Posts

Showing posts from August, 2020

IPv4 addressing

Image
  Aim: To give IP Address of different classes in given Network id. Theory Theory-Video Procedure Simulation procedure Simulation

LAN implementation using CISCO Packet tracer software.

Image
Aim: LAN implementation using CISCO Packet tracer software. LAN Implementation Theory About CISCO Packet Tracer LAN implementation - Video

IP address sub-netting

Image
  Aim: To study IP address sub-netting.  THEORY:   A subnet is a segment of a network. Sub netting is a technique that allows a network administrator to divide one physical network into smaller logical networks and, thus, control the flow of traffic for security or efficiency reasons. Dividing a network into several subnets can serve a number of purposes: to reduce network traffic by decreasing the number of broadcasts (if used in combination with a switch), to exceed the limitations in a local area network, for instance the maximum number of allowed hosts, or to enable employees to be able to dial in to the network from home, without opening the entire network up to unwanted visits from the Internet. Subnets are created by using a so-called subnet mask to divide a single Class A, B, or C network number into smaller pieces, thus allowing an organization to add subnets without having to obtain a new network number through an Internet service provider. Subnets can again be sub nett

TELNET implementation

Image
  AIM:   Installation and configuration of  TELNET application using Team-viewer software.          Telnet is a client/server application program used for login into remote systems. It allows you to login in system for any operation & FTP is used only for file transfer. Telnet is an application used on the internet to connect to a remote computer, enabling access to the computer & its resources. A user can use different application programs at a remote site & create results that can be transferred to his local computer.              Telnet is used for a number of activities such as accessing a site or checking email at another account, other on-line services or an internet & many such applications. It is an example of cyberspace extension or cyber travel, which enables the user to travel all across the internet accessing machines or databases that may offer different services or information.   Theory-Write-up TELNET -PPT   TELNET application using Teamviewer Quiz-time

Implementation of encryption and decryption algorithm.

Image
AIM:    Implementation of encryption and decryption algorithm. Theory(Write-up) Theory explanation- Video Implementation of Encryption-decryption-Video Quiz