You are on page 1of 20

A

Project Report on

COMPUTER NETWORKS
and
ITS BUSINESS ADVANTAGES

DATE: 7/8/2022

Submitted by Submitted to
Shivam Singh Dr. Prerna Vanjani
2021KUCP1001
A1
A
Project Report on

COMPUTER NETWORKS
and
ITS BUSINESS ADVANTAGES

SHIVAM SINGH
2021KUCP1001
A1

IIIT KOTA

Date:7/8/2022
Acknowledgement

I’d want to convey my heartfelt appreciation and gratitude to my


professor Dr. Prerna Vanjani for providing me with the chance to work
on this wonderful report “COMPUTER NETWORKS”, which also aided me
in conducting extensive study and learning about a bunch of new topics.
I am quite grateful to Ms. Kritika Rathore for her help in making me
understand the technical writing better.
I’d also want to thank my friends for their assistance in completing the
report before the deadline.
This report was quite useful in terms of expanding my knowledge and
abilities in a new field.

THANK YOU!!!

- Shivam Singh

(3)
Preface

This report on CN has been made to maximize the knowledge of


Technical Writing that I learnt in the 2nd semester of my B. Tech course
here at IIIT Kota.
This report also speaks of the volume of understanding that I got about
computer networks during making of this report. I got to learn the algos
and functions of this term that is used on a daily basis by all who are
involved in promoting CN.
This report covers about advantages of CN in business, how is it created,
functions, effects and ways to utilize it. This report is overall a good
summary for them who has no knowledge in this field. It gives a whole
idea of computer networks which is an important part that drives us
towards future.
Here, I try to present my analysis and understanding of computer
networks in the best way I can. I hope that you readers will understand
what I am trying to say and develop and interest in this topic and
eventually in this field. It will also give you a brief idea about computer
networks in business and how is it very important for our MNC’s.

Happy Reading!!!!

(ii)
Table of Index

S.No Topic Page No.


.
1. Acknowledgement i
2. Preface ii
3. Chapter 1 1
1.1 Networking 1
1.2 Types of Networking 1
1.2.1 Wired Networks 1
1.2.3 Wireless Networks 2
1.3 Models of Networking 2
1.4 Categories of Networks 3
4. Chapter 2 6
2.1 IP Addressing 6
5. Chapter 3 9
3.1 Large Storage Capacity 9
3.2 Improved Business Communication 9
3.3 Flexibility and Convenience 9
3.4 Cost Benefits 10
3.5 Improved Customer Service 10
3.6 Conclusion 10
6. Reference iii
7. Glossary IV

8. Appendix IV
Table of Figures

S.No Topic Page No.


.
1.1 Wired Networks 2
1.2 Local Area Network 4
1.3 Metropolitan Area Network 5
1.4 Wide Area Network 5
Chapter -1
INTRODUCTION

1.1 Networking

Networking is a practice of linking of two or more computing devices such as


PCs, printers, faxes etc., with each other Connection between two devices is
through physical media or logical media to share information, data and resources.
Networks are made with the hardware and software.

There are many different ways to connect your computer to another computer
or a network. Using Windows 2000, you can connect your computer to:

• Another computer using a direct cable connection.

• A private network using a modem or an integrated service digital


network (ISDN)adapter or a network adopter card.

• A network using a virtual private network (VPN) connection.

• Another computer by having another computer call your computer.

The interconnected collection of autonomous computers is called computer


network. Two computers are said to be interconnected if they are able to
exchange information. The connection need not be via a copper wire fiber optics,
microwaves and communication satellites can be used.

1.2 Types of Networking:

• Wired network

• Wireless network

Wired networks:

Wired networks are almost always faster and less expensive than wireless networks.

Once
Page 1

connected, there is little that can disrupt a good0wired connection. Wired networks come

in many forms, but the most popular are 1omePN' and 2thernet. 1omePN' uses the

existing phone line wires in your home and 2thernet needs special network cabling.

Wireless Networks:

mobile computers, such as notebook computers and personal digital assistants


(Pc's are the fastest growing segment of the computer industry. Many of the
owner of these computers have desktop machines on phones back at the office
and want to be connected to their home base even when away from home. Since
having a wired connection is impossible in cars and airplanes, there is a lot of
interest in wireless networks.

1.3 Models of Networking

Model means the connectivity of two computers. We have many types of


networking models

(i)Client server model


(ii)Peer to Peer model (Work group model)

Page 2

(iii)Domain model

(i) Client Server Model

In a client server model we have one server and many clients. Client can share
the resources of server, but a server cannot share the resources on clients.

On the point of view of administrator it’s very easy to control the network because we
combine with the server also at security point of view. It is very useful because it uses
user level security in which users have to remember only one password to share the
resources.

(ii)Peer to Peer Model ( Workgroup Model )

In Peer-to-Peer networking model all computers are in equal status, that is we


cannot manage centralization, administration security. In Peer to Peer networking
client use operating system like window 98,window XP, Window 2000, window
vista.

(iii)Domain Model

It is a mixture of client server and peer to peer model. In this clients can share
their resources as peer to peer but with the permission of the server as in client
server model therefore it is commonly used model because in this security is
more as we can put restriction on both server and clients.

1.4 Categories of Network

LOCAL AREA NETWORK(LAN)


LAN is a computer network that is used to connect computers and work station to
share data and resources such as printers or faxes. LAN is restricted to a small
area

Page 3

such as home, office or college. Devices used in LAN are! Hub and switch. Media
for LAN is UTP cables.

CAMPUS AREA NETWORK (CAN)

Campus area Network is a computer network made up of two or more LANs within
a limited area. It can cover many buildings in an area. The main feature of C'N is
that all of the computers which are connected together have some relationship to
each other.

It will help to interconnect academic departments, library and computer


laboratories. C'N is larger than LAN but smaller than WAN. Devices used in C'N
are: HUB, Switch, Layer-3 switch, access Point.

METROPOLITAN AREA NETWORK (MAN)


MAN is the interconnection of networks in a city. MAN is not owned by a single
organization. MAN can also be formed by connecting remote LANs through
telephone lines or radio links. MAN supports data and voice transmission. The
best example of MAN is cable T.V network in a city.

Page 4

WIDE AREA NETWORK (WAN)

WAN covers a wide geographical area which includes multiple computers or


LANs. It connects computer networks through public networks like, telephone
system, microwave, satellite link or leased line.

Cost of the WANs use leased lines for internet access as they provide faster data
transfer. WAN helps an organization to establish network between all its departments
and offices located in the same of different cities. It also enables communication
between organization and rest world. Device used in WAN is only router.
Page 5

Chapter 2
IP ADDRESSING

2.1 IP Addressing:

An IP (Internet Protocol) address is a uni8ue identifier for a node or host connection on an IP

network. An IP address is a 5% bit binary number usually represented as 4 decimal values,

each representing ; bits, in the range 0 to 255(known as octets) separated by decimal points.

This is known as “dotted decimal” notation. Example! >140.179.220.200 It is sometimes

useful to view the values in their binary form.10001100.10110011.11011100.110010000 Every

IP address consists of two parts, one identifying the network and one identifying the node.

The Class of the address and the subnet mask determine which part belongs to the network

address and which part belongs to the node address. "he four numbers in an IP address are

called octets, because they each have eight positions when viewed in binary form. If you add

all the positions together, you get 32, which is why IP addresses are considered 32bit

numbers. Since each of the eight positions can have two different states (1 or 0 the total

number of possible combinations per octet is28 or 256. So each octet can contain any value

between

0 and 255. Combine the four octets and you get 232 or a possible 4294967296
unique values .Out of the almost 4.3 billion possible combinations, certain values
are restricted from use as typical IP addresses. For example, the IP address 0.0.0.0
is reserved for the default network and the address 255.255.255.255 is used for
broadcasts. Understanding IP Addresses
An IP address is an address used in order to uni8uely identify a device on an IP
network. The address is made up of 32 binary bits, which can be divisible into a
network portion and host portion with the help of a subnet mask. The 32 binary
bits are broken into four octets ( octet K ; bits . Each octet is converted to decimal
and separated by a period (dot ). For this reason, an IP address is said to be
expressed in dotted decimal format (for example, 172.16.81.100).

The value in each octet ranges from 0 to 255 decimal, or 00000000-11111111binary.


Here is how binary octets convert to decimal :The right most bit, or least significant
bit,

Page 6

of an octet holds a value of 20. The bit Bust to the left of that holds a value of 21 . This
continues until the left-most bit, or most significant bit, which holds a value of 27. So
if all binary bits are a one, the decimal e8uivalent would be 255 as shown
here:11111111.

128 64 32 16 8 4 2 1 (128+64+32+16+8+4+2+1=255)Here is a sample octet


conversion when not all of the bits are set to1. 010000010 64 000001
(0+64+0+0+0+0+0+1=65)And this is sample shows an IP address represented in
both binary and decimal. 10.1.23 .19 (decimal
00001010.00000001.00010111.00010011 (binary) There are five IP classes plus
certain special addresses:

Default Network :-

The IP address of 0.0.0.0 is used for the default network.

Class A

This class is for very large networks, such as a major international company might have. IP

addresses with a first octet from 1 to 126 are part of this class. The other three octets are

used to identify each host. This means that there are 126 Class A networks each with

16777214(244-2)possible hosts for a total of 2147483648 (231) unique IP addresses. Class A

networks account for half of the total available IP addresses. In Class A networks, the high

order bit value (the very first binary number) in the first octet is always 0.
Loopback:-

The IP address 127.0.0.1 is used as the loopback address. This means that it is
used by the host computer to send a message back to itself. It is commonly used
for troubleshooting and network testing.

Class B

Class B is used for medium-sized networks. A good example is a large college campus. IP

Page 7

addresses with a first octet from 128 to 191 are part of this class. Class B addresses also I

includes the second octet as part of the Net identifier. The other two octets are used to

identify each host. This means that there are 16384(214) Class B networks each with

65534(216-2) possible hosts for a total of 1073741824 (230)unique IP addresses. Class B

networks make up a quarter of the total available IP addresses. Class B networks have a first

bit value of 1 and a second bit value of 0 in the first octet.

Class C

Class C addresses are commonly used for small to mid-size businesses. IP addresses

with a first octet from 192 to 223 are part of this class. Class C addresses also include

the second and third octets as part of the Net identifier. The last octet is used to identify

each host. This means that there are 2097152(221) Class C networks each with 254 (28-

2)possible hosts for a total of 536870912(229)unique IP addresses. Class C networks

make up an eighth of the total available IP addresses. Class C networks have a first bit

value of 1, second bit value of and a third bit value of 0 in the first octet.

Class D
Used for multicasts, Class D is slightly different from the first three classes. It has
a first bit value of 1, second bit value of 1, third bit value of 1and fourth bit value of
0. The other 28 bits are used to identify the group of computers the multicast
message is intended for. Class D accounts for 1/16th (268435456 or 228)of the
available IP addresses.

Class E

Class E is used for experimental purposes only. Like Class D, it is different from
the first three classes. It has a first bit value of 1, second bit value of 1, third bit
value of 1 and fourth bit value of 1. The other 28 bits are used to identify the group
of computers the multicast message is intended for. Class E accounts for 1/16th
(268435456 or 228) of the available IP addresses.

Page 8

Chapter-3

BUSINESS ADVANTAGES

File sharing allows for improved communications on a cohesive network. Consistency


across individual computers with a central database creates cohesive operating systems.
The benefits for business are larger storage capacity, effective communication, flexibility,
and saving money on the costs of software.

3.1 Large Storage Capacity

With computer networking, your critical files are all a part of central file servers. Your employees
can
access these files and learn from the data for improved business operations.
A central server lowers the number of storage systems you need for the company’s data. You
gain
storage space with an increase in employee productivity with access to files.

3.2 Improved Business Communication


Information is the basis of communication. Modern networking allows the transfer of information
in
real-time anywhere with internet access. When your team has access to network files from any
device
you have more flexibility with remote workers and employees that need to work outside of the
office.
The more information available to employees, the more independently they can work. Downtime
is a
revenue killer. Network access to employees creates the company growth needed to reach long-
term business goals.

If you have any issue with one device, you can access your information when you log into
another
device. This creates network security where you don’t have to worry about losing critical files.

3.3 Flexibility and Convenience

Access to information through the network cuts down on steps that employees take to get the
information they need for their daily tasks. When computers aren’t connected you need to transfer
files
through a USB drive or messages.

With computer sharing employees can take files from any other connected computer as if it were
on
their own. This speeds up the daily tasks of your employees and creates a very functional
workflow

Page 9

3.4 Cost Benefits of Computer Networking

A quality computer network allows for resource sharing across devices. You will need less
hardware when your computers are connected and hardware is pricey equipment.
Employees
won’t need separate printers or backup storage when their computers are connected.

You won’t need to install as many software updates and employees can share document
scanning
software. The ability to share technology assets among employees is one of the biggest cost
benefits of this networking solution.
3.5 Improved Customer Service

When your employees have access to company information they are better able to serve
customers and clients. They can pull up all the information they need on the customer and
provide answers to their questions quickly. They can also add information about the
customer into the system so that other employees can be updated in real-time.

3.6 CONCLUSION

When your computers are connected they could be open to more cyber threats. When you
have one
computer that has an issue it can spread to the rest. Corrupt files are not isolated when you
have
computer networking.

This is not a problem when you have IT support to keep your system as a whole safe. IT
consulting
will give you all of the information you and your employees need to keep your company data
safe.
Employees may exchange corrupt files when they don’t know how to recognize and avoid
these
incidents.

Proper training of employees will keep your company data safe while remaining accessible to
promote employee productivity. Company security policies are crucial for a company of any
size.
GroupOne provides custom IT security plans to protect your company. We get to know you
and
your business goals to create technology strategies for the growth stage of your company. We
know
how important company efficiency is and we help provide you with the most cost
effective computer networking and support needed to grow a successful business.

Page 10
REFRENCES
1.James F Kurose,”Top-Down Approach:Computer Networking”

2.Rich Seifer,”All-New Switch Book”,2nd Edition

3.Doug Lowe,”Networking All-in-one For Dummies”,8th Edition

4.Ilya Grigorik,”High Performance Browser Networking”

5.Jerry FitzGerald,”Business Data Communications and Networking”,14th


Edition

6. https://www.grouponeit.com/importance-of-computer-network-in-
business/

7. https://www.slideshare.net/surabhigosavi/types-of-networks-network-
design-issues-design-tools

iii
GLOSSARY
 Algorithm: A finite sequence of unambiguous, computer-implementable instructions,
typically to solve a class of problems or to perform a computation.
 Router: A router is a device that connects two or more packet-switched networks or
subnetworks.
 Subnetwork: A part of larger network such as the internet.
 Subnet Mask: A subnet mask is a 32bit number.
 Metropolitan: relating to or denoting a metropolis or large city .
 Infrastructure: the basic systems and services.
 Port: a access to navigate between two things

APPENDIX
VLSM: In vlsm to allocate IP addresses to subnets depending upon the no. of hosts. The network having more no of hosts is
given priority and the one having least no of host comes at last and for each network the subnet is assigned separately.

VLAN: As networks have grown in si9e and complexity, many companies have turned to virtual local area networks (VLANS)to
provide some way of structuring this growth logically. Basically, a VLAN is a collection of nodes that are grouped together in a
single broadcast domain that is based on something other than physical location

Broadcasts/Traffic Flow: Since a principle element of a VLAN is the fact that it does not pass broadcast traffic to nodes that
are not part of the VLAN, it automatically reduces broadcasts. access lists provide the network administrator with a way to
control who sees what network traffic. An access list is a table the network administrator creates that lists which addresses
have access to that network.

Performance Bandwidth: Careful monitoring of network use allows the network administrator to create VLANs that reduce
the number of router hops and increase the apparent bandwidth for network users.

IV

You might also like