Documente Academic
Documente Profesional
Documente Cultură
ON
COMPUTER NETWORK
Certificate of Completion
This is to certify that the minor project entitled title of minor project carried
out by Name of student, student of MASTER OF TECHNOLOGY (CSE) 3RD
SEM, of PDM College of Engineering for Women, Bahadurgarh , is a
satisfactory
account
of
the
bona-fide
work
under
my
supervision,
is
Ms. Sunita
Deptt. Incharge (CSE)
Coordinator
I, Name of student, hereby declare that the minor project work entitled Name
of project is an authenticated work carried out by me at PDM College of
Engineering for Women for the partial fulfillment of the award of the degree of
M.TECH (CSE)
and
anywhere else.
Date:
Place:
Name of Student
Roll No.
MTech CSE 3rd SEM
ACKNOWLEDGEMENT
At the outset, I am offering gratitude to my guide, who gave
me great insight into what had to be done, and for their
encouragement, without which it couldnt have been possible to
complete this project.
I am indicated to my friends for help me to prepare this project
and for several useful suggestions.
I would also like to thank to every one of the organization who
helped me in preparing this project and who guided me and gave
me many useful suggestions by time to time in resolving difficulties.
Thanks to all.
(STUDENT NAME)
ROLL NO
M.Tech CSE 3rd SEM
CONTENTS
1. What
Is
Network...8
2. Models of Network Computing..
.12
3. Networking Model..
16
4. Network Hardware.
18
5. Topologies.
.23
6. Switching..
...39
7. Network Services.
.46
8. OSI
Model...
..48
9. TCP/IP..
62
10.UDP
65
11.Subnetting
.68
12.Supernetting
.72
5
13.Protocol
Suit..
.76
14.Internet
Protocols..
..80
15.Media Connectivity..
87
16.Connectivity
Devices...96
17.Network Printing
107
18.Cryptography
117
19.Bluetooth
121
20.Broadband
.125
21.Wi-Fi..
.126
22.Network
Troubleshooting..
..130
23.LAN
Setup.134
Purpose
Computer networks can be used for several
purposes:
Facilitating communications:
Using a
network, people can communicate efficiently
and easily via email, instant messaging, chat
rooms, telephone, video telephone calls, and
video conferencing.
Sharing
hardware:
In
a
networked
environment, each computer on a network
may access and use hardware resources on
the network, such as printing a document on
a shared network printer.
Sharing files, data, and information: In a
network environment, authorized user may
access data and information stored on other
computers on the network. The capability of
providing access to data and information on
shared storage devices is an important
feature of many networks.
What is a
Network?
A network is a set of devices connected by
media links. A node can be a computer,
printer or any other device capable of
sending and receiving data generated by
other nodes on the network.
Network
NETWORK CRITERIA:-To be
considered effective and efficient a network
must meet a number of criteria. The most
important of these are performance,
reliability and security.
1. PERFORMANCE:-Performance can be
measured in many ways, including transit
time and response time.
9
Transit time:-It is amount of time
required for a message to travel from
one device to another.
Type of transmission
Centralized
Distributed
16
NETWORKING MODELS
Network model tells us how the computer
can be inter-connected .Computer network
are created by different entities. Standard
are needed so that these heterogeneous
networks can communicate with one
another. The two best known standards are
the OSI model and the internet model.
LAN
LANs are distinguishing from other kinds
of networks by three characteristics:-
Size
Transmission Technology
Topology
LANs are restricted in size, which means
that worst
case transmission time is
bounded and known in advance. It also
simplifies network management. LANs uses
a transmission technology consisting of a
cable to which all the machines are attached
23
WAN
3)
MAN:-Metropolitan area network
A MAN covers a city .The best example
of MAN is the cable television network
available in many cities.
25
Classification of topology:
Physical Topology
Logical Topology
Signal Topology
Types of Topologies:-
28
ADVANTAGES:
1. Less Cabling:-Bus uses less cabling
because devices are connected only
through a single main cable.
2. Ease of installation
3. Easy to extend
4. Simple wiring and cheaper
30
Bus Topology
31
Distributed Star
branches to the main section of the
transmission medium the physical
distributed bus topology functions in
exactly the same fashion as the physical
linear bus topology?
2) Star Topology: - Each device has a
dedicated point to point link only to the
central controller, usually called a hub.
The devices are not directly linked to
each other.
Star Topology
32
ADVANTAGES:1.
2.
3.
Extended Star
Between the central node and the
peripheral nodes beyond that this is
supported by the transmitter power of the
central node or beyond that which is
supported by the standard upon which the
physical layer of the physical star network is
based. If the repeaters in a network that is
based upon the physical extended star
topology is replaced with hubs or switches,
then a hybrid network topology is created
that is referred to as a physical hierarchical
star topology, although some texts make no
distinction between the two topologies.
Distributed Star
3)
Ring Topology: - In ring
topology, each device has a dedicated
point to point line configuration only with
the two devices on either side of it.
A signal is passed along the ring in one
direction, from device, until it reaches its
destination. Each machine or computer
has a unique address that is used for
identification purposes. The signal
passes through each machine or
computer connected to the ring in one
direction.
36
Mesh Topology
The value of fully meshed networks is
proportional to the exponent of the number
of subscribers, assuming that
communicating groups of any two
endpoints, up to and including all the
endpoints, is approximated.
39
ADVANTAGES:1.
Use of dedicated links guarantees
that each connection can carry its own
data load, thus eliminating the traffic
problems that can occur when links
must be shared by the multiple devices.
2.
It is robust. If one link becomes
unusable, it does not incapacitate the
entire system.
3.
Point to point links makes fault
isolation or identification easy.
4.
Physical boundaries prevent other
users from going access to messages.
42
Tree Topology
Each node in the network having a specific
fixed number, of nodes connected to it at
the next lower level in the hierarchy, the
number, being referred to as the 'branching
factor' of the hierarchical tree.
An example of tree topology is in cable TV
technology where the main cable from the
main office is divided into main branches
and each branch is divided into smaller
branches and so on.
44
Hybrid Topology
DISADVANTAGES:1.
2.
SWITCHING
45
Switching
A switched network consists of a series of
interlinked nodes called switches. Switches
are hardware and software device capable
of creating temporary connections between
two or more devices link to the switch but
not to each other. In a switch network, some
of the nodes are connected to the
communicating devices. Others are used
only for routing. There are three methods for
switching:-
46
1)
Circuit switching:-Circuit switching
creates a physical connection between
two devices such as phones or
computers. When one computer places a
telephone call, the switching equipment
within the telephone system seeks our
physical path all the way from telephone
to receivers telephone. This technique is
called circuit switching. A circuit
switching switch is a device with n inputs
and m inputs that creates a temporary
connection between as input link and an
output link. The no. of inputs does not
have to match the number of outputs.
Message Switching
ADVANTAGES:-
50
51
Advantages:1)
There are small sizes of packets and
it is very fast.
2)
It follows the dynamic path.
3)
There are no chances of data loss.
1)
Connection Oriented: To use a
connection oriented network service, the
service user first establishes a
connection, uses the connection and
then release the connection. The
essential aspect of a connection .The
essential aspect of a connection is that it
acts like a tube, the sender pushes
objects in at one end and the receiver
takes them one to the other end.
55
2)
Connectionless Service: - It
is moderated after the postal system.
Each message carries the full
destination address and each one is
routed through the system independent
of all the others. Normally, when two
messages are send to the same
destination the first one to arrive.
OSI MODEL
OPEN SYSTEM INTERCONNECTION
It was established in 1947, the international
standard organization (ISO) is a
multinational dedicated to over wide. The
purpose of OSI model is to show how to
56
57
58
1)
PHYSICAL LAYER: - It defines
the procedures and functions that
physical devices and interfaces have to
perform for transmission to occur.
FUNCTIONS:
1. Physical characteristics of
interfaces and medium: - It defines
the characteristics of the interface
between the device and transmission
medium, also defines type of
transmission media.
59
Functions:
1. Framing: - It divides the stream of bits
received from the network layer into
manageable data units called frames.
2. Physical Addressing: - It adds
header to a frame to define the physical
address of the sender or receiver of the
frame.
61
62
63
64
65
66
Functions:
69
5)
SESSION LAYER: - It is the
network dialog controller established
maintained and synchronizes the
interaction between communication
systems.
Functions:
6)
PRESENTATION LAYER: - It is
concerns with the syntax and semantics
of the information exchanged between
two systems.
Functions:1. Translation: - The processes in two
systems are usually exchanging
information in the forms of character
strings number and source.
2. Encryption: - It means that the sender
transforms the original information to
another form and sends the resulting
message over the network.
3. Compression: - Data compression
reduce the number of bits that be
transmitted.
7)
APPLICATION LAYER: - It
enables the user weather human or
software to access the network. It
provides user interfaces and support for
services such as electronic mail, remote
file access and other type of services.
Functions:-
72
1.
Network Virtual Terminal: - It is
software version of physical terminal
and allows a user to log-on to remote
host.
2.
File Transfer and Management: It allows a user to access files in a
remote computer to retrieve file from a
remote computer and to manage or
control files in a remote computer.
3.
Mail Services: - It provides basis for
E-mail forwarding and storage.
Protocols used in application
layer:
1. FTP: File Transfer Protocol
2. HTTP: Hyper Text Transfer
Protocol
TCP/IP
73
FTP
SMTP
IP
ARPANET
SATNET
LAN
TCP is a connection oriented end to end
protocol. The protocol works in collaboration
74
ACK
PSH
RST
SYN
i.
ii.
iii.
iv.
v.
FIN
UDP
User Datagram Protocol
The user datagram protocol is the
simpler of the two standards TCP/IP
protocols. It is an end to end transport
protocol that adds only port addresses,
77
Subnetting
The sub netting procedure divides a network
into several sub networks in such a way that
each of these subnets has its own address.
The subnet address is created by dividing
the host address into network address.
100:00000-128
101:00000-160
110:00000-192
111:00000-224
Subnet Address:
211.71.9.0
211.71.9.32
211.71.9.64
211.71.9.96
211.71.9.128
211.71.9.160
211.71.9.192
211.71.9.224
5 Determining the host address:211.71.9.0
000 0000
000 11110-30
211.71.9.32
001 00001
84
001 11110-62
211.71.9.64
010 00001
010 11110-94
211.71.9.96
011 00001
011 11110-126
211.71.9.128
100 00001
100 11110-158
211.71.9.160
101 00001
101 11110-190
211.71.9.192
110 00001
85
110 11110-222
211.71.9.224
111 00001
111 11110-255
Protocol Suite
Every layer has different protocols:
Lower Layer Protocol-MLID
Middle Layer Protocols-IPX,SPX,RIP &
NLSP
Upper Layer Protocols-NCP,SAP
Protocol Suit
90
92
identifier.
INTERNET PROTOCOLS
IP is also known as ARPANET (Advanced
Research Project Agency of Networks).IP
works in collaboration with TCP because it is
connectionless and unreliable protocol.
94
IP protocols divided into two parts: Middle layer protocol-IP, ARP, ICMP,
RIP,IGMP,OSPF, DNS, RARP
Upper Layer Protocol-FTP, TELNET,
SMTP
IPV4
IPV6
ARP:- Address Resolution Protocol
It is used to find the physical address from
the logical address. When sender wants to
send data then both physical and logical
address are needed but if sender does know
the receivers physical address then it
95
3)
Hardware Length: - It is of 8 bit
field defines the length of physical
address in byte.
4)
Protocol length: - It defines the
length o the logical address in bytes.
5)
Operation: - It defines the type of
packet.
ICMP: - Internet Control Message Protocol.
The IP protocol has no error- reporting or
no error correcting mechanism. The
datagram can be discarded at the
destination because receiver did not
receive it at predetermined time limit.
So, the error can occurred and IP
protocol has no built in mechanism to
identify the original host.
ICMP has been designed to compensate
for these deficiencies or it is companion
to IP Protocol.
Protocol stack for ICMP:Type (8bit)
Code (8Checksum
bit)
(16-bit)
Reset of Header
Data
97
Maximum Checksum
Response (16-bit)
Time (8bit)
Rest of Data
Group Address
99
FTP Connection
Although transferring files from one to
system to another seems simple and
straight forward. For e.g. two systems may
be different filename conventions. Two
systems may have different way to
represent text and data. Two systems may
be different directory structure.
2) TELNET:- TELNET stands for terminal
networks.
101
TELNET
It is the standard TCP/IP protocol for
virtual terminal service. TELNET enables
the establishment of a connection to
create a remote system in such a way that
the logical terminal appear to be a
terminal at the remote system.
3) SMTP: - Simple mail transfer protocol.
The actual transfer mail transfer is done
through message transfer agents.
SMTP
102
MEDIA CONNECTIVITY:
It is defined as how connections are
establishing in voice, video, text and simple
comprise media.
Techniques:
1) Leased Lines: - Leased line is a
permanent telephone connection between
two points setup by the
telecommunication carrier. A leased line is
103
Leased Line
Benefits:1. Faster download and upload speed
2. Wide choice of bandwidth
3. Guaranteed bandwidth for business
usage
Typically leased lines are used by business
to connect geographically distant offices.
Unlike, normal dialup connection a leased
line is always active. The fee for the
connection is fixed monthly rate.
Types:104
VSAT
Has equipment both at the central hub
and at remote location. The other
segment is known as space segment.
Frequencies: C-band
Extended C-band
Ku-band
106
VSAT Architecture:1.
Single channel per carrier: Permanent channel is establishes
between user and VSAT and flexibility of
adding new devices and cost increases.
2.
Multi-Channel per carrier: Multi channel between user and VSAT,
data send with higher speed.
3.
Time- Division Multiplexing: In this links are shared.
108
PSTN
3. Switching Offices: - Where calls
are moved from one trunk to another.
109
110
IPLC
Features:
High speed large volume application
requiring mbps speed.
Dedicated point to point linkage, security
and privacy for an exclusive corporate
network.
High Quality, high availability and extreme
reliability.
111
112
CONNECTIVITY DEVICES
1 NIC: - Network Interface Card
Network Interface Card or Network
Adaptor Card works in physical and data
link. Used to transmit data from one
computer to another.NIC address called as
physical address and it is unique for all
devices. Now it is inbuilt in the
motherboard.
Functions:
1 Host-To-Card communication
2 Buffering
3 Frame Creation
4 Parallel to Serial conversion
5 Encoding
NIC
Software Configuration: CD
2 HUB: - It is a central concentrating
point for computer networks. It provides
a central data point for network cabling
only co-axial cable Ethernet does not
uses hub at all. Most of the LAN used
hub to interconnect computers and other
device.
HUB
Classification:
1.
Passive Hub: They are only used to
combine the signal from several network
cable segments.
All devices attached to a passive hub
receive all packets that pass through the
hub. The distance between the computer
and the hub can be no more than half
the maximum permissible distance
between two computers on the network.
It do not amplify the signal and provide
interface.
116
2.
Active Hub: It regenerate the signal
distance between two network
components can be increased. In this
electrical power is required.
3.
Intelligent Hub: It is similar to
active hub but having additional
features.
3 REPEATER: - It works in physical layer
of OSI model. It does not connect two
LANs but connect different segment of
same LAN. It extends the length of the
LAN and also known as regenerator. The
main disadvantage of repeaters is that
they cannot connect two dissimilar
networks.
Repeater
Even though repeaters enable signals to
travel further the maximum propagation
delay still sets a limit to the maximum size
of the network.
117
Router
Types:
1. Provide edge router: These are placed
on the Internet side or provider side.
2. Subscriber Router: It is placed at the
subscriber side.
3. Inter Provider Border Router: When
different ISP is needed then it is used.
4. Core Router: Router that is lie in the
middle of the LAN.
5 MULTIPLEXER/DEMULTIPLEXER:
118
Multiplexing and
Demultiplexing
Types of multiplexing:
1. Frequency-Division Multiplexing
2. Time-Division-Multiplexing
3. Wave-Division-multiplexing
119
Modem
Features:
Speed at which data is send
120
Types:
1. External Modem: Connected with
serial port
2. Internal Modem: Inbuilt in
motherboard
Switch
Types:
1. Transparent Bridge: It is used for
filtering. In filtering packets are discarded
which are part of same network.
2. Forwarding: It forwards the packets.
3. Source Bridge: It sends dump packet
to multiple paths and then selects one
path.
8 GATEWAY: It connects heterogeneous
network works on seven layers.
Three Types:
1.
Network Gateway: It connects
different network that uses same
network layer protocol.
122
2.
Protocol Gateway: It connects
different network used different
protocol.
3.
Tunnel Gateway: In this source
adds the header of the receiver so
that data can reach at destination.
9 FIREWALL: Firewall is used for
Internet Security. It is device usually a
router or a computer installed between
the internal networks of an organization.
Its main purpose is to select error free
authorized data packet and forward to
destination.
Firewall
123
Types:
1. Packet Filter: In this according to IP
or destination port packet is to be
sending or discard.
131.3 *
4.00
23
194.7
8.208
80
VOIP
SIP: Session Initiated Protocol
It is the protocol which used to establish
communication link.
Types of messages:
Invite: Caller initialize the request to the
cally through invite message.
125
NETWORK PRINTING
Network printing enable users in location
geographically separate from each other
and from there print devices to produce
documents for themselves and others. Print
severs enable multiple clients to share one
or more printed devices.
The following three terms are data
types associated with network
printing:1. RAW: - data types used in page
description language that is ready to be sent
to a print device; for example PCL or
PostScript. This is the default data type for
print jobs on computers that are not running
windows XP Professional or windows 2000.
These RAW files are device dependent.
2. EMF: - Enhanced metafile
It is used between print clients and print
servers. With an EMF, the graphics device
127
129
Client Spooler
Windows clients: - Client computer run
Windows 95, Windows 98, Windows
Millennium edition, Windows 2000, Windows
XP or Windows server 2003.
Non-Windows clients: - Clients computers
run UNIX, Apple Macintosh or MA-DOS.
130
Non-Windows
Application
Client Spooler
GDI(Graphics device
interface)
Printer Driver
LPR(Line printer
remote )
Description
Any program that
creates printable
data.
Any programs that
creates printable
data.
Processes and sends
print jobs from the
client to print serve.
Provides services to
the printer driver,
Including caching,
client- server
communication and
character conversion.
Communicates with
print devices to
generate output from
data supplied by the
GDI.
Protocol that sends
print jobs to a server
running the server
131
AppleTalk
side protocol,
LPD(Line printer
daemon)
Protocol used by
Macintosh clients and
Windows server.
Netware
Protocol used by
NetWare clients for
file and print services.
Prints device-specific
data. The device ids
attached to a local
port on the server.
Prints device-specific
data. This device is
directly connected to
the network and
managed by this print
server.
132
133
Server Spooler
Components of network printing on Windows
server 2003:Component
Print Spooler service
Print Router
Description
Manages the printing
process, Which
includes retrieving
the location of the
correct printer driver,
loading the driver,
spooling high level
function calls into a
print job, scheduling
the print job for
printing.
Routes print jobs.
134
Print Monitor
Language Monitor
GDI(Graphics Device
Interface)
Printer driver
Remote print
provider
Local print devices
137
138
CRYPTOGRAPHY
139
Encryption and
Decryption
Encryption and Decryption is classified into
two classes1) Conventional method
2) Public key method
140
BLUETOOTH
Bluetooth is a wireless LAN technology. It is
designed to connect devices of different
functions such as telephone, notebooks,
computers, cameras. A Bluetooth LAN is an
adhoc network which means that n/w is
formed simultaneously. IEEE standard for
Bluetooth is 802.15.this standard defines a
wireless personal area network (PAN)
operable in an area the size of room or hall.
144
Piconet
145
2)
SCATTERNET: - Piconet can be
combined to form a scatter net.
Scatternet
A secondary station in one piconet can be
primary of other station. The station can
receive messages from primary in the first
piconet.
146
Packet format:LENGTH
(2-BYTES)
CHANNEL
ID (2BYTES)
DATA AND
CONTROL
(0 -65535
BYTES)
148
BROADBAND
WIRELESS MAN or WI-MAX.
The IEEE standard of wi-max is IEEE 802.16.
Provide the interconnectivity if several
kilometers.
Protocol stack of broadband:Upper Layer
Service Specific Convergence
Layer
Mac Sub layer
Security Sub layer
Transmission Convergence Sub
layer
QPSK (2-Bit)
QAM-16
QAM-64
Techniques for transmitted data: QPSK: - Qudrature phase shift key. For
large distance or area, 2bit per bound.
149
WI-FI
The standard of Wi-Fi is 802.11b. It stands
for wireless fidelity. It is the technique of
sending OFDM. Invent by integrand
cooperation. Connections are peer to peer.
Speed is high providing more provide VOIP.
Advantages:1) No wires.
2) Inbuilt in laptops.
3) Compatible with other Wi-Fi standard.
151
Wireless Network
153
Network Troubleshooting
It is defines as to recognizing and
diagnosing networking problems with the
goal of keeping your network running
optimally.
155
Troubleshooting
Network troubleshooting framework:
Application
Protocol
. LAN entry
156
Presentation
Session
Network
Data link
Physical
information
and other
remote
monitoring
Routing
information
manager
. Traffic
manager
.Status
watch
.LAN entry
manager
.Traffic
manager
Traffic control .Status
watch
.LAN entry
manager
Error counts .status
watch
159
LAN-SETUP
Setting up a local area network (LAN) today
is easier than ever before with plenty of lowcost networking technology options
available. Further, for internal LANs, security
devices and software are more accessible
and also less expensive. Whether you want
to connect users internally within an
organization or at home, setup internal LAN
for easy Internet and Intranet access.
Difficulty: Moderately Challenging
LAN Setup
Instructions
Things that Needed:
Server
Routers
Security software
160
Connection wires
1 Know that internal LANs allow related
and authorized users to share
information on a local network.
Connect multiple computers within
your home or organization. Allow
users to easily share important
information, programs and the
Internet.
2 Designate one computer within your
LAN area as your server. Use a
computer that won't likely be moved
since it will be the focal point of your
internal LAN. Keep it in a safe and
secure location.
3 Purchase and install a router. Attach
either a wireless or another type of
router to your server. Run the
software that comes with the router.
Follow the directions and hook up
appropriate wires between your
Internet connection, the router and
your server.
4 Make sure you have a connection to
the Internet. Check other computers
to setup internal LAN. See if you can
connect to the network from each
computer in your LAN. Realize if you
set up a wired LAN, you need to run
161
162
LIMITATIONS
1.
2.
163
CONCLUSION
A network is a set of devices connected by
media links. A node can be a computer,
printer or any other device capable of
sending and receiving data generated by
other nodes on the network.
From computer network project we conclude
that we can share many devices through
networking. So networking is time saving
and less costly. We can access the
164
165
BIBLIOGRAPHY
1. Data communication and
networking
(2ND and 4th edition)
ONLINE RESOURCES:
http://www.google.com
http://www.wikipedia.org
166
167
168