Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
This paper aims to provide a broad review of computer networking. It is a subject too
wide ranging to coverage. Computer Networks have become an essential tool in
many aspects: human communication, gathering, exchange and sharing of
information, distributed work environments, access to remote resources (data and
computing power) and many more.
Starting from an historical overview, this paper will give an introduction to the
underlying ideas and technologies. The second half will concentrate on the most
commonly used network technology today (Ethernet and TCP/IP) and give an
introduction to the communication mechanisms used.
PREFACE
The six week training is a part of our B.Tech E.C.E. Training mainly
aims at making one aware of real practical environment ,which means
that one get to know the limitations ,constraints and freedom under
which an engineer works . One also get an opportunity to watch from
close quarter that indicates manager relation .This training mainly
involves the information about network, how connection is done among
the systems.
During this period the student get the real first hand experience for
working in the actual environment .Most of the theoretical knowledge
that has been gained during the course of their studies is put to test here.
INFOWIZ was formed in 2011 with the mission to provide Industrial training to
aspiring Engineersand technical
support to industries. Within a short span of 2 years “Infowiz” has become one
of the leading organizations which
offer state of art professional IT solutions, Industrial trainings, technical support
and consultancy to software
companies in India and abroad. Due to quality assurance and high level of
commitments in our services, we have
won quite a few accolades and are associated with reputed universities and
popular corporates, in the field.We
strive to impart personalized, professional and contemporary experiential
trainings on all theengineering streams
that are necessary for the career, success and growth for both students &
industry respectively.Founded as industrial lab for providing industrial training
to undergraduate engineers, “Infowiz” has grown
progressively to become vertically integrated company in the industrial training
arena. The core business
of the company is to deliver range of industrial trainings in various engineering
streams to students, IT
solutions, software consultancy and support to small and big companies.
‘Infowiz’ enjoys the distinction of
being Unique & Positive in the tri-city (Chandigarh, Panchkula Mohali) with
extensive steams of softwares
& engineering subjects. “Infowiz” is in a strong position to work with reputed
Universities and Corporates
CONTENTS
S.NO DESCRIPTION PAGE
NO.
Acknowledgement 2
Abstract 3
Preface 4
Company profile 5
1) CHAPTER-1(Introduction to computer network) 6
1.1 Local area network 7
1.2 Metropolitan area network 8
1.3 Wide area network 8-10
1.4 Advantages of computer network 11-14
1.5 Disadvantages of computer network 15
2) CHAPTER-2(Topologies in network) 16
2.1 Bus topology 16
2.2 Star topology 17
2.3 Ring topology 17
2.4 Tree topology 18
3.4 Firewall 29
3.5 Repeater 30
3.6 Cables 30
4 CHAPTER-4(IP Addressing0 35
4.3 Masking 37
4.4 Private IP 38
5) CHAPTER-5(Network model) 39
6 CHAPTER-6(SIMULATOR) 43
8 CHAPTER-8(Project) 48
9 Conclusion 53
10 Future scope 54
CHAPTER-1
Introduction to Network
A network consists of a collection of devices that is connected together so that they
can communicate and share information .These devices are computers ,smart-phone
,routers, switches, WI-FI etc.
A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.
Figure 2.1
TYPES OF NETWORK
1. LAN(Local area network)
2. MAN(Metropolitan area network)
3. WAN(wide area network)
A Local Area Network (LAN) is a network that is confined to a relatively small area.
It is generally limited to a geographic area such as a writing lab, school, or building.
Computers connected to a network are broadly categorized as servers or workstations.
Servers are generally not used by humans directly, but rather run continuously to
provide "services" to the other computers (and their human users) on the network.
Services provided can include printing and faxing, software hosting, file storage and
sharing, messaging, data storage and retrieval, complete access control (security) for
the network's resources, and many others.
Workstations are called such because they typically do have a human user which
interacts with the network through them. Workstations were traditionally considered a
desktop, consisting of a computer, keyboard, display, and mouse, or a laptop, with
integrated keyboard, display, and touchpad. With the advent of the tablet computer,
and the touch screen devices such as iPad and iPhone, our definition of workstation is
quickly evolving to include those devices, because of their ability to interact with the
network and utilize network services. Servers tend to be more powerful than
workstations, although configurations are guided by needs.
For example, a group of servers might be located in a secure area, away from humans,
and only accessed through the network. In such cases, it would be common for the
servers to operate without a dedicated display or keyboard. However, the size and
speed of the server's processor(s), hard drive, and main memory might add
dramatically to the cost of the system.
On the other hand, a workstation might not need as much storage or working memory,
but might require an expensive display to accommodate the needs of its user. Every
computer on a network should be appropriately configured for its use.
On a single LAN, computers and servers may be connected by cables or wirelessly.
Wireless access to a wired network is made possible by wireless access points
(WAPs). These WAP devices provide a bridge between computers and networks. A
typical WAP might have the theoretical capacity to connect hundreds or even
thousands of wireless users to a network, although practical capacity might be far
less.Nearly always servers will be connected by cables to the network, because the
cable connections remain the fastest. Workstations which are stationary (desktops) are
also usually connected by a cable to the network, although the cost of wireless
adapters has dropped to the point that, when installing workstations in an existing
facility with inadequate wiring, it can be easier and less expensive to use wireless for
a desktop.
Figure-2.2
MANs are extremely efficient and provide fast communication via high-speed
carriers, such as fiber optic cables.
A metropolitan area network (MAN) is similar to a local area network (LAN) but
spans an entire city or campus. MANs are formed by connecting multiple LANs.
Thus, MANs are larger than LANs but smaller than wide area networks (WAN).
MANs are extremely efficient and provide fast communication via high-speed
carriers, such as fiber optic cables.
Distributed Queue Dual Bus (DQDB) is the MAN standard specified by the Institute
Of Electrical And Electronics Engineers (IEEE) as IEEE 802.6. Using this standard, a
MAN extends up to 30-40 km, or 20-25 miles.
MAN is designed for customers who need a high-speed connectivity. Speeds of MAN
ranges in terms of Mbps. It’s hard to design and maintain a Metropolitan Area
Network.
The fault tolerance of a MAN is less and also there is more congestion in the network.
It is costly and may or may not be owned by a single organization. The data transfer
rate and the propagation delay of MAN is moderate. Devices used for transmission of
data through MAN are: Modem and Wire/Cable. Examples of a MAN are the part of
the telephone company network that can provide a high-speed DSL line to the
customer or the cable TV network in a city.
Figure2.3
A WAN connects more than one LAN and is used for larger geographical areas.
WANs are similar to a banking system, where hundreds of branches in different cities
are connected with each other in order to share their official data.
A WAN works in a similar fashion to a LAN, just on a larger scale. Typically, TCP/IP
is the protocol used for a WAN in combination with devices such as routers, switches,
firewalls and modems.
Wide Area Networks (WANs) connect networks in larger geographic areas, such as
Florida, the United States, or the world. Dedicated transoceanic cabling or satellite
uplinks may be used to connect this type of global network.
WAN, the popular word in network, refer to wide area network, is a network which is
used to connect different local area networks (LAN). Local area networks are
connected to one another through a device called router. There may be used many
router to connect large amount of LANs.
Using a WAN, schools in Florida can communicate with places like Tokyo in a matter
of seconds, without paying enormous phone bills. Two users a half-world apart with
workstations equipped with microphones and a webcams might teleconference in real
time. A WAN is complicated. It uses multiplexers, bridges, and routers to connect
local and metropolitan networks to global communications networks like the Internet.
To users, however, a WAN will not appear to be much different than a LAN.
The big example of wide area network is internet. On internet we transfer files from
one computer to other. There is ftp, http and https protocols are used to transfer files
on the internet. Ftp stands for file transfer protocol.
Example of Wide area network (WAN)
Internet is the example of WAN.
A WAN covers a large geographical area. Most WANs are made from several LANs
connected together.
LANs are often connected to WANs, for example a school network could be
connected to the Internet.
WANs can be connected together using the Internet, leased lines or satellite links.
2.4) ADVANTAGES OF COMPUTER NETWORK
CHAPTER-2
TOPOLOGIES IN NETWORK
Network topology is the arrangement of the elements (links, nodes, etc.) of a
communication network. A wide variety of physical topologies have been used in
LANs, including ring, bus, mesh and star. Conversely, mapping the data flow between
the components determines the logical topology of the network.
Figure3.1
2.2) Star Topology: All the nodes in the network are connected to a central
device like a hub or switch via cables. Failure of individual nodes or cables does not
necessarily create downtime in the network but the failure of a central device can.
This topology is the most preferred and popular model.
Figure3.2
2.4) Tree Topology: A root node is connected to two or more sub-level nodes,
which themselves are connected hierarchically to sub-level nodes. Physically, the tree
topology is similar to bus and star topologies; the network backbone may have a bus
topology, while the low-level nodes connect using star topology.
Figure3.4
2.5) Mesh Topology: The topology in each node is directly connected to some
or all the other nodes present in the network. This redundancy makes the network
highly fault tolerant but the escalated costs may limit this topology to highly critical
network
CHAPTER -3
NETWORKING DEVICES
Different networking devices have different roles to play in a computer network.
These network devices also work at different segments of a computer network
performing different works
A switch also works at the layer of LAN (Local Area Network) but you can say that a
switch is more intelligent than a hub. While hub just does the work of data
forwarding, a switch does 'filter and forwarding' which is a more intelligent way of
dealing with the data packets.
So, when a packet is received at one of the interfaces of the switch, it filters the packet
and sends only to the interface of the intended receiver. For this purpose, a switch also
maintains a CAM (Content Addressable Memory) table and has its own system
configuration and memory. CAM table is also called as forwarding table or
forwarding information base (FIB).
In a network, a switch is a device that channels incoming data from any of multiple
input ports to the specific output port that will take it toward its intended destination.
Figure 4.1
TYPES OF SWITCH :-
a) Circuit switched network
b) Packet switched network
Circuit Switching establishes a physical path between the sender and receiver of the
message before a message is delivered. When a connection is established between a
sender and a receiver, the entire message travels through the established path from
sender to the receiver. Once the message is delivered to the receiver, the source
informs the network about the completion of transmission and all the switches
released. Then the link and other connecting devices are used to set up another
connection.
circuit switching is always implemented at the Physical Layer. Circuit switching can
be explained with an example of a telephone conversation. In a telephone
conversation, once a connection is established, between a caller and the receiver, it
remains connected, till the whole conversation is finished and both the caller and
receiver hang up their phone.
Figure4.1.1
Packet Switching is always implemented at the Network Layer. Packet switching has
two approaches Datagram Approach and Virtual Circuit Approach. In Datagram
Approach each packet is independent of other though they belong to the same
message and may also choose a different path to reach the destination. In Virtual
Circuit Approach, the relationship between the packets that belong to the same
message is preserved as the packet are not independent of each other, and all the
packets that belong to a particular message follow the same route to travel to the
destination.
Figure4.1.2
A network hub is a device that allows the multiple computes to communicate with
each other over a network. It has several Ethernet ports that are used to connect two or
more network device together, while switches send incoming data to a specific port,
hubs broadcast all incoming data to all active ports.
A hub is a device that only operates on a physical layer. Signals that carry information
within a network can travel a fixed distance before attenuation endangers the integrity
of the data. Hub doesn't have a link layer address and does not check the link layer
address of received frame.
Network Hub is a networking device which is used to connect multiple network hosts.
A network hub is also used to do data transfer. The data is transferred in terms of
packets on a computer network. So when a host sends a data packet to a network hub,
the hub copies the data packet to all of its ports connected to. Like this, all the ports
know about the data and the port for whom the packet is intended, claims the packet.
However, because of its working mechanism, a hub is not so secure and safe.
Moreover, copying the data packets on all the interfaces or ports makes it slower and
more congested which led to the use of network switch.
Figure4.2
Network HUB
TYPES OF HUB:
1. ACTIVE HUB: These are the hubs which have their own power supply.
2. PASSIVE HUB: these are the hubs which collect wiring from nodes and power
supply from active hub.
3.3 NETWORK ROUTERING
It is a process of addressing routes in a router which are directly or indirectly with it
in different cases. It is also known as router advertisement.
A router is hardware device designed to receive, analyze and move incoming packets
to another network. It may also be used to convert the packets to another network
interface, drop them, and perform other actions relating to a network. The picture
shows the Linksys BEFSR11 wireless router and is what many home routers
resemble. A router has a lot more capabilities than other network devices, such as
a hub or a switch that are only able to perform basic network functions. For example,
a hub is often used to transfer data between computers or network devices, but does
not analyze or do anything with the data it is transferring. By contrast, routers can
analyze the data being sent over a network, change how it is packaged, and send it to
another network or over a different network. For example, routers are commonly used
in home networks to share a single Internet connection between multiple computers.
Static routing
Dynamic routing
3.4 STATIC ROUTING:-
It is a method in which network engine does manual configuration. The routing does
not change the automatically. It is good for small organization. It is used in a one way
communication.
3.4) FIREWALL
Firewalls can be either hardware or software but the ideal configuration will consist of
both. In addition to limiting access to your computer and network, a firewall is also
useful for allowing remote access to a private network through secure authentication
certificates and logins.
Hardware firewalls can be purchased as a stand-alone product but are typically found
in broadband routers, and should be considered an important part of your system
security and network set-up. Most hardware firewalls will have a minimum of four
network ports to connect other computers, but for larger networks, a business
networking firewall solution is available.
Software firewalls are installed on your computer, like any software program, and you
can customize it; allowing you some control over its function and protection features.
A software firewall will protect your computer from outside attempts to control or
gain access your computer.
3.5 REPEATERS
Repeaters are used to regenerate the signal over the same network before the
signal becomes too weak or corrupted so as to extend the length to which the
signal can be transmitted over the same network.
Figure 4.5
3.6 CABLES:-
These are used to connect computers or other devices in a network. There are many
types of cables used with LAN as :-
3.6.1 Coaxial Cable- Coaxial cable is a type of cable that has an inner conductor
surrounded by insulating layer and enclosed by conducting shield. It is used as a
transmission line for radio frequency signals. It is difficult to install coaxial cabling.
Types:-
a) Thick coaxial- Thick coaxial cable also referred to as thick net. 10Base5 is the
specification of coaxial cable carrying Ethernet signals. It has extra protective plastic
cover. b) Thin coaxial- Thin coaxial cable is also referred to as thinnet.10Base2
refers to the specification for thin coaxial cable carrying ethernet signals. It is popular
in school networks.
Figure-4.6.1
Figure-4.6.2
b) Connect 2 routers/switches
Both sides of a cable have different wire arrangement.
SIDE A SIDE B
2. Orange Green
4. Blue Blue
6. Green Orange
8. Brown Brown
SIDE A SIDE B
2. Orange Orange
4. Blue Blue
6. Green Green
8. Brown Brown
CHAPTER-4
IP ADDRESSING
Every machine on the internet has a unique identifying number, called an IP Address.
A typical; IP address looks like this:
216.27.61.45
IP ADDRESS is a 32-bit number, usually written in dotted decimal form, that
uniquely identifies an interface of some computer. This 32-bit number is divided into
4 octets each separated by a decimal. Out so many values certain values are restricted
for use as typical IP address. For example, the IP address 0.0.0.0 is reserved for the
default network and the address 255.255.255.255is used for broadcast.
We use Private IP Address in LAN which is provided by IANA (INTERNET
ASSIGNING NUMBERING AUTHOURTIY). The Minimum Value (Per Octet) is
0 and the Maximum Value is 255. IP Address are Divided in Five Classes.
Each IP address is split into 2 sections:
1) Network address
2) Host address
Physical Address-
1. It is also called Hardware Address or MAC Address. MAC stands for "Media
Access Control".
2. It is present in the Chip of a NIC Card.
3. It is Unique for every NIC Card and cannot be Changed.
4. It is 48-Bits. Out of 48-Bits, 24-Bits of Address is given by the Manufacturer of
NIC Card and the Remaining 24-Bits of Address is defined as per Instructions
given by IEEE.
5. IEEE stands for "Institute of Electronics and Electrical Engineers".
Logical Address-
CLASSES OF IPv4 :
LOOPBACK 127 -- -- --
B 128-191 16 16 255.255.0.0
C 192-223 32 8 255.255.255.0
4.3 MASKING
Computers use a mask to define size of network and host part of an address. Mask is a
32-bit number written in dotted decimal form. It provides us the network address
when we perform a Boolean AND of mask with the IP address. It also defines number
of host bits in an address.
4.5 SUBNETTING
Basically it is a process of subdividing networks into smaller subnets.
In case we have 2-3 small networks but we can’t buy IP address for each and every
network. So here we use the basic concept of SUBNETTING i.e. using one public IP
address we will give them IP address and make them independent networks. For this
we take some bits of host address and use them for network address so we have
different independent networks
Address Format when sub netting Is Used (class A, B, C resp.):-
8 24-x x
Network Subnet Host
16 16-x x
Network Subnet Host
24 8-x x
Network Subnet Host
And due to this mask changes to subnet mask and now the network address also
includes subnet address.
CHAPTER-5
NETWORK MODEL
The Simulator that we have used to Create a Simulation of the Network Design of the
Project is CISCO PACKET TRACER 7.1.0.0222
Figure 7.1
Packet Tracer is an Integrated Simulation, Visualization, Collaboration, and
Assessment Environment. Packet Tracer Supports Student and Instructor creation of
Simulations, Visualizations, and Animations of Networking Phenomena.
Like any Simulation, Packet Tracer Relies on a Simplified Model of Networking
Devices and Protocols. Real Computer Networks, Experienced both in-Person/Hands-
on and Remotely, remain the Benchmark for understanding Network Behavior and
Developing Networking Skills. Packet Tracer was created to help Address the Digital
Divide in Networking Education, where many Students and Teachers Lack Access to
Equipment, Bandwidth, and Interactive Modes of Learning Networking.
Figure 7.2
CHAPTER-7
CONFIGURATION OF ROUTER AND SWITCH
1. ROUTER CONFIGURATION :-
a) CONFIGURATION FOR HOST NAM E
Router>
Router>enable
Router#conf terminal
Router(config)#hostname ABC
ABC(config)#exit
ABC#exit
ABC>
Router> enable
Router# Configure Terminal
Router(Config)# Hostname R1
R1(Config)# Interface FastEthernet 0/0
R1(Config-If)# IP Address 192.168.1.1 255.255.255.252
R1(Config-If)# No Shutdown
R1(Config-If)# Exit
2. SWITCH CONFIGURATION :-
a) CONFIGURATION FOR HOST NAM E
switch>
switch >enable
switch #conf terminal
switch (config)#hostname ABC
ABC(config)#exit
ABC#exit
ABC>
CHAPTER-8
PROJECT
PROJECT
How the system is setup
In this project we will create company LAN network; we will create the better
communication network with its security requirement, first we major and analysis
the all network requirement and make the planning for future reference.
The most vital stage in introducing and utilizing a system is the arranging. From the
kind of association utilized through to the manner in which the system is utilized, the
arranging is a key component.
Building up the right learning and the correct practices when introducing the system
can spare time in a bad position shooting problems. Shared web assets and office
assets for example printers can drastically decrease the running expenses of an
association.
Reveal your independent venture's prerequisites for execution, limit and system
ports. Meet with associates from every region of your organization to comprehend
their application and potential Extension prerequisites.
Neighborhood bolster a solitary area, similar to an office or building, utilizing
switches that give ports to associate servers, stockpiling equipment, PCs, telephones
and printers to the system. The LAN itself comprises of cabling, switches and
switches that give availability to the Internet just as extra areas, whenever required,
and steering between LAN fragments.
Plan and structure the link format. Cabling has an imperative impact of system
structure as it gives the physical correspondence way to your assembling
organization.
Counsel with a link plan proficient experienced in assembling territories to limit the
potential for hardware obstruction. Counseling with a link organization gives genuine
feelings of serenity that you've arranged the right sort of link and included flame
code particulars.
Designing
We will design the basic LAN network of company. IN this designing we use the some
network devices such as routers, switch, and telecommunication devices, voice and
radio.Make a spreadsheet to accumulate key subtleties required for the structure.
Data gathered must incorporate the quantity of clients per area, their jobs, LAN port
rates and hub types, for example, printers and any equipment that will be associated
with the system.
Other system necessities incorporate programmable rationale controllers for
mechanical autonomy or other mechanized frameworks requiring system network.
Arrange the spreadsheet by posting physical areas over the best segments and
making column classifications for clients.
Rundown the all out number of clients per site and order type, for example, office,
designing and assembling.
Another order segment should address the PC room, recognizing every server and
the applications facilitated, just as working frameworks and system card speeds.
Likewise archive the PC room's natural administrations for cooling, electrical limit
and controls to screen mugginess and temperature levels.
Building & Configuration Command :-
Router0 Configuration Command
Router>Enable
Router#Configure Terminal
Router(config)#Hostname Router0
Router0(config)#Interface Serial 0/3/0
Router0(config-if)#IP Address 10.0.0.1 255.0.0.0
Router0(config-if)#No Shutdown
Router0(config-if)#Exit
Router0(config)#Interface Serial 0/3/1
Router0(config-if)#IP Address 20.0.0.1 255.0.0.0
Router0(config-if)#No Shutdown
Router0(config-if)#Exit
Router0(config)#Interface Serial 0/2/0
Router0(config-if)#IP Address 30.0.0.1 255.0.0.0
Router0(config-if)#No Shutdown
Router0(config-if)#Exit
Router0(config)#Interface serial 0/2/1
Router0(config-if)#IP Address 40.0.0.1 255.0.0.0
Router0(config-if)#No Shutdown
Router0(config-if)#Exit
Switchport Port-Security
Switch>Enable
Switch#Configure Terminal
Switch(config)#Hostname Router5Switch
Router5Switch(config)#Interface FastEthernet 0/2
Router5Switch(config-if)#Switchport Mode Access
Router5Switch(config-if)#Switchport Port-security
Router5Switch(config-if)#Switchport Port-security Maximum 1
Router5Switch(config-if)#Switchport Port-security Mac-address Sticky
Router5Switch(config-if)#Switchport Port-security Violation Shutdown
Router5Switch(config-if)#Exit
Switch(config)#Hostname Router10Switch
Router10Switch(config)#Vlan 4
Router10Switch(config-vlan)#Name 4
Router10Switch(config-vlan)#Exit
Router10Switch(config)#Vlan 5
Router10Switch(config-vlan)#Name 5
Router10Switch(config-vlan)#Exit
Router10Switch(config)#Interface Range FastEthernet 0/1 - 2
Router10Switch(config-if-range)#Switchport Mode Access
Router10Switch(config-if-range)#Switchport Access Vlan 4
Router10Switch(config-if-range)#Exit
Router10Switch(config)#Interface Range FastEthernet 0/4 - 5
Router10Switch(config-if-range)#Switchport Mode Access
Router10Switch(config-if-range)#Switchport Access Vlan 5
Router10Switch(config-if-range)#Exit
This provided the company to have meetings overseas by video conferencing and sharing data over
the network. As you can see, Networks have many benefits to the end user. Weather your Network
is Wired or Wireless, Networks area important part of technology.
FUTURE SCOPE
1. Network administrator
2. Network system engineer
3. Network system technician