and default gateway address by the
DHCP service configured on the router.
Step-6 :
Desktop settings of a host system are accessed and the DHCP option is selected. DHCP request
forwarded by the system is acknowledged and IP address, associated subnet mask, and default
gateway address are assigned toit.
Step-7 :
To check the connectivity between the host systems, the „ping‟ command is used to exchange data
packets. All the data packets are successfully transferred,which ensures that a communication channel
is established.
Conclusion:-
On the left side, expand on "Networking" , select "DHCP" and then start the "Windows
Component Wizard" :
Select (click on) the line "Networking Services" and then click on the button "Details" :
Back in the window of "Windows Component Wizard", continue now with "Next"
After installing the DHCP-server, you will need to configure it before you can use it:
Select "DHCP" , which is part of the Windows menu "Administrative Tools". In the left plane,
you will see the name and IP-address of the DHCP-server.
After installation, a DHCP server is not authorized. Do not forget this later ! (see below)
You need to define the range of IP-addresses to be assigned (=distributed) by the DHCP-
server. A definition of a range of IP-addresses (with or without additional options) is called a
"Scope": select your DHCP-server and then either with a right-click or from the menu "Actions"
select to define a "New Scope":
If you could not define separate ranges for manually assigned and DHCP-assigned IP-
addresses, then you could here define IP-addresses or ranges of IP-addresses to be excluded: not
to be used by the DHCP-server.
In addition to the IP-address and Sub-Netmask, a DHCP-server can also be use to define
other TCP/IP configuration items on the Client systems.
Are you using a WAN and need to help your clients to locate the IP-addresses of servers
(like WebServers) on the WAN? Or do you intend to have clients connected to the
Windows2000 server via the new: "Active Directory" method? Then you must configure the
clients for use of a DNS-server. Enter the name of your server and the IP-address and click on
"Add" to enter the value on the list.
You need to activate the scope, (which you can do later with a right-click on the scope and
selecting: "Activate"/"Deactivate"
You still have to "Authorize" the DHCP-server: select the server and either right-click or from
the menu "Action" select "Authorize" :
Note: on my system, I had to close now the DHCP-windows and open it up again to see, that the
DHCP-server is now "Running" :
Once the DHCP-server is configured and authorized and the scope is activated IP-
addresses will be distributed . You can then view the list of assigned IP-addresses.
Observation / Output-:
Software : -
Theory: -
Network Security is one of the most essential thing in computer network as the computer
network has very good use of secret data transfer & security to each user forgetting its
data.There are certain algorithms present for Network security out of which widely use algorithm is
Encryption & Decryption in network enhance security.In encryption, using some sort of
unrecognizable computing on plain text. So that plain text is not recognizable by anyone & vice
versa procedure is used by decryption for getting the encrypted data to receiver in exact plain text
format.Encryption occurs normally at transmitting side & at receiving decryption occurs.
Encryption is classified in two methods:
1. Substitution cipher
2. Transposition cipher
Substitution is cipher from encryption. It does the replacement of a letter on group letters. The
simple lest form of substitution cipher is called eases cipher with this approach the letter of alphabet
are simply is substituted & with elements of alphabet are simply substituted with either a letter or
alphabet.
EXAMPLE: plain text is : ABCD
Sub text is : PQRS
This approach is called monophatic substitution cipher because each key is substituted with
another letter other method improved upon substitution cipher approach.
EXAMPLE: Photo phabic cipher is found in some system. They allow for multiple cipher which
can be used in rotation. A random bit stream is generated as a key and then changes a key
periodically.
(1) Message must contain some redundancy i.e. the recipients must he able to tell whether it is
valid by simply inspecting it and perhaps performing a small computation.
(2) Some method is needed to reply attacks. This is required to maintain the freshness of the
message and prohibiting the intruder from replaying an old message. This can be done by
include time stamp in every message which will be valid only for, say 10 seconds. So any
message much older will be rejected.
(3)
In this the same key (shared secret key) is used by the sender and receiver. The sender uses this
key along with encryption algorithm to encrypt the data and receiver uses it along with the
description algorithm to decrypt the data.
The encryption algorithm makes use of a combination of addition and multiplication whereas
the description algorithm uses of combination of substruction and division.
This is also called as asymmetric key cryptography. In this type of cryptography there are two
keys:
1. Private key
2. Public key
1. PRIVATE KEY:
In this system sender uses the public key to encrypt the message to be sent. At the receiver,
this message is decrypted with the help of receivers private key.The public key used for
encryption is different from the private key used for decryption. The public key is known to every
one but the private key is available only to an individual.
The name of algorithm given by initials of three developers of the algorithm. Rivert, Shamir,
Adleman. This algorithm is based on the principle from number theory.
For data security, we have encryption at transmitting end and decryption at receiving end. The
method used by RSA is as follows:
1. Choose to large primes p & q(typically greater than 10100).
2. Compute n=p*q, and z=(p-1)*(q-1).
3. Choose a number a relatively prime to z, call it d.
4. Find e, such that e*d=1mod z.
Taking this data now plain text is taken, integer p falls in interval 0 ? p<n, it can be done by
grouping plain text into block of k bits, where k is longest integer for which k<n is true.
Compute c=pe (mod n) for encrypt
Do p=cd (mod n) for decrypt
For encryption we require e & n. and for decryption we require d & n. So that, public key
algorithm consist of (e,n) and private key consist of (d,n).
Security can be achieved by means of function large numbers.
Cryptology comes from the Greek words for ”secret writing. ” historically four group of
people contributed to the art of cryptology. They are the military, the diplomatic corps, diarist, and
lovers. Of these the military has the most important role and shaped the field over the centuries.
The messages to be encrypted, known as the plain text, are transmitted by a function that is
parameterized by a key. The output of the encryption process is known as the cipher text is then
transmitted, often by a messenger or radio. The difference between a cipher text and a code is that
a code replaces one word with another word or symbol whereas a cipher is a bit for bit for
Algorithm:-
1. Start.
2. Declare the integral values i=0,1 j.ran.
3. Declare character values ch*s.
4. Random variable is declared to take any random values for encryption.
5. The string to be encrypted is taken.
6. Pointer is set at the 1st character of the string.
7. Random value is added to the 1st character to encrypt it.
8. Random value is increased to r=r+2.
9. goto step 6 until i<1.
10. Print the encrypted string.
11. Similarly reverse process is followed during decryption.
12. Stop.
#include<stdio.h>
#include<conio.h>
#include<string.h>
#include<stdlib.h>
#include<time.h>
void main()
{
int i=0,l,j,ran;
char ch,*s;
clrscr();
randomize();
ran=random(32);
printf("\n\nEnter the string to be encrypted : ");
gets(s);
l=strlen(s);
//Encryption
while(i<l)
{
ch=s[i];
ch=ch+ran;
s[i]=ch;
i++;
ran=ran+2;
}
//Decryption
while(i>=0)
{
ch=s[i];
ch=ch-ran;
s[i]=ch;
i--;
ran=ran-2;
getch();
Conclusion:-
.
Requirements: -
Theory:-
The World Wide Web is an architectural framework for accessing linked documents spread out
over thousands of machines all over the Internet. The web is basically a client-servers system.
Client side:
The web consists of a vast, worldwide collection of documents, usually called pages. Each page
may contain links to other, related pages, anywhere in the world. Strings of texts that are links to
other pages are called hyperlinks.
Server side:
Every website has a server process. It is listening to TCP port 80 on which incoming clients are
connected. Once a connection is established, the client sends a request and the server sends a
reply for that. Then the connection is released. The protocol used for defining the legal request
and replies is called HTTP. HTTP transfers data in the form of plaintext, hypertext, audio, video
etc.
Key points: -
ii) Select only Internet Information Service component from the listed components.
(i) Right click on Default Web Servers and select Virtual Directory from new option.
Requirements: -
1. Personal computers with Network Interface Cards connected through category 5 UPT
cables.
2. Windows 2003 lab Server or Windows XP/Vista/7/8 with 192.168.1.1.
3. Windows XP/Vista/7/8 client operating system installed on each computer with unique IP
addresses from the same IP Class.
4. Network switch connected to all peer computers.
5. Cross over cable used to connect two computers on LAN.
6. A shared folder available on one computer to access from other computer.
Theory: -
In a star topology all the cables run from the computers to a central location where they
are all connected by a device called ‘Hub’.
1. Stars are used in concentrate networks, where the endpoints are directly reachable from a
central location; when the greater reliability of a star topology is needed.
2. Each computer on a star network communicates with a central hub that resends the
message either to all the computers in a broadcast star network or only to the destination
computer in a switched star network.
3. The hub in a broadcast star network can be active or passive. An active hub generates the
electrical signal and sends it to all computers connected to it.
4. This type of hub is usually called a multiport repeater. Active hubs require external
power supply.
5. A passive hub is a wiring panel or punch down block, which acts as a connection point. It
does not amplify or regenerate the signal. Passive hubs do not require electrical power
supply.
6. Several types of cables can be used to implement a star network. A hybrid hub can use
different types of cable in the same star network.
Star LANs: -
1. In the star type LANs, the unshielded twisted pair is used as he transmission medium.
a. This is because the unshielded twisted pair is a telephone wire, which is available in
each and every office building. The other advantages of using twisted wires are as
follows:
b. So no additional installation cost is required for the installation of LAN.
c. Since the telephone wires cover the entire building, it is possible to spread the
networkin every part of each building.
2. The central element of the star topology is an active element called hub or repeater.
Each station is connected to the hub with the help of two links one for transmitting
and the other for reception of the data.
3. When a single station transmits, the hub repeats the signal and sends it to each station.
4. Typically the length of each link is 100m. If the twisted pair is used.
A straight through network cable acts as an extension enabling a device with a network
interface card to be attached to a network. A common form of network media is the UTP
Cat5 (Unshielded Twisted Pair Category 5) cable. In this assignment I will explain how to
make a UTP Cat5 cable and what circumstances it is best used in as well as its capabilities.
The RJ-45 connector is commonly used for network cabling and for telephony
applications. It's also used for serial connections in special cases
Pin Name/Description
1 Request To Send
2 Data Terminal Ready
3 Ground
4 Transmit Data
5 Receive Data
6 Data Carrier Detect
7 Data Set Ready
8 Clear To Send
The following figure shows the correct wiring for a 10Base-T crossover cable (assuming you're
using RJ-45 connectors).
Pins 1 and 2 at B, must be a twisted pair wired through to pins 6 and 3, respectively, at A.
Pins 3 and 6 at A, must be a twisted pair wired through to pins 2 and 1, respectively, at B.
Pins 4, 5, 7, and 8 on cable B are not used in this application, although they may be wired
in the cable.
This cable can be used to connect two computers together without a hub, or to connect two hubs
together (without using an uplink port). If you're connecting two hubs together and one of them
has an uplink port, use a straight cable (rather than the crossover) to connect the uplink port of
one hub to one of the (non-uplink) ports of the other hub.
Procedure: -
1. Check for the NIC:-
i) Select setup for home or small office network in My Network Places and proceed
as shown below:
Conclusion:-
Software:
Theory:-
In the network layer, before the network can make Quality of service guarantees, it must know
whattraffic is being guaranteed. One of the main causes of congestion is that traffic is often bursty.
To understand this concept first we have to know little about traffic shaping. Traffic Shaping is
a mechanism to control the amount and the rate of traffic sent to the network. Approach of congestion
management is called Traffic shaping. Traffic shaping helps to regulate the rate of data transmission
andreduces congestion.
1. Leaky Bucket
2. Token Bucket
Suppose we have a bucket in which we are pouring water, at random points in time, but we have
to get water at a fixed rate, to achieve this we will make a hole at the bottom of the bucket. This will
ensure that the water coming out is at some fixed rate, and also if the bucket gets full, then we will
stop pouring water into it.
The input rate can vary, but the output rate remains constant. Similarly, in networking, a
technique called leaky bucket can smooth out bursty traffic. Bursty chunks are stored in the bucket
and sent out at anaverage rate.
In the below figure, we assume that the network has committed a bandwidth of 3 Mbps for a host.
The use of the leaky bucket shapes the input traffic to make it conform to this commitment. In the
above figure, the host sends a burst of data at a rate of 12 Mbps for 2s, for a total of 24 Mbits of data.
The host is silent for 5 s and then sends data at a rate of 2 Mbps for 3 s, for a total of 6 Mbits of
data. In all, the host has sent 30 Mbits of data in 10 s. The leaky bucket smooth’s out the traffic by
sending out data at a rate of 3 Mbps during the same 10 s. Without the leaky bucket, the beginning
A simple leaky bucket algorithm can be implemented using FIFO queue. A FIFO queue holds
the packets. If the traffic consists of fixed-size packets (e.g., cells in ATM networks), the process
removes a fixed number of packets from the queue at each tick of the clock. If the traffic consists of
variable-length packets, the fixed output rate must be based on the number of bytes or bits.
Algorithm:-
#include <bits/stdc++.h>
using namespace std;
int main()
{
int no_of_queries, storage, output_pkt_size;int
input_pkt_size, bucket_size, size_left;
Requirements:-
Theory: -
Telnet is a client/server application program used for logging into remote systems. It
allows you to login in system for any operation & FTP is used only for file transfer. Telnet is an
application used on the internet to connect to a remote computer, enabling access to the computer
& its resources. A user can use different application programs at a remote site & create results that
can be transferred to his local computer.
Telnet is used for a number of activities such as telneting to a site or checking email at
another account, other on-line services or an internet & many such applications. It is an example
of cyberspace extension or cyber travel, which enables the user to travel all across the internet
accessing machines or databases that may offer different services or information.
Telnet can be used only by using specific address & now it is possible to access telnet
connections through hyperlinks on the web i.e., browsing. When a user wants to access an
application program utility located on a remote machine he performs remote login operation. After
logging on, a user can use the services available on the remote site & create results that can be
transferred to his local computer. As a user types at a terminal or a workstation running a terminal
emulator, the keystrokes are accepted by the terminal driver. The terminal passes the characters to
the operating system. The local operating system accepts the characters but does not interpret
them. The characters are sent to the TELNET client, which transforms the characters to a
universal set called Network Virtual Terminal (NVT) characters & delivers them to the TCP/IP
stack. From the TCP/IP stack the characters are delivered to the operating system & passed to the
TELNET server.
iii) Presence of Network Adapter in Device Manager indicates that NIC is present.
ii) Select the computer administrator login for which the password has to be set and
proceeds shown below:
i) Go to command prompt.
ii) Use ping command to check if the connection has been made.
Software:
Theory:
Packet Tracer offers an effective, interactive environment for learning networking concepts
and protocols. Most importantly, Packet Tracer helps students and instructors create their own
virtual “network worlds” for exploration, experimentation, and explanation of networking
concepts and technologies. This software is built by Cisco and can be used to practice
networking related labs virtually. Packet tracer is an excellent tool for having hands-on
experience on devices like Cisco Routers, Switches, HUB, and end devices like PC, Laptop,
Server, and many more.
E-learning
Visualizing Networks
Real-time and simulation mode
Compatible on various platforms
Support to all languages
Most networking protocols are supported.
A ping is a basic Internet program that allows a user to test and verify if a particular destination
IP address exists and can accept requests in computer network administration.
How to run a ping network test:
1. Type “ping” in the black box and hit the space bar.
2. Type the IP address you'd like to ping (e.g., 192. XXX. X.X). 3.Review the ping results
displayed.
The ipconfig displays a computer's IP address, subnet mask and the default gateway (which is
typically the IP address of your router or network firewall).
ipconfig - Retrieves Basic TCP/IP Network Information (IP, subnet mask, gateway)
ipconfig /all - Retrieves All TCP/IP Network Information (MAC address, adapter description,
DHCPdetails)
ipconfig /release - Releases the IPv4 Address of All Network Adapters.
ARP():-
The arp command displays and modifies the Internet-to-adapter address translation tables used
by the Address in Networks and communication management. The arp command displays the
current ARP entry for the host specified by the Hostname variable.
Example - If Host A wants to transmit data to Host B, which is on the different network, then
Host A sends an ARP request message to receive a MAC address for Host B. The router
responds to Host A with its own MAC address pretend itself as a destination.
Tracert/Traceroute:-
The time duration for this transfer to happen is also recorded with the IP addresses of all
routers encounteredduring its movement returned. Hop is the movement of the packet from one
router to another. The number ofrouters encountered is the hop count.
Packet Tracer offers an effective, interactive environment for learning networking concepts
and protocols. Most importantly, Packet Tracer helps students and instructors create their own
virtual “network worlds” for exploration, experimentation, and explanation of networking
concepts and technologies. This software is built by Cisco and can be used to practice
networking related labs virtually. Packet tracer is an excellent tool for having hands-on
experience on devices like Cisco Routers, Switches, HUB, and end devices like PC, Laptop,
Server, and many more.
E-learning
Visualizing Networks
Real-time and simulation mode
Compatible on various platforms
Support to all languages
RIP is a distance-vector routing protocol. Routers running the distance- vector protocol send
all or a portion of their routing tables in routing-update messages to their neighbors. You can use
RIP to configure the hosts as part of a RIPnetwork.
When the router sends the packet to the network segment, then it is counted as asingle hop.In
the above figure, when the router 1 forwards the packet to the router 2 then it will count as 1 hop
count. Similarly, when the router 2 forwards the packet to the router 3 then it will count as 2 hop
count, and when the router 3 forwards the packet to router 4, it will count as 3 hop count. In the
same way, RIP can support maximum upto 15 hops, which means that the 16 routers can be
configured in a RIP.
Working of RIP:
If there are 8 routers in a network where Router 1 wants to send the data to Router 3. If the
network is configured with RIP, it will choose the route which has the least number of hops. There
are three routes in the above network, i.e., Route 1, Route 2,and Route 3.