Report on Networking Technologies A

Embed Size (px)

Citation preview

  • 8/17/2019 Report on Networking Technologies A

    1/49

     Networking Technologies

  • 8/17/2019 Report on Networking Technologies A

    2/49

    Networking Technologies [2013]

    ContentsLearning outcome one...........................................................

     Task one:...............................................................................What is computer network....................................................What is a network..................................................................Working principles of computer network...............................

     Types of computer networks..................................................LAN (Local Area Network)......................................................Advantages of LAN................................................................

    isadvantages of LAN...........................................................WAN (Wide Area Network)...................................................!"

    #$amples..........................................................................!!

    Advantages of WAN.............................................................!!isadvantages of WAN........................................................!%&AN (&etropolitan Area Network).......................................!%Advantages of &an (&etropolitan area network).................!'isadvantages &AN.............................................................!'

    Network topologies..............................................................!'us topology.......................................................................!Working of *us topology......................................................!Advantages.........................................................................! isadvantages.....................................................................!+tar topology.......................................................................!,Working of star network......................................................!,Advantages.........................................................................! ,isadvantages.....................................................................!,

     The *est LAN topology.....................................................!-

    ing topology......................................................................!-Working of ring network......................................................!-Advantages.........................................................................! -isadvantages.....................................................................!/

     Tree topology.......................................................................!/Advantages of a tree topology.............................................!/

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    3/49

    Networking Technologies [2013]

    isadvantages.....................................................................!/&esh topology.....................................................................!0

    Advantages.........................................................................! 0isadvantages.....................................................................!0

     Task !.%...............................................................................!0Wireless technology............................................................!12ommon e$amples of wireless e3uipment in use today......%"Wireless can *e divided into:...............................................%!Wi45i....................................................................................% %Wi45i standards:...................................................................%%W6&A7.................................................................................% '

    luetooth.............................................................................%Application protocols...........................................................%,6mpact of wireless technology on society............................%-

     Task !.'...............................................................................%/

    What is 2+&A82 and9 how does it work.........................%0What is a data collision...................................................%0;ow does a 2+&A82 detects and avoids data collision

    ............................................................................................. %0

    Learning outcome two.........................................................%1 Task one..............................................................................%12lient 8 server software........................................................%1+witches..............................................................................' ";u*.....................................................................................' !outers................................................................................'%Networking ca*les...............................................................'%

  • 8/17/2019 Report on Networking Technologies A

    4/49

    Networking Technologies [2013]

    Learning outcome three......................................................'- Task !..................................................................................'-

    esigning a small LAN Network *ased on the scenario

    provided...............................................................................' -+cenario:..........................................................................' -esigning =hase:..............................................................'/5easi*ility eport:.............................................................'/5eed*ack from the o>cer in charge:................................'1

    Learning outcome four........................................................."

    etailed eport and ocumentation:..............................."#sta*lishing the Network:.................................................!

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    5/49

    Networking Technologies [2013]

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    6/49

    Networking Technologies [2013]

    Learning Outcome No. 01Task 01

    What is computer network 

    What is a network 

    Working principles o computer

    network

    T!pes o computer networks"#$antages an# #isa#$antages

    Topologies t!pes an# working

    "#$antages an# #isa#$antages

    Task 02Wireless technolog!

    Common use o wirelesse%uipment in use relate# totelecommunication

    Wireless can &e #i$i#e# into

    Wi'(

    Wi'( stan#ar#s

    Wima)*lutooth

    "pplication la!er protocols

    +mpact o wireless technolog! on

    societ!

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    7/49

    Networking Technologies [2013]

    Task 03

    What is ,C-" C"'C/What is collision #etection

    ow it a$oi#s an# #etects #ata

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    8/49

    Networking Technologies [2013]

    Learning Outcome No. 01Task 01Networking systems can *e *roadly divided into Local area network (LAN)9

    &etropolitan area network (&AN) and Wide area networks (WAN) as well

    as have di?erent typologies 4 star9 ring9 *us9 and mesh network

    topologies. iscuss the *ene@ts and constraints of di?erent networking

    systems and typologies

    What +s Computer Network A computer network is a set of two or more computers connected

    together in order to share information and other resources. The resources

    may include printers9 hard disks9 scanners or programs etc. The

    computers in a network are connected through ca*les9 satellite or

    telephone lines.

    What is a network A network is two or more computers9 or other electronic

    devices9 connected together so that they can e$change

    data.5or e$ample a network allows computers to share @les9

    users to message each other9 a whole room of computers to share a single

    printer9 etc. Network connections *etween computers are typicallycreated using ca*les (wires). ;owever9 connections can *e created using

    radio signals (wireless 8 wi4@)9 telephone lines (and modems) or even9 for

    very long distances9 via satellite links.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    9/49

    Networking Technologies [2013]

    Working principles o computer

    network #lectrical signal or signals in the form of electromagnetic waves

    propagating on a computer network 8 radiate with the working principles

    of computer networking systems. 6n order for a network to e$change

    information data9 we need a device called a modem (modulator

    demodulator) that serves to convert analog signals into digital signals and

    vice versa. There are main components found on a network9 the sender

    (sender information data)9 protocols (which encode and decode the datainformation)9 transmission media (medium data transfer)9 and receiver

    (receiver data information). The principle works9 @rst sender sends a

    signal to the receiver via the protocol information that changed the

    encoded digital signals into analog signals and signal transmission

    through the media and via a second protocol on the decoded *ack into

    digital signals *efore entry into the receiver.

    T!pes o computer networks Three types of computer networks are as follows.

      L"N' Local "rea Network.

     

    W"N'Wi#e "rea Network.

    "N'etropolitan'"rea Network .

    L"N ,Local "rea Network  L"N stands for local area network. 6t is the most common type of

    network. 6t covers a small area. 6t usually connects the computers and

    Syed Fayyaz Ahmed Shah  GCPK-

    [email protected]

  • 8/17/2019 Report on Networking Technologies A

    10/49

    Networking Technologies [2013]

    other devices in one o>ce or a *uilding or group of *uildings. LAN is often

    used to share resources such as printers9 hard disks and programs.

     LANs are capa*le of transmitting data at very fast rate. LAN transmission

    speeds are typically !"&p*s to !"""&p*s. 6t is much faster then the data

    transmission over the telephone line. LAN can transmit data in a limited

    distance. There is also a limit on the num*er of computers that can

    attached to the computer network.

    "#$antages o L"N esource sharing  The resource such as printers9 24&

    drives9 hard disks and software can also *e shared using LAN. This is

    cheaper then *uying devices for each work station in the network. Communication The users in LAN can easily communicate with

    each other they can also transfer data easily and rapidly *etween

    di?erent computers in the network. "pplication sharing  The individual licensed copy of software

    can *e costly . A lot of money can *e saved *y using same software

    over network instead of purchasing separate copy of the software

    for each work station. The network versions of software applications

    such as &+ >ce are availa*le. These applications are loaded on

    the sever and shared *y di?erent

    users in LAN.

    Centrali4e# it

    a#ministration LAN allows an

    easier and more e>cient way to

    manage di?erent computers from

    server. 6T administrator can

    remotely trou*leshoot the

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    11/49

    Networking Technologies [2013]

    pro*lems on computer across the network instead of doing it

    individually.

    Centrali4e# #ata the users can save their data centrally on the

    server in LAN. They can access the saved data from any workstation

    on the network. They do not need to use the same work station all

    the time.

    +nternet access sharing LAN allows multiple users to share a

    single internet connection. An organiBation can purchase one high

    speed internet connection and share it on di?erent work stations in

    LAN. /ata securit! an# management LAN can manage

    important data in a *etter way. ata can *e centraliBed on shared

    servers instead of storing it on di?erent computers. #veryone can

    @nd the data easily. security can *e implemented easily.

    /isa#$antages o L"N 5ri$ac! threat LAN can *e threat to users privacy. The network

    administrator can access personal @les of the users. ;e can also

    monitor the network and internet activities of the use.

    6)pensi$e to install LAN generally saves money over time.

    ;owever9 it may re3uire high initial costs of installation. The ca*les9

    network cards and software are e$pensive. The installation may also

    re3uire the services of technician.

    "#ministrati$e time re%uire#  The proper maintenance ofLAN re3uires time and e$pertise. A network administrator may *e

    re3uire to manage network properly.

    /ata securit! concerns LAN can put critical data at risk if it

    is not secured properly. The unauthoriBed users may access

    important data and can damage it.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    12/49

    Networking Technologies [2013]

    W"N ,Wi#e "rea Network  WAN stands for wide area network. This type of network covers

    a large area. 6t connects computers and other devices in di?erent cities

    and countries. WAN usually consists of several LANs connected together.

    2omputer in WAN are often connected through telephone lines. They can

    also *e connected through leased lines or satellites.WAN can reach the

    parts of the world that is not possi*le with LANs. WAN is e$pensive then

    LAN .WAN is not fast as LAN. The speed of WAN depends upon the speed

    provided *y the company. The transmission rate of WAN is typically from

    ,- kp*s to ,"mp*s. The largest in e$istence is the internet.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    13/49

    Networking Technologies [2013]

    6)amples 

    A *ank with many *raches in country can connect its *ranchesthroughWAN . The customer can use his account from any *ranch.

     "#$antages o W"N Communication acilit! A *ig company may e$ist at multiple

    locations in country. The employees can communicate using WAN. 6t

    saves long distance phone calls. Cideo conferencing is another use

    of WAN where users can communicate with each other through

    computer system.

    emote #ata entr! emote data entry is possi*le in WAN. The

    user can sit at any location and enter9 update and process data on

    any computer attached to WAN. 5or e$ample9 the user can access

    the data of a computer located at London while sitting in

    Nottingham through WAN.

    6ntertainment WAN can facilitate many types of games and

    entertainment to the user. 5or e$ample9 internet provides many

    Syed Fayyaz Ahmed Shah  GCPK-

    [email protected]

  • 8/17/2019 Report on Networking Technologies A

    14/49

    Networking Technologies [2013]

    sources of entertainment. &any multiple player games are availa*le

    that can *e played over WAN.

    /isa#$antages o W"N ar#ware7 -otware 8 setup costs

    setting up a WAN re3uires an investment in

    hardware9 software9 planning9 designing and

    implementing. The cost of devices used in WAN are very e$pensive.

    ar#ware 8 -otware anagement costs &anaging aWAN is complicated. 6t re3uires intensive training. A network

    manager usually needs to *e employed.

    /ata securit! concerns A poorly secured WAN puts critical

    data at risks. 6t may e$pose data to hackers9 unauthoriBed access

    and even sa*otage. Cirus can spread 3uickly across WAN if it enters

    the central *acking store.

    9ailure o ser$er if a server fails all computer connected with

    server are a?ected.

    "N ,etropolitan "rea Network &AN stands for &etropolitan Area Network. This type of network

    covers an area of a city .&AN is larger than LAN *ut smaller then

    WAN. 6t is usually used to connect two or more LANs in a city or

    town. Telephone companies9 ca*le television operator and other

    organiBations provide users with connections to &AN.

    Syed Fayyaz Ahmed Shah  GCPK-

    [email protected]

  • 8/17/2019 Report on Networking Technologies A

    15/49

    Networking Technologies [2013]

    "#$antages o an ,etropolitan area

    network  &AN can cover a wider area than a LAN. &AN networks are

    usually operated at airports9 or a com*ination of several pieces at a local

    school. y running a large network connectedness9 information can *e

    disseminated more widely9 rapidly and signi@cantly. =u*lic li*raries and

    government agencies typically uses a wan.

    /isa#$antages "N

    &AN will only apply if the personal computer or a terminal can compete. 6f 

    a personal computer is used as a terminal9 move the @le (@le transfer

    software) allows users to retrieve @les (downloaded) from the hose or hose

    to deliver the data (upload). ownload @les means open and retrieve data

    from a personal computer to another and deliver the data to the computer

    pertaining re3uested *y the user.

    Network topologiesA network can *e con@gured or arranged in di?erent ways. The physical

    layout or arrangement of connected devices in a network is calledtopology. 6t is the shape of a network. i?erent network topologies are

    as follows:

    *us topolog!

    ing topolog!

    -tar topolog!

    esh topolog!

    Tree topolog!

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    16/49

    Networking Technologies [2013]

    *us topolog!

    us topology is the simplest type of network. 6t supports a smallnum*er of computers. 6n *us topology9 all computer or network nodes

    are connected to a common communication medium. This medium is

    often a central wire known as *us. The terminators are used at the end

    of a *us to a*sor* signals.

    Working o &us topolog!

     The sending computer sends the data and destination address through

    the *us. The data and address move from one computer to the other in

    network. #ach computer checks the address . if it matches with the

    address of a computer 9 the computer keeps the data. therwise the

    data moves to the ne$t computer.

    "#$antages 

    6t is simple and easy to use. 6t re3uires small length of ca*les to connect computers. 6t is less e$pensive. 6t is easy to e$tend a *us. 6t allows more computers to Doin

    network. 6f one node fails9 it does not a?ect the rest the rest of network.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    17/49

    Networking Technologies [2013]

    /isa#$antages

    6t is di>cult to trou*le shoot. 6t only support small num*er of computers.

    6f num*er of computer increases9 network speed will slow down.

    -tar topolog!

    All computers in star are connected with central

    devise called hu*. +tar topology is mostly used in

    client server networks.

    Working o star network 

     The sending computer sends the data to the hu*. The hu* sends data to

    the receiving computers. #ach computer in star topology communicates

    with a central hu*.

    "#$antages

    6t is easy to maintain and modify network. Adding and removing of computers can *e done easily without

    distur*ing a network. 5inding faults *ecome very simple. +ingle computer failure does not *ring down the whole network.

    6t is more Ee$i*le among the remaining topology.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    18/49

    Networking Technologies [2013]

    /isa#$antages

    6f central hu* fails the entire network fails. 6t re3uires a large length of ca*les to connect computers. 6t is more e$pensive.

    The &est L"N topolog!

    +tar topology is the *est LAN topology. +cala*ility and relia*ility of

    star topology makes it *est topology then the others. 6t is easy to

    remove or add a device in this topology. 6t is easier to trou*leshoot then

    other topologies.

    ing topolog!

    6n this topology9 each computer is connected to the other computer

    with the last one connected to the @rst. Thus a ring of computers is

    formed. 

    Syed Fayyaz Ahmed Shah  GCPK-

    [email protected]

  • 8/17/2019 Report on Networking Technologies A

    19/49

    Networking Technologies [2013]

    Working o ring network 

    #ach computer is connected to ne$t computer in

    ring. #ach computer receives message from previous

    computer and transmit it to the ne$t computer. The

    message Eows in one direction. The message is

    passed around the ring.

  • 8/17/2019 Report on Networking Technologies A

    20/49

    Networking Technologies [2013]

    "#$antages o a tree topolog!

    6t provides point to point wiring for individual segments.

    6t is supported *y several hardware and software vendors.

    /isa#$antages

    verall length of each segment is limited *y the type of ca*ling

    used. 6f the *ack *one line *reaks9 the entire segment goes down. 6t is more di>cult to con@gure and wire then other topologies.

    esh topolog!

    6n a mesh topology9 every devise in the network is physically

    connected to every other devise in the network. A message can *e sent

    on di?erent possi*le paths from source to destination. &esh topology

    provides improved performance and relia*ility. &esh networks are not

    used much in local area networks. 6t is mostly used in wide area

    networks.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    21/49

    Networking Technologies [2013]

    "#$antages

     The use of dedicated link guarantees that each connection can

    carry its own data load.it eliminates tra>c pro*lem. 6f one link *ecomes unusa*le9 it does not harm the entire system. 6t is easy to trou*le shoot. isadvantages A full mesh network can *e very e$pensive. 6t is di>cult to install and recon@gure.

    Task 1.2

     #valuate the impact of wireless technology and its associated

    communication protocols and standards.

    Wireless technolog!

    Wireless is a term used to descri*e telecommunications in which

    electromagnetic waves (rather than some form of wire) carry the signal

    over part or the entire communication path. +ome monitoring devices9

    such as intrusion alarms9 employ acoustic waves at fre3uencies a*ove the

    range of human hearingG these are also sometimes classi@ed as wireless.

     The wireless method of communication uses low4powered radio waves to

    transmit data *etween devices. ;igh powered transmission sources

    usually re3uire government licenses to *roadcast on a speci@c

    wavelength. This platform has historically carried voice and has grown

    into a large industry9 carrying many thousands of *roadcasts around the

    world. adio waves are now increasingly *eing used *y unregulated

    computer users.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    22/49

    Networking Technologies [2013]

    ;umans communicate in order to share knowledge and e$periences.

    2ommon forms of human communication include sign language9 speaking9

    writing9 gestures9 and *roadcasting. 2ommunication can *e interactive9

    transitive9 intentional9 or unintentionalG it can also *e ver*al or nonver*al.

    6n addition9 communication can *e intrapersonal or interpersonal.

     The @rst wireless transmitters went on the air in the early %"th century

    using radiotelegraphy (&orse code). Later9 as modulation made it possi*le

    to transmit voices and music via wireless9 the medium came to *e called

    Hradio.H With the advent of television9 fa$9 data communication9 and the

    e?ective use of a larger portion of the spectrum9 the term HwirelessH has

    *een resurrected.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    23/49

    Networking Technologies [2013]

    Common e)amples o wireless

    e%uipment in use to#a! relate# to

    telecommunication

    2ellular phones and pagers: provide connectivity for porta*le and

    mo*ile applications9 *oth personal and *usiness Ilo*al =ositioning +ystem (I=+): allows drivers of cars and trucks9

    captains of *oats and ships9 and pilots of aircraft to ascertain their

    location anywhere on earth 2ordless computer peripherals: the cordless mouse is a common

    e$ampleG key*oards and printers can also *e linked to a computer

    via wireless 2ordless telephone sets: these are limited4range devices9 not to

    *e confused with cell phones emote garage4door openers: one of the oldest wireless devices

    in common use *y consumersG usually operates at radio

    fre3uencies. +atellite television: allows viewers in almost any location to select

    from hundreds of channels Wireless LANs or local area networks: provide Ee$i*ility and

    relia*ility for *usiness computer users Wireless technology is rapidly evolving9 and is playing an

    increasing role in the lives of people throughout the world. 6n

    addition9 ever4larger num*ers of people are relying on the

    technology directly or indirectly. (6t has *een suggested that

    wireless is overused in some situations9 creating a social

    nuisance.) Ilo*al +ystem for &o*ile 2ommunication (I+&): a digital mo*ile

    telephone system used in #urope and other parts of the worldG

    the de facto wireless telephone standard in #urope

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    24/49

    Networking Technologies [2013]

    Ieneral =acket adio +ervice (I=+): a packet4*ased wireless

    communication service that provides continuous connection to

    the 6nternet for mo*ile phone and computer users #nhanced ata I+& #nvironment (#I#): a faster version of the

    Ilo*al +ystem for &o*ile (I+&) wireless service ce9 home9 or vehicleGe$amples include handheld cell phones and =2+ units

     The use of devices that convey data via 6 (infrared) radiationG

    employed in certain limited4range communications and control

    systems.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    25/49

    Networking Technologies [2013]

    Wi'9i

    W6456 is a popular networking technology that uses radio waves to provide

    high speed wireless connections. 6t identi@es any network *ased on

    0"%.!! series of network standards. These standards specify how two

    wireless devices communicate with each other using air.

      Wi45i is also called wireless #thernet *ecause it uses similar

    techni3ue as #thernet standard to specify the wireless network

    con@guration. That is why Wi45i network can easily *e integrated with

    #thernet networks. &ost computers and smart phones are Wi45i ena*led.

      An e$ample of W6456 network is the hotspotsF. A hotspot can *e used

    *y a mo*ile user to connect to the internet using wi4@ ena*led computers

    and devices. Wi@ can also *e used to connect computers wirelessly at

    home and small *usiness. The distance *etween di?erent computers or

    devices can *e upto '"" feet in open areas and a*out !"" feet in closed

    ares.

      6### 0"%.!! is the standard that speci@es connectivity for wireless

    networks. 6### 0"%.!!9or Wi45i9 refers to the collective group of standards

    J0"%.!!a9 0"%.!!*9 0"%.!!g9 and 0"%.!!n. These protocols specify the

    fre3uencies9 speeds9 and other capa*ilities of the di?erent standards.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    26/49

    Networking Technologies [2013]

    Wi'9i stan#ar#s

     0"%.!!a: evices conforming to the 0"%.!!a standard allowWLANs to achieve data rates as high as , &*ps. 6### 0"%.!!a

    devices operate in the ,4I;B radio fre3uency range and within a

    ma$imum range of !," feet (,./ m).  0"%.!!*: 0"%.!!* operates in the %.4I;B fre3uency range9 with

    a ma$imum theoretical data rate of !! &*ps. These devices

    operate within a ma$imum range of '"" feet (1! m). 0"%.!!g: 6### 0"%.!!g provides the same theoretical ma$imum

    speed as 0"%.!!a9 which is , &*ps9 *ut operates in the same

    %.4I;B spectrum as 0"%.!!*.

  • 8/17/2019 Report on Networking Technologies A

    27/49

    Networking Technologies [2013]

    &any mo*ile devices have *uilt4in W6&A7 capa*ility such as smart

    phones.

      Two types of W6&A7 speci@cations include @$ed wireless and mo*ile

    wireless.

    9i)e# wireless W+": it allows a user to access the internet

    using desktop computer from a permanent location. 6t provides data

    transfer rate up to ', &*ps.

    o&ile wireless W+": it allows the user to access W6&A7

    network with mo*ile computers and mo*ile devices. 6t provides data

    transfer rate up to !% &*ps.

    *luetooth

     luetooth is a wireless networking technology designed for very short4

    range connections (typically Dust a few metres).

     The idea of luetooth is to get rid of the need for all of those ca*les (e.g.

  • 8/17/2019 Report on Networking Technologies A

    28/49

    Networking Technologies [2013]

    "pplication la!er protocols

    Application layer protocols provide network services to user applications

    such as we* *rowsers and e4mail programs. ;ere are some of the

    application protocols that operate at the T2=86= application layer:

     

    !perte)t Transer 5rotocol ,TT5 governs how @les such as

    te$t9 graphics9 sound9 and video are e$changed on the 6nternet or World

    Wide We* (WWW). ;TT= is an application layer protocol. A we* server

    runs an ;TT= service or daemon. A daemon is a program that services

    ;TT= re3uests. These re3uests are transmitted *y ;TT= client software9

    which is another name for a we* *rowser.

    Telnet is an application that you can use to access9 control9 and

    trou*leshoot remote computers and network devices.

    9ile Transer 5rotocol ,9T5 is a set of rules governing how @les

    are transferred. 5T= allows multiple simultaneous connections to remote

    @le systems.

    -imple ail Transport 5rotocol ,-T5 provides messaging

    services over T2=86= and supports most 6nternet e4mail programs.

    /omain Name -!stem ,/N-) translates domain names9 such as

    www.cisco.com9 to 6= addresses.

    !perte)t ark up Language ,TL is a page description

    language. We* designers use ;T&L to indicate to we* *rowser software

    how the page should look. ;T&L includes tags to indicate *oldface anditalic type9 line *reaks9 paragraph *reaks9 hyperlinks9 and insertion of

    ta*les9 among other instruction.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    29/49

    Networking Technologies [2013]

    +mpact o wireless technolog! on

    societ!

    2ell phones arenFt the only maDor part of wireless communicationG the

    recent e$pansion of wireless internet has ushered in a whole new

    spectrum of conveniences and concerns. Wireless conferences and

    *oardroom meetings across airwaves have saved e$ecutives much trou*le

    in traveling via airplanes or driving. A company now has the a*ility to

    make transactions and decisions with another company halfway aroundthe world without leaving their *uilding. The *ene@ts of such a powerful

    tool are great for keeping in touch with long distance contacts9 *ut as with

    any other tool there are costs that accompany those *ene@ts.

      +imilar to cell phone usage9 not all of the e?ects of

    e$tensive use of wireless internet have *een researched. The *ene@ts of

    wireless internet are minimiBing space and clutter with much greater

    mo*ility9 *ut the social implications and health e?ects have *een thecenter of much controversy. ne pro*lem that wireless internet *rings up

    is who is ultimately responsi*le for the use of this technology. ecause it

    has *een in e$istence for only a short time there has not *een a thorough

    study on what e?ects wireless fre3uencies sent across free space have on

    people. Wi45i detectors or @nders scan a particular location for radio

    fre3uencies and show the user the strength of a signal. The main concern

    for some is that these fre3uencies *roadcasted are too close to those ofradio fre3uencies and emit small amounts of radiation Dust like cell

    phones.

    2ritics of this technology argue that *ecause there are virtually no legal

    restrictions on the use of wireless internet in workplaces9 schools9 and in

    homes9 there are people who are unknowingly e$posed to the radiation.

     These people are often not informed a*out the possi*le dangers of

    Syed Fayyaz Ahmed Shah  GCPK-

    [email protected]

  • 8/17/2019 Report on Networking Technologies A

    30/49

    Networking Technologies [2013]

    e$tensive e$posure to wireless devices emitting radiation9 and they have

    no control over the use of such devices. The legislation for this

    technology fails to keep companies accounta*le during research and

    development of their products *ecause of the rapid changes and

    advancements made in wireless internet.

    With the development and e$pansion of wireless internet9 personal

    privacy and copyrights have *ecome a topic of controversy in recent years

    as well. 6n !1109 the igital &illennium Act *ecame the @rst maDor

    legislation measure taken *y record companies against copyright

    violations. 5urther restrictions and cracking down on piracy have recently

    *een dealt out on home users. +ome users of wireless internet for

    personal use argue that there are cases where hackers crack into wireless

    systems and manipulate systems9 which makes catching such criminals

    di>cult. The ethical solution to such an intangi*le pro*lem is complicated

    *ecause simply creating more laws and regulations will stiEe certain

    freedoms in using wireless internet. There are proposals to construct

    small communities of wireless internet 6= addresses *ut with each new

    security in wireless internet there are hackers @nding ways around it and

    gaining access to sensitive information. The cost4*ene@t analysis of

    solving the security and social concerns is currently *eing addressed *y

    researchers and wonFt *e complete until years down the road. 5or the

    time *eing we can see from the guru of o>ce space that the advance

    technology of wireless networks and communication has its

    suscepti*ilities.

    Task 1.3

    iscuss how the most common protocol4 2+&A82 manages network

    access from multiple devices and networking systems.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    31/49

    Networking Technologies [2013]

    What is C-"',C";C/ an#7 how #oes it

    work<

     A 2+&A82 stands for 2arrier +ense &ultiple Access with 2ollision

    etection. 6t is a mechanism used in the half4duple$ communication mode

    to help multiple =28node to access the channel with a minimum delay

    time.

    What is a #ata collision<

     When =24 tries to initiate8send a data to =24A via hu* (a half4duple$

    device) through itFs connected channel to hu*9 if some other data tra>c of 

    some other =2 in the network is already coming down in the same channel

    through the hu* down to =24A9 then the data hit each other and form a

    collision.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    32/49

    Networking Technologies [2013]

    ow #oes a C-";C/ #etects an#

    a$oi#s #ata collision <

    +ince9 2+&A82 is a &edia Access 2ontrol mechanism9 whenever any =2

    wants to send a data9 it @rst sends out a dummy electrical signal into the

    channel to check whether any incoming data tra>c is coming down or the

    line is free. 6f the tra>c is already coming down9 then the dummy signal

    collides with the incoming tra>c and sends *ack a Dam signal to the =2 so

    that9 the =2 is noti@ed to hold its tra>c for a random amount of time

    *efore attempting to send the data again. This process will continue until

    the line8channel *ecomes free. The moment line is freeG the =2

    immediately initiates8send its data to the intended destination. This is how

    the data collision is avoided in half4duple$ channels.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    33/49

    Networking Technologies [2013]

    Learning outcome two

    Task 2.1 Client ;ser$er sotware

     -witches

     u&

     outers

     epeaters

     Networking Ca&lesTask 2.2  -er$ers

     T!pes o ser$ers

    Task 2.3  ar#ware components

      Workstation

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    34/49

    Networking Technologies [2013]

    Learning outcome twoTask one

     The networking hardware and software complement each other to provide

    3uality of service to the network users. #$plain the role of client and

    server software to manage network hardware such as switches9 hu*s9

    repeaters9 and routers.

    Client ; ser$er sotware

    6n a client8server network9 the client re3uests information or services

    5rom the server. The server provides the re3uested information or service

    to the client. +ervers on a client8server network commonly perform some

    of the processing work for client machines9 such as sorting through adata*ase *efore delivering only the records re3uested *y the client.

    ne e$ample of a client8server network is a corporate environment in

    which employees use a company e4mail server to send9 receive9 and store

    e4mail. The e4mail client on an employee computer issues a re3uest to the

    e4mail server for any unread e4mail. The server responds *y sending the

    re3uested e4mail to the client. 6n a client8server model9 the servers are

    Syed Fayyaz Ahmed Shah  GCPK-

    [email protected]

  • 8/17/2019 Report on Networking Technologies A

    35/49

    Networking Technologies [2013]

    maintained *y network administrators. ata *ackups and security

    measures are implemented *y the network administrator. The network

    administrator also controls user access to the network resources. All the

    data on the network is stored on a centraliBed @le server. +hared printers

    on the network are managed *y a centraliBed print server. Network users

    with the proper permissions can access *oth the data and shared printers.

    #ach user must provide an authoriBed username and password to gain

    access to network resources that he or she is permitted to use.

    -witches

    +witch operates at data link

    layer of +6 model. 6t is more

    intelligent device than hu*. 6t

    uses specialiBed hardware called

    an application' speci(c

    integrate# circuit ,"-+C. A+62s can run up to giga*it speeds

    with very low *attery rates. Latency is the time measured from when a

    frame enters a port to the time it e$ists a port.

    A switch connects computers into a network and sends messages

    only to the intended computer. 6t can also handle multiplecommunications channels at the same time. 6t can temporarily segment

    parts of the network with high tra>c from the rest of the network.

    #ach network segment connected to switch must have same type of

    device attached. 6t means that the user can connect an #thernet hu*

    into switch port and then connect multiple #thernet hosts to hu*. ut

    Syed Fayyaz Ahmed Shah  GCPK-

    [email protected]

  • 8/17/2019 Report on Networking Technologies A

    36/49

    Networking Technologies [2013]

    the user cannot mi$ token ring hosts with #thernet on the same

    segment. The type of communication in switch is full duple$.

    u&

    A hu* also called concentrator or multi4station access unit(&Ac at a time.

    outers

    A router is a communication device that connects multiple

    computers or other routers together. 6t connects multiple networks

    Syed Fayyaz Ahmed Shah  GCPK-

    [email protected]

  • 8/17/2019 Report on Networking Technologies A

    37/49

    Networking Technologies [2013]

    using similar or di?erent protocols. 6t manages the *est route *etween

    two communication networks. outers are used when several networks

    are connected together. They can connect networks of di?erent

    countries. They transfer data in less time. The router is an intelligent

    device. 6t uses algorithms to @nd out the *est paths to transfer data to a

    network.

    Networking ca&les

    Networking 2a*les are used to connect one

    network device to other or to connect two or more

    computers to share printer9 scanner etc...

      There are many types of ca*les *ased on

    their material used inside coa$ial ca*le9 5i*er optic

    wires.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    38/49

    Networking Technologies [2013]

    =se o networking ca&les

      Networking ca*les are used to connect one network device to

    other network devices or to connect two or more computers to

    share printer9 scanner etc. i?erent types of network ca*les like 2oa$ial

    ca*le9 ptical @*er ca*le9 Twisted =air ca*les are used depending on the

    networkKs topology9 protocol and siBe. The devices can *e separated *y a

    few meters (e.g. via #thernet) or nearly unlimited distances (e.g. via the

    interconnections of the 6nternet).

    epeaters

    A repeater is a network device that retransmits a received signal with

    more power and to an e$tended geographical or topological network

    *oundary than what would *e capa*le with the original signal.

    A repeater is implemented in computer networks to e$pand the

    coverage area of the network9 repropagate a weak or *roken signal andor service remote nodes. epeaters amplify the received8input signal to a

    higher fre3uency domain so that it is reusa*le9 scala*le and availa*le.

    epeaters were introduced in wired data communication networks due

    to the limitation of a signal in propagating over a longer distance and

    now are a common installation in wireless networks for e$panding cell

    siBe.

    =se o repeaters

    epeaters are used to increase the range of a transmitted signal *y

    re4transmission. 5or a conducted signal9 an ampli@er is used. ptical

    systems donKt amplify *ut all these devices give the appearance of doing

    so.

     Syed Fayyaz Ahmed Shah

      [email protected]

    http://en.wikipedia.org/wiki/Printer_(computing)http://en.wikipedia.org/wiki/Image_scannerhttp://en.wikipedia.org/wiki/Coaxial_cablehttp://en.wikipedia.org/wiki/Coaxial_cablehttp://en.wikipedia.org/wiki/Optical_fiber_cablehttp://en.wikipedia.org/wiki/Twisted_Pairhttp://en.wikipedia.org/wiki/Network_topologyhttp://en.wikipedia.org/wiki/Network_Protocolshttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Printer_(computing)http://en.wikipedia.org/wiki/Image_scannerhttp://en.wikipedia.org/wiki/Coaxial_cablehttp://en.wikipedia.org/wiki/Coaxial_cablehttp://en.wikipedia.org/wiki/Optical_fiber_cablehttp://en.wikipedia.org/wiki/Twisted_Pairhttp://en.wikipedia.org/wiki/Network_topologyhttp://en.wikipedia.org/wiki/Network_Protocolshttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Internet

  • 8/17/2019 Report on Networking Technologies A

    39/49

    Networking Technologies [2013]

    Task 1.2

    iscuss how di?erent types of servers e.g. @rewall9 email9 we* and @le

    servers. Also9 discuss the factors for the choice of server types

    -er$ers

    +ervers are the most power full and e$pensive computers in the

    network. They serve di?erent networks users and assist them to

    accomplish a variety of tasks. The num*er and types of servers on a

    client8server network depend on the network siBe and work load.

    /i>erent t!pes o ser$ers

    6'mail ser$ers A type of servers that handles a large volume

    of incoming9 outgoing and internal e4mail is called e4mail server. 6t

    remains connected to the internet. 6t may *e located at any place in

    the world.

    9ile ser$er @le server store and manage @les for network users.

    n cooperate networks9 employees are provided with space on a @le

    server to store @les.

    We& ser$era type of server that is used to host a we* site

    availa*le through the internet is called we* server. We* servers run

    specialiBed software that ena*les them to host we* pages.

    /ata &ase ser$er a type of server that manages the data*ase

    of an organiBation is called data*ase server. 6t is dedicated to

    data*ase storage 93ueries and retrievals etc.

    9irewall ser$er a @rewall server is used for the protection and

    security enhancements.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    40/49

    Networking Technologies [2013]

    5rint ser$er A computer in a network that controls one or more

    printers. The function is typically part of the operating system *utmay *e an add4on utility that stores the print4image output from

    usersK machines and feeds it to the printer one Do* at a time. The

    computer and its printers are known as a Hprint serverH or a @le

    server with Hprint services.H

    Task 1.3

    iscuss how the workstation hardware such as memory9 processor9

    and 68 devices are inter4dependent with network components

    ar#ware Components

    Networking hardware includes all computers9 peripherals9 interface

    cards and other e3uipment needed to perform data4processing and

    communications within the network.

    What are +5 cameras an# what the! #o

    6nternet protocol cameras send and receive data over LAN. ecuase of

    this ip cameras have images that can potentially *e viewed from any

    where in the world. Technically we* cams are 6= cameras *ut usually the

    term is used to descri*e security cameras. These cameras do not use a

    video ca*le to monitor nor they use C. 6nstead 6= cameras use data

    connections such as

  • 8/17/2019 Report on Networking Technologies A

    41/49

    Networking Technologies [2013]

    e3uipment needed to this is found with in the camera it self. They are also

    often connected to storage devices on the network. They capture an

    image Dust like a digital camera would do. ;owever it is then a*le tocompress the @le and send it through network. 6f a *uilding has a network9

    then there is no need for any infrastructure. 6t is possi*le to add a num*er

    of cameras to a decentraliBed network. Where they have their own

    storage device and control interface. 6n this case it may *e necessary

    invest an NC as well. NCFs store images that the network cameras

    capture and allow people to view the images from multiple cameras in one

    go. This allows for centraliBed remote viewing.

    Workstation A workstation is a server which is properly e3uippedwith all the necessary network cards and software it is the machine used

    *y humans to manage the entire network and its devices from this

    machine everything can *e controlled and set of rules are de@ned for each

    computer.

    A workstation has further many types which are as following:

    &o*ile Workstations ;andheld Workstations 5i$ed Workstations 2onsole Workstations

    Learning outcome three

     Task !

    esigning a small LAN Network *ased on the scenario provided

    +cenario:

     ou have *een appointed as a network

    engineer in a newly esta*lished company.

     The company head has asked you to create

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    42/49

    Networking Technologies [2013]

    a small o>ce LAN which should connect three computers and a printer.

     The company head has given you the Ee$i*ility to choose from the

    standard devices and e3uipment re3uired to design9 implement and testan o>ce LAN. ;owever9 he wants you to consider following factors in the

    design the o>ce LAN:

    ata +peed 2ost #ase of implementation and management Appearance Access and security

     ou should make assumptions of the a*ove factors such as what should *e

    the data speed9 cost9 security considerations9 and so on.

    /esigning 5hase

    6f we look at the given scenario it is clear that the network re3uirement is

    of a small LAN network which is of three computers and a printer

    connected to it. And we are free to select standard devices and

    e3uipments.

    9easi&ilit! eport

    5irst of all we should visit the site itself where the network is a*out to *e

    implemented it is very important to know for what we are dealing with

    and 6t is good to know the conditions so @rst of all 6 visited the site myself and saw the plan and then after discussing with the o>cer in charge and

    asking the accurate and positive re3uirements and what are the

    e$pectations that they are seeking in the network they want to *e

    designed hence it allowed me to *etter realiBe the actual scenario and for

    what things should 6 follow and consider *efore designing the network

    *ecause the main and important phase is the designing and the entire

    Syed Fayyaz Ahmed Shah  GCPK-

    [email protected]

  • 8/17/2019 Report on Networking Technologies A

    43/49

    Networking Technologies [2013]

    networks depends upon it while implementation is Dust a period of time

    and to give a shape to your *lue prints.

      The room was Dust like a hall to me and the dimensions are as

    following '" into -" and then later during my conversation with the >cer

    in charge he demonstrate that the employees *ring out the Wi45i ena*led

    devices which includes a smart phone9 a laptop and sometimes an i=ad or

    i=ods gadgets like that of course these things are irrelevant with the o>ce

    environment for what they were dealing *ut *ecause the company

    doesnMt wants their employees to feel restricted they eventually thought

    of providing the facility hum*ly.

    Now out of the three computers one would *e used *y a receptionist and

    would have connection to the internet and data*ase *ehind it for the

    company has a *ackend connected to the main server and while the other

    are to *e used for the other o>ce purposes and documentation while this

    seems a simple LAN network in fact the o>cer in charge also demonstrate

    that he would like to optimiBe the network *andwidth and each computer

    or device connected in the network must have an e3ually internet speed

    and the entire network must work without any Eaws and smoothly and

    along that he also mentioned that the network designed must also

    accommodate the computers to *e connected in future which are

    currently not re3uired *ut may*e in a future it might *e possi*le.

    Now for the tasks for what the computers would *e used 6 think 6ntel

    processors are the perfect choice to select *ecause it is a dual core and

    each single core deals two threads at a time and it has an em*edded

    graphic card i.e. 6ntel ; """ which is a lot capa*le of performing some

    neat graphical tasks. And looking at the data they might store 6 would

    suggest them to have a '%"I and a %I A&+ *ecause this seem pretty

    much more than then the re3uired *ut who knows what *e the future

    usage hence if a *udget allows them then a I is a lot prefera*le. Now

    this has *een the con@guration for the systems to *e used *y the

    Syed Fayyaz Ahmed Shah  GCPK-

    [email protected]

  • 8/17/2019 Report on Networking Technologies A

    44/49

    Networking Technologies [2013]

    employers now moving onto the network devices 6 would readily go for a

     T=4L6N switch having si$ giga*it #thernet ports the model not *eing as

    precise to select from *ut for the W6456 6 would select the T=4L6N !"' Wi4

    5i router it provides a '""mp*s speed and three powerful ,d*i antennas

    that have high range and it also has a cer 6n charge demonstrate a computer would *e located at

    the near to the main entrance while the other two would *e apart from it

    and those two would *e *ack to *ack placed. The Wi45i device i.e. T=4L6N

    outer would *e placed in the middle faced down to the ceiling and each

    antenna pointing at di?erent angles *ecause the &6& antennas are mni

    directional which means it transmits signals in a donut like shape it

    wouldnMt a?ect a lot *ut even a less e?ort helps in optimiBing it and for

    connecting it with a socket an e$tension of electric wire would *e used

    which would then lateral *e duck taped and hidden from the visi*ility of

    the people. An #thernet is connected to a node *y some N62 i.e. Network

    interface card it is a =26 device which would power a node to connect it to

    the network.

    9ee#&ack rom the o?cer in chargeAfter chalking out the *lueprint of the network design it was compulsory

    to present it to the o>cer or the person which is concerned and let ;im

    know a*out the deployment and while 6 represented it to the o>cer in

    charge he seemed 3uite satis@ed and was impressed to an e$tent to what

    *ene@ts he would get and how it would facilitate the entire sta? *ut there

    was a

  • 8/17/2019 Report on Networking Technologies A

    45/49

    Networking Technologies [2013]

    security . he didnMt wanted to compromise in it and also he was much

    aware of the hackers. hence 6 e$plained him that adding a few security

    precaution measurements would slow down the network speed and may

    a?ect the entire network to work at a slow speed and the network

    operations wouldnMt *e set to the ma$imum *ut although he didnMt looked

    to *e worry a*out the speed and stated to secure the network at any cost

    and gave it a sudden high priority.

    +o 6 promptly ful@lled the re3uirement he said and 6 ena*led and added

    security features *uilt in to the wireless router and the gateway modem

    for instances 6 secured the wireless network *y ena*ling the A#+ key

    *ecause itMs the advanced version and added the Norton '-" total

    protection *ought a couple of licenses and in fact ' to *e precise and

    installed them into every pc and started updating them.

    Learning outcome o@./etaile# eport an# /ocumentation

    =roduct

    Name

    Puantity 2ost Avail*ilty

    2at-

    Network2a*le

    ne

    complete roll

    None 6n +tock

     Tp4Link

    W!"'

    ! 'Q utsource

    randed

    esktop

    ' ,,"Q #ach utsource

    #rgonomic ' sets of none 6n +tock

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    46/49

    Networking Technologies [2013]

    ey*oards9

    &ouse9chairs R led

    displays

    each

    Norten

    '-" Total

    +ecurity

    ' copies =rices in

    vary

    *etween site

    to site

    utsource

    O ,

    connectors

    =ossi*le a

    doBen

    None 6n +tock

    +creen

    =rotectors

    ' !,Q utsource

    6sta&lishing the Network

    Now that every necessary item on the list is placed at the desired location

    6 connected pcFs with each other with the #thernet ca*le *y

    connecting them with the O , connectors.  The ca*les are well connected.  Oust for checking i checked that every devise is working properly. 6 power on the computer systems and i saw if all the L#s are

    *linking on the routers and the network icon is connected to the

    internet on the pc and if any pro*lem then 6Fll manually con@gure it

    and restarting the pc m then 6 will open the command prompt and

    ping the gateway address and the pcMs connected addresses as

    well. Now every devise is working and well connected now i have to

    install and con@gure a software for the maintenance of a network .

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    47/49

    Networking Technologies [2013]

    And other software that is for e$pert eye point of view is wire shark

    whick checks the network and each node of the network it is good to

    use simple and good in working it checks the activities of the

    network.

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    48/49

    Networking Technologies [2013]

    5inging m! Aatewa! ! Network No#es Connecte#

     Syed Fayyaz Ahmed Shah

      [email protected]

  • 8/17/2019 Report on Networking Technologies A

    49/49

    Networking Technologies [2013]

    2onnecting laptops.