Professional Documents
Culture Documents
Project Report on
COMPUTER NETWORKS
and
ITS BUSINESS ADVANTAGES
DATE: 7/8/2022
Submitted by Submitted to
Shivam Singh Dr. Prerna Vanjani
2021KUCP1001
A1
A
Project Report on
COMPUTER NETWORKS
and
ITS BUSINESS ADVANTAGES
SHIVAM SINGH
2021KUCP1001
A1
IIIT KOTA
Date:7/8/2022
Acknowledgement
THANK YOU!!!
- Shivam Singh
(3)
Preface
Happy Reading!!!!
(ii)
Table of Index
8. Appendix IV
Table of Figures
1.1 Networking
There are many different ways to connect your computer to another computer
or a network. Using Windows 2000, you can connect your computer to:
• Wired network
• Wireless network
Wired networks:
Wired networks are almost always faster and less expensive than wireless networks.
Once
Page 1
connected, there is little that can disrupt a good0wired connection. Wired networks come
in many forms, but the most popular are 1omePN' and 2thernet. 1omePN' uses the
existing phone line wires in your home and 2thernet needs special network cabling.
Wireless Networks:
Page 2
(iii)Domain model
In a client server model we have one server and many clients. Client can share
the resources of server, but a server cannot share the resources on clients.
On the point of view of administrator it’s very easy to control the network because we
combine with the server also at security point of view. It is very useful because it uses
user level security in which users have to remember only one password to share the
resources.
(iii)Domain Model
It is a mixture of client server and peer to peer model. In this clients can share
their resources as peer to peer but with the permission of the server as in client
server model therefore it is commonly used model because in this security is
more as we can put restriction on both server and clients.
Page 3
such as home, office or college. Devices used in LAN are! Hub and switch. Media
for LAN is UTP cables.
Campus area Network is a computer network made up of two or more LANs within
a limited area. It can cover many buildings in an area. The main feature of C'N is
that all of the computers which are connected together have some relationship to
each other.
Page 4
Cost of the WANs use leased lines for internet access as they provide faster data
transfer. WAN helps an organization to establish network between all its departments
and offices located in the same of different cities. It also enables communication
between organization and rest world. Device used in WAN is only router.
Page 5
Chapter 2
IP ADDRESSING
2.1 IP Addressing:
each representing ; bits, in the range 0 to 255(known as octets) separated by decimal points.
IP address consists of two parts, one identifying the network and one identifying the node.
The Class of the address and the subnet mask determine which part belongs to the network
address and which part belongs to the node address. "he four numbers in an IP address are
called octets, because they each have eight positions when viewed in binary form. If you add
all the positions together, you get 32, which is why IP addresses are considered 32bit
numbers. Since each of the eight positions can have two different states (1 or 0 the total
number of possible combinations per octet is28 or 256. So each octet can contain any value
between
0 and 255. Combine the four octets and you get 232 or a possible 4294967296
unique values .Out of the almost 4.3 billion possible combinations, certain values
are restricted from use as typical IP addresses. For example, the IP address 0.0.0.0
is reserved for the default network and the address 255.255.255.255 is used for
broadcasts. Understanding IP Addresses
An IP address is an address used in order to uni8uely identify a device on an IP
network. The address is made up of 32 binary bits, which can be divisible into a
network portion and host portion with the help of a subnet mask. The 32 binary
bits are broken into four octets ( octet K ; bits . Each octet is converted to decimal
and separated by a period (dot ). For this reason, an IP address is said to be
expressed in dotted decimal format (for example, 172.16.81.100).
Page 6
of an octet holds a value of 20. The bit Bust to the left of that holds a value of 21 . This
continues until the left-most bit, or most significant bit, which holds a value of 27. So
if all binary bits are a one, the decimal e8uivalent would be 255 as shown
here:11111111.
Default Network :-
Class A
This class is for very large networks, such as a major international company might have. IP
addresses with a first octet from 1 to 126 are part of this class. The other three octets are
used to identify each host. This means that there are 126 Class A networks each with
networks account for half of the total available IP addresses. In Class A networks, the high
order bit value (the very first binary number) in the first octet is always 0.
Loopback:-
The IP address 127.0.0.1 is used as the loopback address. This means that it is
used by the host computer to send a message back to itself. It is commonly used
for troubleshooting and network testing.
Class B
Class B is used for medium-sized networks. A good example is a large college campus. IP
Page 7
addresses with a first octet from 128 to 191 are part of this class. Class B addresses also I
includes the second octet as part of the Net identifier. The other two octets are used to
identify each host. This means that there are 16384(214) Class B networks each with
networks make up a quarter of the total available IP addresses. Class B networks have a first
Class C
Class C addresses are commonly used for small to mid-size businesses. IP addresses
with a first octet from 192 to 223 are part of this class. Class C addresses also include
the second and third octets as part of the Net identifier. The last octet is used to identify
each host. This means that there are 2097152(221) Class C networks each with 254 (28-
make up an eighth of the total available IP addresses. Class C networks have a first bit
value of 1, second bit value of and a third bit value of 0 in the first octet.
Class D
Used for multicasts, Class D is slightly different from the first three classes. It has
a first bit value of 1, second bit value of 1, third bit value of 1and fourth bit value of
0. The other 28 bits are used to identify the group of computers the multicast
message is intended for. Class D accounts for 1/16th (268435456 or 228)of the
available IP addresses.
Class E
Class E is used for experimental purposes only. Like Class D, it is different from
the first three classes. It has a first bit value of 1, second bit value of 1, third bit
value of 1 and fourth bit value of 1. The other 28 bits are used to identify the group
of computers the multicast message is intended for. Class E accounts for 1/16th
(268435456 or 228) of the available IP addresses.
Page 8
Chapter-3
BUSINESS ADVANTAGES
With computer networking, your critical files are all a part of central file servers. Your employees
can
access these files and learn from the data for improved business operations.
A central server lowers the number of storage systems you need for the company’s data. You
gain
storage space with an increase in employee productivity with access to files.
If you have any issue with one device, you can access your information when you log into
another
device. This creates network security where you don’t have to worry about losing critical files.
Access to information through the network cuts down on steps that employees take to get the
information they need for their daily tasks. When computers aren’t connected you need to transfer
files
through a USB drive or messages.
With computer sharing employees can take files from any other connected computer as if it were
on
their own. This speeds up the daily tasks of your employees and creates a very functional
workflow
Page 9
A quality computer network allows for resource sharing across devices. You will need less
hardware when your computers are connected and hardware is pricey equipment.
Employees
won’t need separate printers or backup storage when their computers are connected.
You won’t need to install as many software updates and employees can share document
scanning
software. The ability to share technology assets among employees is one of the biggest cost
benefits of this networking solution.
3.5 Improved Customer Service
When your employees have access to company information they are better able to serve
customers and clients. They can pull up all the information they need on the customer and
provide answers to their questions quickly. They can also add information about the
customer into the system so that other employees can be updated in real-time.
3.6 CONCLUSION
When your computers are connected they could be open to more cyber threats. When you
have one
computer that has an issue it can spread to the rest. Corrupt files are not isolated when you
have
computer networking.
This is not a problem when you have IT support to keep your system as a whole safe. IT
consulting
will give you all of the information you and your employees need to keep your company data
safe.
Employees may exchange corrupt files when they don’t know how to recognize and avoid
these
incidents.
Proper training of employees will keep your company data safe while remaining accessible to
promote employee productivity. Company security policies are crucial for a company of any
size.
GroupOne provides custom IT security plans to protect your company. We get to know you
and
your business goals to create technology strategies for the growth stage of your company. We
know
how important company efficiency is and we help provide you with the most cost
effective computer networking and support needed to grow a successful business.
Page 10
REFRENCES
1.James F Kurose,”Top-Down Approach:Computer Networking”
6. https://www.grouponeit.com/importance-of-computer-network-in-
business/
7. https://www.slideshare.net/surabhigosavi/types-of-networks-network-
design-issues-design-tools
iii
GLOSSARY
Algorithm: A finite sequence of unambiguous, computer-implementable instructions,
typically to solve a class of problems or to perform a computation.
Router: A router is a device that connects two or more packet-switched networks or
subnetworks.
Subnetwork: A part of larger network such as the internet.
Subnet Mask: A subnet mask is a 32bit number.
Metropolitan: relating to or denoting a metropolis or large city .
Infrastructure: the basic systems and services.
Port: a access to navigate between two things
APPENDIX
VLSM: In vlsm to allocate IP addresses to subnets depending upon the no. of hosts. The network having more no of hosts is
given priority and the one having least no of host comes at last and for each network the subnet is assigned separately.
VLAN: As networks have grown in si9e and complexity, many companies have turned to virtual local area networks (VLANS)to
provide some way of structuring this growth logically. Basically, a VLAN is a collection of nodes that are grouped together in a
single broadcast domain that is based on something other than physical location
Broadcasts/Traffic Flow: Since a principle element of a VLAN is the fact that it does not pass broadcast traffic to nodes that
are not part of the VLAN, it automatically reduces broadcasts. access lists provide the network administrator with a way to
control who sees what network traffic. An access list is a table the network administrator creates that lists which addresses
have access to that network.
Performance Bandwidth: Careful monitoring of network use allows the network administrator to create VLANs that reduce
the number of router hops and increase the apparent bandwidth for network users.
IV