Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
15 views

Computer Networks Lab Manual WORD

The document is a lab manual for a B.Tech CSE 5th semester course, detailing various experiments related to computer networks. It includes a list of experiments such as LAN introduction, network topologies, and connecting computers with Ethernet cables, along with theoretical explanations of networking equipment and topologies. Each experiment is structured with a theoretical background and practical steps for implementation.

Uploaded by

yeeshandas
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Computer Networks Lab Manual WORD

The document is a lab manual for a B.Tech CSE 5th semester course, detailing various experiments related to computer networks. It includes a list of experiments such as LAN introduction, network topologies, and connecting computers with Ethernet cables, along with theoretical explanations of networking equipment and topologies. Each experiment is structured with a theoretical background and practical steps for implementation.

Uploaded by

yeeshandas
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

B.

Tech CSE 5th SEm


Computer Network Lab Manual

LIST OF EXPERIMENTS

Sr. No. Name of Experiment Date of Date of Remark


Exp. Submission
Introduction to Local Area
1 Network with its Cables,
Connectors and Topologies.
Introduction to Network
2
Topologies.
How to Connect Two
3 Computers with an Ethernet
Cable?

4 Configuration of DHCP.

How to Configure Router


5
Settings?

Introduction to Server
6
Administration.
Installation and working
7 with Telnet (Terminal
Network)
How to set up an FTP
8
server

Installing a Windows
9
NT/2000/2003Server

How to Install a Network


10
Switch?

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

Experiment 1 - Introduction to Local Area Network with its


Cables, Connectors and Topologies.

Theory:

Types of LAN Equipment

"Local-Area Networking Introduction," discussed the different types of hardware found in a LAN
environment hubs, bridges, and switches and how each piece of hardware functions specifically in an
Ethernet environment.

a) Repeaters (Layer 1 Devices)

A repeater is a network device used to regenerate or replicate a signal. Repeaters are used in transmission
systems to regenerate analog or digital signals distorted by transmission loss. Repeaters are used in both
local-and wide-area networking environments to extend the distance a signal can reach. In the LAN
environment, you would use a repeater to extend the distance a data signal can travel on a cable.

Fig. 1.1 Repeaters

b) Hubs (Layer 1 Devices)

A hub is often used to connect small LAN segments in which the number of devices is generally 24 or
fewer, and hubs are multiport repeaters. Hubs provide the signal amplification required to allow a segment
to be extended a greater distance.
A hub takes an incoming signal on any one port and repeats it out all ports to enable users to share the
Ethernet network resources.
Ethernet hubs create star topologies in 10-Mbps or 100-Mbps half-duplex Ethernet LANs. It is the hub that
enables several point-to-point segments to be joined toge

ther into one single network. A shared Ethernet LAN means that all members of the network are contending
for transmission of data onto a single network.
RSR Rungta College of Engineering & Technology Bhilai
B.Tech CSE 5th SEm
Computer Network Lab Manual

Fig. 1.2 HUB

Hub falls in two categories:

Active Hub: They are smarter than the passive hubs. They not only provide the path for the data signals
in fact they regenerate, concentrate and strengthen the signals before sending them to their destinations.
Active hubs are also termed as ‘repeaters’.

Passive Hub: They are more like point contact for the wires to build in the physical network. They have
nothing to do with modifying the signals.

c) Bridges (Layer 2 Devices)

Repeaters and hubs have no intelligence; they just repeat whatever signal is received from one port out all
ports without looking at what is being sent or received. Bridges add a level of intelligence to the network
by using the MAC address to build a table of hosts, mapping these hosts to a network segment and
containing traffic within these network segments. For example, Figure 5-6 illustrates a bridged network
with two network segments.

Fig. 1.3 Bridges

Types of Bridges:

There are mainly three types in which bridges can be characterized:


RSR Rungta College of Engineering & Technology Bhilai
B.Tech CSE 5th SEm
Computer Network Lab Manual

Transparent Bridge: It appears to be transparent for the other devices on the network. The other devices
are ignorant of its existence. It only blocks or forwards the data as per the MAC address.

Source Route Bridge: It is mainly used in Token ring networks. The path which packet takes through the
network is implanted within the packet in this type of bridges.
Translational Bridge: It converts the data format of one networking to another. For instance, Token ring to
Ethernet and vice versa.

d) Switches (Layer 2 Devices)

Switches sit in the same place in the network as hubs. Unlike hubs, however, switches examine each frame
and process the frame accordingly instead of just repeating the signal to all ports. Switches map the MAC
addresses of the nodes residing on each network segment and then allow only the necessary traffic to pass
through the switch. A switch performs the same functions as a bridge; so, when the switch receives a frame,
it examines the destination and source MAC addresses and compares them to a table of network segments
and addresses. If the segments are the same, the frame is dropped, or filtered; if the segments differ, the
frame is forwarded to the proper segment.
The filtering of frames and regeneration of forwarded frames enables switches to split a network into
separate collision domains. Frame regeneration enables greater distances and more network devices, or
nodes, to be used in the total network design, and lowers the overall collision rates. In switched networks,
each segment is an independent collision domain, whereas in shared networks all nodes reside in one, big,
shared collision domain.

Fig.1.4 Switch

e) Routers (Layer 3 Devices)

Routers are devices that forward data packets from one LAN or WAN to another. Based on routing tables
and routing protocols, routers read the network address in the packet contained within each transmitted
frame. Routers then select a sending method for the packet based on the most expedient route. This most
expedient route is determined by factors such as traffic load, line quality, and available bandwidth. Routers
work at Layer 3 (network) in the protocol stack, whereas bridges and switches work at Layer 2 (data link).
Routers segment LANs to balance traffic within workgroups and to filter traffic for security purposes and
policy management.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

Fig. 1.5 Router

f) Gateways (Layer 7 Devices)

Gateway is a device which is used to connect multiple networks and passes packets from one packet to the
other network. Acting as the ‘gateway’ between different networking systems or computer programs, a
gateway is a device which forms a link between them. It allows the computer programs, either on the same
computer or on different computers to share information across the network through protocols. A router is
also a gateway, since it interprets data from one network protocol to another.

Fig 1.6 Gateways Networking


Equipment’s:

a) Network card

Network cards also known as Network Interface Cards (NICs) are hardware devices that connect a
computer with the network. They are installed on the mother board. They are responsible for developing a
physical connection between the network and the computer. Computer data is translated into electrical
signals send to the network via Network Interface Cards.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

Fig 1.7 Network Interface Card

b) Modems

Modem is a device which converts the computer-generated digital signals of a computer into analog signals
to enable their travelling via phone lines. The ‘modulator-demodulator’ or modem can be used as a dial up
for LAN or to connect to an ISP. Modems can be both external, as in the device which connects to the
USB or the serial port of a computer, or proprietary devices for handheld gadgets and other devices, as
well as internal; in the form of add-in expansion cards for computers and PCMCIA cards for laptops.

Fig 1.8 Modems

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

Experiment 2 - Introduction to Network Topologies.

Theory:

Standard Network topology


Network topology is the physical interconnections of the elements (links, nodes, etc.) of a computer
network. A local area network (LAN) is one example of a network that exhibits both a physical topology
and a logical topology. Any given node in the LAN has one or more links to one or more other nodes in
the network and the mapping of these links and nodes in a graph results in a geometrical shape that may
be used to describe the physical topology of the network. Likewise, the mapping of the data flows between
the nodes in the network determines the logical topology of the network. The physical and logical
topologies may or may not be identical in any particular.

The various types of network topologies are as follows:

1. Hierarchical topology
2. Bus topology
3. Star topology
4. Ring topology
5. Mesh topology
6. Hybrid topology

1) Hierarchical Topology

The hierarchical topology is also known as tree topology, which is divided into different levels connected
with the help of twisted pair, coaxial cable or fiber optics. This type of topology is arranged in the form of
a tree structure in which top level contains parent node (root node), which is connected with the child
nodes in the second level of hierarchy with point-to-point link. The second level nodes are connected to
the third level nodes, which in turn are connected to the fourth level nodes and so on. Except the top- level
nodes, each level node has a parent node.
The number of point-to-point links in the hierarchical type of topology is generally one less than the total
number of nodes in the structure. The hierarchical topology is symmetrical, having a fixed branching
factor, f, associated with each node. The branching factor is the number of point-to-point links between
the levels of hierarchy

Advantages of hierarchical topology are:


RSR Rungta College of Engineering & Technology Bhilai
B.Tech CSE 5th SEm
Computer Network Lab Manual
• The hierarchical topology is generally supported by most hardware and software.
• In the hierarchical topology, data is received by all the nodes efficiently because of point-to- point link.

Disadvantages of hierarchical topology:

• In the hierarchical topology, when the root node fails, the whole network crashes.
• The hierarchical topology is difficult to configure.

1) Linear Bus Topology

In the linear bus topology, all the nodes are connected to the single backbone or bus with some medium
such as twisted pair, coaxial cable etc. When a node wants to communicate with the other nodes in the
network, it simply sends a message to the common bus. All the nodes in the network then receive the
message but the node for which it was actually sent only processes it. The other nodes discard the message.

Figure 2.2 Linear bus topology.

Advantages of linear bus topology are:


• The linear bus topology usually requires less cabling.
• The linear bus topology is relatively simple to configure and install.
• In the linear bus topology, the failure of one computer does not affect the other computers in the network.

Disadvantages of linear bus topology:

• In the linear bus topology, the failure of the backbone cable results in the breakdown of entire network.
• Addition of computers in the linear bus topology results in the performance degradation of the network.
• The bus topology is difficult to reconstruct in case of faults.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual
2) Star Topology

In the star topology, all the nodes are connected to a common device known as hub. Nodes are connected
with the help of twisted pair, coaxial cable or optical fiber. When a node wants to send a message to the
other nodes, it first sends the message to the hub, which in turn forwards the message to the intended node.
Each node in the network is connected with a point-to-point link to the centralized hub. The task of hub is
to detect the faulty node present in the network. On the other hand, it also manages the overall data
transmission in the network.

Figure 2.3 Star topology.

Advantages of star topology are:


• This topology allows easy error detection and correction.
• In the star topology, the failure of one computer does not affect the other computers in the network.
• Star topology is easy to install.

Disadvantages of star topology:

• In the star topology, the hub failure leads to the overall network crash.
• The star topology requires more amount of cable for connecting the nodes.
• It is expensive due to the cost of the hub.

3) Ring Topology

In the ring topology, the nodes are connected in the form of a ring with the help of twisted-pair cable. Each
node is connected directly to the other two nodes in the network. The node, which wants to send a message,
first passes the message to its consecutive node in the network. Data is transmitted in the clockwise
direction from one node to another. Each node incorporates a repeater, which passes the message to next
node when the message is intended for another

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

node.

Figure 2.4 Ring topology

Advantages of ring topology are:


• Each node has an equal access to other nodes in the network.
• Addition of new nodes does not degrade the performance of the network.
• Ring topology is easy to configure and install.

Disadvantages of ring topology:

• It is relatively expensive to construct the ring topology.


• The failure of one node in the ring topology affects the other nodes in the ring.

4) Mesh Topology
In mesh topology, each computer is connected to every other computer in point-to-point mode as shown
in figure 5. For example, if we have four computers, we must have six links. If we have n computers, we
must have n(n-1)/2 links. A message can take several possible paths to

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

reach a destination.

Figure 2.5 Mesh topology.

Advantages of mesh topology are:


• Message delivery is more reliable.
• Network congestion is minimal due to large number of links.

Disadvantages of mesh topology:

• It is very expensive to implement.


• It is very difficult to configure and install.

5) Hybrid Topology

The hybrid topology is the combination of multiple topologies, used for constructing a single large
topology. The hybrid topology is created when two different network topologies are interconnected.
If two ring topologies are connected then the resultant topology is not the hybrid topology. On the other
hand, if the ring topology is connected to the bus topology then the resulting topology is called the hybrid
topology. This topology generally combines the features of the two topologies and is therefore more
effective and efficient than the individual topologies.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

Experiment 3 - How to Connect Two Computers with an Ethernet


Cable?

The simplest method to connect two computer systems without using the internet is through an ethernet
cable. Once the connection is established the two systems can share files between them and also view and
edit those files. In this tutorial, we will learn to step by step to establish a connection between two
computers using an ethernet cable.

Follow the steps below to connect two computers using an ethernet cable:

Step 1: First check if the two selected systems support Ethernet cable.

Step 2: If either or both systems does not support ethernet cable then an external ethernet adapter is
required.

Step 3: Plug one end of the ethernet cable in the first system and the remaining end in the second system.

Step 4: Once the ethernet cables are plugged in both the systems, open Control Panel. Press the start
button and type control panel or press “ + R” and type “control panel” and press enter.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

Step 5: In the control panel select the “Network and Internet” option.

Step 6: Then select “Network sharing center“.

Step 7: From upper left portion of screen select “change advanced sharing settings“.
RSR Rungta College of Engineering & Technology Bhilai
B.Tech CSE 5th SEm
Computer Network Lab Manual

Step 8: Under “File and printer sharing” select “Turn on file and printer sharing” option.

Step 9: Then click on “Save Changes“.


RSR Rungta College of Engineering & Technology Bhilai
B.Tech CSE 5th SEm
Computer Network Lab Manual

Step 10: To allow the two connected systems to view or edit shared data, a folder first needs to be selected
and then click on the share tab then select the recipients then click on done.

Step 11: Now on the second system open file explorer, select the system who is sharing the file, enter the
password if password protected.

Step 12: View the contents of the shared folder or edit them.

Note: This process can be done from and for both the computers.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

Experiment 4 - Configuration of DHCP.


Theory :
This step-by-step description how to configure a new Windows Server 2003-based Dynamic Host
Configuration Protocol (DHCP) server on a stand-alone server, which can provide centralized management
of IP addresses and other TCP/IP configuration settings for the client computers on a network.

How to Install the DHCP Service

Before configure the DHCP service, you must install it on the server. DHCP is not installed by default
during a typical installation of Windows Standard Server 2003 or Windows Enterprise Server 2003. You
can install DHCP during the initial installation of Windows Server 2003, or after the initial installation is
completed.
How to Install the DHCP Service on an Existing Server

1. Click Start, point to Control Panel, and then click Add or Remove Programs.
2. In the Add or Remove Programs dialog box, click Add/Remove Windows Components.
3. In the Windows Components Wizard, click Networking Services in the Components list, and then click
Details.
4. In the Networking Services dialog box, click to select the Dynamic Host Configuration Protocol
(DHCP) check box, and then click OK.
5. In the Windows Components Wizard, click Next to start Setup. Insert the Windows Server 2003 CD-ROM
into the computer's CD-ROM or DVD-ROM drive if it is prompted to do so. Setup copies the DHCP server
and tool files to your computer.
6. When Setup is completed, click Finish.

How to Configure the DHCP Service

After you have installed the DHCP service and started it, you must create a scope. The scope is a range of
valid IP addresses available for lease to the DHCP client computers on the network. Microsoft recommends
that, each DHCP server in your environment has at least one scope that does not overlap with any other
DHCP server scope in your environment. In Windows Server 2003, DHCP servers in an Active Directory-
based domain must be authorized to prevent rogue DHCP servers from coming online. Any Windows
Server 2003 DHCP Server that determines itself to be unauthorized will not manage clients.

How to Create a New Scope 1. Click Start, point to Programs, point to Administrative Tools, and

then click DHCP.

2. In the console tree, right-click the DHCP server on which you want to create the new DHCP scope, and
then click New Scope.
3. In the New Scope Wizard, click Next, and then type a name and description for the scope. The name can
be anyone that you want, but it should be descriptive enough so that you can identify the purpose of the

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual
scope on your network (for example, you can use a name such as "Administration Building Client
Addresses"). Click Next.
4. Type the range of addresses that can be leased as part of this scope. For example, use a range of IP addresses
from a starting IP address of 192.168.100.1 to an ending address of 192.168.100.100. Because these
addresses are given to clients, they must all be valid addresses for your network and not currently in use.
If you want to use a different subnet mask, type the new subnet mask. Click Next.
5. Type any IP addresses that you want to exclude from the range that you entered. These addresses include
any one in the range described in step 4 that may have already been statically assigned to various computers
in your organization. Typically, domain controllers, Web servers, DHCP servers, Domain Name System
(DNS) servers, and other servers, have statically assigned IP addresses. Click Next.
6. Type the number of days, hours, and minutes before an IP address lease from this scope expires. It
determines how long a client can hold a leased address without renewing it. Click Next, and then click
Yes, I want to configure these options now to extend the wizard to include settings for the most common
DHCP options. Click Next.
7. Type the IP address for the default gateway that should be used by clients that obtain an IP address from
this scope. Click Add to add the default gateway address in the list, and then click Next.
8. If you are using DNS servers on your network, type your organization's domain name in the Parent
domain box. Type the name of your DNS server, and then click Resolve to make sure that your DHCP
server can contact the DNS server and determine its address. Click Add to include that server in the list of
DNS servers that are assigned to the DHCP clients. Click Next, and then follow the same steps. If you are
using a Windows Internet Naming Service (WINS) server, by adding its name and IP address, click Next.
9. Click Yes, I want to activate this scope now to activate the scope and allow clients to obtain leases from
it, and then click Next.
10. Click Finish.
11. In the console tree, click the server name, and then click Authorize on the Action menu.

Troubleshooting

The following sections explain how to troubleshoot some of the issues that you may experience, when you
try to install and configure a Windows Server 2003-based DHCP server in a workgroup.

Clients Cannot Obtain an IP Address

If a DHCP client does not have a configured IP address, it typically indicates that the client was not able
to contact a DHCP server. This issue can be caused by a network problem, or because the DHCP server is
unavailable. When the DHCP server started and other clients can obtain valid addresses, verify that the
client has a valid network connection and that all the related client hardware devices (including cables and
network adapters) are working properly.

The DHCP Server Is Unavailable

When a DHCP server does not provide leased addresses to clients, it is frequently because the DHCP
service did not start. In this case, the server may not be authorized to operate on the network. If you were
previously able to start the DHCP service, use Event Viewer to check the System log for any entries. These
logs may explain why you cannot start the DHCP service.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual
To restart the DHCP service:

1. Click Start, and then click Run.


2. Type cmd, and then press ENTER.
3. Type net start dhcpserver, and then press ENTER.

-or-

1. Click Start, point to Control Panel, point to Administrative Tools, and then click Computer Management.
2. Expand Services and Applications, and then click Services.
3. Locate and then double-click DHCP Server.
4. Verify that Startup is set to Automatic and that Service Status is set to Started. If not, click Start.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

Experiment 5
- How to Configure Router Settings?
As this guide has already explained, router programming has numerous benefits. Below, I’ve given a short
explanation of how to get started configuring router settings according to best practices.

Accessing Your Router

Before you can learn how to configure router settings, you’ll first need to know how to access them as an
administrator. If you’re using the network also used by the router, then this is the first thing you should
try; go to your web browser and type in the following IP addresses, one after the other, into the search bar.

• 168.0.1 • 168.1.1
• 168.2.2
• 0.1.1
• 0.0.1
• 10.1.1
If a welcome page pops up, or a login window, then you’re in. But if these IP addresses don’t give you
access, then you’ll have to go through the longer process. First, go to your settings and click on “Network
& Internet.” Then select “View your network properties.” You should see “Default gateway” and a number
beside it. This number is your router IP address. Type this address into your web browser’s search bar and
a login or welcome page should appear.

From this point, you’ll need to log in as an administrator. Admin info should be on the back of the router.

Changing Router Login Info

This is an important security factor. To change your router’s password, follow these steps:

1. Access your router settings by inputting your router IP address into your browser
2. Log in with router username and password
3. Visit “Settings” and click on “Change Router Password”
4. Input your chosen password (keeping in mind a strong password should have at least eight characters and
feature letters, numbers, and special characters) and save the new settings

Changing Router IP Address

These instructions are for D-link routers, though the process is likely to be similar for other router types.

1. Access your router settings by inputting your router IP address into your browser
2. Log in with router username and password
3. Visit “Settings” and click on “Network settings”

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual
4. Type in the new IP address under “Router Settings” and save the changes
5. Note, you won’t be able to use the old IP address to access your router settings anymore

Changing SSID

This process will teach you how to change your SSID, or network name, to something more memorable.

1. Access your router settings by inputting your router IP address into your browser
2. Log in with router username and password
3. Visit “Setup” and click on “Wireless settings”
4. Input your new SSID and save the new settings
5. You’ll then have to wait for your router to restart

Configuring Guest Wi-Fi and Multi-SSID

These following instructions are based on NETGEAR router settings, but again the process will be similar
for other router types.

1. Access your router settings by inputting your router IP address into your browser
2. Log in with router username and password
3. Visit “Guest Network” and make sure the “Enable SSID Broadcast” check box is ticked
4. Name the guest network and select a security option, then click “apply” to save the settings

Activating Remote Management

To access your router remotely, follow these instructions:

1. Go to your router’s administration panel


2. Visit “Settings,” then “Remote Management”
3. Turn remote management on and save the settings

Gaining Visibility of Who Is Connected

1. Access your router settings by inputting your router IP address into your browser
2. Log in with router username and password
3. Visit “My Network” or something similar. It may also be under “Attached devices”
4. If you see an unfamiliar device you don’t think should be connected, ban its MAC address

Changing Wireless Band and Channel

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual
Before changing your wireless band and channel, carefully consider what would be most suitable for your needs.
For example, if you have a new router supporting 5GHz bands, this is probably a good choice for you as it will
probably be less crowded. This means it’s a great

option in densely populated areas. To change these settings, follow the instructions above to
access your router settings and visit “Wireless Settings.” You should be able to tweak band and
channel from here.

Setting Up Parental or Employee Controls

Setting up filtering or monitoring controls is simple. These controls should be under router
settings, though keep in mind they may have a dedicated category within the system. In some
cases, you may want to download a specialized program to integrate with your router for more
fine-tuned control. Either way, I’d recommend setting up a PIN or password for access to these
controls, so users can’t change the settings themselves.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

Experiment 6 - Introduction to Server Administration.


What is server administration?

Server administration comprehends all tasks related to managing, optimizing and


monitoring servers, networks and systems in order to ensure they work properly and safely.
It requires 24/7 availability and monitoring to guarantee business operations at all times.
Although some routing tasks can be completed during regular business hours, other tasks such
as server fixes or system upgrades must be performed during off business hours to minimize
the impact of the service.

Server administrators

The role of server administrators is to install, manage, optimize, monitor and solve problems
(if necessary) in the company’s servers and related components. To ensure high performance
and security, server administrators are responsible for completing a wide list of tasks, including

• Hardware management and maintenance.


• Application maintenance and updates.
• Backup scheduling.
• Server and system monitoring.
• Performance optimization.
• Access management.
• Technical support and ticketing management.
• Implementing security barriers against cyberattacks.
• Data protection.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual
• Data center safety, when opting for on-premise servers.

On-premise or off-premise servers

Whether they decide to host servers on- or off-premises, companies must take responsibility for the
server administration to some extent. However, in case of outsourcing their infrastructure, they also get
to outsource some server administration tasks, such as:
• Hardware management and maintenance.
• Hardware monitoring.
• Physical security measures.

Besides, it is worth mentioning that the level of redundancy, security and efficiency offered by service providers
is difficult to achieve in an in-house datacenter.

Important aspects in server and system administration

The server being the core of operations, server administration is essential to properly manage and protect
digital assets. Here are some aspects that cannot be neglected to ensure the best performance and
business continuity at all times.

Security

Security is a top priority for all server administrators. According to Check Point, in 2021, there was
a 50% increase in overall cyberattacks per week on corporate networks, compared to the previous year.
Therefore, having a proactive approach to cyber security is more important than ever, and proper server
administration is key on this matter.
Beyond defining and implementing security barriers, server and system administrators are in charge of
constantly monitoring and analyzing potential vulnerabilities and threats. So that they can proactively
implement the necessary security patches and barriers. In fact, as more companies are becoming aware
of the importance of cybersecurity for business continuity, new security solutions and trends are on the
rise:


Security Operations Center (SOC) to deal with security issues both on an organizational and technical level.
• Zero Trust Security model, based on the premise that trust is a vulnerability.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual
• Disaster Recovery solutions to be prepared against any contingency.
Moreover, considering cyberattacks are on the rise, it is also highly recommended to rely on an
infrastructure which provides redundancy at all levels.

Every element within our infrastructure is redundant to provide a fault-tolerant service. From the most
common elements — power feeds, cooling, routers and aggregation switches —, to the most difficult
ones —the access switches to all computing nodes, the storage and the nodes themselves.

— Discover Stackscale’s private cloud

Updates

To guarantee the highest security level, it is also important to keep the server’s applications
updated. That is why, server administrators keep track of new updates and security patches to
minimize the risk of a cyberattack.

Monitoring

System and server monitoring is essential to avoid and solve any problem even before it shows up.
Not only to detect vulnerabilities and bottlenecks, but also to improve services.
Monitoring CPU, memory or bandwidth usage, as well as having access to real-time data and logs,
is extremely useful for sysadmins to optimize performance and security.

Backups

Designing a suitable backup schedule is indispensable. It should be adapted to the RPO and
RTO goals defined in the company’s Disaster Recovery plan.
Automatizing storage and datacenter backups and snapshots protects businesses in the event of
a failure or emergency. Besides, it is recommended to store at least one backup in a remote
location.

Server administration tools

There are many system and server administration tools IT teams use to manage and monitor their
infrastructure. Here is a list of some of the most popular tools in the market:
• Cacti. Network monitoring and graphing tool.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual
• Grafana. Data analytics and interactive visualization platform.
• Graphite. Performance monitoring tool.
• Graylog. Log management software.
• Nagios. Network and server monitoring tool.
• NetData. Real-time performance monitoring tool.
• Pandora FMS. Software for monitoring systems, applications, TCP/IP services, network systems, etc.

• Prometheus. Event monitoring and alerting tool.


• Splunk. Data platform for searching, monitoring and analyzing data.
• Wanguard. Network monitoring and protection tool.
• Zabbix. Network monitoring tool.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

Experiment 7 - Installation and working with Telnet


(Terminal Network)

Install Telnet on Windows

1. Open the Control Panel.


2. Click on “Programs.”
3. Under “Programs and Features,” click on “Turn Windows features on or off.”
4. In the “Windows Features” window, scroll down to find “Telnet Client” and check the box next
to it.
5. Click “OK” to install the Telnet Client.
6. Once the installation is complete, you can access Telnet through the Command Prompt or
PowerShell.

Connect to a Remote Server Using Telnet 1. Open Command Prompt,

PowerShell, or Terminal (depending on your OS).

2. Type the following command, replacing “webhostinggeeks.com” with the remote server’s
address and “port_number” with the appropriate port:
telnet webhostinggeeks.com port_number
3. Press Enter to establish a connection.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

Experiment 8 - How to set up an FTP server

FTP functions on a client-server model. The server hosts the files to be shared and the client
provides the interface to access, download, or upload files to the file server. The computers
transferring the files can be within the same network where the FTP server is configured, as
well as outside the network (over the internet). FTP uses two ports, one for connection and one
for sending data.
FTP can run in two modes: active and passive. And, it uses two channels between the client and
server: the command channel and the data channel. The command channel is for sending the
commands and responses, and the data channel is for sending the actual data. As for active and
passive modes , in active mode, the client launches the command channel, and the server
establishes the data channel. In passive mode, both the command and data channels are
established by the client.
Most organizations prefer passive mode. In this mode, the client initiates both channels;
therefore, the organization has little or no alterations to make on the client firewall. The
connection is from the client to the server, and the data will be return traffic to the client.
Overall, organizations can allow their users (clients) to connect to FTP servers without
compromising network security.

• Setting up FTP in passive mode

Primarily, the command channel is opened by the client to the FTP server on port 21. The client
also opens two random, unprivileged ports on the client (typically a port greater than 1023).
We’ll call the first port P and the second port P+1. The FTP client initiates the connection to
the server by sending a PASV command. The client connects to the server from port P to server
port 21 with the PASV command. The server then opens another unprivileged port Q (any port

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

greater than 1023) and sends the port information back as a reply to the PASV command. Now
the client initiates the connection from port P+1 to port Q on the server to start the data transfer.
Steps:

1. The client contacts the server using the PASV command on port 21.
2. The server replies using port 2000. Here, port 2000 is the port the server will be listening to for
the data connection.
3. The client initiates the connection from port 1025 to 2000 (on the server).
4. The server sends back the ACK (acknowledgement).

Opening up channels on FTP client and server


Client side: Data and other communications from the client should reach the FTP server. Make
sure you allow outgoing data and other communications from the client to go to the FTP server.
Server side: Port 21 should be open, as it receives the PASV command for initiating the
connection. The port used by the server to respond to the client can be anything between Port
22 to 1022. Because the FTP server specifies a random port (anything greater than 1023), those
ports should be open for communication.
Prerequisites

o FTP depends on IIS (Internet Information Services). Both IIS and FTP services should be
installed for the configuration of the FTP server.
o A root folder is required for FTP publishing. The folder can be created under:

%SystemDrive%\ftp\ftproot

o Next, you need to set permissions to allow anonymous access to the folder. Use the following
command on a CMD prompt to grant access:

“ICACLS "%SystemDrive%\ftp\ftproot" /Grant IUSR:R /T”


"%SystemDrive%\ ftp \ftproot"
Or the path to the root folder should be set as the path for your FTP site. Even the software
firewall (like Windows firewall or Symantec) should allow connections to the FTP server.

• Enabling FTP in Windows if IIS is not installed

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

In this example, we’ll use Windows Server 2008 R2 to configure FTP.


If IIS is not installed:

1. Navigate to Start > Control Panel > Administrative Tools > Server Manager in Windows Server
Manager.
2. Go to Roles node. Right-click on Roles and click Add Roles.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

3. In the Add Roles window, open Server Roles and check Web Server (IIS).
4. Proceed through the setup wizard and click Install. Wait for the installation to complete. •
Enabling FTP in Windows if IIS is already installed as a web server

1. Navigate to Start > Control Panel > Administrative Tools > Server Manager.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

2. In the Windows Server Manager, go to Roles node, and expand Web Server (IIS) .
3. Right-click on Web Server (IIS) , and click on Add Role Services .

4.
5. In the Add Role Services window, go to Roles Services , and check FTP Server .

6. Confirm IIS Management Console is checked under Management Tools .

7. Click Next , then Install , and wait for the installation to complete.Transferring files

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

To transfer files, you should add an FTP site. Once the FTP site is enabled, clients can transfer
to and from the site using the FTP protocol.

• Setting up an FTP site

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

1. Navigate to Start > Control Panel > Administrative Tools > Internet Information Services

(IIS) Manager.

2. Once the IIS console is open, expand the local server.

3. Right-click on Sites , and click on Add FTP Site .

4. In the Add FTP Site window, type the FTP server name and the content directory path, and

click Next. The directory path should be the same as the one we set permissions to allow

anonymous access. Above, we used:

%SystemDrive%\ ftp
\ftproot

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

5. In the Binding and SSL Settings window, type the IP address of the server. Check the Start
FTP Site Automatically option. Choose SSL Based on Constraint . Click Next .

6. Now, select Basic for authentication.


7. Click Finish . Now, the FTP site creation is complete.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

• How does FTP basic authentication work?

Basic authentication means there’s no encryption used. Thus, username/password are sent in
clear text. Basic authentication matches the username/password from the Active Directory
database. You can also create accounts in IIS. This can be done from under Management Tools
in Web Server (IIS) role.
Under Authorization , you can select All Users to allow FTP access to all users from the
domain. Also, check both Read and Write under Permissions Based on Requirement .

Accessing files on the FTP server

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

To access files on the FTP server, open a file explorer and type ftp://serverIP . The FTP server
asks for a username and password. Enter the username and password (Windows or Active
Directory credentials) and click Logon . The files and folders display under the FTP server.

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

Experiment 9 - Installing a Windows NT/2000/2003Server


To install AcuServer on a Windows NT, Windows 2000 - 2008 server:
1. Install and configure TCP/IP before installing AcuServer. If you do not have a network card in
your machine, or if your network card is not working properly, AcuServer will fail to install
and run.

2. Log onto your server using the Administrator account or an account that belongs to the
Administrators group. For Windows 2008, if you do not log in using the Administrator account
you will need to use Windows elevated privileges to install AcuServer.
Note: If you are using an earlier release of AcuServer, you can either install the new release
while AcuServer is running or stop AcuServer and then install the new software. If you install
the new release while AcuServer is running, you must reboot the machine before the new
software will take effect.
3. Insert the product installation CD-ROM into your disk drive. If the installation program does
not start automatically, click Start, select Run, and enter the path to the setup file. The path
will be something like d:\setup.exe, where d is the drive letter for your CD-ROM drive.
Follow the instructions on the screen. When prompted to select a component to install, select
AcuServer.
4. If you already have the files \etc\AcuAccess and \etc\a_srvcfg, the setup utility will detect them
and will ask you if you want to overwrite them.

CAUTION:
Do not overwrite these files unless you have a backup copy.

The AcuAccess file contains one access record that gives all users access to AcuServer. The
file a_srvcfg contains the server configuration variables; when the file is first installed, these
are all commented out. You can modify both of these files later, if desired.
5. If you want the AcuServer file server to start automatically on boot, acuserve must be installed
and started as a Windows NT/Windows 2000 - 2008 service. You can install and start the
service after initial setup either through the AcuServer Control Panel or by using the acuserve
command from the Windows command line.

Note that installing a service on a particular port resets all start-up options for the service on
that port. These options are stored so that the service will use them when starting.
The default service is named AcuServer. All other service names include the port on which to
run.
The Start Menu folder contains shortcuts to the AcuServer Control Panel, the AcuPing utility,
and online documentation. The Start Menu folder is not required to run AcuServer. You can
safely remove it.
6. If you choose to start AcuServer during the installation process, a command prompt window is
displayed showing the status of the Windows NT/Windows 2000 - 2008 services being started
or restarted automatically. You may see some error messages that can be ignored if the
Windows services are not already installed and running. For example, you might see:

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

7. acuserve -kill
8. Open/Control Service failed
9. acuserve -remove
10. Open/Control Service failed
11. acuserve -install
12. AcuServer service installed
13. acuserve -start
STATE: START PENDING
The Windows NT/Windows 2000 - 2008 services that are needed for AcuServer can also be
started and stopped manually. See Starting and Stopping acuserve for a detailed explanation of
how to start and stop acuserve services.
See Installing and Removing acuserve as a Windows Service for more information about
removing a service after installation. Note that removing the service does not delete the
executables.
To help in resolving service problems, some messages from these services display in Microsoft
Event Viewer’s Application Log. The Event Viewer is found in the Administrative Tools
folder of the Windows Control Panel.

Experiment 10 - How to Install a Network Switch?


Step 1
Provide power to the switch, if required. For a stand-alone switch, this simply means plugging
in the power supply. For rack-mounted switches, this means using a slot that has power supplied
to it.

Step 2
Connect the incoming network cable to the switch. Although any slot can be used on most
network switches, it is a good idea to use the first slot so anyone can quickly identify the
incoming cable. For home and small office applications, the incoming cable will be the one
coming from your modem.

Step 3

RSR Rungta College of Engineering & Technology Bhilai


B.Tech CSE 5th SEm
Computer Network Lab Manual

Connect a Cat5 or Cat6 cable to another slot in the network switch. Connect the other end to a
computer you want connected to the network.
Step 4
Repeat this process until all the computers are connected or all slots are filled.

A Home/Office Switch

RSR Rungta College of Engineering & Technology Bhilai

You might also like