You are on page 1of 54

December 11

[Type the
document
title] 2022
[Type the abstract of the document here. The abstract is typically a short Advanced
summary of the contents of the document. Type the abstract of the
document here. The abstract is typically a short summary of the Computer
contents of the document.] Networking
-: INDEX :-
Sr. No Experiment Page No. Remarks
Familiarization with Networking
1. Components and devices:- LAN Adapters,
Switches, Routers ets.
Familiarization with Transmission media and
2. Tools:- Co-axial cable, UTP Cable, Crimping
Tool, Connectors etc.
3. Preparing Straight and Cross Cables.
Study of various LAN Topologies and their
4. creation using Network devices, Cables and
Computers.
5. Configuration of TCP/IP Protocols in
Windows and Linux.
6. Implementation of File and Printer sharing.

7. Designing and Implementing Class A, B, C


Network.
8. Subnet Planning and its Implementation.

9. Installation of ftp server and client.


To develop programs for simulating routing
10. algorithms for Adhoc networks.
To install any one open source packet capture
11. software like packet tracer etc.
12. To configure Wireless Local Loop.
13. To configure WLAN.
14. To configure Adhoc Networks.
To install and configure wireless access
15. points.

2
Experiment:- 01
Aim:- Familiarization with Networking Components and devices:- LAN Adapters,
Switches, Routers etc.

Materials Required:- LAN Adapters, Switches and Routers.


 LAN Adapters:-
 Also called a “Network interface card” an Ethernet adapter is a card that
plugs into a slot on the motherboard and enables a computer to access an
Ethernet network (LAN).
 In the past, desktop computers always used cards. Today, Ethernet is
built into the chipsets on the motherboards of desktop and laptop
computers.

 Switches:-
 Switches are networking devices operating at layer 2 or a data link layer
of the OSI model.
 They connect device in a network and use packet switching to send,
receive or forward data packets or data frames over the network.
 A switch has many ports, to which computers are plugged in.

 Routers:-
 A router is the first line of security from intrusion into a network.
 Enabling the highest level of security on the router turns on things like
the firewall, and is the best way to keep your computer system and
information safe from attack.

3
Experiment:- 02
Aim:- Familiarization with Transmission media and Tools: Co-axial cable, UTP
Cable, Crimping Tool, Connectors etc.
Material Required:- Co-axial cable, UTP Cable, Crimping tools and connectors.
 Co-axial Cable:-
1. Coaxial cable or coax is a type of electrical cable consisting of an inner
conductor surrounded by a concentric conducting shield, with the two
separated by a dielectric ; many coaxial cable also have a protective
outer sheath or jacket.
2. The term coaxial refers to the inner conductor and the outer shield
sharing a geometric axis. It is used in such applications as
telephone ,trunk lines, broadband internet networking cables, high-speed
computer data busses and cable television.
4
 UTP Cable:-
1. UTP stands for unshielded twisted pair cable. It is a type of wiring in
which two conductors of a single circuit are twisted together for the
purpose improving electromagnetic compatibility.
2. Compared to a single conductor or an untwisted balanced pair, a twisted
pair reduces electromagnetic radiation from the pair and crosstalk
electromagnetic radiation from the pair and crosstalk between
neighbouring pairs and improves rejection of external electromagnetic
interference.

 Crimping Tool:-
1. A crimping tool is a device that is used to make cold weld joints between
wires and a connector through deforming one or both of then to hold the
other.
2. A special connector is used to join metals together .The weld joint
properties are strong as the parent materials when the tool works and
offer some result, which is known as crimp.

 Connectors:-
1. A device that eliminates a section of cabling or implements a state of
access for network devices, including PC’s, hubs, and switches.
2. Connectors can be famous for their physical presentation and mating
features, including jacks and attachment or attachments and ports.
5
3. Connectors are used to connect the guided transmission media to devices
like the hub, server, workstations etc.

Experiment:- 03
Aim:- Preparing Straight and Cross Cables.
Materials Required:- Straight Cables and Cross Cables.
 Straight Cable:-
1. Straight cable is used to connect different type of devices.
2. This type of cable will be used most of the time and can be used to:-
 Connect a computer to a switch/hub’s normal port.
 Connect a computer to a cable/DSL modem’s LAN port.
 Connect a router’s WAN port to a cable/DSL modem’s LAN port.

 Cross Cables:-
1. It is usually used to connect same type of devices.
2. A crossover cable can be used to:-
 Connect two computers directly.
 Connect a router’s LAN port to a switch/hub’s normal port.

6
 Connect 2 switches/hubs by using normal port in both
switches/hubs.

Experiment:- 04
Aim:- Study of various LAN Topologies and their creation using Network devices,
Cables and Computers.
Materials Required:- Network devices, cables and Computers.
LAN Topologies:-
 The arrangement of a network that comprises nodes and connecting lines via
sender and receiver is referred to as network topology.
 The various network topologies are:-

1. Bus Topology:-
 Bus topology are multipoint electrical circuits that can be
implemented using coaxial cable, UTP or STP.
 Data transmission is bi-directional, with the attached devices
transmitting in both directions. While generally operating at a raw
data rate of 10 Mbps, actual throughput is much less.

7
 This is employed frequently in the LAN’s with distributed control.
In this all nodes, share the common bus. Messages placed on the
bus are transmitted to all the nodes.

2. Ring:-
 The ring architecture is a distributed architecture, with minimal
connectivity and a topology of two links connected to every node
and forms unbroken circular configurations.
 Transmitted messages travel from node to node around the ring.
Each node must be able to recognize its own address in order to
accept messages.

 Ring networks with centralized controls are known as loops.


 When ring network with distributed controls are used, some form
of controls strategies must be used to avoid conflicting demands
for the shared channel.
 The popular control strategies are token passing, circulating slot,
register insertion techniques.

8
3. Star Topology:-
 The distinguishing feature of star topology is that all nodes are joined
at a single point.
 This single point is called the central node, hub or switch to which all
other devices are attached directly, generally via UTP or STP.
 This topology is frequently used for networks in which control of the
network is located in the central node.

 This method is optimal when the bulk of communication is between


the central and outlying nodes. If traffic is high between outlying
nodes, an undue switching burden is placed over the central node.

4. Mesh Topology:-
 In a mesh network topology, each of the network node, computer
and other devices, are interconnected with one another.
 Every node not only sends its own signals but also relays data
from other nodes.

9
 In fact a true mesh topology is the one where every node is
connected to every other node in the network.
 This type of topology is very expensive as there are many
redundant connections, thus it is not mostly used in computer
networks.
 It is commonly used in wireless networks. Flooding or routing
technique is used in mesh topology.

5. Tree Topology:-
 Tree Topology integrates the characteristics of Star and Bus
Topology.
 Earlier we saw how in Physical Star network Topology,
computers (nodes) are connected by each other through central
hub. And we also saw in Bus Topology, work station devices are
connected by the common cable called Bus.
 After understanding these two network configurations, we can
understand tree topology better.

10
 In Tree Topology, the numbers of Star networks are connected
using Bus.
 This main cable seems like a main stem of a tree, and other star
networks as the branches.
 It is also called Expanded Star Topology.
 Ethernet protocol is commonly used in this type of topology.
 The diagram below will make it clear:-

6. Hybrid Topology:-
 Before starting about Hybrid topology, we saw that a network
topology is a connection of various links and nodes,
communicating with each other for transfer of data.
 We also saw various advantages and disadvantages of Star, Bus,
Ring, Mesh and Tree topologies.
 Hybrid, as the name suggests, is mixture of two different things.
Similarly in this type of topology we integrate two or more
different topologies to form a resultant topology which has good
points (as well as weaknesses) of all the constituent basic
topologies rather than having characteristics of one specific
topology. This combination of topologies is done according to the
requirements of the organization.

11
 For example, if there exists a ring topology in one office
department while a bus topology in another department,
connecting these two will result in Hybrid topology. Remember
connecting two similar topologies cannot be termed as Hybrid
topology. Star-Ring and Star-Bus networks are most common
examples of hybrid network.

Experiment:- 05
Aim:- Configuration of TCP/IP Protocols in Windows and Linux.
Materials Required:- System with Windows and Linux Operating System.
 Configuration of TCP/IP protocol in Windows:-

The following instructions are based on the Configuring TCP/IP function of


Windows XP.

12
1. Click Start > Settings > Control Panel.
2. On the control panel, double-click Network and Dial-Up Connections.
3. Right-click Local Area Connection.
4. Click Properties. If Internet Protocol (TCP/IP) does not appear in the list, do
the following:
a. Click Install.
b. Select Protocol, and then click Add.
c. Select Internet Protocol (TCP/IP).
d. Click OK. This returns you to the Local Area Connection
Properties window.
5. Select Internet Protocol (TCP/IP), and then click on Properties.
6. Select Using the Following IP Address. Check with your network
administrator to determine the correct settings for this tab. If your PC does not
automatically obtain IP and DNS addresses, do the following:
a. Enter the IP address of your PC (for example, 199.5.83.205).
b. Enter the subnet mask (for example, 255.255.255.0).
c. Enter the default gateway (for example, 199.5.83.1).
d. Enter the preferred DNS server (for example, 199.5.100.75).
e. Enter the alternate DNS server (for example, 199.5.100.76).
7. If you are using a Windows Internet Name Server, click the Advanced tab,
select WINS Address, and do the following:
a. Click Add.
b. Enter the primary WINS server (for example, 199.5.83.205).
c. Enter the secondary WINS server (for example, 199.5.83.206).
d. The remaining settings should remain as the defaults.
8. Click OK on the Local Area Connection Properties window. It is not necessary
to restart your PC.

Configuration of TCP/IP in Linux OS:

No additional hardware, firmware, or software is required to install DB2®


pureScale® Feature on a TCP/IP network. The only requirement is to have a network
that is accessible by all the hosts. The hosts must be able to access each other, and all
hosts must be on the same subnet.
It is a best practice that your TCP/IP network is 10 Gb or higher. However, if your
workload has only modest network usage requirements, to avoid the DB2 product
from blocking a network slower than 10 Gb, enable the registry
variable DB2_SD_ALLOW_SLOW_NETWORK.

You set up your TCP/IP network as you normally would, set up all hosts on the same
subnet, and test the host name resolution and connectivity.

13
For a geographically dispersed DB2 pureScale cluster (GDPC), if multiple adapter
ports are assigned to each member or CF, ensure those network interfaces are bonded
so that only the bonded interface is specified as the NETNAME column in
the db2instance -list output. All NETNAME listed in the output should be in the same
IP subnet.. This single IP subnet is mandatory to setup GPFS described in Getting the
cluster installed and running in a GDPC environment

 Setting up the netmon.cf file on a TCP/IP network


In a DB2 pureScale environment running on a TCP/IP protocol over Ethernet
(TCP/IP) network, if you are using a private network, one or more pingable IP
addresses must be manually set up in the configuration file netmon.cf.
The netmon.cf file is required by Reliable Scalable Cluster Technology
(RSCT) to monitor the network and ensure that the interfaces are pingable or
not. For a private network, this file must be set up manually. (On a public
network, the DB2 installer updates this file automatically.)

14
Experiment-6
Aim: Implementation of File and Printer Sharing.
Materials Required: Pc, Printer

Sharing Printer :

Server PC Settings:
1. Install the printer driver
2. Click Start => Devices and Printers => Printers and Faxes.
3. Right-click Brother XXXXXX (your model name) and then click Printer
properties.
4. Open the Sharing tab and check Share this printer.
5. Click OK.

Client PC Settings:
1. Click Start => Control Panel => Network and Internet.
2. Click Network and Sharing center.
3. Click Change advanced sharing settings.
4. Check Turn on network discovery and Turn on file and printer sharing,
click Save changes
5. Click Start => Devices and Printers.
6. Click Add a printer.
7. Click Add a network wireless or Bluetooth printer.
8. Choose a printer and click Next.
9. Click Next.
10.Choose Share this printer so that others on your network can find and use
it and click Next.
11.Click Finish..

Sharing file over a network:

Right-click or press a file, select Give access to > Specific people.

15
Select a file, select the Share tab at the top of File Explorer, and then in
the Share with section select Specific people.

If you select multiple files at once, you can share them all in the same way. It
works for folders, too—share a folder, and all files in it will be shared.

Experiment-7
Aim: Designing and Implementing A,B,C Network.
Materials Required: System connecting with variety of networks.

16
Class A Network:
A class A network number uses the first eight bits of the IP address as its
"network part." The remaining 24 bits comprise the host part of the IP address .
The values assigned to the first byte of class A network numbers fall within the
range 0-127. Consider the IP address 75.4.10.4. The value 75 in the first byte
indicates that the host is on a class A network. The remaining bytes, 4.10.4,
establish the host address. The InterNIC assigns only the first byte of a class A
number. Use of the remaining three bytes is left to the discretion of the owner
of the network number. Only 127 class A networks can exist. Each one of these
numbers can accommodate up to 16,777,214 hosts.

Class B Network:
A class B network number uses 16 bits for the network number and 16 bits for
host numbers. The first byte of a class B network number is in the range 128-
191. In the number 129.144.50.56, the first two bytes, 129.144, are assigned by
the InterNIC, and comprise the network address. The last two bytes, 50.56,
make up the host address, and are assigned at the discretion of the owner of the
network number. Class B is typically assigned to organizations with many
hosts on their networks.

Class C Network:
Class C network numbers use 24 bits for the network number and 8 bits for
host numbers. Class C network numbers are appropriate for networks with few
hosts--the maximum being 254. A class C network number occupies the first
three bytes of an IP address. Only the fourth byte is assigned at the discretion
of the network owners. The first byte of a class C network number covers the
range 192-223. The second and third each cover the range 1- 255. A typical
class C address might be 192.5.2.5. The first three bytes, 192.5.2, form the
network number.

17
Experiment-8

Aim: Subnet planning and its implementation.


Materials Required: PC connected with a network.

Subnetting is a process of dividing a single large network in multiple smaller


networks. A single large network is just like a town without any sector and street
address. In such a town, a postman may take 3 to 4 days in finding a single address.
While if town is divided in sectors and streets, he can easily find any address in less
than one hour.
Computer networks also follow the same concept. In computer networking,
Subnetting is used to divide a large IP network in smaller IP networks known as
subnets.

A default class A, B and C network provides 16777214, 65534, 254 hosts


respectively. Having so many hosts in a single network always creates several issues
such as broadcast, collision, congestion, etc.

Let’s take a simple example. In a company there are four departments; sales,
production, development and management. In each department there are 50 users.
Company used a private class C IP network. Without any Subnetting, all computers
will work in a single large network.

18
Computers use broadcast messages to access and provide information in network. A
broadcast message is an announcement message in computer network which is
received by all hosts in network.

Earlier in this tutorial we discussed an example of electric announcement. You can


relate that example with this example. In that example we learned how dividing a
town in sectors can reduce announcement area.

In this example since all computers belong to same network, they will receive all
broadcast messages regardless the broadcast messages which they are receiving are
relevant to them or not.

Just like town is divided in sectors, this network can also be divided in subnets. Once
network is divided in subnets, computers will receive only the broadcasts which
belong to them.

Since company has four departments, it can divide its network in four subnets.
Following figure shows same network after Subnetting.

19
20
Experiment:-09
Aim:- Installation of ftp server and clients.
Materials Required:- Pc connected with a network.
 Installing a secure FTP server on Windows using IIS
 You may want to install a secure FTP server on Windows either as
standalone file storage or to have means of editing your website hosted
on IIS (Internet Information Services) web server. In both cases, you can
use an optional FTP Server component of the IIS. It can be installed
standalone or along with a Web Server.

 Installing FTP Server:-


 On Windows Desktop (Windows 11, Windows 10, Windows 8,
Windows 7 and Windows Vista)

 Steps for installing FTP server on Windows Desktop:-


 Go to Control Panel > Programs > Programs and Features > Turn
Windows features on or off.
 On a Windows Features window:-
 Expand Internet Information Services > FTP Server and check
FTP Service.
 Expand Internet Information Services > Web Management Tools
and check IIS Management Console, if it is not checked yet.
 Confirm with OK button.
 Wait for the installation to complete.

21
Steps for installing FTP server on Windows Desktop:-

Experiment:-10
Aim:- To develop programs for simulating routing algorithms for Adhoc networks.

Materials Required:- System connected to a network


A wireless ad hoc network is a decentralized type of wireless network. The network
is ad hoc because it does not rely on a pre existing infrastructure, such as routers in
wired networks or access points in managed wireless networks.

Fig.:- Setup Wireless Adhoc Network

22
Create an Adhoc Network on Windows:-
The first step in the process requires that we start at the Network and Sharing center
as shown in Figure below.

We can access the Windows Networking and Sharing Center through your control
panel.

Now, from this point, there are two different ways to setup an AdHoc network:-

 One uses the Setup a connection or network wizard.


 The other utilizes the Manage Wireless Networks control panel.

The choice of which one to use depends on our preference. The setup of the Ad-Hoc
network only needs to be performed on the first computer being configured.

Let’s review the steps using both of the setup methods.

Adhoc Network Configuration using the Setup a Connection or


Network Wizard:-

When using the wizard method, the first task to perform requires the selection of „Set
up a new connection or network‟ option from the main window; this is shown in
Figure.

23
Fig.:- Destination

Creating an Adhoc network in Windows:-


1. Go to Start Menu.
2. Click on Search -enter the word “ad-hoc”.
3. Click “Set up an ad-hoc (computer-to-computer) network”.
4. This brings up the window: Set up a Wireless ad-hoc network;  Click
Next
5. Create a name for the ad-hoc network (ex. Type Ella). This must be the
same on both computers.
6. Set security type to “No authentication (Open)”.
7. Leave Security Key blank.
8. Click box “Save this network”.
9. Click Next. The prompt will say Setting up the Type Ella network”.
10.The next screen should say “The Type Ella network is ready to use.

Experiment-11
Aim:- To install any open source packet capture software like packet tracer etc.

Materials Required:- PC connected with a network.


Download the latest version or the version of Packet Tracer that you want to install
on the Windows system. You can download the installer file of Packet Tracer from
the following web page.

Download Packet Tracer for Windows:-

https://www.computernetworkingnotes.com/ccna-study-guide/download-packet-
tracer-for-windows-and-linux.html

Once the downloading is finished, open the folder that contains the downloaded file.

24
Double click the setup or installer file of Packet Tracer. Depending on UAC (User
Access Control) setting, Windows may prompt to confirm the installation. If it
prompts, click the Yes button to confirm the installation. After confirmation, the
installation process starts in a graphical wizard.

The first screen of the installation wizard presents the license agreement. Select
the "I accept the agreement" option and click the "Next" button.

The next screen provides an option to customize the installation directory. By default,
Packet Tracer is installed in the "Program File" folder of the Windows partition. If
you want to install Packet Tracer in another folder, click the Browse button and
select the folder in which you want to install Packet Tracer.

Make your choice and click the Next button to continue the installation.

25
The next screen allows us to customize the shortcut-link name and the location of
Packet Tracer in the Start menu.

A shortcut-link name is used to launch an application from the Start menu. By


default, the wizard uses the name "Cisco Packet Tracer" for both the folder-name
and the shortcut-link name.

Keep default selections and click the Next button.

The next screen allows us to create two more shortcut links to launch the Packet
Tracer.

Create a desktop icon:- This option creates a shortcut link on the Desktop.

Create a quick launch icon:- This option creates a shortcut link in the Quick-Launch
bar.

Make your choice and click the Next button.

26
The next screen provides a summary of selections. If you want to change an option,
use the Back button to get that option. To start the installation with currently selected
options, click the Install button.

The wizard displays the real-time progress of the installation.

27
The last screen of the wizard displays the result of the installation. If any error
occurred during the installation, this screen displays that error. If the installation
process is completed without any error and notice, this screen shows the confirmation
message.

If the installation is successful, this screen shows an option to launch the Packet
Tracer. If you keep this option selected, the packet tracer starts when the wizard is
closed.

Click the Finish button to close the wizard.

28
When Packet Tracer starts the first time, it asks the user to select the mode in which it
should start. Multi-user mode allows multiple users to work simultaneously. If you
don't want to share or exchange your packet tracer instance, click the No button.

29
Experiment-12
Aim:- To configure Wireless Local Loop.

Materials Required:- PC Connected with a network.


For providing telecommunication facilities, the network elements required are the
switch, the trunks, the local loops, and the subscriber terminals.

Wireless Local Loop:- The local loop is the dedicated link between the subscriber
terminal and the switch. In cities and towns, the local loop uses twisted pair as the
transmission medium because the distance between the switch and the subscriber
terminal generally will be less than 5 km. Because the subscriber density is high in
cities and towns, the cost of installing a switch for subscribers within a radius of 5 km
is justified. In remote and rural areas, the subscriber density will be less, the number
of calls made by the subscribers will not be very high, and the areas are separated by
long distances from the nearby towns. As a result, laying a cable from one town to
another is not cost effective. Installing a switch to cater to a small number of
subscribers is also prohibitively costly.

Wireless Local Loop Architecture :-

In the telephone network, the local loop is the costliest network element. To provide
telephone services to remote and rural areas, wireless local loop is the most cost-
effective alternative.

Wireless Local Loop components:-


1. PSTN:- It is Public Switched Telephone Network which is a circuit
switched network. It is a collection of world’s interconnected circuit
switched telephone networks.

2. Switch Function:- Switch Function switches the PSTN among various


WANUs.

30
3. WANU:- It is short for Wireless Access Network Unit. It is present at
the local exchange office. All local WASUs are connected to it. Its
functions includes: Authentication, Operation & maintenance, Routing,
Transceiving voice and data.

It consists of following sub-components:-


 Transceiver:- It transmits/receives data.
 WLL Controller:- It controls the wireless local loop component
with WASU.
 AM:- It is short for Access Manager. It is responsible for
authentication.
 HLR:- It is short for Home Location Register. It stores the
details of all local WASUs.

4. WASU:- It is short for Wireless Access Subscriber Units. It is present


at the house of the subscriber. It connects the subscriber to WANU and
the power supply for it is provided locally.

Wireless local loops can be in two configurations:-

Figure 12.1 shows configuration 1. A radio base station will be connected to the
switch. The base station is generally located in a town at the same premises as the
switch. A number of remote stations communicate with the base station through
radio. Each remote station can be installed in an area, and it can support anywhere
between 1 and 32 telephones. The distance between the base station and each remote
generally can be up to 30 km. A base station can provide telephone facilities to
subscribers in a radius of 30 km. This configuration is used extensively for providing
telephone facilities in rural and remote areas.

Figure 12.1:- Wireless local loop configuration 1.


31
Wireless local loop can have two configurations. In one configuration, the subscriber
telephone is connected to the switch using radio as the medium. In the other
configuration, wireless connectivity is provided between the subscriber terminal and
the distribution point, and the connectivity between the switch and the distribution
point is through a wired medium.

Figure 12.2 shows configuration 2 of wireless local loops. In this configuration, a


number of base stations are connected to the switch using cable. Each base station in
turn communicates with a number of remote stations. Each remote station can support
a number of telephones. In this configuration, the local loop is a combination of
wired and wireless media. This configuration is used extensively in urban areas.
TDMA and CDMA technologies are used in this configuration. The number of
subscribers supported by the base station/remote station depends on the access
technology. In the following sections, some representative wireless local loop
systems are described.

Figure 12.2:- Wireless local loops configuration 2.

Note:- Wireless local loop also is gaining popularity in urban areas because of
reduced installation and maintenance costs.

32
Experiment-13
Aim:- To configure WLAN.

Materials Required:- Router, Modem Switches and other networking equipment.


Following are the three steps for Configuration of Wireless Local Area (Wi-fi)
Network:-

1. Installation
2. Configuration
3. Connection

 Installation

1. Acquire a wireless router. There are a variety of factors that will


determine which router is best for you. These include distance,
interference, transfer speed, and security.

33
2. Connect the router to your modem. Once you've purchased your
router, you will need to connect it to your modem. The router will have a
port in the back labeled WAN/WLAN/Internet. Connect this port to the
modem using a standard Ethernet cable.

 Make sure that the router is properly powered and turned on.

3. Connect a computer via Ethernet cable. This step is not always


necessary, but can be very useful if you want to set up the wireless
router before connecting any wireless devices to it. Connecting a
computer through a physical cable will allow you to tinker with the
wireless settings without losing your connection to the router.

 For optimum efficiency while setting up the router, plug it in next


to your computer while you adjust the settings. After you are
finished configuring the router, you can move it to where it will
normally stay.

 Configuration

34
1) Install the router software. Not every router comes with software to
install, but if yours did, then install it on a computer that is connected to
the router via an Ethernet cable. Using the bundled software makes
setting up a router much more convenient than going in to the
configuration menus.

 Using the software, designate the name of your wireless network,


and the type of security that you want to use. Choose WPA2 for
the most secure network. Choose a password and continue.

 Most router software will automatically detect your internet


settings. This is the information that the router needs to translate
your internet connection and transfer it to all of your wirelessly
connected devices.

2) Open the router's configuration page. If your router did not come with
any installation software, you will need to connect to the router's
configuration page through your web browser. Open your browser of
choice and enter the web address for the router. This is typically
192.168.1.1 or 192.168.0.1. Consult the documentation that came with
the router to find the exact address.

 You will be asked for a username and password to continue into


the router configuration. These are also provided in the
documentation that came with your router. Typical defaults are
username: admin and Password: password or admin.
35
3) Enter your Internet connection information. This includes the IP
address and DNS information from your internet service provider. Most
routers will fill this section in automatically. If it does not, contact your
ISP for the information that you need to enter.

4) Set your wireless settings. Most routers will have a Wireless Settings


section towards the top of the router's menu. From this section you can
enable or disable the wireless signal, change the network name, and set
the encryption.

 To set the name of the network, select the SSID field. This is the
name that will be displayed on any device that detects your
network. If you are living in an area with a lot of public traffic,
avoid putting any identifiable information in the SSID, as anyone
with a wireless device can see it.
36
 Make sure to set the encryption to the latest version allowed by
your router. In most cases, this will be WPA2. WPA2 operates
with a single password. You can enter whatever you'd like, but a
strong password is recommended. Stronger passwords contain
upper and lowercase letters, numbers, and symbols.

5) Apply your settings. Make sure you click the Apply or Save Changes
button in your router's configuration when you are done changing the
settings. The router will process for a moment, and your new settings
will take effect.

6) Place your router. In order to get the best possible signal, try to place
your router in a central location. Keep in mind that any obstacles such as
walls and doors will degrade the signal. If you have multiple floors, you
may want to consider multiple routers to ensure that you have the
coverage you need.

 Remember that it must be physically connected to your modem,


so this may limit your options when placing the router.
37
 Connection

1) Connect a device to the network. Once the router is broadcasting a


wireless signal, you can test the connection by scanning for wireless
networks using a Wi-Fi device such as another computer, a Smartphone,
a tablet, etc.

 Scan for new networks. In Windows, click the network icon in the
system tray in the lower-right corner of the desktop. Select
Connect to a Network and look for your SSID. On a Mac, click
the AirPort icon in the menu bar, which looks like 3 curved lines.
Select your SSID from the list of available networks.

38
2) Enter the password. If you enabled WPA2 encryption, you will need to
enter your password to connect to the network. If you are using a private
computer, you can disable the hidden characters on some systems to let
you see the password you are typing easier.

3) Test your connection. Once you are connected to the network, wait a


moment for your IP address to be assigned. Open a web browser and try
to connect to a website you don't normally visit (this will ensure that you
aren't loading the website from memory).

39
Experiment-14
Aim:- To configure Adhoc Networks.

Materials Required:- PC connected with a network.


While it is not typically known by non-technical people, it is possible to connect Wi-
Fi computers together without the use of a wireless router or access point; this feature
is called Ad-Hoc networking.
With Ad-Hoc networking, the multiple computers are connected directly to each
other through the same wireless cards used to connect to the more standard wireless
router or access point. In this article we'll review the process of setting up an Ad-Hoc
network on Windows 7.

Create an Ad-Hoc Network on Windows:-


The first step in the process requires that we start at the Network and Sharing Center
as shown in Figure 1 below. You can access the Windows 7 Networking and Sharing
Center through your control panel.

Figure 1:- Windows 7 Networking and Sharing Center

Now, from this point, there are two different ways to setup an Ad-Hoc network:-

 one uses the Setup a connection or network wizard


 the other utilizes the Manage Wireless Networks control panel

The choice of which one to use depends on your preference. The setup of the Ad-Hoc
network only needs to be performed on the first computer being configured.

40
Let's review the steps using both of the setup methods.

Ad-Hoc Network Configuration using the Setup a Connection or Network


Wizard:-
When using the wizard method, the first task to perform requires the selection of 'Set
up a new connection or network' option from the main window; this is shown in
Figure 1.

Figure 2:- Setup a Connection or Network

At the bottom of the list shown in the window is the option to Set up a wireless ad
hoc (computer-to-computer) network. Once this option is selected the window
shown in Figure 3 is displayed.

Figure 3: Set up a wireless ad hoc network

The window shown in Figure 3 describes the Ad Hoc network and describes the
requirements. Once you review the text on this window select next.
41
Figure 4:- Give your network a name and choose security options

The next window shown in Figure 4 lets the user select the Network name, Security
type and Security key which will be used between the computers. It is always
recommended that a strong security option is used even when only connecting
together two computers as it is always possible for a nearby person to exploit the lack
of security.

There is also an option to save this network; when this box is selected, the Ad-Hoc
wireless network is saved in the list of available wireless networks to connect to.

Figure 5:- The Ad-Hoc network is ready to use

Once the Ad-Hoc network has been set up, the window shown in Figure 5 will be
displayed; this completes the process using the wizard method.
42
Ad-Hoc Network Configuration using the Manage Wireless Network
Control Panel:-
Using the Manage Wireless Networks control panel method, the first task is to select
the Manage wireless networks option from the top left of the main window; this is
shown in Figure 6.

Figure 6:- Manage Wireless Networks

Figure 7:- Manage Wireless Networks that use (Wireless Network Connection)

Once the Manage wireless networks selection has been selected, the window shown
in Figure 7 is shown. From this window, the next option is to select the Add selection
to add a wireless network.

43
Figure 8:- How do you want to add a network?

Once the Add selection is selected, the window shown in Figure 8 is displayed. From
this window the option to 'Create an ad hoc network' would be used to create an ad
hoc network.

Figure 9:- Setup a wireless Ad-Hoc network

Once this option has been selected, a familiar window is shown that runs through the
same set up a wireless ad hoc network selection that are used in the previous method.
This process is shown in figures 9, 10 and 11.

44
Figure 10:- Give your network a name and choose security options

Figure 11:- The Ad-Hoc network is ready to use

Now, if you selected the option to save this network when creating the Ad-Hoc
network, it will show up under Manage wireless networks as shown in Figure 12.

45
Figure 12:- Manage wireless networks that use (Wireless Network Connection)

Regardless of whether the Save this network option was selected, the computer is
going to connect to the just created Ad-Hoc network. However, if the network was
not saved, once the computer is rebooted or if a connection is made to another
wireless network then the Ad-Hoc network will not be an available option without
recreating it again.

Figure 13 shows how the Ad-Hoc network will display in the available networks
window on the computer which created the Ad-Hoc network.

Figure 13:- Available Networks


46
Connecting to an Already Created Ad-Hoc Network:-
The configuration of the computers connecting to an already created Ad-Hoc wireless
network is the same as connecting to any other type of wireless network. Figure 14
shows the available wireless networks as shown on the other computers. The different
icon shown to the right of each network name shows the type of wireless network.

Figure 14:- Open Network and Sharing Center

Simply select the network and choose connect.  If no wireless security was selected,
then the network will be connected; if wireless security was configured then the
window shown in Figure 15 will be displayed to allow the entry of the security key.

Figure 15:- Wireless Security

Once the network is connected, the network will show as connected as shown in
Figure 16.

Figure 16:- Connected to Wireless Ad-Hoc Network


47
Experiment-15
Aim:- To install and configure wireless access points.

Materials Required:- Ethernet cables, a switch or router, an access point, an


AC/DC adapter, and a computer (System connected with a network).

Wireless Access Point:- A wireless access point is a wireless router that connects to
a wired modem and creates a wireless network. We can usually configure a wireless
access point via a web interface. The web interface is arranged differently depending
on the make and model of our wireless, but the process is generally similar.

 Steps for installation wireless access points:-

 Deploy the Router/Switch.


 Deploy the Access Point.
 Connect the Cables.
 Configure.
 Viola!

 Steps for configure wireless access points:-

1. Connect the wireless access point to the modem. Connect an Ethernet


cable to an open LAN port on your modem or router. Then connect the
other end of the cable to an open LAN port on the wireless access point.

48
2. Plug in the wireless access point. Place the wireless access point in an
area that is central to where you want to provide wireless internet and
plug it into an electrical outlet.

3. Connect a computer to the wireless access point. Use an Ethernet


cable to connect a computer to another open LAN port on the wireless
access point.

49
4. Enter the IP address for the wireless access point into a web
browser. This opens the web interface for the wireless router. The IP
address is different from one device make and model to another. Consult
the user's manual that came with your device, or the manufacturer's web
page to find the IP address for your wireless router.
 Common IP address includes "192.168.1.1" and "10.0.0.1".

5. Log into the web interface. You will need to enter the default username
and password to log into the web interface. Consult the user's manual or
manufacturer's website to find the default username and password for
your wireless router.

50
6. Change the default username and password. If you are using your
wireless access point in a public setting, it's best to change the default
username and password so that other people can't log in to your web
interface. Locate the login settings in the web interface and change the
username and password to something that other people won't be able to
guess.

7. Enable wireless connectivity. Locate the wireless settings in the web


interface and enable wireless. This turns on the wireless access point's
wireless capabilities.

51
8. Change the SSID (optional). This SSID is the name of the wireless
network. If you want, you can change the name of the SSID in the
wireless settings of the web interface.

 You can also select if you want the SSID to be broadcast or kept
hidden. If you broadcast the SSID, guests will be able to search
for your SSID on their wireless devices. If the SSID is hidden,
those who want to connect to the wireless access point will need
to already know the SSID.

9. Select a security encryption type. The most common wireless security


encryptions are Wireless Equivalent Privacy (WEP) and Wi-Fi Protected
Access (WPA/WPA2). WPA and WPA2 use 256-bit encryption,
compared to 128-bit encryption that is most often used by WEP
encryption. You should select WPA and WPA2 over WEP if the option
is available.

52
10.Create a password for your network. After you select an encryption
type, you'll need to create a password for your wireless network. A good
password should be at least 8 characters with a mix of capital and
lowercase letters, numbers, and special characters.

11.Save your settings. After you are finished configuring your wireless


setup, you'll need to save your changes in the web interface. Guests and
other users can now connect to your wireless network using by searching
or enter the SSID on their wireless devices as well as the wireless
password.

53
Reference Books:-
 “ Computer Networks and Internet”
 By:- D.E. Cormer
 Edition:- 6th edition
 Published by Pearson Education © 2015
Reference sites:-
 https://theinfohelp.com/

-: THE END :-

54

You might also like