You are on page 1of 51

GOVERNMENT POLYTECHNIC NAGPUR

DEPARTMENT OF ELECTRONICS AND


TELECOMMUNICATION

INTERNSHIP REPORT
SESSION 2022-2023

IT-NetworkZ Infosystems Pvt.


Ltd. (Kavin India Pvt. Ltd.)

TECHNICAL HEAD: PRESENTED BY:

Mr. Rajiv verma Gaurav Kharate

IT-NETWORKZ INFOSYSTEMS PVT.LTD 1|Page


DECLARATION

During my internship in IT-NetworkZ Infosystems Pvt. Ltd and preparation of this report I
realized that it is the joint venture guidance, assistance and co-operation. So, it would have not
been completed without and declaration and help received. It is matter of great privileges to
express my deep sense of gratitude towards my guide Mr. Rajiv Verma at IT-NetworkZ
Infosystems Pvt. Ltd Nagpur. For having this guidance, I am extremely thankful to him for
constant motivation and inspiration extended throughout during internship work which has made
me possible to complete the work in scheduled time. My sincere thanks to all the faculties.

Submitted By:

Gaurav Kharate

IT-NETWORKZ INFOSYSTEMS PVT.LTD 2|Page


ACKNOWLEDGEMENT

I have taken efforts in the project. However, it would not have been possible
without the kind and help of support and help of many individual and organizations
would like to extend my sincere thanks to all of them.

I am highly indebted to Mr. RajivVerma for their guidance and constant


supervision as well as for providing necessary information regarding the project &also
for their support in completing the project. I would like to express my gratitude toward
my parents & members of IT-NetworkZ Infosystems Pvt. Ltd. for their kind co-
operation and encouragement which help me in completion of this project.

I would like to give my special gratitude and thanks to industry persons for
giving me such attention and time.

My thanks and appreciation also go to my colleague in developing the project


and people who have willingly helped me out with their abilities.

TECHNICAL HEAD: PRESENTED BY:


Mr. Rajiv Verma Gaurav Kharate

IT-NETWORKZ INFOSYSTEMS PVT.LTD 3|Page


INDEX
Topics Page

Chapter 1: INTRODUCTION TO NETWORK 09

Chapter 2: NETWORK MEDIA 15

Chapter 3: NETWORK INTERFACE CARD (NIC) 19

Chapter 4: NETWOKING DEVICES 25

Chapter 5: NETWORKING PROTOCOLS 29

Chapter 6: IP ADDRESING 40

Chapter 7: REFERENCES 48

IT-NETWORKZ INFOSYSTEMS PVT.LTD 4|Page


COMPANY INFORMATION
Name: IT-NetworkZ Infosystems Pvt. Ltd.

INTRODUCTION

Ms IT-NetworkZ is an IT Company and part of Information Technology industry,


it was set on 22 May 2007. IT NetworkZ started its operations with Information
Technology services including IT Infrastructure Management and Professional
IT Training & Online Exam Facility, later in Dee 2009, company established
Software Development wing well On26 June 2015 Company was incorporated as
'IT-NetworkZ Infosystems Pvt Ltd Company has its presence in India & in South
Africa, its head office is situated in Laxmi Nagar) and branch offices are at
Nandanvan-Nagpur, Cape Town & Johannesburg-South Africa. Company is
running its all operations independently as per their Geographic area India
operations are handled by a team of 20-25 professionals.

SERVICE CATEGORIES:

1) IT Training & International Assessment:

IT Network has very strong bonding with educational institutions and hence
established around 28- MoU's with esteemed Institutions which comes under
MSBTE, UGC and AICTE, these MoU are done for students & faculty
development. Technical team members GENwork have fine experience and
keen interest in teaching Company has trained around 4000+ candidates under
its banner and usually 7200+ students attend IT- NetworkZ Tech sessions
every year. IT NetworkZ is an Ex-authorized Prometric and Pearson VUE test
centre for International IT Exams. Currently, it is authorized by "Kryterion
Testing Network for reputed Sales Force and other IT international exams;
IT giant "Persistent Systems Ltd had taken an initiative with company to
start this facility for needy candidates.

2) Live Project & Internships:

Live Project Internship turns student into professionals. Being a part of IT


Industry IT Network Management started with this initiative to produce more

IT-NETWORKZ INFOSYSTEMS PVT.LTD 5|Page


quality and Industry ready professionals Company is providing 6 Weeks, 6
Months & 1 Year Internship / Live projects for Final Year and Graduate
Candidates

3) Software Development:

IT-Network has a term of enthusiastic and creativity developers and designers


Company is providing stand alone, web applications and mobile app
developmentto various clients till now company has completed various
projects and working for some of the esteemed clients in Hospitality,
Education, and Government sector. As per the market demand and own
strength company has planned service-based solutions in Matrimony,
Employment, Education Listing Electronics Test System Venue Searching,
etc Company is planning to develop few solutions for health care industry as
well as professionals Company is providing 6 Weeks, 6 Months &1
Internship /Live for Final Year and Graduate Candidates.

AWARDS:
1) Awarded in TOP TEN Prometric Test Centres in the world; out of 5600+ Centre's for
theyear2013-14.
2) Microsoft Network Partner
3) 700-Tech Session Delivered to 20,000-Students

PRODUCTS:

Microsoft Dot Net

Virtualization Cloud

CCNA

Linux

Hardware

Security

IT-NETWORKZ INFOSYSTEMS PVT.LTD 6|Page


List of Tables

Table PAGE

1) Table No. 5.1 Http vs Https 34

2) Table No. 6.1 Classes Of IPv4 41

3) Table No. 6.2 Difference Between IPv4 And IPv6 43

4) Table No. 6.3 Classes Of Network IP Addressing Range 44

5) Table No. 6.4 Difference Between Public IP and Private IP 46

IT-NETWORKZ INFOSYSTEMS PVT.LTD 7|Page


List of Figures
Figure Page
LAN 10
WA
11
N
12
MAN
Bus Topology 13
Mesh Topology
14
Star Topology
Tree Topology 15
Ring Topology 16
Media Access 17
Control Types of NIC 20
Transmission Cable 21
UTP Cable 21
STP Cable 22
Coaxial Cable 22
Optical Cable 24
Microwave Cable

RF Transmission and Reception 25

IR Broadcasting 25

Transmitter and Receiver 26

Wired Network 27

Wireless Model 28

Domain Model 31
32
Network Protocol Representation

DHCP Server 32

DNS Server
33

IT-NETWORKZ INFOSYSTEMS PVT.LTD 8|Page


List of figures

Figure page

HTTP Protocol 35
HTTPS Representation 35
SMTP Server 37
SMTP Working 37
POP Working 38
IMAP Working 39
FTP 41
Architecture of IP Address 46
Network and Broadcasting Address 48
Subnet Mask

IT-NETWORKZ INFOSYSTEMS PVT.LTD 9|Page


CHAPTER 1
INTRODUCTION TO NETWORK
 LAN
A local area network (LAN) is a group of computers and peripheral devices that share a common
communications line or wireless link to a server within a distinct geographic area.

 ADVANTAGES OF LAN
1. Inexpensive transmission media.
2. It can simplify the physical association of a device to the media.
3. It is used to high data transmission rates.

 DISADVANTAGES OF LAN
1. LAN software needed a memory area in each of the mainframe used on the network.
2. Local area networking adds another phase of difficulty to the computer operation.
3. Some security system should be executed if it is essential to protect private data.

Fig No1.1: LAN

1. WAN:-
A wide area (WAN), is a geographically distributed private telecommunication networks that
interconnect multiple local area networks.

IT-NETWORKZ INFOSYSTEMS PVT.LTD 10 | P a g e


 ADVANTAGES OF WAN
1. Share information over the large area.
2. Message can be sent very quickly to anyone else on the network.
3. It support global market and global business

 DISADVANTAGRS OF WAN
1. It is slow in speed.
2. It is complex and completed.
3. WAN is not secured.

Fig No 1.2 WAN

2. MAN:-
A metropolitan area network (MAN) is a computer network that is larger than a single
building local area network (LAN) but is located in a single geographic area that is smaller
than a wide area network (WAN).

 ADVANTAGES OF MAN:-
1. It provides higher security compare to WAN
2. It is wider than LAN.
3. It helps in cost-effective sharing of common resources such as printer etc.

 DISADVANTAGES OF MAN:-
1. The large network difficult to manage.
2. It is difficult to secure the network once it becomes large.
3. More cable require for a MAN connection from one place to another.

IT-NETWORKZ INFOSYSTEMS PVT.LTD 11 | P a g e


Fig No1.3: MAN

 APPLICATIONS OF NETWORK

 RESOURCES NETWORK
1. Hardware(computing resources)
2. Software(application resources)
 INFORMATION RESOURCES:-
1. Easy accessibility from anywhere (File, database)
2. Search capability
 COMMUNICATION:-
1. Email
2. Message Broadcast

 NETWORK TOPOLOGY
The network topology defines the way in which computers, printers and other devices are
connected.

There are 5 types of Topology:-

1. Bus Topology
2. Mesh Topology
3. Star Topology
4. Tree Topology
5. Ring Topology

IT-NETWORKZ INFOSYSTEMS PVT.LTD 12 | P a g e


 BUS TOPOLOGY:-
Bus Topology is a specific kind of network topology in which all of the various devices in
the network are connected to a single cable or line.

FIGURE 1.4 BUS TOPOLOGY

 MESH TOPOLOGY
A Mesh is a network setup where each computer and network devices is interconnected with
one another.
It is a topology commonly used for wireless network.

FIGURE 1.5 MESH TOPOLOGY

IT-NETWORKZ INFOSYSTEMS PVT.LTD 13 | P a g e


 STAR TOPOLOGY
Star Topology is a network topology in which each network component is physically connected
to a central node such as router, hub or switch. In star Topology central hub acts like a server and
the connecting node acts like client.

Fig No1.6:STAR TOPOLOGY

 TREE TOPOLOGY
A Tree topology also known as star bus Topology is a hybrid network topology in which star
network are inter connected via bus network. In tree Topology every branch contain star network
and its main structure is designed in the form of a bus backbone cable.

Fig No.7: TREE TOPOLOGY

IT-NETWORKZ INFOSYSTEMS PVT.LTD 14 | P a g e


 RING TOPOLOGY:-
Ring Topology is a type of network topology in which each device is connected to two other
devices on either side via an RJ-45 or coaxial cable. This form a circular ring of connected device.
Data is transfered in one direction.

Fig No1.8: RING TOPOLOGY

IT-NETWORKZ INFOSYSTEMS PVT.LTD 15 | P a g e


CHAPTER-2
NIC

 NIC {NETWORK INTERFACING CARD}

 INTRODUCTION TO NIC

 It provides an interface between the Computer and the Network.


 It is one of the very important requirements of Network.
 Also called as LAN and Ethernet Card.
 On it has 48-bit MAC {MEDIA ACCES CONTROL} address.
 48 bits represented in 12 HEX Digits.
 This MAC address also called as Hardware address or Physical address.

Fig No 2.1: Media Access Control

 Purpose to Build NIC


 NIC allows both wired and wireless communications.
 NIC allows communications between computers connected via local area network (LAN) as
well as communications over large-scale network through Internet Protocol (IP).
 NIC is both a physical layer and a data link layer device, i.e., it provides the necessary
hardware circuitry so that the physical layer processes and some data link layer processes
can run on it.

 APPLICATIONS OF NETWORK INTERFACE CARD

 In OSI model NIC is use physical layer to transmit signals and Network layer to
transmit data packets.
 It can convert data into Digital Signal.

IT-NETWORKZ INFOSYSTEMS PVT.LTD 16 | P a g e


 It offers both wired and wireless communication techniques for Data communications.
 NIC operates in both Physical as well as Data link layer of the OSI model.

 Types of NIC

Fig No 2.2: Types of NIC

 INTERNAL NETWORK CARD

♦ twoIttypes.
requires network cables to provide network access. Internal network cards are of
The first type uses Peripheral Component Interconnect (PCI) connection,
while the
second type uses Industry Standard Architecture (ISA).
Cost
TP-link TG 3468 --- Rs.800

 EXTERNAL NETWORK CARD

♦ External network cards are of two types: Wireless and USB based. Wireless network card
needs to be inserted into the motherboard; however, no network cable is required to
connect to the network. They are useful while traveling or accessing a wireless signal.
Cost
TP-link Archer T5E AC 1200---Rs.2,200

IT-NETWORKZ INFOSYSTEMS PVT.LTD 17 | P a g e


INTERNAL NIC

EXTERNAL NIC

IT-NETWORKZ INFOSYSTEMS PVT.LTD 18 | P a g e


 Components in NIC

1. Memory
 Memory is one of the most important components of the NIC. It is used to store the data
during communication.

2. Connectors
 Connectors are used to connect the cables to the Ethernet port.

3. Processor
 Processor is used for converting the data message into a suitable form of communication.

1. 4.Jumpers
 Jumpers are the small device that is used to control the communication operations without
the need of any software

4. Routers
 To provide wireless connectivity, routers are used.

5. MAC address
 MAC address is also referred to as a physical network address. It is a unique address that is
present to the network interface card where ethernet packets are communicated with the
computer.

 Ethernet NIC are available at various speed

 Ethernet (10 Mbps)


 Fast Ethernet (100 Mbps)
 Gigabit Ethernet (1000 Mbps)

 Mbps { Mega Bits Per Second}


 MBps { Mega Bytes Per Second}

IT-NETWORKZ INFOSYSTEMS PVT.LTD 19 | P a g e


CHAPTER
3 MEDIA

 Introduction to Transmission media / Network media


 Network media is the actual path over which an electrical signal travels as it moves from
one component to another.

Fig No 3.1: Transmission Media

 It's a Path to Transmit as well as receive Information

 It can be wireless as well as wired.


 Mainly there are 2 types Guided and Unguided.

 For establishing Network Connection its Path is very important.

 Guided Media

 Twisted Pair Cable

IT-NETWORKZ INFOSYSTEMS PVT.LTD 20 | P a g e


In Twisted Pair Cable there are 2 Types:

 UTP ( Unshielded Twisted Pair Cable)

 Most Commonly used.


 Mostly used for LAN network.

Fig No 3.2: UTP CABLE

 STP (Shielded Twisted Pair Cable)

 Rarely used {unique cases}


 Used where there are many disturbances in Environment like
(Noise, Vibrations, Temperature etc)

Fig No 3.3: STP CABLE

IT-NETWORKZ INFOSYSTEMS PVT.LTD 21 | P a g e


 Coaxial Cable

Coaxial cable is a type of wire us for communication medium, which has 2


separate conductors with proper insulation between them. This type of cable
mostly used for TV Cables {Cable service / TV channel service}.

Fig No 3.4: COAXIAL CABLE

 Fiber Optics (Optical Fiber)

 Fiber optic is the technology in which information is carried by the pulses of


light.
 Optical fibres are about the diameter of a strand of human hair and when
bundled into a Fiber-optic cable, they’re capable of transmitting more data
over longer distances and faster than other mediums.

Fig No 3.5: OPTICAL FIBER

IT-NETWORKZ INFOSYSTEMS PVT.LTD 22 | P a g e


 Unguided Media

1. Microwave Transmission

 Microwave Transmission has Electromagnetic wave which has


frequency range upto
(1 to 300 GHz).
 It Ranges up to Mega Hertz (MHz) .
 For Microwave Transmission There are microwave components are used
like Klystron Amplifier, Two Cavity Klystron and Gunn Diode etc.
 This type of Transmission is mainly used nowadays.
 At higher frequencies it has high information carrying capacity.
 Waveguides are used mainly in microwave transmission.

Fig No 3.6: MICROWAVE COMMUNICATION

IT-NETWORKZ INFOSYSTEMS PVT.LTD 23 | P a g e


2. RF (Radio Frequency signals)

 Radio frequency (RF) is a measurement representing the oscillation rate of


electromagnetic radiation spectrum, or electromagnetic radio waves, from frequencies
ranging from 300
gigahertz (GHz) to as low as 9 kilohertz (kHz).

Fig No 3.7: RF TRANSMISSION AND RECEPTION.

IT-NETWORKZ INFOSYSTEMS PVT.LTD 24 | P a g e


IR (Infrared Signals)

 Infrared is a means of using light to transmit a signal over distance.


 The light frequency used in Infrared is above the range of visible light in the red end of
the light spectrum.
 IR is used for transmitting a signal representing sound in many Assistive Listening Devices
(ALDs) or Assistive Listening Systems (ALSs).

Fig No 3.8: IR BROADCASTING

Fig No 3.9: IR TRANSMITTER AND RECEIVER

IT-NETWORKZ INFOSYSTEMS PVT.LTD 25 | P a g e


CHAPTER-4
NETWORKING DEVICES

 TYPES OF NETWORKING: -

 Wired network
 Wireless network

 Wired networks:

Wired networks are almost always faster and less expensive than wireless networks. Once
connected, there is little that can disrupt a good-wired connection. Wired networks come in
many forms, but the most popular are HomePNA and Ethernet. HomePNA uses the existing
phone line wires in your home and Ethernet nods special network cabling.

 Fig No 4.1 :Wired Networks

IT-NETWORKZ INFOSYSTEMS PVT.LTD 26 | P a g e


 WIRELESS MODELS

Wireless network refers to a computer network that makes use of Radio Frequency (RF)

Fig No 4.2: WIRELESS MODEL

connections between nodes in the network. Wireless networks are a popular solution for homes,
businesses, and telecommunications networks.

 MODELS OF NETWORKING

Model means the connectivity of two computers. We have many types of networking models.

(i) Client-Server Model


(ii) Peer to Peer Model (Workgroup Model)
(iii) Domain Model

(i) CLIENT SERVER MODEL: -

In a client server model, we have one server and many clients. A Client can share the resources of
server, but a server cannot share the resources on clients on the point of view of administrator it's
very easy to control the network because we combine with the server also at security point of view.
It is very useful because it uses user level security in which users have to remember only one
password to share the resources.

IT-NETWORKZ INFOSYSTEMS PVT.LTD 27 | P a g e


(ii)PEER TO PEER MODEL(WORKGROUP MODEL): -

In Peer-to-Peer networking model all computers are in equal status, that is we cannot manage
centralization, administration security. In Peer-to-Peer networking client use operating system like
Window 98, Window XP, Window 2000, Window Vista

(iii) DOMAIN MODEL

It is a mixture of client server and peer-to-peer model. In these clients can share their resources as
peer-to-peer but with the permission of the server as in client server model therefore it is
commonly used model because in this security is more as we can put restriction on both server and
clients

Fig No 4.3: DOMAIN MODEL

IT-NETWORKZ INFOSYSTEMS PVT.LTD 28 | P a g e


 NETWORK DEVICES

Network Devices (Hub, Repeater, Bridge, Switch, Router and Gateways )

1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the
signal over the same network before the signal becomes too weak or corrupted so
as to extend the length to which the signal can be transmitted over the same
network.

2. Hub – A hub is basically a multiport repeater. A hub connects multiple wires


coming from different branches, for example, the connector in star topology
which connects different stations.
 Active Hub:-
 Passive hub: -
 Intelligent Hub

3. Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add on
the functionality of filtering content by reading the MAC addresses of source and
destination.
 Transparent Bridges: -
 Source Routing Bridges: -

4. Switch – A switch is a multiport bridge with a buffer and a design that can boost
its efficiency (a large number of ports imply less traffic) and performance. A switch
is a data link layer device.

5. Routers – A router is a device like a switch that routes data packets based on their
IP addresses. The router is mainly a Network Layer device. Routers normally connect
LANs and WANs together and have a dynamically updating routing table based on
which they make decisions on routing the data packets. Router divide broadcast
domains of hosts connected through it.

6. Gateway – A gateway, as the name suggests, is a passage to connect two networks


together that may work upon different networking models. They basically work as the
messenger agents that take data from one system, interpret it, and transfer it to
another system.

IT-NETWORKZ INFOSYSTEMS PVT.LTD 29 | P a g e


Chapter 5
PROTOCOL

INTRODUCTION TO PROTOCOLS

 What Is Protocol ?

Protocol, in computer science, a set of rules or procedures for transmitting data between electronic
devices, such as computers. In order for computers to exchange information, there must be existing
agreement as to how the information will be structured and how each side will send and receive it.
For example - Ethernet and HTTP.

 Types of Protocols :
● HTTP or HTTPs. This stands for Hypertext Transfer Protocol or Hypertext Transfer
Protocol (secure). ...
● FTP (File Transfer Protocol) ...
● Email Protocols (POP3, IMAP, SMTP) ...
● TCP(Transmission Control Protocol) and UDP(User Datagram Protocol)

Application Of Network Protocols :


● Email
● File Transfer
● Network Management
● Remote Login

 Network Protocol Represented by Figure :

IT-NETWORKZ INFOSYSTEMS PVT.LTD 30 | P a g e


Fig No 5.1:Network protocol representaion.

 SERVER ROLE.

What Is Server Roles ?


A server is a computer or system that provides resources, data, services, or programs to other
computers, known as clients, over a network or we can say that the server operating system require
to make a computer as a server.
Ex : Window Server NT, Windows Server 2000, Windows Server 2003,2008,2016,2019,..

There Are some Roles :


● DHCP Server
● DNS Server
● HTTP Server
● Mail Server
● FTP Server

 Role 1 :

DHCP SERVER
(Dynamic Host Configuration Protocol)

A DHCP Server is a network server that automatically provides and assigns IP address, default
gateway and other network parameters to client devices.
DHCP Server Uses UDP (User Datagram Protocol refers to a protocol used for communication
throughout the internet.) as the port protocol on ports 67 & 68.

IT-NETWORKZ INFOSYSTEMS PVT.LTD 31 | P a g e


 Features of DHCP :

● In DHCP IP keep on changing.


● Least duration to change and given IP to user.
● Service server to provide an IP at least duration.
● DHCP assignes an IP address to out smartphones, tablets, laptops and devices like doorbell
,cameras.
● It is a Network Management Protocol.

 Application of DHCP :

● DHCP provides the following benefits. Reliable IP address configuration.


● Reduced network administration.

 Architecture Of DHCP :

Fig No.5.2: DHCP SERVER

 Role 2 :

DNS SERVER
(Domain Name System)

A DNS server is a computer server that contains a database of public IP addresses and their
associated hostnames, and in most cases serves to resolve, or translate, those names to IP addresses
as requested.

IT-NETWORKZ INFOSYSTEMS PVT.LTD 32 | P a g e


DNS, or the Domain Name System, translates human readable domain names (for example,
www.amazon.com ) to machine readable IP addresses (for example, 192.0. 2.44).

 Features Of DNS :
● Can map to a new IP address if the host's IP address changes.
● Are easier to remember than an IP address.
● Allow organizations to use a domain name hierarchy that is independent of any IP
address assignment.

 Advantages Of DNS :
● DNS is the only system allowing online users to use and browse the internet.
● DNS servers help you find the website withthe use of your web browser (like Chrome,
Safari, Firefox, Internet Explorer) by typing the name of the website.
● You don't need to memorize numbers.

 Application Of DNS :
● Primary website.
● Marketing campaign websites.
● Email servers.
● Customer support websites.
● Online resource libraries.

 Architecture Of DNS :

Fig No.5.3: DNS SERVER

IT-NETWORKZ INFOSYSTEMS PVT.LTD 33 | P a g e


 Role No.3 :

HTTP SERVER
(Hypertext Transfer Protocol)

Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol
(HTTP). It is used for secure communication over a computer network, and is widely used on the
Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security
(TLS) or, formerly, Secure Sockets Layer (SSL). The protocol is therefore also referred to as
HTTP over TLS (Transport Layer Security) or HTTP over SSL(Secure Socket Layer).
HTTP is a TCP/IP based communication protocol, that is used to deliver data (HTML files, image
files, query results, etc.) on the World Wide Web.

 Features Of HTTP :

● HTTP is connectionless: The HTTP client, i.e., a browser initiates an HTTP request and
after a request is made, the client waits for the response. ...
● HTTP is media independent: It means, any type of data can be sent by HTTP as long as both
the client and the server know how to handle the data content.

What is Https ?
Hypertext Transfer Protocol Secure (HTTPS) is a protocol that secures communication and data
transfer between a user's web browser and a website. HTTPS is the secure version of HTTP.A
website that uses HTTP has http:// in its URL, while a website that uses HTTPS has https://.

 Diffrence between Http V/S Https.

HTTPS HTTP

Data protection No protection from attackers

Ranking Boost with Google No ranking boost

Needs Testing after conversion to HTTPS No testing time and cost

Certification and Validation have costs No certification / validation cost


associated with them

IT-NETWORKZ INFOSYSTEMS PVT.LTD 34 | P a g e


Chrome user friendly Chrome users get a notification about
“unsecured site”

Table No.5.1: http vs https

 Limitations in HTTP :
● There is no privacy as anyone can see content.
● Not clear who you are talking about. Anyone who intercepts the request can get
the username and password.
 Limitations in HTTPS :
● HTTPS protocol can't stop stealing confidential information from the pages cached on
the browser.
● SSL data can be encrypted only during transmission on the network.

o HTTP SERVER .

Fig No.5.4: HTTP PROTOCOL

 HTTPS:

Fig No 5.5: HTTPS REPRESENTATION

IT-NETWORKZ INFOSYSTEMS PVT.LTD 35 | P a g e


 Role No.4 :
MAIL SERVER ( SMPT )
(Simple Mail Transfer Protocol

There are three common protocols used to deliver email over the Internet: the Simple Mail Transfer
Protocol (SMTP), the Post Office Protocol (POP), and the Internet Message Access Protocol
(IMAP). All three use TCP, and the last two are used for accessing electronic mailboxes.

 Mail Server Representation.

Fig No 5.6: SMTP SERVER

 SMPT
SMTP stands for Simple Mail Transfer Protocol, and it is responsible for sending email messages.
This protocol is used by email clients and mail servers to exchange emails between computers.

 Characteristics of SMPT :

● SMTP is a push protocol.


● SMTP uses TCP at the transport layer.
● SMTP uses port number 25.
● SMTP uses persistent TCP connections, so it can send multiple emails at once.
● SMTP is a connection oriented protocol
● SMTP is a stateless protocol.

IT-NETWORKZ INFOSYSTEMS PVT.LTD 36 | P a g e


 Architecture Of SMPT :

Fig No 5.7: SMTP Working

 POP3
The POP3 abbreviation stands for Post Office Protocol version 3, which provides access to an
inbox stored in an email server. It executes the download and delete operations for messages. Thus,
when a POP3 client connects to the mail server, it retrieves all messages from the mailbox. Then it
stores them on your local computer and deletes them from the remote server.
Thanks to this protocol, you are able to access the messages locally in offline mode as well.

 Advantages Of POP3 :
● Opening attachments is quick and easy as they are already downloaded.
● Less server storage space required; all emails are stored on local machine.
● Storage capacity of emails limited by the size of your hard disk.
● Very popular, easy to configure and use.

 Working of POP3 :

Fig No 5.8: POP Working

IT-NETWORKZ INFOSYSTEMS PVT.LTD 37 | P a g e


 IMAP

The Internet Message Access Protocol (IMAP) allows you to access and manage your email
messages on the email server. This protocol permits you to manipulate folders, permanently delete
and efficiently search through messages. It also gives you the option to set or remove email flags,
or fetch email attributes selectively IMAP supports the connection of multiple users to a single
mail server.

 Advantages of IMAP

● It is capable of managing multiple mailboxes and organizing them into various categories.
● As with POP, no licences are required.
● Again, IMAP is also supported by virtually all devices.
● Ability to organise your inbox, and add different folders.

 Working of IMAP

Fig No 5.9: IMAP WORKING.

 Role No.5 :
 FTP SERVER
(File Transfer Protocol)

An FTP server is a computer that offers files available for download via an FTP protocol, and it is
a common solution used to facilitate remote data sharing between computers. An FTP server is an
important component in FTP architecture and helps in exchanging files over the internet.

IT-NETWORKZ INFOSYSTEMS PVT.LTD 38 | P a g e


 Features Of FTP :

● Data representation
● File organization and Data structures
● Transmission modes
● Error control
● Access control

 Advantages of FTP :

● Security. Ultimately, the biggest benefit of using FTP servers over other choices is the
level of security that these managed options can provide. ...
● Control. ...
● Large File Sizes. ...
● Improved Workflow. ...
● Disaster Recovery.

 Architecture or Working of FTP :

Fig No 5.10: FTP

IT-NETWORKZ INFOSYSTEMS PVT.LTD 39 | P a g e


 Application of FTP :

● Organizations use FTP to allow employees to share files across different locations and
branch offices.
● Employees use FTP to securely share files with co-workers and external business partners.
● IT teams use FTP to transfer data back to disaster recovery (DR) sites.

IT-NETWORKZ INFOSYSTEMS PVT.LTD 40 | P a g e


CHAPTER 6
IP ADDRESSING

What is IP addressing ?
An IP address allows computers to send and receive data over the internet. Most IP addresses are
purely numerical, but as internet usage grows, letters have been added to some addresses. There are
four different types of IP addresses: public, private, static, and dynamic. An IP address is a 32-bit
number. It uniquely identifies a host (computer or other device, such as a printer or router) on a
TCP/IP network. IP addresses are normally expressed in dotted-decimal format, with four numbers
separated by periods, such as 192.168. 123.132.

 Features of IP ADDRESSING :
● IP Addressing is Logical Addressing.
● It works on Network Layer (Layer 3)
● Two Version of Addressing Scheme are:
● IP Version 4 – 32 bit addressing (IPv4)
● IP Version 6 – 128 bit addressing (IPv6)

 Application of IP ADDRESSING :
● Digital Rights Management.
● Content Localization.
● Price Optimization.
● Geo Advertising.
● Traffic Management.
● Traffic Analytics.
● Fraud Detection.
 Architecture of IP Addressing

Fig No.6.1

IT-NETWORKZ INFOSYSTEMS PVT.LTD 41 | P a g e


 IP Version 4

Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is one of
the core protocols of standards-based internetworking methods in the Internet and other packet-
switched networks. IP (version 4) addresses are 32-bit integers that can be expressed in
hexadecimal notation.IPv4 was the first version deployed for production on SATNET in 1982 and
on the ARPANET in January 1983.

 Features Of IPv4 :
● Connectionless Protocol.
● Allow creating a simple virtual communication layer over diversified devices.
● It requires less memory and ease of remembering addresses.
● Already supported protocol by millions of devices.
● Offers video libraries and conferences.

 Advantages Of IPv4 :
● IPV4 is necessary to encrypt data to ensure privacy.
● It takes security measures to encrypt data in its address packets.
● IPV6 protocol can be easily supported by most of the topology drawings. Since addresses
are combined more effectively the process of routing has become more efficient in IPV4.

 Classes of IPv4 :
IPv4 address classes A to C identify single hosts, and are called unicast addresses.
IP addresses (using the IPv4 standard) are divided into 5 classes:
● Class A
● Class B LAN & WAN
● Class C
● Class D Multicasting
● Class E Research & Development

Class Starting Address Ending Address

A 0.0.0.0 127.255.255.255

B 128.0.0.0 191.255.255.255

C 192.0.0.0 223.255.255.255

D 224.0.0.0 239.255.255.255

Table No.6.1

IT-NETWORKZ INFOSYSTEMS PVT.LTD 42 | P a g e


 IP Version 6

Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the
communications protocol that provides an identification and location system for computers on
networks and routes traffic across the Internet.128-bit address is divided along 16-bit boundaries,
and each 16-bit block is converted to a 4-digit hexadecimal number and separated by colons.

 Features Of IPv6 :
● Larger Address Space. In contrast to IPv4, IPv6 uses 4 times more bits to address a
device on the Internet.
● End-to-end Connectivity.
● Auto-configuration.
● Faster Forwarding/Routing.
● No Broadcast.

 IPv6 complications :
● IPv4 and IPv6 machines cannot communicate directly to each other.
● The process of making the switch to IPv6 from IPv4 is slow and tedious..
● Because the header is of fixed length in IPv6, options cannot be tagged onto the IP header
as in IPv4.
● Allows the host to send fragments packets but not routers.

o Difference between IPv4 and IPv6 .

Parameters IPv4 IPv6

1. Address length IPv4 is a 32-bit address. IPv6 is a 128-bit address.

2. Classes IPv4 has 5 different classes of IPv6 does not contain


IP address that includes Class classes of IP addresses.
A, Class B, Class C, Class D,
and Class E.

3. Number of IP IPv4 has a limited number of IPv6 has a large number of


address IP addresses. IP addresses.

IT-NETWORKZ INFOSYSTEMS PVT.LTD 43 | P a g e


4. Address It supports manual and DHCP It supports manual, DHCP,
configuration configuration. auto-configuration, and
renumbering.

5. Address In IPv4, the IP address In IPv6, the representation of


representation is represented in the IP address in
decimal. hexadecimal.

6. Encryption and It does not provide encryption It provides encryption and


Authentication and authentication. authentication.

7. Transmission IPv4 is broadcasting. IPv6 is multicasting, which


scheme provides efficient network
operations.

Table No 6.2

 Priority bit concept.

Priority bit are the left most bit in the First Octet of IP Address. There are certain addresses in
each class of IP Address that are reserved for LAN (Local Area Network). These addresses are
called Private address. They are used for Home & Office network & are not used in Internet Live
(Public) Address or to identify the range of each class, a bit called Priority Bit is used.

● CLASS A priority bit is 0


● CLASS B priority bit is 10
● CLASS C priority bit is 110
● CLASS D priority bit is 1110
● CLASS E priority bit is 1111

 Octet Format.

In the IPv4 portion of the address x is called an octet and must be a decimal value between 0 and
255. The octets are separated by periods. The IPv4 portion of the address must contain three periods
and four octets.
IP address is divided into Network & Host portion
● CLASS A is written as N.H.H.H
● CLASS B is written as N.N.H.H
● CLASS C is written as N.N.N.H

IT-NETWORKZ INFOSYSTEMS PVT.LTD 44 | P a g e


 .CLASS A :
Class A Octet Format is N.H.H.H
● Network bits: 8
● Host bits: 24

 CLASS B :
Class B Octet Format is N.N.H.H
● Network bits: 16
● Host bits: 16

 CLASS C :
Class C Octet Format is N.N.N.H
● Network bits: 24
● Host bits: 8

 Classes of Network IP Addressing Range :

Table No .6.3

 Network & Broadcast Address

● The Network Address is represented with all bits as ZERO in the host portion of
the address.
● The Broadcast Address is represented with all bits as ONES in the host portion of
the address.
● Valid IP Addresses lie between the Network Address and the Broadcast Address.
● Only Valid IP Addresses are assigned to hosts/clients.

IT-NETWORKZ INFOSYSTEMS PVT.LTD 45 | P a g e


 Pictorial Representation of Network & Broadcast address by classes.

Fig No.6.2

 Private IP Address

There are certain addresses in each class of IP address that are reserved for LAN. These
addresses are called Private Addresses .They can be used for: Home & Office Networks.
(Networks not connected to Internet). A private IP address is a range of non-internet facing IP
addresses used in an internal network. Private IP addresses are provided by network devices, such
as routers, using network address translation.

CLASS A :
10.0.0.0 to 10.255.255.255
CLASS B :
172.16.0.0 to 172.31.255.255
CLASS C :
192.168.0.0 to 192.168.255.255

IT-NETWORKZ INFOSYSTEMS PVT.LTD 46 | P a g e


 Use of Private IP Address.
Private IP addresses are commonly used for residential and corporate networks, as the addresses
cannot be seen outside the private network. Internet service providers (ISPs) May also allocate a
single routable IPv4 address to residential customers. To translate that one address to multiple
addresses, so multiple devices can have the assigned address, a network address translator/port
address translator gateway is used. This method can connect multiple hosts.

o Difference between Public IP & Private IP.

Private IP Address Public IP Address

 Use for communicating within a  Use to communicate over the internet


private network cannot be directly - outside a private network
contacted over the internet.

 Addresses can be reused per network.  These are unique and cannot be
reused.

 Assigned to a device by a Router.  Assigned by an ISP(Internet Service


Provider)

 Has a small set range of possible  Addresses can be any combination of


addresses. number's not within the Private IP
range.

Table No 6.4

 SUBNET MASK

A subnet mask is a 32-bit number created by setting host bits to all 0s and setting network bits to
all 1s. In this way, the subnet mask separates the IP address into the network and host addresses. A
class C network would have a subnet mask of 255.255. 255.0 it means that 24 bits are used for the
network.

 Features of Subnet mask.

● Reduce network congestion.


● Control network growth
● Ease administration
● Boost network security

IT-NETWORKZ INFOSYSTEMS PVT.LTD 47 | P a g e


 Characteristics of Subnet Mask.
● A subnet mask ensures that traffic remains within its designated subnet.
● This reduces major congestion and reduces the load imparted on the network.
● With sub-networks, less distance needs to be travelled by data packets, enhancing network
performance.

Fig No 6.3

 Architecture of Subnet Mask.

 Use of Subnet Mask


● Reallocating IP addresses
● Relieving network congestion.
● Improving network security.

IT-NETWORKZ INFOSYSTEMS PVT.LTD 48 | P a g e


 REFERENCE

1) https://www.cisco.com/c/en_in/products/switches/what-is-a-lan-

local-area-network.html

2) https://www.geeksforgeeks.org/types-of-network-topology/

3) https://www.javatpoint.com/network-interface-card

4) https://www.tutorialspoint.com/what-is-network-interface-card-

nic

5) https://en.m.wikipedia.org/wiki/Network_interface_controller

6) https://www.geeksforgeeks.org/types-transmission-media/

7) https://www.javatpoint.com/transmission-media

IT-NETWORKZ INFOSYSTEMS PVT.LTD 49 | P a g e


8) https://www.slideshare.net/KrishiAgrawal/computer-networks-

presentation-58566459

9) https://www.javatpoint.com/computer-network-tutorial

10)https://www.slideshare.net/chinmayjena/computer-networking-

26016826

11)https://www.tutorialspoint.com

12)https://www.javatpoint.com/ipv4-vs-ipv6

IT-NETWORKZ INFOSYSTEMS PVT.LTD 50 | P a g e


IT-NETWORKZ INFOSYSTEMS PVT.LTD 51 | P a g e

You might also like