report on networking
TRANSCRIPT
-
8/9/2019 Report on Networking
1/19
REPORT ON NETWORKING
REPORT ON NETWORKING
SOMIL SAHAI
PUNIT RATHEE
ANKIT GUPTA
AVDHESH
K. SHIVASWAROOP REDDY
AASHISH PRATAP
RAGHUVANSHI
-
8/9/2019 Report on Networking
2/19
Report on Networking 2
DEFINATION OF NETWORKING:-
Networking is simply two or more computers connected together so that they can exchange
information. A small network can be as simple as twocomputers linked together by a single
cable.
INTRODUCTION OF NETWORKING:-
A computer network allows sharing of resources and informationamong devices connected
to the network. The Advanced Research Projects Agency (ARPA) funded the design of the
Advanced Research Projects Agency Network (ARPANAT) for the United States Department
of Defence. It was the first operational computer network in the world. Development of the
network began in 1969, based on designs developed during the 1960s.
Types of networks:-
(1) Personal Area Network:-
A personal area network (PAN) is a computer network used for communication among
computer and different information technological devices close to one person. Some
examples of devices that are used in a PAN are personal computers, printers, fax machines,
telephones, PDAs, scanners, and even video game consoles. A PAN may include wired and
wireless connections between devices. The reach of a PAN typically extends to 10 meters. A
wired PAN is usually constructed with USB and Fire wire connections while technologies
such as Bluetooth and infrared communication typically form a wireless Pan.
-
8/9/2019 Report on Networking
3/19
Re
t
etw
i
3
(2)Loc
lA
N
t
o
:-
A loc
l area ne
ork (LAN) is a ne
ork that connects computers and devices in a limited
geographical area such as home school, computer laboratory, office building, or closely
positioned group of buildings Each computer or device on the network is a node Current
wired LANs are most likely to be based on Ethernet technology, although new standards
like ITU-T G.hn also provide a way to create a wired LAN using eisting home wires (coaxial
cables, phone lines and power lines).
The defining characteristics of LANs, in contrast to WANs (Wide Area Networks), include
their higher data transfer rates, smaller geographic range, and no need for leased
telecommunication lines. Current Ethernet or other IEEE 802.3 LAN technologies operate at
speeds up to 10 Gbit/s. This is the data transfer rate. IEEE has projects investigating the
standardization of 40 and 100 Gbit/s .
-
8/9/2019 Report on Networking
4/19
Re
t !
"
etw #
i! $
4
(3)Hom%
A &% '
N%
t(
o& )
:-
A Home area network (HAN) is a residential LAN which is used for communication between
digital devices typically deployed in the home, usually a small number of personal
computers and accessories, such as printers and mobile computing devices. An important
function is the sharing of Int ernet access, often a broadband service through a CATV
or Digital Subscriber Line (DSL) provider. It can also be referred as Office area network
(OAN).
-
8/9/2019 Report on Networking
5/19
Re0 1 2
t1 3
4
etw1 2 5
i3 6
5
(4)C7
mpusN8
t9
o@ A :-
A campus network is a computer network made up of an interconnection of local area
networks (LANs) within a limited geographical area. The networking equipments (switches,
routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc.) are almost
entirely owned (by thecampus tenant / owner: an enterprise, university, government etc.).
In the case of a university campus-based campus network, the network is likely to link a
variety of campus buildings including; academic departments, the university library and
student residence halls.
-
8/9/2019 Report on Networking
6/19
ReB C D
tC E
F
etwC D G
iE H
6
(5)Wide Area Network:-
A wide area network (WAN) is a computer network that covers a large geographic area such
as a city, country, or spanseven intercontinental distances, using a communicationschannel
that combines many types of media such as telephone lines, cables, and air waves. A WAN
often uses transmission facilities provided by common carriers, such as telephone
companies. WAN technologies generally function at the lower thr ee layers of the OSI
reference model: the physical layer, the data link layer, and the network layer.
-
8/9/2019 Report on Networking
7/19
ReI P Q
tP R
S
etwP Q T
iR U
7
(6)GlobV
lA WX V
NX
tY
oW :-
A global area network (GAN) is a network used for supporting mobile communications
across an arbitrary number of wireless LANs, satellitecoverage areas, etc. The keychallenge
in mobilecommunications is handing off the user communications from one local coverage
area to the next. In IEEE Project 802, this involves a succession of terrestrial wireless local
area networks (WLAN).
(7)EntX
W p W isX
PrivV
tX
NX
tY
ork:-
An Enterprise Private Network is a network build by an enterprise to interconnect the
variouscompanysites (production sites, head offices, remote offices, shopsetc.) in order to
sharecomputer resources over the network.
-
8/9/2019 Report on Networking
8/19
Rea b c
tb d
e
etwb c f
id g
8
(8)Virtuh
l Privh
ti
Ni
tp
ork:-
A virtual private network (VPN) is a computer network in which some of the links between
nodes are carried by open connections or virtual circuits in some larger network (e.g., the
Internet) instead of by physical wires. The data link layer protocols of the virtual network
are said to be tunnelled through the larger network when this is the case. One common
application issecurecommunications through the public Internet, but a VPN need not have
explicit security features, such as authentication or content encryption. VPNs, for exam ple,
can be used to separate the traffic of different user communities over an underlying
network with strong security features.
A VPN may have best-effort performance, or may have a defined service level agreement
(SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a
topology morecomplex than point -to-point.
-
8/9/2019 Report on Networking
9/19
Req r s
tr t
u
etwr s v
it w
9
(9)Intx
rnx
ty
ork:-
An Internetwork is theconnection of two or more privatecomputer networksvia a common
switching (OSI Layer 2) or routing technology (OSI Layer 3) and owned byseparateentities
(public or private). The result is called an internetwork. The Internet is an aggregation of
many internetworks; hence its name wasshortened to Internet.Any interconnection between public, private, commercial, industrial, or governmental
networks may also be defined as an internetwork or (more often) an extranet.
-
8/9/2019 Report on Networking
10/19
Re
t
etw
i
10
(10)Int
rn
t:-
The Internet is a global system of interconnected governmental, academic, corporate,
public, and private computer networks. It is based on the networking technologies of the
Internet. It is thesuccessor of the Advanced Research Projects Agency Network (ARPANET)
developed by DARPA of the U.S. Department of Defence. The Internet is also the
communications backbone underlying the World Wide Web (WWW). The 'Internet' is most
commonlyspelled with a capital 'I' as a proper noun, for historical reasons and to distinguish
it from other generic internetworks.
Participants in the Internet use a diverse array of methods ofseveral hundred docum ented,
and often standardized, protocols compatible with the Internet Protocol Suite and an
addressing system (IP Addresses) administered by the Internet Assigned Numbers
Authority and address registries. Service providers and large enterprises exchange
information about the reachability of their address spaces through theBorder Gateway
Protocol (BGP), forming a redundant worldwide mesh of transmission paths.
-
8/9/2019 Report on Networking
11/19
Re
t
etw
i
11
(11)Intran
t and Extran
t:-
Intranets and extranets are parts or extensions of a computer network, usually a local area
network.
An intranet is a set of networks, using the Internet Protocol and IP-based toolssuch as web
browsers and file transfer applications, i.e., are under thecontrol of a single administrative
entity. That administrative entity closes the intranet to all but specific, authorized users.
Most commonly, an intranet is the internal network of an organization. A large intranet will
typically have at least one web server to provide users with organizational information.
An extranet is a network that is limited in scope to a single organization or entity and also
has limited connections to the networks of one or more other usually, but not necessarily,
trusted organizations or entities (e.g., a company'scustomers may be given access to some
part of its intranet creating in this way an extranet, while at thesame time thecustomers
may not be considered 'trusted' from a security standpoint). Technically, an extranet may
also becategorized as a CAN, MAN, WAN, or other type of network , although, by definition,
an extranet cannot consist of a single LAN; it must have at least one connection with an
external network.
-
8/9/2019 Report on Networking
12/19
Re
t
etw
i
1
(12)Ov
rlay N
t
ork:-
An overlay network is a computer network that is built on top of another network. Nodes in
the overlaycan be thought of as being connected byvirtual or logical links, each of which
corresponds to a path, perhaps through many physical links, in the underlying networ k.
A sample overlay network: IP over SONET over Optical
Nodes in the overlaycan be thought of as being connected byvirtual or logical links, each of
which corresponds to a path, perhaps through many physical links, in the underlying
network. For example, many peer-to-peer networks are overlay networks because they run
on top of the Internet. Internet was built as an overlay on the telephone network [6].
Overlay networks have been around since the invention of networking when computer
systems were connected over telephone lines using modem, before any data network
existed.
Overlay networks have also been proposed as a way to improve Internet routing, such as
through quality of service guarantees to achieve higher-qualitystreaming media. Previous
proposalssuch as IntServ, DiffServ, and IP Multicast have not seen wide acceptance largely
because they require modification of all routers in the network. On the other hand, an
overlay network can be incrementally deployed on end -hosts running the overlay protocol
software, without cooperation from ISPs. The overlay has no control over how packets are
routed in the underlying network between two overlay nodes, but it can control, for
example, the sequence of overlay nodes a message traverses before reaching its
destination.
-
8/9/2019 Report on Networking
13/19
Rej k l
tk m
n
etwk l o
im
13
NETWORK TOPOLOGY:-
Network topology is defined as the interconnection of the various elements (links, nodes,
etc.) of a computer network. Network Topologies can be physical or logical.
Physical Topology means the physical design of a network including the devices, location
and cable installation. Logical topology refers to the fact that how data actually transfers in
a network as opposed to its physical design.
(1) BUS TOPOLOGY:-
In local area networks where bus topology is used, each machine is connected to a single
cable. Each computer or server is connected to the single bus cable through some kind of
connector. A terminator is required at each end of the buscable to prevent thesignal from
bouncing back and forth on the buscable. A signal from thesource travels in both directionsto all machinesconnected on the buscable until it finds the MAC address or IP address on
the network that is the intended recipient. If the machine address does not match the
intended address for the data, the machine ignores the data. Alternatively, if the data does
match the machine address, the data is accepted. Since the bus topology consists of only
one wire, it is rather inexpensive to implement when compared to other topologies.
However, the low cost of implementing the technology is offset by the high cost of
managing the network. Additionally, since only one cable is utilized, it can be the single
point of failure. If the network cable breaks, theentire network will be down.
-
8/9/2019 Report on Networking
14/19
Re
t
etw
i
14
(2) STAR TOPOLOGY:-
In local area networks with a star topology, each network host isconnected to a central hub.
In contrast to the bus topology, the star topology connects each node to the hub with a
point-to-point connection. All traffic that transverse s the network passes through the
central hub. The hub acts as a signal booster or repeater. Thestar topology is consideredthe easiest topology to design and implement. An advantage of the star topology is the
simplicity of adding additional nodes. The primary disadvantage of thestar topology is that
the hub represents a single point of failure.
-
8/9/2019 Report on Networking
15/19
Re z
t {
|
etw z }
i{ ~
15
(3) RING TOPOLOGY:-
In local area networks where the ring topology is used, each computer isconnected to the
network in a closed loop or ring. Each machine or computer has a unique address that is
used for identification purposes. The signal passes through each machine or computer
connected to the ring in one direction. Ring topologies typically utilize a token passingscheme, used to control access to the network. By utilizing thisscheme, only one machine
can transmit on the network at a time. The machines or computers connected to the ring
act as signal boosters or repeaters which strengthen the signals that transverse the
network. The primary disadvantage of ring topology is the failure of one machine will cause
theentire network to fail.
-
8/9/2019 Report on Networking
16/19
Re
t
etw
i
16
(4) MESH TOPOLOGY:-
The value of fully meshed networks is proportional to the exponent of the number of
subscribers, assuming that communicating groups of any two endpoints, up to and including
all theendpoints, is approximated by Reed's Law.
-
8/9/2019 Report on Networking
17/19
Re
t
etw
i
17
(5) TREE TOPOLOGY:-
The type of network topology in which a central 'root' node (the top level of the hierarchy)
isconnected to one or more other nodes that are one level lower in the hierarchy (i.e., the
second level) with a point -to-point link between each of thesecond level nodes and the top
level central 'root' node, whileeach of thesecond level nodes that areconnected to the toplevel central 'root' node will also have one or more other nodes that are one level lower in
the hierarchy (i.e., the third level) connected to it, also with a point -to-point link, the top
level central 'root' node being the only node that has no other node above it in the
hierarchy (The hierarchy of the tree is symmetrical.) Each node in the network having a
specific fixed number, of nodesconnected to it at the next lower level in the hierarchy, the
number, being referred to as the 'branching factor' of the hierarchical tree.
-
8/9/2019 Report on Networking
18/19
Re
t
etw
i
18
A VANTAGES OFNETWORKING:-
Most of the benefits of networking can be divided into two generic
categories:connectivity and sharing. Networks allow computers, and hence their users, to
beconnected together. They also allow for theeasysharing of information and resources,
and cooperation between the devices in other ways.
Here, in no particular order, aresome of thespecific advantages generally associated with
networking:
Conn
ctivity and Communication: - Networks connect computers and the
users of those computers. Individuals within a building or work group can be
connected into local area networks (LANs); LANs in distant locations can be
interconnected into larger wide area networks (WANs). Onceconnected, it is possible
for network users to communicate with each other using technologiessuch as
electronic mail. This makes the transmission of business (or non-business)
information easier, more efficient and less expensive than it would be without the
network.
Data Sharing: - One of the most important uses of networking is to allow the
sharing of data. Before networking wascommon, an accounting employee who
wanted to prepare a report for her manager would have to produce it on his PC, put
it on a floppy disk, and then walk it over to the manager, who would transfer the
data to her PC's hard disk. (Thissort of shoe -based network wassometimessarcasticallycalled a sneaker net.)
Hard
are Sharing: - Networks facilitate the sharing of hardware devices. For
example, instead of giving each of10employees in a department an expensive colour
printer (or resorting to the sneaker net again), one printer can be placed on the
network for everyone to share.
Internet Access: The Internet is itself an enormous network, so whenever you
access the Internet, you are using a network. The significance of the Internet on
modern society is hard to exaggerate, especially for those of us in technical fields.
Internet Access Sharing: - Small computer networks allow multiple users to
share a single Internet connection. Special hardware devices allow the bandwidth of
theconnection to beeasily allocated to various individuals as they need it, and permit
an organization to purchase one high -speed connection instead of manyslower ones.
-
8/9/2019 Report on Networking
19/19
Re
t
etw
i
19
DISADVANTAGES OFNETWORKING:-
Now that I have portrayed the great value and many useful benefits of networking, I must
bring you crashing back to earth with that old nemesis of the realistic: TANSTAAFL. For those
who are not Heinlein fans, this acronym stands for There Isnt No Such Thing as a Free
Lunch. Even though networking really does represent a whole that is greater than thesum
of its parts, it does havesome real and significant costs and drawbacks associated with it.
Here are a few of the items that balance against the advantages of networking.
Net
ork Hard
are, Soft
are and Setup Costs : - Computers don't just
magically network themselves, of course. Setting up a network requires an
investment in hardware and software, as well as funds for planning, designing and
implementing the network. For a home with a small network of two or three PCs,
this is relatively inexpensive, possibly amounting to less than a hundred dollars with
today's low prices for network hardware, and operating systems already designed
for networks. For a large company, cost can easily run into tens of thousands of
dollarsor more.
Hard
are and Soft
are Management andAdministrationCosts: - In all
but thesmallest of implementations, ongoing maintenance and management of the
network requires the care and attention of an IT professional. In a smaller
organization that already has a system administrator, a network may fall within this
person'sjob responsibilities, but it will take time away from other tasks. In more
substantial organizations, a network administrator may need to be hired, and in
largecompanies an entire department may be necessary.
Undesirable Sharing: - With the good comes the bad; while networking allows
theeasysharing of useful information, it also allows thesharing of undesirable data.
One significant sharing problem in this regard has to do with viruses, which are
easily spread over networks and the Internet. Mitigating these effe cts costs more
time, money and administrativeeffort.
Illegal or Undesirable Behaviour: - Similar to the point above, networking
facilitates useful connectivity and communication, but also brings difficulties with it.
Typical problems include abuse of company resources, distractions that reduce
productivity, downloading of illegal or illicit materials, and even software piracy. In
larger organizations, these issues must be managed through explicit policies and
monitoring, which again, further increases management costs.