Tuesday 25 April 2023

Practical -77 :- how to turn your USB dongle into a wireless Wi-Fi hotspot

AIM :- CONNECTION ON A PC USING BORADBAND OR DONGLE


Step 1: Open the DOS terminal


Click Start, type CMD, right-click the Cmd.exe link and select “Run as Administrator”..

Step 2: Check availability

If you want to create WiFi Hotspot firstly you have to check whether the hosted network mode is supported by your machine or not…
Enter this command to check availability..

netsh wlan show drivers

If you find Hosted network supported : Yes then only you can create WiFi Hotspot

Step 3: Creating WiFi Hotspot



Now type the following command to create WiFi hotspot:

netsh wlan set hostednetwork mode=allow ssid=Name key=8CharacterKey

Replace “Name” with the name you’d like to use for your custom network, and “8CharacterKey” with a password that’s a little harder to guess.

Start Wi-Fi hotspot by this cmd:

netsh wlan start hostednetwork

Step 4: No Network Access ? or No Internet Access?

 
















Now click Control Panel — Network and Internet — Network and Sharing Center

Click on Internet Connection you want to share (Broadband Connection)
Properties — Sharing Tab- Check Allow other network users to connect through this computer’s internet connection.       
And in drop down list select your virtual adapter’s (WiFi Hotspot’s) connection..

You are done with your WiFi Hotspot.

Practical - 71 :- Working with SMTP, TELNET, FTP,HTTP, SNMP, LDAP ETC

 



Practical - 74 :- Installing Proxy Servers

Proxy Servers

What is a proxy server? It’s a mediator or a replacement server. It allows your computer to connect to the internet using a different IP address. In simple terms, proxy servers add an extra layer of privacy to your online presence and can also save a lot of bandwidth in certain situations.

When using a proxy, internet traffic and files can be compressed, and all the unnecessary parts can be left aside (e.g., annoying ads on web pages). Proxies are very useful to companies with a large number of employees on the same wireless network, as they can ease the bandwidth traffic of a single address.

How to Connect to a Proxy Server on Windows

There are two basic ways you can connect to a proxy server on a Windows computer. One is with an automated script, and the other method is manual. Let’s start with the instructions for using the script:

Step - I :- On your computer, go to Start > Settings.

















Step - II :- Click on the Network & Internet option. 

Step - III :- Within the side menu, click on Proxy.




















Step - IV :- Enable the Use setup script option.













Step - V :- Enter the script address you were given (by your employer, school, or another server owner.) and select Save. You can then exit the settings, and the script should become effective immediately.

The other way around is connecting to a proxy server manually:

1.     Enable Use a proxy server under the Manual proxy setup section.



2.     Enter the IP under the Address tab, and the Port number in the appropriate field.
































3.     When you’re done, Save the changes and exit this menu.



 


Practical -72 :- Configuring DHCP on Router

 

AIM :- Configuring DHCP on Router

DHCP stands for Dynamic Host Configuration Protocol. It is a service which allows you to configure TCP/ IP settings such as IP address and subnet mask on the clients (PC, laptop, printer, etc.) automatically. Typically, DHCP is configured on a dedicated server for better performance. The server can be either Windows-based or Linux-based.

To perform this exercise, we will use the following topology.



First, add the required devices in Cico Packet Tracer and connect them appropriately. In the preceding topology, Router1 will act as DHCP server while Router2 and PC1 will act as DCHP clients. Let’s begin the exercise.

Configuring DHCP on Router

DHCP stands for Dynamic Host Configuration Protocol. It is a service which allows you to configure TCP/ IP settings such as IP address and subnet mask on the clients (PC, laptop, printer, etc.) automatically. Typically, DHCP is configured on a dedicated server for better performance. The server can be either Windows-based or Linux-based.

To perform this exercise, we will use the following topology.

First, add the required devices in Cico Packet Tracer and connect them appropriately. In the preceding topology, Router1 will act as DHCP server while Router2 and PC1 will act as DCHP clients. Let’s begin the exercise.

Configuring DHCP on Router

DHCP stands for Dynamic Host Configuration Protocol. It is a service which allows you to configure TCP/ IP settings such as IP address and subnet mask on the clients (PC, laptop, printer, etc.) automatically. Typically, DHCP is configured on a dedicated server for better performance. The server can be either Windows-based or Linux-based.

To perform this exercise, we will use the following topology.

First, add the required devices in Cico Packet Tracer and connect them appropriately. In the preceding topology, Router1 will act as DHCP server while Router2 and PC1 will act as DCHP clients. Let’s begin the exercise.

  1. On Router1, execute the following commands to configure an IP address.

  2. Next, create a DHCP pool named DhcpPool1. Use 10.0.0.1 IP address as the default gateway and DNS server. Use 10.0.0.0 255.0.0.0 as network ID.     

    By default DHCP server will start to assign IP addresses from the first IP address of the assigned network ID and it will be 10.0.0.1/ 8. However, we have already configured this IP addresses manually on Fa0/ 0 interface of Router1. To avoid the confliction between DHCP assigned and manually assigned IP addresses, you can exclude one or more specific IP addresses or IP ranges from the DHCP pool. DHCP server will not distribute these IP addresses to any of the DHCP client.
  3. The following commands will exclude 10.0.0.0.1 to 10.0.0.100 IP addresses that will not be distributed by DHCP server. 

  4. On Router2, we will assign an IPv4 address on the Fa0/ 0 interface through the DHCP server. To do this, execute the following commands.  

  5. Wait for a few seconds and then execute the following command to view the IP address on Router2. 

  6. Once you have configured an IP address on Router2, switch to PC1, and try to obtain TCP/ IP settings through the DHCP server. To do so, open the console of PC1, select the Desktop tab. On the available options, click IP Configuration and then select the DHCP radio button.
  7. After a few seconds, DHCP server will assign an IP address from the configured DHCP pool along with a default gateway and DNS server IP addresses. 

  8. In the preceding figure, you can see that 10.0.0.102 IP address has been assigned by the DHCP server.
  9. To verify the connectivity between PC1 and Router1, execute the following command at the Command Prompt window. 

  10. You should be able to ping successfully, as shown in the following figure. 

  11.  Save the configuration of each device and also save the topology and name is as DHCP Topology


Theory -80 :- DHCP - AN INTRODUCTION

 

DHCP - AN INTRODUCTION

The Dynamic Host Configuration Protocol (DHCP) is a network protocol that is used to configure network devices so that they can communicate on an IP network. A DHCP client uses the DHCP protocol to acquire configuration information, such as an IP address, a default route and one or more DNS server addresses from a DHCP server. The DHCP client then uses this information to configure its host. Once the configuration process is complete, the host is able to communicate on that internet. The DHCP server maintains a database of available IP addresses and configuration information. When it receives a request from a client, the DHCP server determines the network to which the DHCP client is connected, and then allocates an IP address or prefix that is appropriate for the client, and sends configuration information appropriate for that client.

Because the DHCP protocol must work correctly even before DHCP clients have been configured, the DHCP server and DHCP client must be connected to the same network link. In larger networks, this is not practical. On such networks, each network link contains one or more DHCP relay agents. These DHCP relay agents receive messages from DHCP clients and forward them to DHCP servers. DHCP servers send responses back to the relay agent, and the relay agent then sends these responses to the DHCP client on the local network link.

DHCP servers typically grant IP addresses to clients only for a limited interval. DHCP clients are responsible for renewing their IP address before that interval has expired, and must stop using the address once the interval has expired, if they have not been able to renew it. DHCP is used for IPv4 and IPv6. While both versions serve much the same purpose, the details of the protocol for IPv4 and IPv6 are sufficiently different that they may be considered separate protocols.

Hosts that do not use DHCP for address configuration may still use it to obtain other configuration information. Alternatively, IPv6 hosts may use stateless address auto configuration. IPv4 hosts may use link-local addressing to achieve limited local connectivity.



Theory -76 :- Overview Of Virtual , Trunkling -VLAN Trunk Protocol (VTP)

What is VLAN?

VLAN is a custom network which is created from one or more local area networks. It enables a group of devices available in multiple networks to be combined into one logical network. The result becomes a virtual LAN that is administered like a physical LAN. The full form of VLAN is defined as Virtual Local Area Network.

The below topology depicts a network having all hosts inside the same virtual LAN:

Without VLANs, a broadcast sent from a host can easily reach all network devices. Each and every device will process broadcast received frames. It can increase the CPU overhead on each device and reduce the overall network security.

In case if you place interfaces on both switches into separate VLAN, a broadcast from host A can reach only devices available inside the same VLAN. Hosts of VLANs will not even be aware that the communication took place. This is shown in the below picture:

 

VLAN in networking is a virtual extension of LAN. A LAN is a group of computer and peripheral devices which are connected in a limited area such as school, laboratory, home, and office building. It is a widely useful network for sharing resources like files, printers, games, and other applications.


How VLAN works

Here is a step by step detail of how VLAN works:

  • VLANs in networking are identified by a number.
  • A Valid range is 1-4094. On a VLAN switch, you assign ports with the proper VLAN number.
  • The switch then allows data which needs to be sent between various ports having the same VLAN.
  • Since almost all networks are larger than a single switch, there should be a way to send traffic between two switches.
  • One simple and easy way to do this is to assign a port on each network switch with a VLAN and run a cable between them.
 
















Example of VLAN

In the below example, there are 6 hosts on 6 switches having different VLANs. You      need 6 ports to connect switches together. It means, if you have 24 various VLANs,        you will have only 24 hosts on 45 port switches.





Characteristics of VLAN

Here are the important characteristics of VLAN:

  • Virtual LANs offer structure for making groups of devices, even if their networks are different.
  • It increases the broadcast domains possible in a LAN.
  • Implementing VLANs reduces the security risks as the number of hosts which are connected to the broadcast domain decreases.
  • This is performed by configuring a separate virtual LAN for only the hosts having sensitive information.
  • It has a flexible networking model that groups users depending on their departments instead of network location.
  • Changing hosts/users on a VLAN is relatively easy. It just needs a new port-level configuration.
  • It can reduce congestion by sharing traffic as individual VLAN works as a separate LAN.
  • A workstation can be used with full bandwidth at each port.
  • Terminal reallocations become easy.
  • A VLAN can span multiple switches.
  • The link of the trunk can carry traffic for multiple LANs.

 

Types of VLANs

Here are the important types of VLANs

 

Port-Based VLAN

Port-based VLANs groups virtual local area network by port. In this type of virtual LAN, a switch port can be configured manually to a member of VLAN.

Devices that are connected to this port will belong to the same broadcast domain that is because all other ports are configured with a similar VLAN number.

The challenge of this type of network is to know which ports are appropriate to each VLAN. The VLAN membership can’t be known just by looking at the physical port of a switch. You can determine it by checking the configuration information.

 

Protocol Based VLAN

This type of VLAN processes traffic based on a protocol that can be used to define filtering criteria for tags, which are untagged packets.

In this Virtual Local Area Network, the layer-3 protocol is carried by the frame to determine VLAN membership. It works in multi-protocol environments. This method is not practical in a predominately IP based network.

 

MAC Based VLAN

MAC Based VLAN allows incoming untagged packets to be assigned virtual LAN and, thereby, classify traffic depending on the packet source address. You define a Mac address to VLAN mapping by configuring mapping the entry in MAC to the VLAN table.

This entry is specified using source Mac address proper VLAN ID. The configurations of tables are shared among all device ports.

Advantages of VLAN

Here are the important pros/benefits of VLAN:

  • It solves a broadcast problem.
  • VLAN reduces the size of broadcast domains.
  • VLAN allows you to add an additional layer of security.
  • It can make device management simple and easier.
  • You can make a logical grouping of devices by function rather than location.
  • It allows you to create groups of logically connected devices that act like they are on their own network.
  • You can logically segment networks based on departments, project teams, or functions.
  • VLAN helps you to geographically structure your network to support the growing companies.
  • Higher performance and reduced latency.
  • VLANs provide increased performance.
  • Users may work on sensitive information that must not be viewed by other users.
  • VLAN removes the physical boundary.
  • It lets you easily segment your network.
  • It helps you to enhance network security.
  • You can keep hosts separated by VLAN.
  • You do not require additional hardware and cabling, which helps you to saves costs.
  • It has operational advantages because of changing the IP subnet of the user is in software.
  • It reduces the number of devices for particular network topology.
  • VLAN makes managing physical devices less complex.

Disadvantages of VLAN

Here are the important cons/ drawbacks of VLAN:

A packet can leak from one VLAN to other.

An injected packet may lead to a cyber-attack.

Threat in a single system may spread a virus through a whole logical network.

You require an additional router to control the workload in large networks.

You can face problems in interoperability.

A VLAN cannot forward network traffic to other VLANs.

Application/Purpose of VLAN

Here are the important uses of VLAN:

  • VLAN is used when you have 200+ devices on your LAN.
  • It is helpful when you have a lot of traffic on a LAN.
  • VLAN is ideal when a group of users need more security or being slow down by many broadcasts.
  • It is used when users are not on one broadcast domain.
  • Make a single switch into multiple switches.

Summary:

  • VLAN is defined as a custom network which is created from one or more local area networks.
  • VLAN in networking are identified by a number.
  • A Valid range is 1-4094. On a VLAN switch, you assign ports with the proper VLAN number.
  • Virtual LANs offer structure for making groups of devices, even if their networks are different.
  • The main difference between LAN and VLAN is that In LAN, the network packet is advertised to each and every device Whereas in VLAN, the network packet is sent to only a specific broadcast domain.
  • The primary advantage of VLAN is that it reduces the size of broadcast domains.
  • The drawback of VLAN is that an injected packet may lead to a cyber-attack.
  • VLAN is used when you have 200+ devices on your LAN.
 


Popular Posts