PT1182214
INDIVIDUAL ASSIGNMENT
PANIPAT CE00382-2-HSSN-2 HARDWARE SOFTWARE SYSTEMS AND NETWORKS 2 PT1182214 HAND OUT DATE: 10th February 2014 HAND IN DATE: 7th April 2014 WEIGHTAGE: 30% INSTRUCTION TO CANDIDATES:
1. The students are advised to underpin their answers with the use of references. 2. Late submission will be awarded Zero (0) unless EC are upheld. 3. Cases of Plagiarism will be penalized. 4. The assignment should be submitted in both hardcopy and softcopy: a. The hardcopy of the assignment should be bound in appropriate style b. The softcopy of the written assignment and source code where appropriate should be on a CD in an envelope/CD cover and attached to the hardcopy.
Page 1
Individual Assignment
PT1182214
Module Code and Name Lecturer Submission Requirement Hand Out Date Hand In Date
: CE00382-2 Hardware, Software, Systems and Networks II : Pardeep Kumar : Hardcopy and Softcopy : 10th February 2014 : 7th April 2014
Assignment Learning Outcomes No Learning Outcomes 1. Explain the operation of current LAN & WAN standards, and explain and apply TCP/IP and associated protocols and applications. Assignment Overview ICT Resources India Public Limited Company has hired you as a network consultant. This company is the only supplier of business equipment and office supplies in North India. The lack of competition has caused the owners not to make major investments into the business. A nationally recognized competitor recently opened for business with plans to put ICT Resources out of business. In response to this, the owners of ICT Resources have decided to reinvest substantial sum of money in the company. ICT Resources locally own a 3 storey building and currently have already grown to a level where they now have resources of 30 staff and this figure is still growing. They have developed and spread their business to 3 strategic locations throughout North India with more upcoming offices in other locations planned for 2015. These new offices will incorporate the retail concept coupled with local sales offices. ICT Resources decide to set up office with approximately 35 to 40 employees. The goal is to determine the type of network topology they will need within the office. Consider the types of computer and number of printers, audio devices, microphones, LCD projectors, and multifunction peripherals are needed. Before they invest money in the local area network, the owner wants to know more about networks and internet connection. As the network consultant, write a brief report about the advantages and disadvantages of having a network. What type of network is best suited for the company a peer-to-peer network or a client/server network? What transmission media should the company use? Why? What types of problems should be expect with a network? Use internet, book or any other related material as reference to answer the owners requirement. You are strongly encouraged to produce your own design, diagrams and/or figures in support of the area of research. However, if the information is extracted from external sources, please ensure that proper referencing is provided.
Page 2
Individual Assignment
PT1182214
Guidelines for the Report Document your research findings in a professional and systematic manner, in the form of a computerized report. Your report should not exceed 3500 words. Your documentation should include the following: 1. Assessment criteria (please include the table provided below in your assignment after your cover page) 2. Table of contents 3. Gantt chart 4. Introduction 5. Description of the network/ protocol/device/technology 6. IP address classification of organization 7. Core components of the protocol/device/technology and how it works 8. Strengths of the protocol/device/technology 9. Weaknesses of the protocol/device/technology 10. Relationship between the selected protocol/device/technology and network management. 11. Conclusion (your personal input and should not be referenced from any source) 12. References (use Harvard referencing) 13. Appendix (please include documentation of your final product)
Assessment Criteria Research and Investigation Documentation Presentation Critical Analysis Citation and Referencing Product TOTAL 20 % 15 % 15 % 20 % 10 % 20 % 100 %
Page 3
Individual Assignment
PT1182214
Marking Criteria Distinction (70% +) Thorough and in-depth research and investigation supported by evidence. Excellent level of knowledge and understanding reflected in discussion. Contents of documentation well organized and presented in a professional manner. Discussion has good flow. Confident and able to address most questions posed during presentation. Good analysis of research area conducted. Referenced materials well cited and references documented. Effective and fully functional final product to support area of research. Credit (60 69%) Minor gaps in research and investigation conducted. Good level of knowledge and understanding reflected in discussion. Documentation Contents of documentation organized and presented in a professional manner with some minor issues. Sometimes lacking confidence but able to address most questions posed during presentation. Some analysis of research area conducted. Citation and references are available in documentation but with minor issue. Final product has some relationship to the area of research and/or most features of the final product functional with some minor issues. Major gaps in research and investigation conducted. Satisfactory level of knowledge and understanding reflected in discussion. Contents of documentation disorganized and/or not presented in a professional manner. Lacks confidence and unable to address most questions posed during presentation. Minimal analysis of research area conducted. Citation and references are available in documentation but with major issues. Most areas of final product not related to the research and functionality of the product is limited. Demonstrate poor understanding of the problem. No linkage between research and investigation. Poor analysis of research area or analysis is absent. Citation and references are not available in documentation. Final product not related to the area of research or final product not documented.
Fail (0 39%)
Page 4
Individual Assignment
PT1182214
Hardware and Software System and Networks II CE00382-2 Individual Assignment-6th Semester
HAND IN DATE: - 10th FEBRUARY, 2014 HAND OUT DATE: - 7th APRIL, 2014
Page 5
Individual Assignment
PT1182214
CERTIFICATION
This is to certify that Mr. Aakash Bathla of 6th semester Pursuing B.E (Hons.) Degree from A.P.I.I.T SD INDIA has successfully completed the individual project in Hardware, Software, System and Networks module under the guidance of Lecturer Mr. Pradeep Kumar within the stipulated Time Period.
Page 6
Individual Assignment
PT1182214
Acknowledgement
First of all I would like to present my sincere gratitude to APIIT granting me such valuable opportunity to making this assignment.
Second of all I would like to thanks my Module Lecturer Mr. Pradeep Kumar for giving me this opportunity to work on this assignment and without those valuable support this assignment would not have been a success.
I would also like to thanks lab supervisors who gave me a helping hand wherever necessary.
Last but not the least I am obliged to thanks my friend colleagues who provided me support and help wherever required.
Page 7
Individual Assignment
PT1182214
Abstract:
Major Part of the world is in the hands of technology. Like the telephone and the television, the network and data communication has performs an important role in restructuring our daily lives. Most people can hardly remember a time where the network and data communication was not available.
The Internet is not just a network; It is a whole community in and out of itself. It is a revolution that change d our society, our lives and our entire world. What other thing can we invariably say has completely connected everyone in the world.
I had to choose the best network design because the system has to be accurate and the management expects to see a great difference after the implementation.
The main aim of assignment is to suggest a effective and efficient network for ICT resources India Public Limited Company, Which is one of the supplier of business equipment and office supplies of its kind in North India. This network proposal includes the details about the network that is suitable for the ICT and the advantage and disadvantage of it. It also includes the network topologies, Transmission media, Protocols, Network Devices, Architecture Technologies, Possible Problems and the future enhancements in the network of ICT.
Page 8
Individual Assignment
PT1182214
Table of Content
Page 9
Individual Assignment
PT1182214
Gantt Chart
Feb 2014 Mar 2014 Apr 2014
ID
Task Name
Start
Finish
Duration
17 18 19 20 21 22 23 24 25 26 27 28 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 1 2 3 4 5 6 7 8 9
1 Assumption
17-02-2014 19-02-2014
3d
2 Gantt Chart
20-02-2014 21-02-2014
2d
24-02-2014 07-03-2014
10d
4 Requirement Identification
24-02-2014 26-02-2014
3d
5 Requirement Gathering
27-02-2014 03-03-2014
3d
6 Requirement Analysis
04-03-2014 05-03-2014
2d
7 Requirement Specification
06-03-2014 07-03-2014
2d
8 Design
10-03-2014 21-03-2014
10d
9 LAN1
10-03-2014 12-03-2014
3d
10 LAN2
13-03-2014 14-03-2014
2d
11 LAN3
17-03-2014 19-03-2014
3d
12 WAN
20-03-2014 21-03-2014
2d
13 Documentation
24-03-2014 04-04-2014
10d
14 Introduction
24-03-2014 24-03-2014
1d
15
Description of topology/device/ 25-03-2014 26-03-2014 network/technology IP address classification of organisation 27-03-2014 28-03-2014
2d
16
2d
Core Components of the 17 protocol/device/technology and 31-03-2014 31-03-2014 how it works 18 Strengths of Protocol/device/ technology Weakness of Protocol/device/ technology Relationship between the selected protocol/device/ technology and network management 01-04-2014 01-04-2014
1d
1d
19
02-04-2014 02-04-2014
1d
20
03-04-2014 04-04-2014
2d
21 Future Scope
07-04-2014 07-04-2014
1d
22 Conclusion
07-04-2014 07-04-2014
1d
07-04-2014 07-04-2014
1d
Page 10
Individual Assignment
PT1182214
Introduction Preface:
ICT Resources India Public Limited Company has hired me as a network consultant. The company is only supplier of business equipment and office supplies of in North India.
The major purpose was to develop a computer LAN and WAN network for ICT Resources India where the company consisting of three story building and four other strategic locations.
The lack of competition has caused the owners not to make major investments into the business. A nationally recognized competitor recently opened for business with plans to put ICT Resources out of business. In response to this, the owners of ICT Resources have decided to reinvest substantial sum of money in the company.
After completing network design I came upon a fully functional computer network for ICT Resources. As far as I concerns, this system will be error free and will be a big support for the development of the ICT Resources India.
I have properly planned an efficient network that will bring a wide range of Advantages to your company
Objectives: To provide an efficient and effective network for ICT Network. Identify the advantages and disadvantages of Networks. Understanding the type transmission media. Understanding different type of topology Identify and provide suitable network topology and transmission media for ICT resources. Identify and propose of LAN and WAN network connections.
Page 11
Individual Assignment
PT1182214
Assumptions: Now there is no internet facility for all the employees in ICT expect the location head. In the main office there are 3 departments, production departments, account departments and administrative departments. Presently there is no local network inside the office. The number of employees in each departments is as, 5 in accounts, 5 in administrator, 18 in production and 2 as network administrators. Each employee has each computer and computer have sound device and microphone. Each department consist of one printer, production department consist of LCD projectors and one security cameras.
Page 12
Individual Assignment
PT1182214
Proposed System: This is the proposed network diagram for the ICT Resources India. It is a 3 story building with three main departments divide among the floors as they are described in figure(1,2 and 3). This diagram shows how all these departments are connected to the LAN Through backbone and for connecting to 4 other location I have used VPN network which will act as WAN. As I above said these local area networks established in 4 different geographical areas, are connected together through a private network path and is considered to be as a Single local area network because of the VPN. This virtual path is not accessible by any other unauthorized clients and users and will only be valid for the users that belong to a particular domain. Here two fixed IPs will be assigned for the two ends of the VPN tunnel and all the data transfer will be done through those IPs. Also router at both ends will perform IPs filtering mechanisms to prevent unauthorized access to the network.
Page 13
Individual Assignment
PT1182214
Page 14
Individual Assignment
PT1182214
File Server
Web Server
Email Server
Other Staff
The server room is located in the top floor and this is the place where the backbone initiates. Fiber optic cables are used for connecting switches to router the server room and an administrator computer is reserved for IP configurations. Optical fiber has been used transmission medium because of the higher data transmission rate.
Page 15
Individual Assignment
PT1182214
Users
Users
Users
Swiitch(24 Port)
Printer
Users
Users
Reception
Admin
Except the server room there are other sections located in the Ground floor. Here they are Finance Admin, Cashier, Attendance count and Reception. Following network diagram shows how the first floor is architected in the network.
Page 16
Individual Assignment
PT1182214
Users
Users
Users
Swiitch(24 Port)
Printer
Users
Users
User
User
Above is the network diagram designed for the First floor for the company? As assumed First floor is consist of the sales and development department. I have assigned 15 computers for the First floor and all are connected to a switch via star topology which connects to the main router. Also there is a printer (All in one) connected to switch to enable all the computers to use them.
.
Page 17
Individual Assignment
PT1182214
Description of Network
What is a network?
A computer networks is simply two or more systems connected together so they can change information.
A network uses a combination of hardware and software to send data from one location to another. Networks consist of the computers, wiring, and other devices, such as hubs, switches and routers that make up the network infrastructure. Some devices, such as network interface cards, serve as the computers connection to the network. Devices such as switches and routers provide traffic- control strategies for the network. All sorts of different technologies can actually be employed to move data from one place to another, including wires, radio waves, and even microwave technology. [All networks, whether big or small, are typically created so that users on the network can share resources and communicate. The list that follows breaks down some of the reasons for networking computers: File sharing: Networking computers makes it very easy for the users on the network to share application files Hardware sharing: Users can share devices such as printers, CD-ROM drives, and hard drives.
Page 18
Individual Assignment
PT1182214
Program sharing: Applications such as spreadsheets and word processors can be run over the network. User communication: Network allows users to take advantage of communication media such as electronic mail, newsgroups, and video conferencing.] Internet is also used for the communication. Internet is a global network connecting millions of computers or we can say that internet is the networks of network. More than 100 countries are linked into exchanges of data, news and opinions.
Network Advantage
Information Sharing: The main advantage of network is information sharing. A large number of users belonging to same area or same organization but spread over at different places can communicate and share useful files, software and information at right times via network of computers. Speed: Sharing and transferring of data occurring in a network is rapid. So we can send the data of larger size like high resolution photographs over the network. Flexible Access: Computer network allows accessing the file in a flexible manner. Security: Network is also allows establishing security by ensuring that the network users may only have access to certain files and applications. Sensitive files and data in the network are password protected to avoid the illegal coping of data. Work Group Computing: Work group software such as Microsoft back office allows concurrent access of files and data. Centralized Software Management: Files can be stored on a central computer (the file server) allowing data to be shared throughout the entire network Cost: Individual license copy of many software may be costly. Shared programs on the network allows easy up gradation of file server rather than the individual work stations. Resource sharing: Network allows to share the resources like printer, scanner, fax machines modems. Back up Facility: Files can be backed up more easily when they are all on a central File server rather than when they are scattered across a number of independent workstations.
Page 19
Individual Assignment
PT1182214
Network Disadvantage
Loss of data and resources: Network failure and device failure will shut the entire network it causes loss data. Network faults cause loss of resources. If the network stops operating then it may not be possible to access to various computers. Difficult to manage: Network set up is very costly because of hardware and software. Network set up take a lot of time to complete. The larger the network becomes difficult to manage. Location of resources: Resources could not be located too far from users. If resources are too far it take to much time to share the resources like printer .it will negatively affect the access flexibility. Storage space and Bandwidth: Users may use too much bandwidth - for example when listening to music files or watching video clips - preventing others from using the network facilities properly .Usage of larger storage may cause problems on the network.
Categories of Network
LAN (Local Area Network) WAN(Wide Area Network) MAN( Metropolitan Area Network) LAN (Local Area Network): Local area networks are designed to allow resources to be shared
between personal computers or workstations. The resources to be shared can include hardware, software or data .The best example of LAN is found in business organizations. One of the computers may be given a large capacity disc which acts as a server to clients. Softwares are installed into central server and is used by the whole network group .The most common LAN topologies are bus, ring, and star. Currently LAN size is limited to few kilometers. Generally, LAN is using one type of transmission medium. In my project I have designed a LAN network to connect the entire building by using star topology for ICT Resources India private limited
Page 20
Individual Assignment
PT1182214
. WAN (Wide Area Network): Wide area network provides long distance transmission of data ,image audios and video information over large geographic aera.WAN can be simple like dial up lines connect to the individual pc and internet .It can be complex also like backbones that connect the internet. We normally refers two types WAN switched WAN connects to the end systems and the point to point WAN connects home computer to an internet service provider. In this Project I have designed a WAN connection by adding LAN of this company and 3 other Location.
Page 21
Individual Assignment
PT1182214
MAN (Metropolitan Area Network): A metropolitan area network is a network with a size between a LAN and a WAN. It normally covers the area inside a town or a city .A best example of a MAN is the part of telephone network that can provide a high-speed DSL line to the customer .MAN provides high speed connectivity, normally to the internet. It provides the internet connectivity for LAN in a metropolitan network.
Page 22
Individual Assignment
PT1182214
Advantages: Cost saving: eliminating the need for expensive long-distance leased lines. VPN reduces long - distance telephone charge .It offers offloading of support cost Flexibility and Reliability: VPN is improving the reliability of data services of company. Better Performance: Owing to the fact that more high capacity data service options can be used, the bandwidth and efficiency of the network generally increases after a VPN solution is installed. Improved Security: The use of encryption protocols and authentication helps secure the data that is traveling over the VPN channel. Disadvantages of VPN VPNs require an in-depth understanding of public network security issues and proper deployment of precautions. The availability and performance of an organization's wide-area VPN (over the Internet in particular) depends on factors largely outside of their control.
Page 23
Individual Assignment
PT1182214
Network Topology Network topology refers to the Structure or design of the connected devices. Network topologies can be physical or logical. Physical Topology means the physical design of a network including the devices, location and cable installation. Logical Topology refers to the fact that how data actually transfers in a network as opposed to its design.
Mesh topology
In mesh topology every device has a dedicated point to point connection with every other device. The term dedicated means that link carries traffic only between the two devices it connects. In mesh topology needs n(n-1)/2 duplex mode links ,n is the no of nodes.
Advantage Use of large no of links reduces network traffic. A mesh topology is robust in nature .if one link becomes unusable it does not disable the entire system. It offers privacy and security
Disadvantage Use of large number of cables makes the network very much expensive Interconnection of devices leads to difficulty in installation and
reconfiguration of devices. Hardware required to connect each link can make it more expensive to implement.
Page 24
Individual Assignment
PT1182214
Star topology
In a star topology each device has a dedicated point to point connection with only device usually known as a hub. In a star topology devices are not directly linked to one another. Unlike mesh topology it does not allow direct traffic between the devices. The controller act as an exchange between the two devices.
Disadvantage Dependency of all topology on a single point called hub. If the hub goes down then the whole system will be dead. The cost of the hub make the network more expensive.
functionality. Easy to install and reconfigure it, each device needs only one link and one input-output port. Robust it nature, failure of one system doesnt affect the whole network
Page 25
Individual Assignment
PT1182214
Bus topology
A bus uses multipoint connection instead of point to point-to-point connection. Tap in a bus topology one cable acts as a backbone and nodes are connected in a bus topology through drop lines tap. A drop line is a connection running between the device and the main cable.
Advantage A Bus topology is easier to install. Less expensive than star and mesh because less cables are required, Less redundancy of cables
Disadvantage Difficulty in reconnection and fault isolation Signal reflection at the taps can count degradation and quality breaks in the bus cable stops all transmission.
Page 26
Individual Assignment
PT1182214
Ring topology
In a ring topology each device has a dedicated point to point link with one two device on either side of each. Signal is passed along the ring in one direction from one device to another device until it reaches a destination. Each device in a ring topology uses a repeater.
Advantage A ring is relatively easy to install and It uses unidirectional traffic. A break in the reconfigure it, ring can stop all transmissions. In a ring topology each device linked only its intermediate neighbors. For addition and removal we need to change only two connections.
Disadvantage One malfunctioning workstation can throw away the entire network. . It is slower than an Ethernet network.
Page 27
Individual Assignment
PT1182214
Tree topology
A tree is a variation of star topology. Nodes in a tree are linked to standard controller known as hub which directly controls the traffic of the network. However not every device are directly connected to the central hub. Majority of the devices are connected to the secondary hub.
Advantage It provides point to point connectivity with the primary and the secondary hub. It provides an easy exchange
Disadvantage If the back bone line breaks the entire segment will go down.
Topologies play an important role in the network design. A best network can be design if you have the good knowledge of these topologies. A miss configured network can result in a waste of time and energy. So the basic understanding of the network topologies and network devices is a must to build a good network. Different types of Network Topologies available are but here I have mainly described only star topology and fiber optic that is going to use in our network
Page 28
Individual Assignment
PT1182214
Here I have considered all the advantages. Performance of this particular topology, some of them are as follows. Easy to install and wire. No disruptions to the network when connecting or removing devices. Easy to detect faults and to remove parts. The cost is comparatively less. Most reliable because a cable failure does not affect other users. Controller to each terminal. And the performance is not as greatly affected. The star topology minimizes the chance of network failure by connecting the entire
computer to a central hub or switch.
Page 29
Individual Assignment
PT1182214
JUSTIFICATION FOR THE STAR TOPOLOGY Compared to Star Topology, Ring topology has the following disadvantages. The ring topologys dependent on one cable so the reliability is very low compared to the star topology. (If that one cable fails all the other workstations Will also goes fail. Compared to the star topology if any case of cable failure the ring topology will work in other workstation.. Unlike in star topology, with the ring we have to switch on all the computers in Order to work on computer. So its very inefficient. Compared to Star Topology, Bus topology has the following disadvantages. Like the ring, bus topology is also not reliable because if the main cable (Backbone) fails; a number of computers beyond the failure will be affected. Because of the heavy network traffic in the Bus due to more users, the Performance will slow down. The number of cable length and the number of stations has to be limited. In the Bus its needed to have termination at the end of the cable to stop Reflected signals. So it will result an extra cost. Therefore we have to say that the bus topology is also inefficient in this network. Compared to Star Topology, Mesh topology has the following disadvantages. In order to implement the mesh topology, we have to spend a lot of money. Than what is spent for the Star topology. Each and every computer should be connected with each other that require a lot of cables. That makes results of lots of money. I have to say that star topology is better than the mesh topology for this network. Compared to Star Topology, Tree topology has the following disadvantages. Overall length of every segment is limited by the type of cabling we do. If the backbone line breaks, the entire segment goes down. More difficult to configure and implement wire than other topologies.
Page 30
Individual Assignment
PT1182214
Network Architecture Network Architecture, is the logical and structural layout of the network consisting of transmission equipment, software and communication protocols and infrastructure (wired or wireless) transmission of data and connectivity between components. Peer to Peer Network Peer-to peer network is a type of network in which each workstation has equivalent capabilities and responsibilities. Peer-to-peer networks are generally simpler, but they usually do not offer the same performance under heavy loads. In peer to peer network there is no dedicate server. Thus each computer in such a network is part server and part client
Client Server Architecture In client server architecture, a businesss computer network will have a server computer, which function as the backbone of the organization, and a group of client computers, which are commonly called workstations. By using the server we can improve efficiency of client server architecture. Most of the cases the server part of client server having large capacity of storage and also provides high functionality. Client part in the client server architecture are smaller computer having individual responsibilities.
Page 31
Individual Assignment
PT1182214
Advantages Centralized Resources Centralized storage of data. Easier to find and backup the data and the files Efficient Client Server Multiple users can use hardware and software Security Central Server Machine can secure all other workstations. Scalability Easy to upgrade resources
Disadvantages If the server goes down, it takes part or the whole network with it. It is more expensive to install. Needs to be
Peer to Peer
Reduced
network are
Cost(The
hardware,
Only small
suitable no.
for of
Well tested Simplicity Connected Using simple and straight forward cabling.
Page 32
Individual Assignment
PT1182214
Page 33
Individual Assignment
PT1182214
It is limited in extensibility, tends to overburden user workstations by having them play the role of server to other users, and is largely unsecured. A peer-to-peer architecture is used there where are a limited number of users which can be a maximum of 10 while in this network there are more than 40 employees. So it is not suitable to use this architecture. Typically unable to provide system-wide services since the typical workstation will run a standard desktop operating system incapable of hosting any major service. Peer-2-Peer architecture is concerned when security is not of a major issue. But in this case security has to be taken care off. In peer to peer architecture there is absence of central administration which can sometimes prove to be fatal. Non-existence of centralized data forces users to take backup of the data themselves.
Page 34
Individual Assignment
PT1182214
Transmission Media:
Transmission media is anything that carry signal from source to destination. Best example transmission media is air. It can be metallic cables or fiber optics cable. In telecommunication transmission media is divided in to two broad categories guided media and the unguided media. Guided media provides connection from source to destination by using twisted pain cables , coaxial cables , and fiber optic cables. Unguided media
Page 35
Individual Assignment
PT1182214
Coaxial Cable: Unlike twisted pair cables, coaxial cable carries signal having higher frequency. Coaxial cable has a central core conductor of solid or standard wire enclosed in a insulating sheath which is, in turn, encased in an outer conductor of metal foil braid or a combination of the two. The outer metallic wrapping serves both as a shield against noise and as the second conductor, which completes the circuit. Coaxial cables are widely used in analog telephone networks.
Fiber Optic Cable: A fiber optic cable transmits signal in the form of light .These cables are made by glass or plastics. Signal in the fiber optics transmits on the basis of total internal reflection. Fiber optics use reflection to guide light through a channel. A glass or a plastic core is surrounded by a cladding of less dense glass or plastic. The difference in density of two materials must be such that a beam of light moving through the core is reflected off the cladding instead of being refracted to it. Fiber optics is often found in back bone networks.
Page 36
Individual Assignment
PT1182214
Comparison between Cables:Characteristics Susceptibility to good interference. Ease of installation Coaxial cable Resistance to interference Easy to install Twisted Pair cable
UTP: very susceptible STP: Good resistance
Flexibility
Fairly Flexible
STP: Less Flexible coaxial cable than UTP Special Features Electronic Support Components are less expensive than twisted- pair cable. UTP: Same as Telephone wire; often preinstalled in buildings. STP: Supports higher transmission than UTP Transmission rates 4-100mbps UTP: 4-100 mbps STP: 16-500mbps 100mbps or more(>1gbps) rates Supports voice, data, video
Unguided Media: Unguided media is mostly used for distance transmission over the air (ex. Wireless, satellite).
Page 37
Individual Assignment
PT1182214
Types of Twisted Pair Cable are given below. Unshielded Twisted Pair (UTP): The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices.
Page 38
Individual Assignment
PT1182214
Categories of unshielded twisted pair cable: Category Catrgory1 Catrgory2 Catrgory3 Catrgory4 Catrgory5 Catrgory5e Catrgory6 Use Less than 1Mbps 4Mbps 10Mbps 10Mbps 10 Mbps. Ethernet 1000 Mbps. Gigabit Ethernet 1000 Mbps. Gigabit Ethernet
I have used UTP Category 5 cables as the main connecting media between switches and client computers. CAT 5 cables support a bandwidth of 100Mbps. According to the needs of the company, the data transmission rate of UTP cables is more than enough. Because of the above mentioned factors. Advantages of UTP cables: Unshielded Twisted-Pair (UTP) Structured Premise Cabling permits many communication protocols to reside in the same wire bundle. Examples include voice, data, and CCTV video and control. A good UTP system gives better interference rejection than coaxial. UTP is less expensive than dedicated coaxial or fiber optic. UTP is physically smaller than coaxial and many other cable types. UTP is a very easy media to install and reconfigure. UTP is extremely easy to terminate.
Page 39
Individual Assignment
PT1182214
Unshielded Twisted Pair connector: The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a plastic connector that looks like a large telephone-style connector. A slot allows the RJ-45 to be inserted only one way. I have used RJ-45 connector to connect the both ends of UTP-5 cable.
Shielded Twisted Pair (STP): A disadvantage of STP is that it is susceptible to radio and electrical frequency interference. The extra shielding can make the cables quite bulky. The shielding is quite bulky and can make installation difficult. The term is often abbreviated to STP.
Coaxial cable: Coaxial cable has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield. The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers.
Page 40
Individual Assignment
PT1182214
Disadvantages: coaxial cabling is difficult to install, Does not bend easily and is difficult to install. Cost is much more than UTP cable. Fiber Optic cable: Fiber optic cabling consists of a center glass core surrounded by many layers of protective materials. It transmits light rather than electronic signals eliminating the problem of electrical interference.
Advantages: Ability to transmit signals over much longer distances. Capability to carry information at vastly greater speeds. This capacity brings communication possibilities to include services such as video conferencing. Disadvantages: The cost of fiber optic cabling is very high. It is more difficult to install and modify.
Despite of this figures, I have used Optical fiber to construct the backbone of network. This choice was made because the data transmission rate of optical fiber is very large and also by considering with the other network cables, optical fiber has a very less percentage of data loss. But because of the high prize of optical fiber, I had to limit it only to the backbone of the network.
Page 41
Individual Assignment
PT1182214
DISCRIPTION OF DEVICES
ROUTER:
Routers are small physical devices that join multiple networks together. Technically, a router is a Layer 3 gateway device, meaning that it connects two or more networks and that the router operates at the network layer of the OSI model. Routers used in networks perform the following functions: 1. Restrict broadcast to the LAN 2. Act as the default gateway. 3. Move data between networks. 4. Learn and advertise loop free path
BREEDGE:
A network bridge, also known as a layer 2 switch, is a hardware device used to create a connection between two separate computer networks or to divide one network into two. Both networks usually use the same protocol; Ethernet is an example of a protocol. Network devices include, but are not limited to, Personal Computers (PCs), printers, routers, switches and hubs. Devices connected to a network via an Ethernet adapter card have what is known as a Media Access Control (MAC) address, also called a physical or hardware address. It is this address that uniquely identifies a device to a bridge that can then determine to which the network device is connected. The principal function of a network bridge is to forward data based on the MAC address of the sending and receiving devices. This operation helps to eliminate what are known as collision domains.
SWITCH:
A network switch is a small hardware device that joins multiple computers together within one local Area Network(LAN).Technically, network switches operate at layer two (Data Link Layer) of the OSI model. Switch forwards data only to the port that connects to the destination device. It does this by learning the MAC address of the devices attached to it, and then by matching the destination MAC address in the data it receives.
Page 42
Individual Assignment
PT1182214
HUB:
Hubs are used in networks that use twisted-pair cabling to connect devices. Hubs can also be joined together to create larger networks. Hubs are simple devices that direct data packets to all devices connected to the hub, regardless of whether the data package is destined for the device. This makes them inefficient devices and can create a performance bottleneck on busy networks. -
MODEM:
A modem, short for modulator/demodulator, is a device that converts the digital signals generated by a computer into analog signals that can travel over conventional phone lines. The modem at the receiving end converts the signal back into a format the computer can understand. Modems can be used as a means to connect to an ISP or as a mechanism for dialing up to a LAN.
FIRE WALL
A firewall is a networking device, either hardware or software based, that controls access to your organizations network. This controlled access is designed to protect data and resources from an outside threat. To do this, firewalls are typically placed at entry/exit points of a networkfor example, Placing a firewall between an internal network and the Internet. Once there, it can control access in and out of that point.
Page 43
Individual Assignment
PT1182214
Router: A router translates information from one network to another; when the
packets are received by the router, it routes it to the appropriate node in a network. Routers select the shortest path to route a message, based on the destination addressing.
Network Interface Cards: The (NIC) provides the physical connection between the network and the computer workstation. Most NICs are internal, with the card fitting into an expansion slot inside the computer.
Network Interface cards are a main factor in concerning the speed and performance of a network.
Page 44
Individual Assignment
PT1182214
Network Cable
To connect together different devices to make up a network, you need cables. Cables are still used in most networks, rather than using only wireless, because they can carry much more data per second, and are more secure (less open to hacking).
Firewall
A firewall is a device, or a piece of software that is placed between your computer and the rest of the network (where the hackers are!) If you wish to protect your whole LAN from hackers out on the Internet, you would place a firewall between the LAN and the Internet connection.
Page 45
Individual Assignment
PT1182214
Description of protocols:
Protocol: A protocol is a set of rules that governs the communications between computers on a network. In order for two computers to talk to each other, they must be speaking the same language. Many different types of network protocols and standards are required to ensure that your computer (no matter which operating system, network card, or application you are using) can communicate with another computer located on the next desk or half-way around the world. The OSI Reference Model defines seven layers of networking protocols.
Ethernet (Physical/Data Link Layers) IP/IPX (Network Layer) TCP/SPX (Transport Layer) HTTP, FTP, Telnet, SMTP, and DNS(combined Session/Presentation/Application Layers)
Page 46
Individual Assignment
PT1182214
Page 47
Individual Assignment
PT1182214
Page 48
Individual Assignment
PT1182214
TCP/IP protocol
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered and error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP.
Page 49
Individual Assignment
PT1182214
Page 50
Individual Assignment
PT1182214
Page 51
Individual Assignment
PT1182214
Virtual private network (VPN) is a technology widely used in a public switched network (PSTN) to provide private and secured WAN for an organization. VPN uses encryption and other techniques to make it appear that the organization has a dedicated network, while making use of the shared infrastructure of the WAN. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer. Key technologies often found in WANs include SONET, Frame Relay, X.25, ATM and PPP.
ATM: A dedicated-connection switching technology that organizes digital data into 53-byte cell units. Individually, a cell is processed asynchronously relative to other related cells and is queued before being multiplexed over the transmission path. Speeds on ATM networks can reach 10 Gbps.
Frame Relay: (FR). A high-speed packet-switched data communications service, similar to X.25. Frame relay is widely used for LAN-to-LAN interconnect services, and is well suited to the bursty demands of LAN environments.
SONET/SDH: Synchronous Optical Network is an international standard for high speed communication over fiber-optic networks. The SONET establishes Optical Carrier (OC) levels from 51.8 Mbps to 10 Gbps (OC-192) or even higher. Synchronous Digital Hierarchy (SDH) is a European equivalent of SONET.
X.25: The X.25 protocol allows computers on different public networks to communicate through an intermediary computer at the network layer level.
PPP: A point-to-point link provides a single, pre-established WAN communications path from the customer premises through a carrier network, such as a telephone company, to a remote network. Point-to-point lines are usually leased from a carrier and thus are often called leased lines. For a point-to-point line, the carrier allocates pairs of wire and facility hardware to your line only.
Page 52
Individual Assignment
PT1182214
Individual Assignment
PT1182214
IPsec inside of L2TP (as described in RFC 3193) has significant deployment for client-server remote access secure VPNs.
SSL 3.0 or TLS with encryption. TLS is described in RFC 4346. An excellent book on SSL 3.0 and TLS is "SSL and TLS: Designing and Building Secure Systems" by Eric Rescorla (ISBN 0201615983). These technologies (other than SSL 3.0) are standardized in the IETF, and each has many vendors who have shown their products to interoperate well in the field.
Page 54
Individual Assignment
PT1182214
Class A addresses
Class A addresses are used for very large networks. The first octet of a Class A address is used to identify the Network and the three remaining octets are used to identify the host in that particular network. ( network.host.host.host ) For Class A, IP address must have a value between 0.X.X.X to 127.X.X.X
Class B addresses
Class B addresses are used for medium-sized networks. The first two octets of a Class B address is used to identify the Network and the remaining two octets are used to identify the host in that particular network. ( network.network.host.host ) For Class B, IP address must have a value between 128.X.X.X to 191.X.X.X
Class C addresses
Class C addresses are commonly used for small to mid-size businesses. The first three octets of a Class C address is used to identify the Network and the remaining one octet is used to identify the host in that particular network. ( network.network.networkt.host ) For Class C, IP address must have a value between 192.X.X.X to 223.X.X.X
Class D addresses
Class D addresses are known as multicast addresses. Multicasting is a technique to send packets from one device to many devices, without packet duplication. You cannot assign these IP addresses to your devices. For Class D, IP address must have a value between 223.X.X.X to 239.X.X.X
Page 55
Individual Assignment
PT1182214
Class E addresses
Class E is mainly used for experimental purposes only and is kept preserved for future requirements. One cannot assign these IP addresses. For Class E, IP address must have a value between 240.X.X.X to 255.X.X.X ICT Resources India Public Limited Company is having small number of computers therefore we are going to use Class C IP Address for laying out network in the company. As the maximum number of computers are in office (40), to reduce IP address wastage we are required to do sub-netting Highest no of pc is 40, hence will fulfill our requirement. For this we will transfer three bits from the host part to the network part and the subnet mask for new Network will be 255.255.255.224.
Ground Floor
First Floor
Second Floor
Network Address Subnet Mask Starting IP Address Last IP Address Network Address Subnet Mask Starting IP address Last IP Address Network Address Subnet Mask Starting IP address Last IP Address
192.168.1.1 255.255.255.254 192.168.1.2 192.168.1.11 192.168.1.12 255.255.255.254 192.168.1.12 192.168.1.30 192.168.1.31 255.255.255.254 192.168.1.31 192.168.1.40
Page 56