Professional Documents
Culture Documents
INTERNSHIP REPORT
SESSION 2022-2023
During my internship in IT-NetworkZ Infosystems Pvt. Ltd and preparation of this report I
realized that it is the joint venture guidance, assistance and co-operation. So, it would have not
been completed without and declaration and help received. It is matter of great privileges to
express my deep sense of gratitude towards my guide Mr. Rajiv Verma at IT-NetworkZ
Infosystems Pvt. Ltd Nagpur. For having this guidance, I am extremely thankful to him for
constant motivation and inspiration extended throughout during internship work which has made
me possible to complete the work in scheduled time. My sincere thanks to all the faculties.
Submitted By:
Gaurav Kharate
I have taken efforts in the project. However, it would not have been possible
without the kind and help of support and help of many individual and organizations
would like to extend my sincere thanks to all of them.
I would like to give my special gratitude and thanks to industry persons for
giving me such attention and time.
Chapter 6: IP ADDRESING 40
Chapter 7: REFERENCES 48
INTRODUCTION
SERVICE CATEGORIES:
IT Network has very strong bonding with educational institutions and hence
established around 28- MoU's with esteemed Institutions which comes under
MSBTE, UGC and AICTE, these MoU are done for students & faculty
development. Technical team members GENwork have fine experience and
keen interest in teaching Company has trained around 4000+ candidates under
its banner and usually 7200+ students attend IT- NetworkZ Tech sessions
every year. IT NetworkZ is an Ex-authorized Prometric and Pearson VUE test
centre for International IT Exams. Currently, it is authorized by "Kryterion
Testing Network for reputed Sales Force and other IT international exams;
IT giant "Persistent Systems Ltd had taken an initiative with company to
start this facility for needy candidates.
3) Software Development:
AWARDS:
1) Awarded in TOP TEN Prometric Test Centres in the world; out of 5600+ Centre's for
theyear2013-14.
2) Microsoft Network Partner
3) 700-Tech Session Delivered to 20,000-Students
PRODUCTS:
Virtualization Cloud
CCNA
Linux
Hardware
Security
Table PAGE
IR Broadcasting 25
Wired Network 27
Wireless Model 28
Domain Model 31
32
Network Protocol Representation
DHCP Server 32
DNS Server
33
Figure page
HTTP Protocol 35
HTTPS Representation 35
SMTP Server 37
SMTP Working 37
POP Working 38
IMAP Working 39
FTP 41
Architecture of IP Address 46
Network and Broadcasting Address 48
Subnet Mask
ADVANTAGES OF LAN
1. Inexpensive transmission media.
2. It can simplify the physical association of a device to the media.
3. It is used to high data transmission rates.
DISADVANTAGES OF LAN
1. LAN software needed a memory area in each of the mainframe used on the network.
2. Local area networking adds another phase of difficulty to the computer operation.
3. Some security system should be executed if it is essential to protect private data.
1. WAN:-
A wide area (WAN), is a geographically distributed private telecommunication networks that
interconnect multiple local area networks.
DISADVANTAGRS OF WAN
1. It is slow in speed.
2. It is complex and completed.
3. WAN is not secured.
2. MAN:-
A metropolitan area network (MAN) is a computer network that is larger than a single
building local area network (LAN) but is located in a single geographic area that is smaller
than a wide area network (WAN).
ADVANTAGES OF MAN:-
1. It provides higher security compare to WAN
2. It is wider than LAN.
3. It helps in cost-effective sharing of common resources such as printer etc.
DISADVANTAGES OF MAN:-
1. The large network difficult to manage.
2. It is difficult to secure the network once it becomes large.
3. More cable require for a MAN connection from one place to another.
APPLICATIONS OF NETWORK
RESOURCES NETWORK
1. Hardware(computing resources)
2. Software(application resources)
INFORMATION RESOURCES:-
1. Easy accessibility from anywhere (File, database)
2. Search capability
COMMUNICATION:-
1. Email
2. Message Broadcast
NETWORK TOPOLOGY
The network topology defines the way in which computers, printers and other devices are
connected.
1. Bus Topology
2. Mesh Topology
3. Star Topology
4. Tree Topology
5. Ring Topology
MESH TOPOLOGY
A Mesh is a network setup where each computer and network devices is interconnected with
one another.
It is a topology commonly used for wireless network.
TREE TOPOLOGY
A Tree topology also known as star bus Topology is a hybrid network topology in which star
network are inter connected via bus network. In tree Topology every branch contain star network
and its main structure is designed in the form of a bus backbone cable.
INTRODUCTION TO NIC
In OSI model NIC is use physical layer to transmit signals and Network layer to
transmit data packets.
It can convert data into Digital Signal.
Types of NIC
♦ twoIttypes.
requires network cables to provide network access. Internal network cards are of
The first type uses Peripheral Component Interconnect (PCI) connection,
while the
second type uses Industry Standard Architecture (ISA).
Cost
TP-link TG 3468 --- Rs.800
♦ External network cards are of two types: Wireless and USB based. Wireless network card
needs to be inserted into the motherboard; however, no network cable is required to
connect to the network. They are useful while traveling or accessing a wireless signal.
Cost
TP-link Archer T5E AC 1200---Rs.2,200
EXTERNAL NIC
1. Memory
Memory is one of the most important components of the NIC. It is used to store the data
during communication.
2. Connectors
Connectors are used to connect the cables to the Ethernet port.
3. Processor
Processor is used for converting the data message into a suitable form of communication.
1. 4.Jumpers
Jumpers are the small device that is used to control the communication operations without
the need of any software
4. Routers
To provide wireless connectivity, routers are used.
5. MAC address
MAC address is also referred to as a physical network address. It is a unique address that is
present to the network interface card where ethernet packets are communicated with the
computer.
Guided Media
1. Microwave Transmission
TYPES OF NETWORKING: -
Wired network
Wireless network
Wired networks:
Wired networks are almost always faster and less expensive than wireless networks. Once
connected, there is little that can disrupt a good-wired connection. Wired networks come in
many forms, but the most popular are HomePNA and Ethernet. HomePNA uses the existing
phone line wires in your home and Ethernet nods special network cabling.
Wireless network refers to a computer network that makes use of Radio Frequency (RF)
connections between nodes in the network. Wireless networks are a popular solution for homes,
businesses, and telecommunications networks.
MODELS OF NETWORKING
Model means the connectivity of two computers. We have many types of networking models.
In a client server model, we have one server and many clients. A Client can share the resources of
server, but a server cannot share the resources on clients on the point of view of administrator it's
very easy to control the network because we combine with the server also at security point of view.
It is very useful because it uses user level security in which users have to remember only one
password to share the resources.
In Peer-to-Peer networking model all computers are in equal status, that is we cannot manage
centralization, administration security. In Peer-to-Peer networking client use operating system like
Window 98, Window XP, Window 2000, Window Vista
It is a mixture of client server and peer-to-peer model. In these clients can share their resources as
peer-to-peer but with the permission of the server as in client server model therefore it is
commonly used model because in this security is more as we can put restriction on both server and
clients
1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the
signal over the same network before the signal becomes too weak or corrupted so
as to extend the length to which the signal can be transmitted over the same
network.
3. Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add on
the functionality of filtering content by reading the MAC addresses of source and
destination.
Transparent Bridges: -
Source Routing Bridges: -
4. Switch – A switch is a multiport bridge with a buffer and a design that can boost
its efficiency (a large number of ports imply less traffic) and performance. A switch
is a data link layer device.
5. Routers – A router is a device like a switch that routes data packets based on their
IP addresses. The router is mainly a Network Layer device. Routers normally connect
LANs and WANs together and have a dynamically updating routing table based on
which they make decisions on routing the data packets. Router divide broadcast
domains of hosts connected through it.
INTRODUCTION TO PROTOCOLS
What Is Protocol ?
Protocol, in computer science, a set of rules or procedures for transmitting data between electronic
devices, such as computers. In order for computers to exchange information, there must be existing
agreement as to how the information will be structured and how each side will send and receive it.
For example - Ethernet and HTTP.
Types of Protocols :
● HTTP or HTTPs. This stands for Hypertext Transfer Protocol or Hypertext Transfer
Protocol (secure). ...
● FTP (File Transfer Protocol) ...
● Email Protocols (POP3, IMAP, SMTP) ...
● TCP(Transmission Control Protocol) and UDP(User Datagram Protocol)
SERVER ROLE.
Role 1 :
DHCP SERVER
(Dynamic Host Configuration Protocol)
A DHCP Server is a network server that automatically provides and assigns IP address, default
gateway and other network parameters to client devices.
DHCP Server Uses UDP (User Datagram Protocol refers to a protocol used for communication
throughout the internet.) as the port protocol on ports 67 & 68.
Application of DHCP :
Architecture Of DHCP :
Role 2 :
DNS SERVER
(Domain Name System)
A DNS server is a computer server that contains a database of public IP addresses and their
associated hostnames, and in most cases serves to resolve, or translate, those names to IP addresses
as requested.
Features Of DNS :
● Can map to a new IP address if the host's IP address changes.
● Are easier to remember than an IP address.
● Allow organizations to use a domain name hierarchy that is independent of any IP
address assignment.
Advantages Of DNS :
● DNS is the only system allowing online users to use and browse the internet.
● DNS servers help you find the website withthe use of your web browser (like Chrome,
Safari, Firefox, Internet Explorer) by typing the name of the website.
● You don't need to memorize numbers.
Application Of DNS :
● Primary website.
● Marketing campaign websites.
● Email servers.
● Customer support websites.
● Online resource libraries.
Architecture Of DNS :
HTTP SERVER
(Hypertext Transfer Protocol)
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol
(HTTP). It is used for secure communication over a computer network, and is widely used on the
Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security
(TLS) or, formerly, Secure Sockets Layer (SSL). The protocol is therefore also referred to as
HTTP over TLS (Transport Layer Security) or HTTP over SSL(Secure Socket Layer).
HTTP is a TCP/IP based communication protocol, that is used to deliver data (HTML files, image
files, query results, etc.) on the World Wide Web.
Features Of HTTP :
● HTTP is connectionless: The HTTP client, i.e., a browser initiates an HTTP request and
after a request is made, the client waits for the response. ...
● HTTP is media independent: It means, any type of data can be sent by HTTP as long as both
the client and the server know how to handle the data content.
What is Https ?
Hypertext Transfer Protocol Secure (HTTPS) is a protocol that secures communication and data
transfer between a user's web browser and a website. HTTPS is the secure version of HTTP.A
website that uses HTTP has http:// in its URL, while a website that uses HTTPS has https://.
HTTPS HTTP
Limitations in HTTP :
● There is no privacy as anyone can see content.
● Not clear who you are talking about. Anyone who intercepts the request can get
the username and password.
Limitations in HTTPS :
● HTTPS protocol can't stop stealing confidential information from the pages cached on
the browser.
● SSL data can be encrypted only during transmission on the network.
o HTTP SERVER .
HTTPS:
There are three common protocols used to deliver email over the Internet: the Simple Mail Transfer
Protocol (SMTP), the Post Office Protocol (POP), and the Internet Message Access Protocol
(IMAP). All three use TCP, and the last two are used for accessing electronic mailboxes.
SMPT
SMTP stands for Simple Mail Transfer Protocol, and it is responsible for sending email messages.
This protocol is used by email clients and mail servers to exchange emails between computers.
Characteristics of SMPT :
POP3
The POP3 abbreviation stands for Post Office Protocol version 3, which provides access to an
inbox stored in an email server. It executes the download and delete operations for messages. Thus,
when a POP3 client connects to the mail server, it retrieves all messages from the mailbox. Then it
stores them on your local computer and deletes them from the remote server.
Thanks to this protocol, you are able to access the messages locally in offline mode as well.
Advantages Of POP3 :
● Opening attachments is quick and easy as they are already downloaded.
● Less server storage space required; all emails are stored on local machine.
● Storage capacity of emails limited by the size of your hard disk.
● Very popular, easy to configure and use.
Working of POP3 :
The Internet Message Access Protocol (IMAP) allows you to access and manage your email
messages on the email server. This protocol permits you to manipulate folders, permanently delete
and efficiently search through messages. It also gives you the option to set or remove email flags,
or fetch email attributes selectively IMAP supports the connection of multiple users to a single
mail server.
Advantages of IMAP
● It is capable of managing multiple mailboxes and organizing them into various categories.
● As with POP, no licences are required.
● Again, IMAP is also supported by virtually all devices.
● Ability to organise your inbox, and add different folders.
Working of IMAP
Role No.5 :
FTP SERVER
(File Transfer Protocol)
An FTP server is a computer that offers files available for download via an FTP protocol, and it is
a common solution used to facilitate remote data sharing between computers. An FTP server is an
important component in FTP architecture and helps in exchanging files over the internet.
● Data representation
● File organization and Data structures
● Transmission modes
● Error control
● Access control
Advantages of FTP :
● Security. Ultimately, the biggest benefit of using FTP servers over other choices is the
level of security that these managed options can provide. ...
● Control. ...
● Large File Sizes. ...
● Improved Workflow. ...
● Disaster Recovery.
● Organizations use FTP to allow employees to share files across different locations and
branch offices.
● Employees use FTP to securely share files with co-workers and external business partners.
● IT teams use FTP to transfer data back to disaster recovery (DR) sites.
What is IP addressing ?
An IP address allows computers to send and receive data over the internet. Most IP addresses are
purely numerical, but as internet usage grows, letters have been added to some addresses. There are
four different types of IP addresses: public, private, static, and dynamic. An IP address is a 32-bit
number. It uniquely identifies a host (computer or other device, such as a printer or router) on a
TCP/IP network. IP addresses are normally expressed in dotted-decimal format, with four numbers
separated by periods, such as 192.168. 123.132.
Features of IP ADDRESSING :
● IP Addressing is Logical Addressing.
● It works on Network Layer (Layer 3)
● Two Version of Addressing Scheme are:
● IP Version 4 – 32 bit addressing (IPv4)
● IP Version 6 – 128 bit addressing (IPv6)
Application of IP ADDRESSING :
● Digital Rights Management.
● Content Localization.
● Price Optimization.
● Geo Advertising.
● Traffic Management.
● Traffic Analytics.
● Fraud Detection.
Architecture of IP Addressing
Fig No.6.1
Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is one of
the core protocols of standards-based internetworking methods in the Internet and other packet-
switched networks. IP (version 4) addresses are 32-bit integers that can be expressed in
hexadecimal notation.IPv4 was the first version deployed for production on SATNET in 1982 and
on the ARPANET in January 1983.
Features Of IPv4 :
● Connectionless Protocol.
● Allow creating a simple virtual communication layer over diversified devices.
● It requires less memory and ease of remembering addresses.
● Already supported protocol by millions of devices.
● Offers video libraries and conferences.
Advantages Of IPv4 :
● IPV4 is necessary to encrypt data to ensure privacy.
● It takes security measures to encrypt data in its address packets.
● IPV6 protocol can be easily supported by most of the topology drawings. Since addresses
are combined more effectively the process of routing has become more efficient in IPV4.
Classes of IPv4 :
IPv4 address classes A to C identify single hosts, and are called unicast addresses.
IP addresses (using the IPv4 standard) are divided into 5 classes:
● Class A
● Class B LAN & WAN
● Class C
● Class D Multicasting
● Class E Research & Development
A 0.0.0.0 127.255.255.255
B 128.0.0.0 191.255.255.255
C 192.0.0.0 223.255.255.255
D 224.0.0.0 239.255.255.255
Table No.6.1
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the
communications protocol that provides an identification and location system for computers on
networks and routes traffic across the Internet.128-bit address is divided along 16-bit boundaries,
and each 16-bit block is converted to a 4-digit hexadecimal number and separated by colons.
Features Of IPv6 :
● Larger Address Space. In contrast to IPv4, IPv6 uses 4 times more bits to address a
device on the Internet.
● End-to-end Connectivity.
● Auto-configuration.
● Faster Forwarding/Routing.
● No Broadcast.
IPv6 complications :
● IPv4 and IPv6 machines cannot communicate directly to each other.
● The process of making the switch to IPv6 from IPv4 is slow and tedious..
● Because the header is of fixed length in IPv6, options cannot be tagged onto the IP header
as in IPv4.
● Allows the host to send fragments packets but not routers.
Table No 6.2
Priority bit are the left most bit in the First Octet of IP Address. There are certain addresses in
each class of IP Address that are reserved for LAN (Local Area Network). These addresses are
called Private address. They are used for Home & Office network & are not used in Internet Live
(Public) Address or to identify the range of each class, a bit called Priority Bit is used.
Octet Format.
In the IPv4 portion of the address x is called an octet and must be a decimal value between 0 and
255. The octets are separated by periods. The IPv4 portion of the address must contain three periods
and four octets.
IP address is divided into Network & Host portion
● CLASS A is written as N.H.H.H
● CLASS B is written as N.N.H.H
● CLASS C is written as N.N.N.H
CLASS B :
Class B Octet Format is N.N.H.H
● Network bits: 16
● Host bits: 16
CLASS C :
Class C Octet Format is N.N.N.H
● Network bits: 24
● Host bits: 8
Table No .6.3
● The Network Address is represented with all bits as ZERO in the host portion of
the address.
● The Broadcast Address is represented with all bits as ONES in the host portion of
the address.
● Valid IP Addresses lie between the Network Address and the Broadcast Address.
● Only Valid IP Addresses are assigned to hosts/clients.
Fig No.6.2
Private IP Address
There are certain addresses in each class of IP address that are reserved for LAN. These
addresses are called Private Addresses .They can be used for: Home & Office Networks.
(Networks not connected to Internet). A private IP address is a range of non-internet facing IP
addresses used in an internal network. Private IP addresses are provided by network devices, such
as routers, using network address translation.
CLASS A :
10.0.0.0 to 10.255.255.255
CLASS B :
172.16.0.0 to 172.31.255.255
CLASS C :
192.168.0.0 to 192.168.255.255
Addresses can be reused per network. These are unique and cannot be
reused.
Table No 6.4
SUBNET MASK
A subnet mask is a 32-bit number created by setting host bits to all 0s and setting network bits to
all 1s. In this way, the subnet mask separates the IP address into the network and host addresses. A
class C network would have a subnet mask of 255.255. 255.0 it means that 24 bits are used for the
network.
Fig No 6.3
1) https://www.cisco.com/c/en_in/products/switches/what-is-a-lan-
local-area-network.html
2) https://www.geeksforgeeks.org/types-of-network-topology/
3) https://www.javatpoint.com/network-interface-card
4) https://www.tutorialspoint.com/what-is-network-interface-card-
nic
5) https://en.m.wikipedia.org/wiki/Network_interface_controller
6) https://www.geeksforgeeks.org/types-transmission-media/
7) https://www.javatpoint.com/transmission-media
presentation-58566459
9) https://www.javatpoint.com/computer-network-tutorial
10)https://www.slideshare.net/chinmayjena/computer-networking-
26016826
11)https://www.tutorialspoint.com
12)https://www.javatpoint.com/ipv4-vs-ipv6