Top Banner

of 53

Data Communication & Networking Lab Manual

Oct 14, 2015

Download

Documents

GopalPatel

Laboratory Manual for DCN
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 5/24/2018 Data Communication & Networking Lab Manual

    1/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 1

    Data Communication NetworkingLaboratory Manual

    (Semester8th- EC)

    Department of Electronics and

    Communication Engineering

    Vishwakarma Government

    Engineering College

    Chandkheda

  • 5/24/2018 Data Communication & Networking Lab Manual

    2/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 2

    Equipments/Software:

    1. RJ- 45 Connector, Claming Tool, Twisted pair cable

    2. Packet Tracer Software

    3. Turbo C, C++

  • 5/24/2018 Data Communication & Networking Lab Manual

    3/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 3

    Index

    Sr.

    No.

    Title of Experiment Page No. Date Sign

    1 Study of LAN transmission medias , topologies ,

    interconnection devices & LAN standardsand

    practically implement the cross-wired cable andstraight through cable using clamping tool.

    2 Write a program to implement bit stuffing &Destuffing

    3 Write a program to implement Character stuffing

    & Destuffing

    4 Write a program to implement CRC.

    5 Implementation of parity checker.

    6 Write a program to implement Hamming code.

    7 Write a program to find Hamming distance

    8 Write a C program for IPV4, Implementation ofdecimal to binary, Implementation of binary to

    decimal.

    9 Write a program to implement encoding and

    decoding

    10 Design of LAN for a branch office of the bankand

    Study of Network IP

    11 Study of network topologies using packet tracer

    software

    12 To configure FTP server on windows server.

    13 To configure DNS server on windows server.

  • 5/24/2018 Data Communication & Networking Lab Manual

    4/53

  • 5/24/2018 Data Communication & Networking Lab Manual

    5/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 5

    only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be 'out of spec'. At this

    point, you obviously have ALOT more than 1/2 of an inch of un-twisted wire.

    3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-made

    cable, with one of the ends whacked off, you only have one end to install - the crossed over end.

    Below are two diagrams, which show how you need to arrange the cables for each type of cableend.

    The codes are commonly depicted with RJ-45 jacks as follows (the view is from the front of thejacks)

    Diagram shows you how to prepare Cross wired connection

    Purpose of Crossover Cable-

    Crossover cables are very similar to straight-through cables, except that they have pairs of wires

    that crisscross. This allows for two devices to communicate at the same time. Unlike straightthrough cables, we use crossover cables to connect like devices.

    Crossover cables are typically used in the following situations:

    Use a crossover cable when:

    1. Connecting a computer to a router

  • 5/24/2018 Data Communication & Networking Lab Manual

    6/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 6

    2. Connecting a computer to a computer

    3. Connecting a router to a router

    4. Connecting a switch to a switch

    5. Connecting a hub to a hub

    Diagram shows you how to prepare straight through wired connection

    Purpose of Straight through Cable-

    Straight-through cables get their name from how they are made. Out of the 8 pins that exist on

    both ends of an Ethernet cable, each pin connects to the same pin on the opposite side.

    A straight-through cable is typically used in the following situations:

    Use a straight-through cable when:

    1. Connecting a router to a hub

    2. Connecting a computer to a switch

    3. Connecting a LAN port to a switch, hub, or computer

  • 5/24/2018 Data Communication & Networking Lab Manual

    7/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 7

    Conclusions:

  • 5/24/2018 Data Communication & Networking Lab Manual

    8/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 8

    Experiment2

    Aim: Write a program to implement bit stuffing & Destuffing

    Resources: Turbo C, C++.

    Theory:

    Bit Stuffing and DestuffingInclude ,, files both in transmitter & receiver

    programs.

    During the transmission, attach a flag pattern (01111110) at the start & end ofdata unit.

    If transmitter sees five consecutive ones in data, it stuffs zero bit in data.

    At the receiving end, whenever in data it finds five consecutive ones and the next

    bit are zero then the receiver will de stuff that zero bit.e.g. If the Pattern to be transmitted is 00011110111110000, then at the transmitter side

    will be 000111101111100000 because as 5 consecutive 1s are detected, one 0 should be stuffed and at the receiver side again as it will detect 0 after 5 consecutive 1s , it will

    destuff it.

    Code:

    #include

    #include

    #include

    void main()

    {

    char a[20],b[20];

    char flag[8]="01111110",e='0';

    int i,j=0;

    clrscr();

    printf("\n Enter message bits: ");

    fflush(stdin);

    gets(a);

    for(i=0;i

  • 5/24/2018 Data Communication & Networking Lab Manual

    9/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 9

    b[j]=flag[i];

    j++;

    }

    for(i=0;a[i]!='\0';i++)

    {

    if(a[i-1]=='1'&&a[i-2]=='1'&&a[i-3]=='1'&&a[i-4]=='1'&&a[i-5]=='1')

    {

    b[j]=e;

    j++;

    b[j]=a[i];

    j++;

    a[i-1]=0;

    }

    else

    {

    b[j]=a[i];

    j++;

    }

    }

    for(i=0;i

  • 5/24/2018 Data Communication & Networking Lab Manual

    10/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 10

    printf("\n Destuffed bit stream(Rx): ");

    for(j=0,i=0;i

  • 5/24/2018 Data Communication & Networking Lab Manual

    11/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 11

    Output:

    Conclusions:

  • 5/24/2018 Data Communication & Networking Lab Manual

    12/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 12

    Experiment 3

    Aim: Write a program to implement character stuffing & Destuffing

    Resources: Turbo C, C++.

    Theory:

    Character Stuffing and DestuffingInclude ,, files both in transmitter & receiver

    programs.

    This is type of Framing Method.During the transmission attach a ASCII Code pattern DLE STX at the start &

    DLE ETX end of data Unit.

    If transmitter sees DLE stuff another DLE text in data.

    At the receiving end, whenever the data it finds five consecutive DLE thenreceiver will destuff One DLE.

    Code:

    #include

    #include

    #include

    void main()

    {

    int i,j=0;

    char str[100],str2[100],flag,esc;

    clrscr();

    printf("\n Enter the data string: ");

    gets(str);

    printf("\n Enter the flag: ");

    scanf("%c",&flag);

    printf("\n Enter the stuffing character: ");

    fflush(stdin);

    scanf("%c",&esc);

    str2[j]=flag;

  • 5/24/2018 Data Communication & Networking Lab Manual

    13/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 13

    j++;

    for(i=0;str[i]!='\0';i++)

    {

    if(str[i]==flag)

    {

    str2[j]=esc;

    j++;

    }

    else if(str[i]==esc)

    {

    str2[j]=esc;

    j++;

    }

    str2[j]=str[i];

    j++;

    }

    str2[j]=flag;

    j++;

    str2[j]='\0';

    printf("\n Stuffed data string: %s",str2);

    printf("\n\n Destuffed data string: ");

    for(j=0;str2[j]!='\0';j++)

    {

    str2[0]='\0';

    if(str2[j]==esc&&(str2[j+1]==flag||str2[j+1]==esc))

    {

    printf("%c",str2[j+1]);

  • 5/24/2018 Data Communication & Networking Lab Manual

    14/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 14

    j++;

    }

    else if(str2[j]==flag&&str2[j+1]=='\0')

    {

    goto end;

    }

    else

    printf("%c",str2[j]);

    }

    end:

    getch();}

    Output:

    Conclusions:

  • 5/24/2018 Data Communication & Networking Lab Manual

    15/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 15

    Experiment4

    Aim: Write a program to implement CRC.

    Resources: Turbo C, C++.

    Theory:

    It does error checking via polynomial division. In general, a bit stringbn-1bn-2bn-3b2b1b0

    As

    bn-1Xn-1 + bn-2 Xn-2 + bn-3 Xn-3 + b2 X2 + b1 X1 + b0Ex: -

    10010101110

    As

    X10 + X7 + X5 + X3 + X2 + X1All computations are done in modulo 2

    Algorithm:-

    1. Given a bit string, append 0S to the end of it (the number of 0s is the same as the degree ofthe generator polynomial) let B(x) be the polynomial corresponding to B.

    2. Divide B(x) by some agreed on polynomial G(x) (generator polynomial) and determine

    the remainder R(x). This division is to be done using Modulo 2 Division.3. Define T(x) = B(x)R(x)

    (T(x)/G(x) => remainder 0)

    4. Transmit T, the bit string corresponding to T(x).

    5. Let T represent the bit stream the receiver gets and T(x) the associated polynomial. Thereceiver divides T1(x) by G(x). If there is a 0 remainder, the receiver concludes T = T

    and no error occurred otherwise, the receiver concludes an error occurred and requires aretransmission.

    Code:

    #include

    #include

    #include

    void main()

    { char st1[10],st2[15],div[5],q[15],i_ans[5],i_op[5],cw[15];

    int l,i,n,m;

    clrscr();

    printf("\nEnter the string: ");

    scanf("%s",st1);

  • 5/24/2018 Data Communication & Networking Lab Manual

    16/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 16

    strcpy(div,"10101");

    strcpy(st2,st1);

    strcat(st2,"000000");

    printf("\nDivisor is: %s",div);

    printf("\nDividendo is: %s\n",st2);

    l=strlen(st2);

    for(i=0;i

  • 5/24/2018 Data Communication & Networking Lab Manual

    17/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 17

    for(i=0;i

  • 5/24/2018 Data Communication & Networking Lab Manual

    18/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 18

    Experiment5

    Aim: Implementation of parity checker.

    Resources: Turbo C, C++.

    Theory:

    Parity checking refers to the use ofparitybitsto check thatdatahas been transmitted

    accurately. Parity checking is the most basic form oferror detectionin communications.

    Two transmitting devicesare communicating witheven parity.As the transmitting device sends

    data, it counts the number of set bits in each group of seven bits. If the number of set bits is even,

    it sets the parity bit to 0; if the number of set bits is odd, it sets the parity bit to 1.

    Every byte has an even number of set bits. On the receiving side, the device checks each byte to

    make sure that it has an even number of set bits. If it finds an odd number of set bits, the receiver

    knows there was an error during transmission.

    Code:

    #include

    #include

    #include

    void main()

    { int i=0,j=0;

    char msg1[9],msg2[9];

    clrscr();

    printf("Enter any 9-bits:");

    scanf("%s",&msg1);

    for(i=0;i

  • 5/24/2018 Data Communication & Networking Lab Manual

    19/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 19

    printf("\n Odd Parity");

    j=0;

    printf("\n \nEnter any 9-bits:");

    scanf("%s",&msg2);

    for(i=0;i

  • 5/24/2018 Data Communication & Networking Lab Manual

    20/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 20

    Experiment6

    Aim: Write a program to implement Hamming code.

    Resources: Turbo C, C++.

    Theory:

    Hamming code is a set of error-correction code s that can be used to detect and correctbiterrors

    that can occur when computer data is moved or stored.

    Hamming code is technique developed by R.W. Hamming for error correction. This method

    corrects the error by finding the state at which the error has occurred.

    Code:

    #include

    #include

    #include

    void main()

    {

    clrscr();

    int x1,x2,x3,i,x[4],y[7];

    printf("Enter 4-bit data: ");

    for(i=0;i

  • 5/24/2018 Data Communication & Networking Lab Manual

    21/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 21

    y[1]=x2%2;

    y[3]=x3%2;

    printf("\n \n Generated Hamming Code (even parity): ");

    for(i=0;i

  • 5/24/2018 Data Communication & Networking Lab Manual

    22/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 22

    Experiment7

    Aim: Write a program to find Hamming distance

    Resources: Turbo C, C++.

    Theory:

    Ininformation theory,the Hamming distance between twostringsof equal length is the number

    of positions at which the corresponding symbols are different.

    In another way, it measures the minimum number of substitutions required to change one string

    into the other, or the minimum number of errors that could have transformed one string into the

    other.

    Code:

    #include

    #include

    void main()

    {

    clrscr();

    int i,j=0,a[5],b[5];printf("Enter 5-bit data1: ");

    for(i=0;i

  • 5/24/2018 Data Communication & Networking Lab Manual

    23/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 23

    printf("Hamming distance: %d",j);

    getch();}

    Output:

    Conclusions:

  • 5/24/2018 Data Communication & Networking Lab Manual

    24/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 24

    Experiment8

    Aim: Write a C program for IPV4, Implementation of decimal to binary, Implementation of

    binary to decimal.

    Resources: Turbo C, C++.

    Theory:

    Internet Protocol version 4 (IPv4)is the fourth version in the development of theInternet

    Protocol (IP)Internet,and routes most traffic on the Internet. However, a successor protocol,

    IPv6,has been defined and is in various stages of production deployment. IPv4 is described in

    IETFpublicationRFC 791 (September 1981), replacing an earlier definition (RFC 760,January

    1980).

    IPv4 is a connectionless protocol for use onpacket-switched networks. It operates on abest

    effort delivery model; in that it does not guarantee delivery, nor does it assure proper sequencing

    or avoidance of duplicate delivery.

    Code:

    (a) Implementation of IPV-4

    #include

    #include

    void main()

    { int IP1,IP2,IP3,IP4;

    clrscr();

    printf("enter IP address: ");

    scanf("%d",&IP1);

    scanf("%d",&IP2);

    scanf("%d",&IP3);

    scanf("%d",&IP4);

    printf("\nYou entered: %d.%d.%d.%d \n \n",IP1,IP2,IP3,IP4);

    if(IP1>255 || IP2>255 || IP3>255 || IP4>255)

    {printf("Invalid Address");}

    http://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/IPv6http://en.wikipedia.org/wiki/IETFhttp://tools.ietf.org/html/rfc791http://tools.ietf.org/html/rfc760http://en.wikipedia.org/wiki/Packet-switchedhttp://en.wikipedia.org/wiki/Best_effort_deliveryhttp://en.wikipedia.org/wiki/Best_effort_deliveryhttp://en.wikipedia.org/wiki/Best_effort_deliveryhttp://en.wikipedia.org/wiki/Best_effort_deliveryhttp://en.wikipedia.org/wiki/Packet-switchedhttp://tools.ietf.org/html/rfc760http://tools.ietf.org/html/rfc791http://en.wikipedia.org/wiki/IETFhttp://en.wikipedia.org/wiki/IPv6http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocol
  • 5/24/2018 Data Communication & Networking Lab Manual

    25/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 25

    else if(IP1>=0 && IP1=128 && IP1=192 && IP1=224 && IP1=240 && IP1

  • 5/24/2018 Data Communication & Networking Lab Manual

    26/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 26

    (b) Implementation of decimal to binary

    #include

    #include

    #include

    #include

    void main()

    {

    clrscr();

    int a,b,c,d,e,x[50],stop,count,code;

    printf("Enter the decimal number: ");

    scanf("%d",&c);

    code=c;

    count=0;

    for(a=1;a0;a--)

  • 5/24/2018 Data Communication & Networking Lab Manual

    27/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 27

    {printf("%d",x[a]);}

    getch();}

    Output:

    (C)Implementation of decimal to binary

    /* 4 bit binary to decimal */

    #include

    #include

    #include

    void main()

    {

    int i,j=3,di=0,b[4];

    clrscr();

    printf("Enter 4-bit binary number: ");

    for(i=0;i

  • 5/24/2018 Data Communication & Networking Lab Manual

    28/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 28

    scanf("%d",&b[i]);

    }

    for(i=0;i

  • 5/24/2018 Data Communication & Networking Lab Manual

    29/53

  • 5/24/2018 Data Communication & Networking Lab Manual

    30/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 30

    i=0;

    while (a[i]!='\0')

    {a[i]=a[i]-3;

    i++;}

    printf("\nDecoded data(Rx): %s",a);

    getch();}

    Output:

    Conclusions:

  • 5/24/2018 Data Communication & Networking Lab Manual

    31/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 31

    Experiment10

    Aim: Design of LAN for s typical branch office of the bank and Network IP

    Resources: Command Prompt And Packet Tracer.

    Theory:

    A typical branch of the bank consists of about 40 connected hosts, located on a singlefloor. One of these hosts is the mail server while another is a Database Server for the

    branch. The mail server handles all the incoming and outing mails of the branch

    employees. The database server records all the daily transactions carried in the branch.

    1. Design a network topology to be used and the physical layout

    Plan the placing of hubs or switches in the office area and the no of connections to

    each hub or switch.2. Mention the cost of accessories like hub/switch , type of connection cables, length of

    cable used etc. Give the final quotation for whole setup.3. Analyze your design whether it is optimized for performance or for cost. Justify you

    selection of hardware.

    Classification of IP addressSub netting

    Super netting

    Classification of IP address

    How the ip addresses are classified and when they are used.

    Class Address Range Supports

    Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.

    Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks.

    Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.

    Class E 240.0.0.0 to 254.255.255.254 Reserved.

    Sub netting

    Why we Develop sub netting and How to calculate subnet mask and how to identify subnet

    address.

    Super netting

    Why we develop super netting and How to calculate supernet mask and how to identifysupernet address.

  • 5/24/2018 Data Communication & Networking Lab Manual

    32/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 32

    Procedure:

    To do this EXPERIMENT- follows these steps:

    In this EXPERIMENT- students have to understand basic networking commands e.g ping, tracert

    etc.All commands related to Network configuration which includes how to switch to privilege mode

    and normal mode and how to configure router interface and how to save this configuration to

    flash memory or permanent memory.This commands includes

    Configuring the Router commands

    General Commands to configure network

    Privileged Mode commands of a routerRouter Processes & Statistics

    IP Commands

    Other IP Commands e.g. show ip route etc.

    Diagram to be drawn: -Complete sketch of college LAN, showing no of computers connected

    in each lab to connecting devices like hub, switch etc.

    Conclusions:

  • 5/24/2018 Data Communication & Networking Lab Manual

    33/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 33

    Experiment11

    Aim: Configure a Network topology using packet tracer software.

    Resources: Command Prompt And Packet Tracer software.

    Procedure:

    To implement this practical following network topology is required to be configured using the

    commands. After configuring the given network a packet should be ping from any one machine to

    another.

    (1)Ring Topology:-

  • 5/24/2018 Data Communication & Networking Lab Manual

    34/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 34

    (2)Star Topology:-

    (3)Tree Topology:-

  • 5/24/2018 Data Communication & Networking Lab Manual

    35/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 35

    (4)Hybrid Topology (Star Ring) :-

    (5)Bus Topology:-

  • 5/24/2018 Data Communication & Networking Lab Manual

    36/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 36

    (6)Mesh Topology:-

    Conclusions:

  • 5/24/2018 Data Communication & Networking Lab Manual

    37/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 37

    Experiment12

    Aim: To configure FTP server on windows server.

    Resources: Windows 2003 Server, Windows XP Professional Client

    Theory:

    File Transfer Protocol (FTP) is a standardnetwork protocol used to transfer files from onehostto another host over aTCP-based network, such as theInternet.

    FTP is built on aclient-server architecture and uses separate control and data connectionsbetween the client and the server.[1] FTP users may authenticate themselves using aclear-text

    sign-in protocol, normally in the form of a username and password, but can connect

    anonymously if the server is configured to allow it. For secure transmission that hides (encrypts)

    the username and password, and encrypts the content, FTP is oftensecured withSSL/TLS("FTPS")

    Procedure:

    SETUP IIS Server and host website

    IIS (Internet Information Services) is an easy-to-use web server from Microsoft. IIS is not

    installed on Windows XP Professional by default. It is however installed when you upgrade fromWindows NT or Windows 2000 to Windows XP Pro. If not installed IIS can be installed as

    follows:

    1- Start-> control panel-> Add/Remove program->Add/Remove windows component

    2- When the Windows Components Wizard appears, click Next. From here select IIS.

    The IIS is configured using the IIS snap-in, previously called the Internet Services Manager. Thiscan be accessed in one of three ways:

    Method 1:1- From the Start menu, select Settings and then Control Panel2- Open Administrative Tools3- Open Internet Information Services

    Method 2:1- Right click on My Computer on your desktop

    2- Select Manage to open the Computer Management console

    3- Select Internet Information Services under Services and Applications

    Method 3:

    1- From the Start menu, select Run2- Type inetmgr and run the command

    To install the FTP service on our IIS machine

    1. Begin by opening Add or Remove Programs in Control Panel and selecting Add/RemoveWindows Components. Then select the checkbox for Application Server:

    http://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Host_%28network%29http://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Client-server_modelhttp://en.wikipedia.org/wiki/File_Transfer_Protocol#cite_note-for-1http://en.wikipedia.org/wiki/Clear_texthttp://en.wikipedia.org/wiki/File_Transfer_Protocol#Securityhttp://en.wikipedia.org/wiki/SSL/TLShttp://en.wikipedia.org/wiki/SSL/TLShttp://en.wikipedia.org/wiki/File_Transfer_Protocol#Securityhttp://en.wikipedia.org/wiki/Clear_texthttp://en.wikipedia.org/wiki/File_Transfer_Protocol#cite_note-for-1http://en.wikipedia.org/wiki/Client-server_modelhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Host_%28network%29http://en.wikipedia.org/wiki/Network_protocol
  • 5/24/2018 Data Communication & Networking Lab Manual

    38/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 38

    2. Click Details and select the checkbox for Internet Information Services

  • 5/24/2018 Data Communication & Networking Lab Manual

    39/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 39

    3. Click Details and select the checkbox for File Transfer Protocol (FTP) services

    4. Click OK twice and then Next to install the FTP service.During installation youll need to insert your Windows Server 2003 product CD or

    browse to a network distribution point where the Windows Server 2003 setup files are

    located. Click Finish when the wizard is done.

    Creating an FTP Site: Open IIS Manager in Administrative Tools, select FTP Sites in the

    console tree, and right-click on Default FTP Site and select properties :

  • 5/24/2018 Data Communication & Networking Lab Manual

    40/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 40

    Assign the IP address 172.16.11.210 for the Human Resources FTP site and make D:\HRthe folder where its content is located. To create the new FTP site, right-click on the FTP

    Sites node and select New --> FTP Site. This starts the FTP Site Creation Wizard. Click

    Next and type a description for the site.

    Click Next and specify 172.16.11.210 as the IP address for the new site

  • 5/24/2018 Data Communication & Networking Lab Manual

    41/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 41

    Click Next and select Do not isolate users, since this will be a site that anyone (includingguest users) will be free to access:

    Click Next and specify C:\HR as the location of the root directory for the site.

  • 5/24/2018 Data Communication & Networking Lab Manual

    42/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 42

    Click Next and leave the access permissions set at Read only as this site will only be usedfor downloading forms for present and prospective employees:

    Click next and then Finish to complete the wizard. The new Human Resources FTP sitecan now be seen in IIS Manager under the FTP Sites

  • 5/24/2018 Data Communication & Networking Lab Manual

    43/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 43

    To view the contents of this site, go to a Windows XP desktop on the same network andopen the URL ftp://172.16.11.210 using Internet Explorer :

    To view all users currently connected to the Human Resources FTP site, right-click onthe site in Internet Service Manager and select Properties, then on the FTP Site tab click

    the Current Sessions button to open the FTP User Sessions dialog :

  • 5/24/2018 Data Communication & Networking Lab Manual

    44/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 44

    Now to create another FTP site using a script instead of the GUI. Well create a sitecalled Help and Support with root directory C:\Support and IP address 172.16.11.211:

    The figure shows the result of running the script:

    Configure the FTP Service:

    To configure the FTP Service to allow only anonymous connections, follow these steps:

    1. Start Internet Information Services Manager or open the IIS snap-in.2. Expand Server_name, where Server_nameis the name of the server.3. Expand FTP Sites4. Right-click Default FTP Siteand then click Properties.5. Click the Security Accountstab.6. Click to select the Allow Anonymous Connectionscheck box (if it is not already

    selected), and click to select the Allow only anonymous connectionscheck box.

    When you click to select the Allow only anonymous connectionscheck box, you

  • 5/24/2018 Data Communication & Networking Lab Manual

    45/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 45

    configure the FTP Service to allow only anonymous connections. Users cannot log on by

    using user names and passwords.

    7. Click the Home Directorytab.8. Click to select the Readand Log visitscheck boxes (if they are not already selected), and

    then click to clear the Writecheck box (if it is not already cleared).

    9. Click OK.10. Quit Internet Information Services Manager or close the IIS snap-in.

    The FTP server is now configured to accept incoming FTP requests. Copy or move the files that

    you want to make available to the FTP publishing folder for access. The default folder is

    drive:\Inetpub\Ftproot, where driveis the drive on which IIS is installed.

    Conclusions:

  • 5/24/2018 Data Communication & Networking Lab Manual

    46/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 46

    Experiment13

    Aim: To configure DNS server on windows server.

    Resources: Windows 2003 server, Windows XP client

    Theory: The Domain Name System (DNS) is ahierarchical distributed naming system for

    computers, services, or any resource connected to theInternet or aprivate network.it translates

    easily memorizeddomain names to the numericalIP addresses needed for the purpose of

    locating computer services and devices worldwide.

    Procedure:

    Setting up active directory using the run command dcpromo is a straightforward procedure. Tobegin, from your windows 2003 server desktop:

    1. Go to Start click on Run and type dcpromo and hit Enter. The Welcome to the ActiveDirectory Installation Wizard should come up:

    2. Click on Next. On the following window, you will get a warning about comparabilityissues with other Operating Systems. Improve security settings in Windows Server2003affect older versions of windows:

    http://en.wikipedia.org/wiki/Hierarchicalhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Private_networkhttp://en.wikipedia.org/wiki/Domain_namehttp://en.wikipedia.org/wiki/IP_addresshttp://s.helpdeskgeek.com/wp-content/pictures/2008/07/image.pnghttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/Domain_namehttp://en.wikipedia.org/wiki/Private_networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Hierarchical
  • 5/24/2018 Data Communication & Networking Lab Manual

    47/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 47

    3. Click Next. On the next screen, you will get two options. The first option asks you if youwant the server to become a domain controller for anew domain or if you want the server

    to be an additional domain controller for for an existing domain:

    4. Select the first option and click Next. On the next window, you will get three options:a. The first option is to setup the domain in a new forest. Select this option if its the

    firstdomain controlleron your organization, or if you want it to be totally

    independent from any forest.

    b.

    Childdomainin an existing domain tree. select this option if you want the domainto be a child domain from an existing domain.c. Domain tree in an existing forest. if you dont want any of the above, select this.

    http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image3.pnghttp://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image2.pnghttp://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##
  • 5/24/2018 Data Communication & Networking Lab Manual

    48/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 48

    5. Choose the first option, and click Next. On the next screen, we need to type the fullDNSnamefor the new domain:

    6. Type the full DNS name like helpdeskgeek.com, and click on Next. On the next screen,we need to choose the NETBIOS name.

    http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image5.pnghttp://s.helpdeskgeek.com/wp-content/pictures/2008/07/image4.pnghttp://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##
  • 5/24/2018 Data Communication & Networking Lab Manual

    49/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 49

    7. Choose the name, and click Next. On the next screen, you need to select the location ofwhere you want to store the database and log files. for best performance store them in

    separate disks.

    8. Choose the location where you want the active directory database and logs, and clickNext.

    9. Next, the Shared system volume window will come up. You need to choose the locationwhere you want to store the SYSVOL files. This folder contains the domain public files

    and are replicated to all the domain controllers in the domain.

    http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image7.pnghttp://s.helpdeskgeek.com/wp-content/pictures/2008/07/image6.png
  • 5/24/2018 Data Communication & Networking Lab Manual

    50/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 50

    10.Choose the folder location, and click Next.11. On the next window, the DNS registration diagnostic will show up. You will get

    Diagnostic failedand will get three options:a. It will allow you to perform the DNS diagnostic again.b. It gives you the option to allow the active directory wizard to install and configure

    DNS for you, and use this DNS as the primary DNS for this server.c. It allows you to bypass this window if you plan to correct the problem later on.

    12.We have to configure its services, so we will choose the option to Install and configureDNS server on this computer and set this computer to use this DNS server as its

    preferred DNS server. then click Next.

    13.On the next window, you need to choose what type or permissions you want for users andgroup objects. Here you will get two options.

    a. Select this option if you run server programs with pre-windows 2000.b. Select this option, if you only run windows servers 2000 and windows servers

    2003 your domain.

    http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image8.png
  • 5/24/2018 Data Communication & Networking Lab Manual

    51/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 51

    14.Select the second option, and click Next. On the next window, you need to enter theDirectory services restore mode administrator password.

    http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image10.pnghttp://s.helpdeskgeek.com/wp-content/pictures/2008/07/image9.png
  • 5/24/2018 Data Communication & Networking Lab Manual

    52/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 52

    15.Type your chosen password, and click Next. Next, you will get the summary of all theoptions you have chosen during the active directory wizard. Remember, the domain

    administrator account password is the same as the current local administrator password.

    16.Click Next. the active directory installation should begin.

    http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image12.pnghttp://s.helpdeskgeek.com/wp-content/pictures/2008/07/image11.png
  • 5/24/2018 Data Communication & Networking Lab Manual

    53/53

    Sub.Code: 181001 Sub.Name: DCN Year: 2014

    VGEC /EC /BE/SEM-8 53

    17.Click on Finish. and restart the computer. Active Directory should be now installed.

    Conclusions:

    http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image13.png