Farhan Complete CN Practical File
Farhan Complete CN Practical File
Twisted pair cables are a type of wiring used in computer networking for transmitting data. They
consist of pairs of insulated copper wires twisted together to reduce electromagnetic interference.
There are two main types:
1. Unshielded Twisted Pair (UTP):
o No additional shielding around the wires.
o Most common type used in Ethernet networks.
o Cheaper and easier to install.
o Commonly used categories:
Cat5e: Supports speeds up to 1 Gbps.
Cat6: Supports speeds up to 10 Gbps over short distances.
2. Shielded Twisted Pair (STP):
o Each pair is wrapped in a shielding material (e.g., foil) to protect against interference.
o Better performance in noisy environments but more expensive.
Twisted pair cables are commonly used for local area networks (LANs) and telephone systems. The
twists in the wires help cancel out noise and reduce crosstalk between wires.
Fiber optic cables are high-speed networking cables used to transmit data using light signals. They are made
up of thin strands of glass or plastic fibers, which allow data to travel faster and over longer distances
compared to traditional copper cables.
Key features:
Cladding: Surrounds the core and reflects the light back to prevent signal loss.
o Carries multiple light signals at once, but over shorter distances (up to 500 meters).
Benefits:
Faster speeds.
3. Coaxial Cables:-
Coaxial cables (or coax cables) are used in computer networks and other communication systems to
transmit data, video, and audio signals. They consist of a central conductor, insulation, a metal shield, and
an outer jacket.
Key components:
1. Inner conductor: Carries the signal.
2. Insulation: Surrounds the conductor to keep the signal contained.
3. Metal shield: Protects against interference.
4. Outer jacket: Protective cover for durability.
Coaxial cables are commonly used for:
Cable internet and TV.
Early computer networks (e.g., Ethernet).
Advantages:
Good for transmitting data over moderate distances.
Resistant to electromagnetic interference.
However, they have largely been replaced by twisted pair and fiber optic cables for most modern
networking.
PRACTICAL CONSIDERATION:-
1. Ethernet Cabling:-
Ethernet cabling is used to connect devices in a local area network (LAN) for data transmission. The most
common type is twisted pair cable (e.g., Cat5e, Cat6), which supports different speeds and distances.
Key types:
Ethernet cables typically support speeds from 1 Gbps to 10 Gbps, depending on the category.
Key Aspects:
1. Network Testing:
o Performance Testing: Measures speed, bandwidth, and latency.
o Connectivity Testing: Verifies that devices can communicate over the network.
o Security Testing: Identifies vulnerabilities and ensures data protection.
o Cable Testing: Checks cable integrity, signal strength, and proper installation.
2. Certification:
o Network Devices: Routers, switches, and other hardware are tested for compliance with
standards (e.g., IEEE 802.3 for Ethernet).
o Cabling Standards: Cables are certified to meet specifications (e.g., Cat5e, Cat6, fiber optic).
o Professional Certifications: Individuals earn certifications like Cisco CCNA, CompTIA
Network+, or Juniper JNCIA to validate their networking skills and knowledge.
These processes ensure a network operates efficiently, securely, and meets required performance
standards.
Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained
Total
Implementing different network topologies involves arranging network devices and connections in
various configurations to meet specific requirements. Here are several common network topologies alogn
with brief descriptions and consideration.
Bus Topology:-
Bus topology is a network configuration where all devices are connected to a single central cable called
the bus. Data is transmitted across this cable, and all devices receive the signal, but only the intended
recipient processes it. Each end of the bus has terminators to prevent signal reflection.
Key Points:
Simplicity: Easy to set up and cost-effective, requiring minimal cabling.
Single point of failure: If the main cable fails, the entire network goes down.
Performance: More devices lead to network slowdowns due to data collisions, and troubleshooting
can be difficult.
Advantages:
Easy and inexpensive to install.
Simple to add new devices.
Disadvantages:
Not scalable for large networks.
Vulnerable to cable failure.
Bus topology was widely used in early Ethernet networks but has mostly been replaced by star topology
in modern systems.
Star Topology:-
Star topology is a network layout where all devices (nodes) are connected to a central hub or switch. The
hub acts as the central point for data transmission.
Key Features:
Central Hub: All communication passes through the hub.
Fault Isolation: If one connection fails, the rest of the network remains unaffected.
Easy to Manage: Adding or removing devices is simple.
Advantages:
Easy to set up and troubleshoot.
Reliable, since one device failure doesn't impact the whole network.
Disadvantages:
If the central hub fails, the entire network goes down.
Commonly used in local area networks (LANs).
Key Features:
Data Transmission: Each node receives and passes on data until it reaches the intended recipient.
Failure Impact: If one node fails, it can disrupt the entire network unless a dual ring is used.
Performance: Generally suitable for small to medium-sized networks; performance can decrease as
more nodes are added.
Advantages:
Simple to install and manage.
Data packets travel at high speeds.
Disadvantages:
Vulnerable to single point failures.
Difficult to troubleshoot and add new devices.
Key Features:
1. Full Mesh: Every device is connected to every other device, providing maximum redundancy.
2. Partial Mesh: Some devices are connected to all others, while others are only connected to a few.
Advantages:
Redundancy: If one connection fails, data can take alternative paths.
High Reliability: Reduced chances of network failure.
Disadvantages:
Complexity: Difficult to set up and manage, especially in full mesh.
Cost: Requires more cabling and hardware.
Mesh topology is commonly used in networks that require high availability, such as in
telecommunications and critical infrastructure systems.
Tree Topology:-
Tree topology is a hierarchical network structure that combines characteristics of star and bus topologies.
It consists of a central "root" node connected to multiple "child" nodes, which can further connect to other
nodes, forming a branching structure.
Key Features:
Advantages:
Supports large networks.
Simplifies network organization.
Fault isolation is easier; a problem in one branch doesn't affect others.
Disadvantages:
If the root node fails, the entire network can go down.
More complex cabling and configuration than simpler topologies.
Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained
Total
A Wide Area Network (WAN) is a network that connects devices and LANs over large
geographical areas, such as cities, countries, or even globally. Key points about WANs include:
A Metropolitan Area Network (MAN) is a network that spans a city or a large campus, bridging the gap
between Local Area Networks (LANs) and Wide Area Networks (WANs). Key points about MANs
include:
MANs are ideal for linking networks within a specific urban area, offering faster speeds than WANs and
broader coverage than LANs.
PANs are convenient for short-range communication and personal device connectivity.
A Campus Area Network (CAN) is a network designed to interconnect multiple local area networks (LANs)
within a limited geographical area, such as a university or corporate campus. Key points about CANs
include:
1. Scope: Covers a medium-sized area, typically a campus or group of buildings within a limited radius.
2. Purpose: Facilitates resource sharing, communication, and collaboration among departments or
buildings within the campus.
3. Technology: Utilizes Ethernet, fiber optics, Wi-Fi, and sometimes wireless bridging.
4. Examples: Connecting computer labs, administrative offices, and library systems in a university; linking
different departments in a corporate campus.
5. Ownership: Managed and controlled by the organization owning the campus.
CANs are efficient for localized networking needs, ensuring high-speed connectivity and centralized
management.
Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained
Total
1. Scope:
o The LAN covers the intended area (e.g., office or campus).
2. Speed:
o
High-speed connections ensure efficient file transfers and resource sharing.
3. Connectivity:
o
Ethernet provides reliable wired connections, while Wi-Fi adds flexibility.
4. Hardware:
o Includes necessary devices like routers, switches, and access points.
5. Management:
o Centralized management is achieved through a single router or server.
Resource Sharing: Printers, scanners, and storage devices can be accessed by all connected devices.
Data Centralization: Files can be stored on a central server for easy access and backup.
Collaboration: Devices can communicate seamlessly, fostering collaboration within the network.
This setup achieves the aim of creating an efficient Local Area Network, enabling resource sharing,
communication, and centralized management within a limited geographical area.
Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained
Total
Prerequisites:
1. Ensure FTP Server is Running:
- One of the systems in your LAN needs to act as the FTP server. You can use software like FileZilla
Server, vsftpd (for Linux), or other FTP server software.
- Install an FTP server software on the system that will act as the server. Follow the installation instructions
provided by the chosen FTP server software.
- Configure the FTP server settings, including user accounts, permissions, and directories that will be
accessible.
- Start the FTP server software. The server will listen for incoming FTP connections on a specific port
(usually port 21).
- On the system from which you want to transfer files, open the Command Prompt
2. Connect to the FTP Server:
1. Enter Credentials:
- Enter the FTP server username and password when prompted.
Use the `get` command to download a file from the FTP server to your local system:
1. Transfer Files:
- Use the FileZilla interface to navigate between the local and remote directories. Drag and drop files between
two panes to upload or download files.
Remember to consider security best practices, such as using strong passwords and, if possible, enabling
encryption (FTP over TLS/SSL) for secure file transfers. Additionally, configure firewalls to allow FTP
traffic if necessary.
Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained
Total
While the OSI model is a theoretical guideline, real-world networking often follows the more
practical
TCP/IP model, which maps to OSI concepts.
Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained
Total
ROUTER:
FUNCTION:
Connects multiple networks (e.g., home network to the internet).
Routes data packets between devices and networks using IP addresses.
Provides Network Address Translation (NAT) for multiple devices on a single IP.
USE CASE:
Home Use: Allows multiple devices (smartphones, computers, smart TVs) to access the
internet simultaneously.
Enterprise Use: Connects various departments or branches to a central network and the
internet, enabling communication and resource sharing.
KEY FEATURES:
Wireless capability (Wi-Fi routers) for mobile device connectivity.
Firewall functionality for security.
Quality of Service (QoS) settings to prioritize bandwidth for critical applications.
SWITCH:
FUNCTION:
• Connects devices within the same Local Area Network (LAN).
• Operates at the Data Link Layer (Layer 2) of the OSI model.
• Forwards data only to the specific device that needs it, improving network efficiency.
• Uses MAC addresses to identify devices and manage traffic.
KEY FEATURES:
Can have multiple ports (e.g., 8, 16, 24, or 48) for connecting multiple devices.
Managed switches allow for configuration, monitoring, and advanced features like
VLANs (Virtual Local Area Networks).
HUB
FUNCTION:
A basic networking device that connects multiple Ethernet devices.
Broadcasts incoming data packets to all ports, regardless of the intended recipient.
Operates at the Physical Layer (Layer 1) of the OSI model.
USE CASE:
Legacy Networks: Historically used in small networks to connect devices, such as
in homes or small offices.
Less common today due to inefficiencies compared to switches, which direct
traffic more intelligently.
KEY FEATURES:
Simple and inexpensive; often used for basic connectivity needs.
Limited bandwidth management and no ability to filter traffic, leading to potential
network congestion.
BRIDGE:
FUNCTION:
• Connects two or more network segments, allowing them to function as a single network.
• Filters traffic by examining data packets and forwarding them only to the relevant segment.
• Reduces collisions by separating traffic, which enhances overall network performance.
USE CASE:
• Network Segmentation: Commonly used to divide large networks into smaller, more
manageable segments, improving performance and reducing congestion.
• Connecting Different Media Types: Can link different types of networks, such as Ethernet and
Wi-Fi.
KEY FEATURES:
• Operates at the Data Link Layer (Layer 2) of the OSI model.
• Maintains a MAC address table to make intelligent
forwarding decisions.
• Can improve security by isolating network traffic.
GETWAY:
FUNCTION:
• Serves as a "gate" between two networks, allowing communication between them.
• Translates data between different protocols and formats, enabling interoperability.
• Can perform routing, forwarding, and protocol conversion as needed.
USE CASE:
• Connecting a Home Network to the Internet: Allows devices in a home network to access the
internet, typically functioning as a router and modem combined.
• Linking Different Network Architectures: Facilitates communication between different
network types, such as a local area network (LAN) and a wide area network (WAN).
KEY FEATURES:
• Can operate at multiple layers of the OSI model, depending on its functionality (e.g., Layer 3 for
routing, Layer 7 for application layer translation).
• Often includes security features, such as firewalls and VPN capabilities.
• Supports various network protocols, enabling flexibility in network design.
FUNCTION:
• Amplifies and retransmits signals to extend the range of a network.
• Receives incoming data signals, strengthens them, and sends them out again to cover larger areas.
• Helps to overcome distance limitations of network cables or wireless signals.
USE CASE:
• Extending Wi-Fi Coverage: Commonly used in homes or offices to boost Wi-Fi signals in areas
where coverage is weak or nonexistent.
• Boosting Ethernet Signals: Employed in larger networks to extend the reach of wired
connections, ensuring reliable data transmission over long distances.
KEY FEATURES:
• Simple installation with minimal configuration required.
• Works with various network standards (e.g., Ethernet, Wi-Fi).
• Can be used in both wired and wireless networks.
Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained
Total
Hardware Requirements
Table 1.1 lists the basic system requirements for Windows Server 2008 editions.
Hardware resources would need to be increased for any systems using Hyper-V technology and running
virtual machines. For example, if you‟re running three virtual servers within a Windows Server 2008
Enterprise edition, you would need additional processing power, more memory, and more disk space.
It‟s common for Microsoft to provide free evaluation copies of Server operating systems for use. Currently,
you can download Windows Server 2008 30-day and 60-day evaluation editions free of charges at :
http://www.micosoft.com/windowsserver2008/en/us/trial-software.aspx
Beware, though. These files are quite large. If you‟re using a slower dial-up link, you might want to see
whether Microsoft is currently offering an evaluation DVD via regular mail. There‟s a nominal cost involved
with this option, but it‟s better than trying to download more than 2GB at 56KB.
The download is an .iso image of the actual DVD. Search with your favorite search engine for Download Windows
Server 2008, and you‟ll find the link.
Once you download the .iso image, you can burn it to a DVD. If you don‟t have the software needed to burn
it to DVD, you can use one of many freeware utilities (such as ImgBurn) to burn the .iso image to your DVD.
This allows you to specify your language and your keyboard layout. By default, text input
language and method is : US Keyboard layout (Figure 0001).
You are presented with options to Install, brief information about Server 2008 or
repair (Figure 0002).
3.1 Click Install now to start setup Windows Server 2008 on this computer.
4.1 Enter your "Product Key" for activation now or you can enter it later (Figure 0003).
4.3. If you leave the product key box blank, the warning window will appear (Figure 0004); just
click No to continue.
5.1 Select Windows Server 2008 Enterprise (Full Installation), (as shown in the
Page | 37 Patil Yash [En_no.: 232701070117]
Computer Network(2030106303)
Figure 0005).
5.2 Tick the box of I have selected the edition of Windows that I purchased.
If you accept (which, of course, you have to do to continue installation), tick the
box of I accept the license terms (Figure 0006).
7. Installation Options.
You are presented with options to Upgrade or Custom (advanced). Click Custom (advanced),
(Figure 0007).
8. Partition Options
8.6 Click Next The partition will be formatted with NTFS as part of the installation. At this point, take a
breack. The installation will continue on its own.
10.1 Enter a new password in the two test boxes (Figure 0014). Enter Pr@ctice in this exercise.
It meets complexity requirements and doesn‟t require you to remember multiple passwords. Don‟t
use this password on a production server.
10.3 Once the password has been changed, the screen indicates success (Figure 0015). Click OK.
Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained
Total
1. IPv4 Addressing :-
1. Format: IPv4 addresses use a 32-bit binary number, divided into four octets separated by dots
(e.g., 192.168.1.1).
2. Address Space: Supports approximately 4.3 billion unique addresses, which is insufficient for
modern demands.
3. Classes: IPv4 addresses are categorized into five classes (A, B, C, D, and E) based on the
range of addresses.
4. Subnetting: IPv4 supports subnetting to divide a large network into smaller segments.
5. Common Issues: Limited address space led to the development of Network Address Translation
(NAT) and private addressing to conserve addresses.
1. Unicast Addressing
o Purpose: One-to-one communication between devices. Data is sent from one source
to a specific destination.
o Example: A computer with an IP 192.168.1.10 communicates directly with a server.
o Usage: Common for most network communications.
2. Broadcast Addressing
o Purpose: One-to-all communication where data is sent to all devices in a network
segment.
o Example: 192.168.1.255 is a broadcast address for the subnet 192.168.1.0/24.
o Usage: Used in ARP requests and network announcements.
3. Multicast Addressing
o Purpose: One-to-many communication where data is sent to multiple devices interested
in receiving the information.
o Range: 224.0.0.0 to 239.255.255.255.
4. Private Addressing
o Purpose: Used within local networks and not routable on the public internet. Requires
NAT for internet access.
o Ranges:
A: 10.0.0.0 – 10.255.255.255
Class B: 172.16.0.0 – 172.31.255.255
Class C: 192.168.0.0 – 192.168.255.255.
o Usage: Home and business networks.
5. Public Addressing
o Purpose: Routable on the internet and globally unique.
o Range: Any address outside private address ranges.
o Usage: Assigned to devices needing direct internet communication.
6. Loopback Addressing
o Purpose: Tests communication within the same device (local host).
o Range: 127.0.0.0 – 127.255.255.255.
o Usage: Commonly used address is 127.0.0.1 for self-diagnostics.
8. Reserved Addresses
o Purpose: Reserved for specific purposes like routing or testing.
o Examples:
0.0.0.0: Indicates the default route or unspecified address.
255.255.255.255: Limited broadcast address.
Understanding these types is crucial for network design, device configuration, and efficient
troubleshooting in computer networking.
2. IPv6 Addressing :-
1. Format: IPv6 uses a 128-bit binary number, represented in hexadecimal and separated by
colons (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
4. Features:
Stateless Address Autoconfiguration (SLAAC): Devices can self-configure IP
addresses without a DHCP server.
Built-in security with mandatory IPsec support
Types of IPv6 Addressing in Computer Networking :-
IPv6 addressing is categorized based on how data is delivered and its intended recipients. The
main types include:
1. Unicast Address :-
Purpose: One-to-one communication between devices. A single IPv6 address identifies a
specific interface.
Types of Unicast Addresses:
o Global Unicast: Globally unique and routable on the internet, similar to IPv4
public addresses.
Example: 2001:0db8::/32.
o Link-Local: Automatically configured for communication within the same link
(network segment) and starts with FE80::/10.
Example: FE80::1.
o Unique Local (ULA): Used for private addressing within organizations, similar to
IPv4 private addresses. Begins with FC00::/7.
Example: FD00::1.
2. Multicast Address :-
Purpose: One-to-many communication where data is sent to all devices in a specific group.
Range: Starts with FF00::/8.
Usage: Routing protocols, video streaming, and other group communication tasks.
Example: FF02::1 (All nodes on the local link).
3. Anycast Address :-
Purpose: One-to-nearest communication where data is sent to the closest device in a group.
Usage: Often used for load balancing and DNS services.
Example: IPv6 does not have a specific format for anycast; any unicast address can be
Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained
Total
Installing Wireshark:
1. Download Wireshark:
- Choose the appropriate version for your operating system (Windows, macOS, or Linux).
2. Install Wireshark:
- Follow the installation instructions provided on the Wireshark website for your specific operating
system.
For Windows:
1. Launch Wireshark:
- Choose the network interface you want to capture packets from. Click on the interface and then
3. Capture Packets:
- Wireshark will start capturing packets on the selected interface. You'll see a live list of captured
packets.
4. Inspect Packets:
- You can inspect individual packets by clicking on them in the list. The details of the packet will be
macOS:
1. Launch Wireshark:
3. Capture Packets:
- Click the "Start" button to begin capturing packets on the selected interface.
4. Inspect Packets:
- Click on any packet in the list to view detailed information in the lower panel.
For Linux:
1. Launch Wireshark:
3. Capture Packets:
- Click the "Start" button to start capturing packets on the selected interface.
4. Inspect Packets:
- Use display filters to focus on specific types of packets (e.g., `tcp`, `udp`, `ip.addr==x.x.x.x` for a
specific IP address).
- Packet Details:
- Explore the various tabs in the packet details pane to view information such as protocol layers,
headers, and payload.
- Right-click on a TCP packet and select "Follow" > "TCP Stream" to view the entire conversation
between two hosts.
- Save Captures:
Remember to use Wireshark responsibly and ensure you have the necessary permissions to
capture packets on the network. Analyzing packet captures can provide valuable insights into
network behavior and troubleshooting network issues.
Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained
Total
AIM:- Determine whether the following IPv4 addresses are valid or invalid.
If a valid IPv4 address then finds class, Network and Host ID of an IPv4
address. If invalid IPv4 address then write a reason for the same.
a) 1.4.5.5 b) 75.45.301.14
c) 101.59.045.78 d) 192.226.12.11
e) 130.45.151.154 f) 11100010.23.14.67
g) 211.34.7.8.20 h) 240.230.220.89
Student work:
A) 1.4.5.5:- is valid
Class: - A (Because the first octet of this IP comes between 1.0.0.0 to 127.0.0.0) Network ID: -
1 Host ID: - 4.5.5
B) 75.45.301.14 is invalid
Because the third segment in the given address “301” exceeds the valid range of 0 -255.The
address 75.45.301.14 is invalid as per the rules of IPv4 addressing.
C) 101.59.045.78 is invalid
Looking at “045” in the third segment it’s important to note that leading zeros are not permitted
in an IPv4 address segment unless the segment consists of only zero. In this case “045” has a
leading zero which is not allowed for a non-zero number.
D) 192.226.12.11 is valid
Class: - C (because the first octet of this IP comes between 192.0.0.0 to 223.255.255.0)
Network ID: - 192.226.12 Host ID: - 11
E) 130.45.151.154 is valid
Class: - B (because the first octet of this IP comes between 128.0.0.0 to 191.255.0.0)
Network ID: - 130.45 Host ID: - 151.154
F) 11100010.23.15.67 is invalid
Because the first octet of the given IP address does not belong to any class of the IPv4 address.
H) 240.230.220.89 is valid
Class: - E (because the first octet of this IP comes between: 240.0.0.0 to 255.255.255.255)
Class E addresses aren’t divided into network and host IDs like other classes (A, B, C). Instead they
were reserved for future use or experimental purposes and aren’t commonly utilized in regular
network.
Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained
Total
2. Stateful Inspection
o Tracks active connections to understand the context of packet flows.
o Ensures packets are part of legitimate, established connections.
3. Application-Level Filtering
o Inspects data at the application layer for anomalies or malicious content.
o Used in more advanced firewalls, like proxy firewalls and NGFWs.
Types of Firewalls:-
1. Packet-Filtering Firewalls
o Examines individual data packets.
o Operates at the network layer (Layer 3 of the OSI model).
o Filters packets based on source/destination IP addresses, ports, and protocols.
o Lightweight but less secure against sophisticated attacks.
3. Proxy Firewalls
o Operates at the application layer (Layer 7 of the OSI model).
o Acts as an intermediary between end-users and the web.
o Inspects application-level data for more comprehensive protection.
Challenges
1. Sophisticated Threats:
o Firewalls may struggle against zero-day exploits or advanced persistent threats (APTs).
2. Encrypted Traffic:
o High volumes of SSL/TLS traffic make it challenging to inspect effectively.
3. Configuration Errors:
o Misconfigured rules can lead to vulnerabilities.
4. Scalability Issues:
o Legacy firewalls may not handle modern traffic loads efficiently.
Best Practices
1. Regular Updates:
o Update firewall software and rules to address emerging threats.
Firewalls remain indispensable in a multi-layered defense strategy. However, their effectiveness hinges on
correct configuration, regular updates, and integration with broader security systems. For modern threats,
firewalls must evolve to address the dynamic landscape of cyber risks.
Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained
Total
1. `ipconfig` - IP Configuration:
- Purpose: Displays the IP configuration for all network interfaces on a system.
- Usage:
- Usage:
5. `pathping`:
- Purpose: Combines the functionality of `ping` and `tracert`, providing information about network
latency and packet loss.
- Usage:
6. `route`:
- Purpose: Displays or modifies the IP routing table.
- Usage:
Additional Tips:
- Use `ipconfig /release` and `ipconfig /renew` to release and renew IP addresses, respectively.
Example Scenarios:
1. Checking IP Configuration:
2. Testing Connectivity:
3. Tracing Route:
Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained
Total