CN LAB 1902629 Hritik Sharma
CN LAB 1902629 Hritik Sharma
LAB FILE
Subject: COMPUTER NETWORK (BTIT-404-18)
(Branch- IT)
Landran, Mohali-140307
E NO
1 To study the different types of network 4 -12 08-02-2021
cables and network topologies
2 Implement and test the cross wired 13 -20 15-02-2021
cable and straight through cable using
clamping tool and network lab cable
tester
3 Study and familarization with various 21-28 22-02-2021
network devices
4 Familarization with packet tracer 29-30 01-03-2021
simulation tool
5 Study and implementation of IP 31-34 08-03-2021
addressing schemes
6 Creation of simple networking 35-38 15-03-2021
topologies using hub and switch
7 Simulation of web traffic in packet 39-40 05-04-2021
tracer
8 Study and implementation of various 41-44 12-04-2021
routers and configuration commands
9 Creation of network using routers 45-49 12-04-2021
2
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
PRACTICAL NO.:- 1
3
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
OBJECTIVE:- To study the different types of network cables and network topologies.
THEORY:-
1. Twisted Pair Cables:- Twisted pair cabling is a form of wiring in which pairs of wires are twisted
together for the purposes of canceling out electromagnetic interference (EMI) from other wire pairs
and from external sources. This type of cable is used for home and corporate Ethernet networks.
Twisted pair cabling is used in short patch cables and in the longer runs in structured cabling.
All transmissions are prone to noise, interferences, and crosstalks. When the wires are twisted, some part
of the noise signals is in the direction of data signals while the other parts are in the opposite directions.
● In telephone lines
● In DSL lines
● In LANs
● Unshielded Twisted Pair ( UTP ): These generally comprise of wires and insulators.
● Shielded Twisted Pair ( STP ): They have a braided wired mesh that encases each pair of insulated
wires.
ADVANTAGES:-
2. Coaxial Cable:- Coaxial cables, commonly called coax, are copper cables with metal shielding
designed to provide immunity against noise and greater bandwidth. Coax can transmit signals over
larger distances at a higher speed as compared to twisted pair cables.
5
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Coaxial cables are categorized into three types as per radio government (RG)
ratings −
● In analog telephone networks: A single coaxial network can carry about 10,000 voice signals.
● In cable TV networks
● In MANs
ADVANTAGES:-
● sufficient frequency range to support multiple channel, which allows for much greater
throughput.
● lower error rates. because the inner conductor is in a Faraday shield, noise immunity is
improved, and coax has a lower error rates and therefore slightly better performance than twisted
pair.
DISADVANTAGES:-
6
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
● Fibre optic cabling can support too high bandwidths in the range from 100 Mbps to 2 gigabytes
because light has a much greater frequency than electricity.
● The several nodes that a fibre optic can provide does not rely upon its length but on the hub or hubs
that linked cables.
Small Size and lightweight − The size (diameter) of the optical fibres is minimal (comparable
to the diameter of a human hair).
Easily available and low cost − The material used for producing the optical fibres is silica
glass. This material is readily applicable. Therefore, the optical fibres cost lower than the cables with
metallic conductors.
High Cost − The cable and the interfaces are associatively more expensive than those of other guided
media.
7
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Installation and Maintenance − Fibre is different technology requiring skills; most engineers
do not occupy.
NETWORK TOPOLOGIES:- Geometric representation of how the computers are connected to each
other is known as topology. There are mainly five types of network topologies :
1. Mesh Topology: In mesh topology each device is connected to every other device on the network
through a dedicated point-to-point link. When we say dedicated it means that the link only carries
data for the two connected devices only.
● Full Mesh:- All hosts have a point-to-point connection to every other host in the network. Thus for
every new host n(n-1)/2 connections are required. It provides the most reliable network structure
among all network topologies.
● Partially Mesh:- Not all hosts have point-to-point connection to every other host. Hosts connect to
each other in some arbitrarily fashion. This topology exists where we need to provide reliability to
some hosts out of all.
ADVANTAGES:-
● No data traffic issues as there is a dedicated link between two devices which means the link is only
available for those two devices.
8
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
● Mesh topology is reliable and robust as failure of one link doesn’t affect other links and the
communication between other devices on the network.
DISADVANTAGES:-
2. Star Topology:- In star topology each device in the network is connected to a central device called
hub. Unlike Mesh topology, star topology doesn’t allow direct communication between devices, a
device must have to communicate through hub. If one device wants to send data to other device, it
has to first send the data to hub and then the hub transmit that data to the designated device.
ADVANTAGES:-
● Less expensive because each device only need one I/O port and needs to be connected with hub
with one link.
● Easier to install
9
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
DISADVANTAGES:-
● If hub goes down everything goes down, none of the devices can work without hub.
● Hub requires more resources and regular maintenance because it is the central system of star
topology.
3. Bus Topology:- In bus topology there is a main cable and all the devices are connected to this
main cable through drop lines. There is a device called tap that connects the drop line to the main
cable. Since all the data is transmitted over the main cable, there is a limit of drop lines and the
distance a main cable can have.
ADVANTAGES:-
DISADVANTAGES:-
4. Ring Topology:- In ring topology each device is connected with the two devices on either side of
it. There are two dedicated point to point links a device has with the devices on the either side of it.
This structure forms a ring thus it is known as ring topology. If a device wants to send data to
another device then it sends the data in one direction, each device in ring topology has a repeater, if
the received data is intended for other device then repeater forwards this data until the intended
device receives it.
ADVANTAGES:-
● Easy to install.
● Managing is easier as to add or remove a device from the topology only two links are required to
be changed.
DISADVANTAGES:-
● A link failure can fail the entire network as the signal will not travel forward due to failure.
● Data traffic issues, since all the data is circulating in a ring.
11
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
5. Hybrid Topology:- A combination of two or more topology is known as hybrid topology. For
example: a combination of star and mesh topology is known as hybrid topology.
ADVANTAGES:-
● We can choose the topology based on the requirement for example, scalability is our concern then
we can use star topology instead of bus technology.
● Scalable as we can further connect other computer networks with the existing networks with
different topologies.
DISADVANTAGES:-
12
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
PRACTICAL NO.:- 2
OBJECTIVE:- Implement and test the cross-wired cable and straight through cable using clamping
tool and network lab cable network tester.
MATERIAL REQUIRED:-
1. Cat5e Ethernet cable – I recommend purchasing a box of Cat5e cable. You will save money by purchasing
your cable in bulk.
2. RJ-45 connectors
3. Crimper Tool – capable of crimping 8 wires (RJ-45) and 6 wire (RJ-11). Most tools have built in cutters
too.
4. Stripper Tool
5. Scissors – I prefer using a scissors
6. Cable Tester – For testing that your cable connections are good and there are not any open or crossed wires
13
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very careful at this
point, as to not nick or cut into the wires, which are inside. Doing so could alter the characteristics of your
cable, or even worse render is useless. Check the wires, one more time for nicks or cuts. If there are any,
just whack the whole end off, and start over.
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand. You do not
want the wires to become untwisted down inside the jacket. Category 5 cable must only have 1/2 of an
inch of 'untwisted' wire at the end; otherwise it will be 'out of spec'. At this point, you obviously have
ALOT more than 1/2 of an inch of un-twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-made cable, with
one of the ends whacked off, you only have one end to install - the crossed over end. Below are two
diagrams, which show how you need to arrange the cables for each type of cable end. Decide at this point
which end you are making and examine the associated picture below.
14
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
● Crimping tool
15
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
There are four pairs of wires in an Ethernet cable, and an Ethernet connector (8P8C) has eight pin slots.
Each pin is identified by a number, starting from left to right, with the clip facing away from you.
The two standards for wiring Ethernet cables are T568A and T568B. T568B is the most common and is
what we'll be using for our straight Ethernet cable. The tables below show the proper orientation of the
colored wires to the pins.
T568A Standard
16
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
T568B Standard
Step 2: Spread the four pairs of twisted wire apart. For Cat 5e, you can use the pull string to strip the
jacket farther down if you need to, then cut the pull string. Cat 6 cables have a spine that will also need to
be cut.
Step 3: Untwist the wire pairs and neatly align them in the T568B orientation. Be sure not to untwist them
any farther down the cable than where the jacket begins; we want to leave as much of the cable twisted as
possible.
17
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Step 4: Cut the wires as straight as possible, about 0.5 inch above the end of the jacket.
Step 5: Carefully insert the wires all the way into the modular connector, making sure that each wire
passes through the appropriate guides inside the connector.
Step 6: Push the connector inside the crimping tool and squeeze the crimper all the way down.
Step 7: Repeat steps 1-6 for the other end of the cable.
18
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Step 8: To make sure you've successfully terminated each end of the cable, use a cable tester to test each
pin.
When you're all done, the connectors should look like this:
That's it. For crossover cables, simply make one end of the cable a T568A and the other end a T568B.
Now you can make Ethernet cables of any length, fix broken connectors, or make yourself a crossover
cable.
19
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
PRACTICAL NO.:- 3
THEORY:-
Network Devices:- Network devices, or networking hardware, are physical devices that are required
for communication and interaction between hardware on a computer network.
● Hub
● Switch
● Router
● Bridge
● Gateway
● Modem
● Repeater
● Access Point
HUB:-
Hubs connect multiple computer networking devices together. A hub also acts as a repeater in that it
amplifies signals that deteriorate after traveling long distances over connecting cables. A hub is the
simplest in the family of network connecting devices because it connects LAN components with identical
protocols.
A hub can be used with both digital and analog data, provided its settings have been configured to prepare
for the formatting of the incoming data. For example, if the incoming data is in digital format, the hub
must pass it on as packets; however, if the incoming data is analog, then the hub passes it on in signal
form.
20
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Hubs do not perform packet filtering or addressing functions; they just send data packets to all connected
devices. Hubs operate at the Physical layer of the Open Systems Interconnection (OSI) model. There are
two types of hubs: simple and multiple port.
Advantages of Hub :
● Connectivity –
The primary function of the hub is to permit clients to attach to a network in order that they will share
and have conversations. For this purpose, hubs use network protocol analyzer.
● Performance –
Hub is understood for having very less number of performance impacts on the network. This is often
because it operates using a broadcast model which rarely affects the network.
Disadvantages of Hub :
● Collision Domain –
The function of the collision domain and again transfer of packet does not affect actually it increases
more chances of collision in between domains.
● Full-Duplex Mode –
Hubs cannot communicate fully duplex mode, it can only operate in half-duplex mode. Half-duplex
mode, in essence, means data are often transmitted just one occasion at a given time. Therefore, the
hub must constantly switch its modes.
SWITCH:-
21
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Switches generally have a more intelligent role than hubs. A switch is a multiport device that improves
network efficiency. The switch maintains limited routing information about nodes in the internal network,
and it allows connections to systems like hubs or routers. Strands of LANs are usually connected using
switches. Generally, switches can read the hardware addresses of incoming packets to transmit them to the
appropriate destination.
Using switches improves network efficiency over hubs or routers because of the virtual circuit capability.
Switches also improve network security because the virtual circuits are more difficult to examine with
network monitors. You can think of a switch as a device that has some of the best capabilities of routers
and hubs combined. A switch can work at either the Data Link layer or the Network layer of the OSI
model. A multilayer switch is one that can operate at both layers, which means that it can operate as both a
switch and a router. A multilayer switch is a high-performance device that supports the same routing
protocols as routers.
Switches can be subject to distributed denial of service (DDoS) attacks; flood guards are used to prevent
malicious traffic from bringing the switch to a halt. Switch port security is important so be sure to secure
switches: Disable all unused ports and use DHCP snooping, ARP inspection and MAC address filtering.
22
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Features of Switches:-
● A switch operates in the layer 2, i.e. data link layer of the OSI model.
● It uses MAC addresses (addresses of medium access control sublayer) to send data packets to selected
destination ports.
● It uses packet switching technique to receive and forward data packets from the source to the
destination device.
Types of Switches:-
There are variety of switches that can be broadly categorised into 4 types −
ROUTER:-
Routers help transmit packets to their destinations by charting a path through the sea of interconnected
networking devices using different network topologies. Routers are intelligent devices, and they store
information about the networks they’re connected to. Most routers can be configured to operate as packet-
filtering firewalls and use access control lists (ACLs). Routers, in conjunction with a channel service
unit/data service unit (CSU/DSU), are also used to translate from LAN framing to WAN framing. This is
needed because LANs and WANs use different network protocols. Such routers are known as border
routers. They serve as the outside connection of a LAN to a WAN, and they operate at the border of your
network.
23
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Router are also used to divide internal networks into two or more subnetworks. Routers can also be
connected internally to other routers, creating zones that operate independently. Routers establish
communication by maintaining tables about destinations and local connections. A router contains
information about the systems connected to it and where to send requests if the destination isn’t known.
Routers usually communicate routing and other information using one of three standard protocols: Routing
Information Protocol (RIP), Border Gateway Protocol (BGP) or Open Shortest Path First (OSPF).
Routers are our first line of defense, and they must be configured to pass only traffic that is authorized by
network administrators. The routes themselves can be configured as static or dynamic. If they are static,
they can only be configured manually and stay that way until changed. If they are dynamic, they learn of
other routers around them and use information about those routers to build their routing tables.
Routers are general-purpose devices that interconnect two or more heterogeneous networks. They are
usually dedicated to special-purpose computers, with separate input and output network interfaces for each
connected network. Because routers and gateways are the backbone of large computer networks like the
internet, they have special features that give them the flexibility and the ability to cope with varying
network addressing schemes and frame sizes through segmentation of big packets into smaller sizes that fit
the new network components. Each router interface has its own Address Resolution Protocol (ARP)
module, its own LAN address (network card address) and its own Internet Protocol (IP) address. The
router, with the help of a routing table, has knowledge of routes a packet could take from its source to its
destination. The routing table, like in the bridge and switch, grows dynamically. Upon receipt of a packet,
the router removes the packet headers and trailers and analyzes the IP header by determining the source
and destination addresses and data type, and noting the arrival time. It also updates the router table with
new addresses not already in the table. The IP header and arrival time information is entered in the routing
table. Routers normally work at the Network layer of the OSI model.
24
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Types of Routers:-
A variety of routers are available depending upon their usages. The main
types of routers are −
Wireless Router − They provide WiFi connection WiFi devices like laptops,
smartphones etc. They can also provide standard Ethernet routing. For
indoor connections, the range is 150 feet while its 300 feet for outdoor
connections.
Core Routers − They can route data packets within a given network, but
cannot route the packets between the networks. They helps to link all
devices within a network thus forming the backbone of network. It is
used by ISP and communication interfaces.
25
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
BRIDGE:-
Bridges are used to connect two or more hosts or network segments together. The basic role of bridges in
network architecture is storing and forwarding frames between the different segments that the bridge
connects. They use hardware Media Access Control (MAC) addresses for transferring frames. By looking
at the MAC address of the devices connected to each segment, bridges can forward the data or block it
from crossing. Bridges can also be used to connect two physical LANs into a larger logical LAN.
Bridges work only at the Physical and Data Link layers of the OSI model. Bridges are used to divide larger
networks into smaller sections by sitting between two physical network segments and managing the flow
of data between the two.
Bridges are like hubs in many respects, including the fact that they connect LAN components with
identical protocols. However, bridges filter incoming data packets, known as frames, for addresses before
they are forwarded. As it filters the data packets, the bridge makes no modifications to the format or
content of the incoming data. The bridge filters and forwards frames on the network with the help of a
dynamic bridge table. The bridge table, which is initially empty, maintains the LAN addresses for each
computer in the LAN and the addresses of each bridge interface that connects the LAN to other LANs.
Bridges, like hubs, can be either simple or multiple port.
26
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Bridges have mostly fallen out of favor in recent years and have been replaced by switches, which offer
more functionality. In fact, switches are sometimes referred to as “multiport bridges” because of how they
operate.
Uses of Bridge
● Bridges connects two or more different LANs that has a similar protocol and provides
communication between the devices (nodes) in them.
● By joining multiple LANs, bridges help in multiplying the network capacity of a single LAN.
● Since they operate at data link layer, they transmit data as data frames. On receiving a data frame,
the bridge consults a database to decide whether to pass, transmit or discard the frame.
27
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
PRACTICAL NO.:- 4
THEORY:-
Packet Tracer is a powerful network simulator that can be utilized in training for Network certifications by
allowing students to create networks with an almost unlimited number of devices and to experience
troubleshooting without having to buy real Cisco routers or switches. The tool is created by Cisco
Systems. The purpose of Packet Tracer is to offer students a tool to learn the principles of networking as
well as develop Cisco technology specific skills. However, it is not be used as a replacement for Routers or
Switches.
KEY FEATURES:-
Packet Tracer Workspaces:- Cisco Packet Tracer has two workspaces—logical and physical. The
logical workspace allows users to build logical network topologies by placing, connecting, and clustering
virtual network devices. The physical workspace provides a graphical physical dimension of the logical
network, giving a sense of scale and placement in how network devices such as routers, switches, and
hosts would look in a real environment. The physical view also provides geographic representations of
networks, including multiple cities, buildings, and wiring closets. The physical workspace provides a
graphical view of the logical network.
Packet Tracer Modes:- Cisco Packet Tracer provides two operating modes to visualize the behavior of
a network—real-time mode and simulation mode. In real-time mode the network behaves as real devices
do, with immediate real-time response for all network activities. The real-time mode gives students a
viable alternative to real equipment and allows them to gain configuration practice before working with
real equipment. In simulation mode the user can see and control time intervals, the inner workings of data
transfer, and the propagation of data across a network. This helps students understand the fundamental
concepts behind network operations. A solid understanding of network fundamentals can help accelerate
learning about related concept
28
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
ADVANTAGES:-
● It can be used anywhere, you don’t have to carry it. Once you install it in your laptop, it can be
carried even in USP.
● The noise level is minimum to none and the consumption of electricity is also less.
● The major advantage is “sum mode”. This is not available in real gear.
DISADVANTAGES:-
STEP 1 Once we have downloading the Packet Tracer exe file, Click on the exe file downloaded. Once
below Window will appears, click “Next”
STEP 2 On next screen, select “I accept the agreement” and click on “Next”.
STEP 3 Setup will show the folder in which the program’s shortcuts will be created. If You want to
change the folder, you can change it. Click on “Next”.
STEP 4 Then the program will ask whether to create a Desktop icon and create a Quick Launch icon.
Make your choice and click on “Next”.
29
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
PRACTICAL NO.:- 5
THEORY:-
Step1 Make a network i.e take two switches and connect the end devices with both the switches and then
connect switches with the router (as shown in fig. no. 5.1)
Step2 Give IP address and then give the gateways to all the end devices.
30
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
31
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
32
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
33
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
PRACTICAL NO.:- 6
Theory:-
Step1 Make a network i.e take switch and hub and then connect the end devices with both.
34
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Step3 Configure the IP addresses. After configuring our network is ready for transmission.
35
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
36
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
A switch is effectively a higher-performance alternative to a hub. People tend to benefit from a switch
over a hub if their home network has four or more computers, or if they want to use their home
network for applications that generate significant amounts of network traffic, like multiplayer games
or heavy music file sharing. Technically speaking, hubs operate using a broadcast model and switches
operate using a virtual circuit model. When four computers are connected to a hub, for example, and
two of those computers communicate with each other, hubs simply pass through all network traffic to
each of the four computers. Switches, on the other hand, are capable of determining the destination of
each individual traffic element (such as an Ethernet frame) and selectively forwarding data to the one
computer that actually needs it. By generating less network traffic in delivering messages, a switch
performs better than a hub on busy networks.
37
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
PRACTICAL NO.:- 7
Theory:-
Step1 Make a network i.e take switch then connect the end devices and server with it.
Fig No.7.1
38
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Step3 Configure the IP addresses. After configuring our network is ready for transmission.
39
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
PRACTICAL NO.:- 8
Theory:-
Topology Diagram
Addressing Table
40
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
41
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
42
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
43
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
PRACTICAL NO.:- 9
Theory:-
We already have the Packet Tracer download and have it installed in our computer. Open the program and
select the router from the lower left-hand corner, and drag it into the center of the sandbox screen as seen
below.
We will be setting up a very basic network that allows two computers to communicate, so the next step is
to select end devices from the bottom left-hand corner and drag it to the sandbox screen. Do this twice to
make two computers appear below the router. Now select connections from the same bottom left-hand
corner. When you connect like-devices (Such as a router and computer) you use a crossover cable, so you
should select copper cross-over cable from the second menu to the immediate right. Click on Router0,
and connect the cable via FastEthernet0/0 as seen below:
44
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Now click the PC0 and select Fast Ethernet. You will notice that although a link is established, it is not
functional. You can tell by the red dots that are present on both ends of the connection. Once the router is
configured correctly, the red dots will turn green to indicate the devices are able to communicate.
Do the same operation to PC1, only this time connect the cable to FastEthernet0/1 since FastEthernet0/0 is
already taken by PC0. Your network should be similar to the one below at this point:
A router that is turned off doesn’t work very well! Click on your router to bring up the configuration menu
and verify that it is turned on.When on, there will be a small green light below the switch as seen in the
diagram.
45
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Next we have to open the Ethernet ports to allow communication. Although they are physically connected,
they are in a state that is known as being in administrative shut down. Now click on the CLI tab to
access the configuration menu. If you’ve used the Cisco IOS before, you will notice it looks and acts the
same way.
1. Press RETURN to start the session.
2. Type enable to get to privileged mode (this gives you more options in configuring the router)
46
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Now we have to do the same thing for fastethernet0/1. If you don’t, there still won’t be a connection to
PC1! Make sure to enter the IP address carefully as seen below:
1. Press Ctrl + Z to go back to the previous mode.
2. Type interface fastethernet0/1
3. Type ip address 192.168.20.1 255.255.255.0
4. Type no shutdown
At this point our router is configured properly. If you test out a ping, you will notice that the computers
still don’t communicate, however!
Our last step is to configure the gateway on each desktop computer. The gateway is the address we
assigned to the Ethernet port that the desktop is connected to. It will allow the computer to interface with
another network, so our ping won’t work without it!
Click on PC0 to bring up the configuration menu. Under global settings you will find a field for the
gateway. Enter the corresponding IP address of the router’s interface, which is 192.168.10.1. Then click
the FastEthernet tab on the left column to set the actual computer’s IP address to be on the network.
Use 192.168.10.2 for the IP address, and 255.255.255.0 for the subnet mask.
Do the same thing for PC1, only use 192.168.20.1 for the gateway address, 192.168.20.2 for the IP
address, and 255.255.255.0 for the subnet mask. We can confirm that your network works by sending out a
packet of information from PC0 to PC1, and vice versa. Click the packet icon on the right menu as seen
below:
47
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Click on PC0 and then click PC1. On the lower right of the screen you will see a message box that says
“Successful.” If it doesn’t, we may have had a syntax error when putting in an IP address or router
configuration command.
48
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
PRACTICAL NO.:- 10
When we Subnet a network, we basically split it into smaller networks. For example, when a set of IP
Addresses is given to a company, e.g 254 they might want to "break" (the correct term is "partition") that
one network into smaller ones, one for each department. This way, their Technical department and
Management department can each have a small network of their own. By sub netting the network we can
partition it to as many smaller networks as we need and this also helps reduce traffic and hides the
complexity of the network.
By default, all type of Classes (A, B and C) have a subnet mask, we call it the "Default Subnet mask". You
need to have one because:
1) All computers need the subnet mask field filled when configuring IP
3) You should at least enter the default subnet mask for the Class you're using
The table below shows clearly the subnetmask that applies for each network Class.
49
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
When dealing with subnet masks in the real world, we are free in most cases to use any type of subnet
mask in order to meet our needs. If for example we require one network which can contain up to 254
computers, then a Class C network with its default subnet mask will do fine, but if we need more, then we
might consider a Class B network with its default subnet mask.
Note that the default subnet masks have been set by the IEEE committee, the same guys that set and
approve the different standards and protocols.
Partitioning one network into smaller ones by using different subnet masks.
The picture below shows our example network (192.168.0.0). All computers here have been configured
with the default Class C subnet mask (255.255.255.0):
50
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Because of the subnet mask we used, all these computers are part of the one network marked in blue. This
also means that any one of these hosts (computers, router and server) can communicate with each other.
If we now wanted to partition this network into smaller segments, then we would need to change the
subnet mask appropriately so we can get the desired result. Let's say we needed to change the subnet mask
from 255.255.255.0 to 255.255.255.224 on each configured host.
The picture below shows us how the computers will see the network once the subnet mask has changed:
51
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
52
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
PRACTICAL NO.:- 11
Objective:- Implementation of basic network command and Network configuration commands like
ping, ipconfig, netstat , tracert etc. for trouble shooting network related problems.
Theory:-
The various network related commands used in MS-DOS, Windows, Linux ,Unix and other operating
system are explained below.
● Arp
● Finger
● Hostname
● Ipconfig
● Pathping
● Ping
● Nbtstat
● Net
● Netstat
● Nslookup
● Router
● Tracert and tracerouter
● Whois
● winipcfg
Arp:- ARP stands for Address Resolution Protocol.This protocol is used by network nodes to match IP
addresses to MAC addresses. The original specification was RFC 826. That has since been updated by
RFC 5227, and RFC 5494.
53
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
So ARP provides method for hosts send message to destination address on physical network. Ethernet
hosts must convert a 32-bit IP address into a 48-bit Ethernet address. The host checks its ARP cache to see
if address mapping from IP to physical address is known:
Finger:- The finger command may also be used to look up users on a remote system. The format is to
specify the user as User@Host. If you omit the user name, the finger commandprovides the standard
format listing on the remote system.
Ite Description
54
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
m
-b- Gives a brief, long-form listing.
-f- Suppresses printing of header line on output (the first line that defines the fields that are being
displayed).
-h- Suppresses printing of .project files on long and brief long formats.
-i- Gives a quick listing with idle times.
-l- Gives a long-form listing.
- Assumes that the User parameter specifies a user ID (used for discretionary access control), not a
m- user login name.
-p- Suppresses printing of .plan files on long-form and brief long-form formats.
-q- Gives a quick listing.
-s- Gives a short format list.
55
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
A host name is a name that is assigned to a host (i.e., a computer connected to the network) that uniquely
identifies it on a network and thus allows it to be addressed without using its full IP address. Domain
names are user-friendly substitutes for numeric IP addresses.
Syntax
IPCONFIG /release [adapter] Release the IP address for the specified adapter.
IPCONFIG /renew [adapter] Renew the IP address for the specified adapter.
56
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
IPCONFIG /registerdns Refresh all DHCP leases and re-register DNS names.
IPCONFIG /show class id adapter Display all the DHCP class IDs allowed for adapter.
Pathping:- Pathping sends multiple echo Request messages to each router between a source and
destination over a period of time and then computes results based on the packets returned from each router.
Because pathping displays the degree of packet loss at any given router or link, you can determine which
routers or subnets might be having network problems.
57
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
pathping performs the equivalent of the tracert command by identifying which routers are on the path. It
then sends pings periodically to all of the routers over a specified time period and computes statistics based
on the number returned from each. Used without parameters, pathping displays help.
Syntax:-
pathping [/n] [/h] [/g <Hostlist>] [/p <Period>] [/q <NumQueries> [/w <timeout>] [/i <IPaddress>] [/4
<IPv4>] [/6 <IPv6>][<TargetName>]
Parameter Description
/g <Hostlist> Specifies that the echo Request messages use the Loose
Source Route option in the IP header with the set of
intermediate destinations specified in Hostlist. With loose
source routing, successive intermediate destinations can be
separated by one or multiple routers. The maximum number
of addresses or names in the host list is 9. The Hostlist is a
series of IP addresses (in dotted decimal notation) separated
by spaces.
58
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
59
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Ping:- The ping command verifies IP-level connectivity to another TCP/IP computer by sending Internet
Control Message Protocol (ICMP) echo Request messages. The receipt of corresponding echo Reply
messages are displayed, along with round-trip times. ping is the primary TCP/IP command used to
troubleshoot connectivity, reachability, and name resolution. Used without parameters, ping displays
help.
Syntax:-
ping [/t] [/a] [/n <Count>] [/l <Size>] [/f] [/I <TTL>] [/v <TOS>] [/r <Count>] [/s <Count>] [{/j
<Hostlist> | /k <Hostlist>}] [/w <timeout>] [/R] [/S <Srcaddr>] [/4] [/6] <TargetName>
60
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Nbtstat:-The Nbtstat command is a great command to use when you need to display the NetBIOS over
TCP/IP protocol statistics. The Nbtstat command can also be used to display NetBIOS name tables for
both local and remote computers. The Nbtstat command can also be used to display the NetBIOS name
cache, which will show you all of the NetBIOS names that have recently been associated with a specific
IP address. When you use the -R and -RR attributes along with the Nbtstat command you can refresh or
purge the NetBIOS name cache (-R) and the names registered with WINS, Windows Internet Name
Service, (-RR). The NetBIOS name cache helps to reduce network traffic by eliminate the need for
broadcasting or long WINS queries
61
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Syntax:
nbstat[-aRemoteName][-AIPAddress][-c][-n][-r][-R][-RR][-s][-S][Interval]
62
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Specifically, the netstat command can show details about individual network connections, overall and
protocol-specific networking statistics, and much more, all of which could help troubleshoot certain kinds
of networking issues.
Syntax:-netstat [-a] [-e] [-n] [-o] [-p <Protocol>] [-r] [-s] [<Interval>]
Parameters:-
Paramete
r Description
-a Displays all active TCP connections and the TCP and UDP ports on which
the computer is listening.
-e Displays Ethernet statistics, such as the number of bytes and packets sent and
received. This parameter can be combined with -s.
-n Displays active TCP connections, however, addresses and port numbers are
63
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
-o Displays active TCP connections and includes the process ID (PID) for each
connection. You can find the application based on the PID on the Processes
tab in Windows Task Manager. This parameter can be combined with -a, -n,
and -p.
-s Displays statistics by protocol. By default, statistics are shown for the TCP,
UDP, ICMP, and IP protocols. If the IPv6 protocol is installed, statistics are
shown for the TCP over IPv6, UDP over IPv6, ICMPv6, and IPv6 protocols.
The -p parameter can be used to specify a set of protocols.
-r Displays the contents of the IP routing table. This is equivalent to the route
print command.
64
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
65
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
PRACTICAL NO.:- 12
Topology Diagram
This topology represents a small WAN. Each device in this network has been configured
with IP addresses; however, no routing has been configured. The company management
wants to use static routes to connect the multiple networks.
Step 1: Test connectivity between the PCs and the default gateway.
To determine if there is connectivity from each PC to its configured gateway, first use a simple ping
test.
b. From the command prompt, type the ipconfig command. Note the IP address for
BOpc and thedefault gateway address. The default gateway address is the IP address
for the Fast Ethernet interface on BranchOffice.
c. Ping 192.168.1.1, the default gateway address for the BranchOffice LAN, from the
commandprompt on BOpc. This ping should besuccessful.
e. From the command prompt, type the ipconfig command. Note the IP address for
66
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
PNpc and thedefault gateway address. The default gateway address is the IP address
for the Fast Ethernet interface on PartnerNet.
f. Ping 192.168.3.1, the default gateway address for the PartnerNet LAN, from the
command prompton PNpc. This ping should besuccessful.
g. Repeat steps a, b, and c for MOpc and its respective default gateway, the Fast
Ethernet interfaceon MainOffice. Each of these ping tests should besuccessful.
Use a console cable and terminal emulation software on BOpc to connect to BranchOffice.
67
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
c. Issue the show ip route command from the terminal window of BOpc.
Note that only directly connected routes are shown in the BranchOffice
routing table. The ping to 10.10.10.5 failed because the BranchOffice router
has no routing table entry for10.10.10.5.
d. Repeat steps a through d on the other two PCs. The pings to directly
connected networkswill succeed. However, pings to remote networks
willfail.
e. What steps must be taken to reach all the networks from any PC in theactivity?
You can view routing tables in Packet Tracer using the Inspect tool. The Inspect tool is
in the Common Tools bar to the right of the topology. The Inspect tool is the icon that
appears as a magnifying glass.
e. Move the routing table windows around so that you can see all three atonce.
g. Does each router know how to route to all networks in the topology? After
comparing therouting tables, close the window for each routing table by
clicking the x in the upper right corner of each window.
68
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
To configure static routes for each router, first determine which routes need to be added for
each device. For the BranchOffice and the PartnerNet routers, a single default route allows
these devices to route traffic for all networks not directly connected. To configure a default
route, you must identify the IP address of the next hop router, which in this case is the
MainOffice router.
b. Move the cursor over the red serial link between the BranchOffice router
and theMainOffice router. Notice that the interface of the next hop isS3/0.
c. Move the cursor over the MainOffice router and note that the IP
address for Serial 3/0is 10.10.10.1.
d. Move the cursor over the red serial link between the PartnerNet router and the
MainOffice router. Notice that the interface of the next hop isS2/0.
e. Move the cursor over the MainOffice router and note that the IP
address for Serial 2/0is 10.10.10.5.
f. Configure the static routes on both the BranchOffice and PartnerNet routers
using the CLI.Click the BranchOffice router, and click the CLItab.
l. Repeat steps f through k on the PartnerNet router, using 10.10.10.5 as the next hop
IPaddress.
The configuration of static routes at the Main Office is a bit more complex because the
69
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
MainOffice router is responsible for routing traffic to and from the Branch Office and
PartnerNet LAN segments.
The MainOffice router knows only about routes to the 10.10.10.0/30, 10.10.10.4/30, and
192.168.2.0/24 networks because they are directly connected. Static routes to the
192.168.1.0/24 and 192.168.3.0/24 networks need to be added so that the MainOffice
router can route traffic between the networks behind the BranchOffice and PartnerNet
routers.
g. Repeat steps a through e from Step 3. View the routing tables and notice the difference in
therouting
tables. The routing table for each router should have an “S” for each static route.
Now that each router in the topology has static routes configured, all hosts should have
connectivity to all other hosts. Use ping to verify connectivity.
c. Type ping 192.168.3.2. The ping should be successful, verifying that the static
routes areconfigured properly.
70
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
d. Type ping 192.168.2.2. Notice that the result is successful even though you did not
specifically addthe 192.168.2.0 network as a static route into any of the routers.
Because a default route was used on the BranchOffice and PartnerNet routers, a
route for the 192.168.2.0 network was not needed. The default route sends all
traffic destined off network to the MainOffice router. The 192.168.2.0 network is
directly connected to the MainOffice router; therefore, no additional routes needed
to be added to the routingtable
e. Click the Check Results button at the bottom of this instruction window to check yourwork.
71
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
PRACTICAL NO.:- 13
The File Transfer Protocol (FTP) is a set of rules that computers on a network use to communicate with
one another. The tool allows users to transfer files over networks such as the internet. This article
explains how to;
● Use different methods, including command line, web browser or an FTP client to connect servers or
computers and transfer files.
To transfer files using FTP, you require to an FTP server, a user account, and an FTP client or
application. Generally, most FTP servers require a username and a password in order to make a
connection. However, some servers may allow users to connect as anonymous users with no username
or password.
1. Username and password Login: This is a restrictive method where only users with an account can access
the server. This is common when there is a need for users to upload or download files to and from the server.
2. Username only: Some sites only require a username to access. However, this will only allow
downloads and not uploads
3. Anonymous FTP access: This does not require the user to enter a username or password and is the
easiest. The access is usually for sites where users can only download files such as forms, software, and
others.
72
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
3.Type in the username and password for your new account in the Log In and Password boxes. If you
have several domains in your cPanel account, ensure that you select the correct one where you want the
FTP account
5.Specify the disk space if you want something different from the default 2000MB. You can either type
in the disk space, or select unlimited at the Quota section at the bottom.
73
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Once the process is complete, you will see a screen that shows the login names, path, and quota. To see
the details for each FTP account, click Configure FTP client. This will show you the FTP username,
server, and port.
74
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
● Web browser: Does not require a client and works directly from the browser, most used for
downloading files from the server.
● Command line FTP: All major operating systems have FTP client’s functionality available as a
command line.
● A GUI FTP client: These are usually easy-to-use third party application that allows users to connect
and transfer files over FTP.
75
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
The web browser method works the same way as a website. However, instead of typing the HTTP at the
address bar, you replace it with FTP.
With the browser access, you do not need a client. You simply type the FTP server at the address bar in
this format: ftp://yourserver_name.com or ftp.yourserver_name.com
2.Type the FTP address of the server you wish to access. The syntax for FTP addresses is
ftp://ftp.domain_name.com or ftp://domain_name.com
You can also access the server by typing in your FTP username in the browser’s address bar. This will
give you a password required box where you will type your password and proceed
76
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Instead of waiting for the logon dialog box, you can enter the username and password in the address bar.
This will open the FTP server without prompting for a password.
This allows you to open the FTP server and download files.
To use the command line FTP, open the DOS Prompt in Windows or Terminal in Linux and Mac.
In windows 7, click start and type command at the search programs and files. Click the Command
Prompt. Alternatively, click start, programs and then the Accessories where you will find
the Command Prompt.
77
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
78
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Alternatively, type FTP and press Enter at the command prompt in Windows. From here, use
the open command to connect to the server.
1. ftp> openftp.ftpserver_name.com
Once you login, it takes you to the default directory. You can move to the one where you want to copy
files to, and open it using the command.
1. ftp>cd directory_name
To upload files to the active folder of the remote machine or server, use the command in the format
For example ftp> put readme.txt will upload the file readme.txt from your local folder to the remote
server.
79
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Moving files is much easier when using an FTP client and you may consider one if you require regular
access to the FTP servers. Using these allows you to easily upload, download or transfer files much
easier than a command line or web browser. For the purpose of this article, we will look at two FTP
clients for Windows
5.Select port 21
6.Click Login
7.Click Save if you do not want the server to keep on asking you to log in every time.
80
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
81
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
A screen with two panes opens up after log successful logon. By default, the left-hand pane is the local
drive while the right is the root directory of the remote FTP location.
To upload files
1.Select the files on the left-hand pane. You can select one or more files or folders using the control and
shift buttons.
82
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
2.Click the Upload drop-down button to choose whether you just want to upload normally, in the
background or and whether to transfer the files and then delete from the source location.
Alternatively, transfer and then right-click, it gives the same options as clicking on the drop-down
button.
83
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
The FTP Rush works almost the same way as the WinSCP. However, it has the option of transferring
files between two remote servers.
By default FTP Rush displays a local directory on the left pane and the remote on the right pane.
However, you can switch these the way you want them as well as connect to two remote servers. If you
want two remote servers, click on the computer /server on the icons bar under the name Local.
84
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
5.At the top of the page, enter the Host name, port, FTP Username and Password, and the Path. Click
the quick connect button just before the Host, or press Enter key to connect. Alternatively, click on the
drop-down button between the connect button and Host to open Quick Connect dialog box. Enter the
details FTP details and click OK to connect.
85
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
To copy files between different computers or server, go to the correct pane select the files you want to
upload to download and then click the Transfer button (Green arrow). Right-clicking on the highlighted
files will also give you the Transfer and other options such as Delete, Make directory, Advanced
Transfer, etc.
86
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
● To upload files, select the files from your Local pane and click the transfer arrow.
● To download files from the server to local, select the files in the Remote pane and click transfer
arrow.
1.Go to the Local drive pane and click the icon to switch to remote.
2.Enter the FTP username and password for the second website and click OK.
87
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
3.Once you establish a connection to each server, select and transfer the files you want to copy to the
other server.
Conclusion:-
FTP is a file transmission protocol that allows users to transfer files between servers or computers. To
perform a transfer, upload or download, a user requires a network connection, an FTP server, and an
account.
To access the FTP server, a user can use the inbuilt tools such as the command line which is available in
all major operating systems, a web browser, or a free or premium third-party FTP client or application.
Each of these has its benefits and limitations as well as different level of ease-of-use.
The command line can be a challenge for users who are not conversant while a browser access may have
its limits. The FTP clients are much easier to use suitable for users who are not comfortable with the
command lines.
88
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
PRACTICAL NO.:- 14
Theory:-
• Webserver:-
For controlling a remote machine, in this assignment we will have a look at how to use Team
Viewer. Team Viewer is a powerful program that will let you take remote control of a PC over the
internet. Team Viewer is a clever and very powerful program that will let you take remote control
of a PC over the internet. This makes it ideal for retrieving forgotten files, and it’s also a great way
of helping friends and family with their computer problems without leaving the comfort of your
desk.
If you’re a home user you can download and install the software for free. For business use, see
the licensing options. As you read on we’ll discover how to rescue that forgotten file and also how
to take remote control of your desktop PC. Here’s how to do it.
89
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Team Viewer is like a telephone conversation made between two PCs, so both machines will need
to have the software installed. We’re going to assume you’ve a main desktop PC and a laptop that
you take out and about with you. To get started, download Team Viewer on your desktop PC from
www.teamviewer.com.
Get configured
Now click ’Run’ at the bottom of the screen and, when prompted, accept the license agreement.
You’ll need to check the two tick boxes here as well. Finally, when prompted, choose ’Personal/
non-commercial use’ and click ’Next’. The next screen is called ’Setup unattended access’. All
you need do is click ’Next’ to proceed.
Make an account
90
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
On the next screen, you’ll need to give your computer a password. Once you’ve chosen one, click
’Next’. On the following screen you’ll be asked to provide your email address and a Team Viewer
password; make a note of this password, because you’ll need it later. Click ’Next’ when you’re
done.
You will now see a screen that looks like the one above. Don’t worry about the passwords at this
91
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
point - we’ll use those later. Your final job is to access your email inbox and find a message from
Team Viewer. You’ll need to open it and click on the long link, which will activate your Team
Viewer registration.
Next, it’s time to fire up your laptop and install Team Viewer there, too. When you’re done,
you’ll need to follow the same steps as before until you reach the screen above. This time, select’
already have a Team Viewer account’ and enter the email address you registered with, along with
your Team Viewer password.
Take control
92
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
Let’s be adventurous and give full control of your desktop to your laptop. Looking at your main
PC, note down the number next to ’Your ID’. Now, working on your laptop, enter this number into
the ’Partner ID’ box. Click ’Connect to partner’ and enter your Team Viewer password. You’ll see
your desktop PC’s Windows desktop appear.
Working on your laptop, you should now be able to move icons around on your other PC. You
can open programs, close programs and make system configuration changes too. In this mode,
Team Viewer is also ideal for troubleshooting PCs remotely. Set it up as before and you’ll be able
to help your friends without leaving your own home.
93
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran
If you’ve forgotten to transfer a file from your desktop, close the windows that control your other
PC, then look under ’Control remote computer’ in the Team Viewer display. Select ’File transfer
>Connect >Log on’. Navigate to your file and se-
lectit.Click’Retrieve’anditwillbetransferredtoyourlaptop’sMyDocuments folder.
Conclusion:-
In this assignment, we studied to install and setup Team Viewer for controlling remote machine.
94
1902629