ANOTHER COMPUTER.”By Dibas Chakma has been submitted to the Department of Electrical and Electronics Engineering of Daffodil International University in partial fulfillment of the requirements for the degree of Bachelor of Science in Electrical and Electronics. I hereby declare that this project was carried out by me under the supervision of Professor Dr. Fayzur Rahman, Head of EEE Department, for his kind assistance in completing our project and also to the other faculty members and staff of EEE Department of Daffodil International University.
Daffodil International University Figure 4.1: Point to point topology Figure 4.2: Multi Access Topology Figure 4.3: Ring topology.
INTRODUCTION OF COMPUTER NETWORK
Networks are used to
BASIC ELEMENTS OF A COMPUT The basic elements of computer networks
BASIC ELEMENTS OF A COMPUTER NETWORK elements of computer networks
TYPES OF NETWORKS
This ensures that computers and users in one location can communicate with computers and users in other locations.
CAMPUS AREA NETWORK
METROPOLITON AREA NETWORK
A MAN may be owned and operated by a single organization, but will typically be used by many individuals and organizations.
HOME AREA NETWORK (HAN)
GLOBAL AREA NETWORK
WIRELESS LOCAL AREA NETWORK
A WLAN provides wireless network communication over short distances using radio or infrared signals instead of traditional network cables. Clients communicate with the AP using a wireless network adapter similar to a traditional Ethernet adapter. Technologies such as WAP increase the level of security on wireless networks to compete with that of traditional wired networks.
NETWORK MODEL
- THE OPEN SYSTEMS INTERCONNECTION (OSI) MODEL
- TRANSMISSION CONTROL PROTOCOL (TCP) MODEL
In computer science and information and communication technology, the Internet protocol suite is the model of computer networks and communication protocols used by the Internet and similar computer networks. It is commonly known as TCP/IP because its most important protocols, Transmission Control Protocol (TCP) and Internet Protocol (IP), were the first network protocols defined in this standard.
FUNCTION OF NETWORK LAYERS .1 Application Layer Functions
NETWORK LAYERS 2.2.1 Application Layer Functions
- Presentation Layer Function
- Session Layer Function
- Transport Layer Function
- Data Link Layer Function
- Physical Layer Function
- NETWORK PROTOCOLS
- WHAT IS A NETWORK PROTOCOLS
The size and complexity of a transport protocol depends on the type of service it can get from the network layer. If the network layer is unreliable and/or only supports datagrams, the transport protocol must include extensive error detection and recovery. Furthermore, the lower layers are unaware that there are multiple applications sending data over the network.
In other cases, the application may tolerate some data loss while transferring over the network. The network layer or OSI Layer 3 provides services for the exchange of individual pieces of data over the network between identified end devices. After the network layer completes the encapsulation process, the packet is sent to the data link layer to prepare it for transmission over the medium.
Next, the network layer must provide services to route these packets to their destination host. If the address is correct, the packet is decapsulated by the network layer and the Layer 4 PDU contained in the packet is passed to the appropriate service at Transport Layer. Operating without regard to the application data carried in each packet, the network layer allows the network layer to carry packets for multiple types of communication between multiple hosts.
The OSI Physical layer provides the means to transport the bits that make up a Data Link layer frame over the network media. At this stage of the communication process, the user data is segmented by the Transport Layer, placed into packets by the Network Layer, and further encapsulated as frames by the Data Link Layer.
APPLICATION LAYER PROTOCOLS
This connection is for the actual file transfer and is created every time a file is transferred. The client can download ( server or, the client can upload (push) a file to the server. The client can download (pull) a file from the server or, the client can upload (push) a file to the server.
The FTP client is . the computer used to push and pull files from the server it is running on. This connection is for the actual file download and is created every time a file is downloaded. pull) file from. Both the protocol itself and the client software that implements the protocol are commonly referred to as Telnet.
Instead of using a physical device to connect to the server, Telnet uses software to create a virtual device that provides the same functions as a terminal session with access to the server's command line interface (CLI). A virtual terminal connection is established from an end device using a Telnet client application. Most operating systems include a Telnet client at the application layer. Telnet is a network protocol used on the Internet or local area networks to provide a bi-directional oriented communication facility using a virtual terminal connection.
Instead of using a physical device to connect to the server, Telnet uses software to create a virtual device that provides the same features of a. Once a Telnet connection is established, users can perform any authorized function on the server, just as if they were using a command-line session on the server itself.
HOW TELNET WORKS
TELNET CONNECTION
The new address will simply be linked to the existing domain name and connectivity is maintained. When networks were small, maintaining the mapping between domain names and the addresses they represented was a simple task. However, as networks began to grow and the number of devices increased, this manual system became unworkable.
The Domain Name System (DNS) was created for the domain name to address resolution for these networks. DNS uses a distributed set of servers to resolve the names associated with these numbered addresses. In data networks, devices are labeled with numerical IP addresses so that they can participate in sending and receiving messages over the network.
On the Internet, these domain names, such as www.cisco.com, are much easier for people to remember than what the actual numeric address is for this server. Also, if Cisco decides to change the numeric address, it is transparent to users, starting with the domain name. The Domain Name System (DNS) was created for domain names to address the resolution for these S uses a distributed set of servers to resolve the names associated with these.
The DNS protocol defines an automated service that matches resource names with the requested numeric network address. This message format is used for all types of client queries and server responses, error messages, and the transfer of resource record information between servers.
TRANSPORT LAYER PROTOCOLS
USER DATAGRAM PROTOCOL (UDP)
WHAT IS IP?
A network ID (also known as a network address) identifies systems that are on the same physical network bounded by IP routers. A host ID (also known as a host address) identifies a workstation, server, router, or other TCP/IP host within a network. An IP address consists of 32 bits. Instead of expressing IPv4 addresses 32 bits at a time using binary notation, it is standard practice to segment the 32 bits of an IPv4 address into four 8-bit fields called octets.
The following table provides an example of an IP address in binary and dotted decimal formats. The notation w.x.y.z is used when referring to a common IP address, and is shown in the following figure.
Types of IPV4 Addresses
Types of IPV6 Addresses
NETWORK TOPOLOGY AND CATEGORIES OF NETWORK
- NETWORK TOPOLOGY
- POINT TO POINT TOPOLOGY
- PEER-TO-PEER NETWORK
- SERVER-BASED NETWORK
- INTERNET CONNECTION
A representation of how media is used to interconnect devices is a physical topology. The data link layer "sees" the logical topology of the network when it controls data access to the medium. In data networks with a point-to-point topology, the media access control protocol can be very simple.
A frame places a node on the medium at one end and removes a node from the medium at the other end of the point-to-point circuit. Data from only one node can be placed on media at any time. If many nodes share access to the medium, a data link medium access control method is required to regulate data transmission and thereby reduce collisions between different signals.
A data link layer protocol specifies a medium access control method that will provide If many nodes share access to the medium, a data link medium access control method is required to regulate data transmission and thus reduce collisions between different nodes. The media access control methods used by logical multiple access topologies are typically CSMA/CD or CSMA/CA.
The ta Link layer protocol specifies the media access control method that the. If no data is being transferred, a signal (known as a token) can be placed on the media and a node can only place a data frame on the media when it has the token.
NETWORK FILE/FOLDER SHARING, MAPPING CONCEPT AND IMPLEMENTATION
5.1 .WHAT IS FILE/FOLDER SHARING
- DRIVE MAPPING
- STEPS
- IMPLEMENTATION Folder Sharing
- FINDINGS
- SUCCESS
- ADVANTAGES OF FILE SHARING
- DISADVANTAGES OF FILE SHARING Security problems
- FAILURE
First I need to create a local area network. Because network connection is required for sharing and mapping files and folders. First I have to lock the switch, then connect the computer and switch with the straight ethernet cable. Now click START button and again click CONTROL PANEL, go to NETWORK AND INTERNET.
Figure 5.4: Drive mapping sourov ( Now check the partition and mapping file and folder from pc 2. PC2 can read, write all the files shared by pc1 because pc1 gives the permission. Figure 5.5: File partition by pc1 is shown in pc2 Then click the Start button, then click Computer and click Map network drive.
The program I used in PC1 to do it is to "write a program" to create a data file on PC2's network drive. The program "writes a program to retrieve a data file from another computer's network drive". With file sharing, I can easily back up a file to all computers on the same network.
For a small LAN, file sharing is very popular, but for a large network mapping is essential. In a file sharing environment, a large number of users can access a program as if it were on their local machines, when in fact the program resides on a single file server.