0% found this document useful (0 votes)
43 views

Data Communication and Computer Network Manual 4 To 17

Best of All

Uploaded by

Akhilesh Pansare
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
43 views

Data Communication and Computer Network Manual 4 To 17

Best of All

Uploaded by

Akhilesh Pansare
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 27
Practical No: 4 Connect Computers Using Wireless Media practical Signi ould be able to connect Computers using wireless media, at Program Outcomes (POS) : i : t,__ Discipline knowledge: Apply computer engineering cscplne specitic knowledge to solve core computer F jrenng relate problems, BoP Experiments and Practice: Pian to perform experiments and practices to use the results to solvebroad £ gs computer ensinering problems pe Engineering tools: Apply relevant computer technologies and tools with an understanding of the imitation. £ communication: Communicate effectively in ral and writen form, {Competency and Practical Skills This practical is expected to develop the following skills in you. To create simple wireless network, . To configure the Wireless router. ' | Tocreate wireless access point. y. Relevant Course Outcomes: Analyze the Tunctioning of data communication and computer network. Practical Outcome (POS) : Understand working of wireless network, Understand concept of wireless access point. ‘I. Relevant Affective domain related outcomes: Follow safely measure. Follow ethical practices. TL Minimum Theoretical Background: Proposition 1. Wireless Network {A wireless network is type of computer network that uses wireless data connections for connecting stwork nodes. Wireless networking is a method by which homes, telecommunications networks and enterprise tallations avoid the costly process of introducing cables and other networking devices into building. Wireless telecommunication networks are generally implemented and administered using radio jommunication. This implementation takes place at the physical layer of the OSI model network structure. Example of tireless network includes cell phone networks, Wi-Fi local networks and terrestrial microwave networks. iarastia Sia Goard of Technlea Education @ Scanned with OKEN Scanner eee for the pass?! m york and it wil PO e y connected 10 the Wireless networ, The Jice will be al yer within range. rase DeViC® 13. Enter wireless passph™s ria wi acrnatic aly conn \ ‘stored in devices memory seer NEEWON aa Conmuncaten Com nrase Select wireless ne Vill, Resources Required? # Asset of computers with U Wireless router, wireless n° © Mobile, modem dated configuration work adapter: IX Precautions: © Handle carefully network devices. © Follow safely Practices. X. Question for confirmation of learning ¢ : en hate sa het working hare wane devite io aeaee a wired network - AL person onen network isa network fey i ec ten ie 2 . ‘+ Which are different security options available within configuring router? -unsecuyed WPAN, WPA2 WEP XI Conclusion: 1. Wireless network is more preferable in \ReIS ove able to shaye files t x othe With other device thot SCMTeTfae ree 2 Advantages of wireless network are ) Exeedom fiorn Wives q 4 Eosy te setup J Bette: 2 ov yop Fate ena ove Ove 109 € re laharashtra State Board of Technical Education @ Scanned with OKEN Scanner Data Communicavon Com \ " XIL Questions: Waite answers to 0 What is wireless network? a a __(Teacher shall allot the questions) ‘What is ad-hoc network? What is flooding? Compare wireless network with wired network? List the advantages of wireless networking? What is wireless network adapter? What is wireless network adapter? Expiain how cellular networking works? r A_wiveless neiwosk is a compuber network thob uses wiyeless Aotn cepnection pet”? networle _nooles. 2__A wireless adhoc petwarle or mobile adic S..o...decentralized yess af wie : k __oadhoc nob_vely ono. _pies. enstinginfiasbuctuxe. such_o® youters in wired. networks a) Flood ng is aed to. _come tex__sSnet works _ setaling = -algouithm in which every Incoming. os mough every outgoing one it onrived on. ig_used. 4 In bridgth gin 05. usent & peer to” peey £ \ashira State Board of Technical Education @ Scanned with OKEN Scanner Acmwelesss network intert i worl ey Wich fac cts to iy- less networks, auch oS wifi ov bluth- “odyathey tnon g- wired network, such’ 2 a_tokey ying ar étheynet- Nol J _ A users mabil@“felephone cammu- WiEA an Se tye nicated through #he aly Sommuny tons - ; tothe cevves ponding — faatly on Abe fixed ne twmie oa Ui tations. Manarashira State Board of Technical Education @ Scanned with OKEN Scanner : iscipline spec sient sou 27" ecyines yer engineer" eae ¢ Pro yo " Lae a ind practice: 4s ents and pi Use the engineering sees + Experiments HES puter toonnoiogies Nd TOFS WN a Ung based computer ere apply 12eVAM CO” oral and weiter [07m en > Engineering tools: "FF. effectively Communication: Comme oe y and Practical ing skills in you. LIL, Competency ed ve rey a develop te Flint s! y This practical is & a ume a progam far CRC ar IEC” = To gain knowledge about CRC. IV, Relevant Course Outcomes: i to IEEE standatrds ‘Analyze the transmission errors with respect Vv Practical Outcome (POS): Understand working of CRC. Understand concept af CRC. Vi. Relevant Affective domain related outcomes: * Follow safely measure. ° Fellow ethical practices. VI. Minimum Theoretical Buekground: Pi Foposition 1. Cyclic Redunvtancy Check (eRc) USE they are simple to mot ween two numbers tena 3 Inout second number yn” ray 9 4 Atier in, Wut of both n, Limberg he number of digits fi “St arrayini}iand numer @ Scanned with OKEN Scanner yee! 5 (its east esis itchacardep ten y I Beuan Dena bop tabi) Haananenme att anteona nasa Nars@ete aaah} InaEnica nce aaaeyuLtna} Maranon SEES Vil. Resources Required: ‘© A set of computers with updated configuration. © Turboc. © Transmission media and connector. VIII Precautions: © Handle carefully network devices. Follow safely Practices, IX. Question for confirmation of learning: + What is CRC? CRC_for cyclic Pe quedaary check L's 4 type of _enis delectin cole eed i rene g OQ “digito) “Comet net wsatles 4 How to check error with CRC, . + Explain importance of CRC. Maharashtra State Board of Technical Education @ Scanned with OKEN Scanner pata Communication Computer Network (22414) Financ roel transactions medical yecaxrd: 2) 5 ave’ ym e ree t ; a : 2 : BANS time. ¢ vesoince Oucing need fo-v ip, o af ntiy . i can improve. ystem ef itpntly ¢& ve duce vik Roe le ‘ - aye eC tabs. yor ef to Ye y ily in Store by rdentifyng & correcting weyvors th yt pccured duying trang - mission . This eneguves thot dota con be yetvieved & Used acthrately i'n fybure ea S r Ie i cause, arp Lib 1 AY Pv. umibLed deta can uist of Student Team Member 1 2 4 3 Dated Signature Marks Obtained of Teacher Process Related (15) | Product Related (10) | Total (25) \a S qa DEG iaharashira State Board of Technical Education @ Scanned with OKEN Scanner ‘Data Gonvnunicabion Computes Network (22414) Practical No: 6 Create a Network Using Bluetooth tical Significane ‘Student should be able to create a network using Bluetooth, IL. Relevant Program Outcomes (POS) a tcl "eae * Discipline knowledge: Apply computer engineering discipline specific knowledg Core Comp, ‘engineering related problems Exporimonts and Practice: Plan to perform experiments and practices to use the results to solvate. based computer engineering problems, ° Engineering tools: Apply relevant computer technologies and tools with an understanding ofthe lini. * Communication: Communicate effectively in oral and written form. 1. Competency and Practical Skill This practical is expected to develop the following skills in you. * To create a network using Bluetooth, * To gain knowledge about wireless network IV. Relevant Course Outcomes: ‘Analyze functioning of data communication and computer network. V Practical Outcome (POS) : Understand working of Bluetooth, Understand concept of wireless network and Bluetooth, VI. Relevant Affective domain related outcomes: * Follow safely measure. ° Follow ethical practices. Vil. Minimum Theoretical Background: Proposition 1. Piconet A piconet is the type of connection that is formed between two or more Bluetooth-enabled devices such as ¢ cell phones or PDAs. Bluetooth enabled devices are "peer units” in that they are able to act as eitherr or slave. However, when a piconet is formed between two or more devices, one device takes the role of the in and all other devices assume a ‘slave' role for synchronization reasons. Piconets have a 7 member address so bits, with zero reserved for broadcast), which limits the maximum size of a piconet to 8 devices, i.e. 1 maste: slaves. Proposition 2. Scatternet A scattemet is a number of interconnected piconets that supports communication between more than 6 Scatternets can be formed when a member of one piconet (either the master or one of the slaves) elects to pa" aa slave in a second, separate piconet. The device participating in both piconets can relay data between me of both ad hoc networks. However, the basic Bluetooth protocol does not support this relaying - the host sot cach device would need to manage it. Using this approach, itis possible to join together numerous piconets itt Scattemet, and to expand the physical size of the network beyond Bluetooth'slimted range. Alihavashira State Board of Technica Eaveaton @ Scanned with OKEN Scanner pate Communication Computer Network (22414) vit. Stepwise Procedure: ‘Tuin on the Bluetooth of the mobile device. You can locate the Bluetooth on and off button on the “Settings” menu of, the device. Go to the “Start” menu of the PC and click on “Control Panel.” Look for the option “Add device” and click or it Search for the other device. Pair the computer to the mabite device VII. Resources Required: Asset of computers with updated configuration, © Mobile phone. ‘© Transmission media and connector. VIII. Precautions: ‘© Handle carefully network devices. - Follow safely Practices, XII. Questions: 1. What is wireless network? 2. What is piconet? 3. Whats scatteret? i) fl _wiyeless n/w--are commonly used or mobile dewee "Such as smoayh phone 4. laptops .They uses. wireless data connection between p/w athat yely 6n physica] conmnection between" devices wireless nw uses xodio woves infrared | leht : 1 ive] : NC data between device Ivelegg n/w can operale in a tet on con —lse vorriouS protocols such ag wrt) —blueboo th anol cellulay n/w. They ore. ‘aharastira State Board of Technical Education : @ Scanned with OKEN Scanner , SE ee sor network (22414 $$ “eeqvey aclvantage f Slucling PA : ; Sal lat 1% 7 weve they avs —___ “configtaa tio pHa such —as_ r \ ese R sO ee * blue boo ~ L Ja = Small nw of enable > J a thot cae ao_connected fegecuthe> * ¢ te + cinnony clovice® such Sinai tp hone. ie DC + 2 F 22. € ets con be foymed. * + 0 Fea hype af meleas niw in whith ~ R mulbigle independenk pvcone b Ore. _inter- + Connected te fom 9 Jong n/w . Tb P allow blue tooth enabled devices to * communicate anol Share data over < Jonger_dis once “anol mave Complete. aR config. thus aingle p ieanol. 8 r % . In SeatterneE deyite cop Particiogte In_mulbiple prcone et simi | toneoues in a2 maste,“in one PlCone t Ong Slave in 9 “TAS allows is = exchange clo tow commun reate witth 7 ey " 5 - 7 eS} (US: u List of ttdont Team Rapes ELEN use g : 4 2—_ ‘ 3 Pp Product Related (10) Total (25) “ashtra State Board of Technical Eiacasp———_ Dated Signature * of Téacher @ Scanned with OKEN Scanner ‘tn communication Gemputer Network (2414) Practical No: 7 Share a Printer and Folder in Network Practical Significance : 4, Student will learn to share a Printer and folder in network. Relevant Program Outcomes (POS) : «+ Discipline knowledge : Apply computer engineering discipline specific knowledge to solve core computer ‘engineering related problems, Experiments and Practice : Plan (o perform experiments and practices to use the results to solve broad based computer engineering problems. + Engineering tools : Apply relevant computer technologies and tools with an understanding of thelimition. 4 Communication : Communicate effectively in oral and written form. + [. Competency and Practical Skills : 4 Ability to share printer in network. 4 Abily to share folder and file in network. Relevant Course Outcomes : + Configure various networking devices resources required. Practical Outcome (POS) : + Understand use of resource sharing. 4 Understand use of printer and folders in network. Relevant Affective domain related outcomes : + Follow safely measure. “+ Follow ethical practices. - i = e iit LENT Pam Job 3 i ne ie (rst come First Served) ‘CLENT Star topology using Switch / Hub @ Scanned with OKEN Scanner Data Communication Computer Network (22614) IX. Resources Required : © Asset of computers with updated configuration. © Network of computer of above configuration © Printer IX Precautions : © Follow safety practices, © Handle networking devices carefully. X Results : it formation for followin, * Student shall connect computer in star topology ina laboratory and write the info thing, in the given tabie as per observations: Total Printers available in Laboratory 5 Name of System on which printer 03 Wirduws locally installed Name of the printer that shared HY Losey jel Micrs In network Name of Folder with full path that \e shared in network Des\ % XI_ Practical related questions ; (Student shall write answers to these questions independently in the laboratory itself to have self-teedback ) F tie names of various system resources? “7 Ee guest ines _ Merny wapped. pH Fok i i ote anne hea. file Acorn au bey * How to check is a ‘ghb chek printer or folder shared in a network dhe. grrin be yeu XU Conclusion : 7 * APrinteristype ot My Lis oy) cPhysicaivinua resource * ‘A resource can be share if two systems are in__Yre + wy (Same taboratory/Network) Within small organization resources shared in__Tn leon €.AInternevinteret) State the types of different files that are shared oc mult! sone toe scannet ip a network using folder snaring SANS. £ Naw. al ins cy printer) pachnes. Manarashtra State Board of Technical Education @ Scanned with OKEN Scanner xpi Industrial Appl Inindustry acce: remote databs itis an import communication tke e-mail 4 Resource sharing provides hig emote information is py 'e NetWork irrespective Aspect i. eet or organization ty IN rellabilty by having alten Questions: ‘source of data WeteanswerstoQ ig o 4. Define Network, 4 —___(Teacher uhail allot the questions) xv. Which are features of computer network? 3, _ Define system resource 4. Give the examples of physical and vitual resource 5. Define resource sharing and state its needs 6. Enlist the diferent network devices use in laborato 7. Give advantage and disadvantages of Printer shan, 8. Give advantages and disadvantages of folder sharing, 9. How security Is measure issue in resource sharing? : How firewall can be 10, How ; Used to maintain security of resources that are shared in network? 11. Which are different privileges associated with folder? ive 2 pointes differ it 12, Give? pointes difference between folder sharing and filesharing wrt meaning and security. P| ne: communication. networks | micyowove networks. 3_anadhet network thal user devices ‘achira State Board of Technical Education @ Scanned with OKEN Scanner — A n16,n.tzer. phyarcal channel Coynch Ing. SL, comiman_clec. Kane Oe Dated Signature OfTeacher | PP —— 3% @ Scanned with OKEN Scanner ee ost resources Required rt ae Requirement '*a¥are requirement for Windows 2008 server processor Minin Recor, SH 88 processor) fecommend oF 1.4GHz (x64 processor) Note : An | Ss 2GXz or faster Intel Pati Platiumnnege in 2 Processors required for windows server 2008 for Memory Mi ‘Systems, inimum : 512MB RAM Pesos 2GB RAM greater laximum (32-bit syst toms) : Datacenter) 8): 4GB (Standard) or 64GB (Enterprise and Maxim lm (64-bit systems): 32 GB (standard) or 2TB (Enterprises, Datacenter jlable Disk and Plantinum - based Systems) token Minimum : 1068 Space ssonmenies: 4068 or greater Note: Computers wih more than 1668 of PAM will require more disk g Pace for paging, hibemation, and dump fles ee DVD-ROM drive : isplay an i ee Super VGA (800 x 600) or higher-resoution monitor Keyboard, Microsoft Mouse or compatible pointing device X Precautions : © Follow safety practices, Handle networking devices carefully XI Observations : Hardware configuration for the Windows server 2008 is different than the Desktop Computers. ‘© Network Operating System shall use NTFS Partition, * After each phase during the installation process, system is automatically rebooted. XII_ Practical related questions : (Student shall write answers to these questions independently in the laboratory itself to have self-feedback.) ++ Which edition of Windows server 2008 is selected for instalattion? togealher. 7 *WATSSoSe eS nagamme,-evpenence 32y!tabilidy Avetlabritly of TOL. Sichecking 220 Type of installation of Windows server 2¢ ivailable are J seuen cere installotiop, Maharashtra Stale Board of Technical Education i @ Scanned with OKEN Scanner XIII Conclusion = ‘sucoesstny installed win jd nite © * p shall perform only one allotted activiy Y feo m of stu shall supervise ; ='2008 standard econs ‘with upgrade oPtion- XIV Exercise : Teacher shal form the folowing. Teach Install the Windows Sor Upgrade the windows serv as instal the Windows server 2008 Enterprise editions. Install the Windows server 2008 Datacenter Edition. XV_ Questions : camel o 8 (Teacher shall allt the Soa rman space requirement or windows 2008 server? ‘Weston What is main purpose to use server? ditferentiation between server 2008, 2008 and 2012? — available in windows server 2008? tical dee process is difers for windows server 2008 as compared to wind Sate rent editions of windows server 2008 differ from each other. OWS Serra st down advantage of Windows server 2008. : i List down advantages of Windows server | 2008, 3 an Client Server terminology. ‘ompare the features of diferent Sever Operating Sy: siems? four groups jer 2008 1 2, 3 4 5 6 7 8 9 @ Scanned with OKEN Scanner ~~ otatton..alo : joe Se i che SOLE faoienie a ncorm.ablon. fe mputer Lag b Fa Serle compktle....._the PULLS ag o PYOVIAING “piherto. ran Ne bwork 9s) he.e..0.bhet S vIele.tn La ae on “20c.h : i : ae BPI VICE nm Ce. which ton...loe..0D$ ho.d......bo.4b——— yelees.e.,. NOW... ver stay bed. y-bh... [S__a 6. Ai bto.n5___1ne ~s.Lanclard. fo.tg.e... Marks Obtained Dated Signature of Teacher Process Related (15) | Product Related (10) | Total (25) yl 3 a | Sexns ; Board of Technical Education @ Scanned with OKEN Scanner i learning? TX. Question for confirmation of learn ys loroge saver iso compiler or _STOrahe —_ SON Et yes ond Shane —L17® tues a soon sree era sONE, aa, bin a client &Sev vey 15 - oo een mand in FIP. god tn FTP to common cS Ante canpnec tian ‘ el li 3 AG mond Eo he sewer which reso nds th TP oadeyveas and port number. The Sttent Lhen comectS ty the Sever Using that addvess ond Park trang ery t.- Ths mode is useful when khe clrent behind a ftewa |} OY NAT router hat blocks incamsng connection. The PASY Command ensure that the data Connection oa wished out any ages is with uch SCOnOriDg | 15 Marks Obtainea Process Related (18) | p;44 . 2-7 T Datea Signature Product Related (1 9) | Totaias) | OF Teacher ] i Yate Board of Technicw! Eaucation @ Scanned with OKEN Scanner comes © nurenPr =. arcane meres errs | Taree es Etre Se Sie ssege ovens esd ec geree to eur Foe 2nd RITES E EM, “we A Dearne Tae aan noes | XVI Questions : Write answers to Q. Q. Q 4. What file server?. 2. List file services. (Teacher shall allot the questions) 3. Wite the procedure to configure cient to file server. —) TE Sess a cometary Sytem Ehot Stores ond monoge frle ancl folder fo nin user, Th provide am reniral leocotinn wWheve usey Con Shay Store ee eee on erm use _ty access the apm fille ‘le vey ‘cal! use _chlent sewer orchitectine .Where _ The sewer monoge the § tov 2 a 22 trivgl Peeietanwee elon te cenne | Maharashtra State Board of Technical Eeucation @ Scanned with OKEN Scanner by h | ae} ake ‘09th Credential for th® fre you won bb pmmpbed . “A owgobe te i want hike Ehe oivectoy an Ehe file “E the 5) Dr LU ae Compute, to the file Seyver 17 - litof Student Team Member iMonish Pingale 2 3 Dated Signature Marks Obtained ted Sanat Process Related (15) | Product Related (10) | Total (26) ee we] 2 LA] aie 3 "Sale Board of Technical Education @ Scanned with OKEN Scanner om OS Cify re ly. It's usualh an unused. 1 gave of APP. ally at the bottom, then, 'P address, do so before proceeding re comeuter- 96. This wa Save your char \d apply your new IP pr gest 125407 YOUT COMPULE forthe — nges an ay co 92S to take place, an at is diference between static ang 1. Wr do IP addresses change? 2 dynamic address? tis dy 3 Wn dynamic adarcascp re ic ada cher shall allot the questions) L [ “5 hon nated dynomie 3 _Senodically Bunwmic addrese are often ips A in Wheyve Theye ose lnyge levires that mesg ta cannech be c : devices neer) to marntal'n -A consistent feo oxi use ty! wre Da ine tomimpp P9650 n fe when 9 dove "5 — move bp cifferenb —n/w uch Oo connec bing w ocifferenk n/y 1S ase ER elevic % may be ghed o new TP addres by eee An atner yeoson 1 when JP 7 = mic TP addre assigned by “DHCP 5 oyu Tk dy namie Le —adees tegen o fo Simms —eddeess Bea ot aa arryeent ee L “seme Satesouy orca Eoveson @ Scanned with OKEN Scanner ieee eS, com, and verny or2at0.kim. So, W 1 Right click your DHGP Server (0 5. Activate Seope ane. | Expand IPv4, if necessity in the left 7 ie * Click Scope[72...] to display Content ie ter pane. {1-Click each item under IPV4 and view itn : 7 Notice that there are populated and unpopU! iat © Right click Scope[172...] 0 Click Activate. + Right click Scope[172...] Notice it says Deactivate, VIII Question for confirmation of learning + tory itself (Student shall write answers to these questions independent in the laboratory itself to have Selecta, + Which types of IP addres suai ot WYtHTR CAN DHCP AS 31g 17 tou_each device Path Serutes erie § nso ‘ Which types of service(connection oriented connectior ONSENTOS ony © IX Conclusion) UPR OF + DHCP protocol employs a connection)és service model, using the UserDatagram Protocol, * Alter receiving IP adress lease request rom a cient DHCP server reserves an IP address forthe cen X Questions : Write answers to ©. Q Q (Teacher shall allot the questions) 1. What is the purpose of the DHCP server?, 2. When a DHCP serveris configured, which two IP addreses should never be assignable to hosts? 3. Which two tasks does the Dynamic Host Configuration Protocol perform? Uk pxce sewer is & Dw Seve bho dt ote rode one) 06519 nL. “gselinay 0nd. othey op eee Soe foal ana ashira Stave Board of Technical Education @ Scanned with OKEN Scanner cence ene oes ie 7” Yer Wo ~ f 192. 16g. j- 255 A b n 7 ENO oal - aa 5 Ds 7 Le 197. ee - 1254 = monagement of layer 3 posy Feria @ Scanned with OKEN Scanner jon Patri si ye opi? p95ed Willy (Commaning too ‘hat provides useful 5? AF pg atrteormedt® MOPS betveen a sous f a sia MP and analyzing the regu 'nformation about networklatency address ay N88 destination adcress It does this by sending CSS Seve ae rea ee aehere mn for confirmation of learning : gi guestio eudent shall write answers to these questions independently in the laboratory itself to have self-feedback.) ¢p Whats the use of three types of TCP/IP tities? clZP ts outomo tically suite. af poote Ca) hot och perioamas same ~funcbbns ts allow — tompyteré bo commu nieutian wybh others *, he Led any two ea LA agnoete vay q 7 oa” =5091) ne + Ghethe name of commands to find out hostname and MAC address of computer. Than open tonmand ne tyaing fa)lawed by oy £ cm Ine will show the LP address of the vequestel w ce i i < J Ive. X Conetusio * tenia is cl ugnasbkeonpetty | cagroste) typeof TCPAE uty. * Netstat command will not dSplay connection information of CP. (UDP TCP) packet. #105 En. (siookup! Hostname)command used to display host name of local computer (SystemvApplication) * Questions : Temoersiog 6 eee ee 2 Wats pu PAP utilities? 5 Wich arene eeentinnge are checked using ping commen, 4 Shen are different statistics display for TCP using 5 wn Syntax of tracert command. '8 use of pathping command? ~ 4 @ Scanned with OKEN Scanner 2 - : ? ‘ot the destination = ) the end amd Sends one ola dor grana ~ : : per second ¢& pants one. line Oo ou Lp 1 \ e 7 ‘me : istics, A ‘aol : lekion in : mh nner mimes ouk ay on veceink ofa aign ignal . » iso) tive ic On which he computer 16 listening 16 tit T y table, FPVE 6 tate & TPpve stots 4) > __taate yoube- Fr ridmw = £1 = = —2_gon by hoyenes - 4 Fish ae. ae gateway tas. Eis Sec. $3 Y= 1 ifare = Ze Z sous e @ Scanned with OKEN Scanner ‘ata Communication Computer Network (22414) IX Question for confirmation of learning : (Student shall write answers to these questions independently in the laboratory itself to have self-feedback.) ena aiaaen scent eee ; Whe “ie a device that allews of different ‘ n 6 4 Whatis wean? LANS & inte te OB? fa wa" peasanat_networle -4 J netwoyk “for interconnec fing dewice cep eae avound «nd tyicual “ Which are the different security options available while configuring router? Moat modern utes tove_4 security ae bbings- > Write the IP address of wireless router in your callege UNS CCUVEA WeR wine) WPAR X Questions : Write answers to Q___a. Q (Teacher shall allot the questions) 4, List advantages of wireless network. 2, Compare wireless network with wired network. 3, What is a wireless network adapter? 4, How cellular networking works? 1 a Y $$ $$ $$$ 6) -Acress ilobil Pree eee flex thyrlrty od) Coat saving —_ 2 a NeW oppo: eS 3) gee REC eget geeee Ee EEE EL CSE jive Wivelese_nJw Tin wed ns copper, | In. mlieless pin__the _ —fibe_coble such __ee—_|—a1_comm —communie gtion medium} isu iaasssaasecasiag Tiae cane ecenn eet HEP eee Ee eee cree eerste eeeeeeeeeeeeeeeeeeeee IF i fol Secu iy |in this n/w gecurriy. i 4p is _lawer__ ea es Aa gS Speed is [pines —Ehah- 1GBP5 ae wire niw- @ Scanned with OKEN Scanner ‘Data Communication Computer Network (2244) 2 7 Were 73 iveleS " ON evi. t 2 16 -a_laptes anal allow it - Ey es panes fe ee ee longle _clevire h a i there “ave 2% main types of wireless —coleterg , based an ihe n/w a type they hela you Connect to ~ a) Wr fr ey 9 elaine moahaad —sapioe — ae Meotatle nAy ax8 alsa Enown as cellulay Rfws. ThPy re, mace un of “cells Which ot S18 areas” of land ar8 _typita | —eehefenal have al least “one Seat — ccive7_cell tesa within thely Ore cy US@vovroy. ‘adie fy ; : List of Student Team Member 1 ~ — 2 Ign 2 3 Marks Obtained Dated Signature _ Of Teacher Process Related (15) | Product Relateg (10) | Total 25) \4 32 22 \eharashira State Board of Technical Educaion Stapurs 7 @ Scanned with OKEN Scanner

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy