IMTCN LAB FILE
Department Of Computer Science Engineering
Practical-1
Aim: - Installation
of modems and start-up a new internet connection in a standalone machine.
Modem: -
A modem is a Modulator- Demodulator device or program that
enables a computer to transmit data over, for example, telephone or cable
lines. Computer information is stored digitally, whereas information
transmitted over telephone lines is transmitted in the form of analogue waves.
Installation of modem:-
1. Remove
your old modem. Remember to uninstall any drivers associated with your old modem and
reset your computer after doing so. Also, keep the cables since you might need
them for your new modem.

2. Read the
instructions. While this article can give you the basic steps for setting up your
modem, every modem is different. Be sure to carefully read your instructions
and follow the steps exactly to reduce headaches later.
3. Set
the modem up. Place the modem in a location with good air circulation and away from
other devices that may interfere with signals. Follow the instructions provided
to connect the modem to the Cable or DSL line in your house.

4. Power the modem on. Once
you’ve connected the modem to the service source, power it on by plugging it on
and pressing the power button (if applicable).

5. Connect your computer to the
modem. Using an Ethernet cable, connect your computer to the internet or
WAN port on the back of the modem. This will connect your computer directly to
the internet.

6.
Start the activation process. Depending on your modem and service provider,
you may need to run a setup program before you use the modem.
New
Internet connection in a Stand-alone machine.
1.
Wire the Network:-
The RMC75E and RMC150E use the IEEE 802.3 100BaseT hardware standard. This means it runs at 100Mbaud on twisted pair wiring rated Category 5 or higher, and uses RJ45 connectors. Twisted pair networks generally use a star topology, which means that each device is wired to a single switch device.
The RMC75E and RMC150E use the IEEE 802.3 100BaseT hardware standard. This means it runs at 100Mbaud on twisted pair wiring rated Category 5 or higher, and uses RJ45 connectors. Twisted pair networks generally use a star topology, which means that each device is wired to a single switch device.
2. Select
a network address and subnet mask.
By convention, the address ranges below are intended to be used for private networks. An address from these ranges is a good choice for the network address of a stand-alone control network.
By convention, the address ranges below are intended to be used for private networks. An address from these ranges is a good choice for the network address of a stand-alone control network.
·
10.0.0.0 -
10.255.255.255
·
172.16.0.0-172.31.255.255
·
192.168.0.0 -
192.168.255.255
3. Assign local addresses for each device.
The IP address range from step 2 provides 254 IP addresses that can be assigned to the network devices. When assigning addresses, ensure that all devices have unique address. To avoid assigning the same IP address twice, record the IP address assignments for use later when you need to add or replace device.
The IP address range from step 2 provides 254 IP addresses that can be assigned to the network devices. When assigning addresses, ensure that all devices have unique address. To avoid assigning the same IP address twice, record the IP address assignments for use later when you need to add or replace device.
4.
Enter the network parameters into each
device.
The method of assigning the network parameters varies for each type of device. Use the IP address you have assigned, a subnet mask of 255.255.255.0, and leave the default gateway blank for each device.
The method of assigning the network parameters varies for each type of device. Use the IP address you have assigned, a subnet mask of 255.255.255.0, and leave the default gateway blank for each device.
Practical -2
Aim:
- Sharing of internet by VPN (Virtual Private Network).
VPN:
- A VPN or Virtual Private Network is a method
used to add security and privacy to private and public networks, like Wi-Fi
Hotspots and the Internet. VPNs are most often used by corporations to
protect sensitive data.

1. Make
sure your computer is connected to your VPN service via the providers client.
2.
Connect your media device to the PC using an Ethernet cable 3. Open the
Network and Sharing Centre on the PC (Start -> Control Panel -> Network
and Sharing Center) and click ‘Change adapter settings’.

4. Find
your VPN connection. OpenVPN connections usually aren’t be clearly
labelled, so look for one with the description ‘TAP-Win32 Adaptor V9′ (or
similar). Right-click on it and select ‘Properties’ from the drop down.

5. Select
the ‘Sharing’ tab, and check the ‘Allow other network users to connect through
this computer’s internet connection’ box. Then, from the dropdown menu choose
’Local Area Connection’

6.
Restart your media device and computer and it should work perfectly.
Practical -3
Aim:
- Study of troubleshooting and maintenance of computer system.
Troubleshooting: - Troubleshooting is a
systematic approach to problem solving that is often used to find and correct
issues with complex machines, electronics, computers and software systems..

Problem: Power button
will not start computer:-
Solution1:- Checking the
power card to conform that it is plugged securely into the back of computer
case and the power outlet.
Solution2:- To check your outlet, you can plug in another
electrical device, such as a lamp.
Solution3:- Reset the surge
protector by turning it off and then back on. You can also plug a lamp or other
device into the surge protector to verify that it’s working correctly.

Problem:- An application is
running slowly.
Solution1:- Close and reopen the application.
Solution2:- Update the application.

Problem:- An application is
frozen
Sometimes an application may become struck, frozen. When this
happens, you won’t be able to close the windows or click any buttons within the
application.
Solution1:- Force quit the application. On a PC, you press
(and hold) CTRL+ALT+Delete.

Solution2:- Restart the computer. If you are unable to force
quit an application, restarting your computer will close all open apps.
Problem:- All programs on
the computer run slowly
Solution1:- Run a virus scanned.
Solution2:- Try Deleting any files or programs you don’t need.
Solution3:- Run a Disc
Cleanup
Solution4:- Delete Temp file(Win+R)
Problem:- The computer is
frozen
Sometimes your computer may become completely unresponsive,
or frozen. When this happens, you won’t be able to click anywhere on the
screen, open or close application, or access shut-down options.

Solution 1:- (Windows only): Restart windows explorer. Press
and hold Ctrl+Alt+Delete, Open Task Manager. Select windows Explorer from the
processes tab and click Restart.
Solution 2 :- Press
and hold the power button for 5 to 10 second to force the computer to shut
down.
Solution 3:- If the computer still won’t shut down, you can
unplug the power cable from the electrical outlet. If you’re using a laptop you
may be able to remove to battery to force the computer to turn off.
Problem:- The mouse or
keyboard has stopped working.
Solution 1 :- If you’re using a wired mouse or keyboard, make
sure it’s correctly plugged into the computer.
Solution 2:- If you’re using a wired mouse or keyboard, make
sure it’s turned on and that its batteries are charged.
Problem:- The screen is
blank
Solution 1:- The Computer may be Sleep mode. Click The mouse
or press any key on the keyboard to wake it.
Solution 2:- Make sure the monitor is plugged in and turned
on.
Solution 3:- Make sure the computer is plugged in and turned
on.
Problem:- Can’t Connect to
the Network
Solution 1:- Is the blue network cable plugged in tightly at
both ends?
Solution 2:- A problem with the cable or the wall port.
Solution 3:- Is Your Wi-Fi on the Computer turned On.
Solution 4:- Try Another access point in the room.
Problem:- Login Issues
Solution 1 :- Are you typing Username and password Correctly
Solution 2:- Are CAPS LOCK or NUM LOCK ON Turn Them Off.
Solution 3 :- Make sure the login Boxes are empty –Especially
in The Lab the kids like to put the space in the username Box –Which are
Invisible.

Practical -4
Aim:-
Installation and study of ISDN, PSTN Lines, V-Sat, RF-Link.
ISDN: ISDN (Integrated Services Digital
Network) is a set of communication standards for simultaneous
digital transmission of voice, video, data, and other network services over the
traditional circuits of the public switched telephone network.
ISDN was designed to run on digital telephone systems that were
already in place. As such, it meets telecom's digital voice network
specifications. However, it took so long for ISDN to be standardized that it
was never fully deployed in the telecommunications networks it was intended
for.

PSTN: The PSTN
(public switched telephone network) is
the aggregate of the world's circuit-switched telephone networks that are
operated by national, regional, or local telephone operators, providing
infrastructure and services for public telecommunication.
Today, as Smartphone’s and mobile devices
continue to proliferate, wireless telecom networks are taking up market share
and PSTN landline technology is diminishing. In some places, less
industrialized communities have skipped directly from underserved or
insufficient public switched telephone network architecture directly to the use
of cell phones and mobile devices.

V-Sat: VSAT (Very Small Aperture Terminal) is a satellite communications system that serves home
and business users. A VSAT end user needs a box that interfaces
between the user's computer and an outside antenna with a transceiver. The
transceiver receives or sends a signal to a satellite transponder in the sky.
A VSAT transmits narrow and broadband signals
to orbital satellites. The data from the satellites is then transmitted to
different hubs in other locations around the globate. For one VSAT user to
communicate with another, the data has to be sent to the satellite. Then the
satellite sends the data to the hub station for further processing. The data is
then retransmitted to the other user via a satellite.

RF-Link: RF (Radio frequency) is any of the electromagnetic
wave frequencies that lie in the range extending from around 3 kHz to 300 GHz,
which include those frequencies used for communications or radar signals. RF usually refers to electrical rather
than mechanical oscillations. This is the frequency band that is used for
communications transmission and broadcasting. Although RF really stands for the
rate of oscillation of the waves, it is synonymous to the term
"radio," or simply wireless communication.
Radio frequency is being used in a lot of
fields, but in the context of information and communications technology it
refers to the frequency band at which wireless telecommunications signals are
being transmitted and broadcast. The frequency band is being divided into
different parts, which are then assigned to different technology industries.
This is known as the radio spectrum. Example Like used by mobile phones,
wireless LAN, Bluetooth, and TV and land radio.

Practical -5
Aim:- Study of BNC, RJ-45 connectors.
BNC:
BNC (Bayonet Neill Concelman) connector, a BNC connector is a
type of connector used with coaxial Ethernet cable. The connector is bayonet-style, meaning that it is put
in then turned and locked in position. This connector is commonly used on a Ring
network. BNC is also short for Bayonet Nut Connector; A BNC connector connects various radio
frequencies up to 3GHz and voltages under 500V DC and is used in electronic
architectures such as audio, video and networking.
BNC
also used for many types of signal connections like:
- Serial
digital interface and analog signals
- High-tech
video networks
- Amateur
radio antenna connections
- Electronic
test equipment
- Aviation
electronics or avionics

RJ-45: RJ45 is a type of connector commonly used for
Ethernet networking. ... Since Ethernet cables have an RJ45 connector on each end, Ethernet cables
are sometimes also called RJ45 cables. The "RJ" in RJ45 stands for "registered
jack," since it is a standardized networking interface.

Registered jack-45 (RJ45) is an
eight-wire connector used to connect computers on local area networks. An RJ45
cable is primarily used to connect devices over an Ethernet connection. For
example, computers, printers, network storage devices, and cable or DSL modems,
are some devices capable of using an RJ45 connection. Being able to identify an
RJ45 cable is important when attempting to connect devices to a network.
Straight Cable : The most common wiring for
RJ45 cables is the straight through cable. In this cable layout, all pins are
wired one-to-one to the other side. The pins on the RJ45 connector are assigned
in pairs, and every pair carries one differential signal. Each line pair has to
be twisted. If UTP or FTP cable is used, the pairs have orange, brown, blue and
green colors.
Cross Cable: An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices
together directly. It is most often used to connect two devices of the same
type: e.g. two computers (via network interface controller) or two switches to
each other.

Practical -06
Aim:-Study of cables and
their connection structure (i.e. simple or cross cable (colour coding of
cables).
In order for the communication to
take place, cables play important role. Cable is the medium through which
information usually moves from one network device to another. There are several
types of cable which are commonly used with LANs. The type of cable chosen for
a network is related to the network's topology, protocol, and size.
There are various types of cables used in networks as follows.
There are various types of cables used in networks as follows.
- Unshielded Twisted Pair (UTP)
Cable
- Shielded Twisted Pair (STP)
Cable
- Coaxial Cable
- Fibre Optic Cable
Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted together for the purposes of cancelling out electromagnetic interference (EMI) from external sources; for instance, electromagnetic radiation from unshielded twisted pair (UTP) cables, and crosstalk between neighboring pairs. In balanced pair operation, the two wires carry equal and opposite signals and the destination detects the difference between the two. This is known as differential mode transmission. Noise sources introduce signals into the wires by coupling of electric or magnetic fields and tend to couple to both wires equally. The noise thus produces a common-mode signal which is cancelled at the receiver when the difference signal is taken.
Categories Of UTP Cable:
It has been categorized into three categories based on the equipment that are being connected through these wires.
i. Straight Through Cable
ii. Cross Over Cable
Straight Through Cable:
Straight through cables are used to connect different devices like Switch to PC. Switch to Router. Router to Switch etc. Straight-through cables are used when each end of the communication transmits and receives on different pairs.
Straight cable colour code:-
White Orange White
Orange
Orange
Orange
Green White Green White
Blue
Blue
White Blue White Blue
Green
Green
White Brown White Brown
Cross Over Cable:
In a cross over the cable, the send and receive
wires are "crossed over", meaning the wires are opposite on each end.
This allows two PCs to talk to each other, has it connects the send of one
computer to the receive of the other. Hence, the cross over cables are used to
connect similar devices like PC to PC , Router to Router, Switch to Switch, Hub
to Hub etc.
Cross cable colour code:Party Party
White Green White Orange
Green Orange
White Orange White Green
Blue Blue
White Blue White Blue
Orange Green
White Brown White Brown
Practical -07
Aim:- Study and
management of network resources.
Switch:-
A
network switch (also called switching hub, bridging hub, officially MAC
bridge]) is a computer networking device that connects devices together on a
computer network by using packet switching to receive, process, and forward
data to the destination device. Unlike less advanced network hubs, a network
switch forwards data only to one or multiple devices that need to receive it,
rather than broadcasting the same data out of each of its ports. A network
switch is a multiport network bridge that uses hardware addresses to process
and forward data at the data link layer (layer 2) of the OSI model.

Router:-
A
router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. A
data packet is typically forwarded from one router to another router through
the networks that constitute the internetwork until it reaches its destination
node. A router is connected to two or more data lines from different networks.
When a data packet comes in on one of the lines, the router reads the address
information in the packet to determine the ultimate destination. Then, using
information in its routing table or routing policy

Hub:-
A Hub is a networking device
which receives signal from the source, amplifies it and send it to
multiple destinations or computers. If you ever some across subject 'Computer
Networking' then you must heard this word. Sometimes, hubs are also called
Ethernet Hub, Repeater Hub, Active Hub and Network Hub. Basically it is a
networking device which is used multiple devices like Computers, Servers etc to
each other and make them work as a single network segment. Hubs are used in
'Physical Layer' of OSI Model.
Recommended For You: Peer to Peer Networking Model
Recommended For You: Peer to Peer Networking Model
Types of Hub:-On the basis of its working methods, the Hubs can be divided into three types, given as:
·
Active
Hub
·
Passive
Hub
·
Intelligent
Hub
Active
Hub: As its name suggests, Active Hub is a hub
which can amplify or regenerate the information signal. This type of bus has an
advantage as it also amplifies the incoming signal as well as forwards it to
multiple devices. This Bus is also known as Multiport Repeater. It can upgrade
the properties if incoming signal before sending them to destination.
Passive Hub: Passive Hub works like a simple Bridge. It
is used for just creating a connection between various devices. It does not
have the ability to amplify or regenerate any incoming signal. It receives
signal and then forward it to multiple devices.
Intelligent Hub: This is the third and last type of Bus. It
can perform tasks of both Active and Passive buses. Also, it can perform some
other tasks like Bridging and routing. It increases the speed and effectiveness
of total network thus makes the performance of whole network fast and
efficient.

Installing Config Server
Firewall
Step
1: Downloading
Config Server Firewall is not currently available in Debian
or Ubuntu repositories, and has to be downloaded from the ConfigServer's
website.
Step
2: Uncompressing
The downloaded file is a compressed from of tar package,
and has to be uncompressed and extracted before it can be used.
tar -xzf csf.tgz
Step
3: Installing
If you are using another firewall configuration scripts,
such as UFW, you should disable it before proceeding. Ip tables rules are
automatically removed.
Practical – 8
Aim: - Study and Installation of Firewall in your
system.
A firewall is a network
security system designed to prevent unauthorized access to or
from a private network. You can implement a firewall in either hardware or software form,
or a combination of both. Firewalls prevent unauthorized Internet users
from accessing private networks connected to the Internet, especially
intranets.

Software firewalls
Software
firewalls are designed to protect a computer by blocking certain programs from
sending and receiving information from a local network or the Internet. The
image to the right shows the icon for Windows Firewall, an example of a
firewall software program.
Hardware firewalls
Hardware firewalls
are found on most network routers and can be configured through the router setup
screen. The image at the top of this page shows the ZyXEL ZyWALL, which is a Unified Security
Gateway with a firewall and other security features.
Types of firewall
Network layer firewalls
Network
layer firewalls generally make their decisions based on the source address,
destination address and ports in
individual IP packets. A simple router is the
traditional network layer firewall, since it is not able to make particularly
complicated decisions about what a packet is actually talking to or where it actually came from.
Application layer firewalls
Application layer firewalls are hosts that run proxy servers,
which permit no traffic directly between networks, and they perform elaborate
logging and examination of traffic passing through them. Since proxy
applications are simply software running on the firewall, it is a good place to
do logging and access control.
Proxy firewalls
Proxy firewalls offer more security
than other types of firewalls, but at the expense of speed and functionality,
as they can limit which applications the network supports. Proxy comprehensive, protocol-aware security
analysis for the protocols they support. This allows them to make better security decisions than products that focus purely
on packet header information.
Installation of Firewall:-
1.
From the
Windows10 desktop, click Start,
and then click Control Panel.
2.
In Control
Panel, click Windows
Firewall.

3. In Windows Security Center, under Manage
security settings for, click Turn Windows Firewall.
4.
Click On
Turn On Windows Firewall

No comments:
Post a Comment