report on networking

Upload: punitrathee2007

Post on 29-May-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 Report on Networking

    1/19

    REPORT ON NETWORKING

    REPORT ON NETWORKING

    SOMIL SAHAI

    PUNIT RATHEE

    ANKIT GUPTA

    AVDHESH

    K. SHIVASWAROOP REDDY

    AASHISH PRATAP

    RAGHUVANSHI

  • 8/9/2019 Report on Networking

    2/19

    Report on Networking 2

    DEFINATION OF NETWORKING:-

    Networking is simply two or more computers connected together so that they can exchange

    information. A small network can be as simple as twocomputers linked together by a single

    cable.

    INTRODUCTION OF NETWORKING:-

    A computer network allows sharing of resources and informationamong devices connected

    to the network. The Advanced Research Projects Agency (ARPA) funded the design of the

    Advanced Research Projects Agency Network (ARPANAT) for the United States Department

    of Defence. It was the first operational computer network in the world. Development of the

    network began in 1969, based on designs developed during the 1960s.

    Types of networks:-

    (1) Personal Area Network:-

    A personal area network (PAN) is a computer network used for communication among

    computer and different information technological devices close to one person. Some

    examples of devices that are used in a PAN are personal computers, printers, fax machines,

    telephones, PDAs, scanners, and even video game consoles. A PAN may include wired and

    wireless connections between devices. The reach of a PAN typically extends to 10 meters. A

    wired PAN is usually constructed with USB and Fire wire connections while technologies

    such as Bluetooth and infrared communication typically form a wireless Pan.

  • 8/9/2019 Report on Networking

    3/19

    Re

    t

    etw

    i

    3

    (2)Loc

    lA

    N

    t

    o

    :-

    A loc

    l area ne

    ork (LAN) is a ne

    ork that connects computers and devices in a limited

    geographical area such as home school, computer laboratory, office building, or closely

    positioned group of buildings Each computer or device on the network is a node Current

    wired LANs are most likely to be based on Ethernet technology, although new standards

    like ITU-T G.hn also provide a way to create a wired LAN using eisting home wires (coaxial

    cables, phone lines and power lines).

    The defining characteristics of LANs, in contrast to WANs (Wide Area Networks), include

    their higher data transfer rates, smaller geographic range, and no need for leased

    telecommunication lines. Current Ethernet or other IEEE 802.3 LAN technologies operate at

    speeds up to 10 Gbit/s. This is the data transfer rate. IEEE has projects investigating the

    standardization of 40 and 100 Gbit/s .

  • 8/9/2019 Report on Networking

    4/19

    Re

    t !

    "

    etw #

    i! $

    4

    (3)Hom%

    A &% '

    N%

    t(

    o& )

    :-

    A Home area network (HAN) is a residential LAN which is used for communication between

    digital devices typically deployed in the home, usually a small number of personal

    computers and accessories, such as printers and mobile computing devices. An important

    function is the sharing of Int ernet access, often a broadband service through a CATV

    or Digital Subscriber Line (DSL) provider. It can also be referred as Office area network

    (OAN).

  • 8/9/2019 Report on Networking

    5/19

    Re0 1 2

    t1 3

    4

    etw1 2 5

    i3 6

    5

    (4)C7

    mpusN8

    t9

    o@ A :-

    A campus network is a computer network made up of an interconnection of local area

    networks (LANs) within a limited geographical area. The networking equipments (switches,

    routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc.) are almost

    entirely owned (by thecampus tenant / owner: an enterprise, university, government etc.).

    In the case of a university campus-based campus network, the network is likely to link a

    variety of campus buildings including; academic departments, the university library and

    student residence halls.

  • 8/9/2019 Report on Networking

    6/19

    ReB C D

    tC E

    F

    etwC D G

    iE H

    6

    (5)Wide Area Network:-

    A wide area network (WAN) is a computer network that covers a large geographic area such

    as a city, country, or spanseven intercontinental distances, using a communicationschannel

    that combines many types of media such as telephone lines, cables, and air waves. A WAN

    often uses transmission facilities provided by common carriers, such as telephone

    companies. WAN technologies generally function at the lower thr ee layers of the OSI

    reference model: the physical layer, the data link layer, and the network layer.

  • 8/9/2019 Report on Networking

    7/19

    ReI P Q

    tP R

    S

    etwP Q T

    iR U

    7

    (6)GlobV

    lA WX V

    NX

    tY

    oW :-

    A global area network (GAN) is a network used for supporting mobile communications

    across an arbitrary number of wireless LANs, satellitecoverage areas, etc. The keychallenge

    in mobilecommunications is handing off the user communications from one local coverage

    area to the next. In IEEE Project 802, this involves a succession of terrestrial wireless local

    area networks (WLAN).

    (7)EntX

    W p W isX

    PrivV

    tX

    NX

    tY

    ork:-

    An Enterprise Private Network is a network build by an enterprise to interconnect the

    variouscompanysites (production sites, head offices, remote offices, shopsetc.) in order to

    sharecomputer resources over the network.

  • 8/9/2019 Report on Networking

    8/19

    Rea b c

    tb d

    e

    etwb c f

    id g

    8

    (8)Virtuh

    l Privh

    ti

    Ni

    tp

    ork:-

    A virtual private network (VPN) is a computer network in which some of the links between

    nodes are carried by open connections or virtual circuits in some larger network (e.g., the

    Internet) instead of by physical wires. The data link layer protocols of the virtual network

    are said to be tunnelled through the larger network when this is the case. One common

    application issecurecommunications through the public Internet, but a VPN need not have

    explicit security features, such as authentication or content encryption. VPNs, for exam ple,

    can be used to separate the traffic of different user communities over an underlying

    network with strong security features.

    A VPN may have best-effort performance, or may have a defined service level agreement

    (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a

    topology morecomplex than point -to-point.

  • 8/9/2019 Report on Networking

    9/19

    Req r s

    tr t

    u

    etwr s v

    it w

    9

    (9)Intx

    rnx

    ty

    ork:-

    An Internetwork is theconnection of two or more privatecomputer networksvia a common

    switching (OSI Layer 2) or routing technology (OSI Layer 3) and owned byseparateentities

    (public or private). The result is called an internetwork. The Internet is an aggregation of

    many internetworks; hence its name wasshortened to Internet.Any interconnection between public, private, commercial, industrial, or governmental

    networks may also be defined as an internetwork or (more often) an extranet.

  • 8/9/2019 Report on Networking

    10/19

    Re

    t

    etw

    i

    10

    (10)Int

    rn

    t:-

    The Internet is a global system of interconnected governmental, academic, corporate,

    public, and private computer networks. It is based on the networking technologies of the

    Internet. It is thesuccessor of the Advanced Research Projects Agency Network (ARPANET)

    developed by DARPA of the U.S. Department of Defence. The Internet is also the

    communications backbone underlying the World Wide Web (WWW). The 'Internet' is most

    commonlyspelled with a capital 'I' as a proper noun, for historical reasons and to distinguish

    it from other generic internetworks.

    Participants in the Internet use a diverse array of methods ofseveral hundred docum ented,

    and often standardized, protocols compatible with the Internet Protocol Suite and an

    addressing system (IP Addresses) administered by the Internet Assigned Numbers

    Authority and address registries. Service providers and large enterprises exchange

    information about the reachability of their address spaces through theBorder Gateway

    Protocol (BGP), forming a redundant worldwide mesh of transmission paths.

  • 8/9/2019 Report on Networking

    11/19

    Re

    t

    etw

    i

    11

    (11)Intran

    t and Extran

    t:-

    Intranets and extranets are parts or extensions of a computer network, usually a local area

    network.

    An intranet is a set of networks, using the Internet Protocol and IP-based toolssuch as web

    browsers and file transfer applications, i.e., are under thecontrol of a single administrative

    entity. That administrative entity closes the intranet to all but specific, authorized users.

    Most commonly, an intranet is the internal network of an organization. A large intranet will

    typically have at least one web server to provide users with organizational information.

    An extranet is a network that is limited in scope to a single organization or entity and also

    has limited connections to the networks of one or more other usually, but not necessarily,

    trusted organizations or entities (e.g., a company'scustomers may be given access to some

    part of its intranet creating in this way an extranet, while at thesame time thecustomers

    may not be considered 'trusted' from a security standpoint). Technically, an extranet may

    also becategorized as a CAN, MAN, WAN, or other type of network , although, by definition,

    an extranet cannot consist of a single LAN; it must have at least one connection with an

    external network.

  • 8/9/2019 Report on Networking

    12/19

    Re

    t

    etw

    i

    1

    (12)Ov

    rlay N

    t

    ork:-

    An overlay network is a computer network that is built on top of another network. Nodes in

    the overlaycan be thought of as being connected byvirtual or logical links, each of which

    corresponds to a path, perhaps through many physical links, in the underlying networ k.

    A sample overlay network: IP over SONET over Optical

    Nodes in the overlaycan be thought of as being connected byvirtual or logical links, each of

    which corresponds to a path, perhaps through many physical links, in the underlying

    network. For example, many peer-to-peer networks are overlay networks because they run

    on top of the Internet. Internet was built as an overlay on the telephone network [6].

    Overlay networks have been around since the invention of networking when computer

    systems were connected over telephone lines using modem, before any data network

    existed.

    Overlay networks have also been proposed as a way to improve Internet routing, such as

    through quality of service guarantees to achieve higher-qualitystreaming media. Previous

    proposalssuch as IntServ, DiffServ, and IP Multicast have not seen wide acceptance largely

    because they require modification of all routers in the network. On the other hand, an

    overlay network can be incrementally deployed on end -hosts running the overlay protocol

    software, without cooperation from ISPs. The overlay has no control over how packets are

    routed in the underlying network between two overlay nodes, but it can control, for

    example, the sequence of overlay nodes a message traverses before reaching its

    destination.

  • 8/9/2019 Report on Networking

    13/19

    Rej k l

    tk m

    n

    etwk l o

    im

    13

    NETWORK TOPOLOGY:-

    Network topology is defined as the interconnection of the various elements (links, nodes,

    etc.) of a computer network. Network Topologies can be physical or logical.

    Physical Topology means the physical design of a network including the devices, location

    and cable installation. Logical topology refers to the fact that how data actually transfers in

    a network as opposed to its physical design.

    (1) BUS TOPOLOGY:-

    In local area networks where bus topology is used, each machine is connected to a single

    cable. Each computer or server is connected to the single bus cable through some kind of

    connector. A terminator is required at each end of the buscable to prevent thesignal from

    bouncing back and forth on the buscable. A signal from thesource travels in both directionsto all machinesconnected on the buscable until it finds the MAC address or IP address on

    the network that is the intended recipient. If the machine address does not match the

    intended address for the data, the machine ignores the data. Alternatively, if the data does

    match the machine address, the data is accepted. Since the bus topology consists of only

    one wire, it is rather inexpensive to implement when compared to other topologies.

    However, the low cost of implementing the technology is offset by the high cost of

    managing the network. Additionally, since only one cable is utilized, it can be the single

    point of failure. If the network cable breaks, theentire network will be down.

  • 8/9/2019 Report on Networking

    14/19

    Re

    t

    etw

    i

    14

    (2) STAR TOPOLOGY:-

    In local area networks with a star topology, each network host isconnected to a central hub.

    In contrast to the bus topology, the star topology connects each node to the hub with a

    point-to-point connection. All traffic that transverse s the network passes through the

    central hub. The hub acts as a signal booster or repeater. Thestar topology is consideredthe easiest topology to design and implement. An advantage of the star topology is the

    simplicity of adding additional nodes. The primary disadvantage of thestar topology is that

    the hub represents a single point of failure.

  • 8/9/2019 Report on Networking

    15/19

    Re z

    t {

    |

    etw z }

    i{ ~

    15

    (3) RING TOPOLOGY:-

    In local area networks where the ring topology is used, each computer isconnected to the

    network in a closed loop or ring. Each machine or computer has a unique address that is

    used for identification purposes. The signal passes through each machine or computer

    connected to the ring in one direction. Ring topologies typically utilize a token passingscheme, used to control access to the network. By utilizing thisscheme, only one machine

    can transmit on the network at a time. The machines or computers connected to the ring

    act as signal boosters or repeaters which strengthen the signals that transverse the

    network. The primary disadvantage of ring topology is the failure of one machine will cause

    theentire network to fail.

  • 8/9/2019 Report on Networking

    16/19

    Re

    t

    etw

    i

    16

    (4) MESH TOPOLOGY:-

    The value of fully meshed networks is proportional to the exponent of the number of

    subscribers, assuming that communicating groups of any two endpoints, up to and including

    all theendpoints, is approximated by Reed's Law.

  • 8/9/2019 Report on Networking

    17/19

    Re

    t

    etw

    i

    17

    (5) TREE TOPOLOGY:-

    The type of network topology in which a central 'root' node (the top level of the hierarchy)

    isconnected to one or more other nodes that are one level lower in the hierarchy (i.e., the

    second level) with a point -to-point link between each of thesecond level nodes and the top

    level central 'root' node, whileeach of thesecond level nodes that areconnected to the toplevel central 'root' node will also have one or more other nodes that are one level lower in

    the hierarchy (i.e., the third level) connected to it, also with a point -to-point link, the top

    level central 'root' node being the only node that has no other node above it in the

    hierarchy (The hierarchy of the tree is symmetrical.) Each node in the network having a

    specific fixed number, of nodesconnected to it at the next lower level in the hierarchy, the

    number, being referred to as the 'branching factor' of the hierarchical tree.

  • 8/9/2019 Report on Networking

    18/19

    Re

    t

    etw

    i

    18

    A VANTAGES OFNETWORKING:-

    Most of the benefits of networking can be divided into two generic

    categories:connectivity and sharing. Networks allow computers, and hence their users, to

    beconnected together. They also allow for theeasysharing of information and resources,

    and cooperation between the devices in other ways.

    Here, in no particular order, aresome of thespecific advantages generally associated with

    networking:

    Conn

    ctivity and Communication: - Networks connect computers and the

    users of those computers. Individuals within a building or work group can be

    connected into local area networks (LANs); LANs in distant locations can be

    interconnected into larger wide area networks (WANs). Onceconnected, it is possible

    for network users to communicate with each other using technologiessuch as

    electronic mail. This makes the transmission of business (or non-business)

    information easier, more efficient and less expensive than it would be without the

    network.

    Data Sharing: - One of the most important uses of networking is to allow the

    sharing of data. Before networking wascommon, an accounting employee who

    wanted to prepare a report for her manager would have to produce it on his PC, put

    it on a floppy disk, and then walk it over to the manager, who would transfer the

    data to her PC's hard disk. (Thissort of shoe -based network wassometimessarcasticallycalled a sneaker net.)

    Hard

    are Sharing: - Networks facilitate the sharing of hardware devices. For

    example, instead of giving each of10employees in a department an expensive colour

    printer (or resorting to the sneaker net again), one printer can be placed on the

    network for everyone to share.

    Internet Access: The Internet is itself an enormous network, so whenever you

    access the Internet, you are using a network. The significance of the Internet on

    modern society is hard to exaggerate, especially for those of us in technical fields.

    Internet Access Sharing: - Small computer networks allow multiple users to

    share a single Internet connection. Special hardware devices allow the bandwidth of

    theconnection to beeasily allocated to various individuals as they need it, and permit

    an organization to purchase one high -speed connection instead of manyslower ones.

  • 8/9/2019 Report on Networking

    19/19

    Re

    t

    etw

    i

    19

    DISADVANTAGES OFNETWORKING:-

    Now that I have portrayed the great value and many useful benefits of networking, I must

    bring you crashing back to earth with that old nemesis of the realistic: TANSTAAFL. For those

    who are not Heinlein fans, this acronym stands for There Isnt No Such Thing as a Free

    Lunch. Even though networking really does represent a whole that is greater than thesum

    of its parts, it does havesome real and significant costs and drawbacks associated with it.

    Here are a few of the items that balance against the advantages of networking.

    Net

    ork Hard

    are, Soft

    are and Setup Costs : - Computers don't just

    magically network themselves, of course. Setting up a network requires an

    investment in hardware and software, as well as funds for planning, designing and

    implementing the network. For a home with a small network of two or three PCs,

    this is relatively inexpensive, possibly amounting to less than a hundred dollars with

    today's low prices for network hardware, and operating systems already designed

    for networks. For a large company, cost can easily run into tens of thousands of

    dollarsor more.

    Hard

    are and Soft

    are Management andAdministrationCosts: - In all

    but thesmallest of implementations, ongoing maintenance and management of the

    network requires the care and attention of an IT professional. In a smaller

    organization that already has a system administrator, a network may fall within this

    person'sjob responsibilities, but it will take time away from other tasks. In more

    substantial organizations, a network administrator may need to be hired, and in

    largecompanies an entire department may be necessary.

    Undesirable Sharing: - With the good comes the bad; while networking allows

    theeasysharing of useful information, it also allows thesharing of undesirable data.

    One significant sharing problem in this regard has to do with viruses, which are

    easily spread over networks and the Internet. Mitigating these effe cts costs more

    time, money and administrativeeffort.

    Illegal or Undesirable Behaviour: - Similar to the point above, networking

    facilitates useful connectivity and communication, but also brings difficulties with it.

    Typical problems include abuse of company resources, distractions that reduce

    productivity, downloading of illegal or illicit materials, and even software piracy. In

    larger organizations, these issues must be managed through explicit policies and

    monitoring, which again, further increases management costs.