Documente Academic
Documente Profesional
Documente Cultură
Prepared by
Md. Helalur Rahman Bhuiyan
Roll No.-35
Post-graduate Diploma in Computer Science (PGDCS)
Session - 2008
Description
Chapter-One
1.1 Title of study
1.2 Introduction
1.3 Importance of the study
1.4 Objective of the study
1.5 Location Of The Project
1.6 Methodology:
Chapter-Two
2.1 Definition of Network
2.2 Computer Network
2.2.1 Goal of Computer Network
2.3 Network Resources
2.4 Network Media
2.5 Network Protocol
2.6 Basic type of network on the basis of the area covered
2.6.1 Lan/Man/Wan/Internet
2.6.2 Local Area Network
2.6.3 Metropolitan Area Network
2.6.4 Wide Area Network
2.7 Network Structure
2.8 Roles of Computers in a Network
2.8.1 Peer-to-Peer Networking:
2.8.2 Server-based Networks
2.8.3 Combination networks
2.9 Network Protocols
2.9.1 NWLink Protocol:
2.9.2 NetBEUI Protocol:
2.9.3 TCP/IP Protocol:
Chapter-Three
3.0 Network Topology
3.1 Bus Topology
3.1.1 Advantages of a Bus Topology
3.1.2 Disadvantages of a Bus Topology
3.2 Star Topology
3.2.1 Advantages of a Star Topology
3.2.2 Disadvantages of a Star Topology
3.3 Ring Topology
3.4 Mesh Topology
3.5 Star-Bus Topology
3.6 Choosing Network Topology
Chapter-four
4.0 Communication Media
4.1 Guided Transmission Media
4.1.1 Open Wire
4.1.2 Twisted Pair
4.1.3 Coaxial Cable
4.1.4 Optical Fiber
4.2 Media versus Bandwidth
4.3 Transmission Media – Unguided
4.4 RF Propagation
4.4.1 Ground Wave Propagation
4.4.2 Ionospheric Propagation
4.4.3 Line of Sight Propagation
4.5 Microwave
4.6 Satellite
Chapter-Five
5.1 OSI Model
5.2 Type of OSI Layers
5.3 Description of OSI Layers
5.3.1 Layer 7: Application Layer
5.3.2 Layer 6: Presentation Layer
5.3.3 Layer 5: Session Layer
5.3.4 Layer 4: Transport Laye
5.35 Layer 3: Network Layer
5.3.6 Layer 2: Data Link Layer
5.3.7 Layer 1: Physical Layer
5.4 TCP/IP Model or Internet Protocol Suite
5.5 The TCP/IP layers
5.5.1 Application layer
5.5.2 Transport layer
5.6 TCP Protocol
5.7 TCP Overview
5.8 UDP
5.8.1 Differences between TCP and UDP
5.8.2 TCP and UDP Port Numbers
5.9 Internet Layer
Chapter-Six
6.0 Internet Protocol
6.1 IP Addressing
6.1.1 Address Classes
6.1.2 IP Address Bit Patterns
6.2 Network Address and Broadcast Address
6.3 Private IP
6.4 Subnetting
6.5 Subnet Masking
6.6 Default subnet masks
6.7 More Restrictive Subnet Masks
Chapter-Seven
Role of LAN
7.1 Servers
7.2 Clients
7.3 Media
7.4 Protocols
Chapter-Eight
Network Software
Chapter-Nine
9.0 LAN Components
9.1 Network Interface Card
9.2 Network Card
9.2.1 Network Card installation
9.2.2 RJ-45 connector with RJ-45 port
9.3 Modem
9.4 Repeaters
9.5 Hub
9.6 Gateway
9.7 Bridge
9.7.1 Bridges Segmenting Network
9.8 Switch
9.9 Router
PREFACE
Computers are one of the wonders of the present century and have already
entered in out daily life as an integral part. The efficiency and effectiveness
of both hardware and software is no increasing trend day by day. Proper utiliza
tion, operation, maintenance and management of computer- based system are the cr
ying need of the present day for which we need well trend manpower in this secto
r. Bangladesh Institute of Management (BIM) introduce post-graduate Diploma cour
se in computer science since 1994.
This term paper is mandatory to fulfill the partial requirements for the course.
My aim is to prepare this term paper on computer network in such way, that it c
an help me to fulfill my knowledge about networking. From my greatest interest a
bout computer network I have studied a lot and I have collect a lot of informati
on and practical experience. All these things put together helped me to prepare
this term paper. In this report I have shown the different aspects of local area
network (LAN) with some fruitful application that it provides in my organizatio
n. “Rural Electrification Board.”
DECLARATION
I declare that this term paper submitted in partial fulfillment of the requireme
nts for Post- Graduate Diploma in Computer Science of session 2008 of the Bangla
desh Institute of Management, Dhaka, is the result of my own research work and w
ritten in my own language. That part of this term paper consists of materials, c
opied or plagiarized from published or unpublished work of other writers and tha
t all materials borrowed or reproduced from other published or unpublished sourc
es have either been put under quotation or Daly acknowledged with full reference
in appropriate places. I understand that the diploma conferred on me may be can
celed/ withdrawn if subsequently it is discovered that this tern paper is not my
criminal and that it contains materials copied/ plagiarized or borrowed without
proper acknowledgement.
ACKNOWLEDGEMENT
CHAPTER-1
INTRODUCTION
Information and communication are two of the most important strategic issues for
the success of every enterprise .Computer networks provide communication possib
ilities faster than other facilities. Because of these optimal information and c
ommunication possibilities, computer networks may increase the organizational le
arning rate,
The study of topic “LAN Design of REB Training Academy Building” is undertaken a
s a mandatory requirement of fulfillment for the Post Graduate Diploma in Comput
er Science by Bangladesh Institute of management ( BIM).The basic function perfo
rmed by a network is to facilitate a communication path by which a user can gain
access to an ever- growing range of information resources and services, Today’s
life styles and work styles are being transformed by information technologies a
nd perhaps nowhere are the changes more evident than in the new generation of to
ols for communication.
1.3 Importance of the study:
The man objective of the construction of REB Training Academy Building is to
arrange for international standard management/technical training for the employ
ees of REB and PBSs in order to build them as an efficient working force through
extending their knowledge and working proficiency on Rural Electrification Prog
ram.
A fast growing organization like REB which need for such a training academy
is particularity felt when the demand for skilled and specialized manpower and m
anaging services is on the rise with the expansion of overall program activities
it is therefore to the interest of the overall program efficiency and its smoot
h implementation the proposed project involving REB Training academy facilities
viewed as an essential one bringing benefits that would outweigh associated cost
s.
In this age of Information and Communication Technology no modern Organization c
annot function properly without computer support, To communicate with each other
in an office or to any where in the world the computer and network system plays
a vital role. To minimize the tedious manual job, computerization is very impor
tant for a organization and to reduce the cost of resource and reduce redundant
work and to increase the network efficiency and accuracy by sharing the data and
resource, implementing an effective network system is very vital. The study wil
l increase our knowledge about networking and how a network helps a modern busin
ess organization to increase the accuracy and support the efficiency of work of
the employee.
I personally engaged the LAN design of REB Training Academy Building .Whole the
work done by my supervision & participation.
b) Review of literatures
Extensive study on standard books, Journals, manuals on data communication and
Network and document of existing computer system.
c) Collection of data
i) Primary source:
Personal Observation
Personnel Involvement.
Existing Computer system REB H.Q. Building
Discussion with other user of my organization.
ii) Secondary source:
Internal & external source of document
Internet search
Design of the network:
As analysis of the data an abstract paper based solution is prescribed on the ba
sis of the information gathered.
CHAPTER-2
NETWORK
Windows NT Server is optimized for file, print, and application services. Window
s NT Workstation is optimized for desktop performance, either as a network clien
t or as a peer.
Advantage of Server-based Networks
Offer the following advantages:
Strong central security
Centralized file storage that:
Þ Provides easy backup of critical data
Þ Allows users to work with the same set of data
Reduced overall costs
Easy management of multiple users
Users are freed from managing resources
Disadvantage of Server-based Networks
Have the following disadvantages:
Expensive dedicated server
Expensive network operating system software and
Need for a dedicated network administrator
2.9 Network Protocols
A way for two elements on a network (server, hosts, workstations etc.) to commun
icate in a standard way.A set of rules and procedures governing communication be
tween entities connected by the network.Three most common protocols are:
NWLink
NetBEUI
TCP/IP
2.9.1 NWLink Protocol:
Used in Windows networks
This protocol was developed by Microsoft to enable interconnectivity bet
ween Microsoft and Novell NetWare (IPX/SPX ) networks.
NWLink is routable, that means it can be transferred from a local networ
k to a remote one through a router.
NWLink configures its own routing tables ,which makes it nice for small
networks,
However, it is not practical for large WANs like the Internet and cannot
directly to the Internet.
2.9.2 NetBEUI Protocol:
NetBEUI, also known as the NetBIOS Extended User Interface
It is a non-routable network transport suit for use in small networks co
nsisting of a single LAN with 50 or fewer computers.
In the Microsoft networking world, NetBEUI was the primary protocol for
Windows 3.11 (Windows for Workgroup).
It is easy to work with, and may still be used where little network conf
iguration is required and where you do not need to route to other network or com
municate with Internet.
NetBEUI is easy to use because it is self-configuring. There is nothing
to do except install it.
It cannot be used in a WAN environment.
2.9.3 TCP/IP Protocol:
A protocol for communication between computers, used as a standard for t
ransmitting data over networks and as the basis for standard Internet protocols.
TCP is one of the main protocols in TCP/IP networks. Whereas the IP prot
ocol deals only with packets, TCP enables two hosts to establish a connection an
d exchange streams of data. TCP guarantees delivery of data and also guarantees
that packets will be delivered in the same order in which they were sent.
CHAPTER-3
NETWORK TOPOLOGY
Line of Sight Propagation transmits exactly in the line of sight. The receive st
ation must be in the view of the transmit station. It is sometimes called Space
Waves or Tropospheric Propagation. It is limited by the curvature of the Earth f
or ground based stations (100 km: horizon to horizon). Reflected waves can cause
problems. Examples of Line of Sight Propagation are: FM Radio, Microwave and Sa
tellite.
4.5 Radio Frequencies
The frequency spectrum operates from 0 Hz (DC) to Gamma Rays (1019 Hz).
Name Frequency (Hertz) Examples
Gamma Rays 10^19 +
X-Rays 10^17
Ultra-Violet Light 7.5 x 10^15
Visible Light 4.3 x 10^14
Infrared Light 3 x 10^11
EHF - Extremely High Frequencies 30 GHz (Giga = 10^9) Radar
SHF - Super High Frequencies 3 GHz Satellite & Microwaves
UHF - Ultra High Frequencies 300 MHz (Mega = 10^6) UHF TV (Ch. 14-83)
VHF - Very High Frequencies 30 MHz FM & TV (Ch2 - 13)
HF - High Frequencies 3 MHz2 Short Wave Radio
MF - Medium Frequencies 300 kHz (kilo = 10^3) AM Radio
LF - Low Frequencies 30 kHz Navigation
VLF - Very Low Frequencies 3 kHz Submarine Communications
VF - Voice Frequencies 300 Hz Audio
ELF - Extremely Low Frequencies 30 Hz Power Transmission
Radio Frequencies are in the range of 300 kHz to 10 GHz. We are seeing an emergi
ng technology called wireless LANs. Some use radio frequencies to connect the wo
rkstations together, some use infrared technology.
4.5 Microwave
Microwave transmission is line of sight transmission. The Transmit station must
be in visible contact with the receive station. This sets a limit on the distanc
e between stations depending on the local geography. Typically the line of sight
due to the Earth s curvature is only 50 km to the horizon! Repeater stations mu
st be placed so the data signal can hop, skip and jump across the country.
Microwaves operate at high operating frequencies of 3 to 10 GHz. This allows the
m to carry large quantities of data due to the large bandwidth.
Advantages:
- They require no right of way acquisition between towers.
- They can carry high quantities of information due to their high operatin
g frequencies.
- Low cost land purchase: each tower occupies small area.
- High frequency/short wavelength signals require small antenna.
Disadvantages:
- Attenuation by solid objects: birds, rain, snow and fog.
- Reflected from flat surfaces like water and metal.
- Diffracted (split) around solid objects
- Refracted by atmosphere, thus causing beam to be projected away from rec
eiver.
4.6 Satellite
Satellites are transponders that are set in a geostationary orbit directly over
the equator. A transponder is a unit that receives on one frequency and retransm
its on another. The geostationary orbit is 36,000 km from the Earth s surface. A
t this point, the gravitational pull of the Earth and the centrifugal force of E
arths rotation are balanced and cancel each other out. Centrifugal force is the
rotational force placed on the satellite that wants to fling it out to space.
The uplink is the transmitter of data to the satellite. The downlink is the rece
iver of data. Uplinks and downlinks are also called Earth stations due to be loc
ated on the Earth. The footprint is the "shadow" that the satellite can transmit
to. The shadow being the area that can receive the satellite s transmitted sign
al.
CHAPTER-5
NETWOKING MODEL
5.1 OSI Model
The Open Systems Interconnection Reference Model (OSI Model or OSI Reference Mod
el for short) is a layered, abstract description for communications and computer
network protocol design, developed as part of the Open Systems Interconnection
initiative. It is also called the OSI seven layer model.
Prior to OSI, networking was completely vendor-developed and proprietary, with p
rotocol standards such as SNA, appletalk, netware and DECnet. OSI was an industr
y effort, attempting to get everyone to agree to common network standards to pro
vide multi-vendor interoperability. It was common for large networks to support
multiple network protocol suites, with many devices unable to talk to other devi
ces because of a lack of common protocols between them.
The OSI reference model (which actually predates the OSI protocol work, dating t
o 1977) was the most important advance in the teaching and learning of network c
oncepts. It promoted the idea of a common model of protocol layers, defining int
eroperability between network devices and software.
The OSI model divides the functions of a protocol into a series of layers. Each
layer has the property that it only uses the functions of the layer below, and o
nly exports functionality to the layer above. A system that implements protocol
behavior consisting of a series of these layers is known as a protocol stack o
r stack . Protocol stacks can be implemented either in hardware or software, or
a mixture of both. Typically, only the lower layers are implemented in hardware
, with the higher layers being implemented in software.
5.2 Type of OSI Layers
The OSI is a 7 layers hierarchical model
Layer 7: Presentation Layer
Layer 6: Presentation Layer
Layer 5: Presentation Layer
Layer 4: Presentation Layer
Layer 3: Presentation Layer
Layer 2: Presentation Layer
Layer 1: Presentation Layer
5.3 Description of OSI Layers
The OSI is a 7 layers hierarchical model. A brief description is given below
5.3.1 Layer 7: Application Layer
The Application layer is closest to the end user. It provides a means for the us
er to access information on the network through an application. This layer is th
e main interface for the user(s) to interact with the application and therefore
the network. Some examples of application layer protocols include Telnet, File T
ransfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP) and Hypertext
Transfer Protocol (HTTP).
5.3.2 Layer 6: Presentation Layer
The Presentation layer transforms data to provide a standard interface for the A
pplication layer. It handles syntax and semantics of information exchanged betwe
en two systems. MIME encoding, data compression, data encryption and similar man
ipulation of the presentation is done at this layer to present the data as a ser
vice or protocol developer sees fit. Examples: converting an EBCDIC-coded text f
ile to an ASCII-coded file, or serializing objects and other data structures int
o and out of XML.
5.3.3 Layer 5: Session Layer
The Session layer controls the dialogues (sessions) between computers. It establ
ishes, manages and terminates the connections between the local and remote appli
cation. It provides for either duplex or half-duplex operation and establishes c
heckpointing, adjournment (To suspend proceedings to another time or place), ter
mination, and restart procedures.
5.3.4 Layer 4: Transport Layer
The Transport layer provides transparent transfer of data between end users, thu
s relieving the upper layers from any concern while providing reliable and cost-
effective data transfer. The transport layer controls the reliability of a given
link through flow control, segmentation/desegmentation, and error control . Som
e protocols are state and connection oriented. This means that the transport lay
er can keep track of the packets and retransmit those that fail. The best known
example of a layer 4 protocol is the Transmission Control Protocol (TCP). It is
the layer that converts messages into TCP, User Datagram Protocol (UDP), Stream
Control Transmission Protocol (SCTP), etc. packets.
5.3.5 Layer 3: Network Layer
The Network layer provides the functional and procedural means of transferring v
ariable length data sequences from a source to a destination via one or more net
works while maintaining the quality of service requested by the Transport layer.
The Network layer performs network routing functions, and might also perform se
gmentation/desegmentation, and report delivery errors. Routers operate at this l
ayer - sending data throughout the extended network and making the Internet poss
ible. This is a logical addressing scheme – values are chosen by the network eng
ineer. The addressing scheme is hierarchical. The best known example of a layer
3 protocol is the Internet Protocol (IP).
5.3.6 Layer 2: Data Link Layer
The Data Link layer provides the functional and procedural means to transfer dat
a between network entities and to detect and possibly correct errors that may oc
cur in the Physical layer. The addressing scheme is physical which means that th
e addresses (MAC address) are hard-coded into the network cards at the time of m
anufacture. The addressing scheme is flat. The best known example of this is Eth
ernet. Other examples of data link protocols are HDLC and ADCCP for point-to-p
oint or packet-switched networks and Aloha for local area networks. On IEEE 802
local area networks, and some non-IEEE 802 networks such as FDDI, this layer may
be split into a Media Access Control (MAC) layer and the Logical Link Control (
LLC) layer.
This is the layer at which the bridges and switches operate. Connectivity is pro
vided only among locally attached network nodes. However, there s a reasonable a
rgument to be made that these really belong at "layer 2.5" rather than strictly
at layer 2.
5.3.7 Layer 1: Physical Layer
The Physical layer defines all the electrical and physical specifications for de
vices. This includes the layout of pins, voltages, and cable specifications. Hub
s, repeaters, network adapters and Host Bus Adapters (HBAs used in Storage Area
Networks) are physical-layer devices. The major functions and services performed
by the physical layer are:
- establishment and termination of a connection to a communications medium
.
- participation in the process whereby the communication resources are eff
ectively shared among multiple users. For example, contention resolution and flo
w control.
- modulation, or conversion between the representation of digital data in
user equipment and the corresponding signals transmitted over a communications c
hannel. These are signals operating over the physical cabling—copper and fiber o
ptic, for example—or over a radio link.
Parallel SCSI buses operate in this layer. Various physical-layer Ethernet stand
ards are also in this layer; Ethernet incorporates both this layer and the data-
link layer. The same applies to other local-area networks, such as Token ring, F
DDI, and IEEE 802.11 (Wireless).
5.4 TCP/IP Model or Internet Protocol Suite
The Internet protocol suite is the set of communications protocols that implemen
t the protocol stack on which the Internet and most commercial networks run. It
is sometimes called the TCP/IP protocol suite, after the two most important prot
ocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (
IP), which were also the first two defined.
The Internet protocol suite — like many protocol suites — can be viewed as a set
of layers, each layer solves a set of problems involving the transmission of da
ta, and provides a well-defined service to the upper layer protocols based on us
ing services from some lower layers. Upper layers are logically closer to the us
er and deal with more abstract data, relying on lower layer protocols to transla
te data into forms that can eventually be physically transmitted.
The OSI model describes a fixed, seven layer stack for networking protocols. Com
parisons between the OSI model and TCP/IP can give further insight into the sign
ificance of the components of the IP suite, but can also cause confusion, as TCP
/IP consists of only 4 layers.
Figure: Comparison between TCP/IP Model and OSI Model
5.8 UDP:
UDP transports information that doesn t require reliable delivery; therefore it
can have less overhead than TCP as no sequencing or acknowledgments are used. N
FS and SNMP use UDP for their sessions; the applications have their own methods
to ensure reliability. UDP receives blocks of information from the upper layers,
which it breaks into segments. It gives each segment a number, sends it, and th
en forgets about it. No acknowledgments, no virtual circuits, connectionless pro
tocol.
CHAPTER-6
INTERNET PROTOCOL (IP)
6.0 Internet Protocol
IP (Internet Protocol) is an identifier for a computer or device on a TCP/IP net
work. Networks using the TCP/IP protocol route messages based on the IP address
of the destination. The format of an IP address is a 32-bit numeric address writ
ten as four numbers separated by periods. Each number can be zero to 255. For ex
ample, 1.160.10.240 could be an IP address.
6.1 IP Addressing
When IP was first standardized in September 1981, the specification required tha
t each system attached to an IP-based internet be assigned a unique, 32-bit Inte
rnet address value. Some systems, such as routers which have interfaces to more
than one network, must be assigned a unique IP address for each network interfac
e.
The first part of an Internet address identifies the network on which the host r
esides, while the second part identifies the particular host on the given networ
k. This created the two-level addressing hierarchy which is illustrated in Figur
e 1 and IP address format in figure 2.
Figure:
IP Address Format
6.4 Subnetting
Subnetting an IP Network can be done for a variety of reasons, including organiz
ation, use of different physical media (such as Ethernet, FDDI, WAN, etc.), pres
ervation of address space, and security. The most common reason is to control ne
twork traffic. In an Ethernet network, all nodes on a segment see all the packet
s transmitted by all the other nodes on that segment. Performance can be adverse
ly affected under heavy traffic loads, due to collisions and the resulting retra
nsmissions. A router is used to connect IP networks to minimize the amount of tr
affic each segment must receive.
6.5 Subnet Masking
Applying a subnet mask to an IP address allows you to identify the network and n
ode parts of the address. The network bits are represented by the 1s in the mask
, and the node bits are represented by the 0s. Performing a bitwise logical AND
operation between the IP address and the subnet mask results in the Network Addr
ess or Number.
For example, using our test IP address and the default Class B subnet mask, we g
et:
Binary form Decimal form Description
10001100.10110011.11110000.11001000 140.179.240.200 Class B IP Address
11111111.11111111.00000000.00000000 255.255.000.000 Default Class B Subnet M
ask
10001100.10110011.00000000.00000000 140.179.000.000 Network Address
6.6 Default subnet masks:
• Class A - 255.0.0.0 - 1111111.00000000.00000000.00000000
• Class B - 255.255.0.0 - 111111.11111111.00000000.000000
00
• Class C - 255.255.255.0 - 1111111.11111111.11111111.00000000
6.7 More Restrictive Subnet Masks
Additional bits can be added to the default subnet mask for a given Class to fur
ther subnet, or break down, a network. When a bitwise logical AND operation is p
erformed between the subnet mask and IP address, the result defines the Subnet A
ddress (also called the Network Address or Network Number). There are some restr
ictions on the subnet address. Node addresses of all "0"s and all "1"s are reser
ved for specifying the local network (when a host does not know its network addr
ess) and all hosts on the network (broadcast address), respectively. This also a
pplies to subnets. A subnet address cannot be all "0"s or all "1"s. This also im
plies that a 1 bit subnet mask is not allowed. This restriction is required beca
use older standards enforced this restriction. Recent standards that allow use o
f these subnets have superceded these standards, but many "legacy" devices do no
t support the newer standards. If you are operating in a controlled environment,
such as a lab, you can safely use these restricted subnets.
To calculate the number of subnets or nodes, use the formula (2n-2) where n = nu
mber of bits in either field, and 2n represents 2 raised to the nth power. Multi
plying the number of subnets by the number of nodes available per subnet gives y
ou the total number of nodes available for your class and subnet mask. Also, not
e that although subnet masks with non-contiguous mask bits are allowed, they are
not recommended.
Example:
10001100.10110011.11011100.11001000 140.179.220.200 IP Address
11111111.11111111.11100000.00000000 255.255.224.000 Subnet Mask
------------------------------------------------------
10001100.10110011.11000000.00000000 140.179.192.000 Subnet Address
10001100.10110011.11011111.11111111 140.179.223.255 Broadcast Address
CHAPTER-7
ROLE OF LAN
CHAPTER-8
NETWORK SOFTWARE
Operating System software is the most important program that runs on a computer.
Every general-purpose computer must have an operating system to run other progr
ams. Operating systems perform basic tasks, such as recognizing input from the k
eyboard or mouse, sending output to the display screen or printer, keeping track
of files and directories on the disk, and controlling peripheral devices such a
s disk drives and printers. The operating system controls the hardware in the co
mputer and peripherals, manages memory and files, and multi-tasking functions, a
nd is the interface between applications programs and the computer.
A Network Operating System (NOS) does everything a stand-alone operating system
does, and more, in a much more complex environment. Some network operating syste
m works on top of DOS. Others such as NetWare are independent operating system i
n their own right. In addition to user lower level computing tasks a network ope
rating system is responsible for all of the following:
• Directing data throughout the network.
• Allowing and preventing excess to data based security requirements
• Managing the flow off data between verities of different (and sometimes
otherwise incompatible) workstations.
• Managing requests for printer services.
• Managing communication and message between network users.
• Managing connections between the network and remote sites.
In addition, the network operating system must its services as transparent as po
ssible to each user. When a user must access NOS services, the network should pr
esent as intuitive as interface as possible, transiting complex digital task int
o simple instructions using words and pictures that are readily understandable t
o non technical human beings. Depending on what it is doing at any given moment,
NOS can function as a digital cop, international ambassador and file clerk and
others people. There are several different network operating systems available.
CHAPTER-9
LAN COMPONENTS
9.4 Repeaters
Strengthens signal to send over long distances
Can regenerate and retime network signals at the bit level
Repeaters
9.5 Hub:
Is a device that centralizes network traffic through a single connection
point.
Multi-port repeaters with 4 to 24 ports (typical repeater usually has 2
ports)
Data on one port is electrically repeated on all other ports
Converts the network to Star topology
9.6 Gateway
o Connection by which a local area network may be linked to other local ar
ea networks or to larger networks.
o The way through which computer connects to other LAN or Internet
9.7 Bridge
o A device that connects two local-area networks (LANs), or two segments o
f the same LAN that use the same protocol, such as Ethernet or Token-Ring.
o A device that connects multiple network segments
o Traffic from one network is forwarded through it to another network.
9.8 Switch
o Switch: a device that allocates traffic from one network segment to cert
ain lines (intended destination(s)) which connect the segment to another network
segment.
o Unlike a hub a switch splits the network traffic and sends it to differe
nt destinations rather than to all systems on the network.
o It is often used to replace network hubs. A switch is also often referre
d to as an intelligent hub.
9.9 Router
A device that forwards data packets along networks. A router is connecte
d to at least two networks, commonly two LANs or WANs or a LAN and its ISP’s net
work. Routers are located at gateways, the places where two or more networks con
nect. Routers use headers and forwarding tables to determine the best path for f
orwarding the packets, and they use protocols such as ICMP to communicate with e
ach other and configure the best route between any two hosts.
Very little filtering of data is done through routers.
CHAPTER-10
24 port Switch
There have 08 Nos of stackable 24 (10/100) port Cisco 3750 having bandwidth 32 G
bps operating in the range of 50 to 60 Hz frequency.
Server
The server will serve as the central point to which all LAN cabling will be term
inated and will serve as the Point of Presence (POP) for the WAN connection.
All major components for the network, such as, network servers, routers, will be
placed in the server room on floor mounted racks and eight no LAN switches plac
es at every floor where necessary. In addition there will be lockable enclosure
to secure the network equipment. This server room is equipped with a cabinet. A
high quality 220V power strip with at least 8 outlets should be mounted inside
the cabinets with proper grounding. The cabinet (the metal frame) should also be
properly grounded according to the regulations.
The main conduits (Trunk Channel)
All the cables should be installed inside conduits and pipes. They are made up o
f plastic conducts. The conduits are of three different sizes as described below
:
The minimum dimension/capacity of the conduits is:
Type A: big enough for at least 8 cables of 5-mm diameter (min25*25mm)
Type B: big enough for at least 20 cables of 5-mm diameter (min40*40mm)
Type C: big enough for at least 60 cables of 5-mm diameter (min40*60mm)
Coding and Documentation
In principle every element of the cabling system shall be marked with a code in
such a way that it can be clearly identified. At least all TOs, patch panels and
outlets of the patch panels should be labeled. The label at both ends of the ho
rizontal link should be the same.
Approved Manufactures for the Cabling System
All horizontal cables, patch cords, patch panels and TOs shall be of the same li
ne of one manufacturer.
Approved manufactures/lines are:
• BICC Brand-Rex Millennium CAT-5 PLUS UTP
• Siemon System 5E RJ-45 UTP
• NEXANS LANMARK 5 UTP
• R&M Free-net Classic System CAT-5E UTP
• Tyco Electronics Net-connect Momentum Enhanced CAT-5 RJ-45 UTP
Testing of the Horizontal Cabling
The testing procedure has to comply with the procedure described in TSB-67. The
testers have to be calibrated according to the recommendations made by the suppl
ier of the testing equipment. (Test result are enclosed)
The following parameters have to be tested:
• Pin continuity (wire-map)
• Pair length
• DC Loop resistance per pair
• Insertion loss (Attenuation) per pair
• Next and Power sum Next for every pair combination
• The ACR (ratio NEXT/ insertion loss) for every pair combination
• Return Loss (impedance match, retransmitted signal)
Security
REB Training Academy Building LAN shall connect to the REB Head Quarter network
and use the firewall protection and rules set on the REB Head Quarter Backbone
network. Besides, all workstations under the Organization-network will be denied
access to the staff network. Exception to this will be made on an individual
basis. This will require the utilization of Access Control List (ACL) on the rou
ter.
All work stations will have full access to the internet.
All ACLs will be set at the Training Directorate -router and exceptions to the A
CLs will be reviewed prior to implementation.
10.4 Workgroup:
A workgroup is a Microsoft network model that groups computers together for orga
nizational purpose. The computers that make up a workgroup appear together when
we browse the My Network Place in windows XP. In addition, each Windows XP, wind
ows 2000, and Windows NT computer in the workgroup maintains its own user accoun
t database. this means that if a user wants to log on at any computer within th
e workgroup, we must create the user’s account on each computer in the workgroup
.
10.5 Workgroup with IP address of REB Training Academy Building network
01
Library 11 192.168.10.01-192.168.10.11
3rd Floor
07 192.168.10.12-192.168.10.18
4th Floor
01 Faculty 15 192.168.10.19-192.168.10.33
5th Floor 01 Instructor 24 192.168.10.34-192.168.10.57
6th Floor 01 Admin 17 192.168.10.58-192.168.10.74
7th Floor
01
Director Technical 23 192.168.10.59-192.168.10.81
01 23 192.168.10.82-192.168.10.105
8th Floor
01
Cyber cafe
16 192.168.10.106-192.168.10.121
01 20 Future extension
Default Netmask:255.255.255.0
10.6 Network Printer
Windows 2000, windows XP, & Windows NT support two types of network printer: a s
hared printer on a workstation or serve, and a printer with a network card that’
s connected directly to the network. We access a printer with a network card thr
ough its IP address; A Printer with a network card is also called a network–atta
ched printer.
10.7 Single line Network diagram for REB ing