Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Project Report On Connecting Devices Group

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

PROJECT REPORT

ON
“CONNECTING DEVICES IN COMPUTER NETWORKS”

SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR


THE AWARD OF DIPLOMA IN COMPUTER ENGINEERING

SUBMITTED TO MAHARASHTRA STATE BOARD OF


TECHNICAL EDUCATION,MUMBAI

SUBMITTED BY

Sr No. Name of Student(s) Enrollment No.


1. PRIYANKA WARUDKAR 23313400174
2. JAGRUTI GADADE 23313400178
3. RUCHIKA GAJBHIYE 23313400184
4. SHARAN ASEKAR 23313400187
5. TARANJEET SINGH SAGGU 23313400190

GUIDED BY : Mr.Parag Gajbhiye

1
J D COLLEGE OF ENGINEERING & MANAGEMENT
(1201)

CERTIFICATE

THIS IS TO CERTIFY THAT THE PROJECT REPORT ENTITLED “CONNECTING DEVICES IN


COMPUTER NETWORKS” WAS SUCCESSFULLY COMPLETED BY STUDENTS OF FOURTH
SEMESTER DIPLOMA IN COMPUTER ENGINEERING.

PRIYANKA WARUDKAR 23313400174


JAGRUTI GADADE 23313400178
RUCHIKA GAJBHIYE 23313400184
SHARAN ASEKAR 23313400187
TARANJEETSINGH SAGGU 23313400190

IN PARTIAL FULFILLMENT OF THE REQUIRMENTS FOR THE AWARD OF THE DIPLOMA IN


COMPUTER ENGINEERING AND SUBMITTED TO THE DEPARTMENT OF JD COLLEGE OF
ENGINEERING AND MANAGEMENT,NAGPUR WORK CARRIED OUT DURING A PERIOD OF
ACADMEIC YEAR 2023-2024 AS PER CURRICULLUM.

NAME OF GUIDE NAME OF HOD


(MR.PARAG GAJBHIYE) (MR.SWAPNIL WARADE)

2
TEACHER EVALUATION SHEET FOR MICRO PROJECT

COURSE TITLE AND CODE: DCC (DATA COMMUNICATION AND COMPUTER


NETWORK) (22414)

TITLE OF THE PROJECT:CONNECTING DEVICES IN COMPUTER NETWORKS


GROUP NO:07
COs Addressed By The Microrpoject:

CO1: Analyze The Functioning Of Data Comunnication And Computer Data


CO2:
CO3:
CO4:

MARKS:

ROLL NAME OF MARKS MARKS TOTAL REMARK


NO. STUDENTS FOR BASED ON MARKS
GROUP VIVA(04) (10)
WORK(06)
45) PRIYANKA
WARUDKAR
49) JAGRUTI GADADE
55) RUCHIKA GAJBHIYE
58) SHARAN ASEKAR
61) TARANJEETSINGH
SAGGU

NAME AND SIGNATURE OF FACULTY : Mr.Parag Gajbhiye (Lecturer in Computer


Department)

SIGNITURE: 
3
Sr. CONTENTS Page
No. No.
1. ABSTRACTS 5
2. INTRODUCTIONS 6
3. MODULES 7
4. ER DIAGRAM 14
5. HARDWARE REQUIREMENTS 15
6. CONCLUSION 17
7. REFERENCES 18

4
ABSTRACT

Networking devices, in a broader sense, are the end devices that are connected to one another across a

network and allow communication to flow. Hubs, switches, and access points are examples of network

devices. These devices must be set up and have firmware that needs to be updated. They require adequate

bandwidth and consistent connectivity, as well as, preferably, redundant connections in the case that one

or more of the devices or connections fails. This study primarily focuses on the working of the most

commonly used network devices in offices and sometimes in households. Cisco Packet Tracer

simulations are demonstratedfor the working of hubs, switches and access points.

5
INTRODUCTION

Network devices, or networking hardware, are physical devices that are required for communication and

interaction between hardware on a computer network.Computer networks are the backbones of most

business enterprises. Therefore, a proper planning is a must for ensuring proper interconnections of devices

in a network. Shows the advantages and disadvantages of communicating with computer networks as

compared to traditional fax or Telephones Computer networks are classified in terms of various criteria,

Some of these include the medium of transmission used to carry signals (wired of wireless), bandwidth

usage, communications protocols, the number of devices in the network, the network topology, mechanism

employed to control network traffic, and organizational applications. Computer networks are employed in

wide range of applications and services like access to the World Wide Web, Voice overIP (VoIP), audio/video

conferencing etc. The first attempts to standardize computer networks wasin 1977 when International

Organization for Standardization (ISO) founded the Open Systems Interconnection model (OSI

model)Analyzing raw packets or datastreams requires deeper understanding of the OSI or TCP/IP model.

The seven layers described in OSI model laid the foundation for networking. The data-stream in any packet

is divided into frames where each frame corresponds to a layer in the OSI model. TCP/IP model gained

popularity as it combined a few layers into application layer .A bottom-up approach, describing all the

protocols (from physical layer upto application layer) can be seen in Through an in-depth study of TCP/IP

protocol stack principles and ideas along with the actual situation of embedded devices, it can be observed in

that the existing TCP/IP is cut out, and by using the layered, modular design the specific implementation of

the embedded TCP/IP protocol stack is described in detail. As networks progressed from wired networks to

wireless networks, more focus was on the WLAN networks which became a standard which is popularly

known as IEEE 802.11.

6
MODULES
HUBS
Hubs are devices that connect many computer networking devices. A hub also serves as a repeater, amplifying
signals that have deteriorated due to vast distances travelled through connected cables. A hub connects various
LAN components with identical protocols hence it is considered as the simplest networking device. Figure 1
shows the packets received by the hub.

A hub can be configured to support both digital and analog data inputs. The hubs passes the inputs as a packet if
the incoming data is in digital format. If the incoming data is in analogformat then the data is converted to signal
form and then transmitted.

The packets are not filtered by the hubs and the addressing functions also are not differentiated. Figure 2 shows the
packets that are sent through all ports. They directly send data to all connected devices irrespective of the
requirements. The hubs are of two types simple and multiple hubs which operate on physical layer of OSI model.

Fig. 1. Packet Received By Hub

Fig. 2. Packets Sent Through All Port

7
SWITCHES

Switches play a more intelligent role than hubs in most cases. A switch is a device having multi-port that increases the
efficiency of a network. Figure 3 shows the packets being sent to the switch. The routing information about internal
network nodes are limited by the switch and facilitates connections to systems such as hubs and routers. Switches are
commonly used to link LAN strands. In most cases, switches can read the hardware addresses of incoming packets and
forward them to the correct destination. Figure 4 shows that the packets are being sent to only to matching devices.

Switches have the ability to create virtual circuits, they are more efficient than hubs or routers in terms of network
efficiency. Switches also increase network security by making it more difficult to investigate virtual circuits with
network monitors. A switch can be thought of as a device that combines the greatest features of routers and hubs. In
the OSI model, a switch can operate at either the Data Link layer or the Network layer. A multilayer switch is one that
can work on both layers, meaning it may be used as a switch and a router. A multilayer switch is a high-capacity
device that uses the same routing protocols as routers.

Fig. 3. Packet sent to the switch

Fig. 4. Packet sent only to the matching device

8
ACCESS POINT
An Access Point (AP) can be a wired or wireless device, it is most usually used to refer to a wireless
device. The Data Link layer of the OSI model is where the access point operates. It acts as a bridge that
links a wired network to a wireless device. It also supports routers in transmitting data from one point to
another in a network. Figure 5 shows the packets that are sent to AP.

A Wireless LAN (WLAN) is formed by combining a transmitter and a receiver by the Wireless Access
Points(WAPs).A dedicated network devices with a built-in antenna, transmitter, and adaptor are known as
access points. To provide a connection point between WLANs, APs use the wireless infrastructure network
mode. They also contain many ports, allowing users to expand the network to accommodate more clients.
Figure 6 shows that the packets are being broadcasted through the wireless network. One or more APs may
be required to give full coverage, depending on the size of thenetwork. Additional access points are used
to provide access to more wireless clients and to extend the wireless network’s range.

An APs transmission range is the distance a client can be from the AP such that they are still receiving an
acceptable signal. The data processing speed is also regulated by each AP’s transmission range. Figure 7
shows that the desired device responds accordingly. The actual distance between the client and the AP is
determined by the wireless standard, impediments, and ambient circumstances. High-powered antennas on
higher end APs allow them to extend the range of the wireless transmission.

Many ports may be available on APs, which can be utilised to expand the network’s capacity, firewall
capabilities, and Dynamic Host Configuration Protocol (DHCP) service. As a result, we have access points
that operate as a switch, DHCP server, router, and firewall.

A Service Set Identifier (SSID) name is required to connect to a wireless AP. The SSID is used by 802.11
wireless networks to identify all systems that belong to the same network, and client stations must be set
with the SSID in order to connect to the AP. The AP may broadcast the SSID, making it visible to any
wireless clients in the region.

9
Fig. 5. Packet sent to AP

Fig. 6. Broadcast through wireless channel

Fig. 7. Desired device responds

10
• ROUTER
A Router is a networking device that forwards data packets between computer networks. One or
more packet-switched networks or subnetworks can be connected using a router. By sending data packets
to their intended IP addresses, it manages traffic between different networks and permits several devices to
share an Internet connection.

Router determines a packet’s future path by examining the destination IP address of the header and
comparing it to the routing database. The list of routing tables outlines how to send the data to a specific
network location. They use a set of rules to determine the most effective way to transmit the data to the
specified IP address.

To enable communication between other devices and the internet, routers utilize a modem, such as a cable,
fibre, or DSL modem. Most routers include many ports that can connect a variety of devices to
the internet simultaneously. In order to decide where to deliver data and where traffic is coming from, it
needs routing tables.

A routing table primarily specifies the router’s default path. As a result, it might not determine the
optimum path to forward the data for a particular packet. For instance, the office router directs all
networks to its internet service provider through a single default channel.

Static and dynamic tables come in two varieties in the router. The dynamic routing tables are automatically
updated by dynamic routers based on network activity, whereas the static routing tables are configured
manually.

11
FIG.8.WORKING OF A ROUTER

• BRIDGES

The bridge is a networking device in a computer network that is used to connect multiple LANs to a larger
LAN. In computer networks, we have multiple networking devices such as bridges, hubs, routers,
switches, etc, each device has its own specification and is used for a particular purpose. The bridge is a
networking device that connects the larger LAN networks with the group of smaller LAN networks.

The given figure below shows everything about the bridge including what exactly a bridge is, and the type
of bridges we have in computer networks including transparent bridges, source routing bridges, and
translational bridges, which will be followed by advantages and disadvantages of the bridge in
networking. then how the bridge is different from the gateway and last we will look into the applications
and functions of the bridge in the network.

12
FIG.9.WORKING OF A BRIDGE

Types of Bridges:

There are three types of bridges in computer networks, which are as follows:

1. Transparent bridge

2. Source routing bridge

3. Translational bridge

13
ER DIAGRAM

14
HARDWARE REQUIRMENT

• Devices: These could be desktops, laptops, or other computing devices that will
be part of the network.

Dekstop Specification:
1. Intel i5 or higher (or equivalent)
2. 32bit or 64bit Windows 10 or 11
3. No minimum memory or graphics capability - whatever Windows will comfortably run on
4. 200Mb free hard disk space for the program and supporting files
5. 2.5Gb of free disk space for the installation of movie tutorials (optional)
6. 1366x768 resolution screen

Laptop Specification:
1. Intel i5 or equivalent
2. Windows 10 Operating System
3. Minimum Memory Of 8Gb Or More
4. Hard Drive Of 80 To 120 Gb Space Or Larger

• Networking hardware: A router and a switch are fundamental.

Router Specification:
1. Antennas: One antenna, two antennas, three antennas, four antennas
2. Frequency channels: Battle of the bands
3. Wireless standard: The ABCs of 802.11
4. Speed: The tortoise, the hare, and Mbps
5. Security: WEP, WPA, and WPA2

• Cables: Ethernet cables are needed for wired connections.

Ethernet Cables Specifications:


1. Security: WEP, WPA, and WPA2
2. 100BASE-T4 adapters
3. Connecting two stations without a switch
4. Link integrity

15
• Wired LAN: Ethernet cables connect devices to the switch and router.

Switch Specifications:
1. Switch Size:1x8
2. Switching Speed:Less Than 10nsec
3. Slot Number:4000 Configuration
4. Slot Period:From 1Hz To 100Mhz

Router Parameters:
Parameter Name Value
Power Up 64ms
Initial Cofiguration 139 μs
Neighbor Update 7.5ms
CPU Speed 5MIPS
Operating Temperature -40°C To 125°C
Operating Voltage 2V To 5.5V
Pin Count 8
Package Type Soic-8

16
CONCLUSION

Computer communication has laid the foundation for a completely new . Having a strong understanding of
the types of network devices accessible will assist users in designing and constructing a secure network.
Every organization has a dedicated IT department where good knowledge on networking is crucial.
Whenever network issues arise, experience with network devices comes in handy. This study primarily
focuses on the working of the most commonly used network devices in offices and sometimes in households.

Hubs are the basic devices operating on the physical layer of the OSI model. Hubs consists of physical ports,
generally ethernet ports, where the information sent on one port is blindly repeat the packets onto all the
other ports. Hubs are cheap devices, but they waste a lot of bandwidth as devices are often forced to wait for
the undesired packets to be streamed inorder to avoid collision.Switches solves the issues posed by hubs by
associating the mac address of a device with the ethernet port it is connected to. Switches operate on the
datalink layer and cannot read layer 3 data such as IP address. Access Points are network layer devices
which provides both wired and wireless connectivity among devices in a network. As demonstrated by Cisco
Packet Tracer simulations, APs broadcast the packets in wireless channels. Common channel bands used by
APs are 2.4 GHz and 5 GHz.

17
REFERENCES

[1] Wikipedia contributors, 2021. Networking hardware Wikipedia, the free encyclopedia.

[2] Chou, C., 1997. “Computer networks in communication survey research”. IEEE Transactions on Professional
Communication, 40(3), pp. 197–208.

[3] Wikipedia contributors, 2021. Computer network — Wikipedia, the free encyclopedia. [Online; accessed 15-June-
2021].

[4] Balasubramaniam, D., 2015. “Computer networking: A survey”. International Journal of Trend in Research and
Development,, 2, 09.

[5] Li, Y., Li, D., Cui, W., and Zhang, R., 2011. “Research based on osi model”. In 2011 IEEE 3rd International
Conference on Communication Software and Networks, pp. 554–557.

[6] RiLi, H., 2011. “Research and application of tcp/ip protocol in embedded system”. In 2011 IEEE 3rd International
Conference on Communication Software and Networks, pp. 584–587.

[7] Stevens, W. R., and Fall, K., 2009. TCP/IP Illustrated: The Protocols v. 1, 2nd ed. Addison-Wesley Publishing
Company, USA.

[8] Li, Y., and Fu, Y., 2012. “Research and improvement on ieee 802.11 wlan mac protocol”. In 2012 Fourth
International Conference on Computational and Information Sciences, pp. 827–829.

[9] Cocco, G., Ibars, C., Gu¨ndu¨z, D., and Herrero, O., 2011. “Collision resolution in multiple access networks
with physical-layer network coding and distributed fountain coding”. pp. 3120 – 3123.

18
[10] Glisic, S., 2016. Access Point Selection. 05, pp. 446– 477.

[11] Vasudevan, S., Papagiannaki, K., Diot, C., Kurose, J., and Towsley, D., 2005. “Facilitating access point selection
in ieee 802.11 wireless networks”. pp. 293–298. [12] Judd, G., and Steenkiste, P., 2002. “Fixing 802.11 access point
selection”. Computer Communication Review, 32, 07, p. 31.

19

You might also like