MCIT201 (Information Security System)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Department of Information Technology

Lab-III (MCIT-206)

MCIT201 (Information Security System)

S.N Experiment Page


Detect ARP spoofing using open source tool ARPWATCH 2
1
Download and install nmap. Use it with different options to scan open ports. 6
2

MCIT205 (Mobile Computing)

S.N Experiment Page

1 To implement Code Division Multiple Access (CDMA). 11

2 Study of GPRS services 13

MCIT202 (Distributed Computing)


Experiment No: 1
AIM: Implement Network File System (NFS)

LOGIC: Implementation of Clustering using MPI_CH2

Steps:
 Set up Network File System (NFS)
 Set up Secure Shell (SSH)
 Set up Message Passing Interface (MPI)

Requirement:
2 machine running Linux
 Set up Network File System
 Set up Network File System

Consider we have two host machine with ip 10.10.3.4 and 10.10.3.3; Now I want to make
10.10.3.4 as server and rest as client then to implement NFS file system between this two follow
the following steps:

Step 1: Host with ip 10.10.3.4 edit following file as given in /etc/exports put entry /home
10.10.3.3(rw, no_root_squash) //we want share home directory to client

in /etc/host.deny put entry portmap:All

in /etc/hosts.allow put entry


Portmap: 10.10.3.3
lockd: : 10.10.3.3
rquotad : 10.10.3.3
mound: 10.10.3.3
statd : 10.10.3.3

Step 2: Execute following set of command from root on both machine to start the daemons.

rpc.portmap
rpc.mountd,
rpc.nfsd
rpc.statd,
rpc.lockd
rpc.rquotad

Step 3: Client machine execute following command to mount server directory on client machine

2
(If possible make firewall off).

mount 10.10.3.4:/home /mnt/newhome


where 10.10.3.4->server host
/mnt/newhome----directory on client to which server directory /home will be mounted

Page 3
MCIT204 (Soft Computing)

Experiment No: 1

Aim:- Write a program to implement Hebb’s rule.


#include<<iostream.h>>
#include<<conio.h>>
void main()
{
float n,w,t,net,div,a,al;
cout<<”consider o single neuron percetron with a single i/p”;
cin>>w;
cout<<”enter the learning cofficient”;
cin>>d;
for (i=0;i<10;i++)
{
net = x+w;
if(wt<0)
a=0;
else
a=1;
div=at+a+w;
w=w+div;
cout<<”i+1 in fraction are i”<<a<<”change in weight”<<dw<<”adjustment at=”<<w;
}
}

Output:

4
Page 5
MCIT204 (Soft Computing)

Experiment No: 2

Aim: Write a program to implement of delta rule.


#include<<iostream.h>>
#include<<conio.h>>
void main()
{
clrscr( );
float input[3],d,weight[3],delta;
for(int i=0;i < 3 ; i++)
{
cout<<”\n initilize weight vector “<<i<<”\t”;
cin>>input[i];
}
cout<<””\n enter the desired output\t”;
cin>>d;
do
{
del=d-a;
if(del<0)
for(i=0 ;i<3 ;i++)
w[i]=w[i]-input[i];
else if(del>0)
for(i=0;i<3;i++)
weight[i]=weight[i]+input[i];
for(i=0;i<3;i++)
{
val[i]=del*input[i];
weight[+1]=weight[i]+val[i];
}
cout<<”\value of delta is “<<del;
cout<<”\n weight have been adjusted”;
}while(del ≠ 0)
if(del=0)
cout<<”\n output is correct”;
}

Output:

6
Page 7

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy