computer network(150703) - wordpress.com introduction of network communication devices. 12 / /14 4...

88
VENUS INTERNATIONAL COLLEGE OF TECHNOLOGY Gandhinagar Department of Computer Enggineering Computer Network(150703) Name : Enroll no. : Class : 5 th SEM C.E. Year : 2014-15

Upload: doanminh

Post on 17-Mar-2018

218 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

VENUS INTERNATIONAL COLLEGE OF TECHNOLOGY Gandhinagar

Department of Computer Enggineering

Computer Network(150703)

Name :

Enroll no.

:

Class

: 5th SEM C.E.

Year

: 2014-15

Page 2: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

VENUS INTERNATIONAL COLLEGE OF TECHNOLOGY

Gandhinagar

CERTIFICATE

This is certify that

Mr./Ms. ________________________________ Roll No. ___________________ of B.E Third Year 5th Sem C.E. has satisfactory completed the course in Computer Network.

_______________________ ____________________ Signature of Faculty Signature of HOD

DATE OF SUBMISSION : 13 / 11 / 2014

Page 3: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Index

Sr. No. Description Page No.

Date Sign

1 Study of Network topology and IP addressing. 1 / /14

2

Study of different types of Network cables and

practically implement the cross-wired cable and

straight through cable using clamping tool. 8 / /14

3 Introduction of Network communication devices. 12 / /14 4 Configuration of Netmeeting Service. 16 / /14 5 Implementation of Star topology. 23 / /14 6 How to configure RDP, FTP, IIS and Telnet protocol. 26 / /14 7 Configuration between server and Client Relationship. 52 / /14 8 Study of Network Monitoring. 54 / /14 9 Study of basic networking commands. 56 / /14

10 Installation and configuration of DHCP server. 58 / /14 11 Installation and configuration of DNS. 74 / /14

Page 4: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 1

Practical – 1

AIM : Study of Network topology and IP addressing.

DESCRIPTION:

A network topology refers to the physical arrangements, or the network‟s layout in which

all the devices are interconnected to communicate on the network. It defines manner in which cables are

arranged.

The network topology is classified into two main categories.

i. Physical Topology

ii. Logical Topology

Physical topology of a network refers to the configuration of cables, computers, and other peripherals.

Logical topologies are bound to the network protocol which directs the data transfer across a network.

Different types of topology used are:

MESH TOPOLOGY:

Mesh topology is a type of wireless network setup where each of the system and network

devices are interconnected with one another in a network for the data transmission.

Page 5: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 2

Advantages of Mesh topology Disadvantages of Mesh topology

1) Data can be transmitted from different devices

simultaneously. This topology can withstand high

traffic.

1) There are high chances of redundancy in many

of the network connections.

2) Even if one of the components fails there is

always an alternative present. So data transfer

doesn‟t get affected.

2) Overall cost of this network is way too high as

compared to other network topologies.

3) Expansion and modification in topology can be

done without disrupting other nodes.

3) Set-up and maintenance of this topology is

very difficult. Even administration of the network

is tough.

STAR TOPOLOGY:

Star topology is one of the most common network setup where each system on a network

is connected to a central hub. The star topology uses an individual connection for each system to

prevent the network failure. Data is transmitted from the main system through the hub to all the

systems on the network.

Page 6: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 3

Advantages of Star topology Disadvantages of Star topology

Easy to implement and extend even in large networks. It has limited cable length and number of stations.

Well suited for temporary networks. Maintenance costs may be higher in the long run.

The failure of a non-central node will not have major

effects on the functionality of the network.

Failure of the central node can disable the entire

network.

Security can be implemented in the hub/switch. Network failure is due to breakdown of hub.

BUS TOPOLOGY:

Bus topology is the cheapest, simplest and the most common method of networking systems where

multiple computers and network devices are connected in a single line using single cable.

Advantages of Bus topology Disadvantages of Bus topology

East to implement and extend. Difficult to administer or troubleshoot.

Well suited for temporary networks Limited cable length and number of stations

Cheapest topology to implement Maintenance costs may be higher in the long run

Failure of one station does not affect others Failure of one cable can disable the entire network.

Small networks do not require high speeds. Large networks fail to pass signals with low speed

Page 7: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 4

RING TOPOLOGY:

In ring topology, all the systems are connected to one another forming a large circle in a closed loop, so

that each system is connected directly to other systems, one on either side of it. The data sent in the form

of packets around the ring until it reaches the final destination.

Advantages of Ring topology Disadvantages of Ring topology

Data travels I one direction at high speeds of

transmission of data.

Numerous connections to the other systems slow

down the network activity

When using a co axial cable to create a ring

network the service becomes much faster.

If one node fails, the rest of the network could also

fail.

Page 8: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 5

IP ADDRESS

• An IP address is a unique global address for a network interface

• An IP address:

- is a 32 bit long identifier

- encodes a network number (network prefix) and a host number .

IPv4 subnetting :

In the early stages of development of the Internet Protocol network administrators

interpreted an IP address in two parts: network number portion and host number portion. The

highest order octet (most significant eight bits) in an address was designated as the network

number and the remaining bits were called the rest field or host identifier and were used for host

numbering within a network.

This early method soon proved inadequate as additional networks developed that were

independent of the existing networks already designated by a network number. In 1981, the

Internet addressing specification was revised with the introduction of classful network

architecture.

Classful network design allowed for a larger number of individual network assignments

and fine-grained subnet work design. The first three bits of the most significant octet of an IP

address were defined as the class of the address. Three classes (A, B, and C) were defined for

universal unicast addressing. Depending on the class derived, the network identification was

based on octet boundary segments of the entire address. Each class used successively additional

octets in the network identifier, thus reducing the possible number of hosts in the higher order

classes (B and C). The following table gives an overview of this now obsolete system.

Page 9: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 6

Historical classful network architecture

Class Leading

bits

Size of

network

number bit

field

Size of

rest

bit

field

Number

of networks

Addresses

per network

Start

address End address

A 0 8 24 128 (27) 16,777,216 (2

24) 0.0.0.0 127.255.255.255

B 10 16 16 16,384 (214

) 65,536 (216

) 128.0.0.0 191.255.255.255

C 110 24 8 2,097,152 (221

) 256 (28) 192.0.0.0 223.255.255.255

IPv4 private addresses :

Early network design, when global end-to-end connectivity was envisioned for

communications with all Internet hosts, intended that IP addresses be uniquely assigned to a

particular computer or device. However, it was found that this was not always necessary as

private networks developed and public address space needed to be conserved.

Computers not connected to the Internet, such as factory machines that communicate

only with each other via TCP/IP, need not have globally unique IP addresses. Three ranges of

IPv4 addresses for private networks were reserved in RFC 1918. These addresses are not routed

on the Internet and thus their use need not be coordinated with an IP address registry.

Today, when needed, such private networks typically connect to the Internet through

network address translation (NAT).

IANA-reserved private IPv4 network ranges

Start End No. of addresses

24-bit block (/8 prefix, 1 × A) 10.0.0.0 10.255.255.255 16777216

20-bit block (/12 prefix, 16 × B) 172.16.0.0 172.31.255.255 1048576

16-bit block (/16 prefix, 256 × C) 192.168.0.0 192.168.255.255 65536

Any user may use any of the reserved blocks. Typically, a network administrator will

divide a block into subnets; for example, many home routers automatically use a default address

range of 192.168.0.0 through 192.168.0.255 (192.168.0.0/24 block).

IPv6 addresses:

The rapid exhaustion of IPv4 address space, despite conservation techniques, prompted

the Internet Engineering Task Force (IETF) to explore new technologies to expand the

addressing capability in the Internet. The permanent solution was deemed to be a redesign of the

Internet Protocol itself. This next generation of the Internet Protocol, intended to replace IPv4 on

the Internet, was eventually named Internet Protocol Version 6 (IPv6) in 1995.

Page 10: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 7

The address size was increased from 32 to 128 bits or 16 octets. This, even with a

generous assignment of network blocks, is deemed sufficient for the foreseeable future.

Mathematically, the new address space provides the potential for a maximum of 2128

, or about

3.403×1038

addresses.

The primary intent of the new design is not to provide just a sufficient quantity of

addresses, but rather to allow an efficient aggregation of subnetwork routing prefixes at routing

nodes. As a result, routing table sizes are smaller, and the smallest possible individual allocation

is a subnet for 264

hosts, which is the square of the size of the entire IPv4 Internet. At these

levels, actual address utilization rates will be small on any IPv6 network segment.

The new design also provides the opportunity to separate the addressing infrastructure of

a network segment that is the local administration of the segment's available space, from the

addressing prefix used to route external traffic for a network. IPv6 has facilities that

automatically change the routing prefix of entire networks, should the global connectivity or the

routing policy change, without requiring internal redesign or manual renumbering.

The large number of IPv6 addresses allows large blocks to be assigned for specific

purposes and, where appropriate, to be aggregated for efficient routing. With a large address

space, there is no need to have complex address conservation methods as used in CIDR.

Many modern desktop and enterprise server operating systems include native support for

the IPv6 protocol, but it is not yet widely deployed in other devices, such as home networking

routers, voice over IP (VoIP) and multimedia equipment, and network peripherals.

Page 11: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 8

Practical – 2

AIM : Study of different types of Network cables and practically implement the cross-wired

cable and straight through cable using clamping tool.

DESCRIPTION:

A cable is a device which contains a number of signal conductors usually in the form of separate

wires. It is the medium through which information usually moves from one system to another through the

network. There are several types of cable which are commonly used with the local area network.

Twisted Pair :

Twisted pair cable is the most common type of network medium used in LANs. A

transmission media consists of color coded pairs of two shielded or unshielded insulated copper

wires which are arranged in a spiral pattern. The spiral pattern is an important aspect of twisted-

pair cables in order to minimize crosstalk or interference between adjoining wires. The advantage

of using twisted pair cables are:

It is lighter, thinner and more flexible.

Easy to install

It is inexpensive

There are two varieties of twisted pair cabling, they are:

Unshielded Twisted Pair (UTP)

Shielded Twisted Pair (STP)

Unshielded Twisted Pair (UTP):

Unshielded twisted pair (UTP) cabling consists of two unshielded wires twisted around each

other that contain no shielding. It is commonly used in the telephone wires and is common for computer

networking because of high flexibility of the cables. It is a plastic connector that looks like a large

telephone-style connector. The standard connector for unshielded twisted pair cabling is RJ-45 connector

Page 12: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 9

Shielded Twisted Pair(STP):

Shielded Twisted-Pair cabling is usually used in several network types. STP cable usually

contains four pairs of twisted copper wires. It is different from UTP in that the twisted pairs are in

a shield with electrically grounded woven copper mesh separating them from the cable‟s outer

sheath. It is suitable for environments with electrical interference. The essence of the shielding is

to provide resistance to external Electromagnetic Interference (EMI) and to prevent crosstalk.

Fiber Optic Cable:

Fiber optic cable is the standard cable for connecting networks between buildings due to

its resistance to the effect of moisture and lightening. This technology is popular for LAN but it is

expensive and fragile too. The fiber optic cable is designed to carry laser light to a long distance

at a high speed rather than transmitting electronic signals. It carries the digital data signals in the

form of modulated pulses of light. This is relatively safe way to send the data because electrical

impulses are not carried over the fiber optic cable.

Page 13: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 10

Advantages of using fiber optic cables are:

Greater bandwidth

Less susceptible to interference

Thinner and light in weight

Data transmission can be done digitally.

CRIMPER:

A crimper is a jawed device that looks like a pair of pliers. It has a set of dies in it that

enables you to squeeze the two halves of an RJ-45 connector together with the wires inside. The

wire is striped off a cable and is out in the bottom half of the connector at both the ends. The

other half of the connector on the top of the wires squeezes the handles of the crimper to lock the

two halves together. Crimping has two types of cables, they are:

Straight-through Cable

Cross over Cable

Straight-through Cable:

Straight-through cable is a Cat 5 cable which has similar wiring at both the ends. It is a

standard network cables that connects a computer to a network device like network hub, network

switch, and network routers. A straight-through cable has each internal twisted pair of wires

connected to the same pin number at each end. The twisted-pair wires must be twisted throughout

the entire length of the cable. If the colors in both ends are in the same order, it is a straight-

through cable. The straight-through cable is used to connect:

Host to switch or hub

Router to switch or hub

Page 14: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 11

Cross over cable:

It is also a Cat 5 networking cable, which is generally used to connect two computers or

network devices directly to one another without using a network hub, network, router or network

switch. The crossover cable can be used to connect:

Switch to switch

Hub to hub

Host to host

Hub to switch

Router direct to host

Page 15: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 12

Practical – 3

AIM: Introduction of Network communication devices.

DESCRIPTION:

The basic of networks require devices to provide connectivity and functionality. Understanding

how these networking devices operate and identifying the functions they perform are essential for users.

Hubs:

Hubs are generally called as multiport repeaters. Hubs allow multiple devices to be

attached simultaneously. The main function of hub is to provide the connection for transmit pins

to the receive pins between the two computers. The hubs with greater data processing capabilities

provide a service called store and forward.

Hubs are of many types with different features/specification, which provide the type of

functionality required to build a network. The three major types of hubs are:

Active hubs

– Active hubs usually have eight to twelve ports to connect to the network

computers.

Passive Hubs

– Passive hubs act as a connection point and do not amplify or regenerate

the signal; the signal passes through the hub. A passive hub simply

receives the signal on the input port and broadcasts it on the output port

without even repairing it.

Intelligent hubs

– Intelligent hubs are also called as smart hubs which are of particular

importance to large organization. An intelligent hub is typically a

stackable and includes remote management capabilities It also provide

feature, which help in improving the performance of network.

Page 16: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 13

Switch:

A switch is a device that looks much like a hub and is considerably more expensive than

hub. Switches provide more advantage than hubs which has a common connectivity and also

helps in exchanging the network resources easily. Switches allow different nodes of a network to

communicate directly with one another in a smooth and efficient manner. Switches on receiving

the data packets transfers only to the intended recipients preventing the wastage of the network

bandwidth and optimizing efficiency.

Asynchronous Transfer Mode (ATM) Switch:

ATM is a high performance, cell oriented technology that utilizes fixed-length

information unit known as „Cell‟ for high speed transmission, and support voice, video and

data applications. ATM allows customers to replace their separate voice and data networks

with a single network to handle, data and other multimedia content such as video.

LAN Switches:

Switches that provide a separate connection for each node in a company‟s internal

network are known as LAN switches. Essentially, a LAN switch creates a series of instant

networks that contain only two devices communicating with each other at that particular

moment. LAN switches are designed to switch data frames at high speed.

WAN Switches:

A WAN switch is a multiport internetworking device used in carrier networks. Typically

these devices switch traffic such as Frame Relay, X.25 and operate at the data link layer of

the OSI Reference Model.

Page 17: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 14

Figure below shows two routers at remote ends of a WAN that are connected by WAN switch

Bridges:

A bridge is a physical unit with two ports which connects the network segments together

and filters the amount of traffic on each network. Bridges can only be connected to similar

network segments because they require the physical address of the device to send the data frames

(frames are bundles of data packets that contain the physical address of the sender). The physical

address is the function of the data link layer that uses various protocols. There are several types of

bridges classified into categories to best suit the networking requirements.

Types of bridges

Transparent bridge

Translational bridge

Source-route bridge

Page 18: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 15

Routers

A router is a device that connects two network interfaces together, forming an Internetwork

which operates at the network layer of the OSI reference model.

Routers send the data packets through the network to their final destination. It will pass the

information only if the network address is known. This ability to control the data passing through the

router reduces the amount of traffic between networks. A major function of a router is that it localizes the

network broadcasts sent to every device on the network. It also filters the broadcast traffic to reduce the

network failure between the connected devices. The main functions of the routers are:

Segment large number of data into smaller segments

Acts as a safety barrier between segments

Gateway

Gateways are task-specific that performs protocol conversion between different types of networks

or applications. The main feature of gateway is that it performs the function of translating the data from

one format to the other. It acts as server on the network. Gateways usually perform the task very slow and

are expensive. The data is processed by decapsulating the incoming data and encapsulating the outgoing

data through the networks protocol stack and for the other network to allow transmission respectively.

Network Interface Card (NIC)

Network Interface Card is the device, which enables a workstation to connect to the

network and communicate with other computers.

A network adapter is also called a network interface card or NIC.

An adapter is a physical device which allows one piece of hardware to be adapted to

another type of hardware..

The main function of NIC is to allow a computer to connect to a LAN and transmit data

at the speed of the type of network, which is usually greater than 4 Mbps and can attain 1

Gbps (Gigabit Ethernet network).

Page 19: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 16

Practical – 4

AIM: Configuration of Netmeeting Service.

DESCRIPTION:

Microsoft NetMeeting is a nice inbuilt feature of XP. It‟s allowing you to share files and

desktop. You could also use it for chat, video conferencing. You have to configure Net Meeting

before you could use it.

To configure NetMeeting:

Click Start and select Run: In Run box, type conf.exe and click OK In the NetMeeting window, click Next Fill in your name, email address, and location info, then click Next Click off "Log on to directory server when NetMeeting starts", then click Next Select the network connection you are using, then click Next (On campus, select Local Area

Network) Select "Put a shortcut to NetMeeting on my desktop", and click Next. In Audio Tuning Wizard window, click Next. In Audio Tuning Wizard window, adjust the speaker or headphone volume and click Next. When finished adjusting settings, click Finish.

NetMeeting setup is now complete. An icon will be displayed on the desktop. (During startup, if

Windows XP Firewall attempts to block NetMeeting, click Unblock.

The NetMeeting main window

Page 20: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 17

Finding Your IP Address

Connections in NetMeeting are done through IP addresses. You need to know your IP Address.

To find out your IP Address:

Click on Start button, select Run Type command and click OK In the window that appears, type ipconfig and press the Enter key Your IP Address will be displayed in the window (eg. 192.168.1.5) (Write down your IP Address) To close the window, type Exit and press the Enter key.

Alternatively, in the NetMeeting main window, click Help, then select "About Windows

NetMeeting". Your IP Address will be displayed in the window.

Starting NetMeeting

You can connect individually or to a group.

To start NetMeeting:

Click the NetMeeting shortcut icon on your desktop

The NetMeeting main window will appear.

Placing a Call

Click the Place Call button. Enter the IP Address of the remote computer.

Page 21: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 18

Receiving a call

When another person is calling you NetMeeting will display the following screen:

Click Accept to begin the call.

Hosting and Joining Meetings

To host a meeting:

In the Call menu, select Host Meeting. In Meeting Name, type the meeting name or leave it set to Personal Conference. To monitor who joins the meeting, click the "Only you can accept incoming calls" check box. To restrict participants from inviting other people, click the "Only you can place outgoing calls"

check box. and Click OK

Using Chat

With chat you can communicate with an individual or a group by text messaging. These

conversations can be saved as a rich text file for later reference. Options such as "Whisper" mode

allow private messages between the host and an individual during a group session. To open a

chat session:

Page 22: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 19

Click the Chat button.

Using Whiteboard

With Whiteboard you can review, create and update graphic information. This option allows you

to load saved Whiteboard pages into a conference by dragging and dropping the saved pages into

the Whiteboard window. To open Whiteboard:

Click the Whiteboard button.

Page 23: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 20

Sharing Programs

Shared Programs allows meeting participants to view and work on files together even if they do

not have the program. Only one participant at a time can be in control of the shared program.

To share a program:

Click the Share Program button. Select the program you wish to share. Choose who you want to share the program with. Click Share.

You can also share your computer desktop in order to share your entire computer with

participants. To stop sharing, click Unshare in the Sharing dialog box.

Page 24: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 21

Remote Desktop Sharing

Remote Desktop Sharing allows you to access a computer from another computer at another

location. To use Remote Desktop Sharing, you activate it and then close NetMeeting.

To set up Remote Desktop Sharing:

Under Tools on the menu bar, select Remote Desktop Sharing. In the Remote Desktop Sharing Wizard, click Next. In the Remote Desktop Sharing Wizard, click Yes, enable password-protected screen saver. Click Finish.

To activate Remote Desktop Sharing on the computer:

Note the computer's IP Address . Under Call on the menu bar, select Exit.

To connect to the computer from a second location:

Click the Call button in NetMeeting. In "To", type in the computer's IP Address. Type in your password.

The remote desktop will appear on the second computer.

To end Remote Desktop Sharing:

On the computer being accessed, click Start. Select either Log Off or Turn Off.

Transferring Files

Files can also be transferred in the background while a NetMeeting conference is going on or can

be sent either to an individual or a group.

To transfer a file:

Click the Transfer Files button. Click the Add File button. Select the desired files. Choose the people you wish to send the file to (if you wish to send the file to everyone in the

meeting, click All). Click Send All button to transfer the files.

Page 25: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 22

Configuring Settings

To configure NetMeeting's video and audio options:

* Under the Tools menu, select Options.

The Options dialog box will appear.

For video settings:

* Select the Video Tab

To configure audio options:

* Select the Audio tab

Getting help

For help using Windows NetMeeting, select Help Topics under Help on the menu bar.

Page 26: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 23

Practical – 5

AIM: Implementation of Star topology.

DESCRIPTION:

Star networks are one of the most common computer network topologies. In its simplest

form, a star network consists of one central switch, hub or computer, which acts as a conduit to

transmit messages. This consists of a central node, to which all other nodes are connected; this

central node provides a common connection point for all nodes through a hub. In star topology,

every node (computer workstation or any other peripheral) is connected to a central node called a

hub or switch. The switch is the server and the peripherals are the clients. Thus, the hub and leaf

nodes, and the transmission lines between them, form a graph with the topology of a star. If the

central node is passive, the originating node must be able to tolerate the reception of an echo of

its own transmission, delayed by the two-way transmission time (i.e. to and from the central

node) plus any delay generated in the central node. An active star network has an active central

node that usually has the means to prevent echo-related problems.

The star topology reduces the damage caused by line failure by connecting all of the systems to a

central node. When applied to a bus-based network, this central hub rebroadcasts all

transmissions received from any peripheral node to all peripheral nodes on the network,

sometimes including the originating node. All peripheral nodes may thus communicate with all

others by transmitting to, and receiving from, the central node only. The failure of a transmission

line linking any peripheral node to the central node will result in the isolation of that peripheral

node from all others, but the rest of the systems will be unaffected.

Page 27: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 24

It is also designed with each node (file servers, workstations, and peripherals) connected directly

to a central network hub, switch, or concentrator.

Data on a star network passes through the hub, switch, or concentrator before continuing to its

destination. The hub, switch, or concentrator manages and controls all functions of the network.

It also acts as a repeater for the data flow. This configuration is common with twisted pair cable.

However, it can also be used with coaxial cable or optical fibre cable.

Advantages

Better performance: Star topology prevents the passing of data packets through an excessive number of nodes. At most, 3 devices and 2 links are involved in any communication between any two devices. Although this topology places a huge overhead on the central hub, with adequate capacity, the hub very high utilization by one device without affecting others.

Isolation of devices: Each device is inherently isolated by the link that connects it to the hub. This makes the isolation of individual devices straightforward and amounts to disconnecting each device from the others. This isolation also prevents any non-centralized failure from affecting the network.

Benefits from centralization: As the central hub is the bottleneck, increasing its capacity, or connecting additional devices to it, increases the size of the network very easily. Centralization also allows the inspection of traffic through the network. This facilitates analysis of the traffic and detection of suspicious behavior.

Easy to detect faults and to remove parts. No disruptions to the network when connecting or removing devices. Installation and configuration is easy since every one device only requires a link and one

input/output port to connect it to any other device(s).

Page 28: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 25

Disadvantages

Reliance on central device: star topology relies on the central device (the switch, hub or computer) and if this device fails the whole network will fail in turn.

Higher costs: the need for a central device increases costs compared to the bus and ring topologies. The star topology also requires more cable when using Ethernet cables than ring and bus topologies.

Limited capacity for nodes: as this type of network needs all connections to go through a central device the amount of nodes in a network is limited by this factor whereas bus and ring topologies are not limited in such a way.

Page 29: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 26

Practical – 6

AIM: How to configure RDP, FTP, IIS and Telnet protocol.

DESCRIPTION:

RDP(Remote Desktop):

If you have never used Remote Desktop, it is a really great way to connect to another PC

(office, home, etc.) remotely and get work done that you otherwise could not get done unless you

were physically at the machine. I routinely use remote desktop to connect to servers at our office,

connect to user‟s computers to provide tech support and to connect to my personal computer at

home to access files.

In order to use Remote Desktop, there are a couple of things you need to understand. First

off, remote desktop only works with Windows XP and Windows 2003. What I mean by this is

that you can only connect INTO a Window XP or 2003 machine. You can use a Windows 98,

ME, or 2000 to connect INTO a Windows XP or 2003 machine, but you cannot connect INTO a

98, ME or 2000 machine remotely. If you want to be able to connect to a Windows 2000 or

earlier machine, you‟ll have to buy commercial software.

Since this post is over 7 years old, the above statement is out-dated. You can also connect

into a Windows Vista, Windows 7 or Windows 8 machine. Also, since Microsoft has recently

ended support for Windows XP, this tutorial will becomes less useful as time passes.

Secondly, you need to make sure that you are logged in as a computer administrator on the

machine in order to set it up for remote access. If you brought a computer from a store or got it

straight from the manufacturer, the first user name you create is always an Administrator

account.

An easy way to check whether or not you are an Administrator is to go to Start, Control Panel

and then click on User Accounts. You‟ll see your user name and it should have

“Administrators” or “Computer Administrator” written next to it.

Page 30: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 27

Thirdly, the administrator account on your machine must have a password. If you do not have to

type in a password in order to access Windows when you start up your computer, then you do

not have a password set up and Remote Desktop will not work. Remote desktop does not allow

you to connect to a computer with a user account that does not have a password.

When you go to User Accounts and click on the Administrator account, you will see an option to

create a password for the account. Go ahead and do that before moving on.

Next, if the computer you are connecting to is running Windows XP SP3, then you need to open

the firewall to allow remote desktop connections. To do this, go to Start, Control Panel,

Windows Firewall and click on the Exceptions tab.

Page 31: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 28

Make sure that the Remote Desktop check box is checked. The last thing that needs to be done

in order for Remote Desktop to work correctly is to tell Windows that we want to allow users to

connect remotely. So far we‟ve just fulfilled the requirements, but now we have to actually allow

remote desktop connections to this computer.

Go to Start, Control Panel, and click on System. Click on the Remote tab and make sure that

the “Allows users to connect remotely to this computer” box is checked. Don‟t worry about

clicking the Select Remote Users button because Administrators have access by default. If you

want to give an non-administrator account remote desktop access, then click that button and add

the user.

Page 32: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 29

And that‟s it! Your computer is now setup for remote desktop! First try connecting to the XP

machine from another computer on your home network. In order to connect, go to the other

computer and click on Start, All programs, Accessories, Communications, and Remote Desktop

Connection. If you want to connect to the XP machine from Windows Vista, Windows 7 or

Windows 8, just click on Start and perform a search for remote desktop connection. On

Windows 8, go to the Start Screen and start typing to perform a search.

In the dialog box, you can type in the IP address or the name of the computer. The best way to

connect is to type in the IP address of the computer. In order to get the IP address of the

computer you want to connect to, go to the computer and click on Start, Run and type in CMD.

Page 33: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 30

In the black command window, type in the word “ipconfig” without the quotes as shown below

and press Enter.

You‟ll see your IP address listed along with some other info, but you don‟t need to worry about

that. Write down that IP address (192.x.x.x or something similar) and type that number exactly

into the remote desktop text box on the other computer (the computer you are connecting from).

Click Connect and you should get a login screen pop up, which means you have successfully

connected to the other computer. You can now enter the Computer Administrator user name and

password.

If you get an error saying that computer cannot accept new connections, etc. that means

something was not configured correctly. Remember you need to give the administrator account a

password, open the port in the firewall, and check the allow remote connections check box in the

System properties. All three items need to be performed on computer you want to connect TO.

Once you are able to connect from within the same network, now you can try to connect from

outside. So if you want to connect to your home computer from the office, you can do that, but

you‟ll have to do a few extra things.

Page 34: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 31

First, you have to get your public IP Address (not the 192.168.x.x number) and you can

do this by going to the computer you want to connect into and navigating to the web site

http://www.whatismyip.com/ and this will give you your public IP address. This is the address

that can be used from anywhere in the world to connect to your specific location and is unique.

Unfortunately, on most home connections, this public IP address changes often and without

notice. Basically to solve that problem, you have to use dynamic DNS.

The second thing you have to do is open the port in your router (unless you‟re connecting

your cable modem directly into your computer) and forward that port to the computer you want

to connect to. Here‟s how you would do this on a Netgear router (as I have that) and the

procedure is pretty much the same for other routers, except that it might be called something

else. Most manufacturers‟ web sites have an article on how to configure their particular router for

port forwarding since it‟s very common.

You‟ll need to log into your router by typing it‟s IP address into the browser address bar.

You can figure out the IP address of your router by going to any computer on your network (that

you want to connect into) and opening the command prompt like we did above and typing

ipconfig again. In addition to the IP Address field, you‟ll also see Default Gateway, this is your

router. From the above screenshot, you can see mine is 192.168.244.2.

Type that address into your browser address bar as follows and press Enter:

You‟ll most likely be prompted for a user name and password. Usually, you can find this in the

documentation or on the under side of the router itself. For my Netgear router, the username as

“admin” (lowercase) and the password was “password”.

Once you‟re in, you should see an option called “Port Forwarding/Port Triggering” or something

very similar. I know Netopia calls these Pinholes and on Linksys it might be called a Service or

Applications.

Page 35: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 32

Once you‟re on the Port Forwarding page, you might see different layouts/options. The basic

parts will be giving the forward a name like “Remote Desktop”, choosing the external port and

the internal port, the protocol and picking the IP address for the device the data is supposed to be

forward to.

For remote desktop, you‟ll always want to choose TCP for Protocol. Be default, remote desktop

uses port 3389, so type that into both the internal and export port boxes. Lastly, the internal IP

address should be the IP address of the XP machine. On some setups, you‟ll be asked for a

starting port, ending port and triggering port. Just put 3389 for any port boxes.

Click Apply and you‟re done! You should now be able to use your public IP address (type this

into the Computer text box in the Remote Desktop Connection dialog) to connect through your

router to your computer!

Page 36: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 33

FTP(File Transfer Protocol):

Steps

1. First, you should start by retrieving your Windows XP CD.

2. Next, click the Start button and go to the Control Panel.

Page 37: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 34

3. After that, select "Add/Remove Windows Components."

4.Select "Internet Information Services" under "Windows Components."

Page 38: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 35

5. Click "details" and select the "File Transfer Protocol (FTP)" service. (Remember that this

will also automatically select "Common Files" and "Internet Information Services Snap-In.")

6. Click OK and follow the instructions for the install Wizard (or you can just push next if

you don't feel like reading). Be prepared with your Windows XP CD, because it might prompt

you for it if you haven't already installed it. Once it is done, you might have to restart your

computer after this.

Page 39: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 36

7. After that, all you need to do is just paste the files you want to be public into

"C:\INETPUB\FTPROOT." Note that by default, these files are read-only and public. Public

meaning that anyone who knows the IP address may download copies from it.

8. There's more to go! Now, you need to configure your router's firewall to let FTP traffic

through. This can be done through your router's administration menu. Note that this will vary

depending on your router.

9. After letting your router firewall let FTP connections in, you will have to configure your

regular firewall to let FTP connections in through a certain port.

10. Finally, after done with everything, you may access your FTP site through your

browser. All you need to do is type ftp://xxx.xxx.xxx.xxx/ in the URL where "xxx.xxx.xxx.xxx"

is the WAN address of your computer.

Page 40: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 37

IIS(Internet Information Services):

Steps

1. Install IIS 5.1. This is a Windows Add-on available in Windows XP Pro or Windows XP

Media Center editions of Windows XP.

Open Control Panel from the Start Menu.

Click on Add or Remove Programs

Page 41: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 38

Click on Add/Remove Windows Components

Select Internet Information Services from the Windows Component Wizard

Page 42: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 39

Select Next. The Wizard may prompt you for your XP Installation Disc.

IIS 5.1 will now be installed

2. Once it has completely installed you will have to open it (this may be tricky because it

doesn't include any shortcuts on the desktop or in the start menu).

First go to the Control Panel again and click "Performance and Maintenance" and then

navigate to "Administrative Tools". (For Service Pack 3, click directly on

"Administrative Tools")

Now you should see "Internet Information Services"; open the program up (You may

create a shortcut on the desktop so it is easier to find).

Page 43: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 40

3. If it opens then congratulations, you have successfully installed it. Now to set it up

properly read on...

4. In the left panel select "Websites".

Page 44: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 41

5. Here you will see if it is running or not, the local IP Address it is configured on, and the

current port it is using (Port 80 is default, however you may need to change this because

most ISPs [Internet Service Provider] block that port).

6. Now right click on "Default Web site" and click properties, then go to the "Web site"

tab. Change the IP Address to what your local IP Address is if it is not already set (to find out

what your local address is click "start", then "run", then type in "cmd", then type in "ipconfig".

Now look at the address beside "IP Address" and that is what it should be in IIS).

Page 45: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 42

7. Now decide what port you want to use (anything above 1024 should be fine). You can

leave it at port 80 but only if your ISP doesn't block it. If you do decide to change the port then

note than whenever you navigate to your website then your syntax must be

"domain.com:portnumber".

8. After you have decided on the port you need to open the port in your router. To do this

type in you gateway in a browser and follow the steps there.

9. Next go to the "Home Directory" tab, and select a local path.

10. Now go to the "Documents" tab. Here you can set a default document to redirect to if no

document is typed into the URL. To add a new document to the list click "Add" and then type in

the name (you do not need the path but the file must be in the home directory that you previously

chose).

Page 46: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 43

11. Next close the properties window and right click on "Default Web Site" again. This time

rollover "New" and then click "Virtual Directory" (you don't have to do this but it is a good

practice). Select a logical name for your virtual directory such as "root" or something similar as

to avoid confusion.

12. Now expand "Default Web Site" and you should see the name of your virtual directory.

Expand the directory and you should see all of the files in there that are in your "Home

Directory". Relax, you are almost done.

Page 47: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 44

13. Once again, right click on "Default Web Site", this time rollover "All Tasks" and click

on "Permissions Wizard"

Click next.

Select "Select new security settings from template".

Page 48: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 45

Click next.

Select "Public Site". Now just keep clicking next until it is finished.

Page 49: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 46

14. Now test to see if your site works.

Open up your favorite browser and type into the Location Bar: http://

localIPaddress:port/virtualdirectory/ or type in : http://

computername:port/virtualdirectory/ (if you did not change the port from port 80 then

type in: http:// computername/virtualdirectory/)

15. To access your site from another location that is not on your network then type: http://

externalIPaddress:port/virtualdirectory/ (once again if you did not change the port from port 80

then type: http:// externalIPaddress/virtualdirectory/)

16.To find out your external IP Address then go to http://whatismyip.com or

http://ipaddressfinder.info

Page 50: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 47

TELNET Protocol: Telnet is a command line tool that is designed for administering remote servers through the Command Prompt. Unlike Windows XP and Vista, Windows 7 does not come with the Telnet client installed automatically. You will need to enable it before you can start using it. See Step 1 below to learn how to do both.

Part 1 of 2: Installing Telnet

1. Open the Control Panel. By default, Telnet is not installed with Windows 7. It will need to be

manually activated in order for you to use it. You can do so through the Control Panel, which can

be accessed from the Start menu.

Page 51: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 48

2. Open "Programs and Features" or "Programs". The option available to you will depend on

whether your Control Panel is in Icon or Category view, but they both take you to the same

place.

3. Click the "Turn Windows features on or off" link. You may be asked for the Administrator

password.

Page 52: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 49

4. Find the "Telnet Client" entry. In the list of available features, you will see an entry labeled

Telnet Client. You may have to scroll down to find it. Check the box next to Telnet Client, and

click OK.

o You may have to wait a minute or two for the client to be installed after selecting it.

5. Install Telnet through the command prompt. If you'd rather do everything through the

Command Prompt, you can install Telnet with a quick command. First, open the Command

Prompt by typing cmd into the Run box. At the command line, type pkgmgr

/iu:"TelnetClient" and press ↵ Enter . After a moment, you will be returned to the

command prompt.[1]

o Restart the command prompt to begin using Telnet.

Page 53: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 50

Part 2 of 2: Using Telnet

1. Open the Command Prompt. Telnet runs through the Command Prompt. You can access the

command prompt by pressing Win and typing cmd into the Run field.

2. Start the Telnet client. Type telnet and press ↵ Enter to start Microsoft Telnet. The

Command Prompt will disappear, and you will be taken to the Telnet command line, displayed

as Microsoft Telnet>.

Page 54: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 51

3. Connect to a Telnet server. At the Telnet command line, type open serveraddress

[port] . You have successfully connected to the server when you receive either a welcome

message or are prompted for your username and password.

o For example, to watch ASCII Star Wars, type open towel.blinkenlights.nl

and press ↵ Enter .

o You can also start a connection directly from the Command Prompt by typing telnet serveraddress [port] .

4. Close your Telnet session.Once you are finished administering your Telnet server, you should

close your connection before closing the window. To do so, open the Telnet command line by

pressing ^ Ctrl + ] . Type quit and press ↵ Enter to close the connection.

Page 55: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 52

Practical – 7

AIM: Configuration between server and Client Relationship.

DESCRIPTION:

Set up the update server and clients for locally-published updates

The following steps must be performed in order to initialize a trust relationship between the

update server and its clients.

To set up the update server for locally-published content

1. Call SetSigningCertificate to install a self-signed certificate. This method has three

overloads. The method SetSigningCertificate creates and installs the certificate, while

SetSigningCertificate and SetSigningCertificate install an existing certificate.

2. Call Save to add this information to the configuration.

3. Export the public key for the certificate into a .cer file: o Click Start, then Run, and type mmc.

o In the MMC console, click File, click Add/Remove Snap-in, and then select Add.

o Add the Certificates snap-in, and set it to manage certificates for the local computer account.

o Navigate to the WSUS node in the snap-in, and then find the certificate you added in step 1.

o Right-click the certificate and select All Tasks, then Export. For security reasons, you should export only the public key, not the private key.

4. Configure your WSUS server to trust this certificate by installing the public key for this

certificate in your trusted publisher store. o In the Certificates snap-in, select Trusted Root Certification Authorities, then right-click

Certificates, select All Tasks, then Import, and import the certificate you just exported.

o Select Trusted Publishers, then right-click Certificates, select All Tasks, then Import, and import the certificate.

Page 56: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 53

To set up update clients to trust locally-published content

1. You can configure a WSUS client to use signed content using the Group Policy Object

Editor. There are two Group Policy settings you need to create.

2. To configure a WSUS client policy for clients to trust content signed by a trusted-

publisher using the local Group Policy Object Editor, complete the following steps. o Click Start, then Run, then type gpedit.msc.

o Select Computer Configuration, then Administrative Templates, then Windows Update.

o Enable Allow signed content from intranet Microsoft Update service location.

o To verify that the policy has been set, In the registry, go to HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate, and verify that AcceptTrustedPublisherCerts is set to 1.

3. To configure a WSUS client policy to trust the specific signing certificate you installed

on the server, click Add/Remove Snap-in, and then select Add.

4. Add the Certificates snap-in, and set it to manage certificates for the local computer

account.

5. In the Certificates snap-in, select Trusted Root Certification Authorities, then right-

click Certificates, select All Tasks, then Import, and import the certificate.

6. Select Trusted Publishers, then right-click Certificates, select All Tasks, then Import,

and import the certificate.

Page 57: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 54

Practical – 8 AIM: Study of Network Monitoring.

DESCRIPTION:

Network monitoring is the use of a system that constantly monitors a

computer network for slow or failing components and that notifies the network

administrator (via email, SMS or other alarms) in case of outages. It is part of network

management.

While an intrusion detection system monitors a network for threats from the outside, a network monitoring system monitors the network for problems caused by overloaded and/or crashed servers, network connections or other devices.

For example, to determine the status of a webserver, monitoring software may periodically send an HTTP request to fetch a page. For email servers, a test message might be sent through SMTP and retrieved by IMAP or POP3.

Commonly measured metrics are response time, availability and uptime, although both consistency and reliability metrics are starting to gain popularity. The widespread addition of WAN optimization devices is having an adverse effect on most network monitoring tools -- especially when it comes to measuring accurate end-to-end response time because they limit round trip visibility.

Status request failures - such as when a connection cannot be established, it times-out, or the document or message cannot be retrieved - usually produce an action from the monitoring system. These actions vary -- an alarm may be sent (via SMS, email, etc.) to the resident sysadmin, automatic failover systems may be activated to remove the troubled server from duty until it can be repaired, etc.

Network tomography

Network tomography is an important area of network measurement, which deals with

monitoring the health of various links in a network using end-to-end probes sent by agents located at

vantage points in the network/Internet.

Route analytics

Route analytics is another important area of network measurement. It includes the

methods, systems, algorithms and tools to monitor the routing posture of networks. Incorrect routing or

routing issues cause undesirable performance degradation or downtime.

Page 58: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 55

Various types of protocols

Website monitoring service can check HTTP pages, HTTPS, SNMP, FTP, SMTP, POP3, IMAP,

DNS, SSH, TELNET, SSL, TCP, ICMP, SIP, UDP, Media Streaming and a range of other ports with a variety

of check intervals ranging from every four hours to every one minute. Typically, most network

monitoring services test your server anywhere between once-per-hour to once-per-minute.

Internet server monitoring

Monitoring an internet server means that the server owner always knows if one or all of

his services go down. Server monitoring may be internal, i.e. web server software checks its

status and notifies the owner if some services go down, and external, i.e. some web server

monitoring companies check the services status with a certain frequency. Server monitoring can

encompass a check of system metrics, such as CPU usage, memory usage, network performance

and disk space. It can also include application monitoring, such as checking the processes of

programs such as Apache, MySQL, Nginx, Postgres and others.

External monitoring is more reliable, as it keeps on working when the server completely

goes down. Good server monitoring tools also have performance benchmarking, alerting

capabilities and the ability to link certain thresholds with automated server jobs such as

provisioning more memory or performing a backup.

Servers around the globe

Network monitoring services usually have a number of servers around the globe - for

example in America, Europe, Asia, Australia and other locations. By having multiple servers in

different geographic locations, a monitoring service can determine if a Web server is available

across different networks worldwide. The more the locations used, the more complete is the

picture on network availability.

Web server monitoring process

When monitoring a web server for potential problems, an external web monitoring

service checks a number of parameters. First of all, it monitors for a proper HTTP return code. By

HTTP specifications RFC 2616, any web server returns several HTTP codes. Analysis of the

HTTP codes is the fastest way to determine the current status of the monitored web server. Third-

party application performance monitoring tools provide additional web server monitoring,

alerting and reporting capabilities.

Page 59: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 56

Practical – 9 AIM: Study of basic networking commands.

DESCRIPTION:

These are most useful commands in my list while working on Linux server , this enables you to quickly troubleshoot connection issues e.g. whether other system is connected or not , whether other host is responding or not and while working for FIX connectivity for advanced trading system this tools saves quite a lot of time .

finding host/domain name and IP address - hostname

test network connection – ping

getting network configuration – ifconfig

Network connections, routing tables, interface statistics – netstat

query DNS lookup name – nslookup

communicate with other hostname – telnet

outing steps that packets take to get to network host – traceroute

view user information – finger

checking status of destination host - telnet

Hostname hostname with no options displays the machines host name hostname –d displays the domain name the machine belongs to hostname –f displays the fully qualified host and domain name hostname –i displays the IP address for the current machine

ping It sends packets of information to the user-defined source. If the packets are received, the destination device sends packets back. Ping can be used for two purposes 1. To ensure that a network connection can be established. 2. Timing information as to the speed of the connection. If you do ping www.yahoo.com it will display its IP address. Use ctrl+C to stop the test.

ifconfig View network configuration, it displays the current network adapter configuration. It is handy to determine if you are getting transmit (TX) or receive (RX) errors.

netstat Most useful and very versatile for finding connection to and from the host. You can find out all the multicast groups (network) subscribed by this host by issuing "netstat -g"

Page 60: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 57

netstat -nap | grep port will display process id of application which is using that port netstat -a or netstat –all will display all connections including TCP and UDP netstat --tcp or netstat –t will display only TCP connection netstat --udp or netstat –u will display only UDP connection netstat -g will display all multicast network subscribed by this host.

nslookup If you know the IP address it will display hostname. To find all the IP addresses for a given domain name, the command nslookup is used. You must have a connection to the internet for this utility to be useful. E.g. nslookup blogger.com

traceroute A handy utility to view the number of hops and response time to get to a remote system or web site is traceroute. Again you need an internet connection to make use of this tool.

finger View user information, displays a user’s login name, real name, terminal name and write status. this is pretty old unix command and rarely used now days.

telnet Connects destination host via telnet protocol, if telnet connection establish on any port means connectivity between two hosts is working fine. telnet hostname port will telnet hostname with the port specified. Normally it is used to see whether host is alive and network connection is fine or not.

Page 61: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 58

Practical – 10 AIM: Installation and configuration of DHCP server.

DESCRIPTION:

Setup: Installing the DHCP role

- Start the Server Manager

- Click Add Roles and Features from the Manage Menu

Page 62: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 59

-On Add Roles and Features wizard begins and click Next

- Select the Role-based or feature-based installation option and click Next

Page 63: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 60

- If you have more than one server managed via the server manager console, then select the

desired server you‟d like to install DHCP on

- From the Roles lists, check the DHCP Server role, click Add Features on the popup windows

Page 64: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 61

- Click Next

- Select additional features you desire or leave as default and click Next

Page 65: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 62

- Keep in mind „Things to note‟ and click Next

- Confirm information on summary page and click Install

Page 66: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 63

- After install is completed, click Close

Post Deployment

- Click on the warning icon and then click on „Complete DHCP Configuration‟

Page 67: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 64

- On DHCP Post-Install wizard, click Next

- On Authorization, select a domain user account that has permissions to create objects in the Net

Services container in Active directory (For security lock-down) or simply use a domain admin

account and click Next

Page 68: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 65

- Confirm on summary page that the security groups had been created and Authorizing DHCP

server role done. Close the screen

For the security groups to come into effect, we need to restart the DHCP Server service

- Click on Tools on Server Manager menu and click on Services

Page 69: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 66

- Locate „DHCP Server‟ service, click on the Restart Service icon to restart the service

- Click on DHCP from Tools Menu on Server Manager screen

Page 70: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 67

- In the the DHCP mmc console, right-click on the DHCP Server and than click on

“Add/Remove Bindings…“

- Ensure the static IP address of the server should appear here.

Note: If you have more than one static IP, the DHCP server will bind to the first static IP

address configured on the adapter

Page 71: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 68

- Back to the DHCP mmc console, right-click on IPv4, and select New Scope

- Click Next on the welcome screen

Page 72: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 69

- Enter the new Scope Name details

- Enter the Start and End IP address, the Subnet mask, leave the Length as default ‟24‟ and click

Next

Page 73: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 70

- Enter your IP range in the exclusion list. You only need to do this if you have devices on the

network that require static IP address and also ensure that the excluded range falls with the Start

and End range earlier specified

- Enter desired lease duration for assigned IP‟s or leave as default

Page 74: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 71

- Select Yes to configure the DHCP options for the new scope

- Enter the default gateway if any (Required in Live environment)

Page 75: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 72

- The default Parent domain should be populated by default if the DHCP role is installed on a

domain-joined machine but not the case if installed on a workgroup machine. Add any other

DNS IP and click Next

- Specify your WINS Server if any

Page 76: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 73

- Select Yes to activate the scope immediately or No if you choose to activate later

- On completion, click Finish

Page 77: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 74

Practical – 11 AIM: Installation and configuration of DNS.

DESCRIPTION:

PART 1 - DNS SERVER INSTALLATION

To install a DNS server from the Control Panel, follow these steps:

From the Start menu, select Administrative Tools --> Server Manager.

Page 78: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 75

Expand and click Roles from the left window. Choose Add Roles

Follow the wizard by selecting the DNS Server role (leave any previously checked items checked)

Page 79: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 76

Click NEXT and then INSTALL to install DNS in Windows Server 2008

Page 80: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 77

PART 2 - DNS SERVER CONFIGURATION

From the Start menu, select Administrative Tools --> DNS to open the DNS console.

Page 81: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 78

Highlight your computer name and choose Configure a DNS Server to launch the Configure DNS Server Wizard.

Click NEXT and then select the first option, Create a Forward lookup zone

Page 82: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 79

On the next screen, leave the default option selected, This Server maintains the zone, and click NEXT

Now you will need to enter the domain name that you want to create your first zone file for. We are using "example.com" in this tutorial:

Click NEXT, and NEXT again on the next two screens

Page 83: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 80

On the Forwarders screen, select the option "No, it should not forward queries"

Click FINISH

Page 84: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 81

PART 3 - MANAGING DNS RECORDS

There are many types of DNS records, this is a basic tutorial and will show you how to point your domain name to the IP address you assigned to your web site via an A record. You can also create other types of DNS records (MX, CNAME,etc) in a similar fashion.

In DNS Manager, expand your server name, then expand the 'Forward Lookup Zones' , right-click on your domain name and select Properties

Page 85: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 82

Click on the Start of Authority (SOA) tab.

The SOA resource record is always the first record in a DNS zone. Set the Primary Server to your primary nameserver:

Next, click on the Name Servers tab.

Remove anything currently listed, and click Add and enter your nameservers (i.e. - ns1.yourdomain.com , ns2.yourdomain.com)

Page 86: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 83

When done, click OK to close the window. You are now ready to set up your zone records.

Right-click on your domain name under Forward Lookup Zones, and select New Host (A or AAAA)...

Page 87: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 84

Leave the Name field blank, and under IP Address, enter the IP address you configured for this web site in IIS, and click Add Host.

You will most likely also want to make a record for 'www', so repeat the above step but this time instead of leaving the Name field blank, enter www in that field:

Page 88: Computer Network(150703) - WordPress.com Introduction of Network communication devices. 12 / /14 4 Configuration of ... Computer Network VICT CE 2014-15 4 ... signal conductors usually

Computer Network VICT CE 2014-15 85

PART 4 - DISABLE DNS RECURSION

The final step you'll want to perform is to disable DNS recursion. This will help secure your

server from a variety of DNS recursion attacks.

To disable recursion, right-click on your DNS server and go to 'Properties'.

Click the 'Advanced' tab.

Then check the box labeled "Disable recursion"

Congratulations! You have now set up DNS in Windows Server 2008 and have set up DNS records for your domain name.