Professional Documents
Culture Documents
Office Network
INDEX
1. Abstract
2. Keywords
3. Introduction
4. Technology used
5. Architecture
6. Working of project
7. Requirements
Hardware
Software
8.Description
Protocols used
Topology used
9.Scope
10.Reference
Abstract
The need for computer networking was borne out of the need to use personal
computers for sharing information within an organization in form of messages,
sharing files and databases and so forth. Whether the organization is located in
one building or spread over a large campus, the need for networking the
computers cannot be over emphasized. As the name implies, a Local Area
Network (LAN) interconnects computers in a limited geographic area. It provides
high-bandwidth communication over inexpensive transmission media. Such
Networks are the most used in offices, as every office needs a network
connectivity to communicate with every department.
This project aims to make design network proposal in offices to achieve better
communication and goals.
Keywords
Office
Computer networks
Information sharing
Distributed processing
Wired technology
Wifi
Switch
Router
Twisted pair
Co-axial pair
Ideapad
Packet tracer
FTP server
WEB server
Lan connectivity
Protocols
Topology
Internet protocols
Access core
Polling
Receptive field
Introduction
Building a small office network means starting with a foundation of switches and routers.
When building a small office network, it’s important to determine the best foundation for your
company’s needs. The following tips should help you get started.
Computer networks have indeed become indispensable now. Hence we need to study
computer networks in terms of their basic components, their architecture and how they
support the Internet applications in a typical enterprise. All of these affect our daily life.
TECHNOLOGY USED
In deep learning, a convolutional neural network (CNN, or ConvNet) is a class of deep
neural networks, most commonly applied to analyzing visual imagery.CNNs use a variation
of multilayer perceptrons designed to require minimal preprocessing. They are also known
as shift invariant or space invariant artificial neural networks (SIANN), based on their shared-
weights architecture and translation invariance characteristics.
Convolutional networks were inspired by biological processes in that the connectivity pattern
between neurons resembles the organization of the animal visual cortex. Individual cortical
neurons respond to stimuli only in a restricted region of the visual field known as the receptive
field. The receptive fields of different neurons partially overlap such that they cover the entire
visual field.CNNs use relatively little pre-processing compared to other image classification
algorithms. This means that the network learns the filters that in traditional algorithms
were hand-engineered. This independence from prior knowledge and human effort in feature
design is a major advantage.
They have applications in image and video recognition, recommender systems, image
classification, medical image analysis, and natural language processing.
DESIGN
A convolutional neural network consists of an input and an output layer, as well as
multiple hidden layers. The hidden layers of a CNN typically consist of convolutional layers,
RELU layer i.e. activation function, pooling layers, fully connected layers and normalization
layers.
Description of the process as a convolution in neural networks is by convention.
Mathematically it is a cross-correlation rather than a convolution (although cross-correlation
is a related operation). This only has significance for the indices in the matrix, and thus which
weights are placed at which index.
Convolutional
Convolutional layers apply a convolution operation to the input, passing the result to the next
layer. The convolution emulates the response of an individual neuron to visual stimuli.
Each convolutional neuron processes data only for its receptive field. Although fully
connected feedforward neural networks can be used to learn features as well as classify data,
it is not practical to apply this architecture to images. A very high number of neurons would
be necessary, even in a shallow (opposite of deep) architecture, due to the very large input
sizes associated with images, where each pixel is a relevant variable. For instance, a fully
connected layer for a (small) image of size 100 x 100 has 10000 weights for each neuron in
the second layer. The convolution operation brings a solution to this problem as it reduces the
number of free parameters, allowing the network to be deeper with fewer parameters. For
instance, regardless of image size, tiling regions of size 5 x 5, each with the same shaded
weights, requires only 25 learnable parameters. In this way, it resolves the vanishing or
exploding gradients problem in training traditional multi-layer neural networks with many
layers by using backpropagation.
Pooling
Convolutional networks may include local or global pooling layers. Pooling layers reduce the
dimensions of the data by combining the outputs of neuron clusters at one layer into a single
neuron in the next layer. Local pooling combines small clusters, typically 2 x 2. Global
pooling acts on all the neurons of the convolutional layer. In addition, pooling may compute
a max or an average. Max pooling uses the maximum value from each of a cluster of neurons
at the prior layer. Average pooling uses the average value from each of a cluster of neurons at
the prior layer.
Fully connected
Fully connected layers connect every neuron in one layer to every neuron in another layer. It
is in principle the same as the traditional multi-layer perceptron neural network (MLP). The
flattened matrix goes through a fully connected layer to classify the images.
Receptive field
In neural networks, each neuron receives input from some number of locations in the
previous layer. In a fully connected layer, each neuron receives input from every element of
the previous layer. In a convolutional layer, neurons receive input from only a restricted
subarea of the previous layer. Typically the subarea is of a square shape (e.g., size 5 by 5).
The input area of a neuron is called its receptive field. So, in a fully connected layer, the
receptive field is the entire previous layer. In a convolutional layer, the receptive area is
smaller than the entire previous layer.
Weights
Each neuron in a neural network computes an output value by applying some function to the
input values coming from the receptive field in the previous layer. The function that is
applied to the input values is specified by a vector of weights and a bias (typically real
numbers). Learning in a neural network progresses by making incremental adjustments to the
biases and weights. The vector of weights and the bias are called a filter and represents
some feature of the input (e.g., a particular shape). A distinguishing feature of CNNs is that
many neurons share the same filter. This reduces memory footprint because a single bias and
a single vector of weights is used across all receptive fields sharing that filter, rather than
each receptive field having its own bias and vector of weights
ARCHITECTURE
Network architecture is the design of a computer network. It is a framework for the
specification of a network's physical components and their functional organization and
configuration, its operational principles and procedures, as well as communication
protocols used.
In telecommunication, the specification of a network architecture may also include a detailed
description of products and services delivered via a communications network, as well as
detailed rate and billing structures under which services are compensated.
The network architecture of the Internet is predominantly expressed by its use of the Internet
Protocol Suite, rather than a specific model for interconnecting networks or nodes in the
network, or the usage of specific types of hardware links.
The Open Systems Interconnection model (OSI model) defines and codifies the concept of
layered network architecture. It is a way of sub-dividing a communications system further into
smaller parts called layers. A layer is a collection of similar functions that provide services to
the layer above it and receives services from the layer below it. On each layer, an instance
provides services to the instances at the layer above and requests service from the layer .
In distinct usage in distributed computing, the term "network architecture" often describes the
structure and classification of a distributed application architecture, as the participating nodes
in a distributed application are often referred to as a "network".
For example, the applications architecture of the public switched telephone network (PSTN)
has been termed the Advanced Intelligent Network. There are any number of specific
classifications but all lie on a continuum between the dumb network (e.g. Internet) and
the intelligent computer network (e.g. the telephone network). Other networks contain various
elements of these two classical types to make them suitable for various types of applications.
Recently the context aware network, which is a synthesis of two, has gained much interest with
its ability to combine the best elements of both.
A popular example of such usage of the term in distributed applications, as well as PVCs
(permanent virtual circuits), is the organization of nodes in peer-to-peer (P2P) services and
networks. P2P networks usually implement overlay networks running over an underlying
physical or logical network. These overlay network may implement certain organizational
structures of the nodes according to several distinct models, the network architecture of the
system.
Network architecture is a broad plan that specifies everything necessary for two application
programs on different networks on an Internet to be able to work together effectively
The two types of network architectures are used:
o Peer-To-Peer network
o Client/Server network
Network Architecture of an office is a design of computer network in which the framework
of different buildings are described . The network components are arranged in such a way that
network is easy to understand .It has two buildings and the network is described.
BUILDING 1
WOODLAND
DOMINOS
LIFESTYLE
These shops are connected with the single switch.Switch is connected with two different server
that are DHCP and FTP server.
o 2nd floor network system for four different shops that are allocated in mall are
ZARA
SUBWAY
MAXX
REEBOK
These shops are connected with the single switch.Switch is connected with two server that is
WEB server.
The network of 1st and 2nd floor are connected with two different routers and there are two
different admin rooms that are on each floor of shopping mall
WORKING
STEP 01
Constructing the network design for the first floor of shops:-Croma,Woodland,Dominos and
Lifestyle connected with switch. Using the cisco packet tracer the network connection of the
shopping mall is designed using four different pc’s .In cisco packet tracer 7.0
Now click on the pc or laptop that you want in your network design
Now drag the connecting wires and connect pc’s with switch.
OUTPUT
STEP 02
FIG 01
Constructing the network design for the second floor of shops:-Zara,Maxx,Subway and Reebok
connected with switch. . Using the cisco packet tracer the network connection of the shopping
mall is designed using four different pc’s .In cisco packet tracer 7.0
Now click on the pc or laptop that you want in your network design
Now drag the connecting wires and connect pc’s with switch.
FIG 02
STEP 3
DHCP server added to network of first floor Using the cisco packet tracer the network
connection of the shopping mall is designed using DHCP server.In cisco packet tracer 7.0
Now click on the server that you want in your network design
FIG 03
STEP 4
FTP server added to network of first floor Using the cisco packet tracer the network connection
of the shopping mall is designed using FTP server.In cisco packet tracer 7.0
Now click on the server that you want in your network design
After the connection is completed server is placed outside color box blue.
OUTPUT
FIG 04
STEP 5
WEB server added to network of second floor Using the cisco packet tracer the network
connection of the shopping mall is designed using WEB server.In cisco packet tracer 7.0
Now click on the server that you want in your network design
After the connection is completed server is placed outside color box yellow.
OUTPUT
FIG 05
STEP 6
Router connection between Ist and IInd floorUsing the cisco packet tracer the network
connection of the shopping mall is designed using two routers .In cisco packet tracer 7.0
Now click on the router that you want in your network design
We have selected the router.
Now drag the connecting wires and connect router’s with switch
OUTPUT
FIG 06
STEP 7
Admin room established in the connection of shopping mall networking system Using the
cisco packet tracer the network connection of the shopping mall is designed using two different
pc’s .In cisco packet tracer 7.0
Give name to the particular admin room 1 for the first floor
Give name to the particular admin room 2 for the second floor
Now drag the connecting wires and connect pc’s with switch.
After the connection is completed color box pink is drawn successfully for admin 01.
After the connection is completed color box red is drawn successfully for admin 02.
OUTPUT
FIG 07
REQUIREMENTS
HARDWARE:-
In addition to the ThinkPad and IdeaPad laptops, Lenovo also offers a value-priced series of
laptops. Called ‘Essential’ on the Lenovo Web site, the products available in this line include
the G Series, B Series, and V Series. Launched in 2009, the first laptop in the Essential range
was the G530.
While some web-based reviews tend to incorrectly refer to these laptops as IdeaPads, the
products in the Essential range are referred to as the ‘Lenovo xx’ laptops. For example, Lenovo
G470., G580
SOFTWARE
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows
users to create network topologies and imitate modern computer networks. The software
allows users to simulate the configuration of Cisco routers and switches using a simulated
command line interface. Packet Tracer makes use of a drag and drop user interface, allowing
users to add and remove simulated network devices as they see fit. The software is mainly
focused towards Certified Cisco Network Associate Academy students as an educational tool
for helping them learn fundamental CCNA concepts. Previously students enrolled in a CCNA
Academy program could freely download and use the tool free of charge for educational use
Packet Tracer can be run on Linux and Microsoft Windows and also Mac Os. Similar Android
and iOS apps are also available. Packet Tracer allows users to create simulated network
topologies by dragging and dropping routers, switches and various other types of network
devices. A physical connection between devices is represented by a "cable" item. Packet Tracer
supports an array of simulated Application Layer protocols, as well as basic routing
with RIP, OSPF, EIGRP, BGP, to the extents required by the current CCNA curriculum. As of
version 5.3, Packet Tracer also supports the Border Gateway Protocol.
In addition to simulating certain aspects of computer networks, Packet Tracer can also be used
for collaboration. As of Packet Tracer 5.0, Packet Tracer supports a multi-user system that
enables multiple users to connect multiple topologies together over a computer network. Packet
Tracer also allows instructors to create activities that students have to complete. Packet Tracer
is often used in educational settings as a learning aid. Cisco Systems claims that Packet Tracer
is useful for network experimentation.
Packet Tracer allows students to design complex and large networks, which is often not feasible
with physical hardware, due to costs. Packet Tracer is commonly used by CCNA Academy
students, since it is available to them for free. However, due to functional limitations, it is
intended by CISCO to be used only as a learning aid, not a replacement for
Cisco routers and switches. The application itself only has a small number of features found
within the actual hardware running a current Cisco IOS version. Thus, Packet Tracer is
unsuitable for modelling production networks. It has a limited command set, meaning it is not
possible to practice all of the IOS commands that might be required. Packet Tracer can be
useful for understanding abstract networking concepts, such as the Enhanced Interior Gateway
Routing Protocol by animating these elements in a visual form. Packet Tracer is also useful in
education by providing additional components, including an authoring system, network
protocol simulation and improving knowledge an assessment system.
DESCRIPTION
About computer network
A network switch (also called switching hub, bridging hub, officially MAC bridge]) is
a computer networking device that connects devices on a computer network by using packet
switching to receive, process, and forward data to the destination device.
A network switch is a multiport network bridge that uses hardware addresses to process and
forward data at the data link layer (layer 2) of the OSI model. Some switches can also process
data at the network layer (layer 3) by additionally incorporating routing functionality. Such
switches are commonly known as layer-3 switches or multilayer switches.
Switches for Ethernet are the most common form of network switch. The first Ethernet switch
was introduced by Kalpana in 1990.[3] Switches also exist for other types of networks
including Fibre Channel, Asynchronous Transfer Mode, and InfiniBand.
Unlike less advanced repeater hubs, which broadcast the same data out of each of its ports and
let the devices decide what data they need, a network switch forwards data only to the devices
that need to receive it.
A switch is a device in a computer network that connects other devices together. Multiple data
cables are plugged into a switch to enable communication between different networked
devices. Switches manage the flow of data across a network by transmitting a received network
packet only to the one or more devices for which the packet is intended. Each networked device
connected to a switch can be identified by its network address, allowing the switch to direct
the flow of traffic maximizing the security and efficiency of the network.
A switch is more intelligent than an Ethernet hub, which simply retransmits packets out of
every port of the hub except the port on which the packet was received, unable to distinguish
different recipients, and achieving an overall lower network efficiency.
An Ethernet switch operates at the data link layer (layer 2) of the OSI model to create a
separate collision domain for each switch port. Each device connected to a switch port can
transfer data to any of the other ports at any time and the transmissions will not
interfere.[a] Because broadcasts are still being forwarded to all connected devices by the switch,
the newly formed network segment continues to be a broadcast domain. Switches may also
operate at higher layers of the OSI model, including the network layer and above. A device
that also operates at these higher layers is known as a multilayer switch.
Segmentation involves the use of a switch to split a larger collision domain into smaller ones
in order to reduce collision probability, and to improve overall network throughput. In the
extreme case (i.e. micro-segmentation), each device is located on a dedicated switch port. In
contrast to an Ethernet hub, there is a separate collision domain on each of the switch ports.
This allows computers to have dedicated bandwidth on point-to-point connections to the
network and also to run in full-duplex mode. Full-duplex mode has only one transmitter and
one receiver per collision domain, making collisions impossible.
The network switch plays an integral role in most modern Ethernet local area
networks (LANs). Mid-to-large sized LANs contain a number of linked managed
switches. Small office/home office (SOHO) applications typically use a single switch, or an
all-purpose evice such as a residential gateway to access small office/home broadband services
such as DSL or cable Internet. In most of these cases, the end-user device contains a router and
components that interface to the particular physical broadband technology. User devices may
also include a telephone interface for Voice over IP (VoIP).
Switches are most commonly used as the network connection point for hosts at the edge of a
network. In the hierarchical internetworking model and similar network architectures, switches
are also used deeper in the network to provide connections between the switches at the edge.
ROUTER
A route is a networking device that forwards data packets between computer networks.
Routers perform the traffic directing functions on the Internet. Data sent through the internet,
such as a web page or email, is in the form of data packets. A packet is
typically forwarded from one router to another router through the networks that constitute
an internetwork until it reaches its destination node.
A router is connected to two or more data lines from different networks. When a data packet
comes in on one of the lines, the router reads the network address information in the packet to
determine the ultimate destination. Then, using information in its routing table or routing
policy, it directs the packet to the next network on its journey.
The most familiar type of routers are home and small office routers that simply forward IP
packets between the home computers and the Internet. An example of a router would be the
owner's cable or DSL router, which connects to the Internet through an Internet service
provider (ISP). More sophisticated routers, such as enterprise routers, connect large business
or ISP networks up to the powerful core routers that forward data at high speed along
the optical fibre lines of the Internet backbone. Though routers are typically dedicated
hardware devices, software-based routers also exist.
Application
A router may have interfaces for different types of physical layer connections, such as copper
cables, fibre optic, or wireless transmission. It can also support different network
layer transmission standards. Each network interface is used to enable data packets to be
forwarded from one transmission system to another. Routers may also be used to connect two
or more logical groups of computer devices known as subnets, each with a different network
prefix.
Routers may provide connectivity within enterprises, between enterprises and the Internet, or
between internet service providers' (ISPs') networks. The largest routers (such as the Cisco
CRS-1 or Juniper PTX) interconnect the various ISPs, or may be used in large enterprise
networks. Smaller routers usually provide connectivity for typical home and office networks.
All sizes of routers may be found inside enterprises. The most powerful routers are usually
found in ISPs, academic and research facilities. Large businesses may also need more powerful
routers to cope with ever-increasing demands of intranet data traffic. A hierarchical
internetworking model for interconnecting routers in large networks is in common use
➢ Access, core and distribution
Access routers, including small office/home office (SOHO) models, are located at home and
customer sites such as branch offices that do not need hierarchical routing of their own.
Typically, they are optimized for low cost. Some SOHO routers are capable of running
alternative free Linux-based firmware like Tomato, OpenWrt or DD-WRT.
Distribution routers aggregate traffic from multiple access routers. Distribution routers are
often responsible for enforcing quality of service across a wide area network(WAN), so they
may have considerable memory installed, multiple WAN interface connections, and substantial
onboard data processing routines. They may also provide connectivity to groups of file servers
or other external networks.
In enterprises, a core router may provide a collapsed backbone interconnecting the distribution
tier routers from multiple buildings of a campus, or large enterprise locations. They tend to be
optimized for high bandwidth, but lack some of the features of edge routers.
➢ Security
External networks must be carefully considered as part of the overall security strategy of the
local network. A router may include a firewall, VPN handling, and other security functions, or
these may be handled by separate devices. Routers also commonly perform network address
translation which restricts connections initiated from external connections but is not recognised
as a security feature by all experts.]. Some experts argue that open source routers are more
secure and reliable than closed source routers because open source routers allow mistakes to
be quickly found and corrected.
➢ Routing different networks
Routers are also often distinguished on the basis of the network in which they operate. A router
in a local area network (LAN) of a single organisation is called an interior router. A router that
is operated in the Internet backbone is described as exterior router. While a router that connects
a LAN with the Internet or a wide area network (WAN) is called a border router, or gateway
router.
➢ Internet connectivity and internal use
Routers intended for ISP and major enterprise connectivity usually exchange routing
information using the Border Gateway Protocol (BGP). RFC 4098 standard defines the types
of BGP routers according to their functions:
Edge router: Also called a provider edge router, is placed at the edge of an ISP network.
The router uses External BGP to EBGP routers in other ISPs, or a large
enterprise Autonomous System.
Subscriber edge router: Also called a Customer Edge router, is located at the edge of the
subscriber's network, it also uses EBGP to its provider's Autonomous System. It is typically
used in an (enterprise) organization.
Inter-provider border router: Interconnecting ISPs, is a BGP router that maintains BGP
sessions with other BGP routers in ISP Autonomous Systems.
Core router: A core router resides within an Autonomous System as a back bone to carry
traffic between edge routers.
Within an ISP: In the ISP's Autonomous System, a router uses internal BGP to
communicate with other ISP edge routers, other intranet core routers, or the ISP's intranet
provider border routers.
"Internet backbone:" The Internet no longer has a clearly identifiable backbone, unlike its
predecessor networks. See default-free zone (DFZ). The major ISPs' system routers make
up what could be considered to be the current Internet backbone core. ISPs operate all four
types of the BGP routers described here. An ISP "core" router is used to interconnect its
edge and border routers. Core routers may also have specialized functions in virtual private
networks based on a combination of BGP and Multi-Protocol Label Switching protocols.
Port forwarding: Routers are also used for port forwarding between private Internet-
connected servers.
Voice/Data/Fax/Video Processing Routers: Commonly referred to as access
servers or gateways, these devices are used to route and process voice, data, video and fax
traffic on the Internet. Since 2005, most long-distance phone calls have been processed
as IP traffic (VOIP) through a voice gateway. Use of access server type routers expanded
with the advent of the Internet, first with dial-up access and another resurgence with voice
phone service.
Larger networks commonly use multilayer switches, with layer 3 devices being used to
simply interconnect multiple subnets within the same security zone, and higher layer
switches when filtering, translation, load balancing or other higher level functions are
required, especially between zones.
Networking cables
Networking cables are networking hardware used to connect one network device to other
network devices or to connect two or more computers to share printers, scanners etc. Different
types of network cables, such as coaxial cable, optical fibre cable, and twisted pair cables, are
used depending on the network's physical layer, topology, and size. The devices can be
separated by a few meters (e.g. via Ethernet) or nearly unlimited distances (e.g. via the
interconnections of the Internet).
There are several technologies used for network connections. Patch cables are used for short
distances in offices and wiring closets. Electrical connections using twisted pair or coaxial
cable are used within a building. Optical fibre cable is used for long distances or for
applications requiring high bandwidth or electrical isolation. Many installations use structured
cabling practices to improve reliability and maintainability. In some home and industrial
applications power lines are used as network cabling.
Twisted pair
Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted
together for the purposes of improving electromagnetic compatibility. Compared to a single
conductor or an untwisted balanced pair, a twisted pair reduces electromagnetic radiation from
pair and crosstalk between neighboring pairs and improves rejection of
external electromagnetic interference. It was invented by Alexander Graham Bell
In a balanced line, the two wires carry equal and opposite signals, and the destination detects
the difference between the two. This is known as differential signaling. Noise sources introduce
signals into the wires by coupling of electric or magnetic fields and tend to couple to both wires
equally. The noise thus produces a common-mode signal which can be canceled at the receiver
when the difference signal is taken.
Differential signaling starts to fail when the noise source is close to the signal wires; the closer
wire will couple with the noise more strongly and the receiver will be unable to eliminate it.
This problem is especially apparent in telecommunication cables where pairs in the same cable
lie next to each other for many miles. Twisting the pairs counters this effect as on each half
twist the wire nearest to the noise-source is exchanged. Provided the interfering source remains
uniform, or nearly so, over the distance of a single twist, the induced noise will remain
common-mode.
The twist rate (also called pitch of the twist, usually defined in twists per meter) makes up part
of the specification for a given type of cable. When nearby pairs have equal twist rates, the
same conductors of the different pairs may repeatedly lie next to each other, partially undoing
the benefits of differential mode. For this reason it is commonly specified that, at least for
cables containing small numbers of pairs, the twist rates must differ.[2]
In contrast to shielded or foiled twisted pair (typically F/UTP or S/FTP cable shielding), UTP
(unshielded twisted pair) cable is not surrounded by any shielding. UTP is the primary wire
type for telephone usage and is very common for computer networking.
Coaxial cable
Coaxial cable, or coax is a type of electrical cable that has an inner conductor surrounded by a
tubular insulating layer, surrounded by a tubular conducting shield. Many coaxial cables also
have an insulating outer sheath or jacket. The term coaxial comes from the inner conductor and
the outer shield sharing a geometric axis. Coaxial cable was invented by English engineer and
mathematician Oliver Heaviside, who patented the design in 1880.
Coaxial cable is a type of transmission line, used to carry high frequency electrical signals with
low losses. It is used in such applications as telephone trunklines, broadband
internet networking cables, high speed computer data busses, carrying cable television signals,
and connecting radio transmitters and receivers to their antennas. It differs from other shielded
cables because the dimensions of the cable and connectors are controlled to give a precise,
constant conductor spacing, which is needed for it to function efficiently as a transmission line.
An optical fibre cable, also known as a fibre optic cable, is an assembly similar to an electrical
cable, but containing one or more optical fibres that are used to carry light. The optical fibre
elements are typically individually coated with plastic layers and contained in a protective tube
suitable for the environment where the cable will be deployed. Different types of cableare used
for different applications, for example long distance telecommunication, or providing a high-
speed data connection between different parts of a building.
Optical fibre consists of a core and a cladding layer, selected for total internal reflection due to
the difference in th refractive index between the two. In practical fibres, the cladding is usually
coated with a layer of acrylate polymer or polyimide. This coating protects the fibre from
damage but does not contribute to its optical waveguideproperties. Individual coated fibres (or
fibres formed into ribbons or bundles) then have a tough resin buffer layer or core tube(s)
extruded around them to form the cable core. Several layers of protective sheathing, depending
on the application, are added to form the cable. Rigid fibre assemblies sometimes put light-
absorbing ("dark") glass between the fibres, to prevent light that leaks out of one fibre from
entering another. This reduces cross-talk between the fibres, or reduces flare in fibre bundle
imaging applications.
For use in more strenuous environments, a much more robust cable construction is required.
In loose-tube construction the fibre is laid helically into semi-rigid tubes, allowing the cable to
stretch without stretching the fibre itself. This protects the fibre from tension during laying and
due to temperature changes. Loose-tube fibre may be "dry block" or gel-filled. Dry block offers
less protection to the fibres than gel-filled, but costs considerably less. Instead of a loose tube,
the fibre may be embedded in a heavy polymer jacket, commonly called "tight buffer"
construction. Tight buffer cables are offered for a variety of applications, but the two most
common are "Breakout" and "Distribution". Breakout cables normally contain a ripcord, two
non-conductive dielectric strengthening members (normally a glass rod epoxy), an aramid
yarn, and 3 mm buffer tubing with an additional layer of Kevlar surrounding each fibre. The
ripcord is a parallel cord of strong yarn that is situated under the jacket(s) of the cable for jacket
removal.[3] Distribution cables have an overall Kevlar wrapping, a ripcord, and a 900
micrometer buffer coating surrounding each fibre. These fibre units are commonly bundled
with additional steel strength members, again with a helical twist to allow for stretching.
A critical concern in outdoor cabling is to protect the fibre from contamination by water. This
is accomplished by use of solid barriers such as copper tubes, and water-repellent jelly or water-
absorbing powder surrounding the fibre.
Finally, the cable may be armored to protect it from environmental hazards, such as
construction work or gnawing animals. Undersea cables are more heavily armored in their near-
shore portions to protect them from boat anchors, fishing gear, and even sharks, which may be
attracted to the electrical power that is carried to power amplifiers or repeaters in the cable.
Modern cables come in a wide variety of sheathings and armor, designed for applications such
as direct burial in trenches, dual use as power lines, installation in conduit, lashing to aerial
telephone poles, submarine installation, and insertion in paved streets.
SERVER
In computing, a server is a computer program or a device that provides functionality for other
programs or devices, called "clients". This architecture is called the client–server model, and a
single overall computation is distributed across multiple processes or devices. Servers can
provide various functionalities, often called "services", such as sharing data
or resources among multiple clients, or performing computation for a client. A single server
can serve multiple clients, and a single client can use multiple servers. A client process may
run on the same device or may connect over a network to a server on a different
device.[1] Typical servers are database servers, file servers, mail servers, print servers, web
servers, game servers, and application servers.[2]
Client–server systems are today most frequently implemented by (and often identified with)
the request–response model: a client sends a request to the server, which performs some action
and sends a response back to the client, typically with a result or acknowledgement.
Designating a computer as "server-class hardware" implies that it is specialized for running
servers on it. This often implies that it is more powerful and reliable than standard personal
computers, but alternatively, large computing clusters may be composed of many relatively
simple, replaceable server components.
OPERATION
Strictly speaking, the term server refers to a computer program or process (running program).
Through metonymy, it refers to a device used for (or a device dedicated to) running one or
several server programs. On a network, such a device is called a host. In addition to server, the
words serve and service (as noun and as verb) are frequently used,
[a]
though servicer and servant are not. The word service (noun) may refer to either the abstract
form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that
turns a computer into a server, e.g. Windows service. Originally used as "servers serve users"
(and "users use servers"), in the sense of "obey", today one often says that "servers serve data",
in the same sense as "give". For instance, web servers "serve [up] web pages to users" or
"service their requests".
The server is part of the client–server model; in this model, a server serves data for clients. The
nature of communication between a client and server is request and response. This is in contrast
with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any
computerized process that can be used or called by another process (particularly remotely,
particularly to share a resource) is a server, and the calling process or processes is a client. Thus
any general purpose computer connected to a network can host servers. For example, if files
on a device are shared by some process, that process is a file server. Similarly, web server
software can run on any capable computer, and so a laptop or a personal computer can host a
web server.
DHCP Server
UDP/IP defines how devices on one network communicate with devices on another network,
and the DHCP server can manage UDP/IP settings for devices on a network, by automatically
or dynamically assigning IP addresses to the devices.
The DHCP operates based on the client–server model. When a computer or other device
connects to a network, the DHCP client software sends a DHCP broadcast query requesting
the necessary information. Any DHCP server on the network may service the request. The
DHCP server manages a pool of IP addresses and information about client configuration
parameters such as default gateway, domain name, the name servers, and time servers. On
receiving a DHCP request, the DHCP server may respond with specific information for each
client, as previously configured by an administrator, or with a specific address and any other
information valid for the entire network and for the time period for which the allocation (lease)
is valid. A DHCP client typically queries for this information immediately after booting, and
periodically thereafter before the expiration of the information. When a DHCP client refreshes
an assignment, it initially requests the same parameter values, but the DHCP server may assign
a new address based on the assignment policies set by administrators.
On large networks that consist of multiple links, a single DHCP server may service the entire
network when aided by DHCP relay agents located on the interconnecting routers. Such agents
relay messages between DHCP clients and DHCP servers located on different subnets.
Depending on implementation, the DHCP server may have three methods of allocating IP
addresses:
Dynamic allocation
A network administrator reserves a range of IP addresses for DHCP, and each DHCP
client on the LAN is configured to request an IP address from the DHCP server during
network initialization. The request-and-grant process uses a lease concept with a
controllable time period, allowing the DHCP server to reclaim and then reallocate IP
addresses that are not renewed.
Automatic allocation
The DHCP server permanently assigns an IP address to a requesting client from the
range defined by the administrator. This is like dynamic allocation, but the DHCP
server keeps a table of past IP address assignments, so that it can preferentially assign
to a client the same IP address that the client previously had.
Manual allocation (commonly called static allocation)
The DHCP server issues a private IP address dependent upon each client's client id (or,
traditionally, the client MAC address), based on a predefined mapping by the
administrator. This feature is variously called static DHCP assignment by DD-
WRT, fixed-address by the dhcpd documentation, address reservation by
Netgear, DHCP reservation or static DHCP by Cisco and Linksys, and IP address
reservation or MAC/IP address binding by various other router manufacturers. If no
match for the client's client ID (if provided) or MAC address (if no client id is
provided) is found, the server may or may not optionally fall back to either Dynamic or
Automatic allocation.
DHCP is used for Internet Protocol version 4 (IPv4) and IPv6. While both versions
serve the same purpose, the details of the protocol for IPv4 and IPv6 differ
sufficiently that they may be considered separate protocols. For the IPv6 operation,
devices may alternatively use stateless address autoconfiguration. IPv6 hosts may
also use link-local addressing to achieve operations restricted to the local network
link.
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used
on UDP/IP networks whereby a DHCP server dynamically assigns an IP address and other
network configuration parameters to each device on a network so they can communicate with
other IP networks. A DHCP server enables computers to request IP addresses and networking
parameters automatically from the Internet service provider (ISP), reducing the need for
a network administratoror a user to manually assign IP addresses to all network devices. In the
absence of a DHCP server, a computer or other device on the network needs to be manually
assigned an IP address, or to assign itself an APIPA address, which will not enable it to
communicate outside its local subnet.
DHCP can be implemented on networks ranging in size from home networks to large campus
networks and regional Internet service provider networks.[2] A routeror a residential
gateway can be enabled to act as a DHCP server. Most residential network routers receive a
globally unique IP address within the ISP network. Within a local network, a DHCP server
assigns a local IP address to each device connected to the network.
A web server
A web server (or Web server) is server software, or hardware dedicated to running said
software, that can satisfy World Wide Web client requests. A web server can, in general,
contain one or more websites. A web server processes incoming network requests
over HTTP and several other related protocols.
The primary function of a web server is to store, process and deliver web pages to clients. The
communication between client and server takes place using the Hypertext Transfer Protocol
(HTTP). Pages delivered are most frequently HTML documents, which may
include images, style sheets and scripts in addition to the text content.
A user agent, commonly a web browser or web crawler, initiates communication by making
a request for a specific resource using HTTP and the server responds with the content of that
resource or an error message if unable to do so. The resource is typically a real file on the
server's secondary storage, but this is not necessarily the case and depends on how the web
server is implemented.
While the primary function is to serve content, a full implementation of HTTP also includes
ways of receiving content from clients. This feature is used for submitting web forms,
including uploading of files.
Many generic web servers also support server-side scripting using Active Server
Pages (ASP), PHP (Hypertext Preprocessor), or other scripting languages. This means that the
behaviour of the web server can be scripted in separate files, while the actual server software
remains unchanged. Usually, this function is used to generate HTML
documents dynamically ("on-the-fly") as opposed to returning static documents. The former is
primarily used for retrieving or modifying information from databases. The latter is typically
much faster and more easily cached but cannot deliver dynamic content.
Web servers can frequently be found embedded in devices such
as printers, routers, webcams and serving only a local network. The web server may then be
used as a part of a system for monitoring or administering the device in question. This usually
means that no additional software has to be installed on the client computer since only a web
browser is required (which now is included with most operating systems).
A network protocol is a set of established rules that dictates how to format, transmit and
receive data so computer network devices -- from servers and routers to endpoints -- can
communicate regardless of the differences in their underlying infrastructures, designs or
standards.To successfully send and receive information, devices on both sides of a
communication exchange must accept and follow protocol conventions. Support for network
protocols can be built into software, haDHCPrdware or both.Standardized network protocols
provide a common language for network devices. Without them, computers wouldn't know
how to engage with each other. As a result, except for specialty networks built around a specific
architecture, few networks would be able to function, and the internet as we know it wouldn't
exist. Virtually all network end users rely on network protocols for connectivity.
SCOPE
REFERENCE
✓ Www.Google.Com
✓ Www.Wikipidea.Com