0% found this document useful (0 votes)
127 views

Laboratory Manual: Government Polytechnic Porbandar

This document contains information about a laboratory manual for the subject of Computer Networks at the Government Polytechnic in Porbandar, India. It includes details such as the course outcomes, hardware and software requirements, a list of practical experiments to be conducted, and rubrics for evaluating student lab performance and assignments. The experiments focus on topics like installing network interface cards, configuring servers, and setting up small computer networks.

Uploaded by

Roy Bokhiriya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views

Laboratory Manual: Government Polytechnic Porbandar

This document contains information about a laboratory manual for the subject of Computer Networks at the Government Polytechnic in Porbandar, India. It includes details such as the course outcomes, hardware and software requirements, a list of practical experiments to be conducted, and rubrics for evaluating student lab performance and assignments. The experiments focus on topics like installing network interface cards, configuring servers, and setting up small computer networks.

Uploaded by

Roy Bokhiriya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 88

GOVERNMENT POLYTECHNIC

PORBANDAR

Affiliated to

Gujarat Technological University, Ahmedabad

Laboratory Manual
COMPUTER NETWORKS
(3340702)

D. E. Second Year (Semester– IV)

Government Polytechnic - Porbandar


Opp. Airport, National Highway
Porbandar – 360578
GOVERNMENT POLYTECHNIC
PORBANDAR

Enrollment No:

Name:

Address:

Subject:

Branch:

Term:
GOVERNMENT POLYTECHNIC
PORBANDAR

Computer Engineering Department

Certificate

This is to certify that


Mr./Ms________________________ Enrolment No:______________
Of 3rd Semester Diploma course in Computer Engineering has
satisfactorily completed his/her term work in Computer Networks
(3340702) from___________ to___________ in Government
Polytechnic, Porbandar.

Date of Submission: ______________________

Staff in charge Head of Department

______________________ ___________________
GOVERNMENT POLYTECHNIC
PORBANDAR

VISION OF THE INSTITUTE


To emerge as a leading polytechnic having value based effective technical
education system in the region to meet the future demand of industry and society.

MISSION OF THE INSTITUTE


M1: To impart adequate technical skill and capability to accept challenges and to
adopt rapidly changing scenario in technological development as well as to take
up higher studies.

M2: Foster close networking with the industry, alumni and the guardians.

M3: Promote professional ethics and human values, integrity, accountability and
transparency.

M4: Promote entrepreneurship practices to generate employment opportunities.

M5: Create conductive academic environment.


GOVERNMENT POLYTECHNIC
PORBANDAR

COMPUTER ENGINEERING
DEPARTMENT

VISION OF THE DEPARTMENT


To achieve excellence in Computer Engineering by imparting technical and
problem-solving skills along with ethical value to meet industrial requirements
having social and environmental concerns.

MISSION OF THE DEPARTMENT


M1: To provides a learning ambiance to enhance discipline knowledge, technical
skill and problem solving skill.

M2: To motivates students for lifelong learning to adapt challenges in rapidly


changing technology.

M3: To induces ethical values and spirit of social commitment.

M4: To provide opportunities to promote leadership skill required in Computer


Engineering industry’s diverse culture.
Subject: Computer Networks
Subject Code: C207, 3340702

Course Outcomes:
CO1: Comprehend various protocols and models in networks.

CO2: Identify the functions of each layer in OSI and TCP/IP model with
different operations of TCP, HTTP and DNS.

CO3: Establish simple and robust computer networks for different environment.

CO4: Make use of Subnets, IPv4 and IPv6 in computer networks.

CO5: Solve network operational problems for real time application with new
tools and technology.
Hardware Requirements:
 Ethernet Network Cable, RJ45 connectors
 Crimping tool
 UTP Cable Tester
 Layer 2 Switch
 Wireless Access point and Wireless Router
 Computer system with latest configurations
 Network Card
 Network trainer kit

Software Requirements:
 Network Simulator
 Windows 2008 Server
 File Server setup
 Web Server setup
List of Practicals
Sr. Mapping Mapping with
Practical Title
No. with COs POs, PSOs
PO1, PO2, PO3,
1 Install & test Network Interface card. CO1
PO7
PO1, PO2, PO3,
2 Prepare and Test Straight UTP Cable. CO3
PO4, PO7
PO1, PO2, PO3,
3 Prepare and Test Cross UTP Cable. CO3
PO4, PO7
PO1, PO2, PO3,
4 Develop a small Network. CO1
PO7
PO1, PO2, PO3,
5 Install Windows 2008 Network operating System. CO4
PO4, PO7
PO1, PO2, PO3,
6 Install & Configure File Server. CO1
PO7
PO1, PO2, PO3,
7 Install & Configure Print Server CO1
PO7
PO1, PO2, PO3,
8 Install & Configure Mail Server CO5
PO4, PO7
PO1, PO2, PO3,
9 Install & Configure Proxy Server CO5
PO4, PO7
PO1, PO2, PO3,
10 Install & Configure Web Server CO5
PO4, PO7
PO1, PO2, PO3,
11 Install & Test Router, Repeater and Bridge. CO4
PO4, PO7
PO1, PO2, PO3,
12 Install a small wireless network using access points. CO4
PO4, PO7
PO1, PO2, PO3,
13 Set, Configure & Test Internet. CO5
PO4, PO7
Lab Evaluation Rubrics:
Lab Performance (LP) Rubrics
Criteria Excellent (4) Good (3) Substandard (2) Poor (1)
Lab * Student * Student needs * Student performs * Student cannot
Performance Performs some help from of the experiments complete
(LP) experiment as per faculty to with the help from experiment.
the instructions perform the faculty. * Student has not
given without experiments as * Student has no understanding of lab
any help from per the clear understanding objectives and
faculty. instruction of lab objectives concepts.
* Student * Student has and concepts. * Student cannot
demonstrates an sufficient * Student cannot explain concepts to
accurate understanding of explain concepts to fellow classmates.
understanding of lab objectives and fellow classmates.
the lab objectives concepts.
and concepts. * Student can
* Student can understand
explain concepts concepts by
to fellow himself but
classmates. cannot explain it
to fellow
classmates.

Lab Assignment (LA) Rubrics


Criteria Excellent (4) Good (3) Substandard (2) Poor (1)
Lab * Student * Student has a * Student has * Student turns in
Assignment demonstrates an basic knowledge problems with both lab report late or
accurate of content, but the graphs and the the report is so
understanding of may lack some answers. incomplete and/or
the lab objectives understanding of * Student appears to so inaccurate.
and concepts. some concepts. have not fully * Programs are not
* Student answers * Student grasped the lab complete.
questions answers content and the
completely and questions fairly Programs possess
correctly. well. some errors.
* Programs are * Programs
written neatly, could have be
has no error. written more
neatly.
* Programs has
no errors or
errors are
minimal
Index
Sr. Page Staff PA
Practical Date
No No Signature LP LA

1 Install and test Network Interface card.

2 Prepare and Test Straight UTP Cable.

3 Prepare and Test Cross UTP Cable.

4 Develop a small Network.

5 Install Windows 2008 Network operating System.

6 Install & Configure File Server.

7 Install & Configure Print Server

8 Install & Configure Mail Server

9 Install & Configure Proxy Server

10 Install & Configure Web Server

11 Install & Test Router, Repeater and Bridge.

12 Install a small wireless network using access points.

13 Set, Configure & Test Internet.


Page: CN (3340702)

Practical - 1

AIM: Install and test Network Interface card.


Requirements: The Computer having PCI or PCIe slot for Network Interface card and a Network
Interface card.

Explanation: A NIC is also commonly referred to as a network adapter and is an expansion card
that enables a computer to connect to a network such as a home network and/or the Internet using
an Ethernet cable with a RJ-45 connector.

Main Function of a NIC


A network interface card connects your computer to a local data network or the Internet .
The card translates computer data into electrical signals, it sends through the network; the
Signals are compatible with the network so computers can reliably exchange information.

Process for installation of NIC is as follows:


Step 1: Unplug the PC to avoid an electrical shock hazard before installing the network interface
card.

Step 2: Open the computer case.

Step 3: Find an available Peripheral Component Interconnect (PCI) slot on the motherboard
and remove slot insert if one exists.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 4: Carefully remove the network card from its static-proof plastic envelope, and slide it
into the slot.

Step 5: Seat the card in the slot firmly with gentle pressure along the length of the card,
especially right about the slot itself.

Step 6: Snugly, screw the card to the computer frame, but do not over tighten.

Step 7: Close the computer case.

Step 8: Plug your computer in and power it up.

Step 9: Click Start, then click Control Panel.

Step 10: In Category View (vs. Classic View) click Performance and Maintenance.

Step 11: Click "System" icon at bottom of window.

Step 12: Click the Hardware tab.

Step 13: Click the Device Manager Button.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 14: Double-click Network Adapters.

Step 15: Beneath it should appear the name of your Ethernet card.

Step 16: Next, double click the name of your Ethernet adapter.

Step 17: If the text in the "Device Status" box says "This device is working properly.", then you
successfully installed the card and are finished.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 18: If the text in the "Device status" box doesn't say "This device is working properly”, click
the Troubleshoot Button and follow instructions. Double check you followed the directions above.
Install the most up to date device drivers.

Exercise
Q-1. Define Network Interface Card.
Q-2. What is a Functionality of Network Interface Card.
Q-3. Where we can check my NIC card is connect or nor in computer?
Q-4. Is it compulsory to install NIC driver in computer?
Q-5. What type of connections does a NIC control?

Government Polytechnic, Porbandar


Page: CN (3340702)

Government Polytechnic, Porbandar


Page: CN (3340702)

Practical - 2

AIM: Prepare and Test Straight UTP Cable.

THEORY:-
What is UTP Cable?
UTP stands for Unshielded Twisted Pair. It is the cabling system with one or more pairs of twisted
insulated copper wires contained in a single sheath. It is the most widely used cabling system in
telecommunications and data communications environment today.
A straight through network cable acts as an extension enabling a device with a network interface
card to be attached to a network.

Requirements: UTP cable, crimping tool, RJ-45 connector.


1. Crimping Plier: Crimping plier is a tool to cut UTP cable and connector to clamp the
end of the connector.

2. UTP (Unshielded twisted pair) Cable: We use UTP cables to connect with each other
and in UTP cable there are 8 pieces of small colourful cable.

3. RJ- 45 Connector: RJ-45 Connector is a tool that we put on the end of the UTP cable to
plug the cable in the LAN port.

Government Polytechnic, Porbandar


Page: CN (3340702)

Explanation: An Ethernet connector (8P8C) has eight pin slots. Each pin is identified by a number,
starting from left to right, with the clip facing away from you.

The two standards for wiring Ethernet cables are T568A and T568B. T568B is the most
common and is what we'll be using for our straight Ethernet cable. The tables below show the proper
orientation of the coloured wires to the pins.
T568A Standard T568B Standard
Pin 1 White/Green Pin 1 White/Orange
Pin 2 Green Pin 2 Orange
Pin 3 White/Orange Pin 3 White/Green
Pin 4 Blue Pin 4 Blue
Pin 5 White/Blue Pin 5 White/Blue
Pin 6 Orange Pin 6 Green
Pin 7 White/Brown Pin 7 White/Brown
Pin 8 Brown Pin 8 Brown

Procedure:
Step 1: Strip the cable jacket about 1.5 inch down from the end.
Step 2: Spread the four pairs of twisted wire apart. For Cat 5e, you can use the pull string to strip
the jacket farther down if you need to, then cut the pull string. Cat 6 cables have a spine that will
also need to be cut.

Step 3: Untwist the wire pairs and neatly align them in the T568B orientation. Be sure not to untwist
them any farther down the cable than where the jacket begins; we want to leave as much of the cable
twisted as possible.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 4: Cut the wires as straight as possible, about 0.5 inch above the end of the jacket.
Step 5: Carefully insert the wires all the way into the modular connector, making sure that each wire
passes through the appropriate guides inside the connector.

Step 6: Push the connector inside the crimping tool and squeeze the crimper all the way
down.

Step 7: Repeat steps 1-6 for the other end of the cable.
Step 8: To make sure you've successfully terminated each end of the cable, use a cable tester to test
each pin. When you're all done, the connectors should look like this:

Government Polytechnic, Porbandar


Page: CN (3340702)

Exercise
Q-1. Define UTP.
Q-2. Which tools are required for making straight through cable?
Q-3. Explain the need of straight UTP cable.
Q-4. How many pins are there in RJ45 Connector?
Q-5. State the application of straight UTP cable.
Q-6. Identify and write the name of below given connectors.

Government Polytechnic, Porbandar


Page: CN (3340702)

Government Polytechnic, Porbandar


Page: CN (3340702)

Practical - 3

AIM: Prepare and Test Cross UTP Cable.

Requirements: UTP cable, crimping tool, RJ-45 connector.

Description: A crossover cable can be used to connect two devices directly, without the need for a
router in the middle, apart from this it expands a network by connecting another network switch,
thereby giving you more ports.
Crossover cables are most commonly used to connect two hosts directly. Examples would be
connecting a computer directly to another computer, connecting a switch directly to another
switch, or connecting a router to a router.
It simply reverses some of the pins of straight UTP cable which results in crossover UTP cable, so
that the output on one computer is being sent to the input of another.

The tables below show the proper orientation of the coloured wires to the pins.

T568A Standard T568B Standard


Pin 1 White/Green Pin 1 White/Orange
Pin 2 Green Pin 2 Orange
Pin 3 White/Orange Pin 3 White/Green
Pin 4 Blue Pin 4 Blue
Pin 5 White/Blue Pin 5 White/Blue
Pin 6 Orange Pin 6 Green
Pin 7 White/Brown Pin 7 White/Brown
Pin 8 Brown Pin 8 Brown

Procedure:
Step 1: Strip the cable jacket about 1.5 inch down from the end.
Step 2: Spread the four pairs of twisted wire apart. For Cat 5e, you can use the pull string to strip
the jacket farther down if you need to, then cut the pull string. Cat 6 cables have a spine that will
also need to be cut.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 3: Untwist the wire pairs and neatly align them in the T568A orientation. Be sure not to
untwist them any farther down the cable than where the jacket begins; we want to leave as much of
the cable twisted as possible.

Step 4: Cut the wires as straight as possible, about 0.5 inch above the end of the jacket.

Step 5: Carefully insert the wires all the way into the modular connector, making sure that each wire
passes through the appropriate guides inside the connector.

Step 6: Push the connector inside the crimping tool and squeeze the crimper all the way down.

Step 7: Now make the other end of the cable a T568B.

Thus one end of crossover UTP cable is a T568A and the other end a T568B.

Exercise
Q-1. If below devices were connected with UTP Ethernet cables, which pairs of devices would require
a straight-through cable and which would require crossover cable?
A) PC and router
B) PC and switch
C) Hub and switch
D) Router and hub
E) Wireless access point (Ethernet port) and switch
Q-2. Which of the following is least susceptible to lightning
A) Unshielded Twisted pair
B) Shielded Twisted pair
C) Fiber-optic
D) Coaxial Cable

Q-3. Why do we need a crossover cable?

Government Polytechnic, Porbandar


Page: CN (3340702)

Government Polytechnic, Porbandar


Page: CN (3340702)

Practical - 4

AIM: Develop a small Network.


Definition:-
 Computer network connects two or more autonomous computer.
 The computer can be geographically located anywhere.

Types of Network:-
 LAN:-Network in small geographical Area (room, building or campus) is called Local Area
Network.
 MAN:-Network in a city is called Metropolitan Area network.
 WAN:-Network spread geographically (country or across globe) is called Wide Area

Network. Networking Devices:

1. Hub
2. Switches
3. Router
4. Wireless Access Points (WAP)
5. Modems etc.

Government Polytechnic, Porbandar


Page: CN (3340702)

Setting and creating a LAN (local Area network):-

Step 1: Open the start menu, navigate to control panel, and select your network card:

Step 2: Click the network card, to open this options box:

Step 3: Click Properties to open this screen:

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 4: Scroll the bar until “Internet protocol (TCP/IP)” can be shown (This is located usually at the
bottom of the list:

Step 5: Internet Protocol (TCP/IP)” item to bring up this menu: Double click the “Properties”

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 6:

Static IP- Good for a computer behind a router or firewall that uses Network Address Translation
(NAT), Port Translation (PAT) or in any circumstance where you need to forward ports.
In this example, the IP address of this computer is “10.10.10.5”, the subnet mask (automatically done
for you in XP after entering an IP) is set to 255.255.255.0 and the default gateway is set to 10.10.10.1
This means that the router or modem that is in use is sent via that IP within the network. Here a router
is in use, so all computers will have the same gateway IP, which can be set to whatever the routers
IP is (usually 192.168.1.1).
The IP ends in .5 as it is the fifth computer on the network. All the other parts of the IP remain the
same (10.10.10.X), however you could use the 192.168.1.X and just change the X in this range as
well.
Usually it is best to set the router or the computer sharing the internet as the .1 address as it makes it
easier to remember.
Dynamic IP - Good for single computer or in a LAN where each box does not need to have ports
forwarded to it (if it is not acting as a server)
To use dynamic IP’s just select “obtain an IP address automatically” and the other options will grey
out.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 7:

The DNS server setup allows you to use http://www.google.com instead of

http:// 66.102.9.104, which is harder to remember, most ISPs tell you which two to use, there are
however many free ones out there, all you have to do is Google for DNS servers.

Alternatively, the ISP may ask you to tick “Obtain DNS Server address automatically” which means
upon connecting to the ISP it will tell you which DNS servers to use without you having to set it up.

After setting this page up, click the “OK” button to save the settings you have entered. To improve
your network performance, open this window once more:

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 8: And click “Configure…”

Find the option for “link Speed” (will change depending on what network card you have).

Step 9: Set the option to “Full Duplex” for whatever speed your network card can handle, usually
10/100mbit so set it to 100mbps/Full Duplex. This will increase the speed of file transfers over your
network.

Government Polytechnic, Porbandar


Page: CN (3340702)

For sharing files across a network I recommend using an FTP Server, such as the free one from
www.guildftpd.com or using the windows shares.

For using shares first disable “use simple file sharing” to do this, open my computer, go to the “Tools”
option and select “Folder Options…”

Step 10: Navigate to the view tab and scroll the bar to the very bottom where you should see:

Step 11: Make sure the “Use simple file sharing (Recommended) option is unchecked (as it is here)

Now to view files on a different computer on your network, open the “Run” bar either by Start ->
Run, or holding the Windows key and then holding the R key (while keeping the Windows key held
down.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 12:

Into this box enter

\\IP_ADDRESS\C$

Where IP_ADDRESS is the IP of another computer in your network such as 10.10.10.2

\\10.10.10.2\C$

Step 13: You will then be prompted with a login box, where you can enter the details for the
administrator account on the other computer, and you will then have a normal window showing you
the C Drive of the other computer.
NB: if you name your computers (e.g. “kitchen”) you can use \\kitchen\C$ as an alternate way to gain
access to the computer.
Tips to check your network is working:
Firstly if the network is not functioning turn of the windows XP Firewall

Step 14: If it is disabled (which is good) make sure your other firewall (which you should have) is
allowing the network to function, if you are unsure, set it to allow all until you have tested other
reasons.
Now, once more open the run box (Windows) and type “cmd” (without the “”) and you should get

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 15:
Into this command prompt type
ping IP_ADDRESS
Where IP_ADDRESS is the IP address of the computer or gateway you are trying to reach, and then
hit enter

This shows that from THIS computer can communicate with computer 10.10.10.1 (the gateway).
Thus it should all be working.

CHARACTERISTICS:-
1. Sharing Resources from one computer to another computer over a network.
2. Performance by measuring the speed of data transmission with number of users, connectivity
and the software used.
3. Reliability makes easy to use an alternative source for data communication in case of
hardware failure or connectivity issues.
4. Scalability increases the system performance by adding more processors.
5. Security is the main characteristics of computer network where you can take necessary steps
for protecting your data from unauthorized access.

Government Polytechnic, Porbandar


Page: CN (3340702)

Exercise
Q-1. Define computer network.
Q-2. Define LAN, MAN and WAN.
Q-3. Write down list of LAN devices.
Q-4. Write down Characteristics of Computer Network.
Q-5. Write down Application of Computer Network.

Government Polytechnic, Porbandar


Page: CN (3340702)

Government Polytechnic, Porbandar


Page: CN (3340702)

Practical - 5

AIM: Install Windows 2008 Network operating System.


Requirements: Windows Server 2008 installation media.

Network OS :- NOS is the software that allows multiple computers to communicate, share files and
hardware devices with one another. A network operating system (NOS) is a computer operating
system that is designed primarily to support workstation, personal computer, and, in some instances,
older terminal that are connected on a local area network (LAN).
Some operating systems used for individual computers have built-in network functions, but operating
systems specifically designed for this task are more common. Network OS software includes Linux,
Mac OS X server, Novell and windows server. Some examples of other network operating systems
include Windows 2000, Microsoft Windows XP, Sun Solaris.

Component Requirement
Processor • Minimum: 1GHz (x86 processor) or 1.4GHz (x64 processor)
• Recommended: 2GHz or faster Note: An Intel Itanium 2 processor is required
for Windows Server 2008 for Itanium-based Systems
Memory • Minimum: 512MB RAM
• Recommended: 2GB RAM or greater
• Maximum (32-bit systems): 4GB (Standard) or 64GB (Enterprise and
Datacenter)
• Maximum (64-bit systems): 32GB (Standard) or 2TB (Enterprise, Datacenter
and Itanium-based Systems)
Available Disk • Minimum: 10GB
Space • Recommended: 40GB or greater Note: Computers with more than 16GB of
RAM will require more disk space for paging, hibernation, and dump files
Drive DVD-ROM drive
Display and • Super VGA (800 x 600) or higher-resolution monitor
Peripherals • Keyboard
• Microsoft Mouse or compatible pointing device
Procedure: Below is the procedure to install Windows Server 2008.
Step 1: Insert the appropriate Windows Server 2008 installation media into your DVD drive.
Step 2: Reboot the computer.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 3: When prompted for an installation language and other regional options, make your selection
and press Next.

Step 4: Next, press Install Now to begin the installation process.

Step 5: Enter the Product ID in the next window.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 6: If you do not have the Product ID available right now, you can leave the box empty, and click
Next. You will need to provide the Product ID later, after the server installation is over. Press No.

Step 7: Select the correct version of Windows Server 2008 in the next screen.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 8: If you did provide the right Product ID, select the Full version of the right Windows version
you’re prompted, and click Next.

Step 9: Read and accept the license terms by clicking to select the checkbox and pressing Next.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 10: In the “Which type of installation do you want?” window, click the only available option -
Custom (Advanced).

Step 11: In the “Where do you want to install Windows?”, if you’re installing the server on a regular
IDE hard disk, click to select the first disk, usually Disk 0, and click Next.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 13: The installation process will reboot your computer, so, if in step #10 you inserted a floppy
disk (either real or virtual), make sure you remove, as the server will get hanged without the ability
to boot. After the server reboots you’ll be prompted with the new Windows Server 2008 type of login
screen. Press CTRL+ALT+DEL to log in.

Step 14: Click on Other User.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 15: The default Administrator is blank, so just type Administrator and press Enter.

Step 16: You will be prompted to change the user’s password.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 17: In the password changing dialog box, leave the default password blank (duh, read step
#15…), and enter a new, complex, at-least-7-characters-long new password twice.

Government Polytechnic, Porbandar


Page: CN (3340702)

Exercise
Q-1. What is network operating system?
Q-2. List out different NOS.
Q-3. Functionality of NOS?

Government Polytechnic, Porbandar


Page: CN (3340702)

Practical - 6

AIM: Install & Configure File Serve.


THEORY:

A file server provides a central location on your network where you can store and share files with
users across your network. When users require an important file such as a project plan, they can
access the file on the file server instead of having to pass the file between their separate
computers. If your network users will need access to the same files and network accessible
applications, configure this computer as a file server. File servers are commonly found in
enterprise settings, such as company networks, but they are also used in schools, small
organizations, and even home networks.

Installation of a File Server on Windows Server 2008 by Using the Configure Your Server Wizard

1. Click Start, point to Administrative Tools, and then click Configure Your Server Wizard.
2. Click Next two times consecutively.
3. Click File server in the Server role box, and then click Next.
4. On the "File Server Disk Quotas" page, configure any quotas you need to control disk-space
usage on the server, and then click Next.

5. On the "File Server Indexing Service" page, click the indexing configuration that is appropriate
for your server, and then click Next.
6. Click Next.
7. Click Finish.
8. The Share a Folder Wizard starts. Click Next.

Government Polytechnic, Porbandar


Page: CN (3340702)

9. Click Browse, locate the folder that you want to share, and then click OK.

10. Click Next.


11. Type a share name for the folder, and then click Next.
12. Click one of the basic permissions for the folder, or click Customize to set custom permissions
on the folder. Click Finish.
13. Click Close.

Manual Installation of a File Server on Windows Server 2008

1. Click Start, and then click Windows Explorer.


2. Locate the folder that you want to share.
3. Right-click the folder, and then click Sharing and Security.

Government Polytechnic, Porbandar


Page: CN (3340702)

4. Click Share this folder, and then accept the default name or type a different name for the share.

Government Polytechnic, Porbandar


Page: CN (3340702)

5. Optionally, configure the number of users who can connect, configure permissions for this folder,
and then configure the caching options.

6. Click OK.
7. A little hand is displayed in the Windows Explorer window to indicate that the folder is being
shared.

8. Quit Windows Explorer.

Government Polytechnic, Porbandar


Page: CN (3340702)

Exercise
Q-1. What is File Server?
Q-2. Write down the features of File Server.
Q-3. Give the benefits of file server.

Government Polytechnic, Porbandar


Page: CN (3340702)

Practical - 7

AIM: Install & Configure Print Server.


THEORY:

A print server is an application, network device or computer that manages print


requests and makes printer queue status information available to end users and network
administrators. Print servers are used in both large enterprise and small or home office (SOHO)
networks. A print server, or printer server, is a device that connects printer to client computers
over a network. It accepts print jobs from the computers and sends the jobs to the appropriate the
fact that work may arrive more quickly than the printer can actually handle. The ability to inspect
the queue of jobs to be processed, the ability to recorder or delete waiting print jobs, or the ability
to do various kind of accounting(such as counting pages, which may involve reading data
generated by the printer(s)).

Step 1: Launch the Server Manager, and approve the User Account Control prompt when offered.

Step 2: If a "Before You Begin" box is displayed, read and click through it. Likewise, review the
Introduction to Print Services page and click Next to get started.

Step 3: Launch Server Manager from the Start Menu, expand the local server's name, and then
expand the Roles item. If Print Services are already found, then stop. Otherwise right click on Roles
and select Add Roles from the context menu.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 4: Enable the checkbox on Print Services, then click Next. After clicking Next, an “Introduction
to Print Services" dialog is displayed. Review, then click Next on this as well.

Step 5: If only Print Server is required, then check the option of print server only.
LPD is an older UNIX-style printing that's not commonly used in Windows environments. If not sure,
leave unchecked.
The Internet Printing Protocol is likewise not commonly used. If not sure, leave unchecked.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 6: This final dialog confirms what's about to be performed, and though it warns that a system
reboot may be necessary. It didn't require one when we added print services to our server. But
removing the Print Services role did require a restart before any additional role related changes could
be made.

Government Polytechnic, Porbandar


Page: CN (3340702)

Exercise
Q-1. What is Print Server?
Q-2. Write down the features of Print Server.

Government Polytechnic, Porbandar


Page: CN (3340702)

Practical - 8

AIM: Install & Configure Mail Server.


THEORY:

A mail server (also known as a mail transfer agent or MTA, a mail transport agent, a mail router or
an Internet mailer) is an application that receives incoming e-mail from local users (people within
the same domain) and remote senders and forwards outgoing e-mail for delivery. A computer
dedicated to running such applications is also called a mail server. Microsoft Exchange, Gmail,
Exim and send mail are among the more common mail server program.

Types of Mail Servers: -


Mail servers can be broken down into two main categories: outgoing mail servers and incoming mail
servers. Outgoing mail servers are known as SMTP, or Simple Mail Transfer Protocol, servers.
Incoming mail servers come in two main varieties. POP3, or Post Office Protocol, version 3, servers
are best known for storing sent and received messages on PCs' local hard drives. IMAP, or Internet
Message Access Protocol, servers always store copies of messages on servers. Most POP3 servers
can store messages on servers, too, which is a lot more convenient.

The Process of Sending an Email: -


Step 1: After composing a message and hitting send, your email client - whether it's Outlook Express
or Gmail - connects to your domain's SMTP server. This server can be named many things; a standard
example would be smtp.example.com

Step 2: Your email client communicates with the SMTP server, giving it your email address, the
recipient's email address, the message body and any attachments

Step 3: The SMTP server processes the recipient's email address - especially its domain. If the domain
name is the same as the sender's, the message is routed directly over to the domain's POP3 or IMAP
server - no routing between servers is needed. If the domain is different, though, the SMTP server
will have to communicate with the other domain's server.

Step 4: In order To find the recipient's server, the sender's SMTP server has to communicate with the
DNS, or Domain Name Server. The DNS takes the recipient's email domain name and translates it
into an IP address. The sender's SMTP server cannot route an email properly with a domain name
alone; an IP address is a unique number that is assigned to every computer that is connected to the
Internet. By knowing this information, an outgoing mail server can perform its work more efficiently.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 5: Now that the SMTP server has the recipient's IP address, it can connect to its SMTP server.
This isn't usually done directly, though; instead, the message is routed along a series of unrelated
SMTP servers until it arrives at its destination.

Step 6: The recipient's SMTP server scans the incoming message. If it recognizes the domain and the
user name, it forwards the message along to the domain's POP3 or IMAP server. From there, it is
placed in a send mail queue until the recipient's email client allows it to be downloaded. At that point,
the message can be read by the recipient

Step 7: Launch the Server Manager console (type servermanager.mscin the search box and press
Enter), then select Features and click Add features.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 8: Check SMTP server.

Step 9: If you see a prompt like the one in the picture below, click the Add required services button.

Step 10: Click Next.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 11: Ensure that IIS Metabase Compatibility and IIS 6 Management Console are selected and
click Next.

Step 12: Confirm the installation by clicking the Install button.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 13: Once the installation is complete, click Close.

Step 14: Test the server.

Exercise
Q-1. What is Mail Server?
Q-2: Write down the types of mail Server.

Government Polytechnic, Porbandar


Page: CN (3340702)

Q-3. What is full form of SMTP?


Q-4. What is full form of pop3 and IMAP?

Government Polytechnic, Porbandar


Page: CN (3340702)

Practical - 9

AIM: Install & Configure Proxy Server.


THEORY:
A proxy server is a computer that offers a computer network service to allow clients to make
indirect network connections to other network services. A client connects to the proxy server,
then requests a connection, file, or other resource available on a different server. The proxy
provides the resource either by connecting to the specified server or by serving it from a cache.
In some cases, the proxy may alter the client's request or the server's response for various
purposes. Proxy servers have two main purposes:

 Improve Performance: Proxy servers can dramatically improve performance for groups of
users. This is because it saves the results of all requests for a certain amount of time.
Consider the case where both user X and user Y access the World Wide Web through a
proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime
later, user Y requests the same page. Instead of forwarding the request to the Web server
where Page 1 resides, which can be a time-consuming operation, the proxy server simply
returns the Page 1 that it already fetched for user X. Since the proxy server is often on the
same network as the user, this is a much faster operation.
 Filter Requests: Proxy servers can also be used to filter requests. For example, a company
might use a proxy server to prevent its employees from accessing a specific set of Web
sites.

Procedure: Follow the below mentioned steps to configure proxy server.

Step 1: Open Control Panel > Network and Internet > Internet Options. Click the Tools menu in
Internet Explorer and select “Internet Options” to open it. Click the “Connections” tab at the top
of the Internet Options window. Click the “LAN Settings” button at the bottom of the window.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 2: The “Automatically detect settings” option is enabled by default. When this option is enabled,
Windows will attempt to automatically discover a proxy with the Web Proxy AutoDiscovery
Protocol, or WPAD . If no proxy is provided by your network, none will be used. Disable this option
to prevent Windows from using WPAD to automatically configure your proxy settings. The “Use
automatic configuration script” option allows you to enter the address of an automatic proxy
configuration script.

Step 3: The “Use a proxy server for your LAN” checkbox will allow you to manually enable and
configure a proxy. Check it and enter the network address and port of the proxy below.

Step 4: By default, Windows will automatically send all traffic through the proxy, including traffic
to addresses on your local network, or intranet. To always bypass the proxy server when connecting
to these local addresses, enable the “Bypass proxy server for local addresses” checkbox. Applications
will bypass the proxy and connect directly to resources on your local network, but not Internet
addresses.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 5: Click the “Advanced” button under Proxy Server if you want to set a different proxy server
for HTTP, Secure (HTTPS), FTP, and SOCKS protocols. By default, the “Use the same proxy
server for all protocols” box is checked.

Step 6: The Exceptions section allows you to provide a list of addresses Windows will bypass the
proxy for. By default, it only includes *.local . The asterisk here is known as a “wildcard” and
matches everything. This means that any address ending with “.local”, including server.local
and database.local, will be accessed directly.

If you like, you can enter additional addresses. Use a semicolon ( ; ) and a space to separate each
entry in the list. For example, if you also wanted to access gmail.com directly without going through
the proxy, you’d enter:

*.local; gmail.com

When you attempt to connect to gmail.com, Windows would then make a direct connection
to howtogeek.com without going through the proxy server. Click “OK” to save your changes.

Government Polytechnic, Porbandar


Page: CN (3340702)

Exercise

Q-1. What is Proxy Server?


Q-2. Write down the main purpose of Proxy Server.

Government Polytechnic, Porbandar


Page: CN (3340702)

Practical - 10

AIM: Install & Configure Web Server..


THEORY: A web server is computer system that process request via HTTP, the basic network
protocol used to distributed information on the World Wide Web. The term can be refer to the entire
system or specifically to the software that accepts and supervises the HTTP requests.

A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that form
Web Pages to users, in response to their request, which are forwarded by their computers’ HTTP
clients. Dedicated computers and appliances may be referred to as Web server as well.

Web servers are computers that deliver (serves up) Web pages. Every Web server has an IP address
and possibly a domain name. For example, if you enter the URL
http://www.pcwebopedia.com/index.html in your browser, this sends a request to the Web server
whose domain name ispcwebopedia.com. The server then fetches the page named index.html and
sends it to your browser.

PROCEDURE:

Step 1: Click Start, point to Control Panel and click Add or Remove Programs.

Step 2: Click the Add/Remove Windows Components button in the Add or Remove Programs

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 3: On the Windows Components window, click on the Application Server entry and click the
Details button.

Step 4: On the Application Server page, click on the Internet Information Services (IIS) entry and
click the Details button

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 5: In the Internet Information Service (IIS) dialog box, put a check mark in the World Wide
Web Service check box and click OK.

Step 6: Click OK on the Application Server dialog box.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 7: Click Next on the Windows Components dialog box.

Step 8: IIS Server Installation in progress

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 9: Click Finish on the Completing the Windows Components Wizard page.

Exercise
Q-1. What is Web Server?
Q-2. Write down the functionality of web Server.
Q-3. What is full form of IIS?

Government Polytechnic, Porbandar


Page: CN (3340702)

Government Polytechnic, Porbandar


Page: CN (3340702)

Practical - 11

AIM: Install & Test REPEATER, ROUTER and BRIDGES.


THEORY:

Bridges:
A bridge is a device that connects two or more local area networks, or two or more segments of the
same network. For example, suppose that your network includes both 10BaseT Ethernet and Local
Talk connections. You can use a bridge to connect these two networks so that they can share
information with each other.
Bridges perform an additional, important function; they filter information so that network traffic
intended for one portion of the network does not congest the rest of the network. Bridges may consist
either of standalone hardware devices or of software running on a client or server.
When bridges were introduced in the 1980’s, they typically joined two homogeneous
networks (for example, two kinds of Ethernet networks). More recently it has become possible for
bridges to connect networks with different physical and data link level protocols. For example, you
can use a bridge to connect a Local Talk network to an Ethernet network, or an Ethernet network to
a Token Ring network.
Like switches, bridges learn the MAC addresses of all connected clients, servers, and peripherals,
and associate each address with a bridge port (network connection). When a bridge (or switch)
receives an incoming frame, it opens and reads its destination MAC address.
If the port that will receive the frame is different from the port connected to the sender, then the
bridge forwards the frame to the destination port. If the port that will receive the frame is the same as
the port connected to the sender, the bridge drops the frame. If the bridge cannot determine which
port is associated with a destination address, it passes the frame along to all ports.

Types of Bridges:

1. Simple Bridge
2. Multiport bridge
3. Transparent Bridge

1. Simple Bridge:

A simple bridge is the most primitive and least expensive types of bridge links two segments.it
contents a table that lists the physical addresses of all the stations connected with the bridge. In this
bridge, physical addresses must be entered manually that makes them primitive. Before a simple
Bridge can be used, an operator enters the addresses of every station.

2. Multiport bridge:

Multiport bridge can be used to connect more than two LANs. In this bridge tree tables are created,
each one holding the physical address of stations reachable trough the corresponding port.

3. Transparent bridge

Transport Bridge builds its table of physical station addresses on its own as it performs its bridge
functions. Table is automatically built by frame movements in the network When Transparent Bridge
is first installed, its table is empty. When it receives packet it looks at source & destination address.
Destination address is used for forwarding decision to the particular segments. Source address is used

Government Polytechnic, Porbandar


Page: CN (3340702)

for adding entries to the table for updating table. As it read source address it notes which side the
packet came from and the segment to which it belongs. It checks destination address to decide where
to send packet. If it is not inside table, it stands the packet to all of the station on both segments
excepting sender station. The first packet transmitted by each station, the bridge makes entries inside
the table with corresponding segment. So, at last table is completed with all station addresses and
segment. Next packet send by each station refers the table entry.
Transparent bridge has self-updating feature. Suppose two devices exchanging their place. Now its
entry, inside the table for segment is wrong, because both devices are now replacing their segment,
but this bridge updating its table automatically. Bridge is constantly checking source address of
received. So, it updates entry for devices according to the change.

Routers:
Like bridges, routers are devices whose primary purpose is to connect two or more networks and to
filter network signals so that only desired information travels between them. For example, routers are
often used to regulate the flow of information between school networks and the Internet.
However, routers can inspect a good deal more information than bridges, and they therefore can
regulate network traffic more precisely. They also have another important capability: they are
aware of many possible paths across the network and can choose the best one for each data packet to
travel
Based on complex, internal tables of network information that it compiles, a router then determines
whether or not it knows how to forward the data packet towards its destination. If the router has been
configured with sufficient information to know which of its ports is en route to the destination, it
transmits the packet.

Government Polytechnic, Porbandar


Page: CN (3340702)

Types of Routers:
1. Static Router
2. Dynamic Router
1) Static Router:
Routing table Information’s are entered manually .means the administrator enters the route for each
destination into the table. It cannot update automatically when there is a change (shutdown of router
or breaking of link or some fault in connection) in the internet. It is more secure. It is always use the
same route.
2) Dynamic router:
Routing table is created automatically. Table is updated using one of the dynamic routing protocols
whenever there is a change (Shutdown of router or breaking of a link or some fault in connection) In
the Internet.

Repeaters:
In telecommunications, a repeater is an electronic device that receives a signal and retransmits it.
Repeaters are used to extend transmissions so that the signal can cover longer distances or be received
on the other side of an obstruction.

There are several different types of repeaters; a telephone repeater is an amplifier in a telephone line,
an optical repeater is an optoelectronic circuit that amplifies the light beam in an optical fiber cable;
and a radio repeater is a radio receiver and transmitter that retransmit a radio signal.

A broadcast relay station is a repeater used in broadcast radio and television

Government Polytechnic, Porbandar


Page: CN (3340702)

Exercise
Q-1. Defines: Repeater, router, bridge.
Q-2. How does repeater extend the length of LAN?
Q-3. Explain types of router.
Q-4. Differentiate bridge v/s router.
Q-5. True or False.
1. Repeater works at network, data link and presentation layer.
2. Router works at network and data link layers.
3. Bridges works at physical layer.

Government Polytechnic, Porbandar


Page: CN (3340702)

Government Polytechnic, Porbandar


Page: CN (3340702)

Practical - 12

AIM: Install a small wireless network using access points.


ACCESSING INTERBET USING WIRELESS ACCESS POINT

Now the following procedure will explain how to configure router/modem as a wireless access
Point.

PROCEDURE:

Step 1: Connect your computer to a second LAN port on your router using an Ethernet cable. Login
to the router web interface through the IP address listed on the label on the bottom of your router.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 2: Now , the following steps will guide you how to login into your router administration page -
---

Choose your connection type (Wired or Wireless)

Step a = If Wireless, connect to your TP-Link wireless network.

Step b = If Wired connect your Ethernet cable to one of the four yellow ports on the back of your TP-
Link router.

Step 3: Open a web browser (i.e Safari, Google Chrome or Internet Explorer). At the top of the
window in the address bar, type in one of the following 192.168.1.1, 192.168.0.1.

Step 4: Type the username and password in the login page. The default username and password For
TP-Link devices is admin. Enter your own username and password instead of admin if you already
changed it.

All letters for both username and password will be lower case.
BY DEFAULT THE USERNAME AND PASSWORD WILL BE ADMIN.

Step 5: Go to Network>LAN on the side menu and change the LAN IP address of your TP-Link N
router to an IP address on the same segment of the main router. This IP address should be outside the
main router’s DHCP range.

Example: if your DHCP is 192.168.2.100 - 192.168.2.199 then you can set the IP to 192.168.2.11

Step 6: Go to Wireless>Wireless Settings and configure the SSID (Network name), which can be the
same or different from the main router’s. Select Save.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 7: Go to Wireless >Wireless Security and configure the wireless security. WPA/WPA2-Personal
is recommended as the most secure option. Once configured, click Save.

Step 8: Go to DHCP>DHCP Settings and select Disable the DHCP Server. Select Save.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 9: Go to System Tools>Reboot and select Reboot to reboot the device.

Step 10: Use an Ethernet cable to connect the main router to your router through their LAN ports
(any LAN ports may be used). All other LAN ports on your router will now grant devices Internet
access. Alternatively, any Wi-Fi device can now access the Internet through your router by using the
SSID and Password set up in the above steps.
Exercise
Q-1. What is access point?
Q-2. Define the functionality of Access point.

Government Polytechnic, Porbandar


Page: CN (3340702)

Government Polytechnic, Porbandar


Page: CN (3340702)

Practical - 13

AIM: Set, Configure & Test Internet.


THEORY:

Not confining itself to any particular definition, the Internet can be defined as the wired or
wireless mode of communication through which one can receive, transmit information that can
be used for single or multiple operations.

The Internet is a broadcast medium for the every person. Anyone can use the Internet. As long as
you have a computer, cell phone, or other internet-enabled device, you simply find a free or paid
place to connect. Once you are connected (sometimes called 'logged on'), you can broadcast and
receive all kinds of signals.

The Internet is named for "interconnection of computer networks". It is a massive hardware


combination of millions of personal, business, and governmental computers, all connected like
roads and highways. The Internet started in the 1960's under the original name "ARPAnet".
ARPAnet was originally an experiment in how the US military could maintain communications
in case of a possible nuclear strike. With time, ARPAnet became a civilian experiment,
connecting university mainframe computers for academic purposes. As personal computers
became more mainstream in the 1980's and 1990's, the Internet grew exponentially as more users
plugged their computers into the massive network. Today, the Internet has grown into a public
spider web(WWW) of millions of personal, government, and commercial computers, all
connected by cables and by wireless signals.

Step 1: Attach NIC card to PCI slot of your motherboard & switch on the CPU.

Step 2: Go to run & type devmgmt.msc & check Network Adapter.

Government Polytechnic, Porbandar


Page: CN (3340702)

Step 3: Check if Network Adapter is present or not.

Step 4: Configure a LAN Connection

1) First, go to the start menu and into Control Panel

Government Polytechnic, Porbandar


Page: CN (3340702)

2) Once in Control Panel, if you are in Category view find and double click on Network and Sharing
Center.

3) Now that you are in Network and Sharing Center, click on the "Change adapter settings" link on
the left.

Government Polytechnic, Porbandar


Page: CN (3340702)

4) In the Change adapter settings screen, find and right click on your Local Area Connection, Left
click on Properties.

5) In the Local Area Connection Properties window, highlight Internet Protocol Version 4
(TCP/IPv4), and click on the Properties button.

Government Polytechnic, Porbandar


Page: CN (3340702)

6) In the Internet Protocol Version4 (TCP/IPv4) Properties window, you will need to select "Use the
following IP address”. You will see the below windows screen.

Government Polytechnic, Porbandar


Page: CN (3340702)

7) Now enter the Ip address & DNS server values as below:-

After entering the IP address check the "subnet mask" has been filled in automatically.

8) Next fill in the Default Gateway; this is the address of the Router or Gateway Device you are using
to access the internet. This information can be found by checking your current (unchanged) config.
Enter in the corresponding settings per the section.

Government Polytechnic, Porbandar


Page: CN (3340702)

9) Once the settings have been entered in, click ok on the Internet Protocol Version 4 (TCP/IPv4)
Properties window, and then click on close on the Local Area Connections properties window.

Restart your Pc. Below given Windows screen will be seen.

Government Polytechnic, Porbandar


Page: CN (3340702)

At this point the Local Area Connection is said as connected. Now browse to a web site using a
Browser. If you are able to, your setup is complete. If you are not able to browse, call us here at ISP
support, so they can verify your settings are correct.

Exercise
Q-1. What is Internet?
Q-2. What are the Functionalities of Internet?
Q-3. What are LAN Cables?
Q-4. What is IP?
Q-5. What is NIC?

Government Polytechnic, Porbandar


Page: CN (3340702)

Q-6. How is the speed of your Internet connection measured?


a. ROM
b. Megahertz
c. Kilobits and megabits per second
d. RAM

Government Polytechnic, Porbandar


Page: CN (3340702)

Government Polytechnic, Porbandar

You might also like