A Practical Assignment of 'Computer Networks and Internet - 16IMG22C5'' Submitted in Partial Fulfilment of The Award of MBA 2.2 Session (2020-2021)

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 21

A PRACTICAL ASSIGNMENT OF

‘’Computer Networks and Internet---16IMG22C5’’


Submitted in partial fulfilment of the award of
MBA 2.2
Session (2020-2021)

Submitted To: Submitted By:-


Dr. Pooja Verma Sakshi Ahuja
201010010044
Computer Network
A system of interconnected computers and computerised peripherals such as
printers is called computer network. This interconnection among computers
facilitates information sharing among them. Computers may connect to each other
by either wired or wireless media.

Types of computer Network


Generally, networks are distinguished based on their geographical span. A network
can be as small as distance between your mobile phone and its Bluetooth
headphone and as large as the internet itself, covering the whole geographical world,

Personal Area Network


A Personal Area Network (PAN) is smallest network which is very personal to a user.
This may include Bluetooth enabled devices or infra-red enabled devices. PAN has
connectivity range up to 10 meters. PAN may include wireless computer keyboard
and mouse, Bluetooth enabled headphones, wireless printers and TV remotes.

For example, Piconet is Bluetooth-enabled Personal Area Network which may


contain up to 8 devices connected together in a master-slave fashion.
Local Area Network
A computer network spanned inside a building and operated under single
administrative system is generally termed as Local Area Network (LAN). Usually,
LAN covers an organization’ offices, schools, colleges or universities. Number of
systems connected in LAN may vary from as least as two to as much as 16 million.

LAN provides a useful way of sharing the resources between end users. The
resources such as printers, file servers, scanners, and internet are easily sharable
among computers.

LANs are composed of inexpensive networking and routing equipment. It may


contain local servers serving file storage and other locally shared applications. It
mostly operates on private IP addresses and does not involve heavy routing. LAN
works under its own local domain and controlled centrally.

LAN uses either Ethernet or Token-ring technology. Ethernet is most widely


employed LAN technology and uses Star topology, while Token-ring is rarely seen.

LAN can be wired, wireless, or in both forms at once.


Metropolitan Area Network
The Metropolitan Area Network (MAN) generally expands throughout a city such as
cable TV network. It can be in the form of Ethernet, Token-ring, ATM, or Fiber
Distributed Data Interface (FDDI).

Metro Ethernet is a service which is provided by ISPs. This service enables its users
to expand their Local Area Networks. For example, MAN can help an organization to
connect all of its offices in a city.

Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in


between Local Area Network and Wide Area Network. MAN provides uplink for LANs
to WANs or internet.
Wide Area Network
As the name suggests, the Wide Area Network (WAN) covers a wide area which
may span across provinces and even a whole country. Generally, telecommunication
networks are Wide Area Network. These networks provide connectivity to MANs and
LANs. Since they are equipped with very high speed backbone, WANs use very
expensive network equipment.

WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM),
Frame Relay, and Synchronous Optical Network (SONET). WAN may be managed
by multiple administrations.
Computer Network Topology
A Network Topology is the arrangement with which computer systems or network devices
are connected to each other. Topologies may define both physical and logical aspect of the
network. Both logical and physical topologies could be same or different in a same network.

Point-to-Point
Point-to-point networks contain exactly two hosts such as computer, switches or routers,
servers connected back to back using a single piece of cable. Often, the receiving end of
one host is connected to sending end of the other and vice-versa.

If the hosts are connected point-to-point logically, then may have multiple intermediate
devices. But the end hosts are unaware of underlying network and see each other as if they
are connected directly.

Bus Topology
In case of Bus topology, all devices share single communication line or cable. Bus topology
may have problem while multiple hosts sending data at the same time. Therefore, Bus
topology either uses CSMA/CD technology or recognises one host as Bus Master to solve
the issue. It is one of the simple forms of networking where a failure of a device does not
affect the other devices. But failure of the shared communication line can make all other
devices stop functioning.

Both ends of the shared channel have line terminator. The data is sent in only one direction
and as soon as it reaches the extreme end, the terminator removes the data from the line.
Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a
point-to-point connection. That is, there exists a point to point connection between hosts and
hub. The hub device can be any of the following:

Layer-1 device such as hub or repeater

Layer-2 device such as switch or bridge

Layer-3 device such as router or gateway

As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to
all other hosts fails. Every communication between hosts, takes place through only the hub.
Star topology is not expensive as to connect one more host, only one cable is required and
configuration is simple.
Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating a
circular network structure. When one host tries to communicate or send message to a host
which is not adjacent to it, the data travels through all intermediate hosts. To connect one
more host in the existing structure, the administrator may need only one more extra cable.

Failure of any host results in failure of the whole ring. Thus, every connection in the ring is a
point of failure. There are methods which employ one more backup ring.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts. This topology has hosts
in point-to-point connection with every other host or may also have hosts which are in point-
to-point connection to few hosts only.

Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-
point links. Mesh technology comes into two types:

Full Mesh: All hosts have a point-to-point connection to every other host in the network.
Thus for every new host n(n-1)/2 connections are required. It provides the most reliable
network structure among all network topologies.

Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts
connect to each other in some arbitrarily fashion. This topology exists where we need to
provide reliability to some hosts out of all.
Tree Topology
Also known as Hierarchical Topology, this is the most common form of network topology in
use presently. This topology imitates as extended Star topology and inherits properties of
bus topology.

This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a
network is bifurcated into three types of network devices. The lowermost is access-layer
where computers are attached. The middle layer is known as distribution layer, which works
as mediator between upper layer and lower layer. The highest layer is known as core layer,
and is central point of the network, i.e. root of the tree from which all nodes fork.

All neighbouring hosts have point-to-point connection between them. Similar to the Bus
topology, if the root goes down, then the entire network suffers even. Though it is not the
single point of failure. Every connection serves as point of failure, failing of which divides the
network into unreachable segment.
Hybrid Topology
A network structure whose design contains more than one topology is said to be hybrid
topology. Hybrid topology inherits merits and demerits of all the incorporating topologies.

The above picture represents an arbitrarily hybrid topology. The combining topologies may
contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected
by means of Dual-Ring topology and networks connected to them are mostly Star topology
networks. Internet is the best example of largest Hybrid topology.
Data Transmission
Transmission mode means transferring of data between two devices. It is also
known as communication mode. Buses and networks are designed to allow
communication to occur between individual devices that are interconnected. There
are three types of transmission mode:-

 Simplex Mode
 Half-Duplex Mode
 Full-Duplex Mode

Simplex Mode
In Simplex mode, the communication is unidirectional, as on a one-way street. Only
one of the two devices on a link can transmit, the other can only receive. The
simplex mode can use the entire capacity of the channel to send data in one
direction.
Example: Keyboard and traditional monitors. The keyboard can only introduce input,
the monitor can only give the output.

Half-Duplex Mode
In half-duplex mode, each station can both transmit and receive, but not at the same
time. When one device is sending, the other can only receive, and vice versa. The
half-duplex mode is used in cases where there is no need for communication in both
directions at the same time. The entire capacity of the channel can be utilized for
each direction.
Example: Walkie- talkie in which message is sent one at a time and messages are
sent in both the directions.

Full-Duplex Mode
In full-duplex mode, both stations can transmit and receive simultaneously. In full-
duplex mode, signals going in one direction share the capacity of the link with signals
going in other direction, this sharing can occur in two ways:

 Either the link must contain two physically separate transmission paths, one
for sending and other for receiving.
 Or the capacity is divided between signals travelling in both directions.

Full-duplex mode is used when communication in both direction is required all the
time. The capacity of the channel, however must be divided between the two
directions.
Example: Telephone Network in which there is communication between two persons
by a telephone line, through which both can talk and listen at the same time.
What is OSI model?
The OSI stands for Open System Interconnection, which was developed in 1980s. It
is a conceptual model used for network communication. It is not implemented
entirely, but it is still referenced today. This OSI model consists of seven layers, and
each layer is connected to each other. The data moves down the OSI model, and
each layer adds additional information. The data moves down until it reaches the last
layer of the OSI model. When the data is received at the last layer of the OSI model,
then the data is transmitted over the network. Once the data is reached on the other
side, then the process will get reversed.
What is TCP/IP model?
The TCP model stands for Transmission Control Protocol, whereas IP stands for Internet
Protocol. A number of protocols that make the internet possibly comes under the TCP/IP
model. Nowadays, we do not hear the name of the TCP/IP model much, we generally hear
the name of the IPv4 or IPv6, but it is still valid. This model consists of 4 layers. Now, we will
look at the diagrammatic representation of the TCP/IP model.

The TCP/IP model has 4 layers, while the OSI model consists of 7 layers. Diagrammatically,
it looks that the 4 layers of the TCP/IP model exactly fit the 7 layers of the OSI model, but
this is not reality. The application layer of the TCP/IP model maps to the first three layers,
i.e., application, session, and presentation layer of the OSI model. The transport layer of the
TCP maps directly to the transport layer of the OSI model. The internet layer of the TCP/IP
model maps directly to the network layer of the OSI model. The last two layers of the OSI
model map to the network layer of the TCP/IP model. TCP/IP is the most widely used model
as compared to the OSI model for providing communication between computers over
the internet.

Similarities between the OSI and TCP/IP model


The following are the similarities between the OSI and TCP/IP model: in SQL (Hindi)

Share common architecture

Both the models are the logical models and having similar architectures as both the models
are constructed with the layers.
Define standards

Both the layers have defined standards, and they also provide the framework used for
implementing the standards and devices.

Simplified troubleshooting process

Both models have simplified the troubleshooting process by breaking the complex function
into simpler components.

Pre-defined standards

The standards and protocols which are already pre-defined; these models do not redefine
them; they just reference or use them. For example, the Ethernet standards were already
defined by the IEEE before the development of these models; instead of recreating them,
models have used these pre-defined standards.

Both have similar functionality of 'transport' and 'network' layers

The function which is performed between the 'presentation' and the 'network' layer is


similar to the function performed at the transport layer.

Differences between the OSI and TCP/IP model

Let's see the differences between the OSI and TCP/IP model in a tabular form:

OSI Model TCP/IP Model

It stands for Open System Interconnection. It stands for Transmission Control Protocol.

OSI model has been developed by ISO It was developed by ARPANET (Advanced
(International Standard Organization). Research Project Agency Network).

It is an independent standard and generic It consists of standard protocols that lead to


protocol used as a communication gateway the development of an internet. It is a
between the network and the end user. communication protocol that provides the
connection among the hosts.

In the OSI model, the transport layer provides a The transport layer does not provide the
guarantee for the delivery of the packets. surety for the delivery of packets. But still, we
can say that it is a reliable model.

This model is based on a vertical approach. This model is based on a horizontal approach.

In this model, the session and presentation In this model, the session and presentation
layers are separated, i.e., both the layers are layer are not different layers. Both layers are
different. included in the application layer.

It is also known as a reference model through It is an implemented model of an OSI model.


which various networks are built. For example,
the TCP/IP model is built from the OSI model. It
is also referred to as a guidance tool.

In this model, the network layer provides both The network layer provides only
connection-oriented and connectionless service. connectionless service.

Protocols in the OSI model are hidden and can In this model, the protocol cannot be easily
be easily replaced when the technology replaced.
changes.

It consists of 7 layers. It consists of 4 layers.

OSI model defines the services, protocols, and In the TCP/IP model, services, protocols, and
interfaces as well as provides a proper interfaces are not properly separated. It is
distinction between them. It is protocol protocol dependent.
independent.

The usage of this model is very low. This model is highly used.

It provides standardization to the devices like It does not provide the standardization to the
router, motherboard, switches, and other devices. It provides a connection between
hardware devices. various computers.
Inserting table in HTML
The HTML tables are created using the <table> tag in which the <tr> tag is used to
create table rows and <td> tag is used to create data cells. The elements under <td>
are regular and left aligned by default

<html>

<head>
<title>HTML Table Header</title>
</head>

<body>
<table border = "1">
<tr>
<th>Name</th>
<th>Salary</th>
</tr>
<tr>
<td>Ramesh Raman</td>
<td>5000</td>
</tr>

<tr>
<td>Shabbir Hussein</td>
<td>7000</td>
</tr>
</table>
</body>
</html>
Inserting Image in HTML
You can insert any image in your web page by using <img> tag. Following is the
simple syntax to use this tag.
<img src = "Image URL" ... attributes-list/>
The <img> tag is an empty tag, which means that, it can contain only list of
attributes and it has no closing tag.
Example
To try following example, let's keep our HTML file test.htm and image file test.png in
the same directory −
<html>

<head>
<title>Using Image in Webpage</title>
</head>

<body>
<p>Simple Image Insert</p>
<img src = "/html/images/test.png" alt = "Test Image" />
</body>

</html>
APPLICATIONS OF NETWORK

Information Sharing
Information sharing describes “the exchange of data between various organizations,
people and technologies”. There are several types of information sharing:

• Information shared by individuals (such as a video shared on Facebook or


YouTube).

• Information shared by organizations (such as the RSS feed of an online weather


report).

• Information shared between firmware/software (Such as the IP addresses of


available network nodes or the availability of disk space).

There is plenty of other information sharing that does not fall under the law and
information sharing is increasing as more networks and organizations connect and
information becomes easier to share across the internet.

Banking
Computers in the banking sector have enhanced customer service and productivity
regarding account management, while streamlining back-office activities. The
biggest impact is in the area of competition. Small banking institutions can access
the same technology as large banking institutions and, therefore, can compete with
them more effectively for business.

Community banks and credit unions utilize their WAN's to transmit data to and from
their branches and carry out daily functions regardless of location. The WAN is often
comprised of public networks, such as the telephone system, leased lines, or
satellites.
Ticket Reservation
Journey by rail has its own charm and glitz. And, railway reservation in India is no
more a hassle. You can go by online train reservation services or any outlet for that
matter. Despite the coming up of cheap fairs in domestic airlines market, a
substantial number of passengers and visitors yet journey by train. However, a train
travel is both safe & comfortable and cheap.

The main challenges in front of the Indian railways are:

• Provide a reservation system that efficiently serves more than half a million people
each day

• Ensure maximum uptime so reservation/ticketing/inquiry application is available 24


x7

• Create a Web site that can accommodate more than one million hits per day

• Traveling on High Technology Indian Railways is one of the most advanced


ministries in India, with an innovative and extensive IT environment
Electronic governance
It is the use of a range of modern Information and Communication Technologies
such as Internet, Local Area Networks, mobiles etc. by Government to improve the
effectiveness, efficiency, service delivery and to promote democracy. E-Government
can transform citizen service, provide access to information to empower citizens,
enable their participation in government and enhance citizen economic and social
opportunities, so that they can make better lives, for themselves and for the next
generation.

The primary delivery models of e-Government can be divided into:

• Government-to-Citizen or Government-to-Consumer (G2C)

• Government-to-Business (G2B)

• Government-to-Government (G2G)

• Government-to-Employees (G2E)

Within each of these interaction domains, five kinds of activities take place:

1. Informing the citizen

2. Representing the citizen

3. Encouraging the citizen to vote

4. Consulting the citizen

5. Involving the citizen

The ultimate goal of the E-Government is to be able to offer an increased portfolio of


public services to citizens in an efficient and cost effective manner. E-government
allows for government transparency.

You might also like