i sharing tech news and software info and website design development tips and trick, computer tips and many more

  • Breaking News

    Welcome to RazLove Blog, You Want to Earn Money Online Go https://fast2way.com/

    Thursday, 13 April 2017

                                IMTCN LAB FILE 

                                     Department Of Computer Science Engineering


    Practical-1
    Aim: - Installation of modems and start-up a new internet connection in a                     standalone machine.
    Modem: - A modem is a Modulator- Demodulator device or program that enables a computer to transmit data over, for example, telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analogue waves.

                                            
    Installation of modem:-
    1.      Remove your old modem. Remember to uninstall any drivers associated with your old modem and reset your computer after doing so. Also, keep the cables since you might need them for your new modem.
    Image titled Install a New Modem Step 5
                                   http://pad2.whstatic.com/images/thumb/5/51/Install-a-New-Modem-Step-5.jpg/aid1679-900px-Install-a-New-Modem-Step-5.jpg


    2.      Read the instructions. While this article can give you the basic steps for setting up your modem, every modem is different. Be sure to carefully read your instructions and follow the steps exactly to reduce headaches later.


    3. Set the modem up. Place the modem in a location with good air circulation and away from other devices that may interfere with signals. Follow the instructions provided to connect the modem to the Cable or DSL line in your house.
                   http://pad1.whstatic.com/images/thumb/9/94/Install-a-New-Modem-Step-7.jpg/aid1679-900px-Install-a-New-Modem-Step-7.jpg
    4. Power the modem on. Once you’ve connected the modem to the service source, power it on by plugging it on and pressing the power button (if applicable).
                                   http://pad2.whstatic.com/images/thumb/0/06/1679-7.jpg/aid1679-900px-1679-7.jpg
    5. Connect your computer to the modem. Using an Ethernet cable, connect your computer to the internet or WAN port on the back of the modem. This will connect your computer directly to the internet.


    http://pad3.whstatic.com/images/thumb/f/fb/1679-8.jpg/aid1679-900px-1679-8.jpg

    6. Start the activation process. Depending on your modem and service provider, you may need to run a setup program before you use the modem.

    New Internet connection in a Stand-alone machine.
    1.     Wire the Network:-
    The RMC75E and RMC150E use the IEEE 802.3 100BaseT hardware standard.  This means it runs at 100Mbaud on twisted pair wiring rated Category 5 or higher, and uses RJ45 connectors. Twisted pair networks generally use a star topology, which means that each device is wired to a single switch device.
    2.      Select a network address and subnet mask.
    By convention, the address ranges below are intended to be used for private networks. An address from these ranges is a good choice for the network address of a stand-alone control network.
    ·         10.0.0.0 - 10.255.255.255
    ·         172.16.0.0-172.31.255.255
    ·         192.168.0.0 - 192.168.255.255

    3.      Assign local addresses for each device.
    The IP address range from step 2 provides 254 IP addresses that can be assigned to the network devices. When assigning addresses, ensure that all devices have unique address. To avoid assigning the same IP address twice, record the IP address assignments for use later when you need to add or replace device.

    4.      Enter the network parameters into each device.
    The method of assigning the network parameters varies for each type of device. Use the IP address you have assigned, a subnet mask of 255.255.255.0, and leave the default gateway blank for each device.





    Practical -2
    Aim: - Sharing of internet by VPN (Virtual Private Network).
    VPN: - A VPN or Virtual Private Network is a method used to add security and privacy to private and public networks, like Wi-Fi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data.
    IC195069.gif
    1. Make sure your computer is connected to your VPN service via the providers client.
    2. Connect your media device to the PC using an Ethernet cable 3. Open the Network and Sharing Centre on the PC (Start -> Control Panel -> Network and Sharing Center) and click ‘Change adapter settings’.
    windows-5.png
    4. Find your VPN connection. OpenVPN connections usually aren’t be clearly labelled, so look for one with the description ‘TAP-Win32 Adaptor V9′ (or similar). Right-click on it and select ‘Properties’ from the drop down.
    windows-6.png
    5. Select the ‘Sharing’ tab, and check the ‘Allow other network users to connect through this computer’s internet connection’ box. Then, from the dropdown menu choose ’Local Area Connection’
    windows-7.png
    6. Restart your media device and computer and it should work perfectly.
    Practical -3
    Aim: - Study of troubleshooting and maintenance of computer system.
    Troubleshooting: - Troubleshooting is a systematic approach to problem solving that is often used to find and correct issues with complex machines, electronics, computers and software systems..
    boot-flowchart.gif
    Problem: Power button will not start computer:-
    Solution1:- Checking the power card to conform that it is plugged securely into the back of computer case and the power outlet.
    Solution2:-  To check your outlet, you can plug in another electrical device, such as a lamp.
    Solution3:- Reset the surge protector by turning it off and then back on. You can also plug a lamp or other device into the surge protector to verify that it’s working correctly.
    resetting a surge protector
    Problem:- An application is running slowly.
    Solution1:- Close and reopen the application.
    Solution2:- Update the application.
    Checking for updates
    Problem:- An application is frozen
    Sometimes an application may become struck, frozen. When this happens, you won’t be able to close the windows or click any buttons within the application.
    Solution1:- Force quit the application. On a PC, you press (and hold) CTRL+ALT+Delete.
    screenshot of Windows 8
    Solution2:- Restart the computer. If you are unable to force quit an application, restarting your computer will close all open apps.
    Problem:- All programs on the computer run slowly
    Solution1:- Run a virus scanned.
    Solution2:- Try Deleting any files or programs you don’t  need.
    Solution3:-  Run a Disc Cleanup
    Solution4:- Delete Temp file(Win+R)
    Problem:- The computer is frozen
    Sometimes your computer may become completely unresponsive, or frozen. When this happens, you won’t be able to click anywhere on the screen, open or close application, or access shut-down options.
    screenshot of Windows 8
    Solution 1:- (Windows only): Restart windows explorer. Press and hold Ctrl+Alt+Delete, Open Task Manager. Select windows Explorer from the processes tab and click Restart.
    Solution 2 :-  Press and hold the power button for 5 to 10 second to force the computer to shut down.
    Solution 3:- If the computer still won’t shut down, you can unplug the power cable from the electrical outlet. If you’re using a laptop you may be able to remove to battery to force the computer to turn off.
    Problem:- The mouse or keyboard has stopped working.
    Solution 1 :- If you’re using a wired mouse or keyboard, make sure it’s correctly plugged into the computer.
    Solution 2:- If you’re using a wired mouse or keyboard, make sure it’s turned on and that its batteries are charged.
    Problem:- The screen is blank
    Solution 1:- The Computer may be Sleep mode. Click The mouse or press any key on the keyboard to wake it.
    Solution 2:- Make sure the monitor is plugged in and turned on.
    Solution 3:- Make sure the computer is plugged in and turned on.

    Problem:- Can’t Connect to the Network
    Solution 1:- Is the blue network cable plugged in tightly at both ends?
    Solution 2:- A problem with the cable or the wall port.
    Solution 3:- Is Your Wi-Fi on the Computer turned On.
    Solution 4:- Try Another access point in the room.

     Problem:- Login Issues
    Solution 1 :- Are you typing Username and password Correctly
    Solution 2:- Are CAPS LOCK or NUM  LOCK ON Turn Them Off.
    Solution 3 :- Make sure the login Boxes are empty –Especially in The Lab the kids like to put the space in the username Box –Which are Invisible.
    Image result for computer login











    Practical -4
    Aim:- Installation and study of ISDN, PSTN Lines, V-Sat, RF-Link.
    ISDN: ISDN (Integrated Services Digital Network) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.
    ISDN was designed to run on digital telephone systems that were already in place. As such, it meets telecom's digital voice network specifications. However, it took so long for ISDN to be standardized that it was never fully deployed in the telecommunications networks it was intended for.

    PSTN: The PSTN (public switched telephone network) is the aggregate of the world's circuit-switched telephone networks that are operated by national, regional, or local telephone operators, providing infrastructure and services for public telecommunication.
    Today, as Smartphone’s and mobile devices continue to proliferate, wireless telecom networks are taking up market share and PSTN landline technology is diminishing. In some places, less industrialized communities have skipped directly from underserved or insufficient public switched telephone network architecture directly to the use of cell phones and mobile devices.
    Related image
    V-Sat: VSAT (Very Small Aperture Terminal) is a satellite communications system that serves home and business users. A VSAT end user needs a box that interfaces between the user's computer and an outside antenna with a transceiver. The transceiver receives or sends a signal to a satellite transponder in the sky.
    A VSAT transmits narrow and broadband signals to orbital satellites. The data from the satellites is then transmitted to different hubs in other locations around the globate. For one VSAT user to communicate with another, the data has to be sent to the satellite. Then the satellite sends the data to the hub station for further processing. The data is then retransmitted to the other user via a satellite.
    Image result for v-sat
    RF-LinkRF (Radio frequency) is any of the electromagnetic wave frequencies that lie in the range extending from around 3 kHz to 300 GHz, which include those frequencies used for communications or radar signals. RF usually refers to electrical rather than mechanical oscillations. This is the frequency band that is used for communications transmission and broadcasting. Although RF really stands for the rate of oscillation of the waves, it is synonymous to the term "radio," or simply wireless communication.
    Radio frequency is being used in a lot of fields, but in the context of information and communications technology it refers to the frequency band at which wireless telecommunications signals are being transmitted and broadcast. The frequency band is being divided into different parts, which are then assigned to different technology industries. This is known as the radio spectrum. Example Like used by mobile phones, wireless LAN, Bluetooth, and TV and land radio.
    Image result for radio frequency









    Practical -5
    Aim:- Study of BNC, RJ-45 connectors.
    BNC: BNC (Bayonet Neill Concelman) connector, a BNC connector is a type of connector used with coaxial Ethernet cable. The connector is bayonet-style, meaning that it is put in then turned and locked in position. This connector is commonly used on a Ring network. BNC is also short for Bayonet Nut Connector; A BNC connector connects various radio frequencies up to 3GHz and voltages under 500V DC and is used in electronic architectures such as audio, video and networking.
    BNC also used for many types of signal connections like:
    • Serial digital interface and analog signals
    • High-tech video networks
    • Amateur radio antenna connections
    • Electronic test equipment
    • Aviation electronics or avionics
    Image result for bnc
    RJ-45RJ45 is a type of connector commonly used for Ethernet networking. ... Since Ethernet cables have an RJ45 connector on each end, Ethernet cables are sometimes also called RJ45 cables. The "RJ" in RJ45 stands for "registered jack," since it is a standardized networking interface.
    Registered jack-45 (RJ45) is an eight-wire connector used to connect computers on local area networks. An RJ45 cable is primarily used to connect devices over an Ethernet connection. For example, computers, printers, network storage devices, and cable or DSL modems, are some devices capable of using an RJ45 connection. Being able to identify an RJ45 cable is important when attempting to connect devices to a network.
    Straight Cable : The most common wiring for RJ45 cables is the straight through cable. In this cable layout, all pins are wired one-to-one to the other side. The pins on the RJ45 connector are assigned in pairs, and every pair carries one differential signal. Each line pair has to be twisted. If UTP or FTP cable is used, the pairs have orange, brown, blue and green colors.
    Cross Cable: An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices together directly. It is most often used to connect two devices of the same type: e.g. two computers (via network interface controller) or two switches to each other.
    Image result for cross cable straight cable



                                                     Practical -06
    Aim:-Study of cables and their connection structure (i.e. simple or cross cable (colour coding of cables).

    In order for the communication to take place, cables play important role. Cable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. The type of cable chosen for a network is related to the network's topology, protocol, and size.
    There are various types of cables used in networks as follows.
    • Unshielded Twisted Pair (UTP) Cable
    • Shielded Twisted Pair (STP) Cable
    • Coaxial Cable
    • Fibre Optic Cable
    Twisted Pair Cables:
    Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted together for the purposes of cancelling out electromagnetic interference (EMI) from external sources; for instance, electromagnetic radiation from unshielded twisted pair (UTP) cables, and crosstalk between neighboring pairs. In balanced pair operation, the two wires carry equal and opposite signals and the destination detects the difference between the two. This is known as differential mode transmission. Noise sources introduce signals into the wires by coupling of electric or magnetic fields and tend to couple to both wires equally. The noise thus produces a common-mode signal which is cancelled at the receiver when the difference signal is taken.

    Categories Of UTP Cable
    :
    It has been categorized into three categories based on the equipment that are being connected through these wires.
    i. Straight Through Cable
    ii. Cross Over Cable

    Straight Through Cable:

    Straight through cables are used to connect different devices like Switch to PC. Switch to Router. Router to Switch etc. Straight-through cables are used when each end of the communication transmits and receives on different pairs.

      


    Straight cable colour code:-
    White Orange          White Orange
    Orange                    Orange
    Green White           Green White
    Blue                        Blue
    White Blue             White Blue
    Green                      Green
    White Brown          White Brown
    Cross Over Cable:
    In a cross over the cable, the send and receive wires are "crossed over", meaning the wires are opposite on each end. This allows two PCs to talk to each other, has it connects the send of one computer to the receive of the other. Hence, the cross over cables are used to connect similar devices like PC to PC , Router to Router, Switch to Switch, Hub to Hub etc.
    Cross  cable colour code:
    Party          Party
    White Green White       Orange
    Green                  Orange
    White Orange       White Green
    Blue                     Blue
    White Blue          White Blue
    Orange                     Green
    White   Brown          White Brown


    Practical -07
    Aim:- Study and management of network resources.
    Switch:-
    A network switch (also called switching hub, bridging hub, officially MAC bridge]) is a computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device. Unlike less advanced network hubs, a network switch forwards data only to one or multiple devices that need to receive it, rather than broadcasting the same data out of each of its ports. A network switch is a multiport network bridge that uses hardware addresses to process and forward data at the data link layer (layer 2) of the OSI model.
    Image result for switch
    Router:-
    A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. A data packet is typically forwarded from one router to another router through the networks that constitute the internetwork until it reaches its destination node. A router is connected to two or more data lines from different networks. When a data packet comes in on one of the lines, the router reads the address information in the packet to determine the ultimate destination. Then, using information in its routing table or routing policy



                                                                                                                                              
    Image result for router
    Hub:-
     A Hub is a networking device which receives signal from the source, amplifies it and send it to multiple destinations or computers. If you ever some across subject 'Computer Networking' then you must heard this word. Sometimes, hubs are also called Ethernet Hub, Repeater Hub, Active Hub and Network Hub. Basically it is a networking device which is used multiple devices like Computers, Servers etc to each other and make them work as a single network segment. Hubs are used in 'Physical Layer' of OSI Model.
    Recommended For You: 
    Peer to Peer Networking Model

    Types of Hub:-On the basis of its working methods, the Hubs can be divided into three types, given as:

    ·         Active Hub
    ·         Passive Hub
    ·         Intelligent Hub
    Active Hub: As its name suggests, Active Hub is a hub which can amplify or regenerate the information signal. This type of bus has an advantage as it also amplifies the incoming signal as well as forwards it to multiple devices. This Bus is also known as Multiport Repeater. It can upgrade the properties if incoming signal before sending them to destination.
    Passive Hub: Passive Hub works like a simple Bridge. It is used for just creating a connection between various devices. It does not have the ability to amplify or regenerate any incoming signal. It receives signal and then forward it to multiple devices.
    Intelligent Hub: This is the third and last type of Bus. It can perform tasks of both Active and Passive buses. Also, it can perform some other tasks like Bridging and routing. It increases the speed and effectiveness of total network thus makes the performance of whole network fast and efficient.

    Networking Hub

     

    Installing Config Server Firewall

    Step 1: Downloading

    Config Server Firewall is not currently available in Debian or Ubuntu repositories, and has to be downloaded from the ConfigServer's website.

    Step 2: Uncompressing

    The downloaded file is a compressed from of tar package, and has to be uncompressed and extracted before it can be used.
    tar -xzf csf.tgz

    Step 3: Installing

    If you are using another firewall configuration scripts, such as UFW, you should disable it before proceeding. Ip tables rules are automatically removed.





    Practical – 8
    Aim: - Study and Installation of Firewall in your system.
    A firewall is a network security system designed to prevent unauthorized access to or from a private network. You can implement a firewall in either hardware or software form, or a combination of both. Firewalls prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.
    Image result for firewall

    Software firewalls

    Software firewalls are designed to protect a computer by blocking certain programs from sending and receiving information from a local network or the Internet. The image to the right shows the icon for Windows Firewall, an example of a firewall software program.

    Hardware firewalls

    Hardware firewalls are found on most network routers and can be configured through the router setup screen. The image at the top of this page shows the ZyXEL ZyWALL, which is a Unified Security Gateway with a firewall and other security features.

     

     

     

     

    Types of firewall

    Network layer firewalls

    Network layer firewalls generally make their decisions based on the source address, destination address and ports in individual IP packets. A simple router is the traditional network layer firewall, since it is not able to make particularly complicated decisions about what a packet is actually talking to or where it actually came from.

    Application layer firewalls

    Application layer firewalls are hosts that run proxy servers, which permit no traffic directly between networks, and they perform elaborate logging and examination of traffic passing through them. Since proxy applications are simply software running on the firewall, it is a good place to do logging and access control.


    Proxy firewalls

    Proxy firewalls offer more security than other types of firewalls, but at the expense of speed and functionality, as they can limit which applications the network supports. Proxy comprehensive, protocol-aware security analysis for the protocols they support. This allows them to make better security decisions than products that focus purely on packet header information.


    Installation of Firewall:-
    1.      From the Windows10 desktop, click Start, and then click Control Panel.

    2.      In Control Panel, click Windows Firewall.
    3.       In Windows Security Center, under Manage security settings for, click Turn Windows Firewall.

    4.      Click On Turn On Windows Firewall


    No comments:

    Post a Comment

    Contact Form

    Name

    Email *

    Message *