CND Practical 1 To 12

Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

Practical-1

Aim:- Analyze the type of network topology used in your lab and prepare technical
specification for it.

In our lab we use bus topology. Bus Topology or Bus Network is one of simplest Type of
Network Topology. Bus Topology consists of a single central cable. This cable is referred
to Backbone Cable in Bus Topology. All the Computer Network Nodes
like Server, Client and Network Device are attached to the Backbone Cable with the help of
drop links. The Backbone Cable is of chief importance in this topology. So, any form of
damage to it can stop the communication in whole Computer Network.
The simplest example of this topology is connection of landline telephone. Suppose you have
a two-story house and you want landline connection on every floor. Now answer one question.
Will you apply for two landline connections? The answer is simply no. Because if you apply
for two separate connections, it will become costly for you. In fact, you will only apply for a
single landline connection. After connection, you will run a main landline cable from the pole
to the ground floor and from the ground floor to the first floor.
Bus Topology Concepts and Features
Basic concepts are the foundations of everything. But if you talk about technology, basic
concepts are vitally important. So, in this section, I am going to explain the basic concepts of
this topology. These concepts will help you in understanding the working of this topology.

Backbone Cable
Obviously, as I mentioned earlier that Backbone Cable is the main component behind the
working of Bus Topology. This is a main cable that serves as the backbone of the Network.
The name Backbone is given to it due to similarity with human backbone. The Backbone
Cable serves the purpose of transmitting signals across a Network as human backbone is
responsible for the communication of neurotransmitters. This is usually a heavy duty cable for
supporting reliable communication. However, the Backbone Cable requires great deal of care
and you have to look after it to save it from damage. Any kind of damage to it can put
whole Computer Network at stake. Whenever, the there is some form of damage to the cable,
communication through it stops.

Terminator
You cannot leave the end points of a Bus Network open. This is because of the fact that it will
cause signal reflection. A signal reflecting from the end point may interrupt with the signal
coming from the opposite end. In order to deal such a situation, you need to put a Terminator at
each end of the Backbone Cable. The Terminator simply absorbs the signals and prevents the
back reflection. So the major motive behind the use of Terminator is to make
the Network error free and reliable.
Drop Link

Another important concept in Bus Topology is Drop Link. Drop Link is like a patch cable that
creates a path for signals to travel. A Network Node attaches to the Backbone Cable through
the Drop Link. One end of the Drop Link connects to the Backbone while other end attaches
to a connector. This connector is plugged into Network Interface Card (NIC) of any Network
Device.

Node
Any Client, Server or any other Network Device that is a part of Computer Network is
basically a Node. A Node can play multiple roles and the decision of the role depends upon
the activity and responsibility. Following are the common roles of a Node:

How Bus Topology Works?


Suppose a Node A wants to send to another Node D, and there are Nodes B and C in between
these two. Here Node A will be Sender and Node D will be the receiver. The data message
from A will contain D as destination address. Due to the Broadcast Communication,
the Nodes B, C and D will receive the data message. Now, when Nodes B and C receive the
data message, these will check the destination address. Clearly, the destination address will
not be same at both locations B and C. So, both of these will discard the data message. But on
the Node D, the situation will be entirely different. The Node D will not discard the data
message as the destination address and Node address are same. So, the Node D will keep the
data message because it is the intended receiver.

Advantages
 Makes it easy to establish and manage a small sized Computer Network.
 This topology is flexible enough to add/remove Nodes.
 It is less expensive form of Network Topology that requires least amount of cabling
and Network Devices.
Result:- In this practical we learn how to Analyze the type of network topology used in
your lab and prepare technical specification for it.
Practical-2
Aim:- Connect computers in bus topology and transfer the data.

Bus topology
A bus topology connects computers along a single or more cable to connect linearly as figure
1. A network that uses a bus topology is referred to as a "bus network" which was the original
form of Ethernet networks. Ethernet 10Base2 (also known as thinnet) is used for bus topology.
Bus topology is the cheapest way of connecting computers to form a workgroup or
departmental LAN, but it has the disadvantage that a single loose connection or cable break
can bring down the entire LAN. Termination is important issue in bus networks. The electrical
signal from a transmitting computer is free to travel the entire length of the cable. Without the
termination, when the signal reaches the end of the wire, it bounces back and travels back up
the wire.

WORKING
Suppose we have computer A, B, C, D. Each of them is connected with Node. Let us say
that Node A wants to send to another Node D, and there are Nodes B and C in between these
two. Here Node A will be Sender and Node D will be the receiver. The data message
from A will contain D as destination address. Due to the Broadcast Communication,
the Nodes B, C and D will receive the data message. Now, when Nodes B and C receive the
data message, these will check the destination address. Clearly, the destination address will
not be same at both locations B and C. So, both of these will discard the data message. But on
the Node D, the situation will be entirely different. The Node D will not discard the data
message as the destination address and Node address are same. So, the Node D will keep the
data message because it is the intended receiver.

Result:- In this practical we learn how to Connect computers in bus topology and
transfer the data.
Practical-3
Aim:- Connect computers in star topology and test the performance.

Star Topology
A star topology links the computers by individual cables to a central unit, usually a hub .When
a computer or other networking component transmits a signal to the network, the signal travels
to the hub. Then, the hub forwards the signal simultaneously to all other components connected
to the hub. Ethernet 10BaseT is a network based on the star topology. Star topology is the most
popular way to connect computers in a workgroup or departmental network.

Working
Working of Star Topology is really simple and straight forward to understand. In this Type of
Network Topology, there is no direct communication between different Nodes. Instead there
is a central device in the Network. This central device is responsible for receiving message
from the sender and transmit it to the receiver. As I have mentioned earlier that the central
device can be Passive Hub, Active Hub or a Switch. In each of the scenario, working of the
central device is little different. So according to working mechanism, we can divide Star
Topology in further three different types:

1. Passive Star Topology


2. Active Star Topology
3. Star Topology Using Switch

However, in all these three cases the Star Topology Layout is the same. What makes different
is the working mechanism of each one. Don`t get worried. I am going to explain each one in
detail in the coming section.

Result:- In this practical we learn how to connect computers in star topology and test
the performance.
PRACTICAL-4
Aim:- Install\Configure\Test Peer to Peer LAN and sharing of resource.
Peer-to-peer (P2P) computing or networking is a distributed application architecture that
partitions tasks or workloads between peers. Peers are equally privileged, equipotent
participants in the application. They are said to form a peer-to-peer network of nodes.
Peers make a portion of their resources, such as processing power, disk storage or network
bandwidth, directly available to other network participants, without the need for central
coordination by servers or stable hosts. Peers are both suppliers and consumers of resources,
in contrast to the traditional client–server model in which the consumption and supply of
resources is divided.

Peer to Peer Network Sharing


Step 1: Navigate to the Desktop.
Step 2: Create Your Folder.
Step 3: Navigate to the Folder and Open the Properties.
Step 4: Choose Who You Want to Share With.
Step 5: Sharing the Folder.
Step 6: Permissions.
Step 7: Open Control Panel.
Step 8: Network and Sharing.
Step 9: Advanced Sharing.
Step 10: Choose Home and Work / Public
Step 11: Select All Options.
Step 12: Go Into Network.
Step 13: Find the Device.
Step 13: Find the Device.
Step 14: Find the Folder That Was Shared.
Sharing Local Resources
Sharing Resources will allow you connect to another to computer to transfer files or use its
printer.

Enable your computer to share files and/or printers


1. Open up the Network Icon in the Control Panel.
2. You should see File and Print Sharing below the protocol.
3. If not, click on the File and Print Sharing button.
4. Click on the options you want to enable then on the OK button.
5. Click on the options you want to enable then on the OK button.

Sharing a Local Resource


1. Open up the Explorer.
2. Right click on the directory you want to share and select Sharing.
3. Type in the Share name.
4. Select whether Read, Full or Depends on Password.
5. Type in and agreed upon password.
6. Similar steps can be taken to share a printer.

Result:- In this practical we learn how to Install\Configure\Test Peer to Peer LAN and
sharing of resource.
PRACTICAL-5
Aim:- Configure point to point network.
A Point-to-Point Connection is a private data connection securely connecting two or more
locations for private data services. A point-to-point connection is a closed network data
transport service which does not traverse the public Internet and is inherently secure with no
data encryption needed. Point to Point connections are available in a range of a bandwidth
speeds including point to point T1, point to point Ethernet or point to point DS3. A point-to-
point connection provides unparalleled quality of service (QoS) as it is not a shared service (a
private line) and follows the same direct network path every time. Point to Point links are used
by businesses to provide reliable, secure point to point network data service for applications
including credit card processing, file sharing, data backup, point to point VOIP, and video
conferencing. A point-to-point network can also be configured to carry voice, video, Internet,
and data services together over the same point to point connection. Point to Point circuits are
also known as a Point to Point Link, Private Line, Leased Line, or Data Line.

Configure a Windows PC for a Point-to-Point Connection

1. Select an unused LAN network connection from the available network connections on
your PC.

From the Start menu, select Settings -> Network Connections -> Local Area Connection.

where Local Area Connection is an unused LAN connection.


Selecting the unused LAN connection displays its Local Area Connection Properties
window.

2. In the Local Area Connection Properties window, double-click on Internet Protocol


(TCP/IP) to display Internet Protocol (TCP/IP) Properties window.

3. In the Internet Protocol (TCP/IP) Properties window, configure the network for a
crossover connection.
a. Select the “Use the following IP address” option.

b. Type an IP address between 192.168.0.2 and 192.168.0.255 (for


example, 192.168.0.5).

Do not use 192.168.0.1, since that address is the factory default PDU metering unit
address.

c. Type 255.255.255.0 in the Subnet mask field.


d. Leave the Default gateway field blank.
4. Click the OK button in the Internet Protocol (TCP/IP) Properties window to set these
network properties.
5. Connect the PDU to the network.

Result:- In this practical we learn how to configure point to point network.


PRACTICAL-6
Aim:- Prepare patch code and cross connection cables use to connect the device to the LAN.

A patch cable, patch cord or patch lead is an electrical or optical cable used to connect ("patch
in") one electronic or optical device to another for signal routing. Devices of different types
(e.g., a switch connected to a computer, or a switch to a router) are connected with patch cords.
A patch cable, patch cord or patch lead is an electrical or optical cable used to connect ("patch
in") one electronic or optical device to another for signal routing. Devices of different types
(e.g., a switch connected to a computer, or a switch to a router) are connected with patch cords.

Crossover Cable
A Crossover cable is a type of CAT 5 where one end isT568A configuration and the other end
as T568BConfiguration. In this type of cable connection, Pin 1 is crossed with Pin 3, and Pin
2 is crossed with Pin 6.
Crossover cable is used to connect two or more computing devices. The internal wiring of
crossover cables reverses the transmission and receive signals. It is widely used to connect two
devices of the same type: e.g., two computers or two switches to each other.
In regard to physical appearance, Crossover Ethernet cables are very much similar to regular
Ethernet cables. Still, they are different with regard to the order with which the wires are
arranged. This type of Ethernet cable is made to connect to network devices of the same kind
over Ethernet directly. Crossover cables are mostly used to connect two hosts directly.
Here is an application where you should use Crossover Cable:
1. It can use a computer to a computer with no switch or hub.
2. Network devise to the network device. For example, the route to the router.
3. Crossover cable enables one to establish a direct connection between two computing
devices using Ethernet ports.
4. It Connects two computers directly.
5. You can connect two hubs/switches by using the normal port in both switches and hubs.

Result:- In this practical we learn how to prepare patch code and cross connection
cables use to connect the device to the LAN.
PRACTICAL-7

Aim:- Using a Hub/Switch Install a LAN network consisting of 6 computer.


Hubs and switches are inexpensive and effective devices that allow you to have multiple
computers in your home connected to the internet without having to pay for multiple internet
connections. Adding a hub or a switch to your network is very simple and can be done by even
a complete computer novice. Better yet, it won’t require adding wireless cards to every
computer in your home.

Hubs and Switches: Which to Choose


The difference between a hub and a switch is mainly one of intelligence.

Hubs
Hubs are the simpler and cheaper of the two devices. A hub’s job is to take information coming
from the network and pass it to all other computers. It pays no attention to what computers on
the network the information is intended for; it simply passes everything it sees to everyone.

Switch
network switch is networking hardware that connects devices on a computer network by using
packet switching to receive and forward data to the destination device. A network switch is a
multiport network bridge that uses MAC addresses to forward data at the data link layer of the
OSI model.Switches are more intelligent. They can learn which information is destined for
which computers and pass information only to those computers rather than every machine on
a network. They tend to be slightly more expensive than hubs. A hub is fine for most small
home networks consisting of five or less computers. If you have more than five computers, or
there are heavy internet users (online gaming or streaming video, for example), a switch will
reduce the network load and significantly improve network response.
Whichever you choose, just make sure you pick one that has enough ports for every computer
you plan to connect to it.

How to Install a Hub or Switch


Installing a hub or switch is easy. Because these devices are so simple, they do not need any
configuration on your part. All you have to do is plug them in to the wall socket and other
computers. To connect the hub or switch to your network, first take the ethernet cord going
from your modem to your computer, and plug the end that was formerly into your computer
into the port located by itself, usually labeled “up”, “in”, or “internet”. Then, attach a new
ethernet cord to one of the ports in the group of ports (it doesn’t matter which) and the other
end to your computer. Repeat for each computer you plan to attach to your network.
Instructions to Set Up LAN Network
Create Network
1. Identify the local services that you want available on the network. Identify network-attached
printers, network disk drives, any server that will share printers or disks.
2. Identify how many devices will have to connect to the network. Each device, server or
workstation will require a unique address.
3. Run cables to workstations where possible. A wired LAN will always get better
performance and be more secure than a wireless LAN. Wherever possible, run a cable to
servers, printers, IP phones or work locations. Run a cable to any area where you are likely to
work. Use standard Ethernet cables or building wiring as installed according to the TIA-568
standard.
4. Select and purchase a switch or cable router. The simple secure way to connect to the
Internet is to use a cable router. Many makes and models are available. If the model you choose
does not have enough ports to connect all of your computers, then you will need to purchase a
switch as well.
5. Configure the WAN port of the cable router. Configuration details will vary from vendor to
vendor. Key information you will need to configure the WAN port will be supplied by your
internet service provider.
6. Configure the LAN ports of your cable router. Most cable routers will act as a Dynamic
Host Configuration Server, or DHCP server. This means that the router will give addresses to
workstations automatically.

Be certain that the address pool has enough addresses for all of the workstations. Make certain
that there are enough addresses outside of the range for any hosts that need static addresses.
For example, a network address with a mask of 255.255.255.0 has a total of 254 hosts. If the
dynamic pool has 200 addresses available, that means the remaining 54 addresses are available
to give printers or servers static addresses.

Result:- In this practical we learn how to using a Hub/Switch Install a LAN network
consisting of 6 computer.
PRACTICAL-8
Aim:- Locate the error bit in the given data stream by applying the different error detection
methods.

Introdcution
In digital systems, the analog signals will change into digital sequence (in the form of bits).
This sequence of bits is called as “Data stream”. The change in position of single bit also leads
to catastrophic (major) error in data output. Almost in all electronic devices, we find errors
and we use error detection and correction techniques to get the exact or approximate output.

What is an Error
The data can be corrupted during transmission (from source to receiver). It may be affected by
external noise or some other physical imperfections. In this case, the input data is not same as
the received output data. This mismatched data is called “Error”. The data errors will cause
loss of important / secured data. Even one bit of change in data may affect the whole system’s
performance. Generally the data transfer in digital systems will be in the form of ‘Bit –
transfer’. In this case, the data error is likely to be changed in positions of 0 and 1.

Types of Errors
In a data sequence, if 1 is changed to zero or 0 is changed to 1, it is called “Bit error”.There
are generally 3 types of errors occur in data transmission from transmitter to receiver.
• Single bit errors
• Multiple bit errors
• Burst errors

Single Bit Data Errors


The change in one bit in the whole data sequence, is called “Single bit error”. Occurrence of
single bit error is very rare in serial communication system. This type of error occurs only in
parallel communication system, as data is transferred bit wise in single line, there is chance
that single line to be noisy.
Multiple Bit Data Errors
If there is change in two or more bits of data sequence of transmitter to receiver, it is called
“Multiple bit error”. This type of error occurs in both serial type and parallel type data
communication networks.

Burst Errors
The change of set of bits in data sequence is called “Burst error”. The burst error is calculated
in from the first bit change to last bit change.

Here we identify the error form fourth bit to 6th bit. The numbers between 4th and 6th bits are
also considered as error. These set of bits are called “Burst error”. These burst bits changes
from transmitter to receiver, which may cause a major error in data sequence. This type of
errors occurs in serial communication and they are difficult to solve.

Error Detecting Codes


In digital communication system errors are transferred from one communication system to
another, along with the data. If these errors are not detected and corrected, data will be lost.
For effective communication, data should be transferred with high accuracy .This can be
achieved by first detecting the errors and then correcting them. Error detection is the process
of detecting the errors that are present in the data transmitted from transmitter to receiver, in a
communication system. We use some redundancy codes to detect these errors, by adding to
the data while it is transmitted from source (transmitter). These codes are called “Error
detecting codes”.

Types of Error detection


1. Parity Checking
2. Cyclic Redundancy Check (CRC)
3. Longitudinal Redundancy Check (LRC)
4. Check Sum
Parity Checking
Parity bit means nothing but an additional bit added to the data at the transmitter before
transmitting the data. Before adding the parity bit, number of 1’s or zeros is calculated in the
data. Based on this calculation of data an extra bit is added to the actual information / data.
The addition of parity bit to the data will result in the change of data string size.This means if
we have an 8 bit data, then after adding a parity bit to the data binary string it will become a 9
bit binary data string. Parity check is also called as “Vertical Redundancy Check (VRC)”.
There is two types of parity bits in error detection, they are
 Even parity
 Odd parity

Even Parity
 If the data has even number of 1’s,the parity bit is 0. Ex: data is 10000001->parity bit 0
 Odd number of 1’s, the parity bit is 1. Ex: data is 10010001 -> parity bit 1

Odd Parity
 If the data has odd number of 1’s,the parity bit is 0. Ex: data is 10011101 -> parity bit 0
 Even number of 1’s, the parity bit is 1. Ex: data is 10010101 -> parity bit 1

Error Correcting Codes


The codes which are used for both error detecting and error correction are called as “Error
Correction Codes”. The error correction techniques are of two types. They are,
 Single bit error correction
 Burst error correction
The process or method of correcting single bit errors is called “single bit error correction”. The
method of detecting and correcting burst errors in the data sequence is called “Burst error
correction”.

Result:- In this practical we learn how to locate the error bit in the given data stream
by applying the different error detection methods.
PRACTICAL-9
Aim :- Install and test router, repeater & Bridge.

Router setup process


Step 1: Decide where to place the router
The best place for a wireless business router is in an open area of the workplace, as you'll
benefit from even coverage. However, sometimes it's not easy to find a space out in the open
because you must connect the router to a broadband gateway from your ISP (Internet service
provider), which is usually attached to a cable near an outside wall.
Step 2: Connect to the Internet
Attach the router to a cable - or choose a mesh router.
To solve the "long-distance" problem when connecting a router, you can use a CAT5e or CAT6
cable to connect the router to the ISP gateway's Ethernet port. Another option is to run Ethernet
cables through the walls of your office to the chosen central location for the router.
Step 3: Configure the wireless router gateway
In some cases, ISPs offer customers gateways with built-in routers. In most cases, these
combined devices are not built for business environments, nor do they have extra ports,
security, and other options that allow you to add services and expand networks as the business
grows.
Step 4: Connect gateway to router
First, turn off the gateway. If there is already an Ethernet cable plugged into the gateway's
local-area network (LAN) port, unplug the cable and plug it into your router's WAN port. Turn
the gateway back on and wait a few minutes for it to boot up. Plug in the router's power supply
and turn it on, again waiting a few minutes.
Step 5: Use app or web dashboard
The easiest way to continue with router setup is to use a mobile app if the router maker
provided one. If there is no app, or you'd rather use the router's web-based dashboard, connect
the router to a computer via an Ethernet cable.
Step 6: Create a username and password
To configure the router, you'll need to log in, using its default admin name and password. You
can usually find this information printed on the router itself, or in an accompanying user
manual.

Step 7: Create a Wi-Fi password


Just as most routers come with preassigned admin usernames and passwords, most also come
with preset Wi-Fi usernames and passwords. You’ll likely be prompted to change the Wi-Fi
username and password, but even if you don't see such a prompt, plan to do so quickly.

Step 8: Set up security


Many router manufactures provide security functionality to safeguard network and user
privacy. You can login into the web dashboard and enabling added security features such as
firewall, web filtering, and access controls to protect yourself from malicious traffic. You can
also set up virtual private networks (VPNs) for privacy.

Repeater Setup Process


 Choose a placement that is free of the same sorts of obstructions that can interfere with
your router's signal.
 Plug the repeater into a working AC power outlet in your chosen location within range
of your existing Wi-Fi coverage.
 Using a nearby computer or laptop, connect the repeater.

Testing
 When using a repeater the repeater usually will have the same SSID as your WiFi AP.
However, it will always have a different BSSID (think of it as of the MAC address of a
network interface).
 So, in order to tell to which device you're connected, you have to find a way to display
the BSSID you're (currently) connected to. While I was able to find a command for
windows which will show you all the known BSSIDs of a SSID:

Bridge process
 Download the Integration Bridge from Agile Manager and install it on a computer that
can access both Agile Manager and ALM.

 The bridge communicates with both applications, enabling data synchronization


between the two.

 If you are installing on a Windows operating system, install the bridge as a Windows
administrator user. You can run the bridge as a non-administrator user with the relevant
permissions.
Testing
 The actual response of a bridge to loads is usually better than what the theory dictates .
Factors that contribute to the load capacity difference include unintended composite
action, load distribution effects, participation of parapets, railings, curbs, and utilities,
material property differences, unintended continuity, participation of secondary
members, effects of skew, portion of load carried by deck, and unintended arching
action due to frozen bearings.
 Load testing is recommended by AASHTO as an “effective means of evaluating the
structural response of a bridge.”
 The purpose of conducting load testing on existing bridges is to evaluate their structural
response without causing damages.
 Therefore, load testing is usually conducted in a nondestructive manner and is
sometimes referred to as nondestructive load testing. The goal of this type of testing is
to compare field response of the bridge under test loads with its theoretical response .
RESULT:- In this practical we learn how to install and test router, repeater &
Bridge.
Practical-10
Aim:- Assign IP address to the PC connected to the internet.
What is an IP address?
An Internet Protocol (IP) address is a unique sequence of values separated by periods. Modern
IP addresses adhere to version 4 (IPv4) or version 6 (IPv6).
Example of an IPv4 address: 12.301.405.2
Example of an IPv6 address: 2001:0db8:5078:31c3:0000:0000:31fd:fe04
IP addresses are used to identify devices on a network. Private IP addresses are only visible to
devices connected to the same network, while public IP addresses are visible to any device on
the Internet.
Internet Service Providers (ISPs) assign public IP addresses to most routers. When a device
connects to a router, the device receives a private IP address.

Dynamic IP addresses
Every device connected to your home network is assigned a unique IP address. In most cases,
this is a dynamic IP address.
Dynamic IP addresses are temporary. When a new device joins a network, it is assigned a
dynamic IP address by a Dynamic Host Configuration Protocol (DHCP) server. The IP address
might change as additional devices join the network.
Dynamic IP addresses are useful for networks where IP addresses are limited and devices are
frequently added or removed.

Static IP addresses
A static IP address does not change. Static IP addresses are useful for hosting websites, sharing
large files, and remotely accessing devices or networks. Many businesses link their domain
name or server accounts to a static IP address.
Most users do not need to set a static IP address. However, advanced users and businesses
might benefit from a static IP address.
A static IP address is useful for hosting servers or websites and for sharing large files. For
more information about static and dynamic IP addresses.
To set a static IP address in Windows 7, 8, and 10:
1. Click Start Menu > Control Panel > Network and Sharing Center or Network and Internet
> Network and Sharing Center.
2. Click Change adapter settings.
3. Right-click on Wi-Fi or Local Area Connection.
4. Click Properties.
5. Select Internet Protocol Version 4 (TCP/IPv4).
6. Click Properties.
7. Select Use the following IP address.
8. Enter the IP address, Subnet mask, Default gateway, and DNS server.
9. Click OK.
Your computer displays a static IP address.

Result:- In this practical we learn how to assign IP address to the PC connected to


the internet.
Practical-11
Aim:- Configure/Test Internet connectivity.
Checking the internet
The first thing you should try with your internet connection is the same thing your ISP will
tell you if you call them. Unplug your cable or DSL modem, whatever, wait for minute, and
then plug it back in. Give it another minute and then see if your internet is back on.
No? Then, do the same exact thing with your router. Still nothing?

Then, grit your teeth and call your ISP. This is usually a pointless exercise, but every now and
again you can get useful information. Maybe it's not just you but your whole neighborhood
that's having problems because a back-hoe took out a cable. And, once in a blue moon, they'll
have a helpful suggestion. No, really! I've seen it happen!

If worst comes to the worst, they'll finally agree to send someone out to look at your setup.
Who knows, instead of one of your cables being disconnected, maybe one of their cables is
busted. Physical problems are often the root to network problems.

That was the good news. The bad news is I've never known an ISP technician to show up on
time. Be ready for a long, long wait. Eventually, if the problem is on their end -- and the key
word is eventually -- they'll get it fixed.

Let's say though that your internet is up and running, but it's being a little flaky. Here's what
you do.

First, let's see if you're getting the bandwidth you're paying for. The best site to check on your
current real speed is Speed test. This site is run by Ookla., a network performance company.
It gives you your download speed, upload speed, and ping to the closest test.

To configure internet connectivity:

1. Click Configure Internet (if not configured at all), Add (for another internet
connection), or Edit.

The New or Edit Internet Connection window opens.

2. Configure the fields in the tabs:

Configuration tab

Note - When you change the connection type, the appliance may disconnect from the internet.

 Connection name - Enter a name for the connection or leave the default "InternetN"
label (where N indicates an incrementing number).
 Interface name
 WAN or DMZ is for most types of Internet connections.

Note - DMZ is not supported in 1530 / 1550 appliances.

 LAN. You can also use unassigned LAN ports with no VLANs for internet connections.
When you delete the internet connection, the port reverts to an unassigned LAN.
 Link aggregation (Bond) - Create a link between two or more interfaces. This
improves performance and redundancy by increasing the network throughput and
bandwidth.
 ADSL/VDSL. If you select the ADSL/VDSL interface, you must select one of these for
the connection type: PPPoE, IPoE - static IP, or IPoE - dynamic IP.

You can create a maximum of 32 internet connections. This includes alias IP connections.

Note - If you remove or disable a LAN, any assigned alias IPs are also removed.

Unassigned LAN ports use case - If your company is in a region where internet connections
supplied by ISPs are unreliable and experience multiple disconnections, you can connect your
appliances to multiple internet connections from different ISPs.

Result:- In this practical we learn how to configure/test internet connectivity.


Practical no.12

Aim:- Use FTP protocol to transfer file from one system to another system.

File Transfer Protocol (FTP)


The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer
of computer files from a server to a client on a computer network. FTP is built on a client–
server model architecture using separate control and data connections between the client and
the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally
in the form of a username and password, but can connect anonymously if the server is
configured to allow it. For secure transmission that protects the username and password, and
encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File
Transfer Protocol (SFTP).
The first FTP client applications were command-line programs developed before operating
systems had graphical user interfaces, and are still shipped with most Windows, Unix,
and Linux operating systems. Many FTP clients and automation utilities have since been
developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated
into productivity applications, such as HTML editors.

How to Use FTP to Transfer Files Between Servers and Local Machines
The File Transfer Protocol (FTP) is a set of rules that computers on a network use to
communicate with one another. The tool allows users to transfer files over networks such as
the internet. This article explains how to;

 Create FTP user accounts


 Use different methods, including command line, web browser or an FTP client to connect
servers or computers and transfer files.
 Copy files between servers and local machines.
 Copy files between two servers
To transfer files using FTP, you require to an FTP server, a user account, and an FTP client or
application. Generally, most FTP servers require a username and a password in order to make
a connection. However, some servers may allow users to connect as anonymous users with no
username or password.

The common methods of making an FTP connection are;

1. Username and password Login: This is a restrictive method where only users with an account
can access the server. This is common when there is a need for users to upload or download
files to and from the server.
2. Username only: Some sites only require a username to access. However, this will only allow
downloads and not uploads
3. Anonymous FTP access: This does not require the user to enter a username or password and is
the easiest. The access is usually for sites where users can only download files such as forms,
software, and others.

Creating FTP User Accounts


1. Log in to the domain cPanel
2. Navigate to Files and click FTP accounts

3. Type in the username and password for your new account in the Log In and Password boxes.
If you have several domains in your cPanel account, ensure that you select the correct one
where you want the FTP account
4. Type in a directory if you want different one from the default
5. Specify the disk space if you want something different from the default 2000MB. You can
either type in the disk space, or select unlimited at the Quota section at the bottom.
6. Click Create FTP Account.
Different Methods of Using FTP to Transfer FIles
The three common methods are
 Web browser: Does not require a client and works directly from the browser, most used for
downloading files from the server.
 Command line FTP: All major operating systems have FTP client’s functionality available
as a command line.
 A GUI FTP client: These are usually easy-to-use third party application that allows users to
connect and transfer files over FTP.

Connecting to an FTP Server on a Web Browser


The web browser method works the same way as a website. However, instead of typing the
HTTP at the address bar, you replace it with FTP.
With the browser access, you do not need a client. You simply type the FTP server at the
address bar in this format: ftp://yourserver_name.com or ftp.yourserver_name.com

Connect to an FTP server with a username and password on a web browser

1. Open the browser (in our case we will use Firefox)


2. Type the FTP address of the server you wish to access. The syntax for FTP addresses is
ftp://ftp.domain_name.com or ftp://domain_name.com
3. Dismiss the error dialogs the server returns if necessary.
4. Type the FTP username and password in the Log On As dialog prompt
5. Click OK or Log In to access the server (depending on the type of browser).

Result:- In this practical we learn how to use FTP protocol to transfer file from one
system to another system.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy