80% found this document useful (5 votes)
4K views

Data Communication & Networking Lab Manual

The document is a laboratory manual for a data communication networking course. It contains: 1. An index listing 13 experiments covering topics like bit stuffing/destuffing, character stuffing/destuffing, CRC, IPV4, encoding/decoding, and configuring servers. 2. Details and code for an experiment on bit stuffing and destuffing, explaining the process and providing an example program to implement it. 3. Details and code for an experiment on character stuffing and destuffing, similarly explaining the technique and giving a program to demonstrate it. 4. The document provides background, instructions, and code for students to complete networking experiments on various data communication concepts.

Uploaded by

GopalPatel
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
80% found this document useful (5 votes)
4K views

Data Communication & Networking Lab Manual

The document is a laboratory manual for a data communication networking course. It contains: 1. An index listing 13 experiments covering topics like bit stuffing/destuffing, character stuffing/destuffing, CRC, IPV4, encoding/decoding, and configuring servers. 2. Details and code for an experiment on bit stuffing and destuffing, explaining the process and providing an example program to implement it. 3. Details and code for an experiment on character stuffing and destuffing, similarly explaining the technique and giving a program to demonstrate it. 4. The document provides background, instructions, and code for students to complete networking experiments on various data communication concepts.

Uploaded by

GopalPatel
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 53

Sub.Code: 181001 Sub.

Name: DCN Year: 2014



VGEC /EC /BE/SEM-8 1

Data Communication Networking
Laboratory Manual
(Semester 8
th
- EC)
Department of Electronics and
Communication Engineering

Vishwakarma Government
Engineering College
Chandkheda



Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 2


Equipments/Software:
1. RJ- 45 Connector, Claming Tool, Twisted pair cable
2. Packet Tracer Software
3. Turbo C, C++










Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 3


Index
Sr.
No.
Title of Experiment Page No. Date Sign
1 Study of LAN transmission medias , topologies ,
interconnection devices & LAN standards and
practically implement the cross-wired cable and
straight through cable using clamping tool.

2 Write a program to implement bit stuffing &
Destuffing

3 Write a program to implement Character stuffing
& Destuffing

4 Write a program to implement CRC.
5 Implementation of parity checker.
6 Write a program to implement Hamming code.
7 Write a program to find Hamming distance
8 Write a C program for IPV4, Implementation of
decimal to binary, Implementation of binary to
decimal.

9 Write a program to implement encoding and
decoding

10 Design of LAN for a branch office of the bank and
Study of Network IP

11 Study of network topologies using packet tracer
software

12 To configure FTP server on windows server.
13 To configure DNS server on windows server.

Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 4

Experiment 1
Aim: Study of LAN transmission medias , topologies , interconnection devices &
LAN standards and Practically implement the cross-wired cable and straight through cable
using clamping tool.
Resources: RJ-45 connector, Clamping Tool, Twisted pair Cable
Theory:
Transmission Media
1) Guided media
a. Twisted pair
1) UTP-EIA categories, connectors
2) STP
b. Coaxial cable
Radio Government ratings
RG-8, RG-9, RG-11,RG-58, RG-59 Connectors
c. Optical fiber
Propagation modes
Fiber sizes
Light-source for optical cable
Fiber optic connectors
2) Unguided Media or wireless communication
1.RF transmission
2 Terrestrial microwave
3.Satellite communication
4.Cellular telephony
3) Transmission impairments : Attenuation , Distortion and noise.
4) Media comparison
5) Network topologies : Mesh, Tree ,Bus Ring and Hybrid topology.
6) Connection Devices : Repeaters ,Bridges ,Routers ,Gateways ,Hubs ,Switches
7) Project 802 : Categories ,Broadband & base band,1 Base 2,100 Base T, Fast Ethernet,
100 Base-TX, 100 Base T4, Gigabit Ethernet and FDDI.

Procedure:
To do these practical following steps should be done:
1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very
careful at this point, as to not nick or cut into the wires, which are inside. Doing so could alter
the characteristics of your cable, or even worse render is useless. Check the wires, one more time
for nicks or cuts. If there are any, just whack the whole end off, and start over.
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand.
You do not want the wires to become untwisted down inside the jacket. Category 5 cable must
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 5

only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be 'out of spec'. At this
point, you obviously have ALOT more than 1/2 of an inch of un-twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-made
cable, with one of the ends whacked off, you only have one end to install - the crossed over end.
Below are two diagrams, which show how you need to arrange the cables for each type of cable
end.
The codes are commonly depicted with RJ-45 jacks as follows (the view is from the front of the
jacks)

Diagram shows you how to prepare Cross wired connection

Purpose of Crossover Cable-
Crossover cables are very similar to straight-through cables, except that they have pairs of wires
that crisscross. This allows for two devices to communicate at the same time. Unlike straight
through cables, we use crossover cables to connect like devices.
Crossover cables are typically used in the following situations:
Use a crossover cable when:
1. Connecting a computer to a router
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 6

2. Connecting a computer to a computer
3. Connecting a router to a router
4. Connecting a switch to a switch
5. Connecting a hub to a hub

Diagram shows you how to prepare straight through wired connection
Purpose of Straight through Cable-
Straight-through cables get their name from how they are made. Out of the 8 pins that exist on
both ends of an Ethernet cable, each pin connects to the same pin on the opposite side.
A straight-through cable is typically used in the following situations:
Use a straight-through cable when:
1. Connecting a router to a hub
2. Connecting a computer to a switch
3. Connecting a LAN port to a switch, hub, or computer



Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 7



Conclusions:






Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 8

Experiment 2
Aim: Write a program to implement bit stuffing & Destuffing
Resources: Turbo C, C++.
Theory:
Bit Stuffing and Destuffing
Include <iostream.h>,<conio.h>,<io.h> files both in transmitter & receiver
programs.
During the transmission, attach a flag pattern (01111110) at the start & end of
data unit.
If transmitter sees five consecutive ones in data, it stuffs zero bit in data.
At the receiving end, whenever in data it finds five consecutive ones and the next
bit are zero then the receiver will de stuff that zero bit.
e.g. If the Pattern to be transmitted is 00011110111110000, then at the transmitter side
will be 000111101111100000 because as 5 consecutive 1s are detected, one 0 should be
stuffed and at the receiver side again as it will detect 0 after 5 consecutive 1s , it will
destuff it.
Code:
#include<stdio.h>
#include<conio.h>
#include<string.h>
void main()
{
char a[20],b[20];
char flag[8]="01111110",e='0';
int i,j=0;
clrscr();
printf("\n Enter message bits: ");
fflush(stdin);
gets(a);
for(i=0;i<8;i++)
{
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 9

b[j]=flag[i];
j++;
}
for(i=0;a[i]!='\0';i++)
{
if(a[i-1]=='1'&&a[i-2]=='1'&&a[i-3]=='1'&&a[i-4]=='1'&&a[i-
5]=='1')
{
b[j]=e;
j++;
b[j]=a[i];
j++;
a[i-1]=0;
}
else
{
b[j]=a[i];
j++;
}
}
for(i=0;i<8;i++)
{
b[j]=flag[i];
j++;
}
b[j]='\0';
printf("\n Stuffed bit stream(Tx): ");
puts(b);
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 10

printf("\n Destuffed bit stream(Rx): ");
for(j=0,i=0;i<8;j++,i++)
{
if (b[j]==flag[i])
{
}
}
for (;b[j]!='\0';j++)
{
if(b[j]=='0'&&b[j+1]=='1'&&b[j+2]=='1'&&b[j+3]=='1'&&b[j+4]=='1'
&&b[j+5]=='1'&&b[j+6]
=='1'&&b[j+7]=='0')
{
goto end;
}
else if(b[j]=='0'&&b[j-1]=='1'&&b[j-2]=='1'&&b[j-3]=='1'&&b[j-
4]=='1'&&b[j-5]=='1')
{
}
else
printf("\%c",b[j]);
}
end:
getch();}




Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 11

Output:


Conclusions:












Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 12

Experiment 3
Aim: Write a program to implement character stuffing & Destuffing
Resources: Turbo C, C++.
Theory:
Character Stuffing and Destuffing
Include <iostream.h>,<conio.h>,<io.h> files both in transmitter & receiver
programs.
This is type of Framing Method.
During the transmission attach a ASCII Code pattern DLE STX at the start &
DLE ETX end of data Unit.
If transmitter sees DLE stuff another DLE text in data.
At the receiving end, whenever the data it finds five consecutive DLE then
receiver will destuff One DLE.

Code:
#include<stdio.h>
#include<conio.h>
#include<string.h>
void main()
{
int i,j=0;
char str[100],str2[100],flag,esc;
clrscr();
printf("\n Enter the data string: ");
gets(str);
printf("\n Enter the flag: ");
scanf("%c",&flag);
printf("\n Enter the stuffing character: ");
fflush(stdin);
scanf("%c",&esc);
str2[j]=flag;
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 13

j++;
for(i=0;str[i]!='\0';i++)
{
if(str[i]==flag)
{
str2[j]=esc;
j++;
}
else if(str[i]==esc)
{
str2[j]=esc;
j++;
}
str2[j]=str[i];
j++;
}
str2[j]=flag;
j++;
str2[j]='\0';
printf("\n Stuffed data string: %s",str2);
printf("\n\n Destuffed data string: ");
for(j=0;str2[j]!='\0';j++)
{
str2[0]='\0';
if(str2[j]==esc&&(str2[j+1]==flag||str2[j+1]==esc))
{
printf("%c",str2[j+1]);
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 14

j++;
}
else if(str2[j]==flag&&str2[j+1]=='\0')
{
goto end;
}
else
printf("%c",str2[j]);
}
end:
getch();}
Output:


Conclusions:



Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 15

Experiment 4
Aim: Write a program to implement CRC.
Resources: Turbo C, C++.
Theory:
It does error checking via polynomial division. In general, a bit string
bn-1bn-2bn-3b2b1b0
As
bn-1Xn-1 + bn-2 Xn-2 + bn-3 Xn-3 + b2 X2 + b1 X1 + b0
Ex: -
10010101110
As
X10 + X7 + X5 + X3 + X2 + X1
All computations are done in modulo 2

Algorithm:-
1. Given a bit string, append 0S to the end of it (the number of 0s is the same as the degree of
the generator polynomial) let B(x) be the polynomial corresponding to B.
2. Divide B(x) by some agreed on polynomial G(x) (generator polynomial) and determine
the remainder R(x). This division is to be done using Modulo 2 Division.
3. Define T(x) = B(x) R(x)
(T(x)/G(x) => remainder 0)
4. Transmit T, the bit string corresponding to T(x).
5. Let T represent the bit stream the receiver gets and T(x) the associated polynomial. The
receiver divides T1(x) by G(x). If there is a 0 remainder, the receiver concludes T = T
and no error occurred otherwise, the receiver concludes an error occurred and requires a
retransmission.
Code:
#include<stdio.h>
#include<conio.h>
#include<string.h>
void main()
{ char st1[10],st2[15],div[5],q[15],i_ans[5],i_op[5],cw[15];
int l,i,n,m;
clrscr();
printf("\nEnter the string: ");
scanf("%s",st1);
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 16

strcpy(div,"10101");
strcpy(st2,st1);
strcat(st2,"000000");
printf("\nDivisor is: %s",div);
printf("\nDividendo is: %s\n",st2);
l=strlen(st2);
for(i=0;i<5;i++)
{i_op[i]=st2[i];}
l=l-5;
i_op[5]='\0';

for(n=0;n<l;n++)
{
if (i_op[0]=='0')
{
strcpy(i_ans,i_op);
q[n]='0';
}
else
{ for(i=0;i<5;i++)
{ if (i_op[i]==div[i])
i_ans[i]='0';
else
i_ans[i]='1';}
i_ans[5]='\0';
q[n]='1';}
q[n+1]='\0';
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 17

for(i=0;i<4;i++)
{m=i+1;
i_op[i]=i_ans[m];}
i_op[4]=st2[n+5];
i_op[5]='\0';}
q[n+1]='\0';
strcpy(cw,st1);
strcat(cw,i_op);
printf("Generated CRC Codeword: %s",cw);
getch();}
Output:


Conclusions:



Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 18

Experiment 5
Aim: Implementation of parity checker.
Resources: Turbo C, C++.
Theory:
Parity checking refers to the use of parity bits to check that data has been transmitted
accurately. Parity checking is the most basic form of error detection in communications.
Two transmitting devices are communicating with even parity. As the transmitting device sends
data, it counts the number of set bits in each group of seven bits. If the number of set bits is even,
it sets the parity bit to 0; if the number of set bits is odd, it sets the parity bit to 1.
Every byte has an even number of set bits. On the receiving side, the device checks each byte to
make sure that it has an even number of set bits. If it finds an odd number of set bits, the receiver
knows there was an error during transmission.
Code:
#include<stdio.h>
#include<conio.h>
#include<string.h>
void main()
{ int i=0,j=0;
char msg1[9],msg2[9];
clrscr();
printf("Enter any 9-bits:");
scanf("%s",&msg1);
for(i=0;i<=strlen(msg1);i++)
{ if(msg1[i]=='1')
{j=j+1;}}
if(j%2==0)
printf("\n Even Parity");
else
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 19

printf("\n Odd Parity");
j=0;
printf("\n \nEnter any 9-bits:");
scanf("%s",&msg2);
for(i=0;i<=strlen(msg2);i++)
{if(msg2[i]=='1')
{j=j+1;}}
if(j%2==0)
printf("\n Even Parity");
else
printf("\n Odd Parity");
getch();}
Output:


Conclusions:






Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 20

Experiment 6
Aim: Write a program to implement Hamming code.
Resources: Turbo C, C++.
Theory:
Hamming code is a set of error-correction code s that can be used to detect and correct bit errors
that can occur when computer data is moved or stored.
Hamming code is technique developed by R.W. Hamming for error correction. This method
corrects the error by finding the state at which the error has occurred.
Code:
#include<stdio.h>
#include<math.h>
#include<conio.h>
void main()
{
clrscr();
int x1,x2,x3,i,x[4],y[7];
printf("Enter 4-bit data: ");
for(i=0;i<4;i++)
{scanf("%d",&x[i]);}
y[2]=x[0];
y[4]=x[1];
y[5]=x[2];
y[6]=x[3];
x1=y[2]+y[4]+y[6];
x2=y[2]+y[5]+y[6];
x3=y[4]+y[5]+y[6];
y[0]=x1%2;
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 21

y[1]=x2%2;
y[3]=x3%2;
printf("\n \n Generated Hamming Code (even parity): ");
for(i=0;i<6;i++)
printf("%d",y[i]);
getch();}

Output:


Conclusions:






Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 22


Experiment 7
Aim: Write a program to find Hamming distance
Resources: Turbo C, C++.
Theory:
In information theory, the Hamming distance between two strings of equal length is the number
of positions at which the corresponding symbols are different.
In another way, it measures the minimum number of substitutions required to change one string
into the other, or the minimum number of errors that could have transformed one string into the
other.
Code:
#include<stdio.h>
#include<conio.h>
void main()
{
clrscr();
int i,j=0,a[5],b[5];
printf("Enter 5-bit data1: ");
for(i=0;i<5;i++)
scanf("%d",&a[i]);
printf("Enter 5-bit data2: ");
for(i=0;i<5;i++)
scanf("%d",&b[i]);
for(i=0;i<5;i++)
{
if(a[i]!=b[i])
j=j+1;
}
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 23

printf("Hamming distance: %d",j);
getch();}
Output:


Conclusions:










Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 24

Experiment 8
Aim: Write a C program for IPV4, Implementation of decimal to binary, Implementation of
binary to decimal.
Resources: Turbo C, C++.
Theory:
Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet
Protocol (IP) Internet, and routes most traffic on the Internet. However, a successor protocol,
IPv6, has been defined and is in various stages of production deployment. IPv4 is described in
IETF publication RFC 791 (September 1981), replacing an earlier definition (RFC 760, January
1980).
IPv4 is a connectionless protocol for use on packet-switched networks. It operates on a best
effort delivery model; in that it does not guarantee delivery, nor does it assure proper sequencing
or avoidance of duplicate delivery.
Code:
(a) Implementation of IPV-4
#include<stdio.h>
#include<conio.h>
void main()
{ int IP1,IP2,IP3,IP4;
clrscr();
printf("enter IP address: ");
scanf("%d",&IP1);
scanf("%d",&IP2);
scanf("%d",&IP3);
scanf("%d",&IP4);
printf("\nYou entered: %d.%d.%d.%d \n \n",IP1,IP2,IP3,IP4);
if(IP1>255 || IP2>255 || IP3>255 || IP4>255)
{printf("Invalid Address");}
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 25

else if(IP1>=0 && IP1<128)
{printf("IP Address of Class 'A'");}
else if(IP1>=128 && IP1<192)
{ printf("IP Address of Class 'B'");
}
else if(IP1>=192 && IP1<224)
{ printf("IP Address of Class 'C'");}
else if(IP1>=224 && IP1<240)
{ printf("IP Address of Class 'D'");}
else if(IP1>=240 && IP1<=255)
{ printf("IP address of class 'E'");}
else
{printf("Invalid Address");}
getch();
}
Output:


Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 26

(b) Implementation of decimal to binary
#include<stdio.h>
#include<conio.h>
#include<string.h>
#include<math.h>
void main()
{
clrscr();
int a,b,c,d,e,x[50],stop,count,code;
printf("Enter the decimal number: ");
scanf("%d",&c);
code=c;
count=0;
for(a=1;a<50;a++)
{
count++;
d=c;
if(d==1)
{goto stop;}
e=d/2;
b=d%2;
x[a]=b;
c=e;}
stop:
printf("\nOutput binary code: ");
printf("1");
for(a=count-1;a>0;a--)
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 27

{printf("%d",x[a]);}
getch();}
Output:

(C) Implementation of decimal to binary
/* 4 bit binary to decimal */
#include<stdio.h>
#include<conio.h>
#include<math.h>
void main()
{
int i,j=3,di=0,b[4];
clrscr();
printf("Enter 4-bit binary number: ");
for(i=0;i<4;i++)
{
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 28

scanf("%d",&b[i]);
}
for(i=0;i<4;i++)
{
di=di+(b[i]*pow(2,j));
j=j-1;
}
getch();}
Output:


Conclusions:




Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 29

Experiment 9
Aim: Write a program to implement encoding and decoding
Resources: Turbo C, C++.
Theory:
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryptiona
series of well-defined steps that can be followed as a procedure. An alternative, less common
term is encipherment.
To encipher or encode is to convert information from plain text into cipher or code. codes
generally substitute different length strings of characters in the output, whilst ciphers generally
substitute the same number of characters as are input.
Code:
#include<stdio.h>
#include<conio.h>
#include<string.h>
void main()
{
clrscr();
int i;
char a[10];
for(i=0;i<10;i++)
a[10]='\0';
printf("Enter the input data: ");
scanf("%s",&a);
i=0;
while(a[i]!='\0')
{a[i]=a[i]+3;
i++;}
printf("\nEncoded data(Tx): %s",a);
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 30

i=0;
while (a[i]!='\0')
{a[i]=a[i]-3;
i++;}
printf("\nDecoded data(Rx): %s",a);
getch();}
Output:



Conclusions:






Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 31

Experiment 10
Aim: Design of LAN for s typical branch office of the bank and Network IP
Resources: Command Prompt And Packet Tracer.
Theory:
A typical branch of the bank consists of about 40 connected hosts, located on a single
floor. One of these hosts is the mail server while another is a Database Server for the
branch. The mail server handles all the incoming and outing mails of the branch
employees. The database server records all the daily transactions carried in the branch.

1. Design a network topology to be used and the physical layout
Plan the placing of hubs or switches in the office area and the no of connections to
each hub or switch.
2. Mention the cost of accessories like hub/switch , type of connection cables, length of
cable used etc. Give the final quotation for whole setup.
3. Analyze your design whether it is optimized for performance or for cost. Justify you
selection of hardware.


Classification of IP address
Sub netting
Super netting
Classification of IP address
How the ip addresses are classified and when they are used.
Class Address Range Supports
Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.
Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.
Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks.
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.
Class E 240.0.0.0 to 254.255.255.254 Reserved.

Sub netting
Why we Develop sub netting and How to calculate subnet mask and how to identify subnet
address.

Super netting
Why we develop super netting and How to calculate supernet mask and how to identify
supernet address.



Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 32

Procedure:
To do this EXPERIMENT- follows these steps:

In this EXPERIMENT- students have to understand basic networking commands e.g ping, tracert
etc.
All commands related to Network configuration which includes how to switch to privilege mode
and normal mode and how to configure router interface and how to save this configuration to
flash memory or permanent memory.
This commands includes
Configuring the Router commands
General Commands to configure network
Privileged Mode commands of a router
Router Processes & Statistics
IP Commands
Other IP Commands e.g. show ip route etc.
Diagram to be drawn: - Complete sketch of college LAN, showing no of computers connected
in each lab to connecting devices like hub, switch etc.

Conclusions:


Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 33

Experiment 11
Aim: Configure a Network topology using packet tracer software.
Resources: Command Prompt And Packet Tracer software.
Procedure:
To implement this practical following network topology is required to be configured using the
commands. After configuring the given network a packet should be ping from any one machine to
another.

(1) Ring Topology:-










Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 34

(2) Star Topology:-




(3) Tree Topology:-




Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 35

(4) Hybrid Topology (Star Ring) :-




(5) Bus Topology:-




Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 36


(6) Mesh Topology:-



Conclusions:











Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 37

Experiment 12
Aim: To configure FTP server on windows server.
Resources: Windows 2003 Server, Windows XP Professional Client
Theory:
File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host
to another host over a TCP-based network, such as the Internet.
FTP is built on a client-server architecture and uses separate control and data connections
between the client and the server.[1] FTP users may authenticate themselves using a clear-text
sign-in protocol, normally in the form of a username and password, but can connect
anonymously if the server is configured to allow it. For secure transmission that hides (encrypts)
the username and password, and encrypts the content, FTP is often secured with SSL/TLS
("FTPS")
Procedure:
SETUP IIS Server and host website

IIS (Internet Information Services) is an easy-to-use web server from Microsoft. IIS is not
installed on Windows XP Professional by default. It is however installed when you upgrade from
Windows NT or Windows 2000 to Windows XP Pro. If not installed IIS can be installed as
follows:
1- Start-> control panel-> Add/Remove program->Add/Remove windows component
2- When the Windows Components Wizard appears, click Next. From here select IIS.
The IIS is configured using the IIS snap-in, previously called the Internet Services Manager. This
can be accessed in one of three ways:
Method 1:
1- From the Start menu, select Settings and then Control Panel
2- Open Administrative Tools
3- Open Internet Information Services
Method 2:
1- Right click on My Computer on your desktop
2- Select Manage to open the Computer Management console
3- Select Internet Information Services under Services and Applications
Method 3:
1- From the Start menu, select Run
2- Type inetmgr and run the command
To install the FTP service on our IIS machine
1. Begin by opening Add or Remove Programs in Control Panel and selecting Add/Remove
Windows Components. Then select the checkbox for Application Server:

Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 38





2. Click Details and select the checkbox for Internet Information Services

Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 39

3. Click Details and select the checkbox for File Transfer Protocol (FTP) services


4. Click OK twice and then Next to install the FTP service.
During installation youll need to insert your Windows Server 2003 product CD or
browse to a network distribution point where the Windows Server 2003 setup files are
located. Click Finish when the wizard is done.

Creating an FTP Site: Open IIS Manager in Administrative Tools, select FTP Sites in the
console tree, and right-click on Default FTP Site and select properties :

Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 40

Assign the IP address 172.16.11.210 for the Human Resources FTP site and make D:\HR
the folder where its content is located. To create the new FTP site, right-click on the FTP
Sites node and select New --> FTP Site. This starts the FTP Site Creation Wizard. Click
Next and type a description for the site.


Click Next and specify 172.16.11.210 as the IP address for the new site

Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 41


Click Next and select Do not isolate users, since this will be a site that anyone (including
guest users) will be free to access:


Click Next and specify C:\HR as the location of the root directory for the site.

Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 42


Click Next and leave the access permissions set at Read only as this site will only be used
for downloading forms for present and prospective employees:


Click next and then Finish to complete the wizard. The new Human Resources FTP site
can now be seen in IIS Manager under the FTP Sites


Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 43

To view the contents of this site, go to a Windows XP desktop on the same network and
open the URL ftp://172.16.11.210 using Internet Explorer :


To view all users currently connected to the Human Resources FTP site, right-click on
the site in Internet Service Manager and select Properties, then on the FTP Site tab click
the Current Sessions button to open the FTP User Sessions dialog :

Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 44

Now to create another FTP site using a script instead of the GUI. Well create a site
called Help and Support with root directory C:\Support and IP address 172.16.11.211:


The figure shows the result of running the script:


Configure the FTP Service:
To configure the FTP Service to allow only anonymous connections, follow these steps:
1. Start Internet Information Services Manager or open the IIS snap-in.
2. Expand Server_name, where Server_name is the name of the server.
3. Expand FTP Sites
4. Right-click Default FTP Site and then click Properties.
5. Click the Security Accounts tab.
6. Click to select the Allow Anonymous Connections check box (if it is not already
selected), and click to select the Allow only anonymous connections check box.
When you click to select the Allow only anonymous connections check box, you
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 45

configure the FTP Service to allow only anonymous connections. Users cannot log on by
using user names and passwords.
7. Click the Home Directory tab.
8. Click to select the Read and Log visits check boxes (if they are not already selected), and
then click to clear the Write check box (if it is not already cleared).
9. Click OK.
10. Quit Internet Information Services Manager or close the IIS snap-in.
The FTP server is now configured to accept incoming FTP requests. Copy or move the files that
you want to make available to the FTP publishing folder for access. The default folder is
drive:\Inetpub\Ftproot, where drive is the drive on which IIS is installed.

Conclusions:
















Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 46

Experiment 13
Aim: To configure DNS server on windows server.
Resources: Windows 2003 server, Windows XP client
Theory: The Domain Name System (DNS) is a hierarchical distributed naming system for
computers, services, or any resource connected to the Internet or a private network. it translates
easily memorized domain names to the numerical IP addresses needed for the purpose of
locating computer services and devices worldwide.
Procedure:
Setting up active directory using the run command dcpromo is a straightforward procedure. To
begin, from your windows 2003 server desktop:
1. Go to Start click on Run and type dcpromo and hit Enter. The Welcome to the Active
Directory Installation Wizard should come up:

2. Click on Next. On the following window, you will get a warning about comparability
issues with other Operating Systems. Improve security settings in Windows Server
2003affect older versions of windows:






Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 47

3. Click Next. On the next screen, you will get two options. The first option asks you if you
want the server to become a domain controller for a new domain or if you want the server
to be an additional domain controller for for an existing domain:

4. Select the first option and click Next. On the next window, you will get three options:
a. The first option is to setup the domain in a new forest. Select this option if its the
first domain controller on your organization, or if you want it to be totally
independent from any forest.
b. Child domain in an existing domain tree. select this option if you want the domain
to be a child domain from an existing domain.
c. Domain tree in an existing forest. if you dont want any of the above, select this.

Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 48

5. Choose the first option, and click Next. On the next screen, we need to type the full DNS
name for the new domain:

6. Type the full DNS name like helpdeskgeek.com, and click on Next. On the next screen,
we need to choose the NETBIOS name.

Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 49

7. Choose the name, and click Next. On the next screen, you need to select the location of
where you want to store the database and log files. for best performance store them in
separate disks.

8. Choose the location where you want the active directory database and logs, and click
Next.
9. Next, the Shared system volume window will come up. You need to choose the location
where you want to store the SYSVOL files. This folder contains the domain public files
and are replicated to all the domain controllers in the domain.

Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 50

10. Choose the folder location, and click Next.
11. On the next window, the DNS registration diagnostic will show up. You will get
Diagnostic failed and will get three options:
a. It will allow you to perform the DNS diagnostic again.
b. It gives you the option to allow the active directory wizard to install and configure
DNS for you, and use this DNS as the primary DNS for this server.
c. It allows you to bypass this window if you plan to correct the problem later on.

12. We have to configure its services, so we will choose the option to Install and configure
DNS server on this computer and set this computer to use this DNS server as its
preferred DNS server. then click Next.
13. On the next window, you need to choose what type or permissions you want for users and
group objects. Here you will get two options.
a. Select this option if you run server programs with pre-windows 2000.
b. Select this option, if you only run windows servers 2000 and windows servers
2003 your domain.
Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 51


14. Select the second option, and click Next. On the next window, you need to enter the
Directory services restore mode administrator password.



Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 52

15. Type your chosen password, and click Next. Next, you will get the summary of all the
options you have chosen during the active directory wizard. Remember, the domain
administrator account password is the same as the current local administrator password.


16. Click Next. the active directory installation should begin.

Sub.Code: 181001 Sub.Name: DCN Year: 2014

VGEC /EC /BE/SEM-8 53


17. Click on Finish. and restart the computer. Active Directory should be now installed.

Conclusions:

You might also like