Project Report on Net Working (2)

download Project Report on Net Working (2)

of 39

Transcript of Project Report on Net Working (2)

  • 8/11/2019 Project Report on Net Working (2)

    1/39

    CHAPTER -1

    INTRODUCTION

    1.1 COMPANY PROFILE

    Labs N Rack , Chandigarh is a deemed software and web development company of India.

    We have continuously delivered variety of services such as product engineering, web

    development, packaged application services, I consulting, product licensing and

    industrial trainings. We have over a decade of e!perience and in depth e!pertise in

    diverse technologies to deliver tantali"ing solutions to clients all over the world. #partfrom our strong focus on $uality, we ensure that we e!ecute and deliver the pro%ects

    within agreed timelines and cost budgets.

    Experience

    We have added value to a number of companies, worked around various industry

    verticals and have a perfect understanding of domestic and international client needs.

    hus, we are able to $uickly grasp the finer nuances and deliver solutions which precisely

    address the re$uirements, thus delivering systematically devised solutions which prove to

    be highly valuable.

    Resources

    Working out of multiple development centers and marketing offices across India and

    overseas, trained and e!perience professionals who form the &affodil team, serve as the

    most important and robust Infrastructural elements for the company. #t the same time,

    state'of'the'art e$uipment and access to cutting edge technologies lends us a uni$ue edge

    over our competitors. (artnerships with global leaders further allow &affodil to access

    resources which remain unmatched in the industry.

    )

  • 8/11/2019 Project Report on Net Working (2)

    2/39

    Expertise

    We bring years of competence and e!pertise across a number of leading technologies

    such as desktop and web application development, web content management, mobile *

    tablet application development, cloud platforms and other allied technologies. his is

    combined with our healthy partnerships with leading names such as +icrosoft.

    CHAPTER-

  • 8/11/2019 Project Report on Net Working (2)

    3/39

    PRO!ECT "OR#

    .1 NET"OR#IN$Computer networking is the scientific and engineering discipline concerned with

    communication between computer systems. -uch networks involve at least two devices

    capable of being networked with at least one usually being a computer. he devices can

    be separated by a few meters e.g. via /luetooth0 or thousands of kilometers e.g. via the

    Interne0. Computer networking is sometimes considered a sub'discipline of

    telecommunication. Networking is an interconnection of computers and peripheral

    devices with carriers and data communication devices for the purpose of e!changing datainformation and saving the resources. Computers in the network may be connected within

    a building, city, nation or world wide.

    .1.1 LAN-1

    L#N stands for Local #rea Network. hese types of networks are established within a

    building or campus

    cover a distance of less than )2 km. It was developed in )342. It5s a high speed n6w.

    .1.MAN-%

    +#N stands for +etropolitan #rea Network. his network is established within a city in

    different buildings i.e. data can be shared by two or more buildings within a city up to a

    distance of )72 km. It was developed in )382.

    .1.& "AN-%

    W#N means Wide #rea Network. In this network computers can be connected within a

    country or globally. It is developed in )392. :enerally covers distance of more than )72

    km. It can further be classified as :lobal Network or ;nterprise Network.

    &epending on the type and si"e networking is classified in three categories1

  • 8/11/2019 Project Report on Net Working (2)

    4/39

    he original Local #rea Networks L#Ns0 were nothing more than coa!ial cabling,

    strung from terminal servers to desktop terminals whose users were treated to

    monochromatic te!t displayed on low'resolution cathode ray tubes.

    In the mid')382s, wide area networks W#Ns0 were slow and crude. erminal servers

    multiple!ed access for do"ens of users to 3.9 =bps circuits. hese circuits connected

    users to mainframe'based applications that lay hidden in a remote data center.

    oday, L#Ns have metamorphosed into high'bandwidth, high'performance and C(>'

    intensive client applications such as live, interactive voice and video conferencing, e'mail

    and some of the more traditional forms of data processing.

    W#Ns have e!perienced radical, evolutionary change. oday, 3.9 =bps is deemed

    inade$uate for most of the needs of even a single user. ?ust try to give a user a 3.9 =bps

    modem for use as anything but a paperweight.

    It is important to recogni"e the inputs for all these changes has been, and remains, the

    user@s business re$uirements. he competitive environment of most business entities

    ensures that any technological innovations that offer competitive advantages''that is,

    better, cheaper or faster get accepted. Aor e!ample, the introduction of the mouse

    facilitated access to computing by obviating the need for typing skills. -uddenly, almost

    everyone could use a computer (ersonal computer, offered countless advantages by

    distributing intelligence down to the desktop.

    -oftware developers also drove changes by constantly upgrading a di""ying array of

    increasingly comple! products that enabled users to actually use the newly distributed

    processing power at their fingertips. ogether, these innovations $uickly made hard'wired

    connections to terminal servers obsolete.

    he first generation of L#Ns. hese networks offered almost obscene amounts of

    bandwidth, such as ) or B +b per second +bps0, depending on whose network you

    B

  • 8/11/2019 Project Report on Net Working (2)

    5/39

    purchased. Initially, these L#Ns were used as a more fle!ible means of connecting users

    with terminal servers. #fter all, the users@ basic re$uirements hadn@t changed all that

    much, and the increased bandwidth was more than ade$uate to support terminal

    emulation.

    . O'!ECTI(E OF NET"OR#IN$

    New networks are popping up daily in developed countries but also in the developing

    nations. he ;astern ;uropean countries were technologically starved under -oviet

    control, and purchasing advanced technology, taking a si"able leap in the upgrade path. #

    global linking is taking place, and thousands more %oin in the benefits of networking

    daily.

    ..1 D)t) *+)rin,1'

    -haring data today is easier due to networking and become better than the proliferation of

    electronic mail. ;'mail has become one of the leading motivators for companies. #s a

    means of sharing important information, ;'mail is among organi"ations from every

    industry imaginable. # large number of people have become used to seeing a letter

    waiting in their electronic mailbo!es. he letter itself may contain notes about a friendly

    after'work game of golf, or last year@s fiscal report. he ability to effortlessly and $uickly

    move data from one person to the ne!t is an option too good to pass up for many

    organi"ations.

    -hared files may e!ist in one location with multiple people accessing them or updating

    parts of them. &atabase applications are found in every computeri"ed organi"ation.

    Networks offer the capabilities of multi'user access. +ore database applications

    incorporate record locking a means by which a person updating a record has e!clusiveuse of the record while others who attempt to access it cannot do so.

    Not only data files, but also e!ecutable files may be shared. When a user invokes an

    e!ecutable file on a network server, a copy of it is transmitted over the network into the

    memory of the local user@s workstation.

    7

  • 8/11/2019 Project Report on Net Working (2)

    6/39

    .. Resource *+)rin,

    he benefits of modern networking are the ability to share peripherals. Aew companies

    have the resources to place a printer on every user@s desk. Networks offer a logical and

    cost'effective solution. -ince, the introduction of several users could cause conflict at the

    printer spooling is utili"ed so that print %obs can be arranged in an orderly manner.

    NetWare provides such services in the form of print $ueues and print servers.

    he ability of sharing printers and disk space has been the driving force behind many

    companies installing (C'based networks. -hared modems are typically called modem

    servers.

    L#N topologies can be described using either a physical or a logical perspective. #

    physical topology describes the geometric arrangement of components that comprise the

    L#N. It is a theoretical construct that graphically conveys the shape and structure of the

    L#N.# logical topology describes the possible connections between pairs of networked

    endpoints that can communicate. his is useful in describing which endpoints can

    communicate with which other endpoints, and whether those pairs capable of

    communicating have a direct physical connection to each other

    .& NET"OR#

    # Network is a group of two or more computers connected together. his connection is

    done physically using a wired or wireless system. hese computers are able to

    communicate, e!change information and use software that observes the same set of

    protocols. &ifferent types of computers, with different operating systems, can b used.

    Networks can also be characteri"ed in terms of their si"e. he si"e is a measurement of

    the spatial distance that the network covers.

    9

  • 8/11/2019 Project Report on Net Working (2)

    7/39

    Networks can interconnect with other Networks and contain many levels of subnetworks.

    Aig .) /asic Network

    .&.1 #e Concept%

    # network is a set of hardware devices connected together, either physically or logically

    to allow them to e!change information

    .

    Networks are used for an incredible array of different purposes. In fact, the definitions

    above are so simple for the specific reason that networks can be used so broadly, and can

    allow such a wide variety of tasks to be accomplished. While most people learning about

    networking focus on the interconnection of (Cs and other DtrueE computers, you use

    4

  • 8/11/2019 Project Report on Net Working (2)

    8/39

    various types of networks every day. ;ach time you pick up a phone, use a credit card at a

    store, get cash from an #+ machine, or even plug in an electrical appliance, you are

    using some type of network.

    In fact, the definition can even be e!panded beyond the world of technology altogether1

    I@m sure you@ve heard the term DnetworkingE used to describe the process of finding an

    employer or employee by talking to friends and associates. In this case too, the idea is

    that independent units are connected together to share information and cooperate.

    he widespread networking of personal computers is a relatively new phenomenon. Aor

    the first decade or so of their e!istence, (Cs were very much Dislands unto themselvesE,

    and were rarely connected together. In the early )332s, (C networking began to grow in

    popularity as businesses reali"ed the advantages that networking could provide. /y the

    late )332s, networking in homes with two or more (Cs started to really take off as well.

    his interconnection of small devices represents, in a way, a return to the Dgood old daysE

    of mainframe computers. /efore computers were small and personal, they were large and

    centrali"ed machines that were shared by many users operating remote terminals. While

    having the entire computer power in one place had many disadvantages, one benefit was

    that all users were connected because they shared the central computer.

    Individuali"ed (Cs took away that advantage, in favor of the benefits of independence.

    Networking attempts to move computing into the middle ground, providing (C users

    with the best of both worlds1 the independence and fle!ibility of personal computers, and

    the connectivity and resource sharing of mainframes. In fact, networking is today

    considered so vital that it5s hard to conceive of an organi"ation with two or more

    computers that would not want to connect them togetherF

    . NET"OR#IN$ 'A*IC*

    8

  • 8/11/2019 Project Report on Net Working (2)

    9/39

    Gere are some of the fundamental parts of a network1

    Aig.. Networking /asics

    ..1 Net/or0

    # network is a group of computers connected together in a way that allows information to

    be e!changed between the computers.

    .. No2e

    # node is anything that is connected to the network. While a node is typically a

    computer, it can also be something like a printer or C&'RH+ tower.

    ..& *e,3ent

    # segment is any portion of a network that is separated, by a switch, bridge or router,

    from other parts of the network.

    .. ')c04one

    3

  • 8/11/2019 Project Report on Net Working (2)

    10/39

    he backbone is the main cabling of a network that all of the segments connect to.

    ypically, the backbone is capable of carrying more information than the individual

    segments. Aor e!ample, each segment may have a transfer rate of )2 +bps megabits per

    second0, while the backbone may operate at )22 +bps.

    ..5 Topo6o,

    opology is the way that each node is physically connected to the network more on this

    in the ne!t section0.

    ..7 Loc)6 Are) Net/or0 8LAN9

    # L#N is a network of computers that are in the same general physical location, usually

    within a building or a campus. If the computers are far apart such as across town or in

    different cities0, then a Wide #rea Network W#N0 is typically used.

    ..: Net/or0 inter;)ce c)r2 8NIC9

    ;very computer and most other devices0 is connected to a network through an NIC. In

    most desktop computers, this is an ;thernet card normally )2 or )22 +bps0that is

    plugged into the slot on the computer5s motherboard.

    ..< Me2i) Access Contro6 8MAC9 )22ress

    his is the physical address of any device '' such as the NIC in a computer '' on the

    network. he +#C address, which is made up of two e$ual parts, is 9 bytes long. he

    first < bytes identify the company that made the NIC. he second < bytes are the serial

    number of the NIC itself.

    ..= Unic)st

    # unicast is a transmission from one node addressed specifically to another node.

    ..1> Mu6tic)st

    )2

  • 8/11/2019 Project Report on Net Working (2)

    11/39

    In a multicast, a node sends a packet addressed to a special group address. &evices that

    are interested in this group register to receive packets addressed to the group. #n e!ample

    might be a Cisco router sending out an update to all of the other Cisco routers.

    ..11 'ro)2c)st

    In a broadcast, a node sends out a packet that is intended for transmission to all other

    nodes on the network.

    .5 FACTOR*%

    ). he type of data transmission technology used is C(6I(Network0.

    . It carries voice, data or both kinds of signals.

  • 8/11/2019 Project Report on Net Working (2)

    12/39

    Aig .

  • 8/11/2019 Project Report on Net Working (2)

    13/39

    Aig..B he basic +#N network

    .7.&. "i2e Are) Net/or0% -

    Wide #rea Networks W#N0 connect geographic areas, such as Alorida, the >nited

    -tates, or the world. -atellite uplinks may be used to connect this type of network.

    )

  • 8/11/2019 Project Report on Net Working (2)

    14/39

    Aig .7 he basic W#N network

    >sing a W#N, schools in Alorida can communicate with place like okyo in a matter of

    minutes. It uses multipliers to connect local and metropolitan networks to global

    communications networks like the Internet. # W#N will not appear to be much different

    than a L#N or a +#N.

    Range No area specified

    opology +i!

    Cable Aibber optics6Wireless

    -peed

  • 8/11/2019 Project Report on Net Working (2)

    15/39

    .:AD(ANTA$E* OF IN*TALLIN$ A *CHOOL

    NET"OR#

    .:.1*pee2% -Networks provide a rapid method for sharing and transferring files.

    Without a network, copying them to floppy disks, then carrying or sending the disks from

    one computer to another shares file. his method of transferring files is very time'

    consuming.

    .:. Cost% - Network provides many popular software programs are available at

    considerable savings when compared to buying individually licensed copies. /esides

    monetary savings, sharing a program on a network allows for easier upgrading of the

    program. he changes have to be done only once, on the file server, instead of on all the

    individual workstations.

    .:.& *ecurit% -Ailes and programs on a network can be designated as Jcopy inhibit,J

    so that no illegal copying of program take place. (asswords can be used for specific

    directories to restrict access to authori"ed users.

    .:. Centr)6i?e2 *o;t/)re M)n),e3ent% -he benefits of installing a networkat a school are the fact that all of the software can be loaded on one computer. his

    eliminates the need to spend time and energy installing updates and tracking files on

    independent computers throughout the building.

    .:.5 Resource *+)rin,% --haring resources is another area in which a network

    e!ceeds stand'alone computers. If peripherals are added to a network, many users can

    share them.

    .:.7 E6ectronic M)i6% -he network provides the hardware necessary to install an e'

    mail system. ;'mail aids in personal and professional communication and it facilitates the

    dissemination of general information to the entire network. ;'mail on a L#N can enable

    )7

  • 8/11/2019 Project Report on Net Working (2)

    16/39

    students to communicate with teachers and peers at there own school. If the L#N is

    connected to the Internet, students can communicate with others throughout the world.

    .:.: F6exi46e Access% - -chool networks allow students to access their files from

    computers throughout the school. -tudents can begin an assignment in their classroom,

    save it on a public access area of the network, and then go to the media center after

    school to finish their work.

    .:.< "or0,roup Co3putin,% -Workgroup software allows many users to work

    on a document or pro%ect concurrently. Aor e!ample, educators located at various schools

    within a country could contribute their ideas about new curriculum standards to the same

    document and spreadsheets.

    .< HARD"ARE U*ED IN NET"OR#IN$

    .

  • 8/11/2019 Project Report on Net Working (2)

    17/39

    .

  • 8/11/2019 Project Report on Net Working (2)

    18/39

    Aigure .9 hub

    .

  • 8/11/2019 Project Report on Net Working (2)

    19/39

  • 8/11/2019 Project Report on Net Working (2)

    20/39

    provide interconnectivity between like and unlike media RAC )8)0. hey use

    preconfigured static routes, status of their hardware interfaces, and routing protocols to

    select the best route between any two subnets. # router is connected to at least two

    networks, commonly two L#Ns or W#Ns or a L#N and its I-(@s network. -ome &-L

    and cable modems, for home and even office0 use, have been integrated with routers to

    allow multiple home6office computers to access the Internet through the same connection.

    Routers to allow for I;;; 82.))b6g wireless enabled devices to connect to the network

    without the need for cabled connections.

    Aig .4 Router

    .

  • 8/11/2019 Project Report on Net Working (2)

    21/39

    Aigure .)) -witch

    Fi, .< s/itc+es

    .= O*I MODEL

    he H-I model is the very heart of networking with every layer performing a specific

    task in order to facilitate data communications. In the world of networking the first four

    B0 layers are the focus. hey define the following1

    What type and speed of L#N and W#N media to be implemented

    Gow data is sent across the media

    What type of addressing schemes will be usedK

    Gow data will be reliably sent across the network and how flow control will be

    accomplished

    What type of routing protocol will be implemented

    )

  • 8/11/2019 Project Report on Net Working (2)

    22/39

    Why a Layered Network +odelK

    Reduces comple!ity

    -tandardi"es interfaces

    Aacilitates modular engineering

    ;nsures interoperable technology

    #ccelerates evolution

    -implifies teaching and learning

    he H-I model ' seven numbered layers indicate distinct functions. In the ransmission

    Control (rotocol6Internet (rotocol C(6I(0, the distinct functions fit into five named

    layers. his separation of networking functions is called 6)erin,.

    he Hpen -ystem Interconnection H-I0 reference model describes how information

    from a software application in one computer moves through a network medium to a

    software application in another computer. he H-I reference model is a conceptual model

    composed of seven layers, each specifying network functions. he model was developed

    by the International Hrgani"ation for -tandardi"ation I-H0 in )38B, and it is now

    considered the primary architectural model. he H-I model divides the tasks involved

    with moving information between networked computers into seven smaller, more

    manageable task groups. # task or group of tasks is then assigned to each of the seven

    H-I layers. ;ach layer is reasonably self'contained so that the tasks assigned to each

    layer can be implemented.

    Independently, this following list shows the seven layers of the Hpen -ystem

    Interconnection H-I0 reference model1

    )0Layer )'(hysical

    0 Layer ' &ata link

  • 8/11/2019 Project Report on Net Working (2)

    23/39

    #/L;.) H-I reference model

    .=.1 LAYER* OF O*I MODEL

    .=.1.1 L)er 1 - P+sic)6

    he (hysical layer defines the electrical, mechanical, and all physical hardware means of

    sending and receiving data itself. It includes cables, cards, and all physical aspects. It

    conveys the bit stream through the network at the electrical and mechanical level. he

    physical layer specifications also define characteristics, such as voltage levels, timing of

    impulses, physical data rates, ma! transmission distance, and physical connectors.

    (hysical layer implementations can be categori"ed as either W#N or L#N specifications.

    .=.1. L)er - D)t) Lin0

    he data link layer defines the format of data, and provides its reliable transit across the

    physical network link. #t this layer, bits are encoded6decoded into data packets with

    protocol'specific headers, including checksums, source6destination addressmanagement,

    flow control, frame synchroni"ation, and handles any errors in the physical layer. It

  • 8/11/2019 Project Report on Net Working (2)

    24/39

    contains two sub layers ' +#C +edia #ccess Control0, and LLC Logical Link

    Control0.

    .=.1.& L)er & Net/or0

    he Network layer provides network addressing which differs from the data link layer

    +#C address0. It also facilitates switching, routing, error handling, congestion control,

    and packet se$uencing. It allows for defining the logical network layout, and virtual

    logical paths for transmitting data between network nodes. he Internetwork (rotocol

    I(0 operates at this layer. I( defines network addresses in a way that route selection can

    be determined systematically by comparing the source network address with the

    destination address, and applying the subnet mask.

    .=.1. L)erTr)nsport

    his layer maintains $uality of communication. #cts, as the traffic cop making sure flow

    is orderly. ;nsures message validity and integrity

    .=.1.5 L)er 5 *ession

    he -ession layer generally deals with session and connection coordination. Itestablishes, manages and terminates communications sessions. -essions consist of service

    re$uests and responses that occur between applications in different network devices.

    -ession protocol implementations include R(C Remote (rocedure Call0, MI( Mone

    Information (rotocol0, #pplealk, -C( -ession Control (rotocol0.

    .=.1.7 L)er 7 - Present)tionhe (resentation layer deals with conversion and coding of data from application to

    network format. It ensures the application layer data can be readable by other systems@

    application layer. his layer formats and encrypts data, providing compatibility between

    systems. It is sometimes called the Jsynta! layerJ

    B

  • 8/11/2019 Project Report on Net Working (2)

    25/39

    .=.1.: L)er : - App6ic)tion

    he #pplication layer supports and interacts directly with software applications. Its

    functions include identifying communication partners, determining resource availability

    and synchroni"ing communication. -ome e!amples of application layer implementations

    include A( Aile ransfer (rotocol0, elnet, -+( -imple +ail ransfer (rotocol0.

    he information e!change process occurs between peer H-I layers. ;ach layer in the

    source system adds control information to data, and each layer in the destination system

    analy"es and removes the control information from that data.

    If -ystem # has data from software application to send to -ystem /, the data is passed to

    the application layer. he application layer in -ystem a then communicates any control

    information re$uired by the application layer in -ystem / by preparing a header to the

    data. he resulting information unit a header and the data0 is passed to the presentation

    layer, which prepares its own header containing control information intended for the

    presentation layer in -ystem /. he information unit grows in si"e as each layer prepares

    its own header and, in some cases, a trailer0 that contains control information to be used

    by its peer layer in -ystem /. #t the physical layer, the entire information unit is placed

    onto the network medium.

    he physical layer in -ystem / receives the information unit and passes it to the data link

    layer. he data link layer in -ystem / then reads the control information contained in the

    header prepared by the data link layer in -ystem #. he header is then removed, and the

    remainder of the information unit is passed to the network layer. ;ach layer performs the

    same actions1 he layer reads the header from its peer layer, strips it off, and passes the

    remaining information unit to the ne!t highest layer. #fter the application layer performs.

    .1> NET"OR# ADDRE** TRAN*LATION

    We can communicate with the router accessing the internet with the help of nat. In nat

    there is N/R which is called net work border router that is used to translate private

    addresses into public addresses. In accessing the internet we have to use public addresses

    instead of private addresses. so we have to use N# . N# is of < types1 first is of

    7

  • 8/11/2019 Project Report on Net Working (2)

    26/39

    dynamic nat,second is overload, and third is dynamic overload. -tatic N# is for

    converting one private address to one public address, in dynamic N# ,many private ip

    addresses are converted into many public addresses.

    .11 REBUIREMENT* FOR NET"OR#IN$

    he re$uirement components are divided into two basic categories1 '

    ). -oftware component.

    . Gardware component.

    .1 INTRODUCTION TO TCPIP%

    C( and I( were developed by a &epartment of &efense &H&0 research pro%ect to

    connect a number different networks designed by different vendors into a network of

    networks the JInternetJ0. It was initially successful because it delivered a few basic

    services that everyone needs file transfer, electronic mail, remote logon0 across a

    very large number of client and server systems. -everal computers in a small

    department can use C(6I( along with other protocols0 on a single L#N. he I(

    component provides routing from the department to the enterprise network, then toregional networks, and finally to the global Internet. Hn the battlefield a

    communications network will sustain damage, so the &H& designed C(6I( to be

    robust and automatically recover from any node or phone line failure. his design

    allows the construction of very large networks with less central management.

    Gowever, because of the automatic recovery, network problems can go undiagnosed

    and uncorrected for long periods of time.

    #s with all other communications protocol, C(6I( is composed of layers1

    IP' is responsible for moving packet of data from node to node. I( forwards each

    packet based on a four byte destination address the I( number0. he Internet

    authorities assign ranges of numbers to different organi"ations. he organi"ations

    9

  • 8/11/2019 Project Report on Net Working (2)

    27/39

    assign groups of their numbers to departments. I( operates on gateway machines

    that move data from department to organi"ation to region and then around the

    world.

    TCP' is responsible for verifying the correct delivery of data from client to

    server. &ata can be lost in the intermediate network. C( adds support to detect

    errors or lost data and to trigger retransmission until the data is correctly and

    completely received.

    *oc0ets ' is a name given to the package of subroutines that provide access to

    C(6I( on most systems.

    .1& ADDRE**E*%

    ;ach technology has its own convention for transmitting messages between two

    machines within the same network. Hn a L#N, messages are sent between machines by

    supplying the si! byte uni$ue identifier the J+#CJ address0. In an -N# network, every

    machine has Logical >nits with their own network address. &;CN;, #ppletalk, and

    Novell I( all have a scheme for assigning numbers to each local network and to each

    workstation attached to the network.

    Hn top of these local or vendor specific network addresses, C(6I( assigns a uni$ue

    number to every workstation in the world. his JI( numberJ is a four byte value that, by

    convention, is e!pressed by converting each byte into a decimal number 2 to 770 and

    separating the bytes with a period. Aor e!ample, the (C Lube and une server is

    )

  • 8/11/2019 Project Report on Net Working (2)

    28/39

    networks or the central Internet routers managed by the National -cience Aoundation can

    only locate these networks by looking each network number up in a table. here are

    potentially thousands of Class / networks, and millions of Class C networks, but

    computer memory costs are low, so the tables are reasonable. Customers that connect to

    the Internet, even customers as large as I/+, do not need to maintain any information on

    other networks. hey send all e!ternal data to the regional carrier to which they

    subscribe, and the regional carrier maintains the tables and does the appropriate routing.

    .1 IP ADDRE**IN$

    #n I( #ddress is a

  • 8/11/2019 Project Report on Net Working (2)

    29/39

    -ub'net mask depends upon the first octet value of I('address and accordingly

    describes the Network address and the host address 1

    able . Ist octet value

    Ist Octet *u4net-3)s0 C6)ss

    )')9 77.2.2.2 #

    )8')3) 7.77.2.2 /

    )3'< 77.77.77.2 C

    In host portion of the I( address if all the bits are set to 2 then this is called the

    network address * this is used in the routing table.

    In the host portion of I( address if all the bits are set to ) then this address is

    called Network broadcast address.

    If all the bits of the subnet mask are set to ) i.e. 77.7.77.77 then this is called

    the D#ll network broadcast address.E

    If all the bits of subnet mask are set to 2 then this address is used for Ddefault

    routingE.

    he address range starting from B'

  • 8/11/2019 Project Report on Net Working (2)

    30/39

    # 77.2.2.2

    / 77.77.2.2

    C 77.77.77.2

    .1.. *u4 nettin,

    -uper netting is the I( address is split into separate network address and host address

    portion according to the subnet mask. Instead breaking down larger networks into several

    smaller subnets, you group smaller networks together to make one larger super net. Aor

    e!ample )9 class C networks, ranging from 2).99.

  • 8/11/2019 Project Report on Net Working (2)

    31/39

    he systems access the &N- through a revolver. he revolver gets the hostname and

    returns the I( address or gets an I( address and look up a hostname.

    .1. MAC ADDRE**

    In computer networking, the +edia #ccess Control +#C0 address is every bit as

    important as an I( address.

    .1.5. "+)t is ) MAC A22ress

    he +#C address is a uni$ue value associated with a network adapter. +#C addresses

    are also known as hardware addresses or physical addresses. hey uni$uely identify an

    adapter on a L#N.+#C addresses are )'digit he!adecimal numbers B8 bits in length0.

    /y convention, +#C addresses are usually written in one of the following two formats1

    ++1++1++1--1 --1 --

    ++'++'++'--'--'--

    he first half of a +#C address contains the I& number of the adapter manufacturer.

    hese I&s are regulated by an Internet standards body see sidebar0. he second half of a

    +#C address represents the serial number assigned to the adapter by the manufacturer. In

    the e!ample,

    221#21C31)B1C813

    he prefi! 22#2C3 indicates the manufacturer is Intel Corporation.

    .1.7. "+ MAC A22resses

    Recall that C(6I( and other mainstream networking architectures generally adopt the

    H-I model. In this model, network functionality is subdivided into layers. +#C

    addresses function at the data link layer layer in the H-I model0. hey allow

    computers to uni$uely identify themselves on a network at this relatively low level.

  • 8/11/2019 Project Report on Net Working (2)

    32/39

    .1.7.1 MAC @s. IP A22ressin,

    Whereas +#C addressing works at the data link layer, I( addressing functions at the

    network layer layer

  • 8/11/2019 Project Report on Net Working (2)

    33/39

    # network interface card NIC0 is a computer circuit board or cardthat is installed in a

    computer so that it can be connected to a network. (ersonal computers and workstations

    on a local area network L#N0 typically contain a network interface card specifically

    designed for the L#N transmission technology, such as ;thernetor token ring. Network

    interface cards provide a dedicated, full'time connection to a network. +ost home and

    portable computers connect to the Internet through as'needed dial'up connection. he

    modemprovides the connection interface to the Internet service provider.5 &ata Link,

    Layer &evice

  • 8/11/2019 Project Report on Net Working (2)

    34/39

    .1: *uper nettin,

    -uper netting is the I( address is split into separate network address and host address

    portion according to the subnet mask. Instead of breaking down larger networks into

    several smaller subnets, you group smaller networks together to make one larger supernet.

    Aor e!ample )9 class C networks, ranging from 2).99.

  • 8/11/2019 Project Report on Net Working (2)

    35/39

    .1= HO" TO PREPARE A NET"OR#

    #s this point you will connect to your system with other to prepare6construct a

    network .Gere two options are given1' #ttach your computer with e!isting network.

    Construct a new network or connect two systems.

    In both choices first install the network card and detect it by system. #fter this, check the

    L#N Card is H= or NH, by using the command utility (ing )4.2.2.). It is a loop back

    utility. If it e!ecutes successfully1 it means L#N card is Hk. Now at that point take a >(

    8'conductor wire and connect two R?'B7 connectors at both ends using straight cabling

    standards.

    If you want to attach your system with e!isting network then one connector is attached

    with the hub of e!isting network and the other end with the network card of your system

    and provide the network service for communication or using resources over a network.

    Aor connecting two systems or construct a new network then cross cabling is used to

    connect two network cards of two systems with using other devices. If two or more

    system is connected using hub then straight cabling is used. #fter connecting the system

    using L#N cable, the services are provided by installing various types of protocol and

    other components of network.

    .1=.1 Pro@i2in, ser@ice ;or Net/or0

    #fter connecting the computer with hardware device you must provide the service for

    network by installing the various types of protocol. he various steps for installing the

    network C(6I( (rotocol, client service for network and client service for +icrosoft

    network as given below1'

    Arom desktop, right click on the network place icon and select properties.

  • 8/11/2019 Project Report on Net Working (2)

    36/39

    Right click on local are connection and choose properties in the network place

    properties dialog bo!.

    In L#N properties dialog bo! click on install button.

    -elect network component type like protocol, client, and service etc. one y one to

    add into the system to make your system able for any networking.

    .1=. Pro@i2in, Net/or0 *ecurit

    he name administrator is give to the account with full control over the computer. Oou

    can increase the computer security by renaming the administrator account and thencreating an account named administrator without any permission.

    When you create new user a security identifies or -I& is automatically created on the

    computer user account. he user is a property of the -I&.

    CHAPTER-&

    RE*ULT

    Cisco is the king of routing, switching, and security, the +icrosoft of the internetworking

    world. Cisco, not unlike +icrosoft and other vendors that provides certification, has

    created a certification process to give administrators a set of skills and to e$uip

    prospective employers with a way to measure those skills or match certain criteria.

  • 8/11/2019 Project Report on Net Working (2)

    37/39

    he Networking program was created to provide a solid introduction not only to the

    Cisco Internetwork operating -ystem IH-0, and Cisco hardware, but also to the

    internetworking in general, making it helpful to you in areas that are not e!clusively

    Cisco5s. #t this point in the certification process, it5s not unrealistic that network

    managers'even those without Cisco e$uipment're$uire Cisco certification for their %ob

    applicants.

    /ecoming a Networking can be the initial step of a successful %ourney towards a new,

    highly rewarding and sustainable career.

  • 8/11/2019 Project Report on Net Working (2)

    38/39

    CHAPTER-

    CONCLU*ION

    In this we study about the basic networking, the types of networking and in which

    particular area we have to use which particular type of networking process for e!ample in

    small geographical area we have to use L#N. We also study about the different type of

    topologies and the use of I( addressing and the use of &omain Name -ystem in the

    network

  • 8/11/2019 Project Report on Net Working (2)

    39/39

    REFERENCE*

    Website1

    www.google.com

    www.wikipedia.com

    en.wikipedia.org6wiki6Computer network

    compnetworking.about.com

    www.nasa.gov6multimedia6