Cncs Lab Manual Cme 2
Cncs Lab Manual Cme 2
Computer Hardware
Experiment:1
Aim:
1. CPU Socket
Location: Usually located to the right of the CPU socket, often in a row.
Description: These slots are where the RAM (Random Access Memory) sticks
are inserted. The number of RAM slots varies by motherboard (e.g., 2, 4, or 8
slots). They are typically color-coded for dual-channel or quad-channel
memory configuration.
3. Power Connectors
Location: Usually found near the top-right corner or top-left corner of the
motherboard.
Description:
o 24-pin ATX Power Connector: A large connector for providing power
from the power supply to the motherboard.
o 4/8-pin CPU Power Connector: Provides extra power for the CPU.
4. Chipset
Page | 1
Pin no :__________________________
Location: Typically found near the CPU, but can be anywhere on the board
depending on the design.
Description: The chipset controls communication between the CPU and other
components like RAM, storage devices, and expansion cards. It usually
consists of two parts: the Northbridge (higher-speed functions like memory and
GPU communication) and the Southbridge (lower-speed functions like USB
and SATA).
Location: These slots are typically located toward the bottom half of the
motherboard.
Description: These are used for expansion cards like the GPU (Graphics
Processing Unit), sound cards, network cards, etc. The slots come in different
sizes (x16, x8, x4, x1), with x16 slots usually used for GPUs.
7. USB Headers
Location: Usually near the bottom of the motherboard or towards the front
panel.
Description: These are small, 9-pin connectors for front-panel USB ports on
the case. You can connect USB 2.0 or 3.0 cables from the case to these headers.
9. CMOS Battery
Page | 2
Pin no :__________________________
Location: Scattered across the motherboard, often near the CPU socket and
around the edges.
Description: These are connectors for the fans that help keep the computer
cool. You’ll typically find headers for the CPU fan, case fans, and possibly
additional headers for liquid cooling pumps or system fans.
Location: These are often located directly over the chipset or the CPU socket
area.
Description: Heat sinks are metal devices used to dissipate heat from critical
components like the CPU and chipset, preventing them from overheating.
Page | 3
Pin no :__________________________
Description: Older expansion slots used for older devices like sound cards,
network cards, and other peripherals before PCIe became widespread.
Page | 4
Pin no :__________________________
Experiment: 2
Aim:
The CMOS Setup (also referred to as the BIOS Setup) is where you can
configure hardware settings, manage boot options, and adjust system preferences. It’s
accessed through the BIOS or UEFI interface, which is stored in the CMOS chip on
your motherboard.
Here’s a guide to various options you might encounter within the CMOS
(BIOS/UEFI) Setup and what they do:
What it is: This option allows you to set the system date and time.
How it works: The system uses the CMOS battery to retain the current date
and time even when the computer is powered off.
When to use: If your system date or time is incorrect, or after replacing the
CMOS battery.
What it is: This determines the order in which the computer checks for
bootable devices (like hard drives, USB drives, CDs, etc.) when starting up.
Common settings:
o 1st Boot Device: Often set to the primary hard drive or SSD where the
OS is installed.
o 2nd Boot Device: Typically a DVD drive or USB if you're booting from
media.
o 3rd Boot Device: Can be a network boot (PXE), another USB, etc.
When to use: If you need to boot from a USB drive, CD/DVD, or network, you
can change the boot order to prioritize that device.
3. Secure Boot
Page | 5
Pin no :__________________________
How it works: When enabled, the system will only boot an OS that has a valid
signature (such as Windows 10 or later).
When to use: It’s typically enabled by default for security, but you may need
to disable it if you want to install a non-signed OS (like Linux) or use a custom
boot loader.
What it is: This determines whether the system boots in UEFI mode or
Legacy BIOS mode.
UEFI (Unified Extensible Firmware Interface) is a more modern, flexible
method that supports large drives, faster boot times, and advanced features.
Legacy Mode: Older system mode for backward compatibility with older
hardware.
When to use: If you need to boot an older operating system, or use older
hardware, set this to Legacy. For a more secure and efficient system, use
UEFI.
5. CPU Configuration
What it is: This section allows you to configure settings related to the CPU,
including core count, hyper-threading, and over clocking.
Common settings:
o Intel Hyper-Threading (HT) or AMD SMT: Allows each physical core
to act like two logical cores, improving multi-threaded performance.
o CPU Multiplier/Clock Ratio: Used in over clocking to change the
CPU’s operating frequency.
o C-State Control: Manages CPU power-saving states.
When to use: Over clockers often adjust these settings to enhance performance
or tweak power consumption.
Page | 6
Pin no :__________________________
When to use: If you’re upgrading your RAM or want to tweak it for better
performance, such as enabling XMP for faster speeds.
7. Integrated Peripherals
What it is: Controls the motherboard's built-in devices, such as onboard audio,
Ethernet, and SATA controllers.
Common settings:
o Onboard Audio: Enables or disables the integrated sound card.
o SATA Configuration: Controls the settings for connecting hard drives
and SSDs.
o Onboard LAN: Enables or disables the integrated network interface
card.
When to use: Disable onboard devices you don’t need (e.g., integrated audio)
to free up resources or if you're installing dedicated hardware.
What it is: A section where you can adjust the system's CPU and memory
clock speeds to increase performance.
Common settings:
o CPU Frequency: You can manually adjust the CPU multiplier and base
clock (BCLK) for over clocking.
o Voltage settings: You can increase voltages for stability when over
clocking, but this increases heat generation.
o Memory Over clocking: Manually adjust RAM speed, timings, and
voltage.
When to use: For users interested in pushing their system’s performance
beyond stock speeds.
9. Fan Control
What it is: Allows you to adjust the behavior of system fans to control cooling
and noise levels.
Common settings:
o Fan Speed Control: Set a fan to run at full speed, automatically adjust
speed based on temperature, or configure custom profiles.
o CPU Fan Speed: Set the CPU fan’s speed depending on temperature
thresholds.
When to use: If you want to reduce fan noise or increase cooling performance
(especially useful for gaming or high-performance builds).
Page | 7
Pin no :__________________________
What it is: Controls the system’s power usage and how the motherboard
interacts with power sources.
Common settings:
o Wake-on-LAN: Enables the system to turn on via a network signal.
o ErP Ready: Lowers the system's power consumption to comply with the
European Union’s energy regulations when turned off.
o ACPI Settings: Controls how the system handles power management
(sleep states, shutdowns, etc.).
When to use: Configure your system’s power behavior, especially for energy
efficiency or remote access scenarios.
Page | 8
Pin no :__________________________
Experiment:3
Exercise on Print the summary of your system hardware and verify for
correctness.
Aim:
To print the summary of your system hardware and verify for correctness.
Page | 9
Pin no :__________________________
o This will give you more detailed hardware information, including the
motherboard (system version), and connected devices.
1. Using Terminal Commands: Open the Terminal and use the following
commands to print hardware information:
o CPU Information:
o lscpu
o RAM Information:
o free -h
o Disk Information:
o lsblk
o Graphics Information:
o lspci | grep VGA
o Motherboard and System Info:
o sudo dmidecode -t system
o sudo dmidecode -t baseboard
After gathering your hardware summary, you can verify its correctness by comparing
it to your system’s specifications (the ones provided by the manufacturer or through a
system utility like CPU-Z or HWMonitor).
Page | 10
Pin no :__________________________
Experiment:4
Aim:
Page | 11
Pin no :__________________________
Once the computer boots up, insert a CD/DVD/Blu-ray into the optical drive to
test it.
In Windows, the drive should show up in File Explorer under This PC.
Troubleshooting Tips:
Page | 12
Pin no :__________________________
Experiment:5
Aim:
Recovering lost data from a hard drive can be a bit tricky, but there are several
methods you can try depending on the situation. The first rule is to stop using the
drive immediately if you notice that data is missing, as continuing to use it may
overwrite the data, making recovery more difficult or impossible.
Here’s a step-by-step guide on how to recover lost data from a hard drive:
What it is: If you accidentally deleted files, they might still be in your
computer’s Recycle Bin.
How to do it:
1. Open the Recycle Bin on your desktop.
2. Browse through the deleted files.
3. Right-click on the files you want to restore and select Restore.
Why it works: Deleted files typically move to the Recycle Bin first and are not
permanently erased until you empty the bin.
If you have set up file backups using Windows File History or macOS Time
Machine, you can recover previous versions of files or even entire folders.
Page | 13
Pin no :__________________________
If the data is not in the Recycle Bin and you don’t have a backup, you may need to use
third-party data recovery software to scan the hard drive for lost or deleted files.
Recuva (Windows):
o Free and easy to use for recovering lost files from hard drives, memory
cards, and USB sticks.
o Steps: Install Recuva > Select file type and drive > Scan for lost files >
Recover the files.
EaseUS Data Recovery Wizard (Windows & Mac):
o A powerful tool that offers deep scans and recovery from formatted
drives, deleted partitions, or lost files.
o Steps: Install EaseUS > Select the drive to scan > Deep scan if necessary
> Preview and recover the files.
Disk Drill (Windows & Mac):
o Allows recovery from lost partitions, formatted drives, and deleted files.
o Steps: Install Disk Drill > Choose the drive > Scan > Preview and
recover lost files.
PhotoRec (Windows, Mac, Linux):
o A free, open-source software designed for recovering lost files, even if
the file system is damaged or the files are severely corrupted.
o Steps: Install PhotoRec > Choose the drive and file types > Scan >
Recover files.
Install recovery software on a different drive than the one you are trying to
recover from to avoid overwriting lost data.
Choose deep or thorough scan options for better recovery results, but this
may take longer.
Page | 14
Pin no :__________________________
If the hard drive is physically intact but the data has become corrupted (e.g., due to
power failure, sudden shutdowns, or file system errors), you can try using disk repair
tools to fix issues and recover data.
For Windows:
o Run CHKDSK:
1. Open Command Prompt as an Administrator.
2. Type chkdsk X: /f (replace X with the drive letter of the hard
drive you want to scan).
3. Press Enter and allow the tool to scan and repair the drive.
For macOS:
o Use Disk Utility:
1. Open Disk Utility from the Applications > Utilities folder.
2. Select the drive and click First Aid to repair disk errors.
Why it works: These tools can fix file system errors and recover files from
drives with logical issues.
If the above methods fail, or if the hard drive has physical damage (such as clicking
sounds, not being recognized, or if it’s physically broken), professional data
recovery services might be your best option.
What they do: These services have specialized equipment and clean rooms to
recover data from physically damaged hard drives.
Cost: Professional recovery can be expensive, with prices ranging from $100 to
$1,000+, depending on the severity of the issue and the complexity of the
recovery.
When to use: If the drive has mechanical damage or if the data is highly important
and no other recovery methods worked.
Backups: Set up regular backups using Windows File History, macOS Time
Machine, or cloud services like Google Drive, Dropbox, or OneDrive.
Page | 15
Pin no :__________________________
External Drives: Store important data on external drives and make periodic
copies.
Cloud Backup Services: Use services like Backblaze, CrashPlan, or Acronis
for continuous cloud backups.
Page | 16
Pin no :__________________________
Computer Networking
Experiment : 6
Exercise on Preparing the Ethernet cable for cross and direct connections using
crimping tool and test using LAN tester.
Aim:
To preparing the Ethernet cable for cross and direct connections using crimping
tool and test using LAN tester.
Creating Ethernet cables for cross-over and direct connections involves using
a crimping tool to attach connectors to the ends of the cable and ensuring the wiring
is done correctly. Here’s a step-by-step guide to help you prepare both types of cables
and test them using a LAN tester.
You'll need the following tools and materials for both direct and crossover cables:
Use the scissors or cutters to cut the Ethernet cable to the length you need.
Use a cable stripper to remove about 1-2 inches of the outer jacket at both
ends of the cable, exposing the inner wires. Be careful not to nick or cut the
inner wires.
Page | 17
Pin no :__________________________
Inside the jacket, you’ll find four twisted pairs of wires. Untwist the pairs
carefully and straighten them out.
Wiring Standard:
For a direct connection, both ends of the cable should have the same wiring pattern.
The most common standard for this is the T568B standard.
1. Pin 1: White/Orange
2. Pin 2: Orange
3. Pin 3: White/Green
4. Pin 4: Blue
5. Pin 5: White/Blue
6. Pin 6: Green
7. Pin 7: White/Brown
8. Pin 8: Brown
Take the straightened wires and carefully insert them into the RJ45 connector,
making sure they follow the T568B wiring order.
Ensure the wires go all the way to the end of the connector and are in the
correct order.
Once the wires are properly inserted, use the crimping tool to secure the
connector. This will push the metal pins into the wires and lock them in place.
Page | 18
Pin no :__________________________
Repeat the same process for the other end of the cable, ensuring that the wiring
is identical (same T568B standard).
A crossover cable is used to connect two similar devices directly, such as computer-
to-computer or switch-to-switch.
Wiring Standard:
For a crossover connection, the wiring pattern is different on each end of the cable.
One end will follow the T568A standard, and the other end will follow the T568B
standard.
1. Pin 1: White/Green
2. Pin 2: Green
3. Pin 3: White/Orange
4. Pin 4: Blue
5. Pin 5: White/Blue
6. Pin 6: Orange
7. Pin 7: White/Brown
8. Pin 8: Brown
1. Pin 1: White/Orange
2. Pin 2: Orange
3. Pin 3: White/Green
4. Pin 4: Blue
5. Pin 5: White/Blue
6. Pin 6: Green
7. Pin 7: White/Brown
8. Pin 8: Brown
For one end of the cable, follow the T568A wiring order, and for the other end,
follow the T568B wiring order.
Page | 19
Pin no :__________________________
Insert the wires into the RJ45 connectors as carefully as you did for the
straight-through cable.
After ensuring the wires are in the correct order, use the crimping tool to
secure both ends of the cable by pressing the connector down firmly.
After crimping both ends of the Ethernet cable, it’s important to test it to make sure all
connections are correct.
Insert one end of the cable into the TX (transmit) port of the LAN tester and the
other end into the RX (receive) port.
Turn on the LAN tester. It will send signals through the cable to check the
connectivity of each pin.
Note: Ensure that the tester is designed for both crossover and direct connections.
Some testers may have specific modes for testing crossover cables.
6. Troubleshooting
Page | 20
Pin no :__________________________
If the cable does not pass the LAN tester, check the following:
o Make sure the wires are inserted fully into the RJ45 connectors.
o Double-check the wiring order for both the direct and crossover cables.
o Inspect the connector for any bent or damaged pins.
o Try re-crimping the connectors if needed.
Page | 21
Pin no :__________________________
Experiment :7
Aim:
Before starting the installation, make sure you have the following:
Choose a good location for the switch. Ensure that it’s in a well-ventilated area
to prevent overheating.
Make sure the switch is close to the devices you want to connect, but also near
an available power outlet.
If you’re mounting a switch on a rack, ensure it's securely fastened and is easily
accessible.
Plug the power adapter into the switch’s power input port and then connect
the other end to a nearby electrical outlet.
Page | 22
Pin no :__________________________
Some switches may have PoE (Power over Ethernet), which allows the
switch to deliver power to connected devices (like IP cameras or access points),
so you don't need a separate power source for those devices.
Once the switch is connected to power, it should automatically power on. Most
switches will have LED indicators that light up to show power is active.
Take an Ethernet cable and plug one end into the uplink port (or any regular
port on a managed switch) on the switch.
Plug the other end into an available LAN port on your router or modem. This
will allow the devices connected to the switch to access the internet and the
internal network.
Note: In most home setups, the uplink port is the same as the regular ports, so
any port can be used to connect to the router or modem.
After plugging the Ethernet cable from the switch to the router, check for link
lights on both the switch and the router. The lights should be green or blinking
to show that the connection is active.
Now, you can connect your devices (computers, printers, network storage, etc.) to the
network switch.
Take an Ethernet cable and connect one end to the Ethernet port of the
device (e.g., computer, printer, server).
Connect the other end to any available port on the network switch.
Page | 23
Pin no :__________________________
When you connect the cable, check for link lights on both the device and the
switch. A solid green or blinking light indicates that the device is properly
connected to the network.
Repeat the above steps for each device you want to connect to the switch.
5. Verifying Connectivity
Once everything is connected, verify that each device has internet access or can
communicate with other devices on the network.
For Windows:
o Open Command Prompt and type ping <IP address> (e.g., ping your
router’s IP address or another device's IP) to check if it responds.
For macOS:
o Open Terminal and type ping <IP address> to check connectivity.
Ensure that each connected device has a valid IP address (either static IP or
DHCP from the router).
You can verify this by checking the network settings on the device.
For Windows: Open Control Panel > Network and Sharing Center >
Change adapter settings, right-click on the Ethernet connection, and select
Status to see the IP configuration.
For macOS: Go to System Preferences > Network and check the status of the
connection.
6. Troubleshooting
If you're having trouble with connectivity or the switch isn't working as expected, here
are some common issues and solutions:
Page | 24
Pin no :__________________________
If you're using a managed switch, you can configure advanced settings such as:
Page | 25
Pin no :__________________________
Experiment:8
Aim:
For DSL: Connect the telephone line to the DSL port on the modem.
For Cable Internet: Connect the coaxial cable to the Cable port on the
modem.
For Fiber Internet: If you're using fiber optic internet, connect the fiber optic
cable to the modem.
Connect the power adapter to the modem and plug it into a nearby electrical
outlet.
Power on the modem. Wait for the status lights to stabilize. The modem will
usually display several lights (Power, Internet, and LAN) to indicate it is
connected to the internet and functioning properly.
If the modem uses Ethernet, connect one end of the Ethernet cable to the
modem's Ethernet port and the other end to your computer's Ethernet port.
If the modem supports USB, use a USB cable to connect the modem to your
computer.
Page | 26
Pin no :__________________________
Note: Many external modems now include a built-in router with multiple
Ethernet ports, so you can connect multiple devices.
Open a web browser on your computer and try accessing a website to confirm
that you are connected to the internet.
An internal modem is a PCI or PCIe card that is installed directly into your
computer’s motherboard. This type of modem is less common today but may still be
used for DSL connections.
Power off your computer and unplug it from the power outlet.
Open the computer case: Remove the side panel to access the motherboard.
Insert the modem card into an available PCI or PCIe slot on the
motherboard. Secure the card by screwing it into place.
For DSL modems, connect the telephone cable from the telephone jack to the
DSL port on the modem card.
Page | 27
Pin no :__________________________
After installing the modem, close the computer case, plug the power cable back
in, and turn on your computer.
When the computer boots up, you may need to install drivers for the internal
modem. The drivers should be included on a CD that came with the modem or
can be downloaded from the manufacturer’s website.
If the modem is automatically detected, your system may install the necessary
drivers without intervention.
Open Control Panel > Network and Sharing Center > Set up a new
connection or network and follow the instructions to set up your internet
connection.
If you're using a DSL connection, you may need to input your ISP’s username
and password to authenticate the connection.
A USB modem is typically a plug-and-play device that connects to your computer via
a USB port and provides internet access via mobile data, DSL, or cable.
Insert the USB modem into an available USB port on your computer.
Depending on the modem, it might automatically install necessary drivers. If
not, follow the steps below to install them manually.
Many USB modems come with a CD or a software package that you’ll need to
install before you can use the modem.
Page | 28
Pin no :__________________________
Insert the CD into your computer and follow the on-screen instructions to
install the software.
Some USB modems will auto-run the software when plugged in.
For mobile broadband USB modems, you may need to input your mobile
carrier settings (such as APN, username, password) to connect to the internet.
DSL or Cable USB modems may require ISP configuration
(username/password).
Once connected, open a web browser and check if the internet is working.
You may also need to check that the software that came with the modem shows
a “Connected” status.
4. Troubleshooting
If you run into problems during installation, here are some common troubleshooting
tips:
Check Connections: Ensure that all cables (power, Ethernet, phone line, USB)
are securely connected.
Restart the Modem: Try turning the modem off, waiting a few seconds, and
turning it back on.
ISP Outage: Confirm that there are no outages from your ISP (call them or
check their status page).
Check Modem Lights: Most modems have status lights that indicate the health
of the connection. Make sure all necessary lights (Power, Internet, LAN) are on
or blinking.
No sync or internet light: Ensure that the telephone line is connected and
working.
Dial-up connection issues: Verify the modem’s username/password settings
with your ISP.
Page | 29
Pin no :__________________________
No connection: Make sure that the device drivers are properly installed and
that the modem’s SIM card (if applicable) is properly inserted.
No signal: Ensure that the USB modem has good reception or check that the
mobile data service is active with your provider.
Page | 30
Pin no :__________________________
Experiment:9
Aim:
Using FTP (File Transfer Protocol) is a great way to upload and download
files between a local computer and a remote server. Below is a step-by-step guide on
how to use FTP for both uploading and downloading files, as well as a basic
explanation of FTP.
FTP:
FTP (File Transfer Protocol) is a standard network protocol used to transfer files
between a client and a server over a TCP/IP network (like the internet). FTP works
on a client-server model where the client (your computer) sends requests to the
server to either upload or download files.
File Zilla is a popular and free FTP client. Here’s how to upload and download files
using it:
1. Go to FileZilla's website and download the FileZilla Client version for your
operating system (Windows, macOS, or Linux).
2. Follow the installation prompts to install FileZilla on your computer.
1. Open FileZilla.
Page | 31
Pin no :__________________________
2. In the top toolbar, enter the following information for your FTP server:
o Host: The FTP server address (e.g., [Link]).
o Username: Your FTP username (provided by your hosting provider or
server admin).
o Password: Your FTP password.
o Port: Typically 21 (default for FTP) unless the server uses a different
port (like 22 for SFTP).
1. Once connected, you’ll see your local files (left panel) and the remote server
files (right panel).
2. On the left panel, navigate to the file or folder you want to upload from your
local machine.
3. On the right panel, navigate to the folder where you want to upload the file(s).
4. Drag and drop the files from the left panel to the right panel. Alternatively,
you can right-click on the file and select Upload.
o FileZilla will show a progress bar for each file being uploaded. Once
complete, the file will appear in the remote folder.
1. On the right panel, navigate to the file or folder you want to download from
the server.
2. On the left panel, navigate to the local directory where you want to save the
file(s).
3. Drag and drop the file from the right panel to the left panel. Alternatively,
right-click the file and select Download.
4. The download progress will be displayed in the queue at the bottom. Once the
transfer is complete, the file will be saved locally.
Step 5: Disconnect
1. Once your transfers are complete, click the Disconnect button (top left) to
close the FTP session.
Page | 32
Pin no :__________________________
If you prefer using the command line to upload or download files, you can use the
built-in FTP tool available in most operating systems (Windows, macOS, Linux).
Windows: Open Command Prompt (press Windows + R, type cmd, and press
Enter).
macOS/Linux: Open the Terminal application.
1. In the command line, type the following command to connect to the FTP
server:
2. ftp [Link]
3. You will be prompted to enter your FTP username and password. Type them
in and press Enter.
1. Navigate to the local directory where the file is located using the cd command:
2. cd /path/to/local/directory
3. To upload a file, use the put command:
4. put [Link]
This will upload [Link] to the current directory on the FTP server.
This will download [Link] from the FTP server to your local directory.
Step 5: Disconnect
Once the transfer is complete, type bye or quit to disconnect from the FTP
server.
While FTP is widely used, it does not encrypt data in transit, making it vulnerable to
eavesdropping and man-in-the-middle attacks. If security is important, consider using
SFTP (SSH File Transfer Protocol) or FTPS (FTP Secure) instead. These protocols
offer encryption for secure file transfers.
SFTP: Often used with SSH (Secure Shell) and provides a secure connection.
FTPS: Adds SSL/TLS encryption to FTP.
If you encounter issues with FTP, consider the following troubleshooting steps:
Connection Issues:
o Ensure the FTP server address and credentials are correct.
o Make sure the FTP port (usually port 21) is open on your network.
o Verify the FTP server is online and accepting connections.
Permission Issues:
o Check whether you have the necessary read/write permissions on the
remote server for the files you’re trying to access.
Firewall or Antivirus Blocking:
o Ensure your firewall or antivirus software isn’t blocking the FTP
connection. You may need to configure exceptions.
Page | 34
Pin no :__________________________
Experiment:10
Exercise on Installation and configuring the proxy server for internet access
Aim:
Setting up and configuring a proxy server allows users to access the internet
indirectly, through an intermediary server. Proxy servers can provide benefits like
improved security, privacy, access control, and caching. Here's a step-by-step guide
on how to install and configure a proxy server for internet access.
Proxy Server:
A proxy server acts as an intermediary between the user and the internet. When you
make a request to access a website, the proxy server forwards that request to the
internet on your behalf, retrieves the content, and then sends it back to you. This can
hide your IP address, cache content for faster access, and provide better control over
internet traffic.
There are many different types of proxy server software you can use, each with
varying features (like HTTP/HTTPS proxies, SOCKS proxies, etc.). Here are some
popular options:
For this guide, we'll use Squid because it's widely used and flexible. However, the
process is similar across other proxy servers.
Page | 35
Pin no :__________________________
Here’s how to install and configure Squid Proxy on a Linux-based server (like
Ubuntu), which can act as your proxy server for internet access.
1. Update your package list to ensure you have the latest versions of software:
2. sudo apt update
3. Install Squid:
4. sudo apt install squid
5. After installation, Squid should be running automatically. You can verify the
service status by running:
6. sudo systemctl status squid
Once Squid is installed, you need to configure it to suit your network’s needs.
This line allows the [Link]/24 subnet to use the proxy. You can
adjust the subnet to match your local network's IP range.
Page | 36
Pin no :__________________________
o Caching and Logging: You can configure caching settings and log
output as needed, but these are more advanced topics that depend on
your specific needs.
3. Save and Exit the configuration file:
o In nano, press Ctrl+X, then Y, and Enter to save the changes.
After modifying the configuration file, you need to restart Squid to apply the changes:
After setting up the proxy server, you need to configure your client machines (like
computers or devices) to route internet traffic through the proxy server.
Windows Configuration:
Page | 37
Pin no :__________________________
macOS Configuration:
Linux Configuration:
Once the proxy server is configured and the client machines are set up to use it, it’s
important to test that everything is working correctly.
If your proxy server is accessible over the internet (rather than just within your local
network), it’s crucial to secure it to prevent unauthorized access.
Limit Access: Use ACLs (Access Control Lists) to restrict access to trusted IP
addresses or ranges.
Authentication: You can configure Squid to require user authentication before
allowing access, which will prevent unauthorized users from using the proxy.
Page | 38
Pin no :__________________________
Firewalls: Set up a firewall to ensure only specific ports and IP addresses can
access the proxy server.
There are different types of proxy servers, each with its use case:
Forward Proxy: The most common type. It forwards client requests to the
internet.
Reverse Proxy: Used to route requests to backend servers. It’s often used for
load balancing or caching for web applications.
Transparent Proxy: A proxy that does not modify requests or responses and is
often used for caching or filtering traffic without client-side configuration.
Page | 39
Pin no :__________________________
Experiment:11
Aim:
1. Right-click the Network icon in the system tray (bottom-right corner of the
screen).
2. Select Open Network & Internet Settings.
3. Click Change adapter settings on the right-hand side.
Page | 40
Pin no :__________________________
Your system will now use the static IP address you assigned.
1. Click the Apple menu in the top-left corner and select System Preferences.
2. Go to Network.
1. Select the active network connection (either Wi-Fi or Ethernet) from the list
on the left.
1. Click the DNS tab and add your desired DNS servers (e.g., Google DNS
[Link] or [Link]).
Your macOS system will now use the static IP address you assigned.
1. Click the network icon in the top-right corner of your screen (near the system
tray).
2. Select Settings (or Network Settings).
1. In the Network settings window, select the active network interface (either
Wired or Wi-Fi) from the left-hand list.
2. Click the gear icon next to the active interface.
If you prefer to use the command line to set a static IP on a Linux system (e.g.,
Ubuntu), follow these steps:
1. Open the terminal and use a text editor like nano to open the network
configuration file:
2. sudo nano /etc/netplan/[Link]
Page | 42
Pin no :__________________________
(Note: The file name may vary depending on your distribution and
configuration.)
5. Troubleshooting
If you’re unable to connect to the network or if the system isn't using the static IP
correctly, here are a few troubleshooting steps:
Page | 43
Pin no :__________________________
1. IP Address Conflicts: Ensure no other device on the network is using the same
IP address.
2. Check Gateway: Ensure that the gateway IP address is correct and reachable.
3. DNS Configuration: If you can't browse the web, verify that the DNS settings
are correct.
4. Network Interface: Double-check that you’re modifying the correct network
interface (e.g., eth0, wlan0).
5. Restart Networking: Sometimes, restarting the network service can help:
6. sudo systemctl restart networking.
Page | 44
Pin no :__________________________
Experiment:12
Aim:
The Caesar Cipher is a simple encryption technique where each letter in the
plaintext is shifted a certain number of positions down or up the alphabet. In your
request, you mentioned transportation and substitution as parts of the cipher, which
aligns perfectly with how the Caesar Cipher works, as it involves both substitution
(replacing letters) and transportation (shifting letters to new positions).
Let’s break down how the Caesar Cipher implements both of these concepts.
3 Replace each letter in the plaintext message with the letter that is three
positions to the right in the alphabet.
Page | 45
Pin no :__________________________
En(x)=(x+n)mod 26 En(x)=(x+n)mod 26
(Encryption Phase with shift n)
Dn(x)=(x−n)mod 26 Dn(x)=(x−n)mod 26
(Decryption Phase with shift n)
Examples :
Text : ABCDEFGHIJKLMNOPQRSTUVWXYZ
Shift: 23
Cipher: XYZABCDEFGHIJKLMNOPQRSTUVW
Text : ATTACKATONCE
Shift: 4
Cipher: EXXEGOEXSRGI
Page | 46
Pin no :__________________________
Experiment:13
Aim:
The substitution happens in the form of replacing pairs of letters, and the
transportation (or shifting) happens within the matrix, based on the rules for
digraphs.
Let’s break down how the Playfair Cipher works for both substitution and
transportation.
The key square is a 5×5 grid of alphabets that acts as the key for encrypting the
plaintext. Each of the 25 alphabets must be unique and one letter of the alphabet
(usually J) is omitted from the table (as the table can hold only 25 alphabets). If the
plaintext contains J, then it is replaced by I.
The initial alphabets in the key square are the unique alphabets of the key in the order
in which they appear followed by the remaining letters of the alphabet in order.
Page | 47
Pin no :__________________________
2. Algorithm to encrypt the plain text: The plaintext is split into pairs of two
letters (digraphs). If there is an odd number of letters, a Z is added to the last
letter.
3. For example:
PlainText: "instruments"
After Split: 'in' 'st' 'ru' 'me' 'nt' 'sz'
1. Pair cannot be made with same letter. Break the letter in single and add a bogus
letter to the previous letter.
2. If the letter is standing alone in the process of pairing, then add an extra bogus letter
with the alone letter
If both the letters are in the same column: Take the letter below each one (going
back to the top if at the bottom).
For example:
Diagraph: "me"
Encrypted Text: cl
Encryption:
m -> c
e -> l
Page | 48
Pin no :__________________________
If both the letters are in the same row: Take the letter to the right of each one
(going back to the leftmost if at the rightmost position).
For example:
Diagraph: "st"
Encrypted Text: tl
Encryption:
s -> t
t -> l
If neither of the above rules is true: Form a rectangle with the two letters and
take the letters on the horizontal opposite corner of the rectangle.
For example:
Diagraph: "nt"
Encrypted Text: rq
Encryption:
n -> r
t -> q
Page | 49
Pin no :__________________________
For example:
Page | 50
Pin no :__________________________
Experiment:14
Aim:
Substitution occurs by replacing each letter in the plaintext with another letter
according to the transformation defined by the key matrix.
Transportation (or shifting) refers to how the plaintext is "moved" within the
matrix during encryption — essentially how the matrix multiplies the plaintext
vector to produce a new ciphertext vector.
1. Key Matrix: Choose a square matrix (e.g., 2x2 or 3x3) as the key.
2. Plaintext Preparation: Convert the plaintext to numbers (A=0, B=1, ...,
Z=25), and if needed, pad the plaintext so that its length is a multiple of the size
of the matrix (e.g., for a 2x2 matrix, make the length even).
3. Matrix Multiplication (Substitution): Each plaintext pair (or triplet,
depending on the size of the matrix) is multiplied by the key matrix.
4. Modulo 26: Since the alphabet has 26 letters, all calculations are done modulo
26.
5. Ciphertext Conversion: Convert the resulting numbers back to letters.
1. Choose the Key Matrix: Let's use a 2x2 key matrix for simplicity:
2. | 6 24 |
3. | 1 16 |
Page | 51
Pin no :__________________________
Example: "HELLO"
o H=7
o E=4
o L = 11
o L = 11
o O = 14
Plaintext: "HELLO" becomes the numeric sequence: [7, 4, 11, 11, 14]
5. Split Plaintext into Pairs: Since we are using a 2x2 matrix, we will split the
plaintext into pairs of numbers. If necessary, pad the plaintext to make the
number of letters even:
o Plaintext pairs: (7, 4), (11, 11), (14, 23) (we add 'X' = 23 for padding).
6. Matrix Multiplication: Perform matrix multiplication for each pair of
numbers. For each pair, the plaintext vector is multiplied by the key matrix
(mod 26).
Page | 52
Pin no :__________________________
7. Final Ciphertext: Combine the results to get the final ciphertext: ITHES.
Page | 53
Pin no :__________________________
Experiment:15
Aim :
Key Concepts:
Ci=(Pi+Ki)mod 26
where Pi and Ki are the positions of the plaintext and key letters in the alphabet
(A = 0, B = 1, ..., Z = 25).
Pi=(Ci−Ki)mod 26
Page | 54
Pin no :__________________________
Example:
Plaintext: "HELLO"
Key: "KEY"
Page | 55
Pin no :__________________________
Experiment:16
Aim:
RSA Algorithm :
Encryption: Sender encrypts the data using Public Key to get cipher text.
Decryption: Decrypting the cipher text using Private Key to get the original data.
Key Generation
Choose two large prime numbers, say p and q. These prime numbers should be
kept secret.
Page | 56
Pin no :__________________________
Encryption
Decryption
To decrypt the cipher text C, use the private key (n, d) and get the original data
using the formula:
M = Cd mod n, where M is the message and d and n are parts of private key.
Page | 57
Pin no :__________________________
Experiment:17
Aim:
Sign any document online efficiently and organize your workflow with the
user-friendly and highly secure e-signature platform SignNow. With this, you can
easily share any electronic documents for signature, keep track of them, and even
sign the documents on any device.
Page | 58
Pin no :__________________________
Sender Side: In DSS Approach, a hash code is generated out of the message and
following inputs are given to the signature function –
1. The hash code.
2. The random number ‘k’ generated for that particular signature.
3. The private key of the sender i.e., PR(a).
4. A global public key(which is a set of parameters for the communicating
principles) i.e., PU(g).
These input to the function will provide us with the output signature containing
two components – ‘s’ and ‘r’. Therefore, the original message concatenated with the
signature is sent to the receiver. Receiver Side : At the receiver end, verification of
the sender is done. The hash code of the sent message is generated. There is a
verification function which takes the following inputs –
Page | 59
Pin no :__________________________
Experiment:18
Aim:
Learn to install the antivirus software in computer system and know the
configuration setting.
a) Installation Steps:
Page | 60
Pin no :__________________________
Update Virus Definitions: After installation, the antivirus program will often
automatically update its virus definitions (the database of known threats). This
ensures the software is prepared to protect against the latest viruses.
Configure Settings: Most antivirus software allows you to configure settings,
including:
o Real-time protection: Enable or disable real-time scanning.
o Scheduled Scans: Set up automatic scanning at specific times.
o Firewall Protection: Enable/disable or configure the firewall.
o Automatic Updates: Configure the software to automatically update
virus definitions and program versions.
o Quarantine settings: Choose whether quarantined files should be
deleted or kept for manual review.
b) Antivirus Configuration:
Real-Time Protection: Ensure that the software is set to monitor the system in
real-time and immediately flag suspicious activity.
Scheduled Scans: Configure periodic full or quick scans of the system,
ensuring that new or unknown malware is detected.
Custom Scan Settings: Configure the types of files and locations that should
be scanned (e.g., entire system, specific folders, external drives).
Behavioral Monitoring: Enable behavior-based monitoring, where the
antivirus looks for suspicious behaviors (like unauthorized file encryption or
sudden large network transfers).
Notifications: Configure alerts for detected threats, updates, or scans, so the
user stays informed.
Page | 61
Pin no :__________________________
b) False Positives:
d) Rootkit Detection:
g) Misconfigured Firewalls:
Page | 62
Pin no :__________________________
Let’s go over a demo study using CVE vulnerabilities (Common Vulnerabilities and
Exposures) that impact antivirus products or their components.
Phishing: Sending fake alerts or fake updates to trick users into downloading
and installing malware.
Ransom ware: Ransom ware could bypass the antivirus protection if the
signatures are outdated or if the malware uses new techniques not yet detected.
Exploiting Software Bugs: Some antivirus products have bugs in their own
software that attackers can exploit to gain control of the system or disable
antivirus protection.
Page | 63
Pin no :__________________________
Page | 64
Pin no :__________________________
Experiment:19
Aim:
Study the implementation of firewall settings in computer system and learn how
it manage the system.
1. Importance of a Firewall
Firewalls are a crucial layer of defense against hackers and unauthorized users
trying to gain access to your computer over the internet or network.
They control which programs and services can send and receive data from your
computer and help prevent malicious attempts to exploit open ports and
services.
Page | 65
Pin no :__________________________
e) Application-Level Filtering
Some firewalls can filter traffic based on the specific application or service,
allowing only trusted applications to make network connections and blocking
suspicious or unknown applications.
Firewalls keep logs of network activity, which is essential for auditing and
monitoring traffic patterns for suspicious behavior. These logs can help
identify potential vulnerabilities and threats.
Page | 66
Pin no :__________________________
Page | 67
Pin no :__________________________
o You can also add custom inbound or outbound rules to permit the
program’s traffic.
Problem: Some forms of malware attempt to disable the firewall to make the
system more vulnerable to attacks.
Solution:
Page | 68
Pin no :__________________________
Problem: You might receive error messages while configuring the firewall,
especially in complex configurations with advanced rules.
Solution:
o Reset the firewall to its default settings if you encounter persistent issues
or error messages.
o Use Windows Event Viewer to check logs and identify specific errors
related to firewall rules.
Setting up a firewall properly is essential for ensuring the security and integrity of
your system and network. It acts as a barrier against unauthorized access, malicious
traffic, and malware, while also allowing legitimate communication. However,
improperly configured firewalls can introduce new vulnerabilities or performance
issues. Regularly reviewing and updating firewall rules, along with understanding its
importance, can significantly improve your system’s defense against cyberattacks.
Final Tips:
Page | 69
Pin no :__________________________
Let me know if you'd like additional details on any specific firewall-related topic!
Page | 70