DATA COMMUNICATION AND COMPUTER
NETWORKS ASSIGNMENT
NAME – SAHIL
CLASS – M.C.A.-1st
SECTION-B
ROLL NO. – 21/MCA/069
Q1 Remote Desktop sharing – using Teamviewer.
Ans:
1. Download the Teamviewer software for your computer.
2. Start installing with personal use option.
3. Install teamviewer app in mobile.
4. Type TeamViewer ID and password of your PC generated and click on button
"Remote Control".
5. On your PC, a popup window on your PC shows it is remote controlled by your
phone
Q2 USE OF NETWORKING COMMANDS
Ans:
1. ping
Ping is used to testing a network host capacity to interact with another host. Just
enter the command Ping, followed by the target host’s name or IP address. The
ping utilities seem to be the most common network tool. This is performed by
using the Internet Control Message Protocol, which allows the echo packet to
be sent to the destination host and a listening mechanism. If the destination
host reply to the requesting host, that means the host is reachable. This utility
usually gives a basic image of where there may be a specific networking issue,
2. ipConfig
The command IP config will display basic details about the device’s IP address
configuration. Just type IP config in the Windows prompt and the IP, subnet
mask and default gateway that the current device will be presented. If you
have to see full information, then type on command prompt config-all and
then you will see full information. There are also choices to assist you in
resolving DNS and DHCP issues.
3. netstat
The netstat command, meaning network statistics, is a Command Prompt
command used to display very detailed information about how your computer
is communicating with other computers or network devices.
4. tracert
The tracert command is a Command Prompt command which is used to get the
network packet being sent and received and the number of hops required for
that packet to reach to target. This command can also be referred to as a
traceroute. It provides several details about the path that a packet takes from
the source to the specified destination.
5. nslookup
The nslookup, which stands for name server lookup command, is a network
utility command used to obtain information about internet servers. It provides
name server information for the DNS (Domain Name System), i.e. the default
DNS server’s name and IP Address.
The syntax for nslookup is as follows.
nslookup or nslookup [domain_name]
Q3 DIFFERENCE BETWEEN CAT5 AND CAT6 CABLE
CAT5
Cat5 cables contain four pairs of twisted copper wire ending with an RJ-45
connector, which plugs into a standard Ethernet jack. It is the fifth generation
of unshielded, twisted-pair (also known as Unshielded Twisted Pair, or UTP)
Ethernet cable technology and has been the most popular twisted-pair cable
since its introduction in 1995. Cat5 can also be found in the Shielded Twisted
Pair variety, or STP, which offers protection against EMI and signal
interference.
The Cat5 Ethernet cable paved the way for high-speed internet with an ability
to transfer data at 100 Mbps and 100 MHz bandwidth (100BASE-T or Fast
Ethernet) but can run up to 2.5GBASE-T at shorter distances.
Cat5 cables can carry data, telephone and video signals and have a maximum
recommended length of 328 feet (100 meters). If your PC is hardwired into
your network, the standard Cat5 is likely the cable connecting you to the web
at this very moment.
CAT5e
A newer Cat5 cable specification came out in 2001 called Cat5e (the “e” standing for
“enhanced”), offering support Gigabit Ethernet speeds of up to 1000 Mbps, a bandwidth of
350 MHz and backwards compatibility with standard Cat5 cables. Standard Cat5 cables
can support Gigabit speeds but at shorter distances (up to 5GBASE-T).
Cat5e cables are 10 times faster than standard Cat5 and complies with ANSI/TIA-568
standards. For home or small business network cabling, you most likely won’t notice
much of a speed difference, but for IT companies or companies dealing with large amount
of information (think terabytes), it makes a significant difference.
The Cat5e cable looks identical to the Cat5 physically but contain four pairs of copper
wires instead of two, and the text on the cable sheath will indicate it’s a 5e rather than a 5.
These cables undergo more rigorous testing than the standard Cat5 to eliminate crosstalk,
or signal interference, and are twisted much more tightly.
CAT6
Cat6 Ethernet cables consist of four twisted pairs of copper wire and 250 MHz of
bandwidth, supporting data transfer speeds of up to 10 Gbps (10GBASE-T) for distances up
to approximately 180 feet.
Cat6 cables use the same RJ-45 jack as Cat5 cables and previous generations of Ethernet
cables. In fact, Cat6 cables have backwards compatibility with Cat5/5e and Cat3 cables.
When used at 328 feet, the maximum data transfer speed drops to approximately 1 Gbps.
They are up-to-spec for applications with substantial data transfer needs,
including: Internet of Things (IoT) setups like smart homes, school/enterprise networking
setups and data centers. Cat6 cables are now the global standard for Ethernet cables.
Q4 Find and use the windows 10 Firewall
Ans
First go to windows settings
Go to ‘Update & Security’
Go to ‘Windows Security’ then
Go to ‘Firewall and netwok protection’
Then
Turn on ‘Private Network’ , ‘Domain Network’, ‘public network’ if turned off
By default they are ‘turned on’
Q5 How to access Firewall options
Ans Go to “firewall & network protection” as
discussed in q4
Then we’ll see various options
Q6 How to allow an app through windows Firewall
Ans
select Allow and App Through Firewall.
Press ‘Change Settings’ and type an administrator
password if prompted
Locate the app to allow. It won’t have a check mark beside it.
Select the checkbox(es) to allow the entry. There
are two options Private and Public. Start with
Private only and select Public later if you don’t
get the results you want.
Then press ‘OK’
Q7 How to block a program with the windows 10
Firewall
Ans
select “Allow and App Through Firewall”.
Press ‘Change Settings’ and type an administrator
password if prompted
Locate the app to block. It will have a check mark
beside it
Select the checkbox(es) to disallow the entry.
There are two options — Private and Public.
Select both.
Press OK
Q8
a) Set up LAN at Home
I. First of all we need devices which we want to
connect with each other like 2 or more laptops or
many mobiles
II. Then we need many ethernet cables to connect
device together
III. Put one end of ethernet in laptop and another in
router similarly for another laptop connect with
the same router.
IV. Now two laptops are ready to transfer files
V. Now to connect with internet we have to connect
the router with the modem with the help of
ethernet cable
VI. Now two devices are connected with internet
VII. Similarly we can connect many devices with the
help of switches.
b)set up LAN in computer lab
i. Collect all hardware you must need for the
development of LAN . You will need a Router or
Switch. They both work as a Hub for a network.
ii. To set your router You just plug it into a power
supply, it alternatively close to your modem if
you want to share internet through it.
iii. Connect your modem to the Internet port on the
Router if you want to share the internet. The
color of the Internet Port is different from other
ports.
iv. To connect many devices together,we use
Switch.Connect your switch with the router, now
you plug an Ethernet cable into port of LAN on
the router and put any LAN port on the switch.
This will expand the number of ports for the
given LAN.
v. Now connect your computers to LAN ports. By
using Ethernet cables you can connect your every
computer to an open LAN port on your router or
switch. The order of port did not matter.
vi. If you only using a switch you must set one PC as
a DHCP.DHCP stands for Dynamic Host
Configuration Protocol .and switch is working as a
Hub for your network. When we set one
computer DHCP Server will allow all connected
computer for easy accessing of IP address.
You can quickly create a DHCP server on one of your
computers by following steps.
1. you must decide your IP address range, you will Firstly
be used private IP Range. A light LAN with
192.168.0.100, a subnet mask of 255.255.255.0 and a
pool size of 50.a fifty computers will be attached through
this.
2. Set the IP address of your computer to 192.168.0.2 with
a subnet mask of 255.255.255.0 (an address in the same
subnet as the addresses in the pool, but the pool itself
have no address
3. Download tftpd32 .
4. You have to Unzip the file from your computer and
execute tftpd32.exe.
5. Now you Click on Settings from the dialogue box
6. From setting Window you select the DHCP tab.
7. Select the size of pool minimum as compared to the total
number of your computer or devices that will be needed
on your network (LAN).
8. Left the blank the “Boot File” field.
9. Now enter the IP address of your computer (192.168.0.2)
in field “Def. Router (Opt 3)
10. Now set Mask to your subnet mask. If you don’t know
about that you have to follow my addressing scheme and
set it as 255.255.255.0
11. Left the “Domain Name” and “Additional Option” boxes
blank.
12. Press “OK”. Your DHCP server is now set up
The computers or devices of this network will automatically obtain IP
addresses
vii. Check the network connection on every
computer. When all computer obtains IP
addresses they now able to communicate with
each other. if you use the router for the internet
now each computer is able to access the internet.
viii. Set up file and printer sharing. When your
network is established, now you can see any data
on another computer and also shared the files
except computers has shared these files. Through
this network, users can also access resources like
printer modem, etc.
Q8 Survey on x.25,Frame Relay and ATM networks.
Ans: X.25
X.25 is a protocol suite defined by ITU-T for packet
switched communications over WAN (Wide Area
Network). It was originally designed for use in the
1970s and became very popular in 1980s. Presently, it
is used for networks for ATMs and credit card
verification. It allows multiple logical channels to use
the same physical line. It also permits data exchange
between terminals with different communication
speeds.
X.25 has three protocol layers
Physical Layer: It lays out the physical, electrical
and functional characteristics that interface
between the computer terminal and the link to
the packet switched node. X.21 physical
implementer is commonly used for the linking.
Data Link Layer: It comprises the link access
procedures for exchanging data over the link.
Here, control information for transmission over
the link is attached to the packets from the
packet layer to form the LAPB frame (Link Access
Procedure Balanced). This service ensures a bit-
oriented, error-free, and ordered delivery of
frames.
Packet Layer: This layer defines the format of
data packets and the procedures for control and
transmission of the data packets. It provides
external virtual circuit service. Virtual circuits
may be of two types: virtual call and permanent
virtual circuit. The virtual call is established
dynamically when needed through call set up
procedure, and the circuit is relinquished through
call clearing procedure. Permanent virtual circuit,
on the other hand, is fixed and network assigned.
Equipment used
X.21 implementer
DTE − Data Terminal Equipmen
DCTE − Data Circuit Terminating Equipment
Frame Relay
Frame Relay is a packet switched communication
service from LANs (Local Area Network) to backbone
networks and WANs. It operates at two layers:
physical layer and data link layer. It supports all
standard physical layer protocols. It is mostly
implemented at the data link layer.
Frame Relay uses virtual circuits to connect a single
router to multiple remote sites. In most cases,
permanent virtual circuits are used, i.e. a fixed
network-assigned circuit is used through which the
user sees a continuous uninterrupted line. However,
switched virtual circuits may also be used.
Frame relay is a fast packet technology based on X.25.
Data is transmitted by encapsulating them in multiple
sized frames. The protocol does not attempt to
correct errors and so it is faster. Error correction is
handled by the endpoints, which are responsible for
retransmission of dropped frames
Frame Relay Devices are
DTE − Data Terminal Equipment
DCTE: − Data Circuit Termina ng Equipment
ATM stands for Asynchronous transfer mode. It is
a switching technique used by
telecommunication networks that uses
asynchronous time-division multiplexing to
encode data into small, fixed-sized cells. ATMs
can be used for efficient data transfer over
highspeed data networks. ATM provides real-
time and non-real-time services.
Services
The services provided by ATM are as follows−
Available Bit Rate: It provides a guaranteed
minimum capacity, but data can be burst to
higher capacities when network traffic is lower.
Constant Bit Rate: It is used to specify a fixed bit
rate so that data is sent in a steady stream. This is
analogous to a leased line.
Unspecified Bit Rate: This doesn't assure any
throughput level and is used for applications,
including file share that can tolerate delays.
Variable Bit Rate (VBR): It can provide a
determining throughput, but data is not
transmitted evenly. This makes it a famous choice
for voice and video conferencing.
Benefits
The high-level benefits delivered through ATM
services deployed on ATM technology using
international ATM standards can be summarized
as follows−
Dynamic bandwidth for bursty traffic
Dynamic bandwidth for bursty traffic meeting
application needs and delivering a high utilization
of networking resources; most applications are or
can be viewed as inherently bursty. For example,
voice is bursty, as both parties are neither
speaking at once nor all the time; video is bursty,
as the amount of motion and required resolution
varies over time.
Can handle mixed network traffic very efficiently
Variety of packet sizes makes traffic
unpredictable. All network types of equipment
should incorporate elaborate software systems to
manage the various sizes of packets. ATM
handles these problems efficiently with the fixed
size cell.
Cell network
All information is loaded into identical cells that
can be sent with complete predictability and
consistency.
Class-of-service
It supports multimedia traffic allowing
applications with varying throughput and latency
requirements to be met on a single network.
Common LAN/WAN architecture
It allows ATM to be used consistently from one
desktop to another; traditionally, LAN and WAN
technologies have been very different, with
implications for performance and
interoperability. But ATM technology can be used
either as a LAN technology or a WAN technology.