You are on page 1of 39

Computer network project showing a

Office Network
INDEX

1. Abstract
2. Keywords
3. Introduction
4. Technology used
5. Architecture
6. Working of project
7. Requirements

 Hardware

 Software
8.Description

 Protocols used

 Topology used
9.Scope
10.Reference
Abstract
The need for computer networking was borne out of the need to use personal
computers for sharing information within an organization in form of messages,
sharing files and databases and so forth. Whether the organization is located in
one building or spread over a large campus, the need for networking the
computers cannot be over emphasized. As the name implies, a Local Area
Network (LAN) interconnects computers in a limited geographic area. It provides
high-bandwidth communication over inexpensive transmission media. Such
Networks are the most used in offices, as every office needs a network
connectivity to communicate with every department.

This project aims to make design network proposal in offices to achieve better
communication and goals.
Keywords
 Office

 Computer networks

 Information sharing

 Distributed processing

 Wired technology

 Wifi

 Switch

 Router

 Twisted pair

 Co-axial pair

 Optical fibre cable

 Ideapad

 Packet tracer

 FTP server

 WEB server

 Lan connectivity

 Protocols

 Topology

 Internet protocols

 Access core

 Polling

 Receptive field

Introduction
Building a small office network means starting with a foundation of switches and routers.
When building a small office network, it’s important to determine the best foundation for your
company’s needs. The following tips should help you get started.

• Invest in business-grade switches and routers for reliable communications. Consumer


or home networking products can’t keep pace with the challenges of business growth.
• Invest in a network that can grow over time, so you can add features and functionality
as needed. Additions to consider include video surveillance, Voice over Internet
Protocol (VoIP), integrated messaging, and wireless applications.
• Make sure your switches and routers are easy to install, use, and manage. Example:
Switches with in-line power allow you to place equipment, such as wireless access
points, anywhere there's a network wall jack. You’ll be spared the trouble and
expense of installing additional electrical outlets or wires to power the devices.
• Make sure your network is designed with reliability and redundancy in mind. This
provides the business continuity you’ll need to bounce back quickly from unforeseen
Apart from at home and in the office, computer networks are present in all mass
transport systems for the smooth operation of ticketing systems, carriage signalling,
and safety protection and performance analysis. Doing business requires computer
networks as well. When we eat or shop, computer networks come in to connect the
ordering, inventory and payment systems.
Computer networks have the following three goals:
 Overcoming distance factor
Computer Network is a group of computers connected with each other through wires,
optical fibres or optical links so that various devices can interact with each other
through a network.
Computer networks overcome geographical separation in a city and across countries.
Computers that need to communicate with other computers are often located in different
parts of the world, and they need computer networks to pass information across long
distances to overcome that geographical separation.

 Allowing information sharing

Computer networks allow information sharing by allowing connected people or


computers to access information on databases distributed in different locations. There
are databases hosted on many computers. People or computers may need to access the
data in these databases. Without a computer network, it would take a long time to select
and transport the required data from the database to the requiring users. With computer
networks, we can conveniently access the databases to retrieve data.

 Supporting distributed processing

Computer networks support processing distributed in different locations. These


different locations can be physically close together inside a single computer room, or
they can be separated by a long distance across mountains and oceans. Physical
transportation of the intermediately processed data is impractical. Hence, a computer
network becomes indispensable in distributed processing. It allows timely passing of
semi-processed data between computers located in distributed locations .

Computer networks have indeed become indispensable now. Hence we need to study
computer networks in terms of their basic components, their architecture and how they
support the Internet applications in a typical enterprise. All of these affect our daily life.

TECHNOLOGY USED
In deep learning, a convolutional neural network (CNN, or ConvNet) is a class of deep
neural networks, most commonly applied to analyzing visual imagery.CNNs use a variation
of multilayer perceptrons designed to require minimal preprocessing. They are also known
as shift invariant or space invariant artificial neural networks (SIANN), based on their shared-
weights architecture and translation invariance characteristics.
Convolutional networks were inspired by biological processes in that the connectivity pattern
between neurons resembles the organization of the animal visual cortex. Individual cortical
neurons respond to stimuli only in a restricted region of the visual field known as the receptive
field. The receptive fields of different neurons partially overlap such that they cover the entire
visual field.CNNs use relatively little pre-processing compared to other image classification
algorithms. This means that the network learns the filters that in traditional algorithms
were hand-engineered. This independence from prior knowledge and human effort in feature
design is a major advantage.
They have applications in image and video recognition, recommender systems, image
classification, medical image analysis, and natural language processing.
DESIGN
A convolutional neural network consists of an input and an output layer, as well as
multiple hidden layers. The hidden layers of a CNN typically consist of convolutional layers,
RELU layer i.e. activation function, pooling layers, fully connected layers and normalization
layers.
Description of the process as a convolution in neural networks is by convention.
Mathematically it is a cross-correlation rather than a convolution (although cross-correlation
is a related operation). This only has significance for the indices in the matrix, and thus which
weights are placed at which index.
Convolutional
Convolutional layers apply a convolution operation to the input, passing the result to the next
layer. The convolution emulates the response of an individual neuron to visual stimuli.
Each convolutional neuron processes data only for its receptive field. Although fully
connected feedforward neural networks can be used to learn features as well as classify data,
it is not practical to apply this architecture to images. A very high number of neurons would
be necessary, even in a shallow (opposite of deep) architecture, due to the very large input
sizes associated with images, where each pixel is a relevant variable. For instance, a fully
connected layer for a (small) image of size 100 x 100 has 10000 weights for each neuron in
the second layer. The convolution operation brings a solution to this problem as it reduces the
number of free parameters, allowing the network to be deeper with fewer parameters. For
instance, regardless of image size, tiling regions of size 5 x 5, each with the same shaded
weights, requires only 25 learnable parameters. In this way, it resolves the vanishing or
exploding gradients problem in training traditional multi-layer neural networks with many
layers by using backpropagation.
Pooling
Convolutional networks may include local or global pooling layers. Pooling layers reduce the
dimensions of the data by combining the outputs of neuron clusters at one layer into a single
neuron in the next layer. Local pooling combines small clusters, typically 2 x 2. Global
pooling acts on all the neurons of the convolutional layer. In addition, pooling may compute
a max or an average. Max pooling uses the maximum value from each of a cluster of neurons
at the prior layer. Average pooling uses the average value from each of a cluster of neurons at
the prior layer.
Fully connected
Fully connected layers connect every neuron in one layer to every neuron in another layer. It
is in principle the same as the traditional multi-layer perceptron neural network (MLP). The
flattened matrix goes through a fully connected layer to classify the images.
Receptive field
In neural networks, each neuron receives input from some number of locations in the
previous layer. In a fully connected layer, each neuron receives input from every element of
the previous layer. In a convolutional layer, neurons receive input from only a restricted
subarea of the previous layer. Typically the subarea is of a square shape (e.g., size 5 by 5).
The input area of a neuron is called its receptive field. So, in a fully connected layer, the
receptive field is the entire previous layer. In a convolutional layer, the receptive area is
smaller than the entire previous layer.
Weights
Each neuron in a neural network computes an output value by applying some function to the
input values coming from the receptive field in the previous layer. The function that is
applied to the input values is specified by a vector of weights and a bias (typically real
numbers). Learning in a neural network progresses by making incremental adjustments to the
biases and weights. The vector of weights and the bias are called a filter and represents
some feature of the input (e.g., a particular shape). A distinguishing feature of CNNs is that
many neurons share the same filter. This reduces memory footprint because a single bias and
a single vector of weights is used across all receptive fields sharing that filter, rather than
each receptive field having its own bias and vector of weights

ARCHITECTURE
Network architecture is the design of a computer network. It is a framework for the
specification of a network's physical components and their functional organization and
configuration, its operational principles and procedures, as well as communication
protocols used.
In telecommunication, the specification of a network architecture may also include a detailed
description of products and services delivered via a communications network, as well as
detailed rate and billing structures under which services are compensated.
The network architecture of the Internet is predominantly expressed by its use of the Internet
Protocol Suite, rather than a specific model for interconnecting networks or nodes in the
network, or the usage of specific types of hardware links.
The Open Systems Interconnection model (OSI model) defines and codifies the concept of
layered network architecture. It is a way of sub-dividing a communications system further into
smaller parts called layers. A layer is a collection of similar functions that provide services to
the layer above it and receives services from the layer below it. On each layer, an instance
provides services to the instances at the layer above and requests service from the layer .
In distinct usage in distributed computing, the term "network architecture" often describes the
structure and classification of a distributed application architecture, as the participating nodes
in a distributed application are often referred to as a "network".
For example, the applications architecture of the public switched telephone network (PSTN)
has been termed the Advanced Intelligent Network. There are any number of specific
classifications but all lie on a continuum between the dumb network (e.g. Internet) and
the intelligent computer network (e.g. the telephone network). Other networks contain various
elements of these two classical types to make them suitable for various types of applications.
Recently the context aware network, which is a synthesis of two, has gained much interest with
its ability to combine the best elements of both.
A popular example of such usage of the term in distributed applications, as well as PVCs
(permanent virtual circuits), is the organization of nodes in peer-to-peer (P2P) services and
networks. P2P networks usually implement overlay networks running over an underlying
physical or logical network. These overlay network may implement certain organizational
structures of the nodes according to several distinct models, the network architecture of the
system.
Network architecture is a broad plan that specifies everything necessary for two application
programs on different networks on an Internet to be able to work together effectively
The two types of network architectures are used:
o Peer-To-Peer network
o Client/Server network
Network Architecture of an office is a design of computer network in which the framework
of different buildings are described . The network components are arranged in such a way that
network is easy to understand .It has two buildings and the network is described.

o 1st building network system that are allocated in mall are

BUILDING 1

WOODLAND

DOMINOS

LIFESTYLE
These shops are connected with the single switch.Switch is connected with two different server
that are DHCP and FTP server.

o 2nd floor network system for four different shops that are allocated in mall are

ZARA

SUBWAY

MAXX

REEBOK

These shops are connected with the single switch.Switch is connected with two server that is
WEB server.

The network of 1st and 2nd floor are connected with two different routers and there are two
different admin rooms that are on each floor of shopping mall

WORKING
STEP 01
Constructing the network design for the first floor of shops:-Croma,Woodland,Dominos and
Lifestyle connected with switch. Using the cisco packet tracer the network connection of the
shopping mall is designed using four different pc’s .In cisco packet tracer 7.0

 At left side corner option of pc is available click on it

 Now click on the pc or laptop that you want in your network design

 We have selected the four different pc’s and laptop’s.

 Drag the pc and laptop one by one on the screen

 Give name to the particular laptop .

 Check the configuration of that particular pc or laptop

 Now again switch option is available on left side of packet tracer

 Then we have selected the switch and drag it to screen

 Now drag the connecting wires and connect pc’s with switch.

 After the connection is completed color box blue is drawn successfully.

OUTPUT
STEP 02
FIG 01
Constructing the network design for the second floor of shops:-Zara,Maxx,Subway and Reebok
connected with switch. . Using the cisco packet tracer the network connection of the shopping
mall is designed using four different pc’s .In cisco packet tracer 7.0

 At left side corner option of pc is available click on it

 Now click on the pc or laptop that you want in your network design

 We have selected the four different pc’s and laptos.

 Drag the pc and laptop one by one on the screen

 Give name to the particular laptop .

 Check the configuration of that particular pc or laptop

 Now again switch option is available on left side of packet tracer

 Then we have selected the switch and drag it to screen

 Now drag the connecting wires and connect pc’s with switch.

 After the connection is completed color box yellow is drawn successfully.


OUTPUT

FIG 02

STEP 3

DHCP server added to network of first floor Using the cisco packet tracer the network
connection of the shopping mall is designed using DHCP server.In cisco packet tracer 7.0

 At left side corner option of server is available click on it

 Now click on the server that you want in your network design

 We have selected the server.

 Drag the server on the screen

 Give name to that server that is DHCP server .

 Ip address is assigned to the DHCP server

 Now drag the connecting wires and connect it with switch.

 After the connection is completed server is placed in color box blue.


OUTPUT

FIG 03

STEP 4

FTP server added to network of first floor Using the cisco packet tracer the network connection
of the shopping mall is designed using FTP server.In cisco packet tracer 7.0

 At left side corner option of server is available click on it

 Now click on the server that you want in your network design

 We have selected the server.

 Drag the server on the screen

 Give name to that server that is FTP server .

 Ip address is assigned to the FTP by DHCP server


 Now drag the connecting wires and connect it with switch.

 After the connection is completed server is placed outside color box blue.

OUTPUT

FIG 04

STEP 5

WEB server added to network of second floor Using the cisco packet tracer the network
connection of the shopping mall is designed using WEB server.In cisco packet tracer 7.0

 At left side corner option of server is available click on it

 Now click on the server that you want in your network design

 We have selected the server.

 Drag the server on the screen


 Give name to that server that is WEB server .

 Ip address is assigned to the WEB by DHCP server

 Now drag the connecting wires and connect it with switch.

 After the connection is completed server is placed outside color box yellow.

OUTPUT

FIG 05

STEP 6

Router connection between Ist and IInd floorUsing the cisco packet tracer the network
connection of the shopping mall is designed using two routers .In cisco packet tracer 7.0

 At left side corner option of router is available click on it

 Now click on the router that you want in your network design
 We have selected the router.

 Drag the router’s one by one on the screen

 Now drag the connecting wires and connect router’s with switch

 After the connection is completed color box green is drawn successfully

OUTPUT

FIG 06

STEP 7

Admin room established in the connection of shopping mall networking system Using the
cisco packet tracer the network connection of the shopping mall is designed using two different
pc’s .In cisco packet tracer 7.0

 At left side corner option of pc is available click on it


 Now click on the pc or laptop that you want in your network design

 We have selected the two different pc’s and laptop’s.

 Drag the pc and laptop one by one on the screen.

 Give name to the particular admin room 1 for the first floor

 Give name to the particular admin room 2 for the second floor

 Check the configuration of that particular pc or laptop

 Now drag the connecting wires and connect pc’s with switch.

 After the connection is completed color box pink is drawn successfully for admin 01.

 After the connection is completed color box red is drawn successfully for admin 02.

OUTPUT

FIG 07

REQUIREMENTS
HARDWARE:-

LENOVO IDEAPAD 330 CORE i3 7TH GEN

In addition to the ThinkPad and IdeaPad laptops, Lenovo also offers a value-priced series of
laptops. Called ‘Essential’ on the Lenovo Web site, the products available in this line include
the G Series, B Series, and V Series. Launched in 2009, the first laptop in the Essential range
was the G530.
While some web-based reviews tend to incorrectly refer to these laptops as IdeaPads, the
products in the Essential range are referred to as the ‘Lenovo xx’ laptops. For example, Lenovo
G470., G580
SOFTWARE

Cisco packet tracer:-

Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows
users to create network topologies and imitate modern computer networks. The software
allows users to simulate the configuration of Cisco routers and switches using a simulated
command line interface. Packet Tracer makes use of a drag and drop user interface, allowing
users to add and remove simulated network devices as they see fit. The software is mainly
focused towards Certified Cisco Network Associate Academy students as an educational tool
for helping them learn fundamental CCNA concepts. Previously students enrolled in a CCNA
Academy program could freely download and use the tool free of charge for educational use
Packet Tracer can be run on Linux and Microsoft Windows and also Mac Os. Similar Android
and iOS apps are also available. Packet Tracer allows users to create simulated network
topologies by dragging and dropping routers, switches and various other types of network
devices. A physical connection between devices is represented by a "cable" item. Packet Tracer
supports an array of simulated Application Layer protocols, as well as basic routing
with RIP, OSPF, EIGRP, BGP, to the extents required by the current CCNA curriculum. As of
version 5.3, Packet Tracer also supports the Border Gateway Protocol.
In addition to simulating certain aspects of computer networks, Packet Tracer can also be used
for collaboration. As of Packet Tracer 5.0, Packet Tracer supports a multi-user system that
enables multiple users to connect multiple topologies together over a computer network. Packet
Tracer also allows instructors to create activities that students have to complete. Packet Tracer
is often used in educational settings as a learning aid. Cisco Systems claims that Packet Tracer
is useful for network experimentation.
Packet Tracer allows students to design complex and large networks, which is often not feasible
with physical hardware, due to costs. Packet Tracer is commonly used by CCNA Academy
students, since it is available to them for free. However, due to functional limitations, it is
intended by CISCO to be used only as a learning aid, not a replacement for
Cisco routers and switches. The application itself only has a small number of features found
within the actual hardware running a current Cisco IOS version. Thus, Packet Tracer is
unsuitable for modelling production networks. It has a limited command set, meaning it is not
possible to practice all of the IOS commands that might be required. Packet Tracer can be
useful for understanding abstract networking concepts, such as the Enhanced Interior Gateway
Routing Protocol by animating these elements in a visual form. Packet Tracer is also useful in
education by providing additional components, including an authoring system, network
protocol simulation and improving knowledge an assessment system.

DESCRIPTION
About computer network

A computer network is a digital telecommunications network which allows nodes to share


resources. In computer networks, computing devices exchange data with each other using
connections (data links) between nodes. These data links are established over cable media such
as wires or optic cables, or wireless media such as Wi-Fi.
Network computer devices that originate, route and terminate the data are called network
nodes.[1] Nodes are generally identified by network addresses, and can include hosts such
as personal computers, phones, and servers, as well as networking hardware such as routers
and switches. Two such devices can be said to be networked together when one device is able
to exchange information with the other device, whether or not they have a direct connection to
each other. In most cases, application-specific communications protocols are layered (i.e.
carried as payload) over other more general communications protocols. This formidable
collection of information technology requires skilled network management to keep it
all running reliably.
Computer networks support an enormous number of applications and services such as access
to the World Wide Web, digital video, digital audio, shared use of application and storage
servers, printers, and fax machines, and use of email and instant messaging applications as
well as many others. Computer networks differ in the transmission medium used to carry their
signals, communications protocols to organize network traffic, the network's
size, topology, traffic control mechanism and organizational intent. The best-known computer
network is the Internet.
 Properties

Computer networking may be considered a branch of electrical


engineering, electronicsengineering, telecommunications, computer
science, information technology or computer engineering, since it relies upon the
theoretical and practical application of the related disciplines.
A computer network facilitates interpersonal communications allowing users to
communicate efficiently and easily via various means: email, instant messaging, online
chat, telephone, video telephone calls, and video conferencing. A network allows
sharing of network and computing resources. Users may access and use resources
provided by devices on the network, such as printing a document on a shared network
printer or use of a shared storage device. A network allows sharing of files, data, and
other types of information giving authorized users the ability to access information
stored on other computers on the network. Distributed computing uses computing
resources across a network to accomplish tasks.
A computer network may be used by security hackers to deploy computer
viruses or computer worms on devices connected to the network, or to prevent these
devices from accessing the network via a denial-of-service attack.
Wired technologies
The following classes of wired technologies are used in computer networking.
 Coaxial cable is widely used for cable television systems, office buildings, and other work-
sites for local area networks. Transmission speed ranges from 200 million bits per second
to more than 500 million bits per second.[
 ITU-T G.hn technology uses existing home wiring (coaxial cable, phone lines and power
lines) to create a high-speed local area network.
 Twisted pair cabling is used for wired Ethernet and other standards. It typically consists of
4 pairs of copper cabling that can be utilized for both voice and data transmission. The use
of two wires twisted together helps to reduce crosstalk and electromagnetic induction. The
transmission speed ranges from 2 Mbit/s to 10 Gbit/s. Twisted pair cabling comes in two
forms: unshielded twisted pair (UTP) and shielded twisted-pair (STP). Each form comes
in several category ratings, designed for use in various scenarios.
 An optical fibre is a glass fibre. It carries pulses of light that represent data. Some
advantages of optical fibres over metal wires are very low transmission loss and immunity
to electrical interference. Optical fibres can simultaneously carry multiple streams of data
on different wavelengths of light, which greatly increases the rate that data can be sent to
up to trillions of bits per second. Optic fibres can be used for long runs of cable carrying
very high data rates, and are used for undersea cables to interconnect continents. There are
two basic types of fibre optics, single-mode optical fibre (SMF) and multi-mode optical
fibre (MMF). Single-mode fibre has the advantage of being able to sustain a coherent signal
for dozens or even a hundred kilometers. Multimode fibre is cheaper to terminate but is
limited to a few hundred or even only a few dozens of meters, depending on the data rate
and cable grade
SWITCH

A network switch (also called switching hub, bridging hub, officially MAC bridge]) is
a computer networking device that connects devices on a computer network by using packet
switching to receive, process, and forward data to the destination device.
A network switch is a multiport network bridge that uses hardware addresses to process and
forward data at the data link layer (layer 2) of the OSI model. Some switches can also process
data at the network layer (layer 3) by additionally incorporating routing functionality. Such
switches are commonly known as layer-3 switches or multilayer switches.
Switches for Ethernet are the most common form of network switch. The first Ethernet switch
was introduced by Kalpana in 1990.[3] Switches also exist for other types of networks
including Fibre Channel, Asynchronous Transfer Mode, and InfiniBand.
Unlike less advanced repeater hubs, which broadcast the same data out of each of its ports and
let the devices decide what data they need, a network switch forwards data only to the devices
that need to receive it.
A switch is a device in a computer network that connects other devices together. Multiple data
cables are plugged into a switch to enable communication between different networked
devices. Switches manage the flow of data across a network by transmitting a received network
packet only to the one or more devices for which the packet is intended. Each networked device
connected to a switch can be identified by its network address, allowing the switch to direct
the flow of traffic maximizing the security and efficiency of the network.
A switch is more intelligent than an Ethernet hub, which simply retransmits packets out of
every port of the hub except the port on which the packet was received, unable to distinguish
different recipients, and achieving an overall lower network efficiency.
An Ethernet switch operates at the data link layer (layer 2) of the OSI model to create a
separate collision domain for each switch port. Each device connected to a switch port can
transfer data to any of the other ports at any time and the transmissions will not
interfere.[a] Because broadcasts are still being forwarded to all connected devices by the switch,
the newly formed network segment continues to be a broadcast domain. Switches may also
operate at higher layers of the OSI model, including the network layer and above. A device
that also operates at these higher layers is known as a multilayer switch.
Segmentation involves the use of a switch to split a larger collision domain into smaller ones
in order to reduce collision probability, and to improve overall network throughput. In the
extreme case (i.e. micro-segmentation), each device is located on a dedicated switch port. In
contrast to an Ethernet hub, there is a separate collision domain on each of the switch ports.
This allows computers to have dedicated bandwidth on point-to-point connections to the
network and also to run in full-duplex mode. Full-duplex mode has only one transmitter and
one receiver per collision domain, making collisions impossible.
The network switch plays an integral role in most modern Ethernet local area
networks (LANs). Mid-to-large sized LANs contain a number of linked managed
switches. Small office/home office (SOHO) applications typically use a single switch, or an
all-purpose evice such as a residential gateway to access small office/home broadband services
such as DSL or cable Internet. In most of these cases, the end-user device contains a router and
components that interface to the particular physical broadband technology. User devices may
also include a telephone interface for Voice over IP (VoIP).
Switches are most commonly used as the network connection point for hosts at the edge of a
network. In the hierarchical internetworking model and similar network architectures, switches
are also used deeper in the network to provide connections between the switches at the edge.

ROUTER

A route is a networking device that forwards data packets between computer networks.
Routers perform the traffic directing functions on the Internet. Data sent through the internet,
such as a web page or email, is in the form of data packets. A packet is
typically forwarded from one router to another router through the networks that constitute
an internetwork until it reaches its destination node.
A router is connected to two or more data lines from different networks. When a data packet
comes in on one of the lines, the router reads the network address information in the packet to
determine the ultimate destination. Then, using information in its routing table or routing
policy, it directs the packet to the next network on its journey.
The most familiar type of routers are home and small office routers that simply forward IP
packets between the home computers and the Internet. An example of a router would be the
owner's cable or DSL router, which connects to the Internet through an Internet service
provider (ISP). More sophisticated routers, such as enterprise routers, connect large business
or ISP networks up to the powerful core routers that forward data at high speed along
the optical fibre lines of the Internet backbone. Though routers are typically dedicated
hardware devices, software-based routers also exist.
 Application

A router may have interfaces for different types of physical layer connections, such as copper
cables, fibre optic, or wireless transmission. It can also support different network
layer transmission standards. Each network interface is used to enable data packets to be
forwarded from one transmission system to another. Routers may also be used to connect two
or more logical groups of computer devices known as subnets, each with a different network
prefix.
Routers may provide connectivity within enterprises, between enterprises and the Internet, or
between internet service providers' (ISPs') networks. The largest routers (such as the Cisco
CRS-1 or Juniper PTX) interconnect the various ISPs, or may be used in large enterprise
networks. Smaller routers usually provide connectivity for typical home and office networks.
All sizes of routers may be found inside enterprises. The most powerful routers are usually
found in ISPs, academic and research facilities. Large businesses may also need more powerful
routers to cope with ever-increasing demands of intranet data traffic. A hierarchical
internetworking model for interconnecting routers in large networks is in common use
➢ Access, core and distribution
Access routers, including small office/home office (SOHO) models, are located at home and
customer sites such as branch offices that do not need hierarchical routing of their own.
Typically, they are optimized for low cost. Some SOHO routers are capable of running
alternative free Linux-based firmware like Tomato, OpenWrt or DD-WRT.
Distribution routers aggregate traffic from multiple access routers. Distribution routers are
often responsible for enforcing quality of service across a wide area network(WAN), so they
may have considerable memory installed, multiple WAN interface connections, and substantial
onboard data processing routines. They may also provide connectivity to groups of file servers
or other external networks.
In enterprises, a core router may provide a collapsed backbone interconnecting the distribution
tier routers from multiple buildings of a campus, or large enterprise locations. They tend to be
optimized for high bandwidth, but lack some of the features of edge routers.
➢ Security
External networks must be carefully considered as part of the overall security strategy of the
local network. A router may include a firewall, VPN handling, and other security functions, or
these may be handled by separate devices. Routers also commonly perform network address
translation which restricts connections initiated from external connections but is not recognised
as a security feature by all experts.]. Some experts argue that open source routers are more
secure and reliable than closed source routers because open source routers allow mistakes to
be quickly found and corrected.
➢ Routing different networks
Routers are also often distinguished on the basis of the network in which they operate. A router
in a local area network (LAN) of a single organisation is called an interior router. A router that
is operated in the Internet backbone is described as exterior router. While a router that connects
a LAN with the Internet or a wide area network (WAN) is called a border router, or gateway
router.
➢ Internet connectivity and internal use
Routers intended for ISP and major enterprise connectivity usually exchange routing
information using the Border Gateway Protocol (BGP). RFC 4098 standard defines the types
of BGP routers according to their functions:
 Edge router: Also called a provider edge router, is placed at the edge of an ISP network.
The router uses External BGP to EBGP routers in other ISPs, or a large
enterprise Autonomous System.
 Subscriber edge router: Also called a Customer Edge router, is located at the edge of the
subscriber's network, it also uses EBGP to its provider's Autonomous System. It is typically
used in an (enterprise) organization.
 Inter-provider border router: Interconnecting ISPs, is a BGP router that maintains BGP
sessions with other BGP routers in ISP Autonomous Systems.
 Core router: A core router resides within an Autonomous System as a back bone to carry
traffic between edge routers.
 Within an ISP: In the ISP's Autonomous System, a router uses internal BGP to
communicate with other ISP edge routers, other intranet core routers, or the ISP's intranet
provider border routers.
 "Internet backbone:" The Internet no longer has a clearly identifiable backbone, unlike its
predecessor networks. See default-free zone (DFZ). The major ISPs' system routers make
up what could be considered to be the current Internet backbone core. ISPs operate all four
types of the BGP routers described here. An ISP "core" router is used to interconnect its
edge and border routers. Core routers may also have specialized functions in virtual private
networks based on a combination of BGP and Multi-Protocol Label Switching protocols.
 Port forwarding: Routers are also used for port forwarding between private Internet-
connected servers.
 Voice/Data/Fax/Video Processing Routers: Commonly referred to as access
servers or gateways, these devices are used to route and process voice, data, video and fax
traffic on the Internet. Since 2005, most long-distance phone calls have been processed
as IP traffic (VOIP) through a voice gateway. Use of access server type routers expanded
with the advent of the Internet, first with dial-up access and another resurgence with voice
phone service.
 Larger networks commonly use multilayer switches, with layer 3 devices being used to
simply interconnect multiple subnets within the same security zone, and higher layer
switches when filtering, translation, load balancing or other higher level functions are
required, especially between zones.

Networking cables

Networking cables are networking hardware used to connect one network device to other
network devices or to connect two or more computers to share printers, scanners etc. Different
types of network cables, such as coaxial cable, optical fibre cable, and twisted pair cables, are
used depending on the network's physical layer, topology, and size. The devices can be
separated by a few meters (e.g. via Ethernet) or nearly unlimited distances (e.g. via the
interconnections of the Internet).
There are several technologies used for network connections. Patch cables are used for short
distances in offices and wiring closets. Electrical connections using twisted pair or coaxial
cable are used within a building. Optical fibre cable is used for long distances or for
applications requiring high bandwidth or electrical isolation. Many installations use structured
cabling practices to improve reliability and maintainability. In some home and industrial
applications power lines are used as network cabling.
Twisted pair
Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted
together for the purposes of improving electromagnetic compatibility. Compared to a single
conductor or an untwisted balanced pair, a twisted pair reduces electromagnetic radiation from
pair and crosstalk between neighboring pairs and improves rejection of
external electromagnetic interference. It was invented by Alexander Graham Bell
In a balanced line, the two wires carry equal and opposite signals, and the destination detects
the difference between the two. This is known as differential signaling. Noise sources introduce
signals into the wires by coupling of electric or magnetic fields and tend to couple to both wires
equally. The noise thus produces a common-mode signal which can be canceled at the receiver
when the difference signal is taken.
Differential signaling starts to fail when the noise source is close to the signal wires; the closer
wire will couple with the noise more strongly and the receiver will be unable to eliminate it.
This problem is especially apparent in telecommunication cables where pairs in the same cable
lie next to each other for many miles. Twisting the pairs counters this effect as on each half
twist the wire nearest to the noise-source is exchanged. Provided the interfering source remains
uniform, or nearly so, over the distance of a single twist, the induced noise will remain
common-mode.
The twist rate (also called pitch of the twist, usually defined in twists per meter) makes up part
of the specification for a given type of cable. When nearby pairs have equal twist rates, the
same conductors of the different pairs may repeatedly lie next to each other, partially undoing
the benefits of differential mode. For this reason it is commonly specified that, at least for
cables containing small numbers of pairs, the twist rates must differ.[2]
In contrast to shielded or foiled twisted pair (typically F/UTP or S/FTP cable shielding), UTP
(unshielded twisted pair) cable is not surrounded by any shielding. UTP is the primary wire
type for telephone usage and is very common for computer networking.

Coaxial cable

Coaxial cable, or coax is a type of electrical cable that has an inner conductor surrounded by a
tubular insulating layer, surrounded by a tubular conducting shield. Many coaxial cables also
have an insulating outer sheath or jacket. The term coaxial comes from the inner conductor and
the outer shield sharing a geometric axis. Coaxial cable was invented by English engineer and
mathematician Oliver Heaviside, who patented the design in 1880.
Coaxial cable is a type of transmission line, used to carry high frequency electrical signals with
low losses. It is used in such applications as telephone trunklines, broadband
internet networking cables, high speed computer data busses, carrying cable television signals,
and connecting radio transmitters and receivers to their antennas. It differs from other shielded
cables because the dimensions of the cable and connectors are controlled to give a precise,
constant conductor spacing, which is needed for it to function efficiently as a transmission line.

Optical fibre cable

An optical fibre cable, also known as a fibre optic cable, is an assembly similar to an electrical
cable, but containing one or more optical fibres that are used to carry light. The optical fibre
elements are typically individually coated with plastic layers and contained in a protective tube
suitable for the environment where the cable will be deployed. Different types of cableare used
for different applications, for example long distance telecommunication, or providing a high-
speed data connection between different parts of a building.

Optical fibre consists of a core and a cladding layer, selected for total internal reflection due to
the difference in th refractive index between the two. In practical fibres, the cladding is usually
coated with a layer of acrylate polymer or polyimide. This coating protects the fibre from
damage but does not contribute to its optical waveguideproperties. Individual coated fibres (or
fibres formed into ribbons or bundles) then have a tough resin buffer layer or core tube(s)
extruded around them to form the cable core. Several layers of protective sheathing, depending
on the application, are added to form the cable. Rigid fibre assemblies sometimes put light-
absorbing ("dark") glass between the fibres, to prevent light that leaks out of one fibre from
entering another. This reduces cross-talk between the fibres, or reduces flare in fibre bundle
imaging applications.
For use in more strenuous environments, a much more robust cable construction is required.
In loose-tube construction the fibre is laid helically into semi-rigid tubes, allowing the cable to
stretch without stretching the fibre itself. This protects the fibre from tension during laying and
due to temperature changes. Loose-tube fibre may be "dry block" or gel-filled. Dry block offers
less protection to the fibres than gel-filled, but costs considerably less. Instead of a loose tube,
the fibre may be embedded in a heavy polymer jacket, commonly called "tight buffer"
construction. Tight buffer cables are offered for a variety of applications, but the two most
common are "Breakout" and "Distribution". Breakout cables normally contain a ripcord, two
non-conductive dielectric strengthening members (normally a glass rod epoxy), an aramid
yarn, and 3 mm buffer tubing with an additional layer of Kevlar surrounding each fibre. The
ripcord is a parallel cord of strong yarn that is situated under the jacket(s) of the cable for jacket
removal.[3] Distribution cables have an overall Kevlar wrapping, a ripcord, and a 900
micrometer buffer coating surrounding each fibre. These fibre units are commonly bundled
with additional steel strength members, again with a helical twist to allow for stretching.
A critical concern in outdoor cabling is to protect the fibre from contamination by water. This
is accomplished by use of solid barriers such as copper tubes, and water-repellent jelly or water-
absorbing powder surrounding the fibre.
Finally, the cable may be armored to protect it from environmental hazards, such as
construction work or gnawing animals. Undersea cables are more heavily armored in their near-
shore portions to protect them from boat anchors, fishing gear, and even sharks, which may be
attracted to the electrical power that is carried to power amplifiers or repeaters in the cable.
Modern cables come in a wide variety of sheathings and armor, designed for applications such
as direct burial in trenches, dual use as power lines, installation in conduit, lashing to aerial
telephone poles, submarine installation, and insertion in paved streets.

SERVER

In computing, a server is a computer program or a device that provides functionality for other
programs or devices, called "clients". This architecture is called the client–server model, and a
single overall computation is distributed across multiple processes or devices. Servers can
provide various functionalities, often called "services", such as sharing data
or resources among multiple clients, or performing computation for a client. A single server
can serve multiple clients, and a single client can use multiple servers. A client process may
run on the same device or may connect over a network to a server on a different
device.[1] Typical servers are database servers, file servers, mail servers, print servers, web
servers, game servers, and application servers.[2]
Client–server systems are today most frequently implemented by (and often identified with)
the request–response model: a client sends a request to the server, which performs some action
and sends a response back to the client, typically with a result or acknowledgement.
Designating a computer as "server-class hardware" implies that it is specialized for running
servers on it. This often implies that it is more powerful and reliable than standard personal
computers, but alternatively, large computing clusters may be composed of many relatively
simple, replaceable server components.

OPERATION

Strictly speaking, the term server refers to a computer program or process (running program).
Through metonymy, it refers to a device used for (or a device dedicated to) running one or
several server programs. On a network, such a device is called a host. In addition to server, the
words serve and service (as noun and as verb) are frequently used,
[a]
though servicer and servant are not. The word service (noun) may refer to either the abstract
form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that
turns a computer into a server, e.g. Windows service. Originally used as "servers serve users"
(and "users use servers"), in the sense of "obey", today one often says that "servers serve data",
in the same sense as "give". For instance, web servers "serve [up] web pages to users" or
"service their requests".
The server is part of the client–server model; in this model, a server serves data for clients. The
nature of communication between a client and server is request and response. This is in contrast
with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any
computerized process that can be used or called by another process (particularly remotely,
particularly to share a resource) is a server, and the calling process or processes is a client. Thus
any general purpose computer connected to a network can host servers. For example, if files
on a device are shared by some process, that process is a file server. Similarly, web server
software can run on any capable computer, and so a laptop or a personal computer can host a
web server.
DHCP Server
UDP/IP defines how devices on one network communicate with devices on another network,
and the DHCP server can manage UDP/IP settings for devices on a network, by automatically
or dynamically assigning IP addresses to the devices.
The DHCP operates based on the client–server model. When a computer or other device
connects to a network, the DHCP client software sends a DHCP broadcast query requesting
the necessary information. Any DHCP server on the network may service the request. The
DHCP server manages a pool of IP addresses and information about client configuration
parameters such as default gateway, domain name, the name servers, and time servers. On
receiving a DHCP request, the DHCP server may respond with specific information for each
client, as previously configured by an administrator, or with a specific address and any other
information valid for the entire network and for the time period for which the allocation (lease)
is valid. A DHCP client typically queries for this information immediately after booting, and
periodically thereafter before the expiration of the information. When a DHCP client refreshes
an assignment, it initially requests the same parameter values, but the DHCP server may assign
a new address based on the assignment policies set by administrators.
On large networks that consist of multiple links, a single DHCP server may service the entire
network when aided by DHCP relay agents located on the interconnecting routers. Such agents
relay messages between DHCP clients and DHCP servers located on different subnets.
Depending on implementation, the DHCP server may have three methods of allocating IP
addresses:
Dynamic allocation
A network administrator reserves a range of IP addresses for DHCP, and each DHCP
client on the LAN is configured to request an IP address from the DHCP server during
network initialization. The request-and-grant process uses a lease concept with a
controllable time period, allowing the DHCP server to reclaim and then reallocate IP
addresses that are not renewed.
Automatic allocation
The DHCP server permanently assigns an IP address to a requesting client from the
range defined by the administrator. This is like dynamic allocation, but the DHCP
server keeps a table of past IP address assignments, so that it can preferentially assign
to a client the same IP address that the client previously had.
Manual allocation (commonly called static allocation)
The DHCP server issues a private IP address dependent upon each client's client id (or,
traditionally, the client MAC address), based on a predefined mapping by the
administrator. This feature is variously called static DHCP assignment by DD-
WRT, fixed-address by the dhcpd documentation, address reservation by
Netgear, DHCP reservation or static DHCP by Cisco and Linksys, and IP address
reservation or MAC/IP address binding by various other router manufacturers. If no
match for the client's client ID (if provided) or MAC address (if no client id is
provided) is found, the server may or may not optionally fall back to either Dynamic or
Automatic allocation.
DHCP is used for Internet Protocol version 4 (IPv4) and IPv6. While both versions
serve the same purpose, the details of the protocol for IPv4 and IPv6 differ
sufficiently that they may be considered separate protocols. For the IPv6 operation,
devices may alternatively use stateless address autoconfiguration. IPv6 hosts may
also use link-local addressing to achieve operations restricted to the local network
link.
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used
on UDP/IP networks whereby a DHCP server dynamically assigns an IP address and other
network configuration parameters to each device on a network so they can communicate with
other IP networks. A DHCP server enables computers to request IP addresses and networking
parameters automatically from the Internet service provider (ISP), reducing the need for
a network administratoror a user to manually assign IP addresses to all network devices. In the
absence of a DHCP server, a computer or other device on the network needs to be manually
assigned an IP address, or to assign itself an APIPA address, which will not enable it to
communicate outside its local subnet.
DHCP can be implemented on networks ranging in size from home networks to large campus
networks and regional Internet service provider networks.[2] A routeror a residential
gateway can be enabled to act as a DHCP server. Most residential network routers receive a
globally unique IP address within the ISP network. Within a local network, a DHCP server
assigns a local IP address to each device connected to the network.

File Transfer Protocol (FTP)


The File Transfer Protocol (FTP) is a standard network protocol used for the transfer
of computer files between a client and server on a computer network.
FTP is built on a client-server model architecture using separate control and data connections
between the client and the server.[1] FTP users may authenticate themselves with a clear-
text sign-in protocol, normally in the form of a username and password, but can connect
anonymously if the server is configured to allow it. For secure transmission that protects the
username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS)
or replaced with SSH File Transfer Protocol (SFTP).
The first FTP client applications were command-line programs developed before operating
systems had graphical user interfaces, and are still shipped with most Windows, Unix,
and Linux operating systems. Many FTP clients and automation utilities have since been
developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated
into productivity applications, such as HTML editors.
1. Overview
2. Communication and data transfer
FTP may run in active or passive mode, which determines how the data connection is
established In both cases, the client creates a TCP control connection from a random, usually
an unprivileged, port N to the FTP server command port 21.
 In active mode, the client starts listening for incoming data connections from the server on
port M. It sends the FTP command PORT M to inform the server on which port it is
listening. The server then initiates a data channel to the client from its port 20, the FTP
server data port.
 In situations where the client is behind a firewall and unable to accept incoming TCP
connections, passive mode may be used. In this mode, the client uses the control
connection to send a PASV command to the server and then receives a server IP address
and server port number from the server, which the client then uses to open a data
connection from an arbitrary client port to the server IP address and server port number
received.
Both modes were updated in September 1998 to support IPv6. Further changes were introduced
to the passive mode at that time, updating it to extended passive mode.
The server responds over the control connection with three-digit status codes in ASCII with an
optional text message. For example, "200" (or "200 OK") means that the last command was
successful. The numbers represent the code for the response and the optional text represents a
human-readable explanation or request (e.g. <Need account for storing file>).An ongoing
transfer of file data over the data connection can be aborted using an interrupt message sent
over the control connection.
While transferring data over the network, four data representations can be used:
 ASCII mode: Used for text. Data is converted, if needed, from the sending host's character
representation to "8-bit ASCII" before transmission, and (again, if necessary) to the
receiving host's character representation. As a consequence, this mode is inappropriate for
files that contain data other than plain text.
 Image mode (commonly called Binary mode): The sending machine sends each
file byte by byte, and the recipient stores the bytestream as it receives it. (Image mode
support has been recommended for all implementations of FTP).
 EBCDIC mode: Used for plain text between hosts using the EBCDIC character set.
 Local mode: Allows two computers with identical setups to send data in a proprietary
format without the need to convert it to ASCII.
For text files, different format control and record structure options are provided. These features
were designed to facilitate files containing Telnet or ASA.
Data transfer can be done in any of three modes:
 Stream mode: Data is sent as a continuous stream, relieving FTP from doing any
processing. Rather, all processing is left up to TCP. No End-of-file indicator is needed,
unless the data is divided into records.
 Block mode: FTP breaks the data into several blocks (block header, byte count, and data
field) and then passes it on to TCP.
 Compressed mode: Data is compressed using a simple algorithm (usually run-length
encoding).
Some FTP software also implements a DEFLATE-based compressed mode, sometimes called
"Mode Z" after the command that enables it. This mode was described in an Internet Draft, but
not standardized.
Login
FTP login uses normal username and password scheme for granting access. The username is
sent to the server using the USER command, and the password is sent using the PASS
command. This sequence is unencrypted "on the wire", so may be vulnerable to a
network sniffing attack. If the information provided by the client is accepted by the server, the
server will send a greeting to the client and the session will commence. If the server supports
it, users may log in without providing login credentials, but the same server may authorize only
limited access for such sessions.
Anonymous FTP
A host that provides an FTP service may provide anonymous FTP access. Users typically log
into the service with an 'anonymous' (lower-case and case-sensitive in some FTP servers)
account when prompted for user name. Although users are commonly asked to send
their email address instead of a password,[3] no verification is actually performed on the
supplied data. Many FTP hosts whose purpose is to provide software updates will allow
anonymous logins.
NAT and firewall traversal
FTP normally transfers data by having the server connect back to the client, after the PORT
command is sent by the client. This is problematic for both NATs and firewalls, which do not
allow connections from the Internet towards internal hosts. For NATs, an additional
complication is that the representation of the IP addresses and port number in the PORT
command refer to the internal host's IP address and port, rather than the public IP address and
port of the NAT.
There are two approaches to solve this problem. One is that the FTP client and FTP server use
the PASV command, which causes the data connection to be established from the FTP client
to the server. This is widely used by modern FTP clients. Another approach is for the NAT to
alter the values of the PORT command, using an application-level gateway for this purpose.
Differences from HTTP
HTTP essentially fixes the bugs in FTP that made it inconvenient to use for many small
ephemeral transfers as are typical in web pages.
FTP has a stateful control connection which maintains a current working directory and other
flags, and each transfer requires a secondary connection through which the data are transferred.
In "passive" mode this secondary connection is from client to server, whereas in the default
"active" mode this connection is from server to client. This apparent role reversal when in
active mode, and random port numbers for all transfers, is why firewalls and NAT gateways
have such a hard time with FTP. HTTP is stateless and multiplexes control and data over a
single connection from client to server on well-known port numbers, which trivially passes
through NAT gateways and is simple for firewalls to manage.
Setting up an FTP control connection is quite slow due to the round-trip delays of sending all
of the required commands and awaiting responses, so it is customary to bring up a control
connection and hold it open for multiple file transfers rather than drop and re-establish the
session afresh each time. In contrast, HTTP originally dropped the connection after each
transfer because doing so was so cheap. While HTTP has subsequently gained the ability to
reuse the TCP connection for multiple transfers, the conceptual model is still of independent
requests rather than a session.
When FTP is transferring over the data connection, the control connection is idle. If the transfer
takes too long, the firewall or NAT may decide that the control connection is dead and stop
tracking it, effectively breaking the connection and confusing the download. The single HTTP
connection is only idle between requests and it is normal and expected for such connections to
be dropped after a time-out.

A web server
A web server (or Web server) is server software, or hardware dedicated to running said
software, that can satisfy World Wide Web client requests. A web server can, in general,
contain one or more websites. A web server processes incoming network requests
over HTTP and several other related protocols.
The primary function of a web server is to store, process and deliver web pages to clients. The
communication between client and server takes place using the Hypertext Transfer Protocol
(HTTP). Pages delivered are most frequently HTML documents, which may
include images, style sheets and scripts in addition to the text content.
A user agent, commonly a web browser or web crawler, initiates communication by making
a request for a specific resource using HTTP and the server responds with the content of that
resource or an error message if unable to do so. The resource is typically a real file on the
server's secondary storage, but this is not necessarily the case and depends on how the web
server is implemented.
While the primary function is to serve content, a full implementation of HTTP also includes
ways of receiving content from clients. This feature is used for submitting web forms,
including uploading of files.
Many generic web servers also support server-side scripting using Active Server
Pages (ASP), PHP (Hypertext Preprocessor), or other scripting languages. This means that the
behaviour of the web server can be scripted in separate files, while the actual server software
remains unchanged. Usually, this function is used to generate HTML
documents dynamically ("on-the-fly") as opposed to returning static documents. The former is
primarily used for retrieving or modifying information from databases. The latter is typically
much faster and more easily cached but cannot deliver dynamic content.
Web servers can frequently be found embedded in devices such
as printers, routers, webcams and serving only a local network. The web server may then be
used as a part of a system for monitoring or administering the device in question. This usually
means that no additional software has to be installed on the client computer since only a web
browser is required (which now is included with most operating systems).

Personal computer system


A computer is a device that can be instructed to carry
out sequences of arithmetic or logical operations automatically via computer programming.
Modern computers have the ability to follow generalized sets of operations,
called programs. These programs enable computers to perform an extremely wide range of
tasks. A "complete" computer including the hardware, the operating system (main software),
and peripheral equipment required and used for "full" operation can be referred to as
a computer system. This term may as well be used for a group of computers that are connected
and work together, in particular a computer network or computer cluster.
Computers are used as control systems for a wide variety of industrial and consumer devices.
This includes simple special purpose devices like microwave ovens and remote controls,
factory devices such as industrial robots and computer-aided design, and also general purpose
devices like personal computers and mobile devices such as smartphones. The Internet is run
on computers and it connects hundreds of millions of other computers and their users.
Early computers were only conceived as calculating devices. Since ancient times, simple
manual devices like the abacus aided people in doing calculations. Early in the Industrial
Revolution, some mechanical devices were built to automate long tedious tasks, such as
guiding patterns for looms. More sophisticated electrical machines did
specialized analog calculations in the early 20th century. The first digital electronic calculating
machines were developed during World War II. The speed, power, and versatility of computers
have been increasing dramatically ever since then.
Conventionally, a modern computer consists of at least one processing element, typically
a central processing unit (CPU), and some form of memory. The processing element carries
out arithmetic and logical operations, and a sequencing and control unit can change the order
of operations in response to stored information. Peripheral devices include input devices
(keyboards, mice, joystick, etc.), output devices (monitor screens, printers, etc.), and
input/output devices that perform both functions (e.g., the 2000s-era touchscreen). Peripheral
devices allow information to be retrieved from an external source and they enable the result of
operations to be saved and retrieved.
TOPOLOGY USED
Lan Connectivity
A local area network (LAN) is a computer network that interconnects computers within a
limited area such as a residence, school, laboratory, university campus or office building.[1] By
contrast, a wide area network (WAN) not only covers a larger geographic distance, but also
generally involves leased telecommunication circuits.
Ethernet and Wi-Fi are the two most common technologies in use for local area networks.
Historical technologies include ARCNET, Token ring, and AppleTalk.local area network
(LAN) is a group of computers and associated devices that share a common communications
line or wireless link to a server. Typically, a LAN encompasses computers and peripherals
connected to a server within a distinct geographic area such as an office or a commercial
establishment. Computers and other mobile devices use a LAN connection to share resources
such as a printer or network storage.A local area network may serve as few as two or three
users (for example, in a small-office network) or several hundred users in a larger office. LAN
networking comprises cables, switches, routers and other components that let users connect to
internal servers, websites and other LANs via wide area networks.Ethernet and Wi-Fi are the
two primary ways to enable LAN connections. Ethernet is a specification that enables
computers to communicate with each other. Wi-Fi uses radio waves to connect computers to
the LAN. Other LAN technologies, including Token Ring, Fibre Distributed Data
Interface and ARCNET, have lost favor as Ethernet and Wi-Fi speeds have increased. The rise
of virtualization has fueled the development of virtual LANs, which allows network
administrators to logically group network nodes and partition their networks without the need
for major infrastructure changes.Typically, a suite of application programs can be kept on the
LAN server. Users who need an application frequently can download it once and then run it
from their local device. Users can order printing and other services as needed through
applications run on the LAN server. A user can share files with others stored on the LAN
server; read and write access is maintained by a network administrator. A LAN server may also
be used as a web server if safeguards are taken to secure internal applications and data from
outside access.In some situations, a wireless LAN, or Wi-Fi, may be preferable to a wired LAN
connection because of its flexibility and cost. Companies are assessing WLANs as primary
means of connectivity as the number of smartphones, tablets and other mobile devices
proliferates.
PROTOCOLS

A network protocol is a set of established rules that dictates how to format, transmit and
receive data so computer network devices -- from servers and routers to endpoints -- can
communicate regardless of the differences in their underlying infrastructures, designs or
standards.To successfully send and receive information, devices on both sides of a
communication exchange must accept and follow protocol conventions. Support for network
protocols can be built into software, haDHCPrdware or both.Standardized network protocols
provide a common language for network devices. Without them, computers wouldn't know
how to engage with each other. As a result, except for specialty networks built around a specific
architecture, few networks would be able to function, and the internet as we know it wouldn't
exist. Virtually all network end users rely on network protocols for connectivity.

IP address for the server are

❖ DHCP server IP address is 1.0.0.0

❖ FTP server IP address is 1.0.0.2


❖ WEB server IP address is 1.0.0.3

SCOPE

In terms of future scope, a variety of COMPUTER NETWORK techniques can be used by


researchers to simplify customer and shoppers needs. Wifi can be installed for the customers
on different floors of the mall . Devices that can use Wi-Fi technologies include, among
others, desktops and laptops,game,video, smartphones and tablets, smart TVs, printers, digital
audio players, digital cameras, cars and drones. Wi-Fi compatible devices can connect to the
Internet via a WLAN and a wireless access point of customer. Such an access point (or hotspot)
has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage
can be as small as a single room with walls that block radio waves, or as large as many square
kilometres achieved by using multiple overlapping access points.

REFERENCE

✓ Www.Google.Com

✓ Www.Cisco Packet Tracer .Com

✓ Www.Wikipidea.Com

✓ Computer Network Book-By Frozen

You might also like