Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Defining a network: Network architecture is the logical and structural layout of the network consisting of transmission equipment, software and communication protocols and infrastructure transmission of data and connectivity between components. The Network architecture is the design of a communications network also. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in its operation. A network architecture in which each computer or process on the network is either a client or a server. The Servers are powerful computers or processes dedicated to managing disk drives printers or network traffic. Clients are PCs or workstations on which users run applications. The network architecture of the Internet is predominantly expressed by its use of the Internet Protocol Suite, rather than a specific model for interconnecting networks or nodes in the network, or the usage of specific types of hardware links.
Benefits
If your business grows, good communication between staff is essential. You can improve efficiency by sharing information, such as common files, databases and enterprise applications software in a computer network. Working with improvements in network capacity and the ability to wirelessly or remotely, successful businesses should regularly re-evaluate their needs and IT infrastructure. See our guide on mobile technology. Properly planned, an efficient network offers a wide range of services to a company. You can improve communication by connecting the equipment and standard systems of work so that: staff, suppliers and customers are able to share contact information and more easily the exchange of information can make your business more efficient - for example access network to a common database allows data to avoid the same button several times, wasting time and could lead to errors. Staff are better equipped to answer questions and provide a better level of service following customer data sharing. You can reduce costs and improve efficiency by storing information in a centralized database and streamlining working methods, so that:
Page | 1
staff to deal with more customers at the same time, through access to databases of customers and products network management can be centralized, less IT support required reducing costs through sharing of peripherals such as printers, scanners, external hard drives, tape drives and Internet access. You can reduce errors and improve consistency of having all staff work from a single source of information, so that standard versions of manuals and directories can be available, and data can be saved from a single point on a regular basis to ensure consistency. For many companies, the first network of computers that have a single building can be limited. This type of network is a local area network (LAN) called. There are two common types of LAN - Peer-to-peer and client / server.
Page | 2
Task 02
2.1 Peer-to-peer and client / server architecture
Peer-to-peer is the use of relatively powerful computers (PCs) that exist at the edge of the Internet for more than just math problems based on the client. The modern personal computer (PC) has a very fast processor, vast memory and high capacity hard disk, none of which are fully used to perform common tasks such as e-mail and Web browsing. The modern PC is a client and server (a couple) to act for many types of applications. The typical computing model for many applications is a client / server model. A server computer usually has enormous resources and responds to requests for resources and data from client computers. Client computers initiate requests for resources or data servers. A good example of client / server computing is browsing the Web. Internet Web servers are mostly high-end servers with very fast processors and large disk arrays. Web server with all the content to a website (HTML files, graphics, audio and video files, etc.) associated with and waits for incoming requests for information about a particular Web page. If you request a page, the web server sends the page and its files to the requesting client. In this way each team has access to software modules have on another computer, and the provision of services to another computer. The architecture of peer-to-peer "is much more complicated than the client-server architecture. Each team must know the network addresses of other computers of the distributed application, or at least that subset of computers that may need to communicate. The P2P network is based on computing power at the ends of a connection, rather than from the network itself is based. Peer-to-peer connection between two computers directly, so that they are sharing files or programs. They are especially suited for collaborative work, simple and relatively inexpensive to create suitable.
However, peer-to-peer can be "much slower than server-based networks are not suitable for complex networks. In addition, peer-to-peer systems technology users to connect computers to other users, so that failures at one point in the network on any computer on the network.
2.2
The architecture of the lay out (How It Connects) is simple If one computer fails to work all the other computers connected to it continue to work. The high data transmission rate, fast movement of data packets are we can make in peerto-peer network. Peer to Peer Networks are easy and simple to set up and only require a Hub or a Switch to connect all the computers together. Peer-to-Peer network, we can save our money; it will help us to manage our resources more efficiently, and simplicity
2.3
2.4
Client/Server Network
Network client / server application, a computer as a server - where to get the shared files and programs are - that connect to other computers. This central machine can be a normal PC, although it is better to have a powerful computer or a server computer was designed for them. Network client / server has a number of advantages. Since files are stored centrally, these systems more efficient backup and data management. For example, users can not modify files simultaneously. You can also click on different types of devices, content and support more users with more reliable than a peer-to-peer. Technology that separates computers and application software into two categories clients, and servers to better employ available computing resources and share data processing loads. A client computer provides the user interaction-facility (interface) and some or all application processing, while the a server computer might provide high-volume storage capacity, heavy data crunching, and high resolution graphics. Typically, several client computers are connected through a network to a server which could be a large PC, minicomputer, or a mainframe computer. Every computer connected to a website acts as a client while the website's computer acts as a server.
Page | 4
Also called client server environment. The client connects to the server on this well-known network address. Once the client connects to the server, the client and server able to communicate with each other, the server need not configured with any information about the clients. Unlike systems Peer-to-peer networks, an error at a single point in a network client / server to other computers on the network, as long as the server remains intact. Wireless network technology can replace all or some of the requirements for a network cabling. See page of this guide in the choice of wired or wireless, or see our guide on wireless technology.
2.5
2.6
Page | 5
2.7
Centralized Computing
Centralized Computing takes some of the control and all of the parts easily susceptible to failure away from the desktop appliance. All computing power, processing, program installations, backups and file structures are done on the Terminal or Application Server.
Advantages of centralized computing Centralized Computing and file storage. Redundant technologies incorporated to ensure reduced downtime. Computer stations replaced with ThinClient appliances with no moving parts, improving meantime before failure. Centralized management of all users, processes, applications, back-ups and securities. Usually has lower cost of ownership, when measured over 3 + years.
Disadvantages of centralized computing User access to soft media drives are removed. In the rare event of a network failure, the ThinClient Terminal may lose access to the terminal server. If this happens, there are still means to use some resources from the local client
Page | 6
Task 03
A network architecture in which each computer or process on the network is either a client or a server. Servers are powerful computers or processes dedicated to managing disk drives, printers or network traffic. Clients are PCs or workstations on which user run application. Clients rely on servers for resources such as files, devices and even processing power.
A system in which the mechanics of looking after data are separated from the programs that use the data. The client would be a program that requests data from the server as needed. Businesses of various sizes have various computer needs. Larger businesses necessarily need to use more computers than smaller businesses do. Large businesses routinely have large computer setups, such as mainframes and networks. A network for a large business commonly has client-server architecture also known as two-tier architecture.
Servers commonly contain data files and applications that can be accessed across the network Client-server architecture by using the server as a storage device for applications and requiring the clients to log in to the server in order to use those applications. Networks have a client-server architecture in which the server acts as a processing power source.
Even the World Wide Web is an example of client-server architecture. Each computer that uses a Web browser is a client, and the data on the various Web pages that those clients access is stored on multiple servers.
Page | 7
A network connects within the organization once connected the network users can interact with each other using the flexibility of transmission of the organizations data.
Allow File Sharing:
It provides an easy way to share files for employees can share files directly through a network.
Allow Flexible Resource Sharing:
Every workstation in the network can share resources like printers fax machines and telephones easily.
Provide Easy Communication:
All the users on the organizations network can communicate with each other and other authorized individuals through various techniques on the network system.
Flexible Access:
A Network allows the employees to access files from different workstations in the network. It also allows numerous users to work together on the same project via the network.
Implemented network allows the administrators to manage the company's information well as critical information can be centralized on shared servers and thereby make it easy for everyone to view the information rather than spread the information over many computers
Share Internet Access:
A network allow users to share a single internet connection provided with specific hardware and software devices that lets the connection to be assigned to various employees.
Control Security:
Precise directories can be password safeguarded to gain access to authorized users as a server manages the resources on a network confidential data can be limited to users who are permitted to access it
Page | 8
As a server manages the networks resources document tracking software can be used to restrain employees from overwriting files or altering files that are shared by everyone in the organization. implemented network provides many usages to the organization are connectivity among users, allows files and resource sharing, provide easy communication, flexible access, allow centralized management, share internet access, control the security and eliminate data corruption and duplication
Client-server architecture enables roles and responsibilities of a computing system to be distributed among a network. So it is greater ease of maintenance.
All data is stored on the servers which have greater security controls than most clients. Servers can better control access and resources to guarantee that only those clients with the appropriate permissions may access and change data. It functions with multiple different clients of different capabilities. Updating and growth are relatively easy Centralization access, resources, and data security are controlled through the server
1. All data stored in one location 2. Easier to backup files and data 3. Easier to find files and data Scalability Any element can be upgraded when needed
Page | 9
As the business grows good communication between employees is essential. Can improve efficiency by sharing information such as common files databases and business application software over a computer network. With improvements in network capacity and the ability to work wirelessly or remotely successful businesses should regularly re-evaluate their needs and their IT infrastructure. Properly planned an efficient network brings a wide range of benefits to a company. Can improve communication by connecting computers and working on standardized systems so that: staff suppliers and customers are able to share information and get in touch more easily
sharing information can make business more efficient - eg networked access to a common database can avoid the same data being keyed multiple times, which would waste time and could result in errors staff are better equipped to deal with queries and deliver a better standard of service as a result of sharing customer data
Can reduce costs and improve efficiency by storing information in one centralized database and streamlining working practices so that: staff can deal with more customers at the same time by accessing customer and product databases network administration can be centralized less IT support is required
Page | 10
costs are cut through sharing of peripherals such as printers, scanners, external discs, tape drives and internet access
Can reduce errors and improve consistency by having all staff work from a single source of information so that standard versions of manuals and directories can be made available and data can be backed up from a single point on a scheduled basis ensuring consistency. With considering these facts it shows that domain is better than workgroup. Therefore it is needed to rebuild the current network in domain controller Client-server architectures are very important in business applications. The explosive growth of the Web and the standardization that has come with it has meant that corporations want the same technologies to be used for internal client-server applications. Thus was born the concept of the Intranet a self-contained corporate or business network typically using client-server technology similar to that on which the Web is based. There is also much interest in the development of middleware software that mediates between a client application and a server or network environment that may be outdated or otherwise incompatible. Based on the above factors I have chosen Client server Architecture.
Page | 11
Web server
This software is resident on high specification hardware. A web server runs on a computer that holds and transmits WebPages on request. Each website available on the Internet resides on the hard disk of a computer somewhere. This computer runs an HTTPD or Hypertext Transfer Protocol daemon. This is a program that continuously listens for requests to come in from clients. The requests are sent by software running on the client PCs. The client PCs must run Hypertext Transfer Protocol (HTTP) softwares as Mozilla or Internet Explorer. This is to decode the html and JavaScript commands that the WebPages are written in and also to request other pages from the web server, the world's most popular HTTP server application, Apache, comes with just about every version of UNIX and also runs on Windows. Microsoft provides Internet Information Server (IIS) for Windows platforms.
Print server
A print server is a microcomputer that is dedicated to handling an office's printing. A print server manages and accepts printing jobs from workstations on the LAN and queues jobs until they can be printed. It has the ability to carry out print management functions such as attaching different priorities to different jobs or re-directing jobs to other printers.
Page | 12
File server
A file server is a powerful microcomputer that allows every user to access any file that the user has access rights to on the server. One useful feature is that only one copy of each application needs to be stored for the use of all users. This ensures that all users have access to the same version of the software. This makes upgrading easier because there is only one copy of each application to upgrade rather than say 100 copies spread across the LAN. It handles access to shared storage, directories and files. A file server also controls the exchange of files between network users. It also holds the operating system and applications and data. The file server will direct user requests for printing to the print server which then handles the all the associated file and print activities and relieves the file server from much work and improves LAN efficiency.
Page | 13
Bus topology Ring topology Star topology Mesh topology Tree topology
Bus Topology A bus network uses a multi-drop transmission medium, all node on the network share a common bus and thus share communication. This allows only one device to transmit at a time. A distributed access protocol determines which station is to transmit. Data frames contain source and destination addresses, where each station monitors the bus and copies frames addressed to it. A bus topology connects each computer (nodes) to a single segment trunk (a communication line, typically coax cable, that is referred to as the 'bus'. The signal travels from one end of the bus to the other. A terminator is required at each to absorb the signal so as it does not reflect back across the bus. A media access method called CSMA/MA is used to handle the collision that occur when two signals placed on the wire at the same time. The bus topology is passive. In other words, the computers on the bus simply 'listen' for a signal; they are not responsible for moving the signal along.
Page | 14
Ring Topology
In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). A failure in any cable or device breaks the loop and can take down the entire network. To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. Ring topologies are found in some office buildings or school campuses. In ring Network, every computer or devices has two adjacent neighbors for communication. In a ring network, all the communication messages travel in the same directory whether clockwise or anti clockwise. Any damage of the cable of any cable or device can result in the breakdown of the whole network. Ring topology now has become almost obsolete. FDDI, SONET or Token Ring Technology can be used to implement Ring Technology. Ring topologies can be found in office, school or small buildings.
Page | 15
STAR TOPOLOGY
IN a star topology computers are directly connected into a central controller (Server/Switch/hub). There for each and every work station can communicate directly with the main computer. If one work station is break down nothing happen to enter net work. If the server break down entire net work will fail
Advantages High speed Low net work traffic Easy to setup and expand Disadvantages Expensive. (Because need more cables) If the central controller is break down the entire net work will fail
Page | 16
Mesh topology
Mesh Topology also a one of the type of physical topology. In mesh topology all the computers are connected with each other computers through the hopes. We can see mesh topology is like a local area network. The main purpose of mesh topology is to supply a best job. Commonly mesh topology using for wireless networks. It is a reliable network topology and it is difficult to maintain.
Tree Topology
Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the "root" of a tree of
Page | 17
devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone. Tree topologies are comprised of the multiple star topologies on a bus. Tree topologies integrate multiple star topologies together onto a bus. Only the hub devices can connect directly with the tree bus and each Hub functions as a root of a tree of the network devices. This bus/star/hybrid combination supports future expandability of the computer networks, much better than a bus star.
Page | 18
Page | 19
Additional, Adobe CS 3 Master Collection Mozilla Firefox Internet Download Manager (IDM)
Network Card Interface NIC is an expansion card, the connectivity between a PC and a network like a LAN. Known as Ethernet adapter, network adapter, LAN, LAN Adapter or NIC (network interface controller) called. Internal network interface cards (NICs) can either be built-in, the system motherboard or plugged into an expansion slot inside the device.
Page | 20
Switches Switch is a type of a device which is used to link several LANs and route packets between them. A switch has multiple ports, each of which can support either a single station or an entire Ethernet. Even a different LANs connected to each of the ports; it can switch packets between LANs as needed.
Cisco Catalyst 2950G 48 EI Switch 48 10/100 ports and two fixed GBIC-based 1000BASE-X uplink ports. 1 rack unit (RU) stackable switch. Delivers intelligent services to the network edge. Enhanced Software Image (EI) installed. Ideal for advanced desktop access layer connectivity and residential metro access.
Routers A network router is a network device with interfaces in multiple networks, whose job it is to copy packages from one network to another. Routers are more complex and more expensive than bridges. You use information in each packet to route it from a U / N exchange to another, and information that allow them to determine the best route through a complex network of many LANs. Routers operate at Layer 3 of the OSI model, the Network Layer. This is in contrast to switches that operate at Layer 2 of the OSI model data link layer. A network router typically use one or more routing protocols like RIP, OSPF, BGP or. Router accepts routes that are configured manually by a network administrator. These routes are called static routes. The router will use this information to create a routing table.
Page | 21
Benefit Supports concurrent deployment of high-performance, secure data services with headroom for future applications Supports more than 30 modules and interface cards, including existing WAN (WIC) and multiplex (VWIC) interface cards (for data support only on the Cisco 1841 router) and advanced integration modules
Ample Default Memory Provides 64 MB of Flash and 256 MB of synchronous dynamic RAM (SDRAM) memory to support deployment of concurrent services
IPS Support
New intrusion-detection-system (IDS) signatures can be dynamically loaded independent of the Cisco IOS Software release
Form factor/height Processor (max) Number of processors (std/max) Cache (max) Memory1 (max) Expansion slots Disk bays (total/hot-swap) Maximum internal storage1, 2
4 MB or 8 MB per processor socket Up to 16GB of DDR memory 5 PCI-Express and 1 PCI; 2 PCI-X or 1 PCI-E (optional) 4/4 or 8/8 (model dependent)
4.0 TB hot-swap Serial ATA hard disk drives (HDDs); 1.2 TB hot-swap SAS, 3.0 TB simple-swap Serial ATA, or 1.17 TB hotswap SFF SAS Network interface Integrated dual Gigabit Ethernet Power supply 670 W 1/1 (std/max) Hard disk drives, fans Hot-swap components Integrated RAID-0, -1, -1E (software or hardware, model RAID support dependent), optional RAID-10, -5, -50, -6, -60 Integrated management module (IMM); optional remote presence Systems hardware key; IBM Systems Director; IBM Systems Director management Active Energy Manager Operating systems Microsoft Windows, Red Hat Enterprise Linux, SUSE Linux Enterprise, VMware ESX supported3,4 1-/4-year customer replaceable unit and onsite limited warranty Limited 5 warranty
Core switch Catalyst 4503 Switch Specifications Table A-1 Catalyst 4503 Switch Specifications
Item Environmental
Specification
Page | 23
Temperature, ambient operating Temperature, ambient no operating and storage Humidity (RH), ambient (no condensing), operating Humidity (RH), ambient (no condensing), no operating and storage Altitude, operating and no operating Switching Components Backplane Port density
10 to 90% 5 to 95%
-200 to 6500 ft (-60 to 2000 m) 24 Gaps full duplex backplane 4 Gaps Uplinks 116 ports when using a Catalyst 4500 Series Supervisor Engine II-Plus TS, 96 ports with other supervisor engines integrated support, 820 W per switching module 12.25 x 17.31 x 12.50 in. (31.12 x 43.97 x 31.70 cm) 7 RU Minimum weight: 31.25 lb (14.1 kg) Maximum weight: 75 lb (34 kg) Chassis and backplane: 29 lb (13.1 kg) Fan tray: 2.25 lb (1.0 kg)
Weight
Airflow Switch Power supply Power Poe supplied Power to Modules and fans Power to backplane components Right to left Front to back -48 VDC 12 VDC 3.3 VDC
Page | 24
no 1+1
Proxy server HP ProLiant ML350 Generation 3 (G3) The ProLiant ML350 G3 is an expandable rack or tower platform delivering affordable 2way performance and essential availability to corporate workgroups and growing businesses Intel Xeon 3.06GHz processors (dual processor capability) with 512-KB level 2 cache standard (full speed) or 2.8 GHz with 1-MB level 3 cache and Hyper-Threading Technology Server Works Grand Champion LE Chipset Up to 533-MHz Front Side Bus (model dependent) Integrated Dual Channel Wide Ultra3 SCSI Adapter Smart Array 641 (standard in Array Models only) NC7760 PCI Gigabit Server Adapter (embedded) Up to 1 GB of 2-way interleaving capable PC2100 DDR SDRAM, with Advanced ECC capabilities (Expandable to 8GB) Flexible memory configurations allow interleaving (2x1) or non-interleaving Five expansion slots: four 64-bit/100-MHz PCI-X, one 32-bit/33-MHz PCI Two USB ports Standard 6 x 1 Wide Ultra320 ready Hot Plug Drive Cage Internal storage capacity of up to 1.80 TB (6 x 300 GB 1"), 2.40 TB (2 x 300 GB 1" + 6 x 300 GB 1") with optional 2-bay hot plug drive cage option 500W Hot-Pluggable Power Supply (standard) and an optional 500W Hot-Pluggable Redundant Power Supply (1+ 1) available Tool-free entry to chassis and access to components ROM based setup utility (RBSU) support and, redundant ROM Insight Manager, Smart Start, and Automatic Server Recovery (ASR-2) Protected by HP Services, including a three-year, next business day, on-site, limited global warranty and extended Pre-Failure Warranty
Windows Server 2003 The operating system was released as the successor to Windows Server 2000 in April 2003. Windows Server 2003 with the internal version number 5.2. The 32-bit version of the Datacenter Edition of Windows Server 2003, the Physical Address Extension (PAE) support up
Page | 25
to 32 processors and 64 Gigabytes of RAM in a server. This operating system to IBM servers x445 and x455 series used, for example. The following services are started after the installation of Windows Server 2003 Enterprise Edition. Microsoft introduced the 64-bit versions of Windows XP and Windows Server 2003 on the Win HEC 2005 event in Seattle in April 2005. The Service Pack 1 for Windows Server 2003 is already integrated into the operating system is available in Standard, Enterprise and Datacenter Edition. The benefits in the 64 bit version in architecture obtained security for the improvement of safety in the current operating system on hardware level. The patch can Guard is a function to protect the system components of the applications system. For destabilize the addressing of memory currently used only 40-bits for a virtual address space of 16 TB. Compatibility with existing 32-bit applications will remain unchanged.
Page | 26
Communications Networking Communications & Networking Services of & Networking windows 2003 server we can mainly talk about Virtual Services Private Network Support, Internet Authentication Service, Network Bridge, Internet Connection Sharing and IPv6. By a VPN We can give users ready access to the organization's network even when they are out of the office and reduce the cost of this access by implementing a virtual private network since it creates a secure tunnel across the Internet into the private network. And also Internet Authentication Service (IAS) is the Microsoft implementation of a Remote Authentication Dial-in User Service (RADIUS) server and proxy. As a RADIUS server, IAS performs centralized connection authentication, authorization, and accounting for many types of network access including wireless. Administrative tools Computer Management is a Windows administrative tools collection. It uses to manage a local or remote computer. The tools are organized into a single console. It make easy to view administrative properties and to gain access to the tools that are necessary to perform your computermanagement tasks
Security Protection
Security protection is the main importing tool in any severs and system. So windows sever 2003 has good security protection system. One of the best security protection tools is security auditing. Auditing should identify attacks, either successful or not, that pose a threat to your network, or attacks against resources that you have determined to be valuable in your risk assessment.
Multimedia Services
Windows Server 2003, Windows Media Services has advanced streaming functionality such as multicasting, wireless network support, Internet authentication, server plug-ins, and cache/proxy APIs.
Page | 27
User friendly
Windows server 2003 operating system is easier to use and maintain for the particular organization than other server operating systems. Nowadays, the administrators have lot of new improved features designed to make it easy to spread out the active details. Maintaining is easier with new features
Directory Services
Directory service is one of the good in windows 2003 sever with active directory services and it helps to stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. And another service of Microsoft Identity Integration Server (MIIS) is a centralized service that stores and integrates identity information from multiple directories in an organization. The goal of this met directory is to provide an organization with a unified view of all known identity information about users, applications, and network resources.
Data management
A complete data management makes it possible to use many server-based business applications, such as: Accounting, Business planning, and etc which share a central database. So the all employees can work from the same information
Price
Guaranteed availability
In windows 2003 server provides life time guaranteed period after purchased windows 2003 server Operating system with other updates and online help. So that any kind of operating system errors can call upon vender to solve the problem.
Page | 28
Task 08
Select a suitable network design Network Diagram for the Head Office
Page | 29
Page | 30
Cable Shielding
Twisted pair cables are often shielded in an attempt to prevent electromagnetic interference. Since the shield is made of metal, it can also serve as a reason. But usually a shielded or unshielded twisted-pair cable, a special ground wire has been called drain wire. This shielding can be applied to individual pairs, or the collection of pairs. When shielding is applied to the collection of pairs, this is called screening. The shield must be grounded for the shielding to work. Shielded Twisted Pair (UTP or STP-A) 150 Ohm STP Shielded Twisted Pair cable from the IBM cabling system specifications defined and Token Ring or FDDI networks. This type of shielding protects cable from external EMI from entering or leaving the cable and also protects adjacent pairs of cross-talk.
Page | 31
Shielded Twisted Pair (SCTP, or F / TP) ScTP cabling provides a full screen shell over all pairs within the 100 Ohm [3] twisted-pair cable. This type of shielding protects EMI from entering or exiting the cable.
Screened Shielded Twisted Pair (S / STP or S / FTP) S / STP cabling, also known as Screened Fully shielded Twisted Pair (S / FTP) provides protection between the pair of sets and a total of mantle in the 100 Ohm twisted pair cables. This type of shielding protects EMI from entering or leaving the cable and also protects adjacent pairs of cross-talk.
Benefits of Cable
There is a thin, flexible cable that is easy to string between walls. More lines can be run by the same wiring channels. UTP costs less per meter / foot than any other type of LAN cable. Electrical disturbances are prevented to go into or out of the cable. Cross talk is minimized.
Drawbacks of Cable
This requires a direct peer to peer connection. If there are more computers, we have to take a hub or a switch is required. Expensive and more difficult to work.
Coaxial Cable
Coaxial cabling has a single copper wire in the middle. A plastic layer provides insulation between the inner conductor and a braided metal shield. The metal shield helps to block out outside interference.
Page | 32
Although coaxial cable is difficult to install, it is very resistant to interference. In addition, they can support greater cable lengths between network devices than twisted pair cable. The two types of coaxial; Thin coaxial cable is also known as thinnet. 10Base2 refers to the specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to his 200 yards on the approximate maximum segment length. In fact, the maximum segment length is 185 meters. Thin coaxial cable was popular in. Thick coaxial cable is also known as thicknet. 10Base5 refers to the specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to his 500 yards on the maximum segment length. Thick coaxial cable has an additional plastic cover to keep moisture away from the center conductor helps. This makes thick coaxial a great choice when longer lengths in a linear bus network. One disadvantage of thick coaxial is that it.
This includes five segments with each segment eight p.m. devices. This is a kind of copper cable, which is for cable companies in the cable are two ladders to inner and outer conductors,
Page | 33
which is commonly used to being used by high-speed transmission. This is to take more cable designed RF power. A coaxial cable is usually a black or gray color of this wire made of aluminum or copper. Each layer serves a purpose in this cable, the aluminum in the actual signal with high frequency format. The sheath prevents signal leakage. Support for multiple channels in the frequency range of significant capacity. This allows system bandwidth and provides higher bandwidth for each channel, as compared to twisted pair. Large distances between amplifiers. Which resources can room with more than twisted-pair cable
Page | 34
There are two common types of fiber optic cables - single mode and multimode. Multimode cable has a larger diameter, but both cables provide high bandwidth at high speeds. Single-mode, more distance, but it is more expensive.
Coaxial cable 1 meter cost: Rs. 150 x 100m = 15000/= Fiber Optic cable 1 meter cost: Rs. 250 x 50m = 12500/= Kaspersky internet security: Rs. 15000/=
Page | 35
Star topology is being selected for the organization, While handling and maintenance of a network is a major task for the organization. As an organization providing network availability is very important for users and can make problems in a very simple using a star topology, since all are connected in the network to a central point. And it is also much easier to install and wire star topology network.
Page | 36
Analog signals are relatively simple to create and run from place to place. However, they suffer from the fact that every last detail of the design issues. If the pattern changed slightly by unwanted noise or distortion, the output will not be identical to the input. Therefore, a good analog Hi-Fi equipment is so hard to make (translation - it is expensive).
Digital Signals
These are the signals that are discrete on - off pulse, which convey information relating to the 1 and 0. In other words, this refers to discrete-time signal which has a discrete number of values. This is a signal in which information is converted into bits. The feature of the digital signal processing enables fast mathematical operations are performed on a set of data. These are usually used in electronic and computer can be used, this performance more bandwidth than analog signal, so that it is more expensive.
Page | 38
Conclusion
I have to explain both the digital and analog signal. The digital signal has fewer errors and it is very easy to transfer and this result compared to analogue accurate and fast data transfer.
Page | 39
Task 11
Network Interface Card This is a computer hardware that has an interface to a computer network. This is a card that is in expansion slot, there is now a network card that is built on the motherboard itself. The purpose of using the network card allows a computer to communicate over a computer network and where, as is done in the LAN transmission technology. This has a unique address, known as MAC address and used to direct traffic on computers. Some network adapter cable and some are wireless connection. The most commonly used network card Ethernet network interface card.
omputer central
The purpose of the Network Interface Card This allows a computer to communicate over a network, which is both an OSI layer that provides access to the network and provide the address by MAC address system. A recent network card has a dual network interface integrated into the motherboard. These provide a protocol stack, the communication within small group and large with routable LAN protocol to. This provides a base to determine where the cable is connected and to examine the LED, if it is active or not.
Page | 40
Properties of the NIC To the network interface card has an Ethernet port, Ethernet port and both the cable from router to the data to the card to computer over the Internet - Ethernet port. Phone Line - In previous card is the phone to connect the connection and allow you to connect to dial-up Internet service and have installed the software depends on the computer. Control LED - This LED indicates whether the connection is secure or not done. Speed - Today, the map looks at a better Internet experience, especially
Benefits of Network Interface Card This allows users to share files, printers and other resources that allow users to eliminate rather than buying the printer and lower costs. One of the main advantages is the network card is cheaper to buy and where you have built up a network card in some computers. If there is a question of raising network card more easy to trouble shoot, which helps to fix by a light inside. When the green lamp is burned out, we can work an idea of the network card correctly and if the color changes to red, you should know that it have a problem in communication.
Drawbacks of Network Interface Card One of the most important is the card must first be configured to use it. This requires a hard wire connection when a wireless adapter, you can use to move your computer into different location within the building.
The configuration of the installation process NetBIOS Here I have to describe the NetBIOS installation. Here I have attached the screenshot for teaching about the installation of NetBIOS. To install the NetBIOS first we must select the network connection in Control Panel.
Page | 42
Then I want to select the networking tab to check the available of NetBIOS.
Then we have to press the Install and I want to select the Protocol Option there
Page | 43
Then if we press the Add Button After the selection there, we will get a window like given below. There we can select the NetBIOS Compatible Transport Protocol. Then we have to press the OK button to continue.
Page | 44
Page | 45
Task 12
Fact that the performance of the Network Interface Card Bus speed - There should be transferred to a bus speed, 133MB / s, since the bus speed will be released on the computer it can up to 80MB / s. This on the ISA or PCI slot in which such as PCI has at high speed. More memory can enjoy better performance. The speed of the bus depends on the processor and motherboard. Memory - More the memory, better the performance.
Direct Memory Access - These implement a protocol on the network card that support zero-copy network
importantly, the os you use. the lighter the device driver, the better the card's going to give perform decently. say, you have three identical NICs on different PCs with identical configs. you've vista on one, xp on another, turbolinux on the third. which of those you think is going to do a speed job? without any doubt the turbolinux one. beside the software issue, physical characteristics like temperature, humidity &c do affect the hardware/digitals of the NIC.
Page | 46
Task 13
Cabling for ABC Organization The data will go through the OSI model. When it reached the physical layer to physically travel between more than one devices. This time the data source travel cable (If not wireless). For LANs, we used the different types of cables. I'm going to compare the cable, and I will select the most appropriate. If we choose, we must mention the cable topology of protocols and their types. There are 3 cables we explain above, the task 7 for the best selection, Coaxial cable Twisted Pair Fiber Optic
If we use the cable, we should mention decommissioning steps: Description of the different types of cable. The size of the network and the suitability of the cable. Performance and its suitability for our network. We balance our budgets.
Head Office: Headquarters has great length and high security. Thus we have preferred to select the coaxial cable for this. Compare with twisted-pair cable has a high safety. Because of security, I chose the coaxial cable for this. High-end factory: High-end mill is a little too big. So I have the coaxial cable for these high-end factories prefer. It has great length. So we should have the coaxial cable in this department. Also it has to transfer some amount of data than the previous two branches. Average factory: For medium-sized branch, we prefer to have the twisted pair cables. It is not very large network. But our medium size branch is less than 100 meters. So we can put twisted pair cable to medium branch. Small Factory:
Page | 47
For small, we have rather have the twisted pair cables. Cost-wise and size as it has enough to resolve the situation. TCP / IP (Transmission Control Protocol / Internet Protocol) We decided to TCP / IP. The reason for the selection of TCP / IP through other protocol stacks for communication is as follows. TCP / IP also have the following characteristics: Connectivity and communications Networks connect computers and users of those computers. are people within a building or group can local area networks (LANs) connected; LANs in distant locations to larger Wide Area Networks (WANs) can be connected together. Once connected, it is for the network users to communicate with each other using technologies such as e-mail. This makes the transfer of business (or non-business hours) information easier, more efficient and less costly than it without the network. There are some features that we identified in TCP / IP protocol assume for our network architecture as; Easily expandable. Good failure recovery. The ability to add networks without interruption of existing services. High error rates, handling. Platform independence. Low data overhead.
The TCP / IP protocol suite is the foundation of the Internet. It is the most common form of networking between computers. TCP / IP is a combination of records at various levels and is designed for simple 4-layer system. It brings together some adjacent OSI layers, and leaves some features. TCP / IP has this property, the best is why we selected this protocol. TCP / IP Configuration Start control panel double click on the network connectiongo to properties
Page | 48
Then select the networking on the option bar select TCP/IP- go to properties
Page | 49
Page | 50
Task 14
OSI Model
The OSI model defines how data is transferred from one computer to another. It details how the electronic bits are taken from what you see on the screen (presentation) and pass it through the different parts of the computer and across a wire to another computer.
Page | 51
The OSI Model is a theoretical representation of what happens between two nodes on a network. It doesnt recommend the type of hardware or software that should support each layer it doesnt describe how the software programs interact with other software programs.
Its a way of sub-dividing a System into smaller parts (called layers) from the point of view of communications. A layer is a collection of conceptually similar functions that provide services to the layer above it and receives services from the layer below it. On each layer an instance provides services to the instances at the layer above and requests service from the layer below. For example, a layer that provides error-free communications, across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of the path. Conceptually two instances at one layer are connected by a horizontal protocol connection on that layer.
Application Layer Defines interface to user processes for communication and data transfer in network Provides standardized services such as virtual terminal, file and job transfer and operations
This s the second layer of the OSI model, the Data Link layer. This layer deals with getting data across a specific medium and individual links by providing one or more data link connections between two network entities. End points are specifically identified, if required by the Network layer Sequencing. Its controls communications between the Network layer and the Physical Layer. The data link layer performs various functions depending upon the hardware protocol used, but has four primary functions: 1. Communication with the Network layer above.
Page | 52
2. Segmentation of upper layer datagrams (also called packets) into frames in sizes that can be handled by the communications hardware. 3. Bit Ordering. The data link layer organizes the pattern of data bits into frames before transmission. The frame formatting issues such as stop and start bits, bit order, parity and other functions are handled here. Management of big-endian / little-endian issues is also managed at this layer. 4. Communication with the Physical layer below This layer provides reliable transit of data across a physical link. The data link layer is concerned with physical addressing, network topology, physical link management, error notification, ordered delivery of frames, and flow control. It should be noted that in most modern network interface adaptors, the Physical and Data link functions are performed by the network interface adaptor. Presentation Layers Presentation layer is responsible for how an application formats the data to be sent out onto the network. The presentation layer basically allows an application to read the message. At the receiving end, this layer translates the intermediary format into a format useful to that computers Application layer. Also manages network security issues by providing services such as data encryption/de-encryption. Provides rules for data transfer and provides data compression/decompression to reduce the number of bits that need to be transmitted.
Examples of presentation layer Examples of presentation layer Encryption and decryption of a message for security Compression and expansion of a message so that it travels efficiently Content translation Graphics formatting
Session Layers The session layer provides various services, including tracking the number of bytes that each end of the session has acknowledged receiving from the other end of the session. This session layer allows applications functioning on devices to establish, manage, and terminate a dialog through a network. This layer also implements dialog control between to nodes regulating which side
Page | 53
transmits, when, for how long, and so on. Also this layer attempts to handle any errors generated by the upper layers Examples of Session layer Virtual connection between application entities Synchronization of data flow Creation of dialog units Connection parameter negotiations Partitioning of services into functional groups Acknowledgements of data received during a session Retransmission of data if it is not received by a device
Transport Layers The transport layer of the OSI model offers end-to-end communication between end devices through a network. Depending on the application, the transport layer either offers reliable, connection-oriented or connectionless, best-effort communications. This layer also implements dialog control between to nodes regulating which side transmits, when, for how long, and so on. Also this layer attempts to handle any errors generated by the upper layers. Examples of transport Layers Application identification Client-side entity identification Confirmation that the entire message arrived intact Segmentation of data for network transport Control of data flow to prevent memory overruns Establishment and maintenance of both ends of virtual circuits Transmission-error detection
Network layer
This is the third layer in the OSI Model Network layer is to translate network address into their physical counterparts and decides how to route data from the sender to the receiver. The network layer adds the concept of routing above the data link. When data arrives at the network layer, the source and destination addresses contained inside each frame are examine to determine if the data has reached its final destination. The network layer formats the data into
Page | 54
packets delivered to packets delivered to the transport layer. Otherwise the network layer updates the destination address and pushes the frame back down the lower layer. To support routing, the network layer maintains logical addresses such as IP address for device on the network. The network layer also manages the mapping between these logical address and physical address. In IP networking, this mapping is accomplished through the Address Resolution Protocol (ARP)
Page | 55
Page | 56
Page | 57
Click the plus sign for "Network Adapters." This shows the list of devices used for internet connections
Page | 58
Right-click on the network adapter and select "Uninstall driver" from the menu that appears next to your cursor Then click ok button.
Page | 59
Page | 60
Right-click on "My Computer," and select "Properties" from the menu that appears; it is the last item on the list. Access the "My Computer" icon on your desktop or from the Start menu. At the top of the System Properties window, click "Hardware." Click the "Device Manager" button. Click the plus sign for "Network Adapters." This shows the list of devices used for internet connections. Right click on the network adapter and select "Update driver" from the menu that appears next to your cursor. Select "Yes, this time only" by clicking on the radio button. Click on "Next" to continue. Confirm "Install the software automatically" is checked. Click the "Next" button. Close the window after the process has run. If prompted to do so, reboot your computer.
Page | 61
IEEE 802.N network 802.11n is an amendment which improves upon the previous 802.11 standards by adding multiple-input multiple-output antennas (MIMO). 802.11n operates on both the 2.4GHz and the lesser used 5 GHz bands. The IEEE has approved the amendment and it was published in October 2009 Prior to the final ratification, enterprises were already migrating to 802.11n networks based on the Wi-Fi Alliance's certification of products conforming to a 2007 draft of the 802.11n proposal. Data encoding The transmitter and receiver use precoding and postcoding techniques, respectively, to achieve the capacity of a MIMO link. Precoding includes spatial beamforming and spatial coding, where spatial beamforming improves the received signal quality at the decoding stage. Spatial coding can increase data throughput via spatial multiplexing and increase range by exploiting the spatial diversity, through techniques such as Alamouti coding.
Page | 62
Internet layer - equivalent to Network layer of the OSI Model. This layer holds the Internet Protocol, Internet Control Message Protocol, Internet Group Message Protocol, and Address Resolution Protocol. These protocols handle message routing and host address resolution.
Page | 63
Network Interface layer - equivalent to the Data Link and Physical layers of the OSI Model. This layer handles the formatting of data and transmission to the network wire.
no assurance that packets will be received in the correct sequence. This protocol does not guarantee that packets will be received at all. Provides no error checking or sequence numbering. UDP makes more efficient than TCP and renders it useful in situations where data must be transferred quickly such as live audio or video transmissions over the Internet. UDP header contains only four fields: source port, destination port, length, and checksum.
Page | 65
Task 19
Discuss the role of packets and how they are built up from their various components, giving an example where data packets are transmitted through different layers of the OSI modules.
Packet
Packet is a formatted unit of data. Packets transmit data as a series of bytes, characters or bits alone. Data is formatted into packets bit rate of communication medium can shared among users. Network breaks an e-mail message into parts of a certain size in bytes call packets. Each packet carries information that helps it get to its destination sender's IP address, intended receiver's IP address, tells the network how many packets has been broken into and number of this particular packet. Packets carry data in protocols that Internet uses: Transmission Control Protocol/Internet Protocol. Each packet contains part of body of message. A typical packet contains perhaps 1,000 or 1,500 bytes. Each packet is then sent off to its destination by best available route a route that might be taken by all other packets in the message. This makes the network more efficient. Network can balance load across various pieces of equipment on a millisecond-by-millisecond basis. If there is a problem with one piece of equipment in the network while a message is being transferred packets can be routed around the problem ensuring the delivery of entire message. Depending on type of network packets may be referred:
Packet framing
Packet consists of two kinds of data: control information and user data. Control information provides data network needs to deliver user data source and destination addresses, error detection
Page | 66
codes like checksums and sequencing information. Control information is found in packet headers and trailers with user data in between. Different communications protocols use different conventions for distinguishing between elements and for formatting data. Ethernet establish start of header and data elements by their location relative to start of packet. Some protocols format information at a bit level instead of a byte level. Network design can achieve two major results by using packets: error detection and multiple hosts addressing.
Error detection
Calculate a checksum or cyclic redundancy check over contents of a packet than to check errors using character-by-character parity bit checking. Packet trailer often contains error checking data to detect errors that occur during transmission.
Host addressing
Packet header contains addressing information that packet is received by correct host computer. In complex networks constructed of multiple routing and switching nodes a series of packets sent from one host computer to another may follow different routes to reach the same destination called packet switching
Structure
Structure of a packet depends on type of packet it is and on protocol. Packet has a header and a payload. Header keeps overhead information about packet service and other transmission related things. Payload is data it carries. IP packet includes The source IP address The destination IP address The sequence number of the packets
Page | 67
Originating address Payload - called body is actual data that packet is delivering to destination. If a packet is fixed length then payload may be padded with blank information to make it right size.
Trailer - called footer contains a couple of bits that tell receiving device that it has reached end of packet. It has type of error checking. Common error checking used in packets is Cyclic Redundancy Check. It takes sum of all 1s in payload and adds them together. Result is stored as a hexadecimal value in trailer. Receiving device adds up 1s in payload and compares result to value stored in trailer. If values match packet is good. If values do not match receiving device sends a request to originating device to resend packet
Page | 68
Start process by creating a document and sending it through inter-office mail to a translator.Interoffice mail represents application layer of OSI model where connection between an application and network software is made.
Page | 69
Next stage is presentation layer where text is translated into recipients language. In OSI model source and destination clients choose common communication syntax at this layer.
Next document goes to mail room where destination address is checked to make sure that service delivers to that area and then document is put into an envelope. This is similar to session layer of OSI model where connection is made between sending and receiving clients. If guaranteed delivery of letter a tracking number is assigned to it.
Page | 70
In OSI model transport layer is where a reliable or unreliable protocol is chosen. Address is then added to the envelope
Page | 71
Next step is where a secure seal is applied to envelope and type of transportation is chosen. In OSI model data-link layer is where packet is put into correct format for transmission.
Physical layer is last stage. Envelope is put on an airplane and taken to its destination. This is similar to putting the packet onto network cable at physical layer of OSI model
Page | 72
When put seven stages together seven layers of OSI model. Applied to a network OSI model defines following functions At application layer network access is provided to applications such as ability of word processor to load files from a server or to send a document to a print device.
At presentation layer client computers that are communicating with each other choose best syntax that they have in common.
Page | 73
At transport layer either a reliable or unreliable protocol is chosen to make connection to recipient depending on which type is needed by communicating clients
At network layer destination address is added to each packet. Wh e n a reliable connection is made at transport layer protocols at network layer do tracking and checking needed to ensure connection's reliability
Page | 74
At data-link layer packet that has been assembled at previous layers is prepared for transmission over networking hardware.
At physical layer information about networking hardware is used to send packet out onto the network. Process works in opposite way on the client that receives packet.
Page | 75
OSI model is divided into seven layers. Each layer represents a different stage in process of preparing data for transmission over a network. Process starts at application layer on sending host where applications are connected to networking software. Data to be sent is put into a packet that passes down through each layer accumulating routing and tracking information until it reaches physical layer accumulating routing and tracking information until it reaches the physical layer where it is sent out over network to its destination. Information being transferred from a software application in one computer to an application in other proceeds through OSI layers. If software application in computer A has information to pass to a software application in computer B application program in computer A needs to pass information to application layer of computer A which then passes information to presentation layer which relays data to session layer and so on all way down to physical layer. At physical layer data is placed on physical network medium and is sent across medium to computer B. physical layer of computer B receives data from physical medium and then its physical layer passes information up to data link layer which relays it to network layer and until it reaches application layer of computer B. Finally application layer of computer B passes information to recipient application program to complete communication process. Following diagram illustrated this process.
Page | 76
Application layer: Provides a means for user to access information on network through an application. This layer is main interface for user to interact with application and therefore network. Application layer is OSI layer closest to end user which means both OSI application layer and user interact directly with software application. This layer interacts with software applications that implement a communicating component. Application layer functions typically include identifying communication partners, determining resource availability and synchronizing communication.
Page | 77
Task 20
The protocols and functions Protocols are rules and procedures of communication. For example, diplomats of countries acceding to the Protocol to guide the interaction with diplomats from other countries. The use of communication rules is applied in the same way in the environment. When multiple computers are networked, technical standards and procedures that must be there to govern their interaction and communication, called protocols. There are three things to consider when thinking about the protocols in a network environment: 1. There are many protocols. While each protocol allows basic communication, as they have different purposes and different tasks. Each protocol has its own advantages and limitations. 2. Some work on OSI layer protocols (see my article "The OSI Reference Model"). Layer protocol that performs its function. For example, a certain protocol works in the physical layer, which means that the protocol layer ensures that the data packet through the network card and out on the cable network. 3. Several protocols can work together in what is known as a protocol stack or suite (eg, TCP / IP or TCP / IP). As a network incorporates functions at each layer of the OSI model, different protocols are also working together at various levels in the protocol stack only. Levels in the map of the protocol stack and corresponding to the layers of the OSI model. Overall, the protocol describes the features and capabilities of the entire stack. How the protocols work? All technical data transmission over the network should be divided into systematic steps. At each stage, certain actions are taking place, you can not take any other step. Each stage has its own rules and procedures or protocols. Steps to be performed in a consistent order which is the same on all computers on the network. On the source computer, these measures must be carried up and down. On the target machine, such measures should be upward.
Page | 78
Seven layers of the OSI reference model, each of those layers has a responsibility. The seven layers of the OSI model are numbered below: *.Layer 1 = Application Layer *.Layer 2 = Presentation Layer *.Layer 3 = Session Layer *.Layer 4 = Transport Layer *.Layer 5 = Network Layer *.Layer 6 = Data Link Layer *.Layer 7 = Physical Layer Layer 1: Presentation Layer The presentation layer presents the data into a uniform format and masks the difference of data format between two dissimilar systems. It also translates the data from application to the network format. Presentation layer is also responsible for the protocol conversion, encryption, decryption and data compression. Presentation layer is a best layer for cryptography. Network Devices: Gateway Redirector is operates on the presentation layer. MIDI HTML GIF TIFF JPEG ASCII EBCDIC Layer 2: Session Layer Session layer establish and manages the session between the two users at different ends in a network. Session layer also manages who can transfer the data in a certain amount of time and for how long. The examples of session layers and the interactive logins and file transfer sessions. Session layer reconnect the session if it disconnects. It also reports and logs and upper layer errors. RPC Eg: SQL, NetBIOS names, AppleTalk ASP, Decent SC Layer 3: Transport Layer Transport layer manages end to end message delivery in a network and also provides the error checking and hence guarantees that no duplication or errors are occurring in the data transfers across the network. Transport layer also provides the acknowledgement of the successful data transmission and retransmits the data if no error free data was transferred.
Page | 79
It also provides and error handling and connectionless oriented data deliver in the network. TCP UDP , SPX . Layer 4: Network Layer The network layer determines that how data transmits between the network devices. It also translates the logical address into the physical address e.g. computer name into MAC address. It is also responsible for defining the route, managing the network problems and addressing. Router works on the network layer and if a sending device does not break the data into the similar packets as the receiving device then network layer split the data into the smaller units and at the receiving end the network layer reassemble the data. AppleTalk DDP IP IPX Decent
Data Link Layer 2 This layer deals with getting data across a specific medium and individual links by providing one or more data link connections between two network entities. End points are specifically identified, if required by the Network layer Sequencing. The frames are maintained in the correct sequence and there are facilities for Flow control and Quality of Service parameters such as Throughput, Service Availability and Transit Delay. IEEE 802.2 IEEE 802.3 802.5 - Token Ring HDLC Frame Relay FDDI ATM PPP Layer 6: Physical Layer Physical layer defines and cables, network cards and physical aspects. It defines raw bit stream on the physical media. It also provides the interface between network and network communication devices. It is also responsible for how many volts for 0 and how many for 1.
Page | 80
Physical layer also checks the number of bits transmitted per second and two ways or one way transmission. Physical layer also dealing with the optical, mechanical and electrical features. Protocols: Protocols that work on the physical layer are ISDN, IEEE 802 and IEEE 802.2 Network Devices: Hubs, Repeaters, Oscilloscope and Amplifier works on the network devices. V.24 V.35 EIA/TIA-232 EIA/TIA-449 FDDI 802.3 802.5 Layer 7: Application Layer The application layer defines the interfaces for communication and data transfer. This layer also provides and support services such as job transfer, handles network access, email, supports user applications and error recovery. Protocols: FTP, DNS, SNMP, SMTP, FINGER, TELNET, TFTP, BOOTP and SMB protocol are operated on the application layer. Network Devices: Gateway network device is operated on the application layer FTP DNS SNMP SMTP gateways Web browser Network File System (NFS)
Page | 81
Task 21
The Sending Computer: At the sending computer, the protocol: - Breaks the data into smaller sections, called packets that the protocol can handle. - Adds addressing information to the packets so the destination computer on the network will know the data belongs to it. - Prepares the data for actual transmission through the network adapter card and out onto the network cable. The Receiving Computer: At the receiving computer, a protocol carries out the same series of steps in reverse order. The receiving computer: - Takes the data packets off the cable. - Brings the data packets into the computer through the network adapter card.
Page | 82
- Strips the data packets of all of the transmitting information added by the sending computer. - Copies the data from the packets to buffer for reassembly. - Passes the reassembled data to the application in a usable form. Both sending and the receiving computers need to perform each step the same way so that the data will look the same when it is received as it did when it was sent. Use same protocol on all computers, or at least bind the protocols in the same manner. For example, two protocols might both break data into packets and add on various sequencing timing, and error checking information, but they will each do it differently. Therefore, a computer using one of these protocols will not be able to communicate successfully with a computer using the other protocol. TCP protocol operations can be divided into three phases. Connections must be properly implemented in a process of negotiation steps (handshake) before entering the phase of data transfer. After data transmission is completed, the completion of the connection closes established virtual circuits and frees all allocated resources. A TCP connection is managed by an operating system via a local program, a point of communication, making the Internet. During the lifetime of a TCP connection is subjected to a series of state changes LISTEN: For a server, waiting for a connection request from any remote client. SYNSENT: waiting for remote connection to send a TCP segment with the SYN and ACK. (Usually set by TCP clients) SYN-RECEIVED: waiting for remote connection to send an acknowledgment after sending an acknowledgment of connection to the remote host. (Usually TCP servers) Established: the port is ready to receive / send data from / to the remote end. FIN-WAIT-1: FIN-WAIT-2: Indicates that the client is waiting for the server segment of the fin (which indicates the application process servers ready to close and the server is ready to start, which is part of the termination of the connection ) CLOSE-WAIT:
Page | 83
LAST-ACK: indicates that the server is currently sending its own FIN segment (which indicates the process of application server is about to close and the server is ready to start, which is part of the termination of the connection ) TIME-WAIT: Waiting is enough time to ensure that the distance between pairs of recognition received from the receipt of your cancellation request. According to RFC 793 for a connection can remain in the waiting time for a maximum of four minutes known as the MSL (maximum life of segment). CLOSED: The connection is closed
Page | 84
Conclusion
In the task 01 it says about what is all about a network architecture if further describe about it, A network architecture in which each computer or process on the network is either a client or a server. The Servers are powerful computers or processes dedicated to managing disk drives printers or network traffic. You can improve efficiency by sharing information, such as common files, databases and enterprise applications software in a computer network. The task 02 is all about the typical computing model for many applications is a client / server model. A server computer usually has enormous resources and responds to requests for resources and data from client computers. Client computers initiate requests for resources or data servers. Network client / server application, a computer as a server - where to get the shared files and programs are - that connect to other computers. Typically, several client computers are connected through a network to a server which could be a large PC, minicomputer, or a mainframe computer. Every computer connected to a website acts as a client while the website's computer acts as a server. Also called client server environment. The client connects to the server on this well-known network address. Task 03 describes about A network architecture in which each computer or process on the network is either a client or a server. Servers are powerful computers or processes dedicated to managing disk drives, printers or network traffic. Servers commonly contain data files and applications that can be accessed across the network Client-server architecture by using the server as a storage device for applications and requiring the clients to log in to the server in order to use those applications. Networks have a client-server architecture in which the server acts as a processing power source.
Task 05 contains about all Network topologies these can be described as a physical interconnection of various element of a computer network like cables, computers, and other peripherals. Network Topologies can be physical or logical. First we have discussed about identified the difference of peer to peer and Client server and about the function and its relationship between the Client and server. We analyze about the advantages of the client server. Then we selected design LAN for all factories. Then we have
Page | 85
given the all hardware and software devices to need for implement the head office. And There I have mention about Performance, Cost, Size and Growth, Management Benefits it. We have given the proper Cabling and I have given functionality of the Network Interface cards. There I have given the installing procedure of NetBIOS.
After that we have detailing about the signaling methods and its Characteristics. Then we have defined about the OSI models and we have given the Examples for transmission between different OSI layers. The other one is we have explain about the comparison of transmission between layers of OSI model and Protocols Stacks and we have chooses one for our organization. Therefore we have selected the TCP/IP, but there we have explained about the NetBIOS. We have listed down the definitions of IEEE 802.3 and IEEE 803.11. There we have explained about detailed operation of different IEEE 802.N network. We have explained about the role of data Packets in the networking and we have given the transmitted through the each layer. And we have explained about the role of protocols at different layers and what are the functions of these specific protocols.
Page | 86