+ All Categories
Home > Documents > 2 network

2 network

Date post: 16-Feb-2016
Category:
Upload: dhiraj-pahuja
View: 213 times
Download: 0 times
Share this document with a friend
Description:
network
Popular Tags:
28
Graduate Diploma Level 7 (Information Technology Strand) STD711 Networking and Operating System (NOS-Assignment) Assignment 2 Final Result: _______________ Assessor Signature___________________ Studen t Name Dhiraj Pahuja Nikhil Chaithanya Pravin Kumar Studen t ID TIZ0000262 TIZ00001UD TIZ00001U 8
Transcript
Page 1: 2 network

Graduate Diploma

Level 7

(Information Technology Strand)

STD711 Networking and Operating System

(NOS-Assignment)

Assignment 2

Final Result: _______________ Assessor Signature___________________

Student Name Dhiraj Pahuja Nikhil Chaithanya Pravin Kumar

Student ID TIZ0000262 TIZ00001UD TIZ00001U8

Student Signature

Assessor Tamanna Phogat

Page 2: 2 network

Task 1: Define computer network using diagram depicting a network and why we need it for.

Ans: A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users. Networks are commonly categorized based on their characteristics.

By using either cable media or wireless media the connections are established between the nodes. The computer network is best known as “INTERNET”.

The devices in the computer network that develop, route and end the information are known as network nodes.

Two main important technologies in computer network is telecommunication and computing work together

Computer Network Diagram

Page 3: 2 network

Need of computer network:

Computer network act a vital role while sharing the network and in communication to support the end users over the network. We cannot imagine the universe at present without online chating, apps, e-learing and my other utilities provided by the internet.

1.Hardware Sharing

Users can share devices such as printers, scanners, CD-ROM drives, hard drives etc. Without computer networks, device sharing is not possible.

2.OperationSharingOperations are shared done with network, and also proceed to implement client/server operations.

3.End user communication

Networks allow users to communicate using e-mail, newsgroups, and video conferencing etc

4.System gaming

A lot of network games are available, which allow multi-users to play from different locations.

5.Voice over IP

Voice over Internet Protocol (IP) is a revolutionary change in telecommunication which allows to send telephone calls (voice data) using standard Internet Protocol (IP) rather than by traditional PSTN.

Page 4: 2 network

Task 2.Describe the following criteria and classify the types of network based on this classification:

a) Transmission media b) Network sizec) Management methodd) Topology / connectivity based

Ans. a). Transmission Media

Transmission media is a pathway that carries the information from sender to receiver. We use different types of cables or waves to transmit data. Data is transmitted normally through electrical or electromagnetic signals.

A few transmission media are mentioned below:

I)Transmission over cable

a.Twisted Pair Cable:

A twisted pair cable is a earliest and the most routine transmission media.This type of cables are generally utilized as a part of phones and are additionally called phone wires.These link comprises of copper wires curved into sets with every wire protected in plastic.

Two types of wires:

Shielded Twisted Pair

Unshielded Twisted Pair

b.Coaxial Cable:

Coaxial cable is also called as Coax, In television cable this coax is used commonly.Two conductors are presented in coaxial cable .A central copper wire encompassed by a PVC

Page 5: 2 network

protection over which a sleeve of copper lattice is set.Again the metal sleeve is shielded by other shield with thick PVC metal.These cables are strong enough of transmmiting data at high level of speed i.e 10mb/s.

C.Fiber-Optic Cable:

Fiber-Optic Cable is a narrow fiber of glass proctected in a case.The information in the fiber-Optic Cable will transmitted in the form of light in high speed. The electrical signals are converted into light waves by sender. Besides the light waves are converted into electrical waves by receiver.

The disadvantage of this cable is to implement and also very expensive.

ii)Wireless Transmission

Communication Satillite:

Communication Satellite is primarily a microwave location in out space. It is very useful since satellite communication is visible anywhere.

The main draw back in communication satellite is that it is very costly.

Microwave system:

Microwave System will transmit the data with high level frequency of radio signals through space. The microwave system have to be on a straight line because these signals cannot transform obstacles to the receiver.

b).Network Size

The computer network is classified according to their network size, ie the duration to whatever physical components are localized, from local area to the city, country or either the planet. This requires a physical media and protocols for the operations.so they are defined in three different types:

a.Wide Area Network(WAN):

A wide area network, or WAN, occupies a very large area, such as an entire country or the entire world. A WAN can contain multiple smaller networks, such as LANs or MANs. The Internet is the best-known example of a public WAN.

Wide area network generally well-established with hire telecommunication bounds.

Page 6: 2 network

b.Local Area Network:

A local area network, or LAN, consists of a computer network at a single site, typically an individual office building. A LAN is very useful for sharing resources, such as data storage and printers. LANs can be built with relatively inexpensive hardware, such as hubs, network adapters and Ethernet cables.

The smallest LAN may only use two computers, while larger LANs can accommodate thousands of computers. A LAN typically relies mostly on wired connections for increased speed and security, but wireless connections can also be part of a LAN. High speed and relatively low cost are the defining characteristics of LANs.

c.Metropolitan Area Network:

A metropolitan area network, or MAN, consists of a computer network across an entire city, college campus or small region. A MAN is larger than a LAN, which is typically limited to a single building or site. Depending on the configuration, this type of network can cover an area from several miles to tens of miles. A MAN is often used to connect several LANs together to form a bigger network. When this type of network is specifically designed for a college campus, it is sometimes referred to as a campus area network, or CAN.

3.Managment method in computer network

A network management system (NMS) is a set of hardware and/or software tools that allow an IT professional to supervise the individual components of a network within a larger network management framework.

There are many types of networks:

Simple Network Managment Protocol(SNMP):

SNMP is an standard internet protocol for handling devices on Internet protocol networks.

SNMP support devices including switches, printers, modem, and more organizational attension

FTTP:S

The Hypertext Transfer Protocol (HTTP) is an application convention for dispersed, community oriented, hypermedia data frameworks. HTTP

Page 7: 2 network

is the establishment of information matching for the internet. Hypertext is organized content that uses consistent connections (hyperlinks) between hubs containing content.

FTP:

The File Transfer Protocol (FTP) is a standard system convention used to exchange PC records begins with single host then onto the other host over a TCP-based system, for example, the Internet. FTP is based on structural planning and uses different zcontrol and information associations between the customer and the server.

d).Topologies used in computer network

System Topology is the schematic depiction of a system course of action, interfacing different nodes(sender and recipient) through lines of association.

1)Bus Topology

Bus topology is a system sort in where each PC and system gadget is associated with single link

Components of Bus Topology

1. It transmits information just in one heading.2. Each gadget is joined with a solitary link

Advantages of Bus Topology

1. It is financially savvy.2. Link required is slightest contrasted with other system topology.3. Utilized as a part of little systems.

Limitations of Bus Topology

1. Links falls flat then entire system comes up short.2. In the event that system activity is substantial or hubs are more the execution of

the system diminishes.3. Link has a restricted length.

2)Ring Topology

It is called ring topology on the grounds that it frames a ring as every PC is associated with another PC, with the last one joined with the first. Precisely two neighbors for every gadget.

Components of Ring topology:

Page 8: 2 network

1. Various repeaters are utilized and the transmission is unidirectional.2. Date is moved in a consecutive way that is a little bit at a time.

Advantages of topology:

Transmitting system is not influenced by high activity or by including more hubs, as just the hubs having tokens can transmit information.

Shabby to introduce and grow

Limitations of Ring Topology

1. Investigating is troublesome in ring topology.2. Including or erasing the PCs exasperates the system movement.3. Disappointment of one PC exasperates the entire system.

3)Star Topology

In this kind of topology every one of the PCs are joined with a solitary centre through a link. This center point is the focal hub and all others hubs are associated with the focal hub.

Components of Star Topology

1. Each hub has its own particular devoted association with the center.2. Goes about as a repeater for information stream.3. Can be utilized with contorted pair, Optical Fiber or coaxial link.

Advantages of Star Topology

1. Quick execution with couple of hubs and low system activity.2. Centre point can be overhauled effectively.3. Simple to investigate.4. Simple to setup and change.

Limitations of Star Topology

1. Expense of establishment is high.2. Costly to utilize.3. Execution depends on the centre that is it relies on upon its ability.

4) Mesh Topology

It is a point-to-direct association toward different hubs or gadgets. Activity is conveyed just between two gadgets or hubs to which it is joined. Cross section has (n-2)/2 physical channels to connection in gadgets

Sorts of Mesh Topology

Page 9: 2 network

Fractional Mesh Topology: In this topology a percentage of the frameworks are joined in the same manner as cross section topology however a few gadgets are just associated with a few gadgets.

Full Mesh Topology: Each and every hubs or gadgets are joined with one another.

5) TREE Topology

It has a root hub and every single other hub are joined with it shaping a chain of importance. It is likewise called various levelled topology. It ought to at any rate have three levels to the chain of importance.

6) Hybrid Topology:

It is two unique sorts of topologies which is a blend of two or more topologies. For instance if in an office in one division ring topology is utilized and as a part of another star topology is utilized, associating these topologies will bring about Hybrid Topology (ring topology and star topology).

TASK 3. Evaluate the type of topology used in LAN and WAN

Ans. WAN TOPOLOGIES:

It is a system relating geological specific areas, which be allowed or not be allowed to the equivalent system. This topologies are need the two Local area network combine business-broad topologies construction section, but to compute a lot of complication by cause of length they necessity to envelope, the total largest customers they distribute, and the big rush they regularly hold.

Point to point:

Point-to-point networks see WAN sites connected by high-capacity network cabling known as backbone. The sites are connected as if in a line, with each site (other than the ones at the ends of the line) only linked to the sites directly before and after it. This is a simple topology to implement, and provides cost benefits in that it requires minimal cabling. However, it leaves networks vulnerable to failure, as a single fault on the backbone can bring whole sections of the network down.

WAN end to end topology perfect choice being institution with low number of areas and the capacity to usage committed routes ,i.e. constantly accessible carrier between double connection marks that are rent out from telecommunications worker , that like as an ISP.

Page 10: 2 network

RING:

The ring topology is the same as the point-to-point topology, except the sites at the end of the backbone are connected to each other as well. This makes ring topology WANs less vulnerable to failure, as traffic can be routed the opposite way around the ring if a fault is detected on the network. However, adding new sites to ring topology WANs requires additional work and cost when compared to point-to-point setups, as each new site requires two connections instead of one.

Page 11: 2 network

STAR:

The star topology sees all sites connected to a central hub, a little like the spokes of a wheel. WAN hubs use a technology known as a concentrator router to ensure data is sent to the right destination. This topology allows for sites to be added to the network easily – an important consideration for business WANs – and is not vulnerable to a single cable failure bringing down the whole network. However, it is entirely dependent on the concentrator router to be able to run.

MESH:

Like an endeavour wide work, a cross segment WAN topology joins various direct interconnected centres - for this circumstance, geographical locations. Since every site is interconnected, data can travel clearly from its origin to its destination. If one affiliation perseveres through an issue, switches can occupy data easily and quickly. Cross section WANs are the most accuse tolerant kind of WAN plan for the grounds that they give different courses to data to take after between any two core interests.

One weakness to a cross segment WAN is the cost; partner every centre on a framework to each diverse includes leasing a broad number of gave circuits. With greater .To decrease costs, you may realize a fragmented cross area, in which essential WAN centre points are clearly interconnected and assistant centres are related through star or ring topologies. Fragmented cross area WANs are more sensible, and thusly more typical in today's business world, than full-work WANs.

Page 12: 2 network

TIERED:

A tiered WAN sees many smaller star-type WANs linked together by concentrator routers. This provides the scalability benefits of the star WAN while reducing the network's dependency on individual pieces of network hardware. If one of the routers fails, traffic can be rerouted to avoid the affected area. Some tiered networks also include direct links between sites, known as meshing. The principle downside to tiered and meshed networks is complexity – they can involve a lot of links and require a lot of management.

Page 13: 2 network

LAN topologies:

Four different type of topologies

Star Ring Bus Tree

STAR:

Total stations are similitude by connection to a fundamental issue, generally speaking a wiring focus point or other device working in a relative limit. A couple of particular connection sorts can be used for this point-to-point association, for instance, ensured wound pair (STP), unshielded bended pair (UTP), and fibre-optic cabling. Remote media can in like manner be used for exchanges joins.

The benefit of the star topology is that no connection piece is a lone motivation behind disillusionment influencing the entire framework. This looks into better organization of

Page 14: 2 network

the LAN. In case one of the connections develops an issue, only that LAN-joined station is impacted; each and every other station stay operational. The damage of a star (focus point and-talked) topology is the central focus point device. This central focus point is a lone reason for frustration in that if it fails, each joined station is out of organization. These central focus focuses, or concentrators, have changed consistently. Today, it is ordinary to send focuses with certain reiteration. Such overabundance is planned to separate an inadequate or failed section, for instance, power supply.

Ring topology:

Not in the least like the star (focus point and-talked) topology, a ring topology has no end centers. The repeater for this circumstance is a component of the LAN-joined station's framework interface card (NIC). Since each NIC in a LAN-annexed station is a repeater, each LAN station will reiterate any sign that is on the framework, paying little regard to whether it is headed for that particular station. If a LAN-joined station's NIC fails to perform this repeater work, the entire framework could dive. The NIC controller is prepared for seeing and dealing with the flawed repeater and can pull itself off the ring, allowing the ring to offset and continue working. Token Ring (IEEE 802.5) best addresses a ring topology. Notwithstanding the way that the physical cabling is thought to be a star topology, Token Ring is a ring in predictable topology, as appeared by the going with figures. Yet physical topology is a physical layer trademark, the media access methodology used at the data association layer chooses the sensible topology. Token Ring portrays a rational ring and debate, as Ethernet describes a steady transport. Despite when affixed to an inside, when one Ethernet contraption transmits, everyone hears the transmission, basically pretty much as on a vehicle.

Page 15: 2 network

Bus topology:

Now and again implied as straight transport topology, Bus is an essential layout that uses a singular length of connection, generally called the medium, with particularly joined LAN stations. All stations share this connection section. Every station on this segment sees transmissions from one another station on the connection partition; this is known as a broadcast medium. The LAN association stations are sure endpoints to the connection section and are known as transport framework end centres. This single connection section fits being a lone reason for dissatisfaction. If the connection is broken, no LAN station will have accessibility or the ability to transmit and get. This single connection section fits being a lone motivation behind frustration. If the connection is broken, no LAN station will have accessibility or the ability to transmit and get.

Tree topology:

Page 16: 2 network

The tree topology is a sensible expansion of the vehicle topology and could be depicted as different interconnected transport frameworks. The physical (connection) plant is known as an extending tree with all stations associated with it. The tree begins at the root, the peak point, and reaches out to the framework endpoints. This topology allows a framework to expand logically with one and just element data route between any two framework endpoints. A tree topology framework is one that does not use hovers in its topology. An example of a tree topology framework is a traversed or traded framework running the spreading over tree estimation, ordinarily found with Ethernet frameworks. The intersection tree estimation cripples hovers in what may somehow be an orbited topology. Navigating tree reaches out through the framework and certifications that emerge dynamic path exists between any two LAN-associated stations

Task 4 Using diagrams provide details of each layers and their functionality in relevant model and compare OSI Reference Model with TCP/IP Model.

ANS. OSI MODEL LAYERS

International Standards Organization/Open System Interconnection (ISO/OSI) model is a standard reference model for correspondence between two end clients in a system. It can be useful to have an essential comprehension of how your system functions with a specific end goal to investigate future issues.

The layers are in two gatherings. The upper four layers are utilized at whatever point a message goes from or to a client. The lower three layers are utilized when any message goes through the host PC. Messages expected for this PC go to the upper layers.

Page 17: 2 network

Messages bound for some other host are not left behind to the upper layers but rather are sent to another host.

OSI Layers

Layer 1-Physical Layer:

 This layer transmits bits from one computer to another and regulates the transmission of a stream of bits over a physical medium. This layer defines how the cable is attached to the network adapter and what transmission technique is used to send data over the cable..

Layer 2-Data Link Layer:

 This layer package raw bit from the Physical layer into frames (logical, structures packets for data). It is responsible for transferring frames from one computer to another, without errors. After sending a frame, it waits for an acknowledgment from the receiving computer.

Layer 3-Network Layer:

This layer handles the routing of the data, addresses messages and translates logical addresses and names into physical addresses. It also determines the route from the source to the destination computer and manages traffic problems (flow control), such as switching, routing, and controlling the congestion of data packets.

Layer 4-Transport Layer:

Page 18: 2 network

This layer handles error recognition and recovery, manages the end-to-end control (for example, determining whether all packets have arrived) and error-checking. It ensures complete data transfer.

Layer 5-Session Layer:

This layer allows applications on different computers to establish, use, and end a session/connection. This layer establishes dialog control between the two computers in a session, regulating which side transmits, and when and how long it transmits.

Layer 6-Presentation Layer:

This is a layer, usually part of an operating system, that converts incoming and outgoing data from one presentation format to another (for example, from a text stream into a popup window with the newly arrived text). This layer also manages security issues by providing services such as data encryption and compression. It’s sometimes called the syntax layer.

Layer 7-Application Layer:

 This is the layer at which communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. (This layer is not the application itself, although some applications may perform application layer functions). It represents the services that directly support applications such as software for file transfers, database access, email, and network games.

Page 19: 2 network

Comparison between OSI and TCP/IP models

OSI(Open System Interconnection) TCP/IP(Transmission Control Protocol / Internet Protocol)

1. OSI provides layer functioning and also defines functions of all the layers.

1. TCP/IP model is more based on protocols and protocols are not flexible with other layers.

2. In OSI model the transport layer guarantees the delivery of packets

2.  In TCP/IP model the transport layer does not guarantees delivery of packets.

3. Follows horizontal approach 3. Follows vertical approach.

4. OSI model has a separate presentation layer

4. TCP/IP does not have a separate presentation layer

5. OSI is a general model. 5. TCP/IP model can't be utilized as a part of whatever other application.

6. Network layer of OSI model provide both connection oriented and connectionless service.

6.  The Network layer in TCP/IP model provides connectionless service.

7. OSI model has an issue of fitting the conventions in the model

7. TCP/IP model does not fit any convention

8.  Protocols are hidden in OSI model and are easily replaced as the technology changes.

8. In TCP/IP replacing protocol is not easy

9. OSI model defines services, interfaces and protocols very clearly and makes clear distinction between them.

9. In TCP/IP it is not clearly separated its services, interfaces and protocols.

10. It has 7 layers 10. It has 4 layers

Page 20: 2 network

Task 5. Define and compare the functions of networking devices –

a) Switchesb) Routersc) Gateways d) Repeaters

ANS. Network devices are parts used to unite PCs or other electronic gadgets together with the goal that they can share records or assets like printers or fax machines.

Switches

A switch is a keen gadget that works in the information connection layer. The term astute alludes to the choice making limit of the Switch. Since it works in the Data connection layer, it has information of the MAC locations of the ports in the system.

Consequently, the information must be sent from Computer A to Computer B, then, the information is exchanged to the Computer B just, and not to some other PCs joined on the system. Henceforth, it sets up a connection between the sender and the beneficiary in light of the MAC addresses.

It is likewise to be noticed that a switch is a protected gadget, in light of the fact that it sends data just to the craved destinations, furthermore certain security components, for example, firewalls can be actualized in the Switches.

Routers

Page 21: 2 network

Any PC can be joined with the web through MODEM, which performs the MODulation and the DEModulation operations. Be that as it may, when there are more than one PC at home or in an association, and you have a solitary web association, you require a Router. Switch is a gadget which is utilized when various gadgets need to join with the Internet utilizing the same IP.

Any Internet Service Provider (ISP) gives a solitary IP, and particularly for individual utilize, the IP location is alloted progressively. This is done on the grounds that, assume, an ISP has 1000 IP addresses, it doesn't imply that it has 1000 clients. An ISP accept that not all gadgets will be associated with the web in the meantime. Subsequently, when a client needs to get to the web, any IP address from the pool of IP locations from the ISP will be relegated to unite the client to the web.

• Gateways

The Gateway gadgets work in the Transport layer or more, where the diverse system advances are executed. An entryway is important when there are diverse advances actualized by the distinctive LAN's which are to be associated together.

In the more regular illustration, we utilize a phone system and web systems, which deals with diverse advancements. The phone system takes after the ISDN, and the Internet takes after the IP. Here, two unique advancements are being utilized. For this situation, the switch neglects to work, subsequent to the switch can't comprehend the functionalities of both the systems. Consequently, we require a Gateway, which goes about as an interpreter in conveying between the two systems.

• Repeaters

A repeater is a gadget like the Hub, however has extra components. It additionally works in the Physical. The repeaters are utilized as a part of spots where intensification of data sign is essential. In any case, the sort of enhancement done by the repeater is unique in relation to the consistent intensification by speakers.

The standard intensifies everything sustained into it. That implies, if the info sign has commotion actuated into it, both the craved flag and clam or sign are as one opened up. Be that as it may, on account of a repeater, it recovers the data flag, and opens up just the attractive sign. Thus, the clam or segment of the sign is dispensed with.

• WAPs(Wireless access point)

In PC organizing, a remote access point (AP) is a gadget that permits remote or related gauges. The AP more often than not join with a switch (by means of a wired system) as a standalone gadget, yet it can likewise be an indispensable segment of the switch itself. An AP is separated from a hotspot, which is the physical space where the remote administration is given.

Page 22: 2 network

Recommended