Anda di halaman 1dari 56

Individual Assignment

Hardware Software System and Network

PT1182214

INDIVIDUAL ASSIGNMENT
PANIPAT CE00382-2-HSSN-2 HARDWARE SOFTWARE SYSTEMS AND NETWORKS 2 PT1182214 HAND OUT DATE: 10th February 2014 HAND IN DATE: 7th April 2014 WEIGHTAGE: 30% INSTRUCTION TO CANDIDATES:
1. The students are advised to underpin their answers with the use of references. 2. Late submission will be awarded Zero (0) unless EC are upheld. 3. Cases of Plagiarism will be penalized. 4. The assignment should be submitted in both hardcopy and softcopy: a. The hardcopy of the assignment should be bound in appropriate style b. The softcopy of the written assignment and source code where appropriate should be on a CD in an envelope/CD cover and attached to the hardcopy.

Page 1

Individual Assignment

Hardware Software System and Network

PT1182214

Module Code and Name Lecturer Submission Requirement Hand Out Date Hand In Date

: CE00382-2 Hardware, Software, Systems and Networks II : Pardeep Kumar : Hardcopy and Softcopy : 10th February 2014 : 7th April 2014

Assignment Learning Outcomes No Learning Outcomes 1. Explain the operation of current LAN & WAN standards, and explain and apply TCP/IP and associated protocols and applications. Assignment Overview ICT Resources India Public Limited Company has hired you as a network consultant. This company is the only supplier of business equipment and office supplies in North India. The lack of competition has caused the owners not to make major investments into the business. A nationally recognized competitor recently opened for business with plans to put ICT Resources out of business. In response to this, the owners of ICT Resources have decided to reinvest substantial sum of money in the company. ICT Resources locally own a 3 storey building and currently have already grown to a level where they now have resources of 30 staff and this figure is still growing. They have developed and spread their business to 3 strategic locations throughout North India with more upcoming offices in other locations planned for 2015. These new offices will incorporate the retail concept coupled with local sales offices. ICT Resources decide to set up office with approximately 35 to 40 employees. The goal is to determine the type of network topology they will need within the office. Consider the types of computer and number of printers, audio devices, microphones, LCD projectors, and multifunction peripherals are needed. Before they invest money in the local area network, the owner wants to know more about networks and internet connection. As the network consultant, write a brief report about the advantages and disadvantages of having a network. What type of network is best suited for the company a peer-to-peer network or a client/server network? What transmission media should the company use? Why? What types of problems should be expect with a network? Use internet, book or any other related material as reference to answer the owners requirement. You are strongly encouraged to produce your own design, diagrams and/or figures in support of the area of research. However, if the information is extracted from external sources, please ensure that proper referencing is provided.

Page 2

Individual Assignment

Hardware Software System and Network

PT1182214

Guidelines for the Report Document your research findings in a professional and systematic manner, in the form of a computerized report. Your report should not exceed 3500 words. Your documentation should include the following: 1. Assessment criteria (please include the table provided below in your assignment after your cover page) 2. Table of contents 3. Gantt chart 4. Introduction 5. Description of the network/ protocol/device/technology 6. IP address classification of organization 7. Core components of the protocol/device/technology and how it works 8. Strengths of the protocol/device/technology 9. Weaknesses of the protocol/device/technology 10. Relationship between the selected protocol/device/technology and network management. 11. Conclusion (your personal input and should not be referenced from any source) 12. References (use Harvard referencing) 13. Appendix (please include documentation of your final product)

Assessment Criteria Research and Investigation Documentation Presentation Critical Analysis Citation and Referencing Product TOTAL 20 % 15 % 15 % 20 % 10 % 20 % 100 %

Page 3

Individual Assignment

Hardware Software System and Network

PT1182214

Marking Criteria Distinction (70% +) Thorough and in-depth research and investigation supported by evidence. Excellent level of knowledge and understanding reflected in discussion. Contents of documentation well organized and presented in a professional manner. Discussion has good flow. Confident and able to address most questions posed during presentation. Good analysis of research area conducted. Referenced materials well cited and references documented. Effective and fully functional final product to support area of research. Credit (60 69%) Minor gaps in research and investigation conducted. Good level of knowledge and understanding reflected in discussion. Documentation Contents of documentation organized and presented in a professional manner with some minor issues. Sometimes lacking confidence but able to address most questions posed during presentation. Some analysis of research area conducted. Citation and references are available in documentation but with minor issue. Final product has some relationship to the area of research and/or most features of the final product functional with some minor issues. Major gaps in research and investigation conducted. Satisfactory level of knowledge and understanding reflected in discussion. Contents of documentation disorganized and/or not presented in a professional manner. Lacks confidence and unable to address most questions posed during presentation. Minimal analysis of research area conducted. Citation and references are available in documentation but with major issues. Most areas of final product not related to the research and functionality of the product is limited. Demonstrate poor understanding of the problem. No linkage between research and investigation. Poor analysis of research area or analysis is absent. Citation and references are not available in documentation. Final product not related to the area of research or final product not documented.

Pass (40 59%)

Fail (0 39%)

Page 4

Individual Assignment

Hardware Software System and Network

PT1182214

Hardware and Software System and Networks II CE00382-2 Individual Assignment-6th Semester

Network Proposal for ICT Resources India Public Limited Company

HAND IN DATE: - 10th FEBRUARY, 2014 HAND OUT DATE: - 7th APRIL, 2014

SUBMITTED BY: Aakash Bathla (PT1182214) Computing (Level-2)

SUBMITTED TO:Mr. Pardeep Kumar (SUPERVISOR)

Page 5

Individual Assignment

Hardware Software System and Network

PT1182214

CERTIFICATION

This is to certify that Mr. Aakash Bathla of 6th semester Pursuing B.E (Hons.) Degree from A.P.I.I.T SD INDIA has successfully completed the individual project in Hardware, Software, System and Networks module under the guidance of Lecturer Mr. Pradeep Kumar within the stipulated Time Period.

Aakash Bathla PT1182214

Module Lecturer(Mr. Pradeep Kumar) _____________________________

Page 6

Individual Assignment

Hardware Software System and Network

PT1182214

Acknowledgement

First of all I would like to present my sincere gratitude to APIIT granting me such valuable opportunity to making this assignment.

Second of all I would like to thanks my Module Lecturer Mr. Pradeep Kumar for giving me this opportunity to work on this assignment and without those valuable support this assignment would not have been a success.

I would also like to thanks lab supervisors who gave me a helping hand wherever necessary.

Last but not the least I am obliged to thanks my friend colleagues who provided me support and help wherever required.

Thank You Aakash Bathla PT1182214

Page 7

Individual Assignment

Hardware Software System and Network

PT1182214

Abstract:

Major Part of the world is in the hands of technology. Like the telephone and the television, the network and data communication has performs an important role in restructuring our daily lives. Most people can hardly remember a time where the network and data communication was not available.

The Internet is not just a network; It is a whole community in and out of itself. It is a revolution that change d our society, our lives and our entire world. What other thing can we invariably say has completely connected everyone in the world.

I had to choose the best network design because the system has to be accurate and the management expects to see a great difference after the implementation.

The main aim of assignment is to suggest a effective and efficient network for ICT resources India Public Limited Company, Which is one of the supplier of business equipment and office supplies of its kind in North India. This network proposal includes the details about the network that is suitable for the ICT and the advantage and disadvantage of it. It also includes the network topologies, Transmission media, Protocols, Network Devices, Architecture Technologies, Possible Problems and the future enhancements in the network of ICT.

Page 8

Individual Assignment

Hardware Software System and Network

PT1182214

Table of Content

Page 9

Individual Assignment

Hardware Software System and Network

PT1182214

Gantt Chart
Feb 2014 Mar 2014 Apr 2014

ID

Task Name

Start

Finish

Duration
17 18 19 20 21 22 23 24 25 26 27 28 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 1 2 3 4 5 6 7 8 9

1 Assumption

17-02-2014 19-02-2014

3d

2 Gantt Chart

20-02-2014 21-02-2014

2d

3 Research and Analysis

24-02-2014 07-03-2014

10d

4 Requirement Identification

24-02-2014 26-02-2014

3d

5 Requirement Gathering

27-02-2014 03-03-2014

3d

6 Requirement Analysis

04-03-2014 05-03-2014

2d

7 Requirement Specification

06-03-2014 07-03-2014

2d

8 Design

10-03-2014 21-03-2014

10d

9 LAN1

10-03-2014 12-03-2014

3d

10 LAN2

13-03-2014 14-03-2014

2d

11 LAN3

17-03-2014 19-03-2014

3d

12 WAN

20-03-2014 21-03-2014

2d

13 Documentation

24-03-2014 04-04-2014

10d

14 Introduction

24-03-2014 24-03-2014

1d

15

Description of topology/device/ 25-03-2014 26-03-2014 network/technology IP address classification of organisation 27-03-2014 28-03-2014

2d

16

2d

Core Components of the 17 protocol/device/technology and 31-03-2014 31-03-2014 how it works 18 Strengths of Protocol/device/ technology Weakness of Protocol/device/ technology Relationship between the selected protocol/device/ technology and network management 01-04-2014 01-04-2014

1d

1d

19

02-04-2014 02-04-2014

1d

20

03-04-2014 04-04-2014

2d

21 Future Scope

07-04-2014 07-04-2014

1d

22 Conclusion

07-04-2014 07-04-2014

1d

23 Referencing and Citation

07-04-2014 07-04-2014

1d

Page 10

Individual Assignment

Hardware Software System and Network

PT1182214

Introduction Preface:
ICT Resources India Public Limited Company has hired me as a network consultant. The company is only supplier of business equipment and office supplies of in North India.

The major purpose was to develop a computer LAN and WAN network for ICT Resources India where the company consisting of three story building and four other strategic locations.

The lack of competition has caused the owners not to make major investments into the business. A nationally recognized competitor recently opened for business with plans to put ICT Resources out of business. In response to this, the owners of ICT Resources have decided to reinvest substantial sum of money in the company.
After completing network design I came upon a fully functional computer network for ICT Resources. As far as I concerns, this system will be error free and will be a big support for the development of the ICT Resources India.

I have properly planned an efficient network that will bring a wide range of Advantages to your company

Objectives: To provide an efficient and effective network for ICT Network. Identify the advantages and disadvantages of Networks. Understanding the type transmission media. Understanding different type of topology Identify and provide suitable network topology and transmission media for ICT resources. Identify and propose of LAN and WAN network connections.

Page 11

Individual Assignment

Hardware Software System and Network

PT1182214

Analyzing the layout of the ICT


ICT Resources locally own a 3 storey building and currently have already grown to a level where they now have resources of 30 staff and this figure is still growing. They have developed and spread their business to 3 strategic locations throughout North India with more upcoming offices in other locations planned for 2015. These new offices will incorporate the retail concept coupled with local sales offices. ICT Resources decide to set up office with approximately 35 to 40 employees. The goal is to determine the type of network topology they will need within the office. Consider the types of computer and number of printers, audio devices, microphones, LCD projectors, and multifunction peripherals are needed. Before they invest money in the local area network, the owner wants to know more about networks and internet connection.

Assumptions: Now there is no internet facility for all the employees in ICT expect the location head. In the main office there are 3 departments, production departments, account departments and administrative departments. Presently there is no local network inside the office. The number of employees in each departments is as, 5 in accounts, 5 in administrator, 18 in production and 2 as network administrators. Each employee has each computer and computer have sound device and microphone. Each department consist of one printer, production department consist of LCD projectors and one security cameras.

Page 12

Individual Assignment

Hardware Software System and Network

PT1182214

Proposed System: This is the proposed network diagram for the ICT Resources India. It is a 3 story building with three main departments divide among the floors as they are described in figure(1,2 and 3). This diagram shows how all these departments are connected to the LAN Through backbone and for connecting to 4 other location I have used VPN network which will act as WAN. As I above said these local area networks established in 4 different geographical areas, are connected together through a private network path and is considered to be as a Single local area network because of the VPN. This virtual path is not accessible by any other unauthorized clients and users and will only be valid for the users that belong to a particular domain. Here two fixed IPs will be assigned for the two ends of the VPN tunnel and all the data transfer will be done through those IPs. Also router at both ends will perform IPs filtering mechanisms to prevent unauthorized access to the network.

Page 13

Individual Assignment

Hardware Software System and Network

PT1182214

Page 14

Individual Assignment

Hardware Software System and Network

PT1182214

Second Floor (Server Room and Director Room)

File Server

Web Server

Email Server

Other Staff Router

Other Staff

Network Manager Database Manager Database Server Internet Proxy Server

Administrative Server and Director room

The server room is located in the top floor and this is the place where the backbone initiates. Fiber optic cables are used for connecting switches to router the server room and an administrator computer is reserved for IP configurations. Optical fiber has been used transmission medium because of the higher data transmission rate.

Page 15

Individual Assignment

Hardware Software System and Network

PT1182214

Ground Floor (Advertisement Department)

This Cable connects to the server room By the backbone

Users

Users

Users

Swiitch(24 Port)

Printer

Users

Users

Reception

Admin
Except the server room there are other sections located in the Ground floor. Here they are Finance Admin, Cashier, Attendance count and Reception. Following network diagram shows how the first floor is architected in the network.

Page 16

Individual Assignment

Hardware Software System and Network

PT1182214

First Floor (Sales and Department)


This Cable connects to the server room By the backbone

Users

Users

Users

Swiitch(24 Port)

Printer

Users

Users

User

User

Above is the network diagram designed for the First floor for the company? As assumed First floor is consist of the sales and development department. I have assigned 15 computers for the First floor and all are connected to a switch via star topology which connects to the main router. Also there is a printer (All in one) connected to switch to enable all the computers to use them.
.

Page 17

Individual Assignment

Hardware Software System and Network

PT1182214

Description of Network
What is a network?
A computer networks is simply two or more systems connected together so they can change information.

A network uses a combination of hardware and software to send data from one location to another. Networks consist of the computers, wiring, and other devices, such as hubs, switches and routers that make up the network infrastructure. Some devices, such as network interface cards, serve as the computers connection to the network. Devices such as switches and routers provide traffic- control strategies for the network. All sorts of different technologies can actually be employed to move data from one place to another, including wires, radio waves, and even microwave technology. [All networks, whether big or small, are typically created so that users on the network can share resources and communicate. The list that follows breaks down some of the reasons for networking computers: File sharing: Networking computers makes it very easy for the users on the network to share application files Hardware sharing: Users can share devices such as printers, CD-ROM drives, and hard drives.

Page 18

Individual Assignment

Hardware Software System and Network

PT1182214

Program sharing: Applications such as spreadsheets and word processors can be run over the network. User communication: Network allows users to take advantage of communication media such as electronic mail, newsgroups, and video conferencing.] Internet is also used for the communication. Internet is a global network connecting millions of computers or we can say that internet is the networks of network. More than 100 countries are linked into exchanges of data, news and opinions.

Network Advantage
Information Sharing: The main advantage of network is information sharing. A large number of users belonging to same area or same organization but spread over at different places can communicate and share useful files, software and information at right times via network of computers. Speed: Sharing and transferring of data occurring in a network is rapid. So we can send the data of larger size like high resolution photographs over the network. Flexible Access: Computer network allows accessing the file in a flexible manner. Security: Network is also allows establishing security by ensuring that the network users may only have access to certain files and applications. Sensitive files and data in the network are password protected to avoid the illegal coping of data. Work Group Computing: Work group software such as Microsoft back office allows concurrent access of files and data. Centralized Software Management: Files can be stored on a central computer (the file server) allowing data to be shared throughout the entire network Cost: Individual license copy of many software may be costly. Shared programs on the network allows easy up gradation of file server rather than the individual work stations. Resource sharing: Network allows to share the resources like printer, scanner, fax machines modems. Back up Facility: Files can be backed up more easily when they are all on a central File server rather than when they are scattered across a number of independent workstations.

Page 19

Individual Assignment

Hardware Software System and Network

PT1182214

Network Disadvantage
Loss of data and resources: Network failure and device failure will shut the entire network it causes loss data. Network faults cause loss of resources. If the network stops operating then it may not be possible to access to various computers. Difficult to manage: Network set up is very costly because of hardware and software. Network set up take a lot of time to complete. The larger the network becomes difficult to manage. Location of resources: Resources could not be located too far from users. If resources are too far it take to much time to share the resources like printer .it will negatively affect the access flexibility. Storage space and Bandwidth: Users may use too much bandwidth - for example when listening to music files or watching video clips - preventing others from using the network facilities properly .Usage of larger storage may cause problems on the network.

Categories of Network
LAN (Local Area Network) WAN(Wide Area Network) MAN( Metropolitan Area Network) LAN (Local Area Network): Local area networks are designed to allow resources to be shared

between personal computers or workstations. The resources to be shared can include hardware, software or data .The best example of LAN is found in business organizations. One of the computers may be given a large capacity disc which acts as a server to clients. Softwares are installed into central server and is used by the whole network group .The most common LAN topologies are bus, ring, and star. Currently LAN size is limited to few kilometers. Generally, LAN is using one type of transmission medium. In my project I have designed a LAN network to connect the entire building by using star topology for ICT Resources India private limited

Page 20

Individual Assignment

Hardware Software System and Network

PT1182214

. WAN (Wide Area Network): Wide area network provides long distance transmission of data ,image audios and video information over large geographic aera.WAN can be simple like dial up lines connect to the individual pc and internet .It can be complex also like backbones that connect the internet. We normally refers two types WAN switched WAN connects to the end systems and the point to point WAN connects home computer to an internet service provider. In this Project I have designed a WAN connection by adding LAN of this company and 3 other Location.

Page 21

Individual Assignment

Hardware Software System and Network

PT1182214

MAN (Metropolitan Area Network): A metropolitan area network is a network with a size between a LAN and a WAN. It normally covers the area inside a town or a city .A best example of a MAN is the part of telephone network that can provide a high-speed DSL line to the customer .MAN provides high speed connectivity, normally to the internet. It provides the internet connectivity for LAN in a metropolitan network.

VPN (Virtual Private Network)


A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost.

Page 22

Individual Assignment

Hardware Software System and Network

PT1182214

Advantages: Cost saving: eliminating the need for expensive long-distance leased lines. VPN reduces long - distance telephone charge .It offers offloading of support cost Flexibility and Reliability: VPN is improving the reliability of data services of company. Better Performance: Owing to the fact that more high capacity data service options can be used, the bandwidth and efficiency of the network generally increases after a VPN solution is installed. Improved Security: The use of encryption protocols and authentication helps secure the data that is traveling over the VPN channel. Disadvantages of VPN VPNs require an in-depth understanding of public network security issues and proper deployment of precautions. The availability and performance of an organization's wide-area VPN (over the Internet in particular) depends on factors largely outside of their control.

Page 23

Individual Assignment

Hardware Software System and Network

PT1182214

Network Topology Network topology refers to the Structure or design of the connected devices. Network topologies can be physical or logical. Physical Topology means the physical design of a network including the devices, location and cable installation. Logical Topology refers to the fact that how data actually transfers in a network as opposed to its design.

Mesh topology
In mesh topology every device has a dedicated point to point connection with every other device. The term dedicated means that link carries traffic only between the two devices it connects. In mesh topology needs n(n-1)/2 duplex mode links ,n is the no of nodes.

Advantage Use of large no of links reduces network traffic. A mesh topology is robust in nature .if one link becomes unusable it does not disable the entire system. It offers privacy and security

Disadvantage Use of large number of cables makes the network very much expensive Interconnection of devices leads to difficulty in installation and

reconfiguration of devices. Hardware required to connect each link can make it more expensive to implement.

Page 24

Individual Assignment

Hardware Software System and Network

PT1182214

Star topology
In a star topology each device has a dedicated point to point connection with only device usually known as a hub. In a star topology devices are not directly linked to one another. Unlike mesh topology it does not allow direct traffic between the devices. The controller act as an exchange between the two devices.

Advantage A network star is very easy to manage because of its simplicity in

Disadvantage Dependency of all topology on a single point called hub. If the hub goes down then the whole system will be dead. The cost of the hub make the network more expensive.

functionality. Easy to install and reconfigure it, each device needs only one link and one input-output port. Robust it nature, failure of one system doesnt affect the whole network

Page 25

Individual Assignment

Hardware Software System and Network

PT1182214

Bus topology
A bus uses multipoint connection instead of point to point-to-point connection. Tap in a bus topology one cable acts as a backbone and nodes are connected in a bus topology through drop lines tap. A drop line is a connection running between the device and the main cable.

Advantage A Bus topology is easier to install. Less expensive than star and mesh because less cables are required, Less redundancy of cables

Disadvantage Difficulty in reconnection and fault isolation Signal reflection at the taps can count degradation and quality breaks in the bus cable stops all transmission.

Page 26

Individual Assignment

Hardware Software System and Network

PT1182214

Ring topology
In a ring topology each device has a dedicated point to point link with one two device on either side of each. Signal is passed along the ring in one direction from one device to another device until it reaches a destination. Each device in a ring topology uses a repeater.

Advantage A ring is relatively easy to install and It uses unidirectional traffic. A break in the reconfigure it, ring can stop all transmissions. In a ring topology each device linked only its intermediate neighbors. For addition and removal we need to change only two connections.

Disadvantage One malfunctioning workstation can throw away the entire network. . It is slower than an Ethernet network.

Page 27

Individual Assignment

Hardware Software System and Network

PT1182214

Tree topology
A tree is a variation of star topology. Nodes in a tree are linked to standard controller known as hub which directly controls the traffic of the network. However not every device are directly connected to the central hub. Majority of the devices are connected to the secondary hub.

Advantage It provides point to point connectivity with the primary and the secondary hub. It provides an easy exchange

Disadvantage If the back bone line breaks the entire segment will go down.

Topologies play an important role in the network design. A best network can be design if you have the good knowledge of these topologies. A miss configured network can result in a waste of time and energy. So the basic understanding of the network topologies and network devices is a must to build a good network. Different types of Network Topologies available are but here I have mainly described only star topology and fiber optic that is going to use in our network

Page 28

Individual Assignment

Hardware Software System and Network

PT1182214

Topology used and reasons for the choice:


Mainly I have used Star topology in designing the network for the ICT Resources INDIA. Also this is the most popular topology for the cabling. Star Topology: In a Star topology every node is connected to a central controller which may be a hub or a switch and there is communication between the nodes through the controller. This is widest used technology in its simplest form; a star network consists of one central switch, hub or computer.

Here I have considered all the advantages. Performance of this particular topology, some of them are as follows. Easy to install and wire. No disruptions to the network when connecting or removing devices. Easy to detect faults and to remove parts. The cost is comparatively less. Most reliable because a cable failure does not affect other users. Controller to each terminal. And the performance is not as greatly affected. The star topology minimizes the chance of network failure by connecting the entire
computer to a central hub or switch.

Page 29

Individual Assignment

Hardware Software System and Network

PT1182214

JUSTIFICATION FOR THE STAR TOPOLOGY Compared to Star Topology, Ring topology has the following disadvantages. The ring topologys dependent on one cable so the reliability is very low compared to the star topology. (If that one cable fails all the other workstations Will also goes fail. Compared to the star topology if any case of cable failure the ring topology will work in other workstation.. Unlike in star topology, with the ring we have to switch on all the computers in Order to work on computer. So its very inefficient. Compared to Star Topology, Bus topology has the following disadvantages. Like the ring, bus topology is also not reliable because if the main cable (Backbone) fails; a number of computers beyond the failure will be affected. Because of the heavy network traffic in the Bus due to more users, the Performance will slow down. The number of cable length and the number of stations has to be limited. In the Bus its needed to have termination at the end of the cable to stop Reflected signals. So it will result an extra cost. Therefore we have to say that the bus topology is also inefficient in this network. Compared to Star Topology, Mesh topology has the following disadvantages. In order to implement the mesh topology, we have to spend a lot of money. Than what is spent for the Star topology. Each and every computer should be connected with each other that require a lot of cables. That makes results of lots of money. I have to say that star topology is better than the mesh topology for this network. Compared to Star Topology, Tree topology has the following disadvantages. Overall length of every segment is limited by the type of cabling we do. If the backbone line breaks, the entire segment goes down. More difficult to configure and implement wire than other topologies.

Page 30

Individual Assignment

Hardware Software System and Network

PT1182214

Network Architecture Network Architecture, is the logical and structural layout of the network consisting of transmission equipment, software and communication protocols and infrastructure (wired or wireless) transmission of data and connectivity between components. Peer to Peer Network Peer-to peer network is a type of network in which each workstation has equivalent capabilities and responsibilities. Peer-to-peer networks are generally simpler, but they usually do not offer the same performance under heavy loads. In peer to peer network there is no dedicate server. Thus each computer in such a network is part server and part client

Client Server Architecture In client server architecture, a businesss computer network will have a server computer, which function as the backbone of the organization, and a group of client computers, which are commonly called workstations. By using the server we can improve efficiency of client server architecture. Most of the cases the server part of client server having large capacity of storage and also provides high functionality. Client part in the client server architecture are smaller computer having individual responsibilities.

Page 31

Individual Assignment

Hardware Software System and Network

PT1182214

Architecture Client Server

Advantages Centralized Resources Centralized storage of data. Easier to find and backup the data and the files Efficient Client Server Multiple users can use hardware and software Security Central Server Machine can secure all other workstations. Scalability Easy to upgrade resources

Disadvantages If the server goes down, it takes part or the whole network with it. It is more expensive to install. Needs to be

maintained by staff with high IT skills.

Peer to Peer

Reduced
network are

Cost(The
hardware,

Only small

suitable no.

for of

cost involved in such a

computers. No centralized System. Lack of security.

cabling and maintenance)

Well tested Simplicity Connected Using simple and straight forward cabling.

Page 32

Individual Assignment

Hardware Software System and Network

PT1182214

Architecture Used and Reason for choice:


Network Architecture is versatile and flexible in todays fast-changing IT landscape .Types of architecture that is available for use. Client-Server Architecture. Peer-to-Peer Architecture. The network architecture after finding fact and figures that I have selected for the ICT Resources India and the result is Client-Server Architecture. Client Server Architecture: Client/server architecture describes the relationship b/w two computer programs in which, the client means one program, makes a service request from another program server, the server, which fulfills the request. Concerning this organization network will be a server computer, which will functions as the "heart" of the organization. In a client-server environment files are stored on a centralized, high speed file server PC that is made available to client PCs. It includes two types of model that is given below has been used in this project 2-tier of architecture: 3-tier of architecture: More detail about this model takes a look to appendix. Advantages of Client-Server Architecture: Centralization - access, resources, and data security are controlled through the server. Scalability - any element can be upgraded when needed. Without affecting network. Flexibility - new technology can be easily integrated into the system. Interoperability- all components (clients, network, and servers) work together. Accessibility-Server can be accessed remotely and across multiple platforms. Ease of application development Lower total costs than mainframe legacy systems. User Friendly-familiar point and click interface.

Page 33

Individual Assignment

Hardware Software System and Network

PT1182214

Why not peer to peer

It is limited in extensibility, tends to overburden user workstations by having them play the role of server to other users, and is largely unsecured. A peer-to-peer architecture is used there where are a limited number of users which can be a maximum of 10 while in this network there are more than 40 employees. So it is not suitable to use this architecture. Typically unable to provide system-wide services since the typical workstation will run a standard desktop operating system incapable of hosting any major service. Peer-2-Peer architecture is concerned when security is not of a major issue. But in this case security has to be taken care off. In peer to peer architecture there is absence of central administration which can sometimes prove to be fatal. Non-existence of centralized data forces users to take backup of the data themselves.

Page 34

Individual Assignment

Hardware Software System and Network

PT1182214

Transmission Media:
Transmission media is anything that carry signal from source to destination. Best example transmission media is air. It can be metallic cables or fiber optics cable. In telecommunication transmission media is divided in to two broad categories guided media and the unguided media. Guided media provides connection from source to destination by using twisted pain cables , coaxial cables , and fiber optic cables. Unguided media

Twisted Pair Cable


Twisted pair cable consist two conductors having an insulation coating .One of the wire used to carry signal to the receiver, and the other is used only as a ground reference. The receiver uses the difference between the two. There is a chance to inference and cross talk it results in the creation of unwanted signal. Effect of the unwanted signals change according to the arrangement of wires like wires are parallel .If both wires situated at different location then the noise or crosstalk will be more, this results in a difference at the receiver. By twisting the pairs, we can maintain .Twisting makes it possible that both wires are equally affected by external influences .Two types of twisted pair cables are available. Unshielded twisted pair and shielded twisted pair cables.

Page 35

Individual Assignment

Hardware Software System and Network

PT1182214

Coaxial Cable: Unlike twisted pair cables, coaxial cable carries signal having higher frequency. Coaxial cable has a central core conductor of solid or standard wire enclosed in a insulating sheath which is, in turn, encased in an outer conductor of metal foil braid or a combination of the two. The outer metallic wrapping serves both as a shield against noise and as the second conductor, which completes the circuit. Coaxial cables are widely used in analog telephone networks.

Fiber Optic Cable: A fiber optic cable transmits signal in the form of light .These cables are made by glass or plastics. Signal in the fiber optics transmits on the basis of total internal reflection. Fiber optics use reflection to guide light through a channel. A glass or a plastic core is surrounded by a cladding of less dense glass or plastic. The difference in density of two materials must be such that a beam of light moving through the core is reflected off the cladding instead of being refracted to it. Fiber optics is often found in back bone networks.

Page 36

Individual Assignment

Hardware Software System and Network

PT1182214

Comparison between Cables:Characteristics Susceptibility to good interference. Ease of installation Coaxial cable Resistance to interference Easy to install Twisted Pair cable
UTP: very susceptible STP: Good resistance

Fiber Optics Not susceptible to interference Difficult to install

UTP: very easy; often preinstalled STP: moderately easy

Flexibility

Fairly Flexible

UTP: Most Flexible

Less flexible than

STP: Less Flexible coaxial cable than UTP Special Features Electronic Support Components are less expensive than twisted- pair cable. UTP: Same as Telephone wire; often preinstalled in buildings. STP: Supports higher transmission than UTP Transmission rates 4-100mbps UTP: 4-100 mbps STP: 16-500mbps 100mbps or more(>1gbps) rates Supports voice, data, video

Unguided Media: Unguided media is mostly used for distance transmission over the air (ex. Wireless, satellite).

Page 37

Individual Assignment

Hardware Software System and Network

PT1182214

Transmission Media used and Reason for choice: Network Cabling


Cable is the medium through which data usually moves from one network to another. Understanding the characteristics of different types of cable is necessary for the development of a successful network. In cabling of network I have used UTP-5 to connect client to each other to switches and other cabling and fiber optic has been also used to connect as backbone. The following sections discuss the types of cables used in networks and other related topics. Twisted Pair Cable: A twisted pair cable consists of two insulated wires which are twisted around each other to form the twisted pair. Each pair of cable would consist of a wire used for the +ve data signal and a wire for the ve data signal.

Types of Twisted Pair Cable are given below. Unshielded Twisted Pair (UTP): The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices.

Page 38

Individual Assignment

Hardware Software System and Network

PT1182214

Categories of unshielded twisted pair cable: Category Catrgory1 Catrgory2 Catrgory3 Catrgory4 Catrgory5 Catrgory5e Catrgory6 Use Less than 1Mbps 4Mbps 10Mbps 10Mbps 10 Mbps. Ethernet 1000 Mbps. Gigabit Ethernet 1000 Mbps. Gigabit Ethernet

I have used UTP Category 5 cables as the main connecting media between switches and client computers. CAT 5 cables support a bandwidth of 100Mbps. According to the needs of the company, the data transmission rate of UTP cables is more than enough. Because of the above mentioned factors. Advantages of UTP cables: Unshielded Twisted-Pair (UTP) Structured Premise Cabling permits many communication protocols to reside in the same wire bundle. Examples include voice, data, and CCTV video and control. A good UTP system gives better interference rejection than coaxial. UTP is less expensive than dedicated coaxial or fiber optic. UTP is physically smaller than coaxial and many other cable types. UTP is a very easy media to install and reconfigure. UTP is extremely easy to terminate.

Page 39

Individual Assignment

Hardware Software System and Network

PT1182214

Unshielded Twisted Pair connector: The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a plastic connector that looks like a large telephone-style connector. A slot allows the RJ-45 to be inserted only one way. I have used RJ-45 connector to connect the both ends of UTP-5 cable.

Shielded Twisted Pair (STP): A disadvantage of STP is that it is susceptible to radio and electrical frequency interference. The extra shielding can make the cables quite bulky. The shielding is quite bulky and can make installation difficult. The term is often abbreviated to STP.

Coaxial cable: Coaxial cable has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield. The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers.

Page 40

Individual Assignment

Hardware Software System and Network

PT1182214

Disadvantages: coaxial cabling is difficult to install, Does not bend easily and is difficult to install. Cost is much more than UTP cable. Fiber Optic cable: Fiber optic cabling consists of a center glass core surrounded by many layers of protective materials. It transmits light rather than electronic signals eliminating the problem of electrical interference.

Advantages: Ability to transmit signals over much longer distances. Capability to carry information at vastly greater speeds. This capacity brings communication possibilities to include services such as video conferencing. Disadvantages: The cost of fiber optic cabling is very high. It is more difficult to install and modify.

Despite of this figures, I have used Optical fiber to construct the backbone of network. This choice was made because the data transmission rate of optical fiber is very large and also by considering with the other network cables, optical fiber has a very less percentage of data loss. But because of the high prize of optical fiber, I had to limit it only to the backbone of the network.

Page 41

Individual Assignment

Hardware Software System and Network

PT1182214

DISCRIPTION OF DEVICES
ROUTER:
Routers are small physical devices that join multiple networks together. Technically, a router is a Layer 3 gateway device, meaning that it connects two or more networks and that the router operates at the network layer of the OSI model. Routers used in networks perform the following functions: 1. Restrict broadcast to the LAN 2. Act as the default gateway. 3. Move data between networks. 4. Learn and advertise loop free path

BREEDGE:
A network bridge, also known as a layer 2 switch, is a hardware device used to create a connection between two separate computer networks or to divide one network into two. Both networks usually use the same protocol; Ethernet is an example of a protocol. Network devices include, but are not limited to, Personal Computers (PCs), printers, routers, switches and hubs. Devices connected to a network via an Ethernet adapter card have what is known as a Media Access Control (MAC) address, also called a physical or hardware address. It is this address that uniquely identifies a device to a bridge that can then determine to which the network device is connected. The principal function of a network bridge is to forward data based on the MAC address of the sending and receiving devices. This operation helps to eliminate what are known as collision domains.

SWITCH:
A network switch is a small hardware device that joins multiple computers together within one local Area Network(LAN).Technically, network switches operate at layer two (Data Link Layer) of the OSI model. Switch forwards data only to the port that connects to the destination device. It does this by learning the MAC address of the devices attached to it, and then by matching the destination MAC address in the data it receives.

Page 42

Individual Assignment

Hardware Software System and Network

PT1182214

HUB:
Hubs are used in networks that use twisted-pair cabling to connect devices. Hubs can also be joined together to create larger networks. Hubs are simple devices that direct data packets to all devices connected to the hub, regardless of whether the data package is destined for the device. This makes them inefficient devices and can create a performance bottleneck on busy networks. -

WIRELESS ACCESS POINT:


Wireless access points (APs) are a transmitter and receiver (transceiver) device used to create a wireless LAN (WLAN). APs are typically a separate network device with a built-in antenna, transmitter, and adapter. APs use the wireless infrastructure network mode to provide a connection point between WLANs and a wired Ethernet LAN. APs also typically have several ports allowing a way to expand the network to support additional clients.

MODEM:
A modem, short for modulator/demodulator, is a device that converts the digital signals generated by a computer into analog signals that can travel over conventional phone lines. The modem at the receiving end converts the signal back into a format the computer can understand. Modems can be used as a means to connect to an ISP or as a mechanism for dialing up to a LAN.

FIRE WALL
A firewall is a networking device, either hardware or software based, that controls access to your organizations network. This controlled access is designed to protect data and resources from an outside threat. To do this, firewalls are typically placed at entry/exit points of a networkfor example, Placing a firewall between an internal network and the Internet. Once there, it can control access in and out of that point.

Page 43

Individual Assignment

Hardware Software System and Network

PT1182214

Network Devices Used:


Switches: Switch is an intelligent network layer device. It provides dedicated connection and bandwidth between clients on a LAN. It gives any device on the network the full bandwidth instead of sharing the available bandwidth. Each port of a switch will not forward a broadcast packet to some device on the other port. Switch operates in both half duplex and full duplex modes. The full duplex mode is preferred in your network..

Router: A router translates information from one network to another; when the
packets are received by the router, it routes it to the appropriate node in a network. Routers select the shortest path to route a message, based on the destination addressing.

Network Interface Cards: The (NIC) provides the physical connection between the network and the computer workstation. Most NICs are internal, with the card fitting into an expansion slot inside the computer.

Network Interface cards are a main factor in concerning the speed and performance of a network.

Page 44

Individual Assignment

Hardware Software System and Network

PT1182214

Network Cable
To connect together different devices to make up a network, you need cables. Cables are still used in most networks, rather than using only wireless, because they can carry much more data per second, and are more secure (less open to hacking).

Firewall
A firewall is a device, or a piece of software that is placed between your computer and the rest of the network (where the hackers are!) If you wish to protect your whole LAN from hackers out on the Internet, you would place a firewall between the LAN and the Internet connection.

Page 45

Individual Assignment

Hardware Software System and Network

PT1182214

Description of protocols:
Protocol: A protocol is a set of rules that governs the communications between computers on a network. In order for two computers to talk to each other, they must be speaking the same language. Many different types of network protocols and standards are required to ensure that your computer (no matter which operating system, network card, or application you are using) can communicate with another computer located on the next desk or half-way around the world. The OSI Reference Model defines seven layers of networking protocols.

Ethernet (Physical/Data Link Layers) IP/IPX (Network Layer) TCP/SPX (Transport Layer) HTTP, FTP, Telnet, SMTP, and DNS(combined Session/Presentation/Application Layers)

Page 46

Individual Assignment

Hardware Software System and Network

PT1182214

Ethernet (Physical/Data Link Layers)


The physical layer of the network focuses on hardware elements, such as cables, repeaters, and network interface cards. By far the most common protocol used at the physical layer is Ethernet. For example, an Ethernet network (such as 10BaseT or 100BaseTX) specifies the type of cables that can be used; the optimal topology (star vs. bus, etc.), the maximum length of cables, etc. (See the Cabling section for more information on Ethernet standards related to the physical layer). The data link layer of the network addresses the way that data packets are sent from one node to another. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network

IP and IPX (Network Layer)


The network layer is in charge of routing network messages (data) from one computer to another. The common protocols at this layer are IP (which is paired with TCP at the transport layer for Internet network) and IPX (which is paired with SPX at the transport layer for some older Macintosh, Linus, UNIX, Novell and Windows networks). Because of the growth in Internet-based networks, IP/TCP are becoming the leading protocols for most networks. Every network device (such as network interface cards and printers) have a physical address called a MAC (Media Access Control) address. When you purchase a network card, the MAC address is fixed and cannot be changed. Networks using the IP and IPX protocols assign logical addresses (which are made up of the MAC address and the network address) to the devices on the network, This can all become quite complex -- suffice it to say that the network layer takes care of assigning the correct addresses (via IP or IPX) and then uses routers to send the data packets to other networks.

Page 47

Individual Assignment

Hardware Software System and Network

PT1182214

TCP and SPX (Transport Layer)


The transport layer is concerned with efficient and reliable transportation of the data packets from one network to another. In most cases, a document, e-mail message or other piece of information is not sent as one unit. Instead, it is broken into small data packets, each with header information that identifies its correct sequence and document. When the data packets are sent over a network, they may or may not take the same route -- it doesn't matter. At the receiving end, the data packets are re-assembled into the proper order. After all packets are received, a message goes back to the originating network. If a packet does not arrive, a message to "re-send" is sent back to the originating network. TCP, paired with IP, is by far the most popular protocol at the transport level. If the IPX protocol is used at the network layer (on networks such as Novell or Microsoft), then it is paired with SPX at the transport layer.

HTTP, FTP, SMTP and DNS (Session/Presentation/Application Layers)


Several protocols overlap the session, presentation, and application layers of networks. There protocols listed below are a few of the more well-known: DNS - Domain Name System - translates network address (such as IP addresses) into terms understood by humans (such as Domain Names) and vice-versa DHCP - Dynamic Host Configuration Protocol - can automatically assign Internet addresses to computers and users FTP - File Transfer Protocol - a protocol that is used to transfer and manipulate files on the Internet HTTP Hyper Text Transfer Protocol - An Internet-based protocol for sending and receiving web pages. IMAP - Internet Message Access Protocol - A protocol for e-mail messages on the Internet IRC - Internet Relay Chat - a protocol used for Internet chat and other communications POP3 - Post Office protocol Version 3 - a protocol used by e-mail clients to retrieve messages from remote servers SMTP - Simple Mail Transfer Protocol - A protocol for e-mail messages on the Internet .

Page 48

Individual Assignment

Hardware Software System and Network

PT1182214

TCP/IP protocol

The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered and error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP.

Page 49

Individual Assignment

Hardware Software System and Network

PT1182214

Network Protocols Used for ICT India public limited


TCP/IP Protocol or Internet Protocol
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). Main functions of TCP/IP protocol are described below. Addressing/Multiplexing: The main function of TCP protocol is multiplexing the data received from various process .This help to send the data on the network layer. Connection establishment, management and termination: TCP provides set of procedures that devices follow to negotiate and establish TCP connection over which data can travel. Data handling and packaging: TCP defines a mechanism by which applications are able to send data from it to higher levels Routing / Indirect Delivery When source and final destination are situated so far away means both are not attached directly. In these case datagram can send indirectly Fragmentation and Reassembly However, the maximum frame size of each physical/data-link network using IP may be different. For this reason, IP includes the ability to fragment IP datagrams into pieces so they can each be carried on the local network. TCP/IP is better because it is pear to pear networking we have to go through Several protocols in OSI model there are many others for TCP/IP to e better.

Page 50

Individual Assignment

Hardware Software System and Network

PT1182214

Description of Network Technologies: WAN Technologies:


A Wide Area Network ( WAN) is a computer network covering multiple distance areas, which may spread across the entire world. WANs often connect multiple smaller networks, such as local area networks (LANs) or metro area networks (MANs). The world's most popular WAN is the Internet. Some segments of the Internet are also WANs in themselves. The key difference between WAN and LAN technologies is scalability. C WAN must be able to grow as needed to cover multiple cities, even countries and continents. A set of switches and routers are interconnected to form a Wide Area Network. The switches can be connected in different topologies such as full mesh and half mesh. A wide area network may be privately owned or rented from a service provider, but the term usually connotes the inclusion of public (shared user) networks. Both packet switching and circuit switching technologies are used in the WAN. Packet switching allows users to share common carrier resources so that the carrier can make more efficient use of its infrastructure. In a packet switching setup, networks have connections into the carrier's network, and many customers share the carrier's network. The carrier can then create virtual circuits between customers' sites by which packets of data are delivered from one to the other through the network. Circuit Switching allows data connections to be established when needed and then terminated when communication is complete. This works like a normal telephone line works for voice communication. Integrated Services Digital Network (ISDN) is a good example of circuit switching. When a router has data for a remote site, the switched circuit is initiated with the circuit number of the remote network. Number of WAN TECHNOLOGIES is discussed below:

1) VPN(Virtual Private Network) 2) ATM 3) Frame Relay 4) SONET/SDH 5) X.25 6) PPP

Page 51

Individual Assignment

Hardware Software System and Network

PT1182214

Virtual private network (VPN) is a technology widely used in a public switched network (PSTN) to provide private and secured WAN for an organization. VPN uses encryption and other techniques to make it appear that the organization has a dedicated network, while making use of the shared infrastructure of the WAN. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer. Key technologies often found in WANs include SONET, Frame Relay, X.25, ATM and PPP.

ATM: A dedicated-connection switching technology that organizes digital data into 53-byte cell units. Individually, a cell is processed asynchronously relative to other related cells and is queued before being multiplexed over the transmission path. Speeds on ATM networks can reach 10 Gbps.

Frame Relay: (FR). A high-speed packet-switched data communications service, similar to X.25. Frame relay is widely used for LAN-to-LAN interconnect services, and is well suited to the bursty demands of LAN environments.

SONET/SDH: Synchronous Optical Network is an international standard for high speed communication over fiber-optic networks. The SONET establishes Optical Carrier (OC) levels from 51.8 Mbps to 10 Gbps (OC-192) or even higher. Synchronous Digital Hierarchy (SDH) is a European equivalent of SONET.

X.25: The X.25 protocol allows computers on different public networks to communicate through an intermediary computer at the network layer level.

PPP: A point-to-point link provides a single, pre-established WAN communications path from the customer premises through a carrier network, such as a telephone company, to a remote network. Point-to-point lines are usually leased from a carrier and thus are often called leased lines. For a point-to-point line, the carrier allocates pairs of wire and facility hardware to your line only.

Page 52

Individual Assignment

Hardware Software System and Network

PT1182214

WAN TECHNOLOGY USED for ICT Public Limited IS VPN:


A virtual private network (VPN) is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. A virtual private network can be contrasted with a system of owned or leased lines that can only be used by one company. The main purpose of a VPN is to give the company the same capabilities as private leased lines at much lower cost by using the shared public infrastructure. Phone companies have provided private shared resources for voice messages for over a decade. A virtual private network makes it possible to have the same protected sharing of public resources for data. Companies today are looking at using a private virtual network for both extranets and wide-area intranets. The privacy afforded by these legacy VPNs was only that the communications provider assured the customer that no one else would use the same circuit. This allowed customers to have their own IP addressing and their own security policies. A leased circuit ran through one or more communications switches, any of which could be compromised by someone wanting to observe the network traffic. The VPN customer trusted the VPN provider to maintain the integrity of the circuits and to use the best available business practices to avoid snooping of the network traffic. Thus, these are called trusted VPNs.

SECURE VPN TECHNOLOGY


IPsec with encryption in either tunnel and transport modes. The security associations can be set up either manually or using IKE with either certificates or preshared secrets. IPsec is described in many RFCs, including 2401, 2406, 2407, 2408, and 2409 (for IKEv1), and 4301, 4303, 4306, 4307, and 4308 (for IKEv2).
Page 53

Individual Assignment

Hardware Software System and Network

PT1182214

IPsec inside of L2TP (as described in RFC 3193) has significant deployment for client-server remote access secure VPNs.

SSL 3.0 or TLS with encryption. TLS is described in RFC 4346. An excellent book on SSL 3.0 and TLS is "SSL and TLS: Designing and Building Secure Systems" by Eric Rescorla (ISBN 0201615983). These technologies (other than SSL 3.0) are standardized in the IETF, and each has many vendors who have shown their products to interoperate well in the field.

TRUSTED VPN TECHNOLOGY


ATM circuits Frame relay circuits Transport of layer 2 frames over MPLS, as described in draft-ietf-l2vpn-vplsbgp and other related Internet Drafts. Advantages Data is very secure within the VPN "tunnel" it would be impossible for the data to be tampered with in transit. You can have access to all your work files and software without having to physically move them. You have access to all the online services the same as if you were on the campus.

Page 54

Individual Assignment

Hardware Software System and Network

PT1182214

IP address classification of organization:


An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation. The Class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the node address. There are five different class addresses class A (begin with 0xxx, or 1 to 126 decimal), class B(10xx, or 128 to 191 decimal),class c(10xx, or 128 to 191 decimal),class D(1110, or 224 to 239 decimal), Class E(1111, or 240 to 254 decimal). ICT will get a privet address form ISP and the all devices inside will use public IP address. The IP range, subnet mask, and network address for each network of ICT is as below. All network address is given below

Class A addresses
Class A addresses are used for very large networks. The first octet of a Class A address is used to identify the Network and the three remaining octets are used to identify the host in that particular network. ( network.host.host.host ) For Class A, IP address must have a value between 0.X.X.X to 127.X.X.X

Class B addresses
Class B addresses are used for medium-sized networks. The first two octets of a Class B address is used to identify the Network and the remaining two octets are used to identify the host in that particular network. ( network.network.host.host ) For Class B, IP address must have a value between 128.X.X.X to 191.X.X.X

Class C addresses
Class C addresses are commonly used for small to mid-size businesses. The first three octets of a Class C address is used to identify the Network and the remaining one octet is used to identify the host in that particular network. ( network.network.networkt.host ) For Class C, IP address must have a value between 192.X.X.X to 223.X.X.X

Class D addresses
Class D addresses are known as multicast addresses. Multicasting is a technique to send packets from one device to many devices, without packet duplication. You cannot assign these IP addresses to your devices. For Class D, IP address must have a value between 223.X.X.X to 239.X.X.X

Page 55

Individual Assignment

Hardware Software System and Network

PT1182214

Class E addresses
Class E is mainly used for experimental purposes only and is kept preserved for future requirements. One cannot assign these IP addresses. For Class E, IP address must have a value between 240.X.X.X to 255.X.X.X ICT Resources India Public Limited Company is having small number of computers therefore we are going to use Class C IP Address for laying out network in the company. As the maximum number of computers are in office (40), to reduce IP address wastage we are required to do sub-netting Highest no of pc is 40, hence will fulfill our requirement. For this we will transfer three bits from the host part to the network part and the subnet mask for new Network will be 255.255.255.224.

Ground Floor

First Floor

Second Floor

Network Address Subnet Mask Starting IP Address Last IP Address Network Address Subnet Mask Starting IP address Last IP Address Network Address Subnet Mask Starting IP address Last IP Address

192.168.1.1 255.255.255.254 192.168.1.2 192.168.1.11 192.168.1.12 255.255.255.254 192.168.1.12 192.168.1.30 192.168.1.31 255.255.255.254 192.168.1.31 192.168.1.40

Page 56

Anda mungkin juga menyukai