You are on page 1of 59

LES’s G.V.

Acharya Institute of Engineering and Technology,


Shelu.
DEPARTMENT OF COMPUTER ENGINEERING

Lab Journal
COMPUTER NETWORK LABORATORY

Class semester: TE-V


G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

INDEX

PAGE
SR.NO NAME OF EXPERIMENT
NO.
Setup a network and configure IP addressing, subnetting, masking. (E.g. CISCO Packet
1
Tracer, Student Ed.)
Use basic networking commands in Linux (ping, tracert, nslookup, netstat, ARP, RARP, ip,
2
ifconfig, dig, route )
Build a simple network topology and configure it for static routing protocol using packet
3
tracer.

4 Perform network discovery using discovery tools (e.g. mrtg)

5 Use Wireshark to understand the operation of TCP/IP layers

6 Study of Stop and wait protocol/ sliding window (selective repeat / Go back N )

a. Set up multiple IP addresses on a single LAN.


7 b. Using nestat and route commands of Linux
c. Perform packet filtering by enabling IP forwarding using IPtables in Linux

8 Socket programming using TCP or UDP

9 Perform File Transfer and Access using FTP

10 Perform Remote login using Telnet server

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 2


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

EVALUATION SHEET

Date of Date of
Sr.No. List of experiments performance checking Grade/marks Remarks

Total marks

Average marks

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 3


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Name: Rajshree Rajendra Borkar

Roll No.: 04

Class: TE

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 4


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Ex. No. 1. Setup a network and configure IP addressing, subnetting,


Date: masking. (E g. CISCO Packet Tracer, Student Ed.)

Aim: Setup a network and configure IP addressing, subnetting, masking. (E.g. CISCO Packet
Tracer, Student Ed.)

THEORY:

Computer Network

A network, in computing, is a group of two or more devices that can communicate. In practice, a
network is comprised of a number of different computer systems connected by physical and/or
wireless connections. The scale can range from a single PC sharing out basic peripherals to
massive data centers located around the World, to the Internet itself.

IP address
The Internet Protocol Address (or IP Address) is a unique address that computing devices such
as personal computers, tablets, and smartphones use to identify itself and communicate with
other devices in the IP network. Any device connected to the IP network must have a unique IP
address within the network. An IP address is analogous to a street address or telephone number
in that it is used to uniquely identify an entity.

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 5


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Subnetting
Subnetting enables the network administrator to further divide the host part of the address into
two or more subnets. In this case, a part of the host address is reserved to identify the particular
subnet. This is easier to see if we show the IP address in binary format.

The full address is:


10010110.11010111.00010001.00001001

The Class B network part is:


10010110.11010111

The host address is:


00010001.00001001

If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001)
are reserved for identifying the subnet.
The subnet mask is the network address plus the bits reserved for identifying the
subnetwork -- by convention, the bits for the network address are all set to 1, though it would
also work if the bits were set exactly as in the network address.
In this case, therefore, the subnet mask would be
11111111.11111111.11110000.00000000.

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 6


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

It's called a mask because it can be used to identify the subnet to which an IP address
belongs by performing a bitwise AND operation on the mask and the IP address. The result is the
subnetwork address:

Subnet Mask 255.255.240.000 11111111.11111111.11110000.00000000


IP Address 150.215.017.009 10010110.11010111.00010001.00001001
Subnet Address 150.215.016.000 10010110.11010111.00010000.00000000

The subnet address, therefore, is 150.215.016.000.

Subnet mask
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into
network address and host address. Subnet Mask is made by setting network bits to all "1"s and
setting host bits to all "0"s. Within a given network, two host addresses are reserved for special
purpose, and cannot be assigned to hosts.

Default gateway
A default gateway serves as an access point or IP router that a networked computer uses to send
information to a computer in another network or the internet. Default simply means that this
gateway is used by default, unless an application specifies another gateway.

Packet tracer
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows
users to create network topologies and imitate modern computer networks. The software allows
users to simulate the configuration of Cisco routers and switches using a simulated command
line interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add
and remove simulated network devices as they see fit. The software is mainly focused towards
Certified Cisco Network Associate Academy students as an educational tool for helping them
learn fundamental CCNA concepts.

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 7


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Result:

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 8


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 9


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Conclusion:
Successfully set up a network and configure IP addressing, subnetting, masking. Using CISCO Packet
Tracer.

Timely Submission Presentation Understanding Total


2 marks 3 marks 5 marks 10marks

Viva Questions:
1. What is computer network?

A computer network is a set of devices connected through links. A node can be computer,
printer, or any other device capable of sending or receiving the data. The links connecting the
nodes are known as communication channels.

2. What is subnetting?
Subnetting is the procedure to divide the network into sub-networks or small networks.  

3. What is supernetting?
Supernetting is the procedure to combine the small networks into larger space.

4. Differentiate between subnetting and supernetting ?

Subnetting Supernetting
Subnetting is the procedure to divide While supernetting is the
the network into sub-networks. procedure of combine the small
networks.
In subnetting, Network addressee’s While in supernetting, Host
bits are increased. addressee’s bits are increased.
In subnetting, The mask bits are While In supernetting, The mask
moved towards right. bits are moved towards left.
Subnetting is implemented via While supernetting is
Variable-length subnet masking. implemented via Classless
interdomain routing.
In subnetting, Address depletion is While It is used for simplify
reduced or removed. routing process.

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 10


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Ex. No. 2. Use basic networking commands in Linux (ping,


tracert, nslookup, netstat, ARP, RARP, ip, ifconfig,
Date: dig, route )

Aim: Use basic networking commands in Linux (ping, tracert, nslookup, netstat, ARP, RARP,
ip, ifconfig, dig, route )

THEORY:
Ping command?
Ping uses the ICMP protocol’s mandatory ECHO_REQUEST datagram to elicit an ICMP
ECHO_RESPONSE from a host or gateway. ECHO_REQUEST datagrams (‘‘pings’’) have an
IP and ICMP header, followed by a struct timeval and then an arbitrary number of ‘‘pad’’ bytes
used to fill out the packet.
Following table mentions syntax or format of the ping command and extended ping command.

Ping Command Format Description

#ping w.x.y.z The command checks for layer-3 connectivity with IP device with
address w.x.y.z

#ping 172.168.20.1 Performs basic layer-3 to test device with ip address 172.168.20.1

#ping Guru Same as above but it pings the system with its IP host name rather
than IP address

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 11


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

tracert command
Traceroute is a utility that records the route (the specific gateway computers at each hop)
through the Internet between your computer and a specified destination computer. It also
calculates and displays the amount of time each hop took. Traceroute is a handy tool both for
understanding where problems are in the Internet network and for getting a detailed sense of the
Internet itself. Another utility, PING, is often used prior to using traceroute to see whether a host
is present on the network.

Tracert Command Syntax


tracert [-d] [-h MaxHops] [-w TimeOut] [-4] [-6] target [/?]

Ex. tracert 192.168.1.1


tracert www.google.com

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 12


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Nslookup command
nslookup is the name of a program that lets an Internet server administrator or any computer user
enter a host name (for example, "whatis.com") and find out the corresponding IP address. It will
also do reverse name lookup and find the host name for an IP address you specify.

netstat command
Netstat is a command line utility that can be used to list out all the network (socket) connections
on a system. It lists out all the tcp, udp socket connections and the unix socket connections.
netstat - Print network connections, routing tables, interface statistics, masquerade connections,
and multicast memberships.
Ex. netstat -a
netstat -at
netstat -au
Netstat -ant

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 13


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

ARP Address Resolution Protocol


ARP stands for Address Resolution Protocol, which is used to find the address of a network
neighbor for a given IPv4 address.
Synopsis
arp [-evn] [-H type] [-i if] -a [hostname] arp [-v] [-i if] -d hostname [pub] arp [-v] [-H type] [-i if]
-s hostname hw_addr [temp] arp [-v] [-H type] [-i if] -s hostname hw_addr [netmask nm] pub
arp [-v] [-H type] [-i if] -Ds hostname ifa [netmask nm] pub
arp [-vnD] [-H type] [-i if] -f [filename]
arp syntax
arp [-vn] [-H type] [-i if] -a [hostname]

Ex. arp -s address hw_addr


arp
$arp -i eth1 -d 10.0.0.1

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 14


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

RARP Reverse Address Resolution Protocol


Rarp manipulates the kernel’s RARP table in various ways. The primary options are clearing an
address mapping entry and manually setting up one. For debugging purposes, the rarp program
also allows a complete dump of the RARP table.
GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 15
\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 16


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Ip command
The ip command is used to assign an address to a network interface and/or configure network
interface parameters on Linux operating systems. This command replaces old good and now
deprecated ifconfig command on modern Linux distributions.
Setting and Deleting an Ip Address
$ sudo ip addr add 192.168.0.193/24 dev wlan0
$ ip addr show wlan0

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 17


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

$ sudo ip addr del 192.168.0.193/24 dev wlan0


Show Routing Table Entry
$ ip route show
$ ip route get 10.42.0.47
Changing The Default Route
$ sudo ip route add default via 192.168.0.196

Ifconfig command
Ifconfig command is used to configure network interfaces. ifconfig stands for interface
configurator. Ifconfig is widely used to initialize the network interface and to enable or disable
the interfaces.
1. View Network Settings of an Ethernet Adapter
# ifconfig eth0
2. Display Details of All interfaces Including Disabled Interfaces
# ifconfig -a
3. Disable an Interface
# ifconfig eth0 down
4. Enable an Interface
# ifconfig eth0 up
5. Assign ip-address to an Interface
# ifconfig eth0 192.168.2.2

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 18


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Dig command
dig (command) dig (domain information groper) is a network administration command-line tool
for querying Domain Name System (DNS) servers. dig is useful for network troubleshooting and
for educational purposes.
The dig command fundamentally used for the following purposes:
1. Performs DNS lookups.
2. Find host addresses, IP address, mail exchanges (MX), CNAMEs, name servers, and more.
3. Verify ISP DNS server and Internet connectivity.
4. Verify spam and blacklisting records.
Syntax
The basic syntax:
dig Hostname
dig DomaiNameHere
dig @DNS-server-name Hostname
dig @DNS-server-name IPAddress
dig @DNS-server-name Hostname|IPAddress type

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 19


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Route Command:
route is a command used to view and manipulate the IP routing table in both
Unix-like and Microsoft Windows[1] operating systems. Manual
manipulation of the routing table is characteristic of static routing.
Display Existing Routes
$ route
$ route -n
Adding a Default Gateway
$ route add default gw 192.168.1.10

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 20


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 21


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Result:

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 22


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Conclusion:
Successfully executed basic networking commands on the Linux OS.

Timely Submission Presentation Understanding Total


2 marks 3 marks 5 marks 10marks

Viva Questions:
1) What are the different networking commands? Explain with their usage.
Ping. Ping is used to testing a network host capacity to interact with another host.

NetStat. Netstat is a Common TCP – IP networking command-line method present in most


Windows, Linux, UNIX, and other operating systems

2) What is the difference between ARP and RARP?


ARP stands for Address Resolution Protocol. Whereas RARP stands for
Reverse Address Resolution Protocol. ... Through ARP, (32-bit) IP
address mapped into (48-bit) MAC address. Whereas through RARP,
(48-bit) MAC address of 48 bits mapped into (32-bit) IP address

3) What is the syntax of dig command?


Syntax:
dig [hostname]

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 23


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Ex. No. 3. Build a simple network topology and configure it for


Date: static routing protocol using packet tracer.

Aim: Build a simple network topology and configure it for static routing protocol using
packet tracer.

THEORY:

Routing
Routing is the process of selecting a path for traffic in a
network, or between or across multiple networks.
Broadly, routing is performed in many types of networks,
including circuit-switched networks, such as the public
switched telephone network (PSTN), and computer networks, such as the Internet.
Routing is the process of selecting paths in a network along which to send network traffic and
route is the path to send the network traffic.
The routing process usually directs forwarding on the basis of routing tables, which maintain a
record of the routes to various network destinations. Routing tables may be specified by an
administrator, learned by observing network traffic or built with the assistance of routing
protocols.

Destination

Types of routing
Two main types of routing:

ü Static routing

ü Dynamic routing

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 24


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

The router learns about remote networks from neighbor routers or from an administrator. The
router then builds a routing table. If the network is directly connected then the router already
knows how to get to the network. If the networks are not attached, the router must learn how to
get to the remote network with either static routing (administrator manually enters the routes in
the router's table) or dynamic routing (happens automatically using routing protocols like
EIGRP,OSPF,etc.).

The routers then update each other about all the networks they know. If a change occurs
e.g a router goes down, the dynamic routing protocols automatically inform all routers about
the change. If static routing is used, then the administrator has to update all changes into all
routers and therefore no routing protocol is used.

Static routing
Static routing is a type of network routing technique. Static routing is not a routing protocol;
instead, it is the manual configuration and selection of a network route, usually managed by the
network administrator. It is employed in scenarios where the network parameters and
environment are expected to remain constant.

Static routing is only optimal in a few situations. Network degradation, latency and congestion
are inevitable consequences of the non-flexible nature of static routing because there is no
adjustment when the primary route is unavailable

Result:

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 25


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 26


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Conclusion:
Build a simple network topology and configure it for static routing protocol using packet tracer.

Timely Submission Presentation Understanding Total


2 marks 3 marks 5 marks 10marks

Viva questions:

1. What is routing?
Routing is the process of selecting a path for traffic in a network or between or across
multiple networks. 

2. What is static routing? What are the static routing protocols?


Static routing is a form of routing that occurs when a router uses a manually-
configured routing entry, rather than information from dynamic routing traffic 

3. What is dynamic routing? What are the dynamic routing protocols?


Dynamic routing is a networking technique that provides optimal data routing. Unlike static routing,
dynamic routing enables routers to select paths according to real-time logical network layout changes.
The most popular are Routing Information Protocol (RIP) and Open Shortest Path First (OSPF).

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 27


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Ex. No. 4. Perform network discovery using discovery tools (eg.


Date: mrtg).

Aim: Perform network discovery using discovery tools (eg. mrtg)

THEORY:

When enabled, the Network Discovery method gathers information about devices on your
network, like the other discovery methods that are available in SMS do. However, the Network
Discovery method is unique because, besides computers, it also finds network devices such as
printers, routers, and bridges. Basically, the Network Discovery method finds any device on the
network that has an IP address.
You can configure Network Discovery to discover resources in subnets, domains, and
Simple Network Management Protocol (SNMP) devices. If the site is configured with standard
security, you can also configure Network Discovery to discover resources in Microsoft Dynamic
Host Configuration Protocol (DHCP) servers. You can configure Network Discovery to find
routers in an ordered list of community names and specify the maximum number of hops within
which to find routers.
The Network Discovery method can be used to:
 Discover potential SMS clients.
 Collect resource discovery data so that the Client Push Installation method can later install
client components on those resources.
 Gather data so that Network Trace can display a detailed map that includes SMS sites and
the connections between SMS primary site servers and other site systems.
 Collect resource information that you can later use for collections, reports, and queries.

MRTG
The Multi Router Traffic Grapher (MRTG) is an open source tool used to monitor the traffic load
on network links. James Kretchmar tells us how MRTG produces Web pages containing PNG
images, which provide a live visual representation of this traffic.
MRTG produces Web pages that display graphs of bandwidth use on network links on
daily, weekly, monthly, and yearly scales. This can be an invaluable tool for diagnosing network
problems because it not only indicates the current status of the network but also lets you visually
compare this with the history of network utilization.

Result:

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 28


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 29


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Conclusion:
Successfully performed network discovery using mrtg tool.

Timely Submission Presentation Understanding Total


2 marks 3 marks 5 marks 10marks

Viva questions:

1. Explain network discovery process?


Network discovery is the process that allows computers and devices to find one another when they
are on the same network
GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 30
\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

2. What is mrtg?
The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links.
MRTG generates HTML pages containing GIF images which provide a LIVE visual representation
of this traffic.

3. Write the features of mrtg?

 Gets its data via an SNMP agent, or through the output of a command line.
 Typically collects data every five minutes (it can be configured to collect data less frequently).
 Creates an HTML page per target that features four graphs (GIF or PNG images).
 Results are plotted vs time into day, week, month and year graphs, with the I plotted as a full green area,
and the O as a blue line.
 Automatically scales the Y axis of the graphs to show the most detail.
 Can also send warning emails if targets have values above a certain threshold.

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 31


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Ex. No. 5. Use Wireshark to understand the operation of


Date: TCP/IP layers

Aim: Use Wireshark to understand the operation of TCP/IP layers


Ethernet Layer : Frame header, Frame size etc.
Data Link Layer : MAC address, ARP (IP and MAC address binding)
Network Layer : IP Packet (header, fragmentation), ICMP (Query and Echo)
Transport Layer: TCP Ports, TCP handshake segments etc.
Application Layer: DHCP, FTP, HTTP header formats

THEORY:

Wireshark :
Wireshark is a free and open source packet analyzer. It is used for network troubleshooting,
analysis, software and communications protocol development, and education. Originally named
Ethereal, the project was renamed Wireshark in May 2006 due to trademark issues.

Ethernet layer:
The Ethernet physical layer is the physical layer component of the Ethernet family of computer
network standards. The Ethernet physical layer evolved over a considerable time span and
encompasses quite a few physical media interfaces and several magnitudes of speed.

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 32


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Data link layer:


The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer
networking. This layer is the protocol layer that transfers data between adjacent network nodes in
a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
The data link layer provides the functional and procedural means to transfer data between
network entities and might provide the means to detect and possibly correct errors that may
occur in the physical layer.
The data link layer is concerned with local delivery of frames between nodes on the same
level of the network. Data-link frames, as these protocol data units are called, do not cross the
boundaries of a local network. Inter-network routing and global addressing are higher-layer
functions, allowing data-link protocols to focus on local delivery, addressing, and media
arbitration

Network layer:
The network layer provides the means of transferring variable-length network packets from a
source to a destination host via one or more networks. Within the service layering semantics of
the OSI network architecture, the network layer responds to service requests from the transport
layer and issues service requests to the data link layer.

Transport layer:
The transport layer is a conceptual division of methods in the layered architecture of protocols in
the network stack in the Internet Protocol Suite and the Open Systems Interconnection (OSI)
reference model. The protocols of this layer provide host-to-host communication services for
applications. It provides services such as connection-oriented communication, reliability, flow
control, and multiplexing.
The details of implementation and semantics of the transport layer of the TCP/IP model,
which is the foundation of the Internet, and the OSI model of general networking are different.
The protocols in use today in this layer for the Internet all originated in the development of
TCP/IP. In the OSI model the transport layer is often referred to as Layer 4, or L4, while
numbered layers are not used in TCP/IP.

Application layer:
Application layer is the top most layer in OSI and TCP/IP layered model. This layer exists in
both layered Models because of its significance, of interacting with user and user applications.
This layer is for applications which are involved in communication system.

Result:
Frame

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 33


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

IP Status

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 34


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Conclusion:
Understanded operation if TCP/IP using wireshark.

Timely Submission Presentation Understanding Total


2 marks 3 marks 5 marks 10marks

Viva Questions:
1. Write different protocols of Physical layer.
Digital Subscriber Line.
Integrated Services Digital Network.
Infrared Data Association.
Universal Serial Bus (USB.)
Bluetooth.
Controller Area Network.
Ethernet.

2. Write different protocols of datalink and network layer protocols.


Synchronous Data Link Protocol (SDLC)
High-Level Data Link Protocol (HDLC)
Serial Line Interface Protocol (SLIP)
Point to Point Protocol (PPP)
Link Control Protocol (LCP)
Link Access Procedure (LAP)
Network Control Protocol (NCP)

3. Write different protocols of transport and application layer protocols.


Telnet
FTP
TFTP:
NFS:
SMTP:
LPD:
X window:
SNMP

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 35


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 36


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Ex. No. 6. Study of Stop and wait protocol/ sliding window


Date: (selective repeat / Go back N )

Aim: Study of Stop and wait protocol/ sliding window (selective repeat / Go back N )
THEORY:

Stop-n-Wait Protocol:
"Stop-n-wait" (sometimes known as "positive acknowledgement with retransmission") is the
fundamental technique to provide reliable transfer under unreliable packet delivery system.

In this method of flow control, the sender sends a single frame to receiver & waits for an
acknowledgment.
• The next frame is sent by sender only when acknowledgment of previous frame is received.
• This process of sending a frame & waiting for an acknowledgment continues as long as the
sender has data to send.
• To end up the transmission sender transmits end of transmission (EOT) frame.

Selective Repeat Protocol:


This protocol(SRP) is mostly identical to GBN protocol, except that buffers are used and the
receiver, and the sender, each maintain a window of size. SRP works better when the link is very
unreliable. Because in this case, retransmission tends to happen more frequently, selectively
retransmitting frames is more efficient than retransmitting all of them. SRP also requires full
duplex link. backward acknowledgements are also in progress.

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 37


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Go-Back-n protocol:
Go-Back-N protocol is a sliding window protocol. It is a mechanism to detect and control the
error in datalink layer. During transmission of frames between sender and receiver, if a frame is
damaged, lost, or an acknowledgement is lost then the action performed by sender and receiver is
explained in the following content.

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 38


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Result:

STEPS STOP AND WAIT PRTOCOL:

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 39


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 40


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Go-Back-n protocol:

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 41


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 42


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Conclusion:
Studied of Stop and wait protocol/ sliding window (selective repeat / Go back N )

Timely Submission Presentation Understanding Total


2 marks 3 marks 5 marks 10marks

Viva Questions:
1. What is the difference between go-back-n and selective repeat protocol?
The main difference between these two protocols is that after finding the suspect or damage in
sent frames go-back-n protocol re-transmits all the frames whereas selective repeat protocol
re-transmits only that frame which is damaged

2. What are the advantages and disadvantages of go-back-n protocol?


Every data packet gets acknowledged independently. Here the reliability is high, but the main
drawback is high traffic

3. What are the advantages and disadvantages of selective repeat?


Advantages :
Selective Repeat protocol provides for sending multiple frames depending upon the availability of
frames in the sending window, even if it does not receive acknowledgement for any frame in the
interim. The maximum number of frames that can be sent depends upon the size of the sending
window.

Disadvantages :
data blocks may be received out of order, such that some reordering is required at the receiver side,
before the blocks can be delivered to their destination.

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 43


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Ex. No. 7. Set up multiple IP addresses on a single LAN. And


also use nestat and route commands of Linux.
Date: Perform packet filtering by enabling IP forwarding
using IPtables in Linux

Aim:
a. Set up multiple IP addresses on a single LAN.
b. Using nestat and route commands of Linux
 View current routing table
 Add and delete routes
 Change default gateway
c. Perform packet filtering by enabling IP forwarding using IPtables in Linux

THEORY:

How to Set up Multiple IP Addresses on a Computer

There are several ways to set up multiple IP addresses on a computer:


1. To have multiple network interface cards (NICs) on your computer and to assign a different
IP address to each card.
2. To assign multiple IP addresses to a single NIC.
3. To combine 2 previous options: have multiple NICs with multiple IPs assigned to one or
more of them.
By default, each network interface card (NIC) has its own unique IP address. However,
you can assign multiple IP addresses to a single NIC.
How to assign multiple IP addresses to the same NIC
If you want to assign more than one IP address to a network card on Windows Vista,

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 44


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

follow the steps below.

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 45


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

1. Choose Settings -> Network Connections on the Windows Start menu.


2. Right-click on the Local Area Connection, choose Properties.
3.Highlight Internet Protocol (TCP/IP), click Properties.

4. If you use DHCP, you should disable it: click Use the following IP address and enter IP
address, Subnet mask and Default gateway.
5. Click Advanced... at the bottom.

5. Enter additional IP addresses: click the Add... button and enter a new IP address and
Subnet mask.

If you use Windows XP, the whole procedure will be the same, except for the first steps:
Right-click on My Network Places, choose Properties.
Right-click on the Local Area Connection, choose Properties.
Other steps are the same as for Windows Vista.

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 46


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Packet filtering
packet filtering is the process of passing or blocking packets at a network interface based on
source and destination addresses, ports, or protocols. The process is used in conjunction with
packet mangling and Network Address Translation (NAT). Packet filtering is often part of a
firewall program for protecting a local network from unwanted intrusion.

Result:

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 47


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Conclusion:
Successfully performed packet filtering by enabling IP forwarding using IP tables in Linux

Timely Submission Presentation Understanding Total


2 marks 3 marks 5 marks 10marks

Viva Questions:
1. What is NAT?
NAT stands for network address translation. It's a way to map multiple local private addresses to a public
one before transferring the information.

2. What is packet filtering?


packet filtering is controlling access to a network by analyzing the incoming and outgoing packets and letting
them pass or halting them based on the IP address of the source and destination.

3. How to add and delete routes?


To add static route type following command: route -p add 0.0.0.0 mask 0.0.0.0 192.168.95.1

To remove static route type this command: route delete 0.0.0.0 mask 0.0.0.0 192.168.95.1

4. How to set multiple ip addresses in Linux.


If you would like to create a range of Multiple IP Addresses to a particular interface called “ifcfg-
eth0“, we use “ifcfg-eth0-range0” and copy the contains of ifcfg-eth0 on it as shown below. Now
open “ifcfg-eth0-range0” file and add “IPADDR_START” and “IPADDR_END” IP address range

5. Explain netstat and route command


Netstat — derived from the words network and statistics — is a program that's controlled via commands
issued in the command line. 

The route command allows you to make manual entries into the network routing tables. The route
command distinguishes between routes to hosts and routes to networks by interpreting the network
address of the Destination variable, which can be specified either by symbolic name or numeric address.

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 48


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Ex. No. 8.
Socket programming using TCP or UDP
Date:

Aim: Socket programming using TCP or UDP


THEORY:

Transmission Control Protocol(TCP):


The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol
suite. It originated in the initial network implementation in which it complemented the Internet
Protocol (IP).

Server side

#include <stdio.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <string.h>
int main(){
int welcomeSocket, newSocket;
char buffer[1024];
struct sockaddr_in serverAddr;
struct sockaddr_storage serverStorage;
socklen_t addr_size;
/*---- Create the socket. The three arguments are-----*/
/* 1) Internet domain 2) Stream socket 3) Default protocol (TCP in this case) */
welcomeSocket = socket(PF_INET, SOCK_STREAM, 0);
/*---- Configure settings of the server address struct----*/
/* Address family = Internet */
serverAddr.sin_family = AF_INET;
/* Set port number, using htons function to use proper byte order */
serverAddr.sin_port = htons(7891);
GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 49
\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

/* Set IP address to localhost */

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 50


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

serverAddr.sin_addr.s_addr = inet_addr("127.0.0.1");
/* Set all bits of the padding field to 0 */
memset(serverAddr.sin_zero, '\0', sizeof serverAddr.sin_zero);
/*---- Bind the address struct to the socket----*/
bind(welcomeSocket, (struct sockaddr *) &serverAddr, sizeof(serverAddr));
/*---- Listen on the socket, with 5 max connection requests queued ----
*/ if(listen(welcomeSocket,5)==0)
printf("Listening\n");
else
printf("Error\n");
/*---- Accept call creates a new socket for the incoming connection----*/
addr_size = sizeof serverStorage;
newSocket = accept(welcomeSocket, (struct sockaddr *) &serverStorage, &addr_size);
/*---- Send message to the socket of the incoming connection----*/
strcpy(buffer,"Hello World\n");
send(newSocket,buffer,13,0);
return 0;
}
Client Code

/****************** CLIENT CODE ****************/


#include <stdio.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <string.h>
int main(){
int clientSocket;
char buffer[1024];
struct sockaddr_in serverAddr;
socklen_t addr_size;
/*---- Create the socket. The three arguments are-----*/
/* 1) Internet domain 2) Stream socket 3) Default protocol (TCP in this case) */

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 51


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

clientSocket = socket(PF_INET, SOCK_STREAM, 0);

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 52


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

/*---- Configure settings of the server address struct----*/


/* Address family = Internet */
serverAddr.sin_family = AF_INET;
/* Set port number, using htons function to use proper byte order */
serverAddr.sin_port = htons(7891);
/* Set IP address to localhost */
serverAddr.sin_addr.s_addr = inet_addr("127.0.0.1");
/* Set all bits of the padding field to 0 */
memset(serverAddr.sin_zero, '\0', sizeof serverAddr.sin_zero);
/*---- Connect the socket to the server using the address struct----*/
addr_size = sizeof serverAddr;
connect(clientSocket, (struct sockaddr *) &serverAddr, addr_size);
/*---- Read the message from the server into the buffer----*/
recv(clientSocket, buffer, 1024, 0);
/*---- Print the received message----*/
printf("Data received: %s",buffer);
return 0;

User Datagram Protocol (UDP):

UDP (User Datagram Protocol) is an alternative communications protocol to Transmission


Control Protocol (TCP) used primarily for establishing low-latency and loss-tolerating
connections between applications on the internet.

Result

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 53


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Conclusion :
In this practical, learned socket programming using TCP and UDP.

Timely Submission Presentation Understanding Total


2 marks 3 marks 5 marks 10marks

Viva Questions

1. What is the difference between tcp and udp?


TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol. A key difference
between TCP and UDP is speed, as TCP is comparatively slower than UDP. Overall, UDP is a much
faster, simpler, and efficient protocol, however, retransmission of lost data packets is only possible
with TCP

2. Advantages of tcp and udp protocol?


UDP is faster, simpler, and more efficient than TCP. Retransmission of lost packets is
possible in TCP, but not in UDP. There is no retransmission of lost packets in the User
Datagram Protocol (UDP)

3. What is client and server.


Client :- Client devices are basically PCs with integrated or installed software that can request and
receive information. 

Server :- A server is a computer or system that provides resources, data, services, or programs to
other computers, known as clients, over a network. In theory, whenever computers share resources
with client machines they are considered servers.

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 54


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Ex. No. 9.
Perform File Transfer and Access using FTP
Date:

Aim: Perform File Transfer and Access using FTP

THEORY:

File Transfer Protocol:


File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between
computers on the Internet over TCP/IP connections.
FTP is a client-server protocol that relies on two communications channels between client
and server: a command channel for controlling the conversation and a data channel for
transmitting file content. Clients initiate conversations with servers by requesting to download a
file. Using FTP, a client can upload, download, delete, rename, move and copy files on a server.
A user typically needs to log on to the FTP server, although some servers make some or all of
their content available without login, also known as anonymous FTP.

Result:

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 55


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Conclusion:
Successfully transfer the file and access it using FTP.

Timely Submission Presentation Understanding Total


2 marks 3 marks 5 marks 10marks

Viva Questions

1. What is FTP?

FTP stands for File transfer protocol. FTP is a standard internet protocol provided by TCP/IP used for
transmitting the files from one host to another.

2. What are the steps in transferring the file?


using external device,
using external software,
using sharing network,
using Wi-Fi sharing.

3. How to share a computer?


1. Introduction.
2. Click the Start menu and choose Network.
3. Click the Network and Sharing Centre button.
4. How to file share between computers? ...
5. Turn off Password Protected Sharing and click Apply.
6. Place files and folders you want to share with others into your PC's Public folder

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 56


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Ex. No. 10.


Perform Remote login using Telnet server
Date:
Aim: Perform Remote login using Telnet server

THEORY:

Telnet Server:

Telnet is a protocol that allows you to connect to remote computers (called hosts) over
a TCP/IP network (such as the internet). Using telnet client software on your computer, you can
make a connection to a telnet server (i.e., the remote host). Once your telnet client establishes a
connection to the remote host, your client becomes a virtual terminal, allowing you to
communicate with the remote host from your computer. In most cases, you'll need to log into the
remote host, which requires that you have an account on that system. Occasionally, you can log
in as guest or public without having an account.
Telnet clients are available for all major operating systems.
Command-line telnet clients are built into most versions of macOS, Windows, Unix,
and Linux. To use these clients, go to their respective command lines (i.e., the Terminal
application in macOS, the shell in Unix or Linux, or the DOSprompt in Windows), and then
enter:
telnet host port

Result:

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 57


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

Conclusion:
Performed Remote login using Telnet server

Timely Submission Presentation Understanding Total


2 marks 3 marks 5 marks 10marks

Viva Questions:
1. What is telnet?
Telnet stands for terminal network. It is a type of protocol that enables one computer to connect
to local computer. It is a used as a standard TCP/IP protocol.

2. What are the applications of telnet?


Telnet data
There are other TCP terminal clients, such as netcat or socat on UNIX and PuTTY on
Windows, which handle such requirements. Nevertheless, Telnet may still be used in
debugging network services such as SMTP, IRC, HTTP, FTP or POP

3. What are the steps in remote login with telnet server?


Starting a Telnet client session
1. Type the STRTCPTELN (Start TCP/IP TELNET) command, or type TELNET at the
command line and press Enter.
2. Type the name of the remote system. ...
3. Type the Internet address of the remote system. ...
4. To use the default parameter values, press Enter

5. When starting a 5250 full-screen mode session, the following optional parameters are also
applicable:

1. Timeout wait for host (INZWAIT)

2. Keyboard language type (KBDTYPE)

3. Port number of the remote host server application (PORT)

4. Remote Virtual Display (RMTVRTDSP)

5. Remote User (RMTUSER)

6. Remote password (RMTPWD)

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 58


\ G.V.ACHARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY, SHELU

7. Remote password encryption (RMTPWDENC)

8. Remote initial program (RMTINLPGM)

9. Remote initial menu (RMTINLMNU)

10. Remote Current library (RMTCURLIB)

11. Remote Keyboard Type (RMTKBDTYPE)

12. Remote character set (RMTCHRSET)

13. Remote code page (RMTCODPAG)

GVAIET/NBA-2013/CRITERIA 7.2/T-LP/COMP/TE/SEM-V/LAB MANUAL/CN/2018/REV.1/1.7.2018 Page 59

You might also like