You are on page 1of 24

COMPUTER NETWORKS

Submitted in partial fulfillment of the requirements for the degree of

BACHELOR OF TECHNOLOGY
in
CSE(Data Science)

by

V.ROOPA
20K91A6750

Under the guidance of


G UIDE N AME
DESIGNATION

DEPARTMENT OF CSE(DATA SCIENCE)


TKR COLLEGE OF ENGINEERING AND TECHNOLOGY (AUTONOMOUS)
(ACCREDITED BY NBA AND NAAC WITH ’A+’ GRADE)
Medbowli, Meerpet, Saroornagar, Hyderabad-500097
DECLARATION BY THE CANDIDATE

I, Ms. V. Roopa bearing Hall Ticket Number: 20K91A6750, hereby declare that the
mandatory course report titled COMPUTER NETWORKS under the guidance of
DR./MR./MS. GUIDE NAME, Designation in Department of CSE(Data Science) is
submitted in partial fulfillment of the requirements for mandatory course completion in
CSE(Data Science).

Signature of the Candidate

20K91A6750

Place: Meerpet

Date: 30/10/2023
CERTIFICATE

This is to certify that the mandatory course report entitled COMPUTER NETWORKS,
being submitted by Ms. V. Roopa, bearing ROLL.NO:20K91A6750 in partial fulfillment
of requirements for course completion in CSE(Data Science) to the TKR College of
Engineering and Technology is a record of work carried out by him/her under my guidance
and supervision.

Name and Signature of the Guide Name and Signature of the

HoD Place: Meerpet

Date: 30/10/2023
TABLE OF CONTENTS
LIST OF FIGURES v
LIST OF TABLES vi

1 INTRODUCTION 1

2 TYPES OF NETWORKS 2

3 TYPES OF NETWORK ARCHITECTURE 4

4 NETWORK TOPOLOGY 8

5 CONCLUSION 15
LIST OF FIGURES

fig 1: Peer to peer architecture 4

fig 2: Client server architecture 6

fig 3: Client server architecture 7

fig 4: Bus topology 9

fig 5: Ring topology 10

fig 6: Star topology 11

fig 7: Tree topology 12

fig 8: Mesh topology 13

fig 9: Hybrid topology 14

v
LIST OF TABLES

Table 1: AI pluses and minuses 11

vi
ABSTRACT

Computer networks have become increasingly ubiquitous. In today " s world, a computer
network is much more than a collection of interconnected devices. Computer networks are a
system of interconnected computers for the purpose of sharing digital information. The
computer network enables to analyze, organize and disseminate the information that is
essential to profitability. The rise of intranets and internets is the important aspect of
computer networking. Intranets and internets are private business networks that are based on
internet technology. The businesses are currently implementing intranets at a breakneck pace
and for one reason only, an intranet enables a business to collect, manage and disseminate
information more quickly and easily than ever before.
Many businesses are implementing intranets simply to remain competitive; business that
delay is likely to see their competition outdistance them. In this article we are presenting the
basic concepts of networking A computer network or data network is a telecommunications
network that allows computers to exchange data. In computer networks, networked
computing devices pass data to each other along data connections. The connections (network
links) between nodes are established using either cable media or wireless media. The best-
known computer network is the Internet. Network computer devices that originate, route and
terminate the data are called network nodes.
Nodes can include hosts such as personal computers, phones, servers as well as
networking hardware. Two such devices are said to be networked together when one device
is able to exchange information with the other device, whether or not they have a direct
connection to each other. Computer networks support applications such as access to the
World Wide Web, shared use of application and storage servers, printers, and fax machines,
and use of email and instant messaging applications. Computer networks differ in the
physical media used to transmit their signals, the communications protocols to organize
network traffic, the network's size, topology and organizational intent

vii
Chapter 1

INTRODUCTION

Motivation
Computer Network is a group of computers connected with each other through
wires, optical fibres or optical links so that various devices can interact with each other
through a network The aim of the computer network is the sharing of resources among
various devices In the case of computer network technology, there are several types of
networks that vary from simple to complex level. Each of the past three centuries has
been dominated by a single technology. People were doing lot of paper work in
organizations because, lack of advance systems which will help them in their day today
work. The 18th century was the time of the great mechanical systems accompanying the
Industrial revolution. Computer industry has made spectacular progress in short time.
During the first two decades of their existence.

Computer systems were highly centralized, usually within the single large room.
A medium size company or university might have had one or two computers, white large
institutions had at most few dozen. The idea that within 20 years equally powerful
computers smaller than postage stamps would be mass produced by the millions was pure
science fiction. The merging of computers and communications has had a profound
influence on the way computer systems are organized. The old model of single computer
serving all of the organization computational need has been replaced by one which the-
large no of separate but interconnected computers do the fob.

These systems are called has computer network. A network is a group of two of
more computer systems sharing services and interacting in some manner. This interaction
is, accomplished through a shared communication link, with the shared components
being data. Put simply a network is a collection of machines have been linked both
physically and through software components to facilitate communication and the sharing
of information. A physical pathway known as transmission medium, connects the
systems and a set of rules determines how they communicate. These rules are known as
protocols. A network protocol is software installed on a machine that determines the
agreed –upon set of rules for two or more machine to communicate with each other.

One common metaphor used to describe different protocols is to compare them to


human languages. Think of a group of people in the same room who know nothing about
each other. In order for them to communicate, this group must determine what language
1
to speak, how to handle identifying each other, whether to make general announcements
or have private conversations and so on. Machines using different protocols installed
can't communicate with each other. Networks are widely used by companies or on
personal level also. Network for companies should provide high reliability, cost efficient,
and recourse sharing.

TYPES OF NETWORKS:

LOCAL AREA NETWORK(LAN):

A LAN is generally confined to a specific location, such as floor, building or


some other small area. By being confined it is possible in most cases to use only one
transmission medium (cabling). The technology is less expensive to implement than
WAN because you are keeping all of your expenses to a small area, and generally you
can obtain higher speed. They, are widely used to connect personal computers and
workstations in company offices and factories to share recourses. LANs often use a
transmission all the machines are attached with each other. Traditional LANs runs at
speed of 10 to 100 mbps have low delay and make very few errors. Never LANs may
operate at higher speed up to 100 megabytes/sec

METROPOLITAN AREA NETWORK(MAN):

A MAN is larger than a LAN but smaller than a WAN. This is the type of
computer network that connects computers over a geographical distance through a shared
communication path over a city, town, or metropolitan area. This network mainly uses
FDDI, CDDI, and ATM as the technology with a range from 5km to 50km. Its

transmission speed is average. It is difficult to maintain and it comes with a high cost.
A Metropolitan Area Network or MAN is consisting of a computer network across an
entire city, college campus, or a small region. This type of network is large than a LAN,
which is mostly limited to a single building or site. Depending upon the type of
configuration, this type of network allows you to cover an area from several miles to tens
of miles.

2
PERSONAL AREA NETWORK(PAN):
PAN (Personal Area Network) is a computer network formed around a person. It
generally consists of a computer, mobile, or personal digital assistant. PAN can be used
for establishing communication among these personal devices for connecting to a digital
network and the internet. is the most basic type of computer network. This network is
restrained to a single person, that is, communication between the computer devices is
centered only on an individual’s workspace. PAN offers a network range of 1 to 100
meters from person to device providing communication. Its transmission speed is very
high with very easy maintenance and very low cost.

WIDE AREA NETWOR4K(WAN):

WAN is a type of computer network that connects computers over a large


geographical distance through a shared communication path. It is not restrained to a
single location but extends over many locations. WAN can also be defined as a group of
local area networks that communicate with each other with a range above 50km. Like
other than
Here we use Leased-Line & Dial-up technology. Its transmission speed is very low and it
comes with very high maintenance and very high cost. WAN (Wide Area Network) is
another important computer network that which is spread across a large geographical
area. WAN network system could be a connection of a LAN which connects with other
LAN’s using telephone lines and radio waves. It is mostly limited to an enterprise or an

organization.

3
TYPES OF NETWORK ARCHITECTURE:

NETWORK ARCHITECTURE:

First and foremost, what is network architecture? It's basically the physical and
logical design which refers to the software, hardware, protocols and the media of
transmission of data. Simply put, it refers to how computers are organized and how tasks
are allocated among these computers. The two types of widely used network
architectures are peer-to-peer aka P2P and client/server aka tiered.

1. PEER TO PEER ARCHITECTURE

In a peer-to-peer network, tasks are allocated to every device on the network.


Furthermore, there is no real hierarchy in this network, all computers are considered
equal and all have the same abilities to use the resources available on this network.
Instead of having a central server which would act as the shared drive, each computer
that connected to this network would act as the server for the files stored on it.

4
Fig 1:

ADVANTAGES:
Does not require a dedicated server which means its less costly. If one computer
stops working, the other computers connected to the network will continue working.
installation and setup is quite painless because of the built-in support in modern operating
systems.

DISADVANTAGES:
Security and data backups are to be done to each individual computer. As the
numbers of computers increases on a P2P network... performance, security, and access
becomes a major headache.

2. CLIENT/SERVER ARCHITECTURE:

In a client/server network, a centralized, really powerful computer(server) acts as


a hub in which other computers or workstations(clients) can connect to. This server is the
5
heart of the system, which manages and provides resources to any client that requests
them. Client-server architecture, architecture of a computer network in which many clients
(remote processors) request and receive service from a centralized server (host computer).
In a client/server network, a centralized, really powerful computer(server) acts as a hub in
which other computers or workstations(clients) can connect to. This server is the heart of
the system, which manages and provides resources to any client that requests them.

Fig 2:

Fig 3:

ADVANTAGES:
6
Resources and data security are controlled through the server. Not restricted to a
small number of computers Server can be accessed anywhere and across multiple
platforms. A Client/Server network contains the centralized system. Therefore we can
back up the data easily. A Client/Server network has a dedicated server that improves the
overall performance of the whole system. Security is better in Client/Server network as a
single server administers the shared resources. It also increases the speed of the sharing
resources

DISADVANTAGES:

Can become very costly due to the need of a server as well as networking
devices such as hubs, routers, and switches. If and when the server goes down, the entire
network will be affected. Technical staff needed to maintain and ensure network
functions efficiently. Client/Server network is expensive as it requires the server with
large memory. A server has a Network Operating System(NOS) to provide the resources
to the clients, but the cost of NOS is very high. It requires a dedicated network
administrator to manage all the resources.

APPLICATIONS OF CLIENT SERVER ARCHITECTURE:

TCP/IP is supported by many network operating systems NetWare is a popular


network operating system and it also supports TCP/IP protocol. NetWare TCP/IP refers
to the collection of NetWare Loadable Modules (NLMs) that add support for TCP/IP
onto the NetWare server. Routing can be enabled, as can RIP (Router Information
Protocol) to support that routing. One advantage of TCP/IP support in the NetWare
server is the ability for IPX (Internetwork Packet Exchange) to travel across a TCP/IP-
only network by using IP (Internet Protocol) tunnelling .

The NetWare TCP/IP suite of protocols is a necessary foundation for all NFS
(Network File System) products for Novel. The NetWare TCP/Ip suite provides both the
4.3 BDS Unix socket interface and the AT&T Streams TLI (Transport Layer

7
Interface).With the release of Internet Ware, the TCP/IP support at the NetWare server
becomes even more important. the web server relies on TCP/IP to communicate with the
Internet and intranet clients. NetWare IPX clients using the IPX/IP Gateway require
TCP/IP at the gateway server to provide the TCP/IP protocol stack necessary for
connection to TCP/IP host, either locally or on the Internet.

NETWORK TOPOLOGY

Network topology is the arrangement of the elements (links, nodes, etc.) of a


communication network.[1][2] Network topology can be used to define or describe the
arrangement of various types of telecommunication networks, including command and
control radio of the any network the networks,[3] industrial field busses and computer
networks. Network topology is the topological[4] structure of a network and may be depicted
physically or logically. It is an application of graph theory[3] wherein communicating devices
are modeled as nodes and the connections between the devices are modeled as links or lines
between the nodes. Physical topology is the placement of the various components of a network
(e.g., device location and cable installation).

while logical topology illustrates how data flows within a network. Distances between
nodes, physical interconnections, transmission rates, or signal types may differ between two
different networks, yet their logical topologies may be identical. A network’s physical topology
is a particular concern of the physical layer of the OSI model. Examples of network topologies
are found in local area networks (LAN), a common computer network installation. Any given
node in the LAN has one or more physical links to other devices in the network; graphically
mapping these links results in a geometric shape that can be used to describe the physical
topology of the network. A wide variety of physical topologies have been used in LANs,
including ring, bus, mesh and star. Conversely, mapping the data flow between the components
determines the logical topology of the network. In comparison, Controller Area Networks,
common in vehicles, are primarily distributed control system networks of one or more
controllers interconnected with sensors and actuators over, invariably, a physical bus topology.

8
1.BUS TOPOLOGY
The bus topology is designed in such a way that all the stations are connected through a
single cable known as a backbone cable. Each node is either connected to the backbone cable
by drop cable or directly connected to the backbone cable. When a node wants to send a
message over the network, it puts a message over the network. All the stations available in the
network will receive the message whether it has been addressed or not. The bus topology is
mainly used in 802.3 (ethernet) and 802.4 standard networks. The configuration of a bus
topology is quite simpler as compared to other topologies. The backbone cable is considered as
a "Single Lane" through which the message is broadcast to all the stations. The most common
access method of the bus topologies is CSMA (Carrier Sense Multiple Access.

9
:

Fig 4:

2.RING TOPOLOGY
In a Ring Topology, it forms a ring connecting devices with exactly two neighboring
devices. A number of repeaters are used for Ring topology with a large number of nodes,
because if someone wants to send some data to the last node in the ring topology with 100
nodes, then the data will have to pass through 99 nodes to reach the 100th node. Hence to
prevent data loss repeaters are used in the network. The data flows in one direction, i.e. it is
unidirectional, but it can be made bidirectional by having 2 connections between each
Network Node, it is called Dual Ring Topology. In-Ring Topology, the Token Ring Passing
protocol is used by the workstations to transmit the data. Ring topology is like a bus
topology, but with connected ends. The node that receives the message from the previous
computer will retransmit to the next node. The data flows in one direction, i.e., it is
unidirectional. The data flows in a single loop continuously known as an endless loop It has

10
no terminated ends, i.e., each node is connected to other node and having no termination
point. The data in a ring topology flow in a clockwise direction.

Fig 5:

3.STAR TOPOLOGY:
In star topology, all the devices are connected to a single hub through a cable. This hub is
the central node and all other nodes are connected to the central node. Star topology is an
arrangement of the network in which every node is connected to the central hub, switch or a
central computer. The central computer is known as a server, and the peripheral devices attached
to the server are known as clients. Coaxial cable or RJ-45 cables are used to connect the
computers. Hubs or Switches are mainly used as connection devices in a physical star topology
Star topology is the most popular topology in network implementation.

11
Fig 6:

4.TREE TOPOLOGY:
This topology is the variation of the Star topology. This topology has a
hierarchical flow of data. In Tree Topology, protocols like DHCP and SAC (Standard
Automatic Configuration) are used. Tree topology combines the characteristics of bus
topology and star topology. A tree topology is a type of structure in which all the
computers are connected with each other in hierarchical fashion. The top-most node in
tree topology is known as a root node, and all other nodes are the descendants of the root
node There is only one path exists between two nodes for the data transmission. Thus, it
forms a parent-child hierarchy.

12
Fig 7:

5.MESH TOPOLOGY:

Mesh technology is an arrangement of the network in which computers are


interconnected with each other through various redundant connections. There are multiple
paths from one computer to another computer. It does not contain the switch, hub or any
central computer which acts as a central point of communication. The Internet is an example
of the mesh topology. Mesh topology is mainly used for WAN implementations where
communication failures are a critical concern. Mesh topology is mainly used for wireless
networks. Mesh topology can be formed by using the formula: Number of cables = (n*(n-
1))/2; Where n is the number of nodes that represents the network.

13
Fig 8:

6.HYBRID TOPOLOGY:

This topological technology is the combination of all the various types of topologies we
have studied above. Hybrid Topology is used when the nodes are free to take any form. It means
these can be individuals such as Ring or Star topology or can be a combination of various types
of topologies seen above. Each individual topology uses the protocol that has been discussed
earlier. The combination of various different topologies is known as Hybrid topology. A Hybrid
topology is a connection between different links and nodes to transfer the data. When two or
more different topologies are combined together is termed as Hybrid topology and if similar
topologies are connected with each other will not result in Hybrid topology. For example, if
there exist a ring topology in one branch of ICICI bank and bus topology in another branch of
14
ICICI ban connecting these two topologies will result in Hybrid topology.

Fig 9:

CONCLUSION

The conclusion for a computer network project should summarize the key findings and
outcomes of the project. Here is a sample conclusion that you can use as a template and modify
to suit your specific project: In conclusion, the computer network project has achieved its
primary objectives and has contributed significantly to enhancing the efficiency and connectivity
of our organization. Through careful planning, implementation, and troubleshooting, we have
successfully designed and deployed a robust and reliable network infrastructure. Some of the key
highlights of this project include: The project has significantly improved the overall connectivity
within our organization, ensuring that data and information can flow seamlessly between
15
different departments and locations.
We have implemented robust security measures, including firewalls, intrusion detection
systems, and encryption protocols, to safeguard our network from potential threats and
vulnerabilities. By implementing redundancy in critical network components, we have
minimized the risk of downtime and ensured high availability, which is essential for our
operations. We have conducted training sessions to educate our staff on the proper use of the
network and security best practices, which is crucial for maintaining a secure and efficient
network environment.
Represents a significant milestone in our organization's technological advancement. It
has not only addressed our immediate connectivity and security needs but has also positioned us
for future growth and adaptability in an ever-evolving digital landscape. The successful
completion of this project is a testament to the dedication and expertise of our team members and
the collaboration with external partners. We look forward to reaping the long-term benefits of
this project as we continue to innovate and leverage our network infrastructure for the benefit of
our organization.

REFERENCE

 J. F. Kurose and W. R. Ross, Computer Networking: A Top-Down Approach Featuring the


Internet. L.L. Peterson and B. S. Davie, Computer Networks: A System Approach Andrew S.
Tanenbaum, Computer Networks
 Douglas E. Comer, Computer Networks and Internets D. Bert & R. Gallager, Data Networks.
S. Keshav, An Engineering Approach to Computer Networking. J. Walr & P. Varaiya, High-
Performance Communication Networks.

16
 Sam Halabi & Danny McPherson, Internet Routing Architectures. Christian
Huitema, Routing in the Internet. Radia Pearlman, Interconnections: Bridges and Routers.
John T. Moy, OSPF: Anatomy of an Internet Routing Protocol Jim Stewart, BGP4.
 Esteva, A., Robic, A., Ramsundar, B., Kuleshov, Prist , M., Chou, K., ... & Dean, J. (2019). ,
25(1), 24-29.Miotto, R., Wang, F., Wang, S., Jiang, X., & Dudley, J. T. (2018). 19(6),
 Obermeyer, Z., & Emanuel, E. J. (2016). Predicting the future—big data, machine learning,
and clinical medicine. New England Journal of Medicine, 375(13), 1216-1219.
 Liu, x. Fa L Kale, A. U., Wagner, S. K., Fu, D. J., Brut, A., ... & sheer F. D. (2019) 1(6),
e271-e297.
 Wiens, J., Saria, S., Sendak, M., Ghassemi, M., Liu, V. X., Doshi-Velez, F., ... & Schadt, E.
E. (2019). 25(9), 1337-1340.
 Johnson, A. E., Pollard, T. J., Shen, L., Lehman, L. H., Feng, M., Ghassemi, M., ... & Mark,
R. G. (2016). MIMIC-III, a freely accessible critical care database. Scientific Data, 3,
160035.

17

You might also like