Professional Documents
Culture Documents
A Practical Assignment of 'Computer Networks and Internet - 16IMG22C5'' Submitted in Partial Fulfilment of The Award of MBA 2.2 Session (2020-2021)
A Practical Assignment of 'Computer Networks and Internet - 16IMG22C5'' Submitted in Partial Fulfilment of The Award of MBA 2.2 Session (2020-2021)
A Practical Assignment of 'Computer Networks and Internet - 16IMG22C5'' Submitted in Partial Fulfilment of The Award of MBA 2.2 Session (2020-2021)
LAN provides a useful way of sharing the resources between end users. The
resources such as printers, file servers, scanners, and internet are easily sharable
among computers.
Metro Ethernet is a service which is provided by ISPs. This service enables its users
to expand their Local Area Networks. For example, MAN can help an organization to
connect all of its offices in a city.
WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM),
Frame Relay, and Synchronous Optical Network (SONET). WAN may be managed
by multiple administrations.
Computer Network Topology
A Network Topology is the arrangement with which computer systems or network devices
are connected to each other. Topologies may define both physical and logical aspect of the
network. Both logical and physical topologies could be same or different in a same network.
Point-to-Point
Point-to-point networks contain exactly two hosts such as computer, switches or routers,
servers connected back to back using a single piece of cable. Often, the receiving end of
one host is connected to sending end of the other and vice-versa.
If the hosts are connected point-to-point logically, then may have multiple intermediate
devices. But the end hosts are unaware of underlying network and see each other as if they
are connected directly.
Bus Topology
In case of Bus topology, all devices share single communication line or cable. Bus topology
may have problem while multiple hosts sending data at the same time. Therefore, Bus
topology either uses CSMA/CD technology or recognises one host as Bus Master to solve
the issue. It is one of the simple forms of networking where a failure of a device does not
affect the other devices. But failure of the shared communication line can make all other
devices stop functioning.
Both ends of the shared channel have line terminator. The data is sent in only one direction
and as soon as it reaches the extreme end, the terminator removes the data from the line.
Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a
point-to-point connection. That is, there exists a point to point connection between hosts and
hub. The hub device can be any of the following:
As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to
all other hosts fails. Every communication between hosts, takes place through only the hub.
Star topology is not expensive as to connect one more host, only one cable is required and
configuration is simple.
Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating a
circular network structure. When one host tries to communicate or send message to a host
which is not adjacent to it, the data travels through all intermediate hosts. To connect one
more host in the existing structure, the administrator may need only one more extra cable.
Failure of any host results in failure of the whole ring. Thus, every connection in the ring is a
point of failure. There are methods which employ one more backup ring.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts. This topology has hosts
in point-to-point connection with every other host or may also have hosts which are in point-
to-point connection to few hosts only.
Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-
point links. Mesh technology comes into two types:
Full Mesh: All hosts have a point-to-point connection to every other host in the network.
Thus for every new host n(n-1)/2 connections are required. It provides the most reliable
network structure among all network topologies.
Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts
connect to each other in some arbitrarily fashion. This topology exists where we need to
provide reliability to some hosts out of all.
Tree Topology
Also known as Hierarchical Topology, this is the most common form of network topology in
use presently. This topology imitates as extended Star topology and inherits properties of
bus topology.
This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a
network is bifurcated into three types of network devices. The lowermost is access-layer
where computers are attached. The middle layer is known as distribution layer, which works
as mediator between upper layer and lower layer. The highest layer is known as core layer,
and is central point of the network, i.e. root of the tree from which all nodes fork.
All neighbouring hosts have point-to-point connection between them. Similar to the Bus
topology, if the root goes down, then the entire network suffers even. Though it is not the
single point of failure. Every connection serves as point of failure, failing of which divides the
network into unreachable segment.
Hybrid Topology
A network structure whose design contains more than one topology is said to be hybrid
topology. Hybrid topology inherits merits and demerits of all the incorporating topologies.
The above picture represents an arbitrarily hybrid topology. The combining topologies may
contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected
by means of Dual-Ring topology and networks connected to them are mostly Star topology
networks. Internet is the best example of largest Hybrid topology.
Data Transmission
Transmission mode means transferring of data between two devices. It is also
known as communication mode. Buses and networks are designed to allow
communication to occur between individual devices that are interconnected. There
are three types of transmission mode:-
Simplex Mode
Half-Duplex Mode
Full-Duplex Mode
Simplex Mode
In Simplex mode, the communication is unidirectional, as on a one-way street. Only
one of the two devices on a link can transmit, the other can only receive. The
simplex mode can use the entire capacity of the channel to send data in one
direction.
Example: Keyboard and traditional monitors. The keyboard can only introduce input,
the monitor can only give the output.
Half-Duplex Mode
In half-duplex mode, each station can both transmit and receive, but not at the same
time. When one device is sending, the other can only receive, and vice versa. The
half-duplex mode is used in cases where there is no need for communication in both
directions at the same time. The entire capacity of the channel can be utilized for
each direction.
Example: Walkie- talkie in which message is sent one at a time and messages are
sent in both the directions.
Full-Duplex Mode
In full-duplex mode, both stations can transmit and receive simultaneously. In full-
duplex mode, signals going in one direction share the capacity of the link with signals
going in other direction, this sharing can occur in two ways:
Either the link must contain two physically separate transmission paths, one
for sending and other for receiving.
Or the capacity is divided between signals travelling in both directions.
Full-duplex mode is used when communication in both direction is required all the
time. The capacity of the channel, however must be divided between the two
directions.
Example: Telephone Network in which there is communication between two persons
by a telephone line, through which both can talk and listen at the same time.
What is OSI model?
The OSI stands for Open System Interconnection, which was developed in 1980s. It
is a conceptual model used for network communication. It is not implemented
entirely, but it is still referenced today. This OSI model consists of seven layers, and
each layer is connected to each other. The data moves down the OSI model, and
each layer adds additional information. The data moves down until it reaches the last
layer of the OSI model. When the data is received at the last layer of the OSI model,
then the data is transmitted over the network. Once the data is reached on the other
side, then the process will get reversed.
What is TCP/IP model?
The TCP model stands for Transmission Control Protocol, whereas IP stands for Internet
Protocol. A number of protocols that make the internet possibly comes under the TCP/IP
model. Nowadays, we do not hear the name of the TCP/IP model much, we generally hear
the name of the IPv4 or IPv6, but it is still valid. This model consists of 4 layers. Now, we will
look at the diagrammatic representation of the TCP/IP model.
The TCP/IP model has 4 layers, while the OSI model consists of 7 layers. Diagrammatically,
it looks that the 4 layers of the TCP/IP model exactly fit the 7 layers of the OSI model, but
this is not reality. The application layer of the TCP/IP model maps to the first three layers,
i.e., application, session, and presentation layer of the OSI model. The transport layer of the
TCP maps directly to the transport layer of the OSI model. The internet layer of the TCP/IP
model maps directly to the network layer of the OSI model. The last two layers of the OSI
model map to the network layer of the TCP/IP model. TCP/IP is the most widely used model
as compared to the OSI model for providing communication between computers over
the internet.
Both the models are the logical models and having similar architectures as both the models
are constructed with the layers.
Define standards
Both the layers have defined standards, and they also provide the framework used for
implementing the standards and devices.
Both models have simplified the troubleshooting process by breaking the complex function
into simpler components.
Pre-defined standards
The standards and protocols which are already pre-defined; these models do not redefine
them; they just reference or use them. For example, the Ethernet standards were already
defined by the IEEE before the development of these models; instead of recreating them,
models have used these pre-defined standards.
Let's see the differences between the OSI and TCP/IP model in a tabular form:
OSI model has been developed by ISO It was developed by ARPANET (Advanced
(International Standard Organization). Research Project Agency Network).
In the OSI model, the transport layer provides a The transport layer does not provide the
guarantee for the delivery of the packets. surety for the delivery of packets. But still, we
can say that it is a reliable model.
This model is based on a vertical approach. This model is based on a horizontal approach.
In this model, the session and presentation In this model, the session and presentation
layers are separated, i.e., both the layers are layer are not different layers. Both layers are
different. included in the application layer.
In this model, the network layer provides both The network layer provides only
connection-oriented and connectionless service. connectionless service.
Protocols in the OSI model are hidden and can In this model, the protocol cannot be easily
be easily replaced when the technology replaced.
changes.
OSI model defines the services, protocols, and In the TCP/IP model, services, protocols, and
interfaces as well as provides a proper interfaces are not properly separated. It is
distinction between them. It is protocol protocol dependent.
independent.
The usage of this model is very low. This model is highly used.
It provides standardization to the devices like It does not provide the standardization to the
router, motherboard, switches, and other devices. It provides a connection between
hardware devices. various computers.
Inserting table in HTML
The HTML tables are created using the <table> tag in which the <tr> tag is used to
create table rows and <td> tag is used to create data cells. The elements under <td>
are regular and left aligned by default
<html>
<head>
<title>HTML Table Header</title>
</head>
<body>
<table border = "1">
<tr>
<th>Name</th>
<th>Salary</th>
</tr>
<tr>
<td>Ramesh Raman</td>
<td>5000</td>
</tr>
<tr>
<td>Shabbir Hussein</td>
<td>7000</td>
</tr>
</table>
</body>
</html>
Inserting Image in HTML
You can insert any image in your web page by using <img> tag. Following is the
simple syntax to use this tag.
<img src = "Image URL" ... attributes-list/>
The <img> tag is an empty tag, which means that, it can contain only list of
attributes and it has no closing tag.
Example
To try following example, let's keep our HTML file test.htm and image file test.png in
the same directory −
<html>
<head>
<title>Using Image in Webpage</title>
</head>
<body>
<p>Simple Image Insert</p>
<img src = "/html/images/test.png" alt = "Test Image" />
</body>
</html>
APPLICATIONS OF NETWORK
Information Sharing
Information sharing describes “the exchange of data between various organizations,
people and technologies”. There are several types of information sharing:
There is plenty of other information sharing that does not fall under the law and
information sharing is increasing as more networks and organizations connect and
information becomes easier to share across the internet.
Banking
Computers in the banking sector have enhanced customer service and productivity
regarding account management, while streamlining back-office activities. The
biggest impact is in the area of competition. Small banking institutions can access
the same technology as large banking institutions and, therefore, can compete with
them more effectively for business.
Community banks and credit unions utilize their WAN's to transmit data to and from
their branches and carry out daily functions regardless of location. The WAN is often
comprised of public networks, such as the telephone system, leased lines, or
satellites.
Ticket Reservation
Journey by rail has its own charm and glitz. And, railway reservation in India is no
more a hassle. You can go by online train reservation services or any outlet for that
matter. Despite the coming up of cheap fairs in domestic airlines market, a
substantial number of passengers and visitors yet journey by train. However, a train
travel is both safe & comfortable and cheap.
• Provide a reservation system that efficiently serves more than half a million people
each day
• Create a Web site that can accommodate more than one million hits per day
• Government-to-Business (G2B)
• Government-to-Government (G2G)
• Government-to-Employees (G2E)
Within each of these interaction domains, five kinds of activities take place: