complete network(1)

Upload: nishantkumarpandey

Post on 02-Jun-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/10/2019 Complete Network(1)

    1/23

    TABLE OF CONTENTS

    Acknowledgements

    Introduction

    Conclusion

    Bibliograph

  • 8/10/2019 Complete Network(1)

    2/23

    ACKNOWLEDGEMENTS

    The past si! weeks ha"e rendered me a guaranti#ied e!perience and ha"e brought me

    in contact with a pro#essional institution who ha"e positi"el contributed to m "isionknowledge $ understanding o# the technical $ social aspects o# so#tware engineering%

    At the "er honest I am indebted to &r% Ashwani Arora head o# 'T

    computer (ardware $ Networking engg% College #or granting me permission to

    undertake this pro)ect here onward the #ul#illment o# m bachelor o# technolog to be

    submitted to *A+A,IN+-A COLLE'E OF EN''% $ TEC(% %

    I e!press m warm thanks to m training incharge &r% .anka) Singh #or

    #ull co/operation 0 length talks and pro"iding pictures 0 C+1s $ other material% (e sparedtime #or me to share "alued in#ormation about m training%

    In the success o# m endea"our I also thanks to &iss% &onika Ba)a)

    counsellor o# the institution who plas the pillars role to m success#ul training $

    pro"ide me encouragement and moti"ation that made me more determined

    In the last I grate#ull acknowledge the competent aid cheer#ull rendered b all the

    sta## o# the 'T computer (ardware $ Networking engg% College &oga%

  • 8/10/2019 Complete Network(1)

    3/23

    INT-O+2CTION

    Networking is the process o# connecting two or more computers with

    each other #or resource sharing % Networking is used in "arious #orms like telephonenetwork0 mobile network 0 cable network 0 computer network etc Computer networking

    becomes "er precious part o# e"er #ield% Computer networking is needed to calculate 0

    to store in#ormation $ to suppl the same when needed% The process o# networking is

    "er big $ e!pensi"e but modern machines are so small $ e##icient that the ha"e

    giant memories $ can make millions o# calculations in the #raction o# a second% Our

    cable T%,% 0 cordless telephones 0 mobile phones $ e/mail are due to computer

    networking%

    Computer networking becomes "er use#ul in the area o# banking 0business $ o##ices #or calculating $ storing the in#ormation 0 in document transmission

    through e/mail 0 in area o# education 0 medicine $ health care to diagnose disease 0 in

    scienti#ic applications #or research 0 in railwa #or the booking o# tickets 0 in ad"ertising

    etc%

    Thus computer networking has a lot o# applications in each $ e"er #ield% The wonders

    o# computer networking ha"e made our li#e "er com#ortable%

  • 8/10/2019 Complete Network(1)

    4/23

    NET3O-4IN'

    To connect two or more computers #or resource sharing is called networking% To make

    the connections between two or more computers LAN CA-+ and hub is used%

    The resources shared in networking are #iles0 #olders 0 printers0 internet0 cd / rom dri"ers

    etc%

    T*.ES OF NET3O-4IN' 5/

    There are two tpes o# networking 5/

    67 .eer to .eer networking

    87 Ser"er9Client networking

    .EE- TO .EE- NET3O-4IN' 5/

  • 8/10/2019 Complete Network(1)

    5/23

    .eer to .eer networking is also called workgroup networking% In this networking ser"er

    $ clients changed according to the situation% There is no securit in .eer to .eer

    networking% In this networking the workgroup name o# both the computers should be

    same but I. address di##erent% I# workgroup names are di##erent then both the computers

    can1t be connected to each other %

    SE-,E- 9 CLIENT NET3O-4IN' 5/

    Ser"er 9 Client networking consist o# one ser"er and number o# clients associated with

    them% There is securit in ser"er 9 client networking% This tpe o# networking is also

    called domain base networking% +omain means it supports to all the clients associated

    with ser"er%

    .-OTOCOLS

    .-OTOCOL 5/

    .rotocol is a communication rule which is used to connect the two or more computers

    with each other% In networking the protocol is also called language%

    E!ample5/

    Our network consist o# : computers% To pro"ide the I. address we select

    the same protocols on each computer% Then onl the : computers can understand the

    language o# each other%

    T*.ES OF .-OTOCOLS 5/

    67 TC.9I. .rotocol

    87 FT. .rotocol

    ;7 S&T. .rotocol

  • 8/10/2019 Complete Network(1)

    6/23

    TC.9I. .-OTOCOL 5/ TC.9I. stands #or transport control

    protocol or transmission con#igure protocol%

    TC.9I. protocol is also called uni"ersal protocol because this protocol is present in

    e"er operating sstem% This protocol supports I. address% Internet can1t be operate

    without this protocol% This protocol is neccessar to access the internet%

    FT. .-OTOCOL 5/

    FT. protocol stands #or #ile trans#er protocol% This protocol is also present in each $

    e"er operating sstem% This protocol is used to trans#er the #ile in network%

    S&T. .-OTOCOL5/

    S&T. protocol stands #or simple mail trans#er protocol% This protocol is used to send

    the mail in network%

    .O.; .-OTOCOL5/

    .O.; protocol is post o##ice protocol o# "ersion ;%This protocol is used to recei"e the

    mail in network%

    ... .-OTOCOL5/

    ... protocol is point to point protocol% This protocol is used to access the modem in

    network%

    (TT. .-OTOCOL5/

    (TT. protocol is hper te!t trans#er protocol% This protocol is used to access the web

    page on the internet%

    +(C. .-OTOCOL5/

    +(C. protocol stands #or dnamic host con#igure protocol% This protocol is used to

    pro"ide the automatic I. address to the clients #rom the ser"er side%

    (2B5/

    (2B is a network de"ice which is used to connect two or computers with each other%

    (2B is used in star topolog%

    T*.ES OF (2B5/

  • 8/10/2019 Complete Network(1)

    7/23

    67 .assi"e hub

    87 Acti"e hub

    ;7 Intelligent hub

    .ASSI,E (2B5/

    .assi"e hub is like an e!tension board which is used to connect two or morecomputers with each other% .assi"e hub does1nt contain signal ampli#iers $ power is not

    gi"en to this hub% It1s speed is slow i%e 6> mbps%

    ACTI,E (2B5/

    Acti"e hub is like a passi"e hub the di##erence is onl that power is gi"en to this hub

    to ampli#ies the signal% It1s speed is 6> to 6>> mbps%

    INTELLI'ENT (2B5/

    Intelligent hub is act as a switch% The speed o# this hub is 6> to 6>> mbps%

    E!ample5

    A network consist o# : computers% I# we send a message #rom #irst computer to #i#th

    computer then it will directl goes #rom 6st computer to :th computer same as that o# a

    switch% But in the case o# hub the msg go through all the network not directl #rom

    source to destination%

    +IA'-A& OF (2B 5

  • 8/10/2019 Complete Network(1)

    8/23

    S3ITC( 5/

    Switch is a network de"ice which is used to connect two or more computers with each

    other% Switch is used in large network%

  • 8/10/2019 Complete Network(1)

    9/23

    T*.ES OF S3ITC(5/

    67&anageable switch

    87Non manageable switch

    &ANA'EABLE S3ITC(5/

    &anageable switches are those switches which can be managed or con#igured% In these

    switches the IOS sstem is not installed this is installed b the user% These switches are

    "er costl%

    NON &ANA'EABLE S3ITC(5/

    These tpe o# switches can1t be managed or con#igured are called non manageable

    switches% These are alread managed b the compan $ we can1t con#igured them% TheIOS ? internet operating sstem 7 is alread installed in these tpe o# switches b the

    compan% These switches are not costl%

    +IFFE-ENCE BET3EEEN (2B $ S3ITC(5/

    (2B S3ITC(

    67 (ub works on phsical address%

    87 (ub supports to I. address%

    ;7 One collision domain $ one broadcastdomain%

  • 8/10/2019 Complete Network(1)

    10/23

    CABLE &E+IA5/

    Cable media is the process o# connecting two or more computers with each other

    through phsical cable%

    T*.ES OF CABLE &E+IA5/

    67 Co/a!ial cable

    87 ST.92T. cable

    ;7 Fibre optics cable

    CO/A@IAL CABLE5/

    Co/a!ial cable is used to connect two or more computers with each other %

    This cable is used in bus topolog% Co/a!ial cable is like a dish cable% The data trans#erspeed o# co/a!ial cable is 6> mbps $ distance is :>> m%

    ST.92T. CABLE5/

    Shielded twisted pair cable 9 unshielded twisted pair cable%

    ST. CABLE5/

    ST. cable is used to connect two more computers with each other% This cable is used

    in star topolog% There are wires in this cable ha"ing < pairs% Each pair is o# twowires% So that this cable is also called twisted pair cable%

    ST. cable consist o# a co"er so that this is called shielded twisted pair cable% Co"er

    increases the ualit o# the cable% But it becomes more e!pensi"e then 2T. $ used in

    large companies% The data trans#er speed o# ST. cable is :>> mbps $ distance is 6>> m%

    2T. CABLE5/

    2nshielded twisted pair cable is also used to connect two or more computers with each

    other% There is no an co"er in this tpe o# cable%

    So that this is called unshielded twisted pair cable% This is also used in star topolog %

    2T. cable ha"ing wires $ < pairs% Each pair is o# two wires% Also called twisted pair

    cable% +ata trans#er speed o# 2T. cable is 6/6>> mbps $ distance is 6>>m%

  • 8/10/2019 Complete Network(1)

    11/23

    O.TICAL FIB-E CABLE5/

    This cable is used to connect large networks% Optical #ibre cable is used b IS.

    ? Internet ser"ice pro"ider 7%There is no generation o# E&I% This cable is "er costl%+ata trans#er speed o# #ibre optics cable is 6>> mbps to 8gbps $ distance is 8/8: km%

    3I-ELESS &E+IA5/

    The process o# connecting two or more computers with each other without the use o#

    wires in our network is called wireless media%

    T*.ES OF 3I-ELESS &E+IA5/

    67 3i/Fi media

    87 ,/SAT media

    3I/FI &E+IA5/

    3hen two or more computers are connected together without the use o# wires within

    one building or a room is called wi/#i media% This tpe o# networking is present in

    small organiations% 3ireless de"ices are a"ailable in the market on the basis o# the

    distance% A de"ice ha"ing the more distance will be more costl%

    E!ample5/ Bluetooth is the cheapest 3i/Fi de"ice0 microwa"es0 radio wa"es 0 in#raredwa"es%

    ,/SAT &E+IA5/

    This media is used to connect large networks with each other% ,/sat media is also called

    "irtual satellite media%

    +IA'-A& OF -O2TE-S 5

  • 8/10/2019 Complete Network(1)

    12/23

    &AC A++-ESS

    &AC ?media access control7 address is the address o# a particular LAN card% This is

    also called phsical address or hardware address% &AC address is present on chipset%

    The &AC address o# two LAN cards will ne"er be same% (ardware address is o# > 5E= 5A: 5BC 5C= 5B> he!adecimal number sstem

    =D

  • 8/10/2019 Complete Network(1)

    13/23

    To pro"ide the uniue number to the computers in our network is called I. addressing%

    It supports to TC.9I. protocol% I. address is used to pro"ide the address to all the

    computers present in a network% Networking is based on I. address%

    I. address is made up b two partitions5/

    67 Network partition

    87 (ost partition

    The I. address normall used b users is o# "ersion < $ works on ;8 bits% I. address

    is alwas gi"en in decimal #ormat%

    E!ample5/

    6 8 ; %6 decimal #ormat

    ;8 bitsI. address works in our network on the basis o# : classes 5/

    A0B0C0+0E % These are also known b the name EBC+IC ? e!tended binor coded

    decimal interchange code 7% The classes used in our network are A 0B $C% There is no

    authorit to use the + $ E classes% Each class contain di##erent network bit $ host bit%

    T*.ES OF I. A++-ESS BASE+ ON CLASSES5/

    I. "ersion

  • 8/10/2019 Complete Network(1)

    14/23

    68G%>%>%6 I. address is the reser"e I. address also called loop back I. address used #or

    testing o# LAN card % This I. address is b de#ault store in our network% Loop back

    address is used to check the connecti"it between the LAN card $ the TC.9I.% It can1t

    be used as a I. address%

    I. A++-ESS 6>%>%>%6

    S2BNET &AS4 8::%>%>%>

    NET3O-4 I+ 6>%>%>%>

    FI-ST I+ 6>%>%>%6

    LAST I+ 6>%>%>%8:%>%>%8::

    This I. address is o# "ersion < $ belongs to class A%

    NOTE5/

    I. "ersion < is o# ;8 bits $ in decimal #ormat% But I. "ersion = is o# 68 bits $ in

    he!adecimal #ormat%

    CLASS A5/

    Subnet mask5 8::%>%>%>

    NET3O-4 (OST (OST (OST

    8:: 8:: 8:: 8::

    68 =< ;8 6= < 8 6

    bits 6 6 6 6 6 6 6 6

    Network bits bits

    (ost bits 8< bitsTotal bits ;8 bits

    CLASS B5/

    Subnet mask 5 8::%8::%>%>

    bits bits bits bits

  • 8/10/2019 Complete Network(1)

    15/23

  • 8/10/2019 Complete Network(1)

    16/23

    Class C 5 68%6=%>%> to 68%6=%8::%8::

    I&.O-TANT CO&&AN+S 5/

    67 C5H ipcon#ig 5/

    This command is used to check the I. address o# their own sstem%

    Start

    run

    cmd

    c5Hipcon#ig enter

    I. address 6>%>%>%:

    Subnet mask 8::%8::%8::%>H

    +e#ault gatewa %

    87 getmac 5/

    This command is used to check the &AC address o# LAN card o# our sstem%

    Start

    -un

    Cmd

    'etmac

    .hsical address

    >>5/;>/6/AB/

  • 8/10/2019 Complete Network(1)

    17/23

    E!ample 5/ a network consist o# : pc1s ha"ing di##erent I. address 0 i# we ha"e to check

    the connecti"it between them then we ping them% I# there is connecti"it then both the

    pc1s will ping with each other otherwise the will not ping%

    To ping 5/

    .ing J 68%6=%>%: ?I. address o# own sstem 7

    .ing J 68%6=%>%8 ? I. address o# another sstem 7

    OSI &O+EL

    OSI stands #or open standard interconnection% OSI model was created b ISO in 6G>%The process o# sending the data #rom one computer to another computer b which

    method $ root is decided b OSI model%

    ISO ?international standard organiation7 de"eloped this model on the basis o# de#ence

    agenc o# 2SA ha"ing their own network which was relied on TC.9I.% TC.9I. is the

    prior model created in the world also called +O+ model% B using this model onl

    di##erence computers o# 2SA can communicate%

    OSI &O+EL 3O-4S ON G LA*E-S 3(IC( A-E 'I,EN BELO3 5/

  • 8/10/2019 Complete Network(1)

    18/23

    A..LICATION LA*E-5/

    This laer is the se"enth laer o# OSI model% All the user le"el works are per#ormed on

    application laer%

    E!ample5/ data sending 0 data recei"ing 0 trans#ormation o# mone using internet%

    All these works are done on application laer%

    .-ESENTATION LA*E-5/

    .resentation laer is the si!th number laer o# the OSI model% This laer includes the

    setup o# data #ormat% +ata coding is also done on this laer%

    +ata #ormat is o# "arious tpes like5/

    67 Te!t #ormat

    Te!t #ormat is #urther di"ided into two tpes5/

    a7 EBC+IC5/ e!tended binor coded decimal in#ormation code% This #ormat runs in appletalk $ IB&%

    b7 ASCII 5/American standard code #or in#ormation interchange%

    87 'raphic mode

    ;7 ,ideo #ormat5/ &.E' ? mo"ing picture e!port groups7%

  • 8/10/2019 Complete Network(1)

    19/23

    SESSION LA*E-5/

    Session laer is the #i#th number laer o# OSI model% It1s #unction to send the data to

    destination through session o# protocols% This work is done onl on this laer%

    E!ample5/ -.C ? remote process call 7 0 SKL ? seuence uer language 7% NETBE2IS 0

    NFS%

    T-ANS.O-T LA*E-5/

    This laer is the #ourth number laer o# OSI model% It1s main work is to trans#er the

    data to destination point% TC. $ 2+. protocols works on this laer% The data #ormat is

    segment%

    -ELIABLE +ATA +ELI,E-*5/

    TC. protocol pro"ides reliable data deli"er in network% Because TC. pro"ides an

    acknowledgement reliable connection%

    2N-ELIABLE +ATA +ELI,E-*5/

    2nreliable data deli"er is pro"ided b 2+.? user datagram

    protocol7% 2+. protocol works with +(C. connection network% The speed o# this

    network is much more than reliable connection%

    NOTE 5/

    -eliable connection is called oriented connection $ unreliable connection is called

    connectionless%

    -EA+* O- NOT -EA+* SI'NAL5/

    3hen multiple data is send b the source computer to the destination computer then

    o"er#low occurs at destination whichresults in tra##ic generation% In that condition destination computer sends a message to

    the source computer in the #orm o# not read signal%

    A#ter the remo"al o# the tra##ic it shows the read signal%

    NET3O-4 LA*E-5/

  • 8/10/2019 Complete Network(1)

    20/23

    This laer is the third number laer o# OSI model% The main #unction o# this laer is

    to pro"ide the I. address to host working in the network% To per#orm this work I.

    protocol is used% The #ormat o# data on this laer is packet%

    E!ample5/

    +ata #ormat is o# two tpes5/

    67 +ata packet

    87 -oute update packet

    +ATA .AC4ET5/

    It1s main work to brought the data to the routers on

    Inter network b using routed protocols% -outed protocols are those protocols which

    mainl works in network like TC.9I.%

    The routed protocols used here are I. $ I.@%

    +ATA LIN4 LA*E-5/

    This laer is the second number laer o# the OSI model% The #unction o# this laer is

    to trans#er the data into #rames recei"ed #rom the upper laer% On this laer the &AC

    address is added to the data #ormat which result in #rames%

    .(*SICAL LA*E-5/

    .hsical laer is the #irst number laer o# the OSI model% On this laer the data is

    #inall sends in binor #ormat i%e in >06 #orm% Cable 0 connector 0 hub $ repeater works

    in this laer%

    CABLE INSTALLATION

    2T. CABLE INSTALLATION5

    2T. cable is used in two was5/

    67 cross cable

    87 straight cable

    C-OSS CABLE5/

  • 8/10/2019 Complete Network(1)

    21/23

    6

    +IA'-A& OF NO-&AL C-OSS CABLE 5

    6 8

    ;