Acn Working

Only available on StudyMode
  • Download(s) : 89
  • Published : March 19, 2013
Open Document
Text Preview
GRADUATE SCHOOL OF TECHNOLOGY
NERUL, NAVI MUMBAI.
DEPARTMENT OF COMPUTER ENGINEERING

SEM: -V1

BRANCH:-CE
ADVANCE COMPUTER NETWORK
LIST OF PROGRAMS

PROGRAM NO. 1

STUDY OF NETWORK COMMANDS

PROGRAM NO. 2

IMPLEMENT CLIENT SERVER PROGRAM
USING SOCKET PROGRAMMING

PROGRAM NO. 3

INSTALLATION OF SQUID PROXY
SERVER

PROGRAM NO. 4

INSTALLATION OF POSTFIX MAIL
SERVER

PROGRAM NO. 5

INSTALLATION OF HTTPD WEB SERVER

PROGRAM NO. 6

INSTALLATION OF DNS SERVER

PROGRAM NO. 7

INSTALLATION OF DHCP SERVER

Software Required:
1. Operating System: Cent OS/ Linux OS
2. Languages: C/C++

PROGRAM NO. 1
AIM: - Study of Network Commands

THEORY:- Following network commands are studied and executed in Cent OS.

1. Ping: Ping sends an ICMP ECHO_REQUEST packet to the specified host. If the host responds, we will get an ICMP packet back. We can “ping” an IP address to see if a machine is alive.
2. Telnet (SSH): Telnet allows us to log in to a computer, just as if we were sitting at the terminal. Once our username and password are verified, we are given a shell prompt. From here, we can do anything requiring a text console. Compose email, read newsgroups, move files around, and so on. If we are running X and we telnet to another machine, you can run X programs on the remote computer and display them on yours.

3. Mail: this command is used to read mail, open a command console, log on using the account whose mail you want to read, and enter the command mail. A list of all messages in your mailbox will be displayed.

4. TCPDump: The tcpdump command prints the headers of packets on a network interface that match the Boolean expression. We can run the command with the -w flag to save the packet data in a file for further analysis. we can also run the command with the -r flag to read data from a saved packet file instead reading the packets from a network interface. In all cases, only packets that match expression is processed by the tcpdump command

5
Ifconfig: This command allows us to get the IP address information of a computer. It also allows some control over active TCP/IP connections.

CONCLUSION :- Thus network commands are executed and studied

Department of CE, SIES GST.

PROGRAM NO. 2
AIM: Implement Client/Server program using Socket Programming THEORY:On the client-side: The client knows the hostname of the machine on which the server is running and the port number on which the server is listening. To make a connection request, the client tries to rendezvous with the server on the server's machine and port. The client also needs to identify itself to the server so it binds to a local port number that it will use during this connection. This is usually assigned by the system.

If everything goes well, the server accepts the connection. Upon acceptance, the server gets a new socket bound to the same local port and also has its remote endpoint set to the address and port of the client. It needs a new socket so that it can continue to listen to the original socket for connection requests while tending to the needs of the connected client.

On the client side, if the connection is accepted, a socket is successfully created and the client can use the socket to communicate with the server.
The client and server can now communicate by writing to or reading from their sockets.

CONCLUSION: - Efficient socketbased programming can be easily implemented for general communications

Department of CE, SIES GST.

PROGRAM NO. 3
AIM: - Installation of Squid Proxy Server
THEORY: - Squid server is a popular open source proxy and web cache. It has a variety of uses, from speeding up a web server by caching repeated requests, to caching web, name server query, and other network lookups for a group of people sh aring network resources. It is primarily designed to run on Linux / Unix-like systems. Squid is a high-performance proxy caching server for Web clients, supporting FTP, gopher,...
tracking img