5/24/2018 Data Communication & Networking Lab Manual
1/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 1
Data Communication NetworkingLaboratory Manual
(Semester8th- EC)
Department of Electronics and
Communication Engineering
Vishwakarma Government
Engineering College
Chandkheda
5/24/2018 Data Communication & Networking Lab Manual
2/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 2
Equipments/Software:
1. RJ- 45 Connector, Claming Tool, Twisted pair cable
2. Packet Tracer Software
3. Turbo C, C++
5/24/2018 Data Communication & Networking Lab Manual
3/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 3
Index
Sr.
No.
Title of Experiment Page No. Date Sign
1 Study of LAN transmission medias , topologies ,
interconnection devices & LAN standardsand
practically implement the cross-wired cable andstraight through cable using clamping tool.
2 Write a program to implement bit stuffing &Destuffing
3 Write a program to implement Character stuffing
& Destuffing
4 Write a program to implement CRC.
5 Implementation of parity checker.
6 Write a program to implement Hamming code.
7 Write a program to find Hamming distance
8 Write a C program for IPV4, Implementation ofdecimal to binary, Implementation of binary to
decimal.
9 Write a program to implement encoding and
decoding
10 Design of LAN for a branch office of the bankand
Study of Network IP
11 Study of network topologies using packet tracer
software
12 To configure FTP server on windows server.
13 To configure DNS server on windows server.
5/24/2018 Data Communication & Networking Lab Manual
4/53
5/24/2018 Data Communication & Networking Lab Manual
5/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 5
only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be 'out of spec'. At this
point, you obviously have ALOT more than 1/2 of an inch of un-twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-made
cable, with one of the ends whacked off, you only have one end to install - the crossed over end.
Below are two diagrams, which show how you need to arrange the cables for each type of cableend.
The codes are commonly depicted with RJ-45 jacks as follows (the view is from the front of thejacks)
Diagram shows you how to prepare Cross wired connection
Purpose of Crossover Cable-
Crossover cables are very similar to straight-through cables, except that they have pairs of wires
that crisscross. This allows for two devices to communicate at the same time. Unlike straightthrough cables, we use crossover cables to connect like devices.
Crossover cables are typically used in the following situations:
Use a crossover cable when:
1. Connecting a computer to a router
5/24/2018 Data Communication & Networking Lab Manual
6/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 6
2. Connecting a computer to a computer
3. Connecting a router to a router
4. Connecting a switch to a switch
5. Connecting a hub to a hub
Diagram shows you how to prepare straight through wired connection
Purpose of Straight through Cable-
Straight-through cables get their name from how they are made. Out of the 8 pins that exist on
both ends of an Ethernet cable, each pin connects to the same pin on the opposite side.
A straight-through cable is typically used in the following situations:
Use a straight-through cable when:
1. Connecting a router to a hub
2. Connecting a computer to a switch
3. Connecting a LAN port to a switch, hub, or computer
5/24/2018 Data Communication & Networking Lab Manual
7/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 7
Conclusions:
5/24/2018 Data Communication & Networking Lab Manual
8/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 8
Experiment2
Aim: Write a program to implement bit stuffing & Destuffing
Resources: Turbo C, C++.
Theory:
Bit Stuffing and DestuffingInclude ,, files both in transmitter & receiver
programs.
During the transmission, attach a flag pattern (01111110) at the start & end ofdata unit.
If transmitter sees five consecutive ones in data, it stuffs zero bit in data.
At the receiving end, whenever in data it finds five consecutive ones and the next
bit are zero then the receiver will de stuff that zero bit.e.g. If the Pattern to be transmitted is 00011110111110000, then at the transmitter side
will be 000111101111100000 because as 5 consecutive 1s are detected, one 0 should be stuffed and at the receiver side again as it will detect 0 after 5 consecutive 1s , it will
destuff it.
Code:
#include
#include
#include
void main()
{
char a[20],b[20];
char flag[8]="01111110",e='0';
int i,j=0;
clrscr();
printf("\n Enter message bits: ");
fflush(stdin);
gets(a);
for(i=0;i
5/24/2018 Data Communication & Networking Lab Manual
9/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 9
b[j]=flag[i];
j++;
}
for(i=0;a[i]!='\0';i++)
{
if(a[i-1]=='1'&&a[i-2]=='1'&&a[i-3]=='1'&&a[i-4]=='1'&&a[i-5]=='1')
{
b[j]=e;
j++;
b[j]=a[i];
j++;
a[i-1]=0;
}
else
{
b[j]=a[i];
j++;
}
}
for(i=0;i
5/24/2018 Data Communication & Networking Lab Manual
10/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 10
printf("\n Destuffed bit stream(Rx): ");
for(j=0,i=0;i
5/24/2018 Data Communication & Networking Lab Manual
11/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 11
Output:
Conclusions:
5/24/2018 Data Communication & Networking Lab Manual
12/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 12
Experiment 3
Aim: Write a program to implement character stuffing & Destuffing
Resources: Turbo C, C++.
Theory:
Character Stuffing and DestuffingInclude ,, files both in transmitter & receiver
programs.
This is type of Framing Method.During the transmission attach a ASCII Code pattern DLE STX at the start &
DLE ETX end of data Unit.
If transmitter sees DLE stuff another DLE text in data.
At the receiving end, whenever the data it finds five consecutive DLE thenreceiver will destuff One DLE.
Code:
#include
#include
#include
void main()
{
int i,j=0;
char str[100],str2[100],flag,esc;
clrscr();
printf("\n Enter the data string: ");
gets(str);
printf("\n Enter the flag: ");
scanf("%c",&flag);
printf("\n Enter the stuffing character: ");
fflush(stdin);
scanf("%c",&esc);
str2[j]=flag;
5/24/2018 Data Communication & Networking Lab Manual
13/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 13
j++;
for(i=0;str[i]!='\0';i++)
{
if(str[i]==flag)
{
str2[j]=esc;
j++;
}
else if(str[i]==esc)
{
str2[j]=esc;
j++;
}
str2[j]=str[i];
j++;
}
str2[j]=flag;
j++;
str2[j]='\0';
printf("\n Stuffed data string: %s",str2);
printf("\n\n Destuffed data string: ");
for(j=0;str2[j]!='\0';j++)
{
str2[0]='\0';
if(str2[j]==esc&&(str2[j+1]==flag||str2[j+1]==esc))
{
printf("%c",str2[j+1]);
5/24/2018 Data Communication & Networking Lab Manual
14/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 14
j++;
}
else if(str2[j]==flag&&str2[j+1]=='\0')
{
goto end;
}
else
printf("%c",str2[j]);
}
end:
getch();}
Output:
Conclusions:
5/24/2018 Data Communication & Networking Lab Manual
15/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 15
Experiment4
Aim: Write a program to implement CRC.
Resources: Turbo C, C++.
Theory:
It does error checking via polynomial division. In general, a bit stringbn-1bn-2bn-3b2b1b0
As
bn-1Xn-1 + bn-2 Xn-2 + bn-3 Xn-3 + b2 X2 + b1 X1 + b0Ex: -
10010101110
As
X10 + X7 + X5 + X3 + X2 + X1All computations are done in modulo 2
Algorithm:-
1. Given a bit string, append 0S to the end of it (the number of 0s is the same as the degree ofthe generator polynomial) let B(x) be the polynomial corresponding to B.
2. Divide B(x) by some agreed on polynomial G(x) (generator polynomial) and determine
the remainder R(x). This division is to be done using Modulo 2 Division.3. Define T(x) = B(x)R(x)
(T(x)/G(x) => remainder 0)
4. Transmit T, the bit string corresponding to T(x).
5. Let T represent the bit stream the receiver gets and T(x) the associated polynomial. Thereceiver divides T1(x) by G(x). If there is a 0 remainder, the receiver concludes T = T
and no error occurred otherwise, the receiver concludes an error occurred and requires aretransmission.
Code:
#include
#include
#include
void main()
{ char st1[10],st2[15],div[5],q[15],i_ans[5],i_op[5],cw[15];
int l,i,n,m;
clrscr();
printf("\nEnter the string: ");
scanf("%s",st1);
5/24/2018 Data Communication & Networking Lab Manual
16/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 16
strcpy(div,"10101");
strcpy(st2,st1);
strcat(st2,"000000");
printf("\nDivisor is: %s",div);
printf("\nDividendo is: %s\n",st2);
l=strlen(st2);
for(i=0;i
5/24/2018 Data Communication & Networking Lab Manual
17/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 17
for(i=0;i
5/24/2018 Data Communication & Networking Lab Manual
18/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 18
Experiment5
Aim: Implementation of parity checker.
Resources: Turbo C, C++.
Theory:
Parity checking refers to the use ofparitybitsto check thatdatahas been transmitted
accurately. Parity checking is the most basic form oferror detectionin communications.
Two transmitting devicesare communicating witheven parity.As the transmitting device sends
data, it counts the number of set bits in each group of seven bits. If the number of set bits is even,
it sets the parity bit to 0; if the number of set bits is odd, it sets the parity bit to 1.
Every byte has an even number of set bits. On the receiving side, the device checks each byte to
make sure that it has an even number of set bits. If it finds an odd number of set bits, the receiver
knows there was an error during transmission.
Code:
#include
#include
#include
void main()
{ int i=0,j=0;
char msg1[9],msg2[9];
clrscr();
printf("Enter any 9-bits:");
scanf("%s",&msg1);
for(i=0;i
5/24/2018 Data Communication & Networking Lab Manual
19/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 19
printf("\n Odd Parity");
j=0;
printf("\n \nEnter any 9-bits:");
scanf("%s",&msg2);
for(i=0;i
5/24/2018 Data Communication & Networking Lab Manual
20/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 20
Experiment6
Aim: Write a program to implement Hamming code.
Resources: Turbo C, C++.
Theory:
Hamming code is a set of error-correction code s that can be used to detect and correctbiterrors
that can occur when computer data is moved or stored.
Hamming code is technique developed by R.W. Hamming for error correction. This method
corrects the error by finding the state at which the error has occurred.
Code:
#include
#include
#include
void main()
{
clrscr();
int x1,x2,x3,i,x[4],y[7];
printf("Enter 4-bit data: ");
for(i=0;i
5/24/2018 Data Communication & Networking Lab Manual
21/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 21
y[1]=x2%2;
y[3]=x3%2;
printf("\n \n Generated Hamming Code (even parity): ");
for(i=0;i
5/24/2018 Data Communication & Networking Lab Manual
22/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 22
Experiment7
Aim: Write a program to find Hamming distance
Resources: Turbo C, C++.
Theory:
Ininformation theory,the Hamming distance between twostringsof equal length is the number
of positions at which the corresponding symbols are different.
In another way, it measures the minimum number of substitutions required to change one string
into the other, or the minimum number of errors that could have transformed one string into the
other.
Code:
#include
#include
void main()
{
clrscr();
int i,j=0,a[5],b[5];printf("Enter 5-bit data1: ");
for(i=0;i
5/24/2018 Data Communication & Networking Lab Manual
23/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 23
printf("Hamming distance: %d",j);
getch();}
Output:
Conclusions:
5/24/2018 Data Communication & Networking Lab Manual
24/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 24
Experiment8
Aim: Write a C program for IPV4, Implementation of decimal to binary, Implementation of
binary to decimal.
Resources: Turbo C, C++.
Theory:
Internet Protocol version 4 (IPv4)is the fourth version in the development of theInternet
Protocol (IP)Internet,and routes most traffic on the Internet. However, a successor protocol,
IPv6,has been defined and is in various stages of production deployment. IPv4 is described in
IETFpublicationRFC 791 (September 1981), replacing an earlier definition (RFC 760,January
1980).
IPv4 is a connectionless protocol for use onpacket-switched networks. It operates on abest
effort delivery model; in that it does not guarantee delivery, nor does it assure proper sequencing
or avoidance of duplicate delivery.
Code:
(a) Implementation of IPV-4
#include
#include
void main()
{ int IP1,IP2,IP3,IP4;
clrscr();
printf("enter IP address: ");
scanf("%d",&IP1);
scanf("%d",&IP2);
scanf("%d",&IP3);
scanf("%d",&IP4);
printf("\nYou entered: %d.%d.%d.%d \n \n",IP1,IP2,IP3,IP4);
if(IP1>255 || IP2>255 || IP3>255 || IP4>255)
{printf("Invalid Address");}
http://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/IPv6http://en.wikipedia.org/wiki/IETFhttp://tools.ietf.org/html/rfc791http://tools.ietf.org/html/rfc760http://en.wikipedia.org/wiki/Packet-switchedhttp://en.wikipedia.org/wiki/Best_effort_deliveryhttp://en.wikipedia.org/wiki/Best_effort_deliveryhttp://en.wikipedia.org/wiki/Best_effort_deliveryhttp://en.wikipedia.org/wiki/Best_effort_deliveryhttp://en.wikipedia.org/wiki/Packet-switchedhttp://tools.ietf.org/html/rfc760http://tools.ietf.org/html/rfc791http://en.wikipedia.org/wiki/IETFhttp://en.wikipedia.org/wiki/IPv6http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocol5/24/2018 Data Communication & Networking Lab Manual
25/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 25
else if(IP1>=0 && IP1=128 && IP1=192 && IP1=224 && IP1=240 && IP1
5/24/2018 Data Communication & Networking Lab Manual
26/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 26
(b) Implementation of decimal to binary
#include
#include
#include
#include
void main()
{
clrscr();
int a,b,c,d,e,x[50],stop,count,code;
printf("Enter the decimal number: ");
scanf("%d",&c);
code=c;
count=0;
for(a=1;a0;a--)
5/24/2018 Data Communication & Networking Lab Manual
27/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 27
{printf("%d",x[a]);}
getch();}
Output:
(C)Implementation of decimal to binary
/* 4 bit binary to decimal */
#include
#include
#include
void main()
{
int i,j=3,di=0,b[4];
clrscr();
printf("Enter 4-bit binary number: ");
for(i=0;i
5/24/2018 Data Communication & Networking Lab Manual
28/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 28
scanf("%d",&b[i]);
}
for(i=0;i
5/24/2018 Data Communication & Networking Lab Manual
29/53
5/24/2018 Data Communication & Networking Lab Manual
30/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 30
i=0;
while (a[i]!='\0')
{a[i]=a[i]-3;
i++;}
printf("\nDecoded data(Rx): %s",a);
getch();}
Output:
Conclusions:
5/24/2018 Data Communication & Networking Lab Manual
31/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 31
Experiment10
Aim: Design of LAN for s typical branch office of the bank and Network IP
Resources: Command Prompt And Packet Tracer.
Theory:
A typical branch of the bank consists of about 40 connected hosts, located on a singlefloor. One of these hosts is the mail server while another is a Database Server for the
branch. The mail server handles all the incoming and outing mails of the branch
employees. The database server records all the daily transactions carried in the branch.
1. Design a network topology to be used and the physical layout
Plan the placing of hubs or switches in the office area and the no of connections to
each hub or switch.2. Mention the cost of accessories like hub/switch , type of connection cables, length of
cable used etc. Give the final quotation for whole setup.3. Analyze your design whether it is optimized for performance or for cost. Justify you
selection of hardware.
Classification of IP addressSub netting
Super netting
Classification of IP address
How the ip addresses are classified and when they are used.
Class Address Range Supports
Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.
Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks.
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.
Class E 240.0.0.0 to 254.255.255.254 Reserved.
Sub netting
Why we Develop sub netting and How to calculate subnet mask and how to identify subnet
address.
Super netting
Why we develop super netting and How to calculate supernet mask and how to identifysupernet address.
5/24/2018 Data Communication & Networking Lab Manual
32/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 32
Procedure:
To do this EXPERIMENT- follows these steps:
In this EXPERIMENT- students have to understand basic networking commands e.g ping, tracert
etc.All commands related to Network configuration which includes how to switch to privilege mode
and normal mode and how to configure router interface and how to save this configuration to
flash memory or permanent memory.This commands includes
Configuring the Router commands
General Commands to configure network
Privileged Mode commands of a routerRouter Processes & Statistics
IP Commands
Other IP Commands e.g. show ip route etc.
Diagram to be drawn: -Complete sketch of college LAN, showing no of computers connected
in each lab to connecting devices like hub, switch etc.
Conclusions:
5/24/2018 Data Communication & Networking Lab Manual
33/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 33
Experiment11
Aim: Configure a Network topology using packet tracer software.
Resources: Command Prompt And Packet Tracer software.
Procedure:
To implement this practical following network topology is required to be configured using the
commands. After configuring the given network a packet should be ping from any one machine to
another.
(1)Ring Topology:-
5/24/2018 Data Communication & Networking Lab Manual
34/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 34
(2)Star Topology:-
(3)Tree Topology:-
5/24/2018 Data Communication & Networking Lab Manual
35/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 35
(4)Hybrid Topology (Star Ring) :-
(5)Bus Topology:-
5/24/2018 Data Communication & Networking Lab Manual
36/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 36
(6)Mesh Topology:-
Conclusions:
5/24/2018 Data Communication & Networking Lab Manual
37/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 37
Experiment12
Aim: To configure FTP server on windows server.
Resources: Windows 2003 Server, Windows XP Professional Client
Theory:
File Transfer Protocol (FTP) is a standardnetwork protocol used to transfer files from onehostto another host over aTCP-based network, such as theInternet.
FTP is built on aclient-server architecture and uses separate control and data connectionsbetween the client and the server.[1] FTP users may authenticate themselves using aclear-text
sign-in protocol, normally in the form of a username and password, but can connect
anonymously if the server is configured to allow it. For secure transmission that hides (encrypts)
the username and password, and encrypts the content, FTP is oftensecured withSSL/TLS("FTPS")
Procedure:
SETUP IIS Server and host website
IIS (Internet Information Services) is an easy-to-use web server from Microsoft. IIS is not
installed on Windows XP Professional by default. It is however installed when you upgrade fromWindows NT or Windows 2000 to Windows XP Pro. If not installed IIS can be installed as
follows:
1- Start-> control panel-> Add/Remove program->Add/Remove windows component
2- When the Windows Components Wizard appears, click Next. From here select IIS.
The IIS is configured using the IIS snap-in, previously called the Internet Services Manager. Thiscan be accessed in one of three ways:
Method 1:1- From the Start menu, select Settings and then Control Panel2- Open Administrative Tools3- Open Internet Information Services
Method 2:1- Right click on My Computer on your desktop
2- Select Manage to open the Computer Management console
3- Select Internet Information Services under Services and Applications
Method 3:
1- From the Start menu, select Run2- Type inetmgr and run the command
To install the FTP service on our IIS machine
1. Begin by opening Add or Remove Programs in Control Panel and selecting Add/RemoveWindows Components. Then select the checkbox for Application Server:
http://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Host_%28network%29http://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Client-server_modelhttp://en.wikipedia.org/wiki/File_Transfer_Protocol#cite_note-for-1http://en.wikipedia.org/wiki/Clear_texthttp://en.wikipedia.org/wiki/File_Transfer_Protocol#Securityhttp://en.wikipedia.org/wiki/SSL/TLShttp://en.wikipedia.org/wiki/SSL/TLShttp://en.wikipedia.org/wiki/File_Transfer_Protocol#Securityhttp://en.wikipedia.org/wiki/Clear_texthttp://en.wikipedia.org/wiki/File_Transfer_Protocol#cite_note-for-1http://en.wikipedia.org/wiki/Client-server_modelhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Host_%28network%29http://en.wikipedia.org/wiki/Network_protocol5/24/2018 Data Communication & Networking Lab Manual
38/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 38
2. Click Details and select the checkbox for Internet Information Services
5/24/2018 Data Communication & Networking Lab Manual
39/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 39
3. Click Details and select the checkbox for File Transfer Protocol (FTP) services
4. Click OK twice and then Next to install the FTP service.During installation youll need to insert your Windows Server 2003 product CD or
browse to a network distribution point where the Windows Server 2003 setup files are
located. Click Finish when the wizard is done.
Creating an FTP Site: Open IIS Manager in Administrative Tools, select FTP Sites in the
console tree, and right-click on Default FTP Site and select properties :
5/24/2018 Data Communication & Networking Lab Manual
40/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 40
Assign the IP address 172.16.11.210 for the Human Resources FTP site and make D:\HRthe folder where its content is located. To create the new FTP site, right-click on the FTP
Sites node and select New --> FTP Site. This starts the FTP Site Creation Wizard. Click
Next and type a description for the site.
Click Next and specify 172.16.11.210 as the IP address for the new site
5/24/2018 Data Communication & Networking Lab Manual
41/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 41
Click Next and select Do not isolate users, since this will be a site that anyone (includingguest users) will be free to access:
Click Next and specify C:\HR as the location of the root directory for the site.
5/24/2018 Data Communication & Networking Lab Manual
42/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 42
Click Next and leave the access permissions set at Read only as this site will only be usedfor downloading forms for present and prospective employees:
Click next and then Finish to complete the wizard. The new Human Resources FTP sitecan now be seen in IIS Manager under the FTP Sites
5/24/2018 Data Communication & Networking Lab Manual
43/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 43
To view the contents of this site, go to a Windows XP desktop on the same network andopen the URL ftp://172.16.11.210 using Internet Explorer :
To view all users currently connected to the Human Resources FTP site, right-click onthe site in Internet Service Manager and select Properties, then on the FTP Site tab click
the Current Sessions button to open the FTP User Sessions dialog :
5/24/2018 Data Communication & Networking Lab Manual
44/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 44
Now to create another FTP site using a script instead of the GUI. Well create a sitecalled Help and Support with root directory C:\Support and IP address 172.16.11.211:
The figure shows the result of running the script:
Configure the FTP Service:
To configure the FTP Service to allow only anonymous connections, follow these steps:
1. Start Internet Information Services Manager or open the IIS snap-in.2. Expand Server_name, where Server_nameis the name of the server.3. Expand FTP Sites4. Right-click Default FTP Siteand then click Properties.5. Click the Security Accountstab.6. Click to select the Allow Anonymous Connectionscheck box (if it is not already
selected), and click to select the Allow only anonymous connectionscheck box.
When you click to select the Allow only anonymous connectionscheck box, you
5/24/2018 Data Communication & Networking Lab Manual
45/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 45
configure the FTP Service to allow only anonymous connections. Users cannot log on by
using user names and passwords.
7. Click the Home Directorytab.8. Click to select the Readand Log visitscheck boxes (if they are not already selected), and
then click to clear the Writecheck box (if it is not already cleared).
9. Click OK.10. Quit Internet Information Services Manager or close the IIS snap-in.
The FTP server is now configured to accept incoming FTP requests. Copy or move the files that
you want to make available to the FTP publishing folder for access. The default folder is
drive:\Inetpub\Ftproot, where driveis the drive on which IIS is installed.
Conclusions:
5/24/2018 Data Communication & Networking Lab Manual
46/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 46
Experiment13
Aim: To configure DNS server on windows server.
Resources: Windows 2003 server, Windows XP client
Theory: The Domain Name System (DNS) is ahierarchical distributed naming system for
computers, services, or any resource connected to theInternet or aprivate network.it translates
easily memorizeddomain names to the numericalIP addresses needed for the purpose of
locating computer services and devices worldwide.
Procedure:
Setting up active directory using the run command dcpromo is a straightforward procedure. Tobegin, from your windows 2003 server desktop:
1. Go to Start click on Run and type dcpromo and hit Enter. The Welcome to the ActiveDirectory Installation Wizard should come up:
2. Click on Next. On the following window, you will get a warning about comparabilityissues with other Operating Systems. Improve security settings in Windows Server2003affect older versions of windows:
http://en.wikipedia.org/wiki/Hierarchicalhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Private_networkhttp://en.wikipedia.org/wiki/Domain_namehttp://en.wikipedia.org/wiki/IP_addresshttp://s.helpdeskgeek.com/wp-content/pictures/2008/07/image.pnghttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/Domain_namehttp://en.wikipedia.org/wiki/Private_networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Hierarchical5/24/2018 Data Communication & Networking Lab Manual
47/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 47
3. Click Next. On the next screen, you will get two options. The first option asks you if youwant the server to become a domain controller for anew domain or if you want the server
to be an additional domain controller for for an existing domain:
4. Select the first option and click Next. On the next window, you will get three options:a. The first option is to setup the domain in a new forest. Select this option if its the
firstdomain controlleron your organization, or if you want it to be totally
independent from any forest.
b.
Childdomainin an existing domain tree. select this option if you want the domainto be a child domain from an existing domain.c. Domain tree in an existing forest. if you dont want any of the above, select this.
http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image3.pnghttp://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image2.pnghttp://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##5/24/2018 Data Communication & Networking Lab Manual
48/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 48
5. Choose the first option, and click Next. On the next screen, we need to type the fullDNSnamefor the new domain:
6. Type the full DNS name like helpdeskgeek.com, and click on Next. On the next screen,we need to choose the NETBIOS name.
http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image5.pnghttp://s.helpdeskgeek.com/wp-content/pictures/2008/07/image4.pnghttp://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##5/24/2018 Data Communication & Networking Lab Manual
49/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 49
7. Choose the name, and click Next. On the next screen, you need to select the location ofwhere you want to store the database and log files. for best performance store them in
separate disks.
8. Choose the location where you want the active directory database and logs, and clickNext.
9. Next, the Shared system volume window will come up. You need to choose the locationwhere you want to store the SYSVOL files. This folder contains the domain public files
and are replicated to all the domain controllers in the domain.
http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image7.pnghttp://s.helpdeskgeek.com/wp-content/pictures/2008/07/image6.png5/24/2018 Data Communication & Networking Lab Manual
50/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 50
10.Choose the folder location, and click Next.11. On the next window, the DNS registration diagnostic will show up. You will get
Diagnostic failedand will get three options:a. It will allow you to perform the DNS diagnostic again.b. It gives you the option to allow the active directory wizard to install and configure
DNS for you, and use this DNS as the primary DNS for this server.c. It allows you to bypass this window if you plan to correct the problem later on.
12.We have to configure its services, so we will choose the option to Install and configureDNS server on this computer and set this computer to use this DNS server as its
preferred DNS server. then click Next.
13.On the next window, you need to choose what type or permissions you want for users andgroup objects. Here you will get two options.
a. Select this option if you run server programs with pre-windows 2000.b. Select this option, if you only run windows servers 2000 and windows servers
2003 your domain.
http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/##http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image8.png5/24/2018 Data Communication & Networking Lab Manual
51/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 51
14.Select the second option, and click Next. On the next window, you need to enter theDirectory services restore mode administrator password.
http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image10.pnghttp://s.helpdeskgeek.com/wp-content/pictures/2008/07/image9.png5/24/2018 Data Communication & Networking Lab Manual
52/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 52
15.Type your chosen password, and click Next. Next, you will get the summary of all theoptions you have chosen during the active directory wizard. Remember, the domain
administrator account password is the same as the current local administrator password.
16.Click Next. the active directory installation should begin.
http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image12.pnghttp://s.helpdeskgeek.com/wp-content/pictures/2008/07/image11.png5/24/2018 Data Communication & Networking Lab Manual
53/53
Sub.Code: 181001 Sub.Name: DCN Year: 2014
VGEC /EC /BE/SEM-8 53
17.Click on Finish. and restart the computer. Active Directory should be now installed.
Conclusions:
http://s.helpdeskgeek.com/wp-content/pictures/2008/07/image13.png