0% found this document useful (0 votes)
5 views11 pages

---

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 11

DCC- practical question Bank

1. Configure peer to peer Network and client Server Network.

In a peer-to-peer (P2P) network, all devices have equal status and can
communicate directly with each other without relying on a central
server. On the other hand, in a client-server network, devices
(clients) request services or resources from a central server. Here's
how you can configure each type of network:

Peer-to-Peer Network Configuration:

Connect Devices:
Connect all devices (computers, laptops, smartphones, etc.) to the
same network, either wired or wireless.
Assign IP Addresses:

Each device needs a unique IP address within the same subnet. You can
manually assign IP addresses or use DHCP (Dynamic Host Configuration
Protocol) for automatic assignment.
Configure Sharing Settings:

Enable file and printer sharing on each device if needed. This allows
devices to share files and printers directly with each other.
Set Up Firewall Rules:

Configure firewall settings to allow communication between devices


within the network. Ensure that necessary ports are open for P2P
applications and services.
Test Connectivity:

Verify that devices can communicate with each other by sending test
messages, sharing files, or accessing shared resources.
Client-Server Network Configuration:
Set Up Server:

Configure a dedicated server machine that will act as the central


server. Install the necessary server software (e.g., web server, file
server, database server) depending on the services required.
Connect Clients:

Connect client devices to the same network as the server, either


through wired or wireless connections.
Assign IP Addresses:
Clients can either receive IP addresses automatically from a DHCP
server or be manually assigned IP addresses within the same subnet as
the server.
Join Domain (Optional):

For larger networks, clients can join a domain managed by the server.
This allows centralized user authentication and management.
Configure Client Applications:

Install and configure client applications to connect to the server for


services such as email, file sharing, printing, etc.
Set Up Security:

Implement security measures such as user authentication, access


controls, encryption, and firewall rules to protect the network and
server resources.
Test Connectivity:

Ensure that clients can successfully connect to and access services


provided by the server. Test functionalities like accessing shared
files, printing, accessing databases, etc.

2 connect computers in Network using Suitable Topology.

Gather Equipment:

You'll need a central networking device like a switch or a hub,


Ethernet cables (one for each computer), and computers/devices to
connect.
Set Up the Central Device:

Connect the central device (switch or hub) to power and ensure it's
functioning properly.
Connect Computers to the Central Device:

Take an Ethernet cable and connect one end to a port on the central
device.
Connect the other end of the Ethernet cable to the Ethernet port on a
computer or device.
Repeat this step for each computer or device you want to connect to
the network, ensuring each has its own cable and port on the central
device.
Assign IP Addresses (Optional):

If you're manually assigning IP addresses, configure each computer


with a unique IP address within the same subnet. Alternatively, you
can use DHCP (Dynamic Host Configuration Protocol) to automatically
assign IP addresses.
Configure Network Settings (Optional):

Set up any additional network settings, such as DNS (Domain Name


System) servers, gateway addresses, subnet masks, etc., as per your
network requirements.
Test Connectivity:

Power on all devices and check if they can communicate with each other
and access resources on the network.
Test connectivity by pinging other devices' IP addresses, accessing
shared folders, or opening web pages if your network has internet
access.
Secure the Network (Optional):

Implement security measures such as setting up passwords for network


access, enabling firewall rules, configuring access control lists
(ACLs) on the central device, etc.
Document the Network Configuration:

Keep a record of the network configuration, including IP addresses,


device connections, security settings, and any other relevant
information for future reference and troubleshooting.

3. Create Network using Bluetooth.

Requirements:

Bluetooth-enabled devices (such as laptops, smartphones, tablets,


etc.).
Ensure that Bluetooth is turned on and discoverable on all devices.
Depending on the devices, you may need to pair them first before
establishing a network.
Steps to Create a Bluetooth Network:

Enable Bluetooth:

On each device, turn on Bluetooth and set it to discoverable mode if


needed (some devices may automatically go into discoverable mode when
Bluetooth is enabled).
Pair Devices (if required):

If your devices require pairing (pairing is a one-time process to


establish a trusted connection), follow these steps:
Go to Bluetooth settings on each device.
Search for nearby Bluetooth devices.
Select the device you want to connect to and initiate pairing.
Follow any on-screen prompts to complete the pairing process, which
may involve entering a passcode or confirming a PIN.
Create a Network (PAN - Personal Area Network):

Once devices are paired (if required), you can create a network using
Bluetooth:
On one of the devices, go to Bluetooth settings.
Look for an option to create a PAN (Personal Area Network) or similar.
Follow the on-screen instructions to create the network.
Other devices within Bluetooth range should detect and join the
network automatically or with manual confirmation.
Configure Network Settings (if applicable):

Depending on the devices and network type, you may have options to
configure network settings such as network name, security settings,
etc. Follow the device-specific instructions to set these up if
needed.
Test Connectivity:

Verify that devices within the Bluetooth network can communicate with
each other.
Test file sharing, sending messages, accessing shared resources (if
applicable), etc.
Secure the Network (if applicable):

If the Bluetooth network allows for security settings, consider


enabling them to prevent unauthorized access. This may include setting
a network password or using encryption options if available.

4 Share printer and folder in Network.

Share Printer in Network:


Windows:
Connect Printer:

Ensure that the printer is connected to the computer or network and is


installed and working correctly.
Share Printer:

Open Control Panel > Devices and Printers.


Right-click on the printer you want to share and select "Printer
properties" or "Properties."
Go to the "Sharing" tab and check the box that says "Share this
printer."
Optionally, you can provide a share name for the printer. Click
"Apply" and then "OK" to save the settings.
Set Permissions (Optional):

If you want to restrict access to the shared printer, you can set
permissions by clicking the "Security" tab in printer properties and
configuring permissions for specific users or groups.
Access Shared Printer:

On other computers in the network, you can now add the shared printer
by going to Control Panel > Devices and Printers > Add a printer > Add
a network, wireless, or Bluetooth printer. Follow the prompts to
locate and add the shared printer.

Share Folder in Network:


Windows:
Prepare the Folder:

Right-click on the folder you want to share and select "Properties."


Go to the "Sharing" tab and click on "Advanced Sharing."
Check the box that says "Share this folder."
Optionally, you can set permissions for specific users by clicking on
"Permissions" and adding or removing users as needed.
Access Shared Folder:

On other computers in the network, open File Explorer.


In the address bar, type \\<computer-name>\<shared-folder-name> and
press Enter.
You should see the shared folder. Double-click to access its contents.

5. write Server process to configure DHCP

6. Write process to configure TCP/IP Network layer services.

Assign IP Addresses:

Use static or DHCP to assign IP addresses to devices.


Configure Routing:

Set up routing tables for network traffic between subnets or networks.


Subnetting (Optional):

Define subnet masks and allocate IP address ranges for subnets.


Configure DNS:

Specify DNS server IP addresses in /etc/resolv.conf for domain name


resolution.
Enable IP Forwarding (if needed):
Enable IP forwarding in /etc/sysctl.conf for routing between
interfaces.
Configure Firewall Rules:

Use iptables or firewalld to set up firewall rules for security.


Test Connectivity:

Ping devices, access external sites, and check DNS resolution for
connectivity testing.
Monitor and Troubleshoot (Optional):

Use network monitoring tools to monitor traffic and troubleshoot


issues.

7. steps to write setup wireless Network

Find the best location for your wireless router:Its optimal placement
is in a central location of your home, free from obstructions that
could cause wireless interference, such as windows, walls, and even
the microwave.
Turn off the modem: Power off the cable or DSL modem from your
Internet service provider before connecting your equipment. Connect
the router to the modem: Plug an ethernet cable (typically provided
with the router) into the router's WAN port and then the other end to
the modem.
Connect your laptop or computer to the router:Plug one end of another
ethernet cable int router1s into your laptop's ethernet port.

Power up the modem,router and computer:Turn them out in that order.

Go to the manangement webpage for your router:Open a browser and type


in the IP address of the router1s administration page,this info is
provided in your router documentation.The login information will be
also in the manual.

Change the default administrator password (and username if you wish)


for your router: This setting is usually found in a tab or section
called administration. Remember to use a strong password that you
won't forget

Add WPA2 security:This step is essential, You can find this setting
in the wireless security section, where you'll select which type of
encryption to use and then enter a passphrase of at least 8
characters - the more use WPA or mixed mode WPA/WPA2 if you have an
characters and the more complex the password, the better ABAZ is the
latest wireless encryption protocol much more secure than WEP, but
you may need to older wireless adapter in any of your devices. WPA-
AES is the strongest encryption available to date. Change the
wireless network name (SSID). To make it easy for you to identify
your network, choose a descriptive name for your SSID (Service Set
Identifier) in the wireless network information section. they don't
overlap).

Set up the wireless adapter on the computer: After saving the


configuration settings on the router above, you can unplug the cable
connecting your computer to the router. Then plug your USB or PC card
wireless adapter into your laptop, If it doesn't already have a
wireless adapter installed or built-in. Your computer may
automatically install the drivers or you may have to use the setup CD
that came with the adapter to install it
Finally, connect to your new wireless network. On your computer and
other wireless-enabled devices, find the new network you set up and
connect to it

8.CRC, CRC, UPC 5. Write Error Detection methods with example.

Vertical Redundancy Check (VRC) or Parity Check


In this technique, a parity bit(redundant bit) is added to every data
unit so that the total number of 1’s becomes even for even parity (or
odd for odd parity )
In case of even parity check, if the total number of 1s bits are even,
then parity bit 0 is added at the end of the data unit and if the
total number of 1s bits are odd, then parity bit 1 is added at the end
of the data unit
A simple parity check detects all single bit errors but it can
detects burst error, only if total number of errors in each data unit
are odd.

Example – If the sender wants to send data unit 1100001 using even
parity to the receiver. sender pass data to Even parity generator.
Even parity generator will count number of 1s in data unit and will
add parity bit.
In the above example, number of 1s in data unit are 3, parity
generator appends a parity bit 1 to this data unit making the total
number of 1s even( i.e 4) which is clear from above figure. Data along
with parity bit is then transmitted across the network. In this case,
11000011 will be transmitted.
At the receiver side, This data is passed to parity checker . parity
checker counts number of 1s in data including parity bit
In this case number of 1’s counted by parity checker are even, so
receiver will accept data.
If the number of 1s counted by parity checker are odd, (e.g. 3 or 5)
then receiver will come to know that there is some error in the data
and receiver rejects such an erroneous data unit.

Longitudinal Redundancy Check (LRC) is also known as 2-D Parity


Check.
LRC is an error detection mechanism in which block of bits organized
in a table(rows and columns) and calculate parity bit for each column
and these set of parity bits send along with the data to receiver.
The receiver uses these set of parity bits to detect error.
After checking the data for errors, If there is error then receiver
discards the data, if there is no error then receiver accepts the data
and discards the set of parity bits
Example : If the sender wants to send 32 bit block of data to receiver
then block of bits are organized in table (four rows and eight
columns) which as shown in the figure
Sender then calculate a parity bits for each column and create a new
row of 8 bits(i.e LRC) which are parity bits for whole block.
Sender then attach the 8 parity bits(i.e LRC) to the original data and
send them to receiver.
Whenever data reaches at the receiver, receiver calculates LRC to
detect error in data.
The LRC received by the receiver match with newly computed LRC. The
receiver comes to know that the data is correct, so receiver accepts
the data
The LRC received by the receiver does not match with newly computed
LRC. The receiver comes to know that the data is erroneous, so
receiver discards the data.
CRC is an error detection mechanism in which redundant bits(i.e. CRC
bits) are appended at the end of data unit so that the resulting data
unit become exactly divisible by predetermined divisor (i.e. remainder
becomes zero)
CRC is based on Modulo-2 binary division.
At the sender side, the data unit to be transmitted is divided by a
predetermined divisor (binary number) in order to obtain the
remainder. This remainder is called CRC.
The sender appends this CRC at the end of data unit such that the
resulting data unit becomes exactly divisible by predetermined
divisor (i.e. remainder becomes zero)
The CRC has one bit less than the divisor.

At the receiver side, the incoming data unit is divided by the same
number (predetermined divisor).
If remainder is zero, the data unit is assumed to be correct and
accepted by receiver.
If remainder is nonzero number indicates that the data unit has been
changed during transmission and rejected by receiver .
The CRC is more powerful than VRC and LRC in detecting errors.
9. write classes of IP addresses and subnetting and supernetting

with example

Class A:
Class A range for first byte is 0-127.
Example: 10.0.0.0

Class B: Class B range for first byte is 128-191.


Example: 172.16.0.0

Class C: Class C range for first byte is 192-223.


Example: 192.168.0.0

Class D: Class D range for first byte is 224-239


Example: 224.0.0.1

Class E: Class E range for first byte is 240-255 .


Example: 255.255.255.255

Subnetting:
Subnetting is the process of dividing a larger network into smaller,
manageable segments called subnets.
It helps in improving network performance, security, and management.
Each subnet has its own unique subnet address and range of IP
addresses.
Example:
Consider a network with the IP address 192.168.1.0 and a subnet mask
of 255.255.255.0
(which gives us 256 possible host addresses). By subnetting this
network,
we can create smaller subnets with fewer host addresses each. For
instance:
Subnet 1: 192.168.1.0/28 (which allows for 14 hosts per subnet)
Subnet 2: 192.168.1.16/28
Subnet 3: 192.168.1.32/28 ...and so on.

Supernetting:
Supernetting, also known as route aggregation, is the opposite of
subnetting.
It involves combining multiple smaller networks into a larger network,
which reduces the number of routing table entries and improves routing
efficiency.
Example:
Suppose you have several Class C networks with contiguous IP ranges:
Network 1: 192.168.1.0/24
Network 2: 192.168.2.0/24
Network 3: 192.168.3.0/24
By supernetting these networks, you can create a supernet:
Supernet: 192.168.1.0/23 (combining Network 1 and Network 2)
Supernet: 192.168.1.0/22 (combining Network 1, Network 2, and Network
3)
This reduces routing table entries and simplifies routing within the
network.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy