You are on page 1of 14

SUBJECT CODE:BTCS 507 UNIVERSITY ROLL NO: 1308671

Program 4: To configure IP Address and DNS address for a computer


connected to LAN and to configure network parameters of a web browser for
the same computer.

 To configure IP Address and DNS address for a computer connected to LAN

The LAN IP Setup screen allows configuration of LAN IP services such as DHCP and RIP.The
modem router is shipped preconfigured to use private IP addresses on the LAN side, and to act as
a DHCP server. These addresses are part of the Internet Engineering Task Force (IETF)–designated
private address range for use in private networks, and should be suitable in most applications.

Steps to configure IP Address and DNS address

1. Right-click the connection that we want to change, and then click Properties.  If we're prompted
for an administrator password or confirmation, type the password or provide confirmation.

F
ig. 4.1-network connection

2. Click the Networking tab. Under This connection uses the following items, click either Internet
Protocol Version 4 (TCP/IPv4) or Internet Protocol Version 6 (TCP/IPv6), and then
click Properties.

COMPUTER NETWORKS LAB-II PAGE


SUBJECT CODE:BTCS 507 UNIVERSITY ROLL NO: 1308671

Fig 4.2-local area network properties

3. To specify IP address settings, click Use the following IP address, and then, in the IP
address, Subnet mask, and Default gateway boxes, type the IP address settings.

Fig. 4.3-internet protocol properties

COMPUTER NETWORKS LAB-II PAGE


SUBJECT CODE:BTCS 507 UNIVERSITY ROLL NO: 1308671

 COMMANDS FOR IP IN WINDOWS

Ping whatismyip.com : Ping is one of the most commonly used network commands that allows
us to ping another network IP address.  The whatismyip command is used to Test Connectivity.

Fig. 4.4 –whatismyip.com


ipconfig /all : Ipconfig is an MS-DOS utility that can be used from MS-DOS and an MS-
DOS shell to display the network settings currently assigned and given by a network. This
command can be utilized to verify a network connection as well as to verify your network
settings. The ipconfig /all command is used to Display Connection Configuration.

Fig. 4.5 ipconfig /all command

COMPUTER NETWORKS LAB-II PAGE


SUBJECT CODE:BTCS 507 UNIVERSITY ROLL NO: 1308671

ipconfig /flushdns : Ipconfig is an MS-DOS utility that can be used from MS-DOS and an
MS-DOS shell to display the network settings currently assigned and given by a network. This
command can be utilized to verify a network connection as well as to verify your network
settings. The ipconfig /flushdns command is used to Clear DNS Cache.

Fig. 4.6- ipconfig /flushdns


ipconfig /displaydns : Ipconfig is an MS-DOS utility that can be used from MS-DOS and an
MS-DOS shell to display the network settings currently assigned and given by a network. The
ipconfig /flushdns command is used to Display DNS Cache Info.

COMPUTER NETWORKS LAB-II PAGE


SUBJECT CODE:BTCS 507 UNIVERSITY ROLL NO: 1308671

Fig. 4.7- ipconfig /displaydns

Tracert Command: The tracert command in MS-DOS and Windows is a useful tool for


diagnosing network issues. It allows you to view a listing of how a network packet travels
through the network and where it may fail or slow down. Using this information you can
determine the computer, router, switch or other network device possibly causing your network
issues.

Fig. 4.8- Tracert Command

COMPUTER NETWORKS LAB-II PAGE


SUBJECT CODE:BTCS 507 UNIVERSITY ROLL NO: 1308671

To create a LAN:

Fig. 4.9-creating a LAN

hostname : The hostname command displays the host name of the Windows XP computer
currently logged into.

Fig. 4.10-hostname

COMPUTER NETWORKS LAB-II PAGE


SUBJECT CODE:BTCS 507 UNIVERSITY ROLL NO: 1308671

Arp: Display or manipulate the ARP information on a network device or computer.

Fig. 4.11-arp command

netstat : Most useful and very versatile for finding connection to and from the host. You can find
out all the multicast groups (network) subscribed by this host by issuing "netstat -g".

COMPUTER NETWORKS LAB-II PAGE


SUBJECT CODE:BTCS 507 UNIVERSITY ROLL NO: 1308671

Fig. 4.12-netstat command


 TO CONFIGURE NETWORK PARAMETERS OF A WEB BROWSER
 FIREWALL : A firewall is a network security system, either hardware- or software-based, that
controls incoming and outgoing network traffic based on a set of rules. Acting as a barrier
between a trusted network and other untrusted networks -- such as the Internet -- or less-trusted
networks -- such as a retail merchant's network outside of a cardholder data environment -- a
firewall controls access to the resources of a network through a positive control model. This
means that the only traffic allowed onto the network defined in the firewall policy is; all other
traffic is denied.

Fig. 4.13-firewall settings


TO BLOCK A FAMOUS WEBSITE

COMPUTER NETWORKS LAB-II PAGE


SUBJECT CODE:BTCS 507 UNIVERSITY ROLL NO: 1308671

Fig. 4.14.a-blocking a website

Fig. 4.14.b-blocking a website

COMPUTER NETWORKS LAB-II PAGE


SUBJECT CODE:BTCS 507 UNIVERSITY ROLL NO: 1308671

Fig. 4.14.c-blocking a website

 PASSWORD SETTING :
The browser we use holds a lot of important and sensitive information like our browsing history,
saved passwords, logged in accounts and sessions, cookies, etc. Moreover, our Chrome browser
is tied to our Google account and anyone who has physical access to our browser can access our
emails and confidential data. We can prevent all these acts by simply enabling the password
protection feature in Google Chrome browser.

COMPUTER NETWORKS LAB-II PAGE


SUBJECT CODE:BTCS 507 UNIVERSITY ROLL NO: 1308671

Fig. 4.15-password settings

 COOKIES: A cookie is information that a Web site puts on our hard disk so that it can
remember something about us at a later time. More technically, it is information for future use
that is stored by the server on the client side of a client/server communication.A cookie is a
mechanism that allows the server to store its own information about a user on the user's own
computer. 
Typically, a cookie records your preferences when using a particular site. Using the Web's
Hypertext Transfer Protocol (HTTP), each request for a Web page is independent of all other
requests. For this reason, the Web page server has no memory of what pages it has sent to a user
previously or anything about our previous visits.

COMPUTER NETWORKS LAB-II PAGE


SUBJECT CODE:BTCS 507 UNIVERSITY ROLL NO: 1308671

Fig. 4.16-cookies

 BOOKMARKS:
To mark a document or a specific place in a document for later retrieval. Nearly all Web
browsers support a bookmarking feature that lets you save the address (URL) of a Web page so
that you can easily re-visit the page at a later time. A marker or address that identifies a
document or a specific place in a document.

COMPUTER NETWORKS LAB-II PAGE


SUBJECT CODE:BTCS 507 UNIVERSITY ROLL NO: 1308671

Fig. 4.17.a

Fig. 4.17.b

 PROXY SETTING CHANGE :


A proxy server regulates access to the Internet, and prevents external computers from accessing
our network. If we are on a network that uses a proxy server to connect to the Internet, we can
provide proxy server details to Norton Security Suite. we can use the Network Proxy Settings
window to specify the automatic configuration URL, the proxy settings, and the authentication
details. Norton Security Suite uses the proxy settings and authentication details to connect to the
Internet automatically, whenever required. For example, LiveUpdate uses the specified proxy
server settings to retrieve updates. we must ensure that you specify the proxy server details for
LiveUpdate to run successfully.

COMPUTER NETWORKS LAB-II PAGE


SUBJECT CODE:BTCS 507 UNIVERSITY ROLL NO: 1308671

Fig. 4.18.a-proxy settings

Fig. 4.18.b-proxy settings

COMPUTER NETWORKS LAB-II PAGE

You might also like