Professional Documents
Culture Documents
SYNOPSIS OF DISSERTATION
ON
NETWORKING
Submitted in partial fulfillment of the requirements for the degree of
Jatinder Garg
(Roll No. 1021DMTE1255)
Supervisor: _______________________________________
Information Technology Department Karnataka State Open University Manasagangotri, Mysore 570006 Karnataka (2009-2010)
Page 1 of 23
Computer Networking
CERTIFICATE
This is to certify that the Dissertation entitled NETWORKING TECHNOLOGY submitted by Jatinder Garg having Roll No. 1021DMTE1255 for the partial fulfillment of the requirements of Master of Technology degree of Karnataka State Open University, Mysore, embodies the bonafied work done by him under over supervision.
Place:__________________
Date:__________________
Page 2 of 23
Computer Networking
Abstract Format:
Page 3 of 23
Computer Networking
Table of Contents
1. 2. 3. 4. 5. 6. 7. 8. 9. Introduction Objectives of the Dissertation Components of a Network Types of Networks Topologies of Networks Scope of the Solution Analysis Future scope and further enhancement of the Dissertation Bibliography
Page 4 of 23
Computer Networking
Introduction
A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users. Networks may be classified according to a wide variety of characteristics. A computer network allows sharing of resources and information among devices connected to the network. Computer networks can be used for several purposes: Facilitating Communications Using a network, people can communicate efficiently and easily via e-mail, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing.
Sharing Hardware In a networked environment, each computer on a network can access and use hardware on the network. Suppose several personal computers on a network each require the use of a laser printer. If the personal computers and a laser printer are connected to a network, each user can then access the laser printer on the network, as they need it.
Sharing files, data and information In a network environment, any authorized user can access data and information stored on other computers on the network. The capability of providing access to data and information on shared storage devices is an important feature of many networks.
Sharing Software Users connected to a network can access application programs on the network.
Page 5 of 23
Computer Networking
Fig 1 gives an example of a network in a school comprising of a local area network or LAN connecting computers with each other, the internet, and various servers.
Access to: Internet content & learning resources, Scoilnet etc Email communication
Users computers
Page 6 of 23
Computer Networking
Objectives of Dissertation
To study how implement a functional networking. Many challenges must be faced especially in the areas of connectivity, reliability, network management and flexibility. To study how connecting systems to support communication among disparate technologies using different-different internet services To provide centralized support and troubleshooting in an internetwork
To provide security within an internetwork for an internetwork to function smoothly and secure form the perspective of protecting the private network from viruses and outside attacks. To differentiate leased line & dial up Network with Cable Network.
Page 7 of 23
Computer Networking
Components of a Network
A computer network comprises the following components: A minimum of at least 2 computers Cables that connect the computers to each other, although wireless communication is becoming more common (see Advice Sheet 20 for more information) A network interface device on each computer (this is called a network interface card or NIC) A Switch used to switch the data from one point to another. Hubs are outdated and are little used for new installations. Network operating system software
Structured Cabling
The two most popular types of structured network cabling are twisted-pair (also known as 10BaseT) and thin coax (also known as 10Base2). 10BaseT cabling looks like ordinary telephone wire, except that it has 8 wires inside instead of 4. Thin coax looks like the copper coaxial cabling that's often used to connect a Video Recorder to a TV.
10BaseT Cabling
When 10BaseT cabling is used, a strand of cabling is inserted between each computer and a hub. If you have 5 computers, you'll need 5 cables. Each cable cannot exceed 325 feet in length. Because the cables from all of the PCs converge at a common point, a 10BaseT network forms a star configuration.
Fig 4a shows a Cat5e cable, with a standard connector, known as an RJ-45 connector.
Page 8 of 23
Computer Networking
Fig 4b shows a standard Cat5e Wall Outlet socket which the cables are connected to.
Fig 4c shows a standard Cat5e Patch Panel Wall Outlet socket which is used to terminate the cables from various points in the school bank to a central point.
Page 9 of 23
Computer Networking
Fig 4d shows a wall mounted cabinet used to house and protect patch panel cables and connectors.
Page 10 of 23
Computer Networking unshielded twisted-pair (UTP) Category 5e 10BaseT cabling because it offers a performance advantage over lower grades.
Computer Networking
Page 12 of 23
Computer Networking
Types of Networks
There are many categories under which networks can be classified into. The following types of network are categorized on the basis of the number of systems or devices that are under the networked area:
Page 13 of 23
Computer Networking distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity over the longer distances. Another type of network classification is the following:When a group of two or more computers are linked together, they can broadly be classified into two types of networks: 1.Peer-to-peer networks are more commonly implemented where less then ten computers are involved and where strict security is not necessary. All computers have the same status, hence the term 'peer', and they communicate with each other on an equal footing. Files, such as word processing or spreadsheet documents, can be shared across the network and all the computers on the network can share devices, such as printers or scanners, which are connected to any one computer.
Page 14 of 23
Computer Networking
2.Client/server networks are more suitable for larger networks. A central computer, or 'server', acts as the storage location for files and applications shared on the network. Usually the server is a higher than average performance computer. The server also controls the network access of the other computers which are referred to as the 'client' computers. Typically, everybody will have access to use the client computers for their work but only the network administrator will have access rights to the server.
File Server
Other equipment
Page 15 of 23
Computer Networking
Topologies of Networks
Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.) of a computer or biological network. Network topologies may be physical or logical. Physical topology refers to the physical design of a network including the devices, location and cable installation. Logical topology refers to how data is actually transferred in a network as opposed to its physical design. In general physical topology relates to a core network whereas logical topology relates to basic network.
Point-to-point
The simplest topology is a permanent link between two endpoints. Switched point-topoint topologies are the basic model of conventional telephony. The value of a permanent point-to-point network is unimpeded communications between the two endpoints. The value of an on-demand point-to-point connection is proportional to the number of potential pairs of subscribers
BUS
In local area networks where bus topology is used, each node is connected to a single cable. Each computer or server is connected to the single bus cable. A signal from the source travels in both directions to all machines connected on the bus cable until it finds the intended recipient. If the machine address does not match the intended address for the data, the machine ignores the data. Alternatively, if the data matches the machine address, the data is accepted. Since the bus topology consists of only one wire, it is rather inexpensive to implement when compared to other topologies. However, the low cost of implementing the technology is offset by the high cost of managing the network. Additionally, since only one cable is utilized, it can be the single point of failure. If the network cable is terminated on both ends and when without termination data transfer stop and when cable breaks, the entire network will be down.
STAR
In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection. The network does not necessarily have to resemble a star to be classified as a star network, but all of the nodes on the network must be connected to Page 16 of 23
Computer Networking one central device. All traffic that traverses the network passes through the central hub. The hub acts as a signal repeater. The star topology is considered the easiest topology to design and implement. An advantage of the star topology is the simplicity of adding additional nodes. The primary disadvantage of the star topology is that the hub represents a single point of failure.
RING
A network topology that is set up in a circular fashion in which data travels around the ring in one direction and each device on the right acts as a repeater to keep the signal strong as it travels. Each device incorporates a receiver for the incoming signal and a transmitter to send the data on to the next device in the ring. The network is dependent on the ability of the signal to travel around the ring.
MESH
The value of fully meshed networks is proportional to the exponent of the number of subscribers, assuming that communicating groups of any two endpoints, up to and including all the endpoints, The number of connections in a full mesh = n(n - 1) / 2. The physical fully connected mesh topology is generally too costly and complex for practical Page 17 of 23
Computer Networking networks, although the topology is used when there are only a small number of nodes to be interconnected
TREE
The type of network topology in which a central 'root' node (the top level of the hierarchy) is connected to one or more other nodes that are one level lower in the hierarchy (i.e., the second level) with a point-to-point link between each of the second level nodes and the top level central 'root' node, while each of the second level nodes that are connected to the top level central 'root' node will also have one or more other nodes that are one level lower in the hierarchy (i.e., the third level) connected to it, also with a point-to-point link, the top level central 'root' node being the only node that has no other node above it in the hierarchy (The hierarchy of the tree is symmetrical.) Each node in the network having a specific fixed number, of nodes connected to it at the next lower level in the hierarchy, the number, being referred to as the 'branching factor' of the hierarchical tree. This tree has individual peripheral nodes. A network that is based upon the physical hierarchical topology must have at least three levels in the hierarchy of the tree, since a network with a central 'root' node and only one hierarchical level below it would exhibit the physical topology of a star. A network that is based upon the physical hierarchical topology and with a branching factor of 1 would be classified as a physical linear topology.
Page 18 of 23
Computer Networking
Protocol
Protocol is an agreed-upon format for transmitting data between two devices. The protocol determines the following: i. The type of error checking to be used data compression method, ii. If any how the sending device will indicate that it has finished sending a message iii. How the receiving device will indicate that it has received a message. There are a variety of standard protocols from which programmers can choose. Each has particular advantages and disadvantages; for example, some are simpler than others, some are more reliable, and some are faster. From a user's point of view, the only interesting aspect about protocols is that your computer or device must support the right ones if you want to communicate with other computers. The protocol can be implemented either in hardware or in software.
Internet Protocol Transmission Control Protocol Hypertext Transfer Protocol Post Office Protocol File Transfer Protocol
Importance of Protocol
The protocols in human communication are separate rules about appearance, speaking, listening and understanding. All these rules, also called protocols of conversation, represent different layers of communication. They work together to help people successfully communicate. The need for protocols also applies to network devices. Computers have no way of learning protocols, so network engineers have written rules for communication that must be strictly followed for successful host-to-host communication. These rules apply to different layers of sophistication such as which physical connections to use, how hosts listen, how to interrupt, how to say good-bye, and in short how to communicate, what language to use and many others. These rules, or protocols, that work together to ensure successful communication are grouped into what is known as a protocol suite.
Page 19 of 23
Computer Networking
Dissertation Category
Computer network Technologies
Tools-Used
ISPS Networking Devices Various Networking Technologies Networking protocols
Platform used
Proprietary LAN server environment LAN OFC network
Page 20 of 23
Computer Networking
Architecture
The term architecture can refer to either hardware or software, or to a combination of hardware and software. The architecture of a system always defines its broad outlines, and may define precise mechanisms as well. An open architecture allows the system to be connected easily to devices and programs made by other manufacturers. Open architectures use off-the-shelf components and conform to approved standards. A system with a closed architecture, on the other hand, is one whose design is proprietary, making it difficult to connect the system to other systems. The difference between a topology and an architecture. A topology is concerned with the physical arrangement of the network components. In contrast, an architecture addresses the components themselves and how a system is structured (cable access methods, lower level
protocols, topology, etc.). An example of an architecture is 10baseT Ethernet which typically uses the start topology.
Page 21 of 23
Computer Networking
Wireless Networks
The term 'wireless network' refers to two or more computers communicating using standard network rules or protocols, but without the use of cabling to connect the computers together. Instead, the computers use wireless radio signals to send information from one to the other. A wireless local area network (WLAN) consists of two key components: an access point (also called a base station) and a wireless card. Information can be transmitted between these two components as long as they are fairly close together (up to 100 metres indoors or 350 metres outdoors).
Computer Networking
Bibliography
Books
Computer Networks-Andrew S. Tanenbaum-3rd Edition-PHI Data Communication & Networking Behrous A Ferozon-Tata McGraw Hill
Websites
http://www.cisco.com http://www.networkessential.com http://www.google.com
Page 23 of 23