Computer Network Lab Manual
Computer Network Lab Manual
Computer Network Lab Manual
(22417)
IX. ResourcesRequired
Sr. Name of Resource Specification Quantity Remarks/Use
No
1. Network Interface Card Manufacturer: Cisco
2. Computer / Networked Computers i3 processor, 2 GB RAM,
HDD 250GB
3. Switch (min. 8 ports) 8 ports
4. Crossover Cable
X. Procedure
Select "Use the following IP address" and enter the IP address, Subnet Mask and DNS server.
Click OK and close the Local Area Connection properties window.
❖ How Workgroup works
A computer joining a workgroup is assigned to the same workgroup name this process makes
accessing the computers easier.
Click on Start button Right-click on Computer and then click Properties 2 UnderComputer
name, domain, and workgroup settings, click Change settings.
3. In the System Properties dialog box, click the Computer Name tab and then click Change.In
the Computer Name/Domain Changes dialog box, under Member of, clickWorkgroup
4. Then do one of thefollowing:
To join an existing workgroup, type the name of the workgroup that you want to join, and then
click OK.
To create a new workgroup, type the name of the workgroup that you want to create, and then
click OK
Note: Repeat the steps of setup of IP address and setup of Workgroup for third computer
❖ Peer-to-peerapplications.
• Skype, an Internet telephony network, uses P2Ptechnology.
• Instant messaging systems and online chatnetworks.
• Bitcoin and PPCoin are peer-to-peer-based digitalcurrencies.
• Dalesa a peer-to-peer web cache for LANs (based on IPmulticasting).
• Open Garden, connection sharing application that shares Internet access with other
devices using Wi-Fi orBluetooth.
• Streaming media. P2PTV andPDT
XI. Precaution
1. Handle Computer System and peripherals withcare
2. Follow SafetyPractices
XII. ResourcesUsed
Sr. Name of Resource Specification
No
1. Crossover Cable
2. Network Interface Card Manufacturer: Cisco
3. Computer / Networked Computers i3 processor, 2 GB RAM, HDD 250GB
4. Switch (min. 8 ports) 8 ports
5. Any other Resource
XIV.
Practical RelatedQuestions
1. What ispeer?
2. What is peer to peernetwork?
3. How peer to peer is differs from client -servernetwork?
4. Give advantages of peer to peernetwork.
5. Give disadvantages of peer to peernetwork.
XV. Exercise
1. Student should Configure peer-to peer Network of minimum threehost
(Space for Answer)
1)
In networking, a peer is a node that provides the same functionality as another.
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
2)
Peer-to-peer network is a network in which all the
computer are linked together with equal privilege and
responsibilities for processing the data.
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
4)
1] It is less costly as it does not contain any dedicated
server.
2] If one computer stop working but , other computer
will not stop working.
3] It is easy to set up and maintain as each computer
manages itself.
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
5)
1] In the case of peer- to- peer network , it does not
contain the centralized system. Therefore it cannot
back up the data as the data is different in different
locations.
2] It has a security issue as the device is managed
itself.
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
❖ List of Students/TeamMembers
IX. ResourcesRequired
Sr. Name of Resource Specification Quantity Remarks/Use
No
1. Computer / Networked Computers i3 processor, 2 GB RAM, 10
HDD 250GB
2.. Switch (min. 8 ports) 8 ports 1
X. Procedure
Power up the switch.Connect all the computers to the Switch with standard network cable (CAT -
5).
Insert a one end of cable into NIC port of computer and another end into NIC port of switch.
Put all the computers in the same Workgroup as performed in experiment no.1
Give all the computers IP address in the same subnet mask
❖ Use the followingguideline
Open Start > Control Panel > Network Connections
Right-click ―Local Area Connection‖.This connection uses the following items select ―InternetProtocol
(TCP/IP)‖andclick the ―Properties‖button
Put a tick next to ―UsethefollowingIP Address‖andtypein theIPand subnet mask
Computer 1:
-IP: 192.168.0.10
-Subnet Mask: 255.255.255.0
Computer 2:
-IP: 192.168.0.11
-Subnet Mask: 255.255.255.0
Computer 3:
-IP: 192.168.0.12
-Subnet Mask: 255.255.255.0
Computer 4:
-IP: 192.168.0.13
-Subnet Mask: 255.255.255.0
1)
computer network is a group of computers connected
with each other through wires, optical fibre or optical
links so that various devices can interact with each
other through a network.
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
2)
Computer networks help users on the network to
share the resources and in communication.
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
3)
1] communication speed
2] File sharing
3] security
4] scalability
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
5)
1] Hub
2] Switch
3] Router
4] Bridge
5] Gateway
6] modem
7] Repeater
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
6)
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
7)
Fiber optic cable, twisted pair cable, and coaxial cable
are the three main types of network cables used in
communication systems.
1] Fiber optic cable: This cable consists of a core,
Maharashtra State Board of Technical Education 13
Computer Network
(22417)
cladding, buffer, and jacket. The core is made from
thin strands of glass or plastic that can carry data
over a long distance.
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
8)
Computer network components are the major parts
which are needed to install the software. Some
important network components are :
NIC, switch, cable, hub, router, and modem.
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
❖ List of Students/TeamMembers
RING Topology
It is called ring topology because it forms a ring as each computer is connected to another computer,
with the last one connected to the first. Exactly two neighbors for each device.
Features of Ring Topology
1. A number of repeaters are used for Ring topology with large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then the data
will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are
used in thenetwork.
2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called Dual RingTopology.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction in
them. Also, if one ring fails, the second ring can act as a backup, to keep the networkup.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass through
each node of the network, till the destinationnode.
Advantages of Ring Topology
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub is
the central node and all others nodes are connected to the central node.
Features of Star Topology
1. Every node has its own dedicated connection to thehub.
2. Hub acts as a repeater for data flow.
3. Can be used with twisted pair, Optical Fiber or coaxialcable.
Advantages of Star Topology
1. Fast performance with few nodes and low networktraffic.
2. Hub can be upgradedeasily.
3. Easy totroubleshoot.
4. Easy to setup andmodify.
5. Only that node is affected which has failed, rest of the nodes can worksmoothly.
Disadvantages of Star Topology
1. Cost of installation ishigh.
2. Expensive to use.
3. If the hub fails then the whole network is stopped because all the nodes depend on thehub.
4. Performance is based on the hub that is it depends on itscapacity
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected to
each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
Maharashtra State Board of Technical Education 15
Computer Network
(22417)
MESH Topology: Routing
In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to
direct the data to reach the destination using the shortest distance. Or, routing logic which has
information about the broken links, and it avoids those node etc. We can even have routing logic, to
re-configure the failednodes.
MESH Topology: Flooding
In flooding, the same data is transmitted to all the network nodes, hence no routing logic is required.
The network is robust, and the its very unlikely to lose the data. But it leads to unwanted load over
thenetwork.
Types of Mesh Topology
1. Partial Mesh Topology: In this topology some of the systems are connected in the same fashion as
mesh topology but some devices are only connected to two or threedevices.
2. Full Mesh Topology: Each and every nodes or devices are connected to eachother.
Features of Mesh Topology
1. Fullyconnected.
2. Robust.
3. Not flexible.
Advantages of Mesh Topology
1. Each connection can carry its own dataload.
2. It isrobust.
3. Fault is diagnosedeasily.
4. Provides security andprivacy.
Disadvantages of Mesh Topology
1. Installation and configuration isdifficult.
2. Cabling cost ismore.
3. Bulk wiring isrequired.
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
Features of Tree Topology
1. Ideal if workstations are located ingroups.
2. Used in Wide AreaNetwork.
Maharashtra State Board of Technical Education 16
Computer Network
(22417)
Advantages of Tree Topology
1. Extension of bus and startopologies.
2. Expansion of nodes is possible andeasy.
3. Easily managed andmaintained.
4. Error detection is easilydone.
Disadvantages of Tree Topology
1. Heavilycabled.
2. Costly.
3. If more nodes are added maintenance isdifficult.
4. Central hub fails, networkfails.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies. For example if in
an office in one department ring topology is used and in another star topology is used, connecting
these topologies will result in Hybrid Topology (ring topology and star topology).
Features of Hybrid Topology
1. It is a combination of two ortopologies
2. Inherits the advantages and disadvantages of the topologiesincluded
Advantages of Hybrid Topology
1. Reliable as Error detecting and trouble shooting iseasy.
2. Effective.
3. Scalable as size can be increasedeasily.
4. Flexible.
Disadvantages of HybridTopology
1. Complex indesign.
2. Costly
VIII. Diagrams / Experimental set-up /WorkSituation
1)
There are five types of topology in computer
networks:
1. Mesh Topology
2. Star Topology
3. Bus Topology
4. Ring Topology
5. Hybrid Topology.
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
2)
a] The physical topology is the way you physically lay
out the network, like a map, and the logical topology is
the way the information flows on the network.
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
Maharashtra State Board of Technical Education 20
Computer Network
(22417)
b] A properly designed topology shows the flow of
data and considers the wide range of data layers
where the data can be persisted.
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
f] 1) Bus Topology
2) Ring Topology.
3) Star Topology
4) Mesh Topology
5) Tree Topology
6) Hybrid Topology
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
g]
h]In star topology, the central site plays an important
role; if it fails, all the connections will go down.
Performance of the central hub dictates the
performance of the connection.
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
❖ List of Students/TeamMembers
………………………………………………..………………………………………………..
❖ Crossover networkcable:
It is used to connect two devices of the same type: two computers or two switches to each other.
Both sides (side A and side B) of cable have wire arrangement with different color.
These are used when connecting Data Terminating Equipment (DTE) to Data Terminating Equipment
(DTE) or Data Communications Equipment (DCE) to Data Communications
Equipment(DCE).
RJ45 Connector for network cables. RJ45 connectors are most common
RJ45 is a standard type of Connector for Network Cables.
RJ4 connectors feature eight pins to which the wire strands of a cable interface electrically. Standard
RJ45 pin outs define the arrangement of the individual wires needed when attaching
Connector to Cable.
A Crimping Tool is a tool designed to crimp or connect a connector to the end of cable
Network cables and Phone cables are created using crimping tool to connect RJ 45and RJ 11 connectors
to the end of the cable
IX. ResourcesRequired
Sr. Name of Resource Specification Quantity Remarks/Use
No
1. Network Interface Card Manufacturer: Cisco
2. Computer / Networked Computers i3 processor, 2 GB RAM,
HDD 250GB
3. Switch (min. 8 ports) 8 ports
4. UTP CAT 6 Cable
5. Crimping Tool
6. RJ 45 connector
7. Line Tester
Pinch the wires between your fingers and straighten them out.
A view from the top. All the wires are all the way in. There are no short wires.
Crimping The Cable: carefully place the connector into the Ethernet Crimper and cinch down on the
handles tightly. The copper splicing tabs on the connector will pierce into each of the eight wires. There
Make sure to test the cables using line tester before installing them. Use Cable Tester
XI. Precaution
1. Follow SafetyPractices
2. Cut the plastic cover carefully so that cables would not getcut
3. Arrange color code and check beforecrimping
XII. ResourcesUsed
Sr. Name of Resource Specification Quantity Remarks/Use
No
1. Network Interface Card Manufacturer: Cisco
2. Computer / Networked Computers i3 processor, 2 GB RAM,
HDD 250GB
3. Switch (min. 8 ports) 8 ports
4. UTP CAT 6 Cable
5. Crimping Tool
6. RJ 45 connector
7. Line Tester
Maharashtra State Board of Technical Education 26
Computer Network
(22417)
XIII. Result
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
XIV. Practical RelatedQuestions
1. Give the use of transmission media, Crimping tool, straight cable, crossover cable,and
connector.
2. List out types of twisted paircables
3. Give the name of connector used inlaboratory.
4. Which tool is used to test networkcable?
5. Give the meaning of TX and RX used forconnector.
6. Write the category of UTP/STP cable along with itsspecifications.
7. What is the difference between straight cable and crossed cable w.r.t order ofwires?
8. What is the meaning ofRJ?
9. Give the purpose to have network toolkit in alaboratory.
XV. Exercise
Prepare and Test straight and Cross UTP cable
(Space for Answer)
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
8)RJ:-Radio Jockey.
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
Practical No.5:Install and Configure Network Interface Card and identify its MAC address
I. PracticalSignificance
Knowthe NIC
Identify MAC address
II. Relevant Programs Outcomes (POs)
1. Basic knowledge: Apply knowledge of basic mathematics, sciences and basic
engineering to solve the broad-based Information Technologyproblems.
2. Discipline knowledge: Apply Information Technology knowledge to solve Information
Technology relatedproblems.
3. Experiments and practice: Plan to perform experiments and practices to use the results
to solve broad-based Information Technologyproblems.
4. Engineering tools: Apply relevant Information Technologies and tools with an
understanding of thelimitations.
5. Communication:Communicate effectively in oral and writtenform.
III. Competency and Practicalskills
1. Install NIC and to know the MAC address of Computer
IV. Relevant CourseOutcomes
Use Basic Concept of Networking for setting of Computer Network
V. Practical Outcomes(POs)
Understand NIC
VI. Relevant Affective domain relatedOutcomes
1. Follow safetypractices
2. Demonstrate working as a leader/teammember
3. Follow ethicalpractices
VII. Minimum TheoreticalBackground
Installing a NIC card requires you to have some basic knowledge on computer component and does
notnecessarily needyoutobeacomputerwhiztodothejob.
IX. ResourcesRequired
Sr. Name of Resource Specification Quantity Remarks/Use
No
1. Computer / Networked Computers i3 processor, 2 GB RAM, 10
HDD 250GB
2. Switch (min. 8 ports) 8 ports 1
X. Procedure
To install the Network Interface Card follow through the following steps to successfully install your
card.
Unplug the power cable on your computer powersupply.
Open your PC case, there are usually two screws at the back of your PC, unscrew it and set aside
the screw. Some pc case don‘t have screws to remove the cover you just have to slide the
covertoopen,refertoyourPCcasemanualonhowtoremovethecoverofyourPC.
Discharge yourself from any static charge that my damage the component before touching any
pccomponent.
You can do this by using an anti-static wrist strap clipping it to the computer casing metallic part or if
you don't have this anti-static wrist strap you can touch any non-painted metallic part of the
Install the NIC card by aligning the guide notches with the PCI slot and pressing the card gently till
it sit firmly on the PCI slot, you‘ll know if it is sited well if you can‘t see the pins of the NIC on the
PCI slot.
Secure the card by using a single screw, screwing the card bracket firmly to the computer casing.
Inspect the card if it moves, a well sited card should not move when you try to move them. A not
properly sited card may damage the card when you power on your computer.
Plug in the power cord to the power supply and power on your computer.
Wait for windows to load, a ―new device detected‖message by windows should appear and it will
install the necessary driver or ask you for the device driver, after the installation of device driver
you can install its software if ithas.
Check device manager if the driver is installed properly, you should see no yellow exclamation
on the NICdevice.
If everything works out right then you can now close your computer casing and return the screwat
the back of yourPC.
XI. Precaution
1. Handle Computer System and peripherals withcare
2. Follow SafetyPractices
XII. ResourcesUsed
Sr. Name of Resource Specification
No
1. Network Interface Card Manufacturer: Cisco
2. Computer / Networked Computers i3 processor, 2 GB RAM, HDD
250GB
3. Any other Resource
XIII. Result
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Maharashtra State Board of Technical Education 35
Computer Network
(22417)
XIV. Practical RelatedQuestions
1. What Is Local AreaNetwork?
2. State the purpose of Network InterfaceCard.
3. Where Network Interface Card is placed incomputer?
4. State different parameters on the basis of which NICclassified.
5. Which types of connector used by interface Card forcabling?
6. How to check whatever Network Interface Card successfully installed ornot.
7. What is USB Adaptor and where it isused?
8. State meaning of IPAddress.
9. To whom MAC address is allocated and what is use ofit.
10. How MAC address differs from IPaddress?
11. Give general representation of MACaddress
12. MAC address is more secured than lP address‖,why?
13. Give the steps to locate MAC address ofComputer.
14. A computer MAC address: 02:45: ZD: 65. 02: 1E. What the first three and remainingthree
blocks
15. It is possible to replace NIC card? If yes thenhow?
XV. Exercise
Install NIC card check MAC address
(Space for Answer)
14)
15) yes... its possible and easy to change MAC
address of any Computer.
Bear in mind that each network interface has its
own MAC address. So, on a typical desktop or
laptop with both a Wi-Fi radio and a wired Ethernet
port, the wireless and wired network interface each
Maharashtra State Board of Technical Education 39
Computer Network
(22417)
have unique, separate MAC addresses.
You can see your MAC address for Ethernet And
Wireless LAN just by single command in cmd.
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
❖ List of Students/TeamMembers
A shared resource or network share is a device or piece of information on a computer that can be
remotely accessed from another computer typically via a local area network or an enterprise Intranet,
transparently as if it were a resource in the local machine.
Examples are shared file access (also known as disk sharing and folder sharing), shared printer
access (printer sharing), shared scanner access, etc.
Resource sharing means reduction in hardware costs. Shared files mean reduction in memory
requirement, which indirectly means reduction in file storage expenses.
A network share can become a security liability when access to the shared files is gained (often by
devious means) by those who should not have access to them. Many computer worms have spread
through resource sharing
Printer sharing is a feature which allows you to access and use a printer from other computers
in network.
If there are ten employees in an organization, each having their own computer, they will require ten
printers if they want to use the resource at the same time. Printer sharing allows accessing the computers
that can be interconnected using a network, and just one printer can efficiently provide the services to all
ten users. Folder sharing is the public or private sharing of computer data or space in a network with
various levels of access privilege.
A user sitting at one computer that is connected to network can easily see files present on another
computers, provided he is authorized to do so. This saves him/her the hassle of carrying a storage device
every time data needs to be transported from one system to another system
First start with the computer the printer is connected to. Make sure it‘s installed correctly with the latest
drivers. click Start >> Devices and Printers.
Next, right-click on the printer you want to share and select Printer Properties.
Click the Sharing tab. Make sure Share this Printer is checked and give it an easy to remember share
name. Click OK.
The computer the printer is attached to will need to be powered on to find and print to it.
Now go to the other computer you want to print from. Click Start >> Devices and Printers.
The system will search your network for the shared printer. When it finds the printer, highlight it and
click Next.
If Windows doesn‘t automatically find the printer, click The Printer That I Want Isn‘t Listed.
Check Select a Shared Printer by Name and type the path in directly.
Ensure that File and Printer Sharing is enabled. In order to share specific folders, you will need to
have this feature enabled. The method for enabling it varies slightly depending on which version of
Windows you are using. It is highly recommended that you do not enable folder sharing when on a public
network such as a school or coffee shop.
Windows 7 - Click the Start button, type "control panel", and press ↵ Enter. Double-click the "Network
and Sharing Center" icon. Click the "Change advanced sharing settings" link. Expand the profile that you
want to enable sharing on (Home/Work or Public). Turn on both "Network discovery" and "File and
printer sharing". Click the "Save changes" button and enter your administrator password if necessary.
Find the folder you wish to share. Once File and Printer Sharing has been enabled, you can share any
folder on your hard drive with other people on your network. Navigate to the folder that you want to
share using Explorer. Right-click on it.
1. Select the "Share with" option. This will open the Sharing submenu. You can choose to shareit
with everyone in your Homegroup or select specific people to share it with.
When choosing a Homegroup option, you can allow other Homegroup members to both read and write to
the folder, or limit them to just read from it.
Click the "Specific people" option to select which users you want to share with. This will open a new
window with a list of all the users that currently have access to the folder. You can add users to this list
and give them specific permissions for the folder.
• To share the folder with everyone, click the dropdown menu at the top andselect
"Everyone". Click the Addbutton.
• To share with specific users, click the dropdown menu and select them or type in thename
and clickAdd.
Set permissions for users on the list. Find a user on the list that you want to change the permissions for.
Look in the Permissions Level column, and click the arrow next to the existing permission. Select the
new one from the list.
• Read - User can see, copy, and open files from the folder, but cannot change files oradd
newones.
• Read/Write - Besides Read abilities, users can change files and add new files to theshared
folder. Files can be deleted by users with Read/Writepermissions.
• Remove - Removes permissions for this user, and removes them from thelist.
6Click the Share button. Your permission settings will be saved, and the folder will be available on the
network for all allowed users.
XI. Precaution
1. Handle Computer System and peripherals withcare
2. Follow SafetyPractices
XII. ResourcesUsed
2] folder sharing
*Advantages
A secure, more reliable environment. Important
files containing "sensitive" data should not be
stored on your computer.
An effective way of sharing information and
resources. Can be accessed at any time from
anywhere when you need them.
*Disadvantages
File sharing can be illegal.
Copyright infringements can be quite costly.
Sentences for copyright infringements often also
include jail.
May harm many artists.
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
5) *Full Control
*Modify
*Read & Execute
*List Folder Contents
*Read
*Write.
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
XVI. References/ Suggestions for furtherReading
https://computer.howstuffworks.com/share-printer-home-network-windows
XVII. AssessmentScheme
Practical No.7:Run the following TCP/IP Command with options record their output : Ping,
ipcnfig, Tracert, Netstat, Wireshark,ARP
I. PracticalSignificance
To know the use of TCP/IP utilities
Run the TCP/IP utilities
II. Relevant Programs Outcomes (POs)
1. Basic knowledge: Apply knowledge of basic mathematics, sciences and basic
engineering to solve the broad-based Information Technologyproblems.
2. Discipline knowledge: Apply Information Technology knowledge to solve Information
Technology relatedproblems.
3. Experiments and practice: Plan to perform experiments and practices to use the results
to solve broad-based Information Technologyproblems.
4. Engineering tools: Apply relevant Information Technologies and tools with an
understanding of thelimitations.
5. Communication:Communicate effectively in oral and writtenform.
III. Competency and Practicalskills
1. Run TCP/IPutilities
IV. Relevant CourseOutcomes
Configure Basic network Services
Configure TCP/IP services
V. Practical Outcomes(POs)
Understand TCP/IP utilities
VI. Relevant Affective domain relatedOutcomes
1. Follow safetypractices
2. Demonstrate working as a leader/teammember
3. Follow ethicalpractices
VII. Minimum TheoreticalBackground
❖ TCP/IPutilities
Maharashtra State Board of Technical Education 55
Computer Network
(22417)
To assist with the management of TCP/IP.There are three types of TCP/IP-based utilities.
Connectivity utilities that you can use to interact with and use resources on a variety of systems.
Diagnostic utilities that you can use to detect and resolve networking problems.
TCP/IP server software that provides printing and publishing services to TCP/IP based Microsoft
Windows client
❖ PING(Packet Internetgroper):
It is a command used to verify the network connectivity of a computer. It checks the host name,
IP address, and that the remote system can be reached.
It uses a special protocol called the Internet Control Message Protocol (|CMP) to determine
whether the. Remote machine (website, server, etc.) can receive the test packet and reply
This command is used to test a machine‘s connectivity to another system and to verify that the
target system is active. Usually this command is the first step to any troubleshooting if a
connectivity problem is occurring between two computers.
The Ping utility executes an end-to-end connectivity test to other devices and obtains the round-
trip time between source and destination device. Ping uses the ICMP Echo and Echo Reply
packets to test connectivity. Excessive usage may appear to be a denial of service (DoS) attack.
Parameter Description
-t Pings the specified host until interrupted (press Ctrl+C to stop sending).
-a Resolves addresses to hostnames.
-n count Indicates the number of Echo Requests to send.
Sends a specific size of data. If this size is greater than the local network can
-l size
handle, thesender will generate fragmented packets directly on the network.
-f Sets the Don‘t Fragment flag in the packet.
-i TTL Sets the Time to Live value in the packet.
-vTOS Sets the type of service in the packet.
Indicates that the Ping process should record the route for the number of count
-r count
hops specified.
Indicates that the Ping process should maintain Timestamp information for the
-s count
number of count hops specified.
Syntax
ipconfig /? | /all |
Following table shows use of ipconfig command with different options
Parameter Description
❖ Tracert
It is use to determines the route data takes to get to a p ach router to trace the
The iCMP protocol sends out Time Exceeded messages to. e
route. . Each time a packet is sent, the time-to-live (TTL) value is reduced before the packet
Parameter Description
❖ NETSTAT
It is used to shows the status of each active network connection.
Netstat will display statistics for both TCP and UDP, including protocol, local address, foreign
address, and the TCP connection state. Because UDP is connectionless, no connection information
will be shown for UDP packets.
It‘s a helpful tool in funding problems and determining the amount of traffic on the network as a
performance measurement.
Syntax:
netstat [-a] [-b] [-e] [-f] [-n] [-o] [-p proto] [-r] [-s] [-x] [-t] [interval]
Following table shows use of netstat command with different options.
Parameter Description
-a Lists all current connections and open, listening ports on the local system.
❖ ARP
The ARP utility helps diagnose problems associated with the Address Resolution
Protocol (ARP). _ TCP/IP hosts use ARP to determine the physical (MAC) address that corresponds
with a specific IP address.
Once the MAC address is determined by the ARP reply, the IP and MAC address of the destination
system are stored in the ARP cache (stored in memory) so that next time the address will be resolved
from the cache and a broadcast will not be needed.
Syntax: arp -a
Displays current entries in the ARP cache. If inet_addr is specified, the IP and data
-a or -g linkaddress of the specified computer appear. If more than one network interface
usesARP, entries for each ARP table appear.
inet_addr Specifies an Internet address.
-N if_addr Displays the ARP entries for the network interface specified by if_addr.
-v Displays the ARP entries in verbose mode.
-d Deletes the host specified by inet_addr.
Adds the host and associates the Internet address inet_addr with the data linkaddress
-s eth_addr. The physical address is given as six hexadecimal bytes separatedby hyphens.
The entry is permanent.
eth_addr Specifies physical address.
If present, this specifies the Internet address of the interface whose addresstranslation
if_addr
table should be modified. If not present, the first applicable interface willbe used.
IX. ResourcesRequired
Sr. Name of Resource Specification Quantity Remarks/Use
No
1. Computer / Networked Computers i3 processor, 2 GB RAM,
HDD 250GB
X. Procedure
1. Open CommandPrompt
2. Run Utilities withoptions
XI. Precaution
1. Handle Computer System and peripherals withcare
2. Follow SafetyPractices
XII. ResourcesUsed
Sr. Name of Resource Specification
No
1. Computer / Networked Computers i3 processor, 2 GB RAM, HDD 250GB
2. Any other Resource
XIII. Result
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
2. What is a purpose of TCP/ IP utilities? Give the use of network utility and also write 2
examples ofit.
3. Which are the different things are checked using pingcommand?
4. What is a use of IPcontigutility?
5. Whatisauseof―/release‖and―/renew‖optionusedinlpcontig?WhyTracertcommandisused? Give the
syntax of Tracertcommand
6. What is a use of ARP utility? Which are different statistics is display for TCP using Netstat
utility?
7. ―TCP/IP utilitiesareused fortroubleshootinginindustry‖comment on this statement
XIV. Exercise
Run all utilities with options and attach printout (Suggested by Teacher)
Give the use and syntax of Hostname and
4)
5) *USE:-RTP is used in communication and
entertainment systems that involve streaming media,
such as telephony, video teleconference applications
including WebRTC, television services and web-based
push-to-talk features.
*Displays active TCP connections, ports on which the
computer is listening, Ethernet statistics, the IP
routing table, IPv4 statistics (for the IP, ICMP, TCP,
and UDP protocols), and IPv6 statistics (for the IPv6,
ICMPv6, TCP over IPv6, and UDP over IPv6
Maharashtra State Board of Technical Education 64
Computer Network
(22417)
protocols). Used without parameters, this command
displays active TCP connections.
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………
Practical No.8:Use Wireshark Packet sniffer software and captures TCP,UDP, IP, ARP, ICMP,
Telnet, FTP packets
I. PracticalSignificance
Capture the different packets in the network
II. Relevant Programs Outcomes (POs)
1. Basic knowledge: Apply knowledge of basic mathematics, sciences and basic
engineering to solve the broad-based Information Technologyproblems.
2. Discipline knowledge: Apply Information Technology knowledge to solve Information
Technology relatedproblems.
3. Experiments and practice: Plan to perform experiments and practices to use the results
to solve broad-based Information Technologyproblems.
4. Engineering tools: Apply relevant Information Technologies and tools with an
understanding of thelimitations.
5. Communication:Communicate effectively in oral and writtenform.
III. Competency and Practicalskills
Understand Wireshark Packet sniffer software
IV. Relevant CourseOutcomes
Use Basic Concept of Networking for setting of Computer Network
Setup up computer Network for Specific Requirement
V. Practical Outcomes(POs)
Use software for capturing packet
VI. Relevant Affective domain relatedOutcomes
1. Follow safetypractices
2. Follow ethicalpractices
VII. Minimum TheoreticalBackground
A packet is the unit of data that is routed between an origin and a destination on the internet or any
other packet-switched network.
The individual packets for a given file may travel different routes through the Internet.
A packet consists of two kinds of data: control information and user data (also known as payload).
The control information provides data that the network needs to deliver the user data, forexample:
source and destination network addresses, error detection codes, and sequencinginformation.
Network Packet Consist of Control information and User data
a. Packet capture library: receives a copy of every link-Iayer frame that is sent from 0rreceived
by yourcomputer.
b. Packet analyzer: displays the contents of all fields within a protocolmessage.
It is an open source protocol analyzer that is used to capture packets in a network to see their
contents.
It is the most widely used graphical application for network monitoring and analysis. It runs on
most popular computing platforms, including UNIX, Linux, and Windows.
The Wireshark GUI interface has five major components: a. Command menus: standard pull down
menus located at the top of the window.
b. Packet listing window: Display a one-line summary for each packet captured, includingthe
packet number, time, source and destination address, protocoltype.
c. Packet-header details window: provides details about the packet selected (highlighted) inthe
packet listingwindow.
d. Packet-contents window: displays the entire contents of the captured frame, in both ASCIIand
hexadecimalformat.
e. Packet display filter field: a protocol name or other information can be entered in order tofilter
the information displayed in the packet-listingwindow.
Uses of Wireshark
1. Capture live packetdata.
2. Import and Export packets.
3.Filter and Searchpackets.
4.Display and save packet data Colorize packet display.
5.Statistics in graphical way.
Maharashtra State Board of Technical Education 67
Computer Network
(22417)
Fig.Wireshark logo
IX. ResourcesRequired
Sr. Name of Resource Specification Quantity Remarks/Us
No e
1. Computer / Networked Computers i3 processor, 2 GB RAM,
HDD 250GB
2. Wireshark
3.
X. Procedure
Step 1 – Download Wireshark
http://www.wireshark.org/download.html
Run as Administrator
Step 2 – Install
Maharashtra State Board of Technical Education 68
Computer Network
(22417)
Next
IAgree
Next
Next
IAgree
Install
Finish
That‘s it!
Wireshark will now completely install for you.
If the install hangs half way through, it‘s because WinPcap has not been installed yet.
Next
Launch Wireshark
Start > All Programs > Wireshark Icon
Wireshark launches
You can filter these results by protocol and by IP, and I‘ll cover that another time.
For now, select the Protocol header – and your results will sort by protocol.
ANALYSE >DisplayFilter
HTTP
Select HTTP
OK
XI. Precaution
1. Handle Computer System and peripherals withcare
2. Follow SafetyPractices
XII. ResourcesUsed
Sr. Name of Resource Specification
No
1. Computer / Networked Computers i3 processor, 2 GB RAM, HDD 250GB
2. Wireshark
3.
XIII. Result
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
………………………………………………………………………………………………………………
XIV. Practical RelatedQuestions
1. Define protocol and give names of any twoprotocols.
2. Define packet and give itsuse.
3. What kinds of data are present inpacket?
4. What is meaning of packetsniffer?
5. ―Packet sniffer itselfis passive.‖stateTrueor falseand justifyyour answer.
6. Give the name of two components of packet sniffer with itsuse.
7. What is wireshark ?Give the names of wireshark GUI components.Write any 5 usage of
❖ List of Students/TeamMembers
………………………………………………..
3. In the Add Roles window, open Server Roles and check Web Server(IIS).
4. Proceed through the setup wizard, and click Install. Wait for the installation tocomplete.
If IIS is installed already (as a Web server),
1. Navigate to Start > Control Panel > Administrative Tools > ServerManager
2. In the Windows Server Manager, go to Roles node, and expand Web Server(IIS).
3. Right-click on Web Server (IIS), and click on Add RoleServices.
4. In the Add Role Services window, go to Roles Services, and check FTPServer.
5. Confirm that IIS Management Console is checked under Management Tools.
6. Click Next, and then Install. Wait for the installation tocomplete.
Transferring files
To transfer files, you should add an FTP site. Once the FTP site is enabled, clients can transfer to
and from the site using the FTP protocol.
1. Navigate to Start > Control Panel > Administrative Tools > Internet InformationServices
(IIS)Manager.
2. Once the IIS console is open, expand the local server.
3. Right-click on Sites, and click on Add FTP Site.
1)
FTP isbuilton (client-server) architecture(Client-
server/P2P).
........................................................................................
..................................
2) FTP sends its control informationin-band.
Maharashtra State Board of Technical Education 87
Computer Network
(22417)
........................................................................................
..................................
3)
........................................................................................
..................................
4)
*FTP stands for file transfer protocol.FTP is a
standard communication protocol used for the
transfer of computer files from a server to a client
on a computer network.
*Work:-If you send files using FTP, files are either
uploaded or downloaded to the FTP server. When
you're uploading files, the files are transferred
from a personal computer to the server.
........................................................................................
Maharashtra State Board of Technical Education 88
Computer Network
(22417)
..................................
❖ List of Students/TeamMembers
Protocols include mechanisms for devices to identify and make connections with each other, as well
as formatting rules that specify how data is packaged into messages sent and received.
Some protocols also support message acknowledgement and data compression designed for reliable
and/or high-performance network communication.
TCP/IP:
❖ Transmission Control protocol/lnternet Protocol, used to connect computers on the Internetor
network.
❖ TCP/IP is built into the UNIX Operating system and is used by the Internet, making it the de
facto standard for transmitting data overnetworks.
❖ Transmission Control Protocol, manages the assembling of a message or file into smaller
packets that are transmitted over the Internet and received by a TCP layer that reassemblesthe
packets into the originalmessage.
❖ Internet Protocol, handles the address part of each packet so that it gets to the rightdestination.
❖ TCP/IP protocols map to a four-layer conceptual model known as the DARPA model,named
after the US Government agency that initially developed TCP/IP. The four layers of the
DARPA model are: Application, Transport, Internet, and NetworkInterface.
TCP/IP model
IP address:
❖ An Internet Protocol address (IP address) is a numerical label assigned to each device(e.g.,
computer, printer) participating in a computer network that uses the Internet Protocol for
communication.
❖ An IP address is an identifier for a computer or device on a TCP/IPnetwork.
Two versions of the Internet Protocol (IP) are in use: IP Version4 (IPv4) and IP Version6
(IPv6).
❖ IPv4 addresses are of 32 bits that are canonically represented in dot-decimal notation, which
consists of four decimal numbers, each ranging from 0 to 255, separated by dots, e.g.,
172.16.254.1
Maharashtra State Board of Technical Education 91
Computer Network
(22417)
❖ IPv6 addresses are of 128 bits that are represented as eight groups of four hexadecimaldigits
separated bycolons.
e.g. 2001:0db8:85a3:0042:1000:8a2e:0370:7334
❖ The IPv4 address space can be subdivided into 5 classes Class A, B, C, D and E. Eachclass
consists of a contiguous subset of the overall IPv4 address range.
VIII. Diagrams / Experimental set-up /WorkSituation
Host Host
A B
X. Procedure
Complete the following steps to install and configure the TCP/IP protocol.
1. Start->Control Panel->Network and Internet->Network Sharing center,Change adaptersetting
2. Right-click the connection to which you want to add a network component, andthen
clickProperties.
3. If Internet Protocol (TCP/IP) is listed, skip to Step 6. If Internet Protocol (TCP/IP) is not
listed, clickInstall.
4. In the Select Network Component Type dialog box, click Protocol, and then clickAdd.
5. From the Network Protocol list, select TCP/IP Protocol and clickOK.
6. From the General tab (for local area connections) or the Networking tab (for all other
connections), select Internet Protocol (TCP/IP), and then clickProperties.
To configure automatically, select Obtain an IP address automatically, and then click OK.
▪ Manually – You must configure TCP/IP manually if you do not have a DHCP server on your
network, or if you are configuring a Windows server to be a DHCP server. In this case, you
must manually enter valid addressing information after the TCP/IP protocol software is
installed on your computer. To avoid duplicate addresses, be sure to use the values for IP
addresses and subnet masks that are supplied by your networkadministrator.
To configure manually, select Use the following IP address, specify the necessary parameters,
and then click OK.
XI. Precaution
1. Handle Computer System and peripherals withcare
2. Follow SafetyPractices
XII. ResourcesUsed
Sr. Name of Resource Specification
No
1. Computer / Networked Computers i3 processor, 2 GB RAM, HDD 250GB
2. Any other Resource
XIII. Result
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
XIV. Practical RelatedQuestions
1. Defineprotocol
2. Give four examples of protocol with its fullname.
3. Write the name of layers inTCP/IP?
4. Give the use of IPaddress.
5. Give and explain the address format of IPv4 and IPv6. Give the use of network layer in
TCP/IP.
Maharashtra State Board of Technical Education 93
Computer Network
(22417)
6. How 192.168.276 is type of class C IPaddress?
7. Convert theIPv4address―192168.276‖to binary format of32 bits.
1)
A protocol is a standard set of rules that allow
electronic devices to communicate with each other.
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………....................................
2)
1] DNS (Domain Name System)
2] FTP (File Transfer Protocol)
3] HTTP (Hyper Text Transfer Protocol)
4] HTTPS (Hypertext Transfer Protocol Secure).
.....,......................................,......................................,.........
.............................,..............
3)
1] Transport layer
2] Network layer
3] Datalink layer
4] physical layer.
.....,......................................,......................................,.........
.............................,..............
Maharashtra State Board of Technical Education 95
Computer Network
(22417)
4)
IP addresses are the identifier that allows information
to be sent between devices on a network: they contain
location information and make devices accessible for
communication. The internet needs a way to
differentiate between different computers, routers,
and websites.
.....,................................,........................................,.............
.................,..........................
5)
*An IPv4 is a 32-bit decimal address. It contains 4
octets or fields separated by 'dot', and each field is 8-
bit in size. *Whereas an IPv6 is a 128-bit hexadecimal
address. It contains 8 fields separated by a colon, and
each field is 16-bit in size.
*USE:-This layer is mainly responsible for the
transmission of the data between two devices on the
same network. The functions carried out by this layer
are encapsulating the IP datagram into frames
transmitted by the network and mapping of IP
addresses into physical addresses.
...,......................................,......................................,...........
...........................,.............
Maharashtra State Board of Technical Education 96
Computer Network
(22417)
❖ List of Students/TeamMembers
………………………………………………..………………………………………………..
IX. ResourcesRequired
Sr. Name of Resource Specification Quantity Remarks/Use
No
1. Computer / Networked Computers i3 processor, 2 GB RAM,
HDD 250GB
X. Procedure
Enabling the Telnet Server
1. Go to Start -> Control Panel ->Programs.
2. In the Programs and Features section, click Turn Windows features on or off. If the User
Account Control permission warning pops up, click on Continue. And if you are prompted foran
administrator password, type itin.
3. In the Windows Features dialog box, select the Telnet Server checkbox.
4. Click OK and wait for the installation tofinish.
1)
Telnet is a protocol used on a network to provide a
two-way interactive command line interface (CLI)
using a virtual terminal connection.Telnet Server
allows command line access to an embedded module
over an IP network.
.............................................................................................
.............................................
2)
Maharashtra State Board of Technical Education 100
Computer Network
(22417)
Telnet is an application protocol used on the Internet
or local area network to provide a bidirectional
interactive text-oriented communication facility using
a virtual terminal connection. ... The name stands for
"teletype network". Historically, Telnet provided
access to a command-line interface on a remote host.
.............................................................................................
...........................................
3)
Telnet service is available on port 23 of the host
machine.
.............................................................................................
...........................................
❖ List of Students/TeamMembers
Maharashtra State Board of Technical Education 101
Computer Network
(22417)
Prabhakar Balaji More (2011630170)
Marks Obtained Dated Signature of Teacher
Process Related(35) Product Related (15) Total(50)
IX. ResourcesRequired
Sr. Name of Resource Specification Quantity Remarks/Use
No
1. Computer / Networked Computers i3 processor, 2 GB RAM,
HDD 250GB
X. Procedure
1. Open RemoteApp and Desktop Connections in Control Panel, either by opening Control Panel, orby
using WindowsSearch.
2. Click Set up a new connection with RemoteApp and Desktop Connections . This will start the new
connectionwizard.
Maharashtra State Board of Technical Education 104
Computer Network
(22417)
3. Enter the URL of the connection. This URL will generally be of theform:
https://<servername>/rdweb/feed/webfeed.aspx
Here,―<servername>‖is thehost name ofthe RDWeb Accessserver. Thewizard shouldlook like this:
Note: RemoteApp and Desktop Connections uses HTTPS to connect to the server. In order to connect
properly, the client operating system must trust the SSL certificate of the RD Web Access server. Also, the
server name in the URL must match the one in the server’s SSL certificate.
4. Click Next.
5. Click Next . The RemoteApp and Desktop Connections client software will now contact the RD Web
Access server to set up the connection. You will be prompted to authenticate to the webserver.
6. Enter your credentials. Now the RemoteApp and Desktop Connections client software willfinish
setting up theconnection.
In a moment, the process will complete, and you will see a wizard page that summarizes the results.
7. Click Finish .
Now the RemoteApp and Desktop Connections Control Panel will show your newly created connection:
You can return to this summary page anytime you need to manage your connections.
The Start menu will now contain the RemoteApp programs from the new connection:
XI. Precaution
1. Handle Computer System and peripherals withcare
2. Follow SafetyPractices
XII. ResourcesUsed
Sr. Name of Resource Specification
No
1. Computer / Networked Computers i3 processor, 2 GB RAM,
HDD 250GB
XIII. Result
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
………………………………………………………………………………………………………………
XIV. Practical RelatedQuestions
1. What is Remote DesktopApplication
2. How to Use to Remote DesktopApplication
3. Which other remote desktop applications areavailable
4. Which are benefits of Remote DesktopApplication
XV. Exercise
Use Remote Desktop Application show the output
(Space for Answer)
❖ List of Students/TeamMembers
X. Procedure
How to Configure DHCP on Windows Server 2016
DHCP is used to dynamically assign IP addresses to client machines. This tutorial is written to help
you to install and configure DHCP on Windows Server 2016. Once you have followed this article,
go ahead with creating scopes and start leasing out IP addresses
Prerequisites
1. The administrator account has a strongpassword.
2. Latest updates areinstalled.
3. Firewall is turnedoff.
4. Static IP isconfigured.
Step 4. Choose the server on which you want to configure DHCP and click Next.
Step 5. Choose DHCP from server roles. As soon as you choose DHCP, a new window appears. Click
Add Features.
Step 8. Read the explanation about the DHCP function, then click Next.
Step 11. Click Next to continue with the DHCP Post-Install Wizard.
Step 12. Click Commit (Choose Skip AD authorization if your machine is on workgroup).
Step 13. Click Close and you are done with configuring DHCP.
XI. Precaution
3. Handle Computer System and peripherals withcare
4. Follow SafetyPractices
XII. ResourcesUsed
Sr. Name of Resource Specification
No
1. Computers with Windows Server 2016
2. Any other Resource
XIII. Result
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
XIV. Practical RelatedQuestions
1. Explain DHCP
2. What is the use of DHCPserver
3. Explain working of DHCPserver
4. Differentiate between Dynamic IP and Static IPaddress
XV. Exercise
Student should configure DHCP server
(Space for Answer)
3) HOW WORKS:
DHCP works at the application layer to
dynamically assign the IP address to the client and
this happens through the exchange of a series of
messages called DHCP transactions or DHCP
conversation. DHCP Discovery: The DHCP client
broadcast messages to discover the DHCP servers.
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………
❖ List of Students/TeamMembers
Subnet Mask: A subnet mask is used to divide an IP address into two parts. One part identifies the host
(computer); and the other part identifies the network to which it belongs.
It is called a subnet mask because it is used to identify network address of an IP address by performing
bitwise AND operation on the Net mask.
Subnet Mask is the most recognizable aspect of subnetting. Similar to P addresses, Subnet Mask consists
four bytes (32 bits) and is often written using the same ―dotted-decimal‖notation. For example. a very
common subnet mask in its binary representation:
11111111 11111111 11111111 00000000, is typically shown in the equivalent and in more readable form
as given below
255.255.2550
IP address has two component network and host address. Network address refers to the address of
the network to which Host address refers to the host of that network.
TCP/ 1P requires subnet mask to work. For example using a 255.255.2550 subnet mask, which shows
that the network It) Is 192.168.7.0. and the host address is 0.0.0.21. When a packet arrives on the
192.168.7.0 subnet (from the local subnet or a remote network), having a destination address of
192168.721, host computer will receive it from the network and process it.
IMP TIP: 00000000 00000000 00000000 00000000, Is an Invalid subnet mask because the leftmost
bitissetto„0‟.„Conversely,therightmostbitsinavalidsubnetmaskmustbesetto„0‟,not„1‟.So: 11111111
11111111 11111111 11111111is also invalid.
IX. ResourcesRequired
Sr. Name of Resource Specification Quantity Remarks/Use
No
1. Computer / Networked Computers i3 processor, 2 GB RAM, 10
HDD 250GB
2.. Switch (min. 8 ports) 8 ports 1
X. Procedure
Creating SubnetMask
Step.1 Determine the network class (Suppose Class C) 192.168.7.0 falls in Class C range (192 -
223). The default Subnet Mask is 255.255.2550, leaving the last octet available
Step. 2 Determine how many bits are needed to create subnets. For example calculate for 20 hosts
using formula 2x-2 where x represents the no of bits in host mask. Refer the table given above.
Step.3 From above table new assign 255.255.255.224 address for subnet mask.
Creating two Subnets
Step. 3 Create second subnet by borrowing two rightmost bit of host address as per below table.
Network address 192 168 7 0
11000000 10101000 00000111 00000000
Subnet Mask 255 255 255 192
11111111 11111111 11111111 11000000
Step 4: Two subnets created are:
1.192.168.7.128
2.192.168.7.192
XI. Precaution
1. Handle Computer System and peripherals withcare
2. Follow SafetyPractices
XII. ResourcesUsed
Sr. Name of Resource Specification
No
1. Computer / Networked Computers i3 processor, 2 GB RAM,
HDD 250GB
2.. Switch (min. 8 ports) 8 ports
3. AnyotherResource
XIII. Result
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
XIV. Practical RelatedQuestions
1. What isSubnet?
2. What is SubnetMask?
❖ List of Students/TeamMembers
………………………………………………..
………………………………………………..
64-bit interface identifier derived from the MAC address of the interface3.
Link-Local unicast IPv6 addresses are created for purposes such as auto-address configuration and
neighbor discovery on a single link. A link may be a point-to-point connection between two interfaces or
a switched layer-2 domain such as an Ethernet network.
Link-local unicast addresses only work on the link on which they are configured because IPv6 routers are
required to not forward any packets with link-local source or destination addresses to other links.
Using the ifconfig Observer Widget
We can use the Core Network Emulator‘s Observer Widget tool to view the interface configuration on
each node and take note of the IPv6 address on each interface. Click on the Observer Widget tool (the
magnifying glass icon in the toolbar) and select the ifconfig widget. Then, hover the mouse pointer over
each node to see the displayed interface configuration.
interface eth0. Link-local IPv6 addresses are not routable so the source system does not know which
interface on which to send the ping packet. We need to specify the source interface when using link-local
IPv6 addresses.
Ona Linuxsystem, thesamecommand can bewritten with a―zone‖suffixas:
$ ping6 fe80::200:ff:feaa:2%eth0
But the -I eth0 option is supported the same wayon most operatingsystems, whilethe―zone‖suffixis
not.
Host h1 interface eth0 to Router r1 interface eth0
We see that Host h1 can send and receive IPv6 data packets to and from the eth0 interface on
Router r1 using the ping command with the link-local IPv6 address. These interfaces are on the same
link.
root@h1:~# ping6 -c 1 -I eth0 fe80::200:ff:feaa:0
PING fe80::200:ff:feaa:0(fe80::200:ff:feaa:0) from fe80::200:ff:feaa:1 eth0: 56 data bytes
64 bytes from fe80::200:ff:feaa:0: icmp_seq=1 ttl=64 time=0.335 ms
Maharashtra State Board ofTechnicalEducation 109
Computer Network
(22417)
root@h1:~#
Experiment with globally reachable unicast IPv6 addresses
With no additional configuration, devices on the same subnet can reach each other using IPv6 but in
order for nodes on one subnet to communicate with nodes on another subnet and with nodes in other
networks, a unique and reachable unicast IPv6 prefix must be assigned to each subnet.
The IPv6 protocol expects that more than one IPv6 address may be added to each interface. In thiscase,
we already have a link-local address on each interface in the simulation and we will now add a globally
unique reachable address to eachinterface.
The documentation IPv6 prefix
The authorities that assign IPv6 addresses have thoughtfully reserved a special prefix for use in
documentation and in examples like this one, so if we ever connect this simulation to a real IPv6
networks it will not cause any problems. The prefix allocated for documentation purposes
is 2001:0DB8::/32.5
So, in our example, we will assign the following prefixes to each subnet:
show command (or Core Network Emulator‘s Observer Widget tool) and see that the IPv6 addresses are
configured on each interface and we see that the prefixes 2001:DB8:0:1::/64 and 2001:DB8:0:2::/64 have
a global scope (as opposed to a link scope). For example, on router r1:
root@r1:~# ip -6 addr show
1: lo: mtu 65536
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
6: eth0: mtu 1500 qlen 1000
inet6 2001:db8:0:1::1/64 scope global
valid_lft forever preferred_lft forever
inet6 fe80::200:ff:feaa:0/64 scope link
valid_lft forever preferred_lft forever
12: eth1: mtu 1500 qlen1000
inet6 2001:db8:0:2::1/64 scope global
valid_lft forever preferred_lft forever
inet6 fe80::200:ff:feaa:3/64 scope link
valid_lft forever preferred_lft forever
root@r1:~#
Network tests with global addresses
We verify that all addresses are configured according to our address plan. We see each interface now has
a link local IPv6 address and a global IPv6 address.
Then, on host h1, start the SSH session to r1. Since each node is linux container, use your own userid (in
my case it is brianl) and your user password to access the remote node because Xubuntu will not allow
you access to the root user on the Linuxcontainer.
root@h1:~# ssh brianl@2001:DB8:0:1::1
brianl@2001:db8:0:1::1's password:
Welcome to Ubuntu 13.10 (GNU/Linux 3.11.0-19-generic x86_64)
* Documentation: https://help.ubuntu.com/
0 packages can be updated.
0 updates are security updates.
brianl@r1:~$ ls
Desktop Downloads Music Public Videos
DocumentsDropbox Pictures Templates
brianl@r1:~$exit
logout
Connection to 2001:DB8:0:1::1 closed.
root@h1:~#
Maharashtra State Board ofTechnicalEducation 114
Computer Network
(22417)
Looking at the Wireshark window on r1 interface eth0, we see some new destination addresses (these are
multicast addresses used by the Neighbor Discovery Protocol) and we see the two systems communicate
to match the MAC address of router r1‗s interface eth0 with the destination IPv6 address.
❖ List of Students/TeamMembers
………………………………………………..………………………………………………..
X. Procedure
There are other radvd configurations that can be entered in this file but we‘ll just keep it simple for now.
Unless they are explicitly configured, all other radvd parameters use their defaultvalues.
Start radvd
Now, start the radvd service4. Right-click on the router r1 and select the following menu command from
the contextual menu:
ef command:
root@r1:~# ps -ef
UID PID PPID C STIME TTY TIME CMD
root 1 0 0 23:38 ? 00:00:00 /usr/local/sbin/vnoded -v -c /tm
root 52 1 0 23:38 ? 00:00:00 /usr/lib/quagga/zebra -u root -g
root 126 1 0 23:57 pts/7 00:00:00 /bin/bash
root 191 1 0 23:58? 00:00:00 radvd -C /etc/radvd/radvd.conf -
root 193 1 0 23:58? 00:00:00 radvd -C /etc/radvd/radvd.conf -
root 195 126 0 23:58 pts/7 00:00:00 ps -ef
root@r1:~#
If radvd does not start, it is probably due to a syntax error in the configuration file.
Check IP assigned addresses
After starting radvd, we should see that the hosts have automatically configured IPv6 addresses using the
prefixes we configured on the router.
addr show command on each simulated node‘s terminal window. For example, on host h1, we see the
link-local address with thelink-localprefix fe80::/64 and a global unique address using theprefix
router r1. We also see some other information about the route.
Next, we look at the IPv6 addresses configured on the hosts, such as h1:
root@h1:~# ip -6 addr show
1: lo: mtu 65536
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
50: eth0: mtu 1500 qlen 1000
inet6 2001:db8:0:1:200:ff:feaa:1/64 scope global dynamic
valid_lft 85979sec preferred_lft 13979sec
inet6 fe80::200:ff:feaa:1/64 scope link
valid_lft forever preferred_lft forever
root@h1:~#
Compare these address configurations to the static addresses configured on the router. We see that the
automatically-configured addresses on the hosts have a expiration timers set (valid for 85,979 more
seconds and preferred for 13,797 more seconds, in the example above) but the manually configured static
IPv6 addresses have no expiration time set (they will remain valid ―forever‖):
root@r1:~# ip -6 addr show
1: lo: mtu 65536
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
48: eth0: mtu 1500 qlen 1000
inet6 2001:db8:0:1::1/64 scope global
valid_lft forever preferred_lft forever
inet6 fe80::200:ff:feaa:0/64 scope link
valid_lft forever preferred_lft forever
54: eth1: mtu 1500 qlen1000
inet6 2001:db8:0:2::1/64 scope global
valid_lft forever preferred_lft forever
inet6 fe80::200:ff:feaa:3/64 scope link
valid_lft forever preferred_lft forever
root@r1:~#
We would configure the prefixes we have chosen to use on each link. Forexample:
interface eth0
{
AdvSendAdvert on;
prefix 2001:db8:0:1::/64 { };
};
interface eth1
{
AdvSendAdvert on;
prefix 2001:db8:0:2::/64 { };
};
Next, we would ensure that the file permissions are correct. Radvd will not start unless the configuration
file has secure permissions so that no other users can write to the file.
&sudochmod 644 /etc/radvd.conf
$ ls -l /etc/radvd.conf
-rw-r--r-- 1 root root 642 Apr 26 22:57 /etc/radvd.conf
Maharashtra State Board ofTechnicalEducation 132
Computer Network
(22417)
Start radvd
Now, we would start the radvd service.
$ sudo serviceradvdstart
Then, we would permanently configure radvd to start when the system starts orreboots:
$ sudo update-rc.dradvd defaults
$ sudo update-rc.dradvd enable
Router interface IP addresses
We would assign the router‘s interface IPv6 addresses. On a normal router, we would permanently
configure these interfaces by adding information to the file /etc/network/interfaces. For example:
$ sudovi/etc/network/interfaces
Or,
$ sudo /etc/init.d/networkingrestart
XI. Precaution
1. Handle Computer System and peripherals withcare
2. Follow SafetyPractices
XII. ResourcesUsed
Sr. Name of Resource Specification
No
1. Computer / Networked Computers i3 processor, 2 GB RAM,
HDD 250GB
❖ List of Students/TeamMembers
………………………………………………..………………………………………………..