Top Banner
Individual AssignmentHardware Software System and Network PT1182214 INDIVIDUAL ASSIGNMENT PANIPAT CE00382-2-HSSN-2 HARDWARE SOFTWARE SYSTEMS AND NETWORKS 2 PT1182214 HAND OUT DATE: 10 th February 2014 HAND IN DATE: 7 th April 2014 WEIGHTAGE: 30% INSTRUCTION TO CANDIDATES: 1. The students are advised to underpin their answers with the use of references. 2. Late submission will be awarded Zero (0) unless EC are upheld. 3. Cases of Plagiarism will be penalized. 4. The assignment should be submitted in both hardcopy and softcopy: Page 1
76

Individual Assignment

May 26, 2017

Download

Documents

Aakash Bathla
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

INDIVIDUAL ASSIGNMENT

PANIPAT

CE00382-2-HSSN-2

HARDWARE SOFTWARE SYSTEMS AND NETWORKS 2

PT1182214

HAND OUT DATE: 10th February 2014

HAND IN DATE: 7th April 2014

WEIGHTAGE: 30%

INSTRUCTION TO CANDIDATES:

1. The students are advised to underpin their answers with the use of references.

2. Late submission will be awarded Zero (0) unless EC are upheld.3. Cases of Plagiarism will be penalized.4. The assignment should be submitted in both hardcopy and softcopy:

a. The hardcopy of the assignment should be bound in appropriate style

b. The softcopy of the written assignment and source code where appropriate should be on a CD in an envelope/CD cover and attached to the hardcopy.

Page 1

Page 2: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Module Code and Name : CE00382-2 Hardware, Software, Systems and Networks II

Lecturer : Pardeep Kumar

Submission Requirement : Hardcopy and Softcopy

Hand Out Date : 10th February 2014

Hand In Date : 7th April 2014

Assignment Learning Outcomes

No Learning Outcomes1. Explain the operation of current LAN & WAN standards, and explain and apply TCP/IP

and associated protocols and applications.

Assignment Overview

ICT Resources India Public Limited Company has hired you as a network consultant. This company is the only supplier of business equipment and office supplies in North India. The lack of competition has caused the owners not to make major investments into the business. A nationally recognized competitor recently opened for business with plans to put ICT Resources out of business. In response to this, the owners of ICT Resources have decided to reinvest substantial sum of money in the company.

ICT Resources locally own a 3 storey building and currently have already grown to a level where they now have resources of 30 staff and this figure is still growing. They have developed and spread their business to 3 strategic locations throughout North India with more upcoming offices in other locations planned for 2015. These new offices will incorporate the retail concept coupled with local sales offices.

ICT Resources decide to set up office with approximately 35 to 40 employees. The goal is to determine the type of network topology they will need within the office. Consider the types of computer and number of printers, audio devices, microphones, LCD projectors, and multifunction peripherals are needed. Before they invest money in the local area network, the owner wants to know more about networks and internet connection.

As the network consultant, write a brief report about the advantages and disadvantages of having a network. What type of network is best suited for the company a peer-to-peer network or a client/server network? What transmission media should the company use? Why? What types of problems should be expect with a network? Use internet, book or any other related material as reference to answer the owner’s requirement.

You are strongly encouraged to produce your own design, diagrams and/or figures in support of the area of research. However, if the information is extracted from external sources, please ensure that proper referencing is provided.

Page 2

Page 3: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Guidelines for the Report

Document your research findings in a professional and systematic manner, in the form of a computerized report. Your report should not exceed 3500 words. Your documentation should include the following:

1. Assessment criteria (please include the table provided below in your assignment after your cover page)

2. Table of contents 3. Gantt chart 4. Introduction 5. Description of the network/ protocol/device/technology6. IP address classification of organization 7. Core components of the protocol/device/technology and how it works8. Strengths of the protocol/device/technology 9. Weaknesses of the protocol/device/technology 10. Relationship between the selected protocol/device/technology and network

management.11. Conclusion (your personal input and should not be referenced from any source)12. References (use Harvard referencing) 13. Appendix (please include documentation of your final product)

Assessment Criteria

Research and Investigation 20 %Documentation 15 %Presentation 15 %Critical Analysis 20 %Citation and Referencing 10 %Product 20 % TOTAL 100 %

Page 3

Page 4: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Marking Criteria

Distinction (70% +) Thorough and in-depth research and investigation supported by evidence. Excellent level of knowledge and understanding reflected in discussion. Contents of documentation well organized and presented in a professional manner. Discussion has good flow. Confident and able to address most questions posed during presentation. Good analysis of research area conducted. Referenced materials well cited and references documented. Effective and fully functional final product to support area of research.

Credit (60 – 69%) Minor gaps in research and investigation conducted. Good level of knowledge and understanding reflected in discussion. Documentation Contents of documentation organized and presented in a professional manner with some minor issues. Sometimes lacking confidence but able to address most questions posed during presentation. Some analysis of research area conducted. Citation and references are available in documentation but with minor issue. Final product has some relationship to the area of research and/or most features of the final product functional with some minor issues.

Pass (40 – 59%) Major gaps in research and investigation conducted. Satisfactory level of knowledge and understanding reflected in discussion. Contents of documentation disorganized and/or not presented in a professional manner. Lacks confidence and unable to address most questions posed during presentation. Minimal analysis of research area conducted. Citation and references are available in documentation but with major issues. Most areas of final product not related to the research and functionality of the product is limited.

Fail (0 – 39%) Demonstrate poor understanding of the problem. No linkage between research and investigation. Poor analysis of research area or analysis is absent. Citation and references are not available in documentation. Final product not related to the area of research or final product not documented.

Page 4

Page 5: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Hardware and Software System and Networks II

CE00382-2

Individual Assignment-6th Semester

Network Proposal for ICT Resources India Public Limited Company

HAND IN DATE: - 10th FEBRUARY, 2014

HAND OUT DATE: - 7th APRIL, 2014

SUBMITTED BY: - SUBMITTED TO:-

Aakash Bathla (PT1182214) Mr. Pardeep Kumar

Computing (Level-2) (SUPERVISOR)

Page 5

Page 6: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

CERTIFICATION

This is to certify that Mr. Aakash Bathla of 6th semester Pursuing B.E (Hons.) Degree from A.P.I.I.T SD INDIA has successfully completed the individual project in Hardware, Software, System and Networks module under the guidance of Lecturer Mr. Pradeep Kumar within the stipulated Time Period.

Aakash Bathla Module Lecturer(Mr. Pradeep Kumar)

PT1182214 _____________________________

Page 6

Page 7: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Acknowledgement

First of all I would like to present my sincere gratitude to APIIT granting me such valuable opportunity to making this assignment.

Second of all I would like to thanks my Module Lecturer Mr. Pradeep Kumar for giving me this opportunity to work on this assignment and without those valuable support this assignment would not have been a success.

I would also like to thanks lab supervisors who gave me a helping hand wherever necessary.

Last but not the least I am obliged to thanks my friend colleagues who provided me support and help wherever required.

Thank You

Aakash Bathla

PT1182214

Page 7

Page 8: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Abstract:

Major Part of the world is in the hands of technology. Like the telephone and the television, the network and data communication has performs an important role in restructuring our daily lives. Most people can hardly remember a time where the network and data communication was not available.

The Internet is not just a network; It is a whole community in and out of itself. It is a revolution that change d our society, our lives and our entire world. What other thing can we invariably say has completely connected everyone in the world.

I had to choose the best network design because the system has to be accurate and the management expects to see a great difference after the implementation.

The main aim of assignment is to suggest a effective and efficient network for ICT resources India Public Limited Company, Which is one of the supplier of business equipment and office supplies of its kind in North India. This network proposal includes the details about the network that is suitable for the ICT and the advantage and disadvantage of it. It also includes the network topologies, Transmission media, Protocols, Network Devices, Architecture Technologies, Possible Problems and the future enhancements in the network of ICT.

Page 8

Page 9: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Table of Content

Page 9

Page 10: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Gantt Chart

Introduction

Page 10

Page 11: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Preface:

ICT Resources India Public Limited Company has hired me as a network consultant. The company is only

supplier of business equipment and office supplies of in North India.

The major purpose was to develop a computer LAN and WAN network for ICT Resources India where the

company consisting of three story building and four other strategic locations.

The lack of competition has caused the owners not to make major investments into the

business. A nationally recognized competitor recently opened for business with plans to put

ICT Resources out of business. In response to this, the owners of ICT Resources have

decided to reinvest substantial sum of money in the company.

After completing network design I came upon a fully functional computer network for ICT Resources. As

far as I concerns, this system will be error free and will be a big support for the development of the ICT

Resources India.

I have properly planned an efficient network that will bring a wide range of Advantages to

your company

Objectives:

To provide an efficient and effective network for ICT Network.

Identify the advantages and disadvantages of Networks.

Understanding the type transmission media.

Understanding different type of topology

Identify and provide suitable network topology and transmission media for ICT resources.

Identify and propose of LAN and WAN network connections.

Analyzing the layout of the ICT

Page 11

Page 12: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

ICT Resources locally own a 3 storey building and currently have already grown to a level where they now have resources of 30 staff and this figure is still growing. They have developed and spread their business to 3 strategic locations throughout North India with more upcoming offices in other locations planned for 2015. These new offices will incorporate the retail concept coupled with local sales offices.

ICT Resources decide to set up office with approximately 35 to 40 employees. The goal is to determine the type of network topology they will need within the office. Consider the types of computer and number of printers, audio devices, microphones, LCD projectors, and multifunction peripherals are needed. Before they invest money in the local area network, the owner wants to know more about networks and internet connection.

Assumptions:

Now there is no internet facility for all the employees in ICT expect the location head.

In the main office there are 3 departments, production departments, account departments and administrative departments.

Presently there is no local network inside the office.

The number of employees in each departments is as, 5 in accounts, 5 in administrator, 18 in production and 2 as network administrators.

Each employee has each computer and computer have sound device and microphone.

Each department consist of one printer, production department consist of LCD projectors and one security cameras.

Proposed System:

Page 12

Page 13: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

This is the proposed network diagram for the ICT Resources India. It is a 3 story building with three main departments divide among the floors as they are described in figure(1,2 and 3).

This diagram shows how all these departments are connected to the LAN Through backbone and for connecting to 4 other location I have used VPN network which will act as WAN.

As I above said these local area networks established in 4 different geographical areas, are connected together through a private network path and is considered to be as a Single local area network because of the VPN. This virtual path is not accessible by any other unauthorized clients and users and will only be valid for the users that belong to a particular domain. Here two fixed IP’s will be assigned for the two ends of the VPN tunnel and all the data transfer will be done through those IP’s. Also router at both ends will perform IP’s filtering mechanisms to prevent unauthorized access to the network.

Page 13

Page 14: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Page 14

Page 15: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Second Floor (Server Room and Director Room)

The server room is located in the top floor and this is the place where the backbone initiates. Fiber optic cables are used for connecting switches to router the server room and an administrator computer is reserved for IP configurations. Optical fiber has been used transmission medium because of the higher data transmission rate.

Page 15

Page 16: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Ground Floor (Advertisement Department)

Except the server room there are other sections located in the Ground floor. Here they are Finance Admin, Cashier, Attendance count and Reception. Following network diagram shows how the first floor is architected in the network.

First Floor (Sales and Department)

Page 16

Page 17: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Above is the network diagram designed for the First floor for the company? As assumed Firstfloor is consist of the sales and development department. I have assigned 15 computers for the First floor and all are connected to a switch via star topology which connects to the mainrouter. Also there is a printer (All in one) connected to switch to enable all the computers to use them..

Page 17

Page 18: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Description of Network

What is a network?

A computer networks is simply two or more systems connected together so they can

change information.

A network uses a combination of hardware and software to send data from one location to another.

Networks consist of the computers, wiring, and other devices, such as hubs, switches and routers that

make up the network infrastructure. Some devices, such as network interface cards, serve as the

computer’s connection to the network. Devices such as switches and routers provide traffic- control

strategies for the network. All sorts of different technologies can actually be employed to move data

from one place to another, including wires, radio waves, and even microwave technology.

[All networks, whether big or small, are typically created so that users on the network can share

resources and communicate. The list that follows breaks down some of the reasons for networking

computers:

File sharing: Networking computers makes it very easy for the users on the network to share

application files

Hardware sharing: Users can share devices such as printers, CD-ROM drives, and hard drives.

Page 18

Page 19: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Program sharing: Applications such as spreadsheets and word processors can be run over the

network.

User communication: Network allows users to take advantage of communication media such as

electronic mail, newsgroups, and video conferencing.]

Internet is also used for the communication. Internet is a global network connecting millions

of computers or we can say that internet is the networks of network. More than 100 countries are

linked into exchanges of data, news and opinions.

Network Advantage

Information Sharing: The main advantage of network is information sharing. A large number of

users belonging to same area or same organization but spread over at different places can

communicate and share useful files, software and information at right times via network of computers.

Speed: Sharing and transferring of data occurring in a network is rapid. So we can send the data of

larger size like high resolution photographs over the network.

Flexible Access: Computer network allows accessing the file in a flexible manner.

Security: Network is also allows establishing security by ensuring that the network users may only

have access to certain files and applications. Sensitive files and data in the network are password

protected to avoid the illegal coping of data.

Work Group Computing: Work group software such as Microsoft back office allows concurrent

access of files and data.

Centralized Software Management: Files can be stored on a central computer (the file server)

allowing data to be shared throughout the entire network

Cost: Individual license copy of many software may be costly. Shared programs on the network

allows easy up gradation of file server rather than the individual work stations.

Resource sharing: Network allows to share the resources like printer, scanner, fax machines

modems.

Back up Facility: Files can be backed up more easily when they are all on a central File server rather

than when they are scattered across a number of independent workstations.

Page 19

Page 20: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Network Disadvantage

Loss of data and resources: Network failure and device failure will shut the entire network it causes

loss data. Network faults cause loss of resources. If the network stops operating then it may not be

possible to access to various computers.

Difficult to manage: Network set up is very costly because of hardware and software. Network set up

take a lot of time to complete. The larger the network becomes difficult to manage.

Location of resources: Resources could not be located too far from users. If resources are too far it

take to much time to share the resources like printer .it will negatively affect the access flexibility.

Storage space and Bandwidth: Users may use too much bandwidth - for example when listening to

music files or watching video clips - preventing others from using the network facilities

properly .Usage of larger storage may cause problems on the network.

Categories of Network

LAN (Local Area Network)

WAN(Wide Area Network)

MAN( Metropolitan Area Network)

LAN (Local Area Network): Local area networks are designed to allow resources to be shared

between personal computers or workstations. The resources to be shared can include

hardware, software or data .The best example of LAN is found in business organizations. One

of the computers may be given a large capacity disc which acts as a server to clients.

Software’s are installed into central server and is used by the whole network group .The most

common LAN topologies are bus, ring, and star. Currently LAN size is limited to few

kilometers. Generally, LAN is using one type of transmission medium.

In my project I have designed a LAN network to connect the entire building by using star

topology for ICT Resources India private limited

Page 20

Page 21: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

.

WAN (Wide Area Network): Wide area network provides long distance transmission of

data ,image audios and video information over large geographic aera.WAN can be simple

like dial up lines connect to the individual pc and internet .It can be complex also like

backbones that connect the internet. We normally refers two types WAN switched WAN

connects to the end systems and the point to point WAN connects home computer to an

internet service provider.

In this Project I have designed a WAN connection by adding LAN of this company and 3

other Location.

Page 21

Page 22: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

MAN (Metropolitan Area Network):

A metropolitan area network is a network with a size between a LAN and a WAN. It

normally covers the area inside a town or a city .A best example of a MAN is the part of

telephone network that can provide a high-speed DSL line to the customer .MAN provides

high speed connectivity, normally to the internet. It provides the internet connectivity for

LAN in a metropolitan network.

VPN (Virtual Private Network)

A virtual private network (VPN) is a network that uses a public telecommunication

infrastructure, such as the Internet, to provide remote offices or individual users with secure

access to their organization's network. A virtual private network can be contrasted with an

expensive system of owned or leased lines that can only be used by one organization. The

goal of a VPN is to provide the organization with the same capabilities, but at a much lower

cost.

Page 22

Page 23: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Advantages:

Cost saving: eliminating the need for expensive long-distance leased lines. VPN reduces

long - distance telephone charge .It offers offloading of support cost

Flexibility and Reliability: VPN is improving the reliability of data services of company.

Better Performance: Owing to the fact that more high capacity data service options can be

used, the bandwidth and efficiency of the network generally increases after a VPN solution is

installed.

Improved Security: The use of encryption protocols and authentication helps secure the data

that is traveling over the VPN channel.

Disadvantages of VPN

VPNs require an in-depth understanding of public network security issues and proper

deployment of precautions.

The availability and performance of an organization's wide-area VPN (over the Internet in

particular) depends on factors largely outside of their control.

Page 23

Page 24: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Network Topology

Network topology refers to the Structure or design of the connected devices. Network

topologies can be physical or logical. Physical Topology means the physical design of a

network including the devices, location and cable installation. Logical Topology refers to the

fact that how data actually transfers in a network as opposed to its design.

Mesh topology

In mesh topology every device has a dedicated point to point connection with every other

device. The term dedicated means that link carries traffic only between the two devices it

connects. In mesh topology needs n(n-1)/2 duplex mode links ,n is the no of nodes.

Advantage Disadvantage

Use of large no of links reduces

network traffic.

A mesh topology is robust in

nature .if one link becomes unusable

it does not disable the entire system.

It offers privacy and security

Use of large number of cables makes

the network very much expensive

Interconnection of devices leads to

difficulty in installation and

reconfiguration of devices.

Hardware required to connect each

link can make it more expensive to

implement.

Page 24

Page 25: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Star topology

In a star topology each device has a dedicated point to point connection with only device

usually known as a hub. In a star topology devices are not directly linked to one another.

Unlike mesh topology it does not allow direct traffic between the devices. The controller act

as an exchange between the two devices.

Advantage Disadvantage

A network star is very easy to manage

because of its simplicity in

functionality.

Easy to install and reconfigure it,

each device needs only one link and

one input-output port.

Robust it nature, failure of one system

doesn’t affect the whole network

Dependency of all topology on a

single point called hub. If the hub

goes down then the whole system will

be dead.

The cost of the hub make the network

more expensive.

Page 25

Page 26: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Bus topology

A bus uses multipoint connection instead of point to point-to-point connection. Tap in a bus

topology one cable acts as a backbone and nodes are connected in a bus topology through

drop lines tap. A drop line is a connection running between the device and the main cable.

Advantage Disadvantage

A Bus topology is easier to install.

Less expensive than star and mesh

because less cables are required,

Less redundancy of cables

Difficulty in reconnection and fault

isolation

Signal reflection at the taps can count

degradation and quality

breaks in the bus cable stops all

transmission.

Page 26

Page 27: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Ring topology

In a ring topology each device has a dedicated point to point link with one two device on

either side of each. Signal is passed along the ring in one direction from one device to another

device until it reaches a destination. Each device in a ring topology uses a repeater.

Advantage Disadvantage

A ring is relatively easy to install and

It uses unidirectional traffic. A break

in the reconfigure it, ring can stop all

transmissions.

In a ring topology each device linked

only its intermediate neighbors. For

addition and removal we need to

change only two connections.

One malfunctioning workstation can

throw away the entire network. .

It is slower than an Ethernet network.

Page 27

Page 28: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Tree topology

A tree is a variation of star topology. Nodes in a tree are linked to standard controller known

as hub which directly controls the traffic of the network. However not every device are

directly connected to the central hub. Majority of the devices are connected to the secondary

hub.

Advantage Disadvantage

It provides point to point connectivity

with the primary and the secondary

hub.

It provides an easy exchange

If the back bone line breaks the entire

segment will go down.

Topologies play an important role in the network design. A best network can be design if you

have the good knowledge of these topologies. A miss configured network can result in a

waste of time and energy. So the basic understanding of the network topologies and network

devices is a must to build a good network.

Different types of Network Topologies available are but here I have mainly described only

star topology and fiber optic that is going to use in our network

Page 28

Page 29: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Topology used and reasons for the choice:

Mainly I have used Star topology in designing the network for the ICT Resources INDIA.

Also this is the most popular topology for the cabling.

Star Topology: In a Star topology every node is connected to a central controller which may

be a hub or a switch and there is communication between the nodes through the controller.

This is widest used technology in its simplest form; a star network consists of one central

switch, hub or computer.

Here I have considered all the advantages.

Performance of this particular topology, some of them are as follows.

Easy to install and wire.

No disruptions to the network when connecting or removing devices.

Easy to detect faults and to remove parts.

The cost is comparatively less. Most reliable because a cable failure does not affect

other users. Controller to each terminal. And the performance is not as greatly affected. The star topology minimizes the chance of network failure by connecting the

entire computer to a central hub or switch.

Page 29

Page 30: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

JUSTIFICATION FOR THE STAR TOPOLOGY

Compared to Star Topology, Ring topology has the following disadvantages.

The ring topology’s dependent on one cable so the reliability is very low compared to

the star topology. (If that one cable fails all the other workstations Will also goes fail.

Compared to the star topology if any case of cable failure the ring topology will work

in other workstation..

Unlike in star topology, with the ring we have to switch on all the computers in Order

to work on computer. So it’s very inefficient.

Compared to Star Topology, Bus topology has the following disadvantages.

Like the ring, bus topology is also not reliable because if the main cable (Backbone)

fails; a number of computers beyond the failure will be affected.

Because of the heavy network traffic in the Bus due to more users, the Performance

will slow down.

The number of cable length and the number of stations has to be limited. In the Bus

it’s needed to have termination at the end of the cable to stop Reflected signals. So it

will result an extra cost.

Therefore we have to say that the bus topology is also inefficient in this network.

Compared to Star Topology, Mesh topology has the following disadvantages.

In order to implement the mesh topology, we have to spend a lot of money. Than what

is spent for the Star topology.

Each and every computer should be connected with each other that require a lot of

cables. That makes results of lots of money.

I have to say that star topology is better than the mesh topology for this network.

Compared to Star Topology, Tree topology has the following disadvantages.

Overall length of every segment is limited by the type of cabling we do.

If the backbone line breaks, the entire segment goes down.

More difficult to configure and implement wire than other topologies.

Page 30

Page 31: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Network Architecture

Network Architecture, is the logical and structural layout of the network consisting of

transmission equipment, software and communication protocols and infrastructure (wired or

wireless) transmission of data and connectivity between components.

Peer to Peer Network

Peer-to –peer network is a type of network in which each workstation has equivalent

capabilities and responsibilities. Peer-to-peer networks are generally simpler, but they usually

do not offer the same performance under heavy loads. In peer to peer network there is no

dedicate server. Thus each computer in such a network is part server and part client

Client Server Architecture

In client server architecture, a business’s computer network will have a server computer,

which function as the “backbone” of the organization, and a group of client computers, which

are commonly called workstations. By using the server we can improve efficiency of client

server architecture. Most of the cases the server part of client server having large capacity of

storage and also provides high functionality. Client part in the client server architecture are

smaller computer having individual responsibilities.

Page 31

Page 32: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Architecture Advantages Disadvantages

Client Server Centralized Resources Centralized storage of

data. Easier to find and

backup the data and the files

Efficient Client Server

Multiple users can use hardware and software

Security Central Server

Machine can secure all other workstations.

Scalability Easy to upgrade

resources

If the server goes

down, it takes part or

the whole network

with it.

It is more expensive

to install.

Needs to be

maintained by staff

with high IT skills.

Peer to Peer Reduced Cost(The

cost involved in such a

network are hardware,

cabling and maintenance)

Well tested Simplicity

Connected Using

simple and straight

forward cabling.

Only suitable for

small no. of

computers.

No centralized

System.

Lack of security.

Page 32

Page 33: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Architecture Used and Reason for choice:

Network Architecture is versatile and flexible in today¶s fast-changing IT landscape .Types

of architecture that is available for use.

Client-Server Architecture.

Peer-to-Peer Architecture.

The network architecture after finding fact and figures that I have selected for the ICT

Resources India and the result is Client-Server Architecture.

Client Server Architecture:

Client/server architecture describes the relationship b/w two computer programs in which, the

client means one program, makes a service request from another program server, the server,

which fulfills the request.

Concerning this organization network will be a server computer, which will functions as the

"heart" of the organization. In a client-server environment files are stored on a centralized,

high speed file server PC that is made available to client PCs.

It includes two types of model that is given below has been used in this project-

2-tier of architecture:

3-tier of architecture:

More detail about this model takes a look to appendix.

Advantages of Client-Server Architecture:

Centralization - access, resources, and data security are controlled through the server.

Scalability - any element can be upgraded when needed. Without affecting network.

Flexibility - new technology can be easily integrated into the system.

Interoperability- all components (clients, network, and servers) work together.

Accessibility-Server can be accessed remotely and across multiple platforms.

Ease of application development

Lower total costs than mainframe legacy systems.

User Friendly-familiar point and click interface.

Page 33

Page 34: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Why not peer to peer

It is limited in extensibility, tends to overburden user workstations by having them

play the role of server to other users, and is largely unsecured.

A peer-to-peer architecture is used there where are a limited number of users which

can be a maximum of 10 while in this network there are more than 40 employees. So

it is not suitable to use this architecture.

Typically unable to provide system-wide services since the typical workstation will

run a standard desktop operating system incapable of hosting any major service.

Peer-2-Peer architecture is concerned when security is not of a major issue. But in this

case security has to be taken care off.

In peer to peer architecture there is absence of central administration which can

sometimes prove to be fatal.

Non-existence of centralized data forces users to take backup of the data themselves.

Page 34

Page 35: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Transmission Media:

Transmission media is anything that carry signal from source to destination. Best example

transmission media is air. It can be metallic cables or fiber optics cable. In telecommunication

transmission media is divided in to two broad categories guided media and the unguided

media. Guided media provides connection from source to destination by using twisted pain

cables , coaxial cables , and fiber optic cables. Unguided media

Twisted Pair Cable

Twisted pair cable consist two conductors having an insulation coating .One of the wire used

to carry signal to the receiver, and the other is used only as a ground reference. The receiver

uses the difference between the two. There is a chance to inference and cross talk it results in

the creation of unwanted signal. Effect of the unwanted signals change according to the

arrangement of wires like wires are parallel .If both wires situated at different location then

the noise or crosstalk will be more, this results in a difference at the receiver. By twisting the

pairs, we can maintain .Twisting makes it possible that both wires are equally affected by

external influences .Two types of twisted pair cables are available. Unshielded twisted pair

and shielded twisted pair cables.

Page 35

Page 36: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Coaxial Cable:

Unlike twisted pair cables, coaxial cable carries signal having higher frequency. Coaxial

cable has a central core conductor of solid or standard wire enclosed in a insulating sheath

which is, in turn, encased in an outer conductor of metal foil braid or a combination of the

two. The outer metallic wrapping serves both as a shield against noise and as the second

conductor, which completes the circuit. Coaxial cables are widely used in analog telephone

networks.

Fiber Optic Cable:

A fiber optic cable transmits signal in the form of light .These cables are made by glass or

plastics. Signal in the fiber optics transmits on the basis of total internal reflection. Fiber

optics use reflection to guide light through a channel. A glass or a plastic core is surrounded

by a cladding of less dense glass or plastic. The difference in density of two materials must be

such that a beam of light moving through the core is reflected off the cladding instead of

being refracted to it. Fiber optics is often found in back bone networks.

Page 36

Page 37: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Comparison between Cables:-

Characteristics Coaxial cable Twisted Pair cable Fiber Optics

Susceptibility to

good interference.

Resistance to

interference

UTP: very susceptible

STP: Good resistance

Not susceptible to

interference

Ease of installation Easy to install UTP: very easy;

often preinstalled

STP: moderately

easy

Difficult to install

Flexibility Fairly Flexible UTP: Most Flexible

STP: Less Flexible

than UTP

Less flexible than

coaxial cable

Special Features Electronic Support

Components are less

expensive than

twisted- pair cable.

UTP: Same as

Telephone wire;

often preinstalled in

buildings.

STP: Supports higher

transmission rates

than UTP

Supports voice, data,

video

Transmission rates 4-100mbps UTP: 4-100 mbps

STP: 16-500mbps

100mbps or

more(>1gbps)

Unguided Media:

Unguided media is mostly used for distance transmission over the air (ex. Wireless, satellite).

Page 37

Page 38: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Transmission Media used and Reason for choice:

Network Cabling

Cable is the medium through which data usually moves from one network to another.

Understanding the characteristics of different types of cable is necessary for the development

of a successful network. In cabling of network I have used UTP-5 to connect client to each

other to switches and other cabling and fiber optic has been also used to connect as backbone.

The following sections discuss the types of cables used in networks and other related topics.

Twisted Pair Cable:

A twisted pair cable consists of two insulated wires which are twisted around each other to

form the twisted pair. Each pair of cable would consist of a wire used for the +ve data signal

and a wire for the ±ve data signal.

Types of Twisted Pair Cable are given below.

Unshielded Twisted Pair (UTP):

The cable has four pairs of wires inside the jacket. Each pair is twisted with a different

number of twists per inch to help eliminate interference from adjacent pairs and other

electrical devices.

Page 38

Page 39: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Categories of unshielded twisted pair cable:

Category Use

Catrgory1 Less than 1Mbps

Catrgory2 4Mbps

Catrgory3 10Mbps

Catrgory4 10Mbps

Catrgory5 10 Mbps. Ethernet

Catrgory5e 1000 Mbps. Gigabit Ethernet

Catrgory6 1000 Mbps. Gigabit Ethernet

I have used UTP Category 5 cables as the main connecting media between switches and

client computers. CAT 5 cables support a bandwidth of 100Mbps. According to the needs of

the company, the data transmission rate of UTP cables is more than enough. Because of the

above mentioned factors.

Advantages of UTP cables:

Unshielded Twisted-Pair (UTP) Structured Premise Cabling permits many

communication protocols to reside in the same wire bundle. Examples include voice,

data, and CCTV video and control.

A good UTP system gives better interference rejection than coaxial.

UTP is less expensive than dedicated coaxial or fiber optic.

UTP is physically smaller than coaxial and many other cable types.

UTP is a very easy media to install and reconfigure.

UTP is extremely easy to terminate.

Page 39

Page 40: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Unshielded Twisted Pair connector:

The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a

plastic connector that looks like a large telephone-style connector. A slot allows the RJ-45 to

be inserted only one way. I have used RJ-45 connector to connect the both ends of UTP-5

cable.

Shielded Twisted Pair (STP):

A disadvantage of STP is that it is susceptible to radio and electrical frequency interference.

The extra shielding can make the cables quite bulky. The shielding is quite bulky and can

make installation difficult. The term is often abbreviated to STP.

Coaxial cable: Coaxial cable has a single copper conductor at its center. A plastic layer

provides insulation between the center conductor and a braided metal shield. The metal shield

helps to block any outside interference from fluorescent lights, motors, and other computers.

Page 40

Page 41: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Disadvantages:

coaxial cabling is difficult to install,

Does not bend easily and is difficult to install.

Cost is much more than UTP cable.

Fiber Optic cable:

Fiber optic cabling consists of a center glass core surrounded by many layers of protective

materials. It transmits light rather than electronic signals eliminating the problem of electrical

interference.

Advantages:

Ability to transmit signals over much longer distances.

Capability to carry information at vastly greater speeds.

This capacity brings communication possibilities to include services such as video

conferencing.

Disadvantages:

The cost of fiber optic cabling is very high.

It is more difficult to install and modify.

Despite of this figures, I have used Optical fiber to construct the backbone of network.

This choice was made because the data transmission rate of optical fiber is very large

and also by considering with the other network cables, optical fiber has a very less

percentage of data loss. But because of the high prize of optical fiber, I had to limit it

only to the backbone of the network.

Page 41

Page 42: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

DISCRIPTION OF DEVICES

ROUTER:Routers are small physical devices that join multiple networks together. Technically, a router is a Layer 3 gateway device, meaning that it connects two or more networks and that the router operates at the network layer of the OSI model.

Routers used in networks perform the following functions:

1. Restrict broadcast to the LAN

2. Act as the default gateway.

3. Move data between networks.

4. Learn and advertise loop free path

BREEDGE:A network bridge, also known as a layer 2 switch, is a hardware device used to create a connection between two separate computer networks or to divide one network into two. Both networks usually use the same protocol; Ethernet is an example of a protocol. Network devices include, but are not limited to, Personal Computers (PCs), printers, routers, switches and hubs. Devices connected to a network via an Ethernet adapter card have what is known as a Media Access Control (MAC) address, also called a physical or hardware address. It is this address that uniquely identifies a device to a bridge that can then determine to which the network device is connected. The principal function of a network bridge is to forward data based on the MAC address of the sending and receiving devices. This operation helps to eliminate what are known as collision domains.

SWITCH:A network switch is a small hardware device that joins multiple computers together within one local Area Network(LAN).Technically, network switches operate at layer two (Data Link Layer) of the OSI model. Switch forwards data only to the port that connects to the destination device. It does this by learning the MAC address of the devices attached to it, and then by matching the destination MAC address in the data it receives.

-

Page 42

Page 43: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

HUB:Hubs are used in networks that use twisted-pair cabling to connect devices. Hubs can also be joined together to create larger networks. Hubs are simple devices that direct data packets to all devices connected to the hub, regardless of whether the data package is destined for the device. This makes them inefficient devices and can create a performance bottleneck on busy networks.

-

WIRELESS ACCESS POINT:Wireless access points (APs) are a transmitter and receiver (transceiver) device used to create a wireless LAN (WLAN). APs are typically a separate network device with a built-in antenna, transmitter, and adapter. APs use the wireless infrastructure network mode to provide a connection point between WLANs and a wired Ethernet LAN. APs also typically have several ports allowing a way to expand the network to support additional clients.

MODEM:A modem, short for modulator/demodulator, is a device that converts the digital signals generated by a computer into analog signals that can travel over conventional phone lines. The modem at the receiving end converts the signal back into a format the computer can understand. Modems can be used as a means to connect to an ISP or as a mechanism for dialing up to a LAN.

FIRE WALLA firewall is a networking device, either hardware or software based, that controls access to your organization’s network. This controlled access is designed to protect data and resources from an outside threat. To do this, firewalls are typically placed at entry/exit points of a network—for example,

Placing a firewall between an internal network and the Internet. Once there, it can control access in and out of that point.

Page 43

Page 44: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Network Devices Used:Switches: Switch is an intelligent network layer device. It provides dedicated

connection and bandwidth between clients on a LAN. It gives any device on the

network the full bandwidth instead of sharing the available bandwidth. Each port of a

switch will not forward a broadcast packet to some device on the other port. Switch

operates in both half duplex and full duplex modes. The full duplex mode is preferred

in your network..

Router: A router translates information from one network to another; when the

packets are received by the router, it routes it to the appropriate node in a network.

Routers select the shortest path to route a message, based on the destination

addressing.

Network Interface Cards: The (NIC) provides the physical connection between the

network and the computer workstation. Most NICs are internal, with the card fitting

into an expansion slot inside the computer.

Network Interface cards are a main factor in concerning the speed and performance of

a network.

Page 44

Page 45: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Network CableTo connect together different devices to make up a network, you need cables.

Cables are still used in most networks, rather than using only wireless, because they can carry much more data per second, and are more secure (less open to hacking).

FirewallA firewall is a device, or a piece of software that is placed between your computer and the rest of the network (where the hackers are!)

If you wish to protect your whole LAN from hackers out on the Internet, you would place a firewall between the LAN and the Internet connection.

Page 45

Page 46: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Description of protocols:Protocol: A protocol is a set of rules that governs the communications between

computers on a network. In order for two computers to talk to each other, they must

be speaking the same language. Many different types of network protocols and

standards are required to ensure that your computer (no matter which operating

system, network card, or application you are using) can communicate with another

computer located on the next desk or half-way around the world. The OSI Reference

Model defines seven layers of networking protocols.

Ethernet (Physical/Data Link Layers) IP/IPX (Network Layer) TCP/SPX (Transport Layer) HTTP, FTP, Telnet, SMTP, and DNS(combined Session/Presentation/Application

Layers)

Page 46

Page 47: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Ethernet (Physical/Data Link Layers)

The physical layer of the network focuses on hardware elements, such as cables, repeaters, and network interface cards. By far the most common protocol used at the physical layer is Ethernet. For example, an Ethernet network (such as 10BaseT or 100BaseTX) specifies the type of cables that can be used; the optimal topology (star vs. bus, etc.), the maximum length of cables, etc. (See the Cabling section for more information on Ethernet standards related to the physical layer).

The data link layer of the network addresses the way that data packets are sent from one node to another. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network

IP and IPX (Network Layer)

The network layer is in charge of routing network messages (data) from one computer to another. The common protocols at this layer are IP (which is paired with TCP at the transport layer for Internet network) and IPX (which is paired with SPX at the transport layer for some older Macintosh, Linus, UNIX, Novell and Windows networks). Because of the growth in Internet-based networks, IP/TCP are becoming the leading protocols for most networks.

Every network device (such as network interface cards and printers) have a physical address called a MAC (Media Access Control) address. When you purchase a network card, the MAC address is fixed and cannot be changed. Networks using the IP and IPX protocols assign logical addresses (which are made up of the MAC address and the network address) to the devices on the network, This can all become quite complex -- suffice it to say that the network layer takes care of assigning the correct addresses (via IP or IPX) and then uses routers to send the data packets to other networks.

Page 47

Page 48: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

TCP and SPX (Transport Layer)

The transport layer is concerned with efficient and reliable transportation of the data packets from one network to another. In most cases, a document, e-mail message or other piece of information is not sent as one unit. Instead, it is broken into small data packets, each with header information that identifies its correct sequence and document.

When the data packets are sent over a network, they may or may not take the same route -- it doesn't matter. At the receiving end, the data packets are re-assembled into the proper order. After all packets are received, a message goes back to the originating network. If a packet does not arrive, a message to "re-send" is sent back to the originating network.

TCP, paired with IP, is by far the most popular protocol at the transport level. If the IPX protocol is used at the network layer (on networks such as Novell or Microsoft), then it is paired with SPX at the transport layer.

HTTP, FTP, SMTP and DNS (Session/Presentation/Application Layers)

Several protocols overlap the session, presentation, and application layers of networks. There protocols listed below are a few of the more well-known:

DNS - Domain Name System - translates network address (such as IP addresses) into terms understood by humans (such as Domain Names) and vice-versa

DHCP - Dynamic Host Configuration Protocol - can automatically assign Internet addresses to computers and users

FTP - File Transfer Protocol - a protocol that is used to transfer and manipulate files on the Internet

HTTP – Hyper Text Transfer Protocol - An Internet-based protocol for sending and receiving web pages.

IMAP - Internet Message Access Protocol - A protocol for e-mail messages on the Internet

IRC - Internet Relay Chat - a protocol used for Internet chat and other communications

POP3 - Post Office protocol Version 3 - a protocol used by e-mail clients to retrieve messages from remote servers

SMTP - Simple Mail Transfer Protocol - A protocol for e-mail messages on the Internet

.

Page 48

Page 49: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

TCP/IP protocol

The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered and error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer.

Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP.

Page 49

Page 50: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Network Protocols Used for ICT India public limitedTCP/IP Protocol or Internet ProtocolTCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication

language or protocol of the Internet. It can also be used as a communications protocol

in a private network (either an intranet or an extranet). Main functions of TCP/IP

protocol are described below.

Addressing/Multiplexing:

The main function of TCP protocol is multiplexing the data received

from various process .This help to send the data on the network layer.

Connection establishment, management and termination: TCP provides set of

procedures that devices follow to negotiate and establish TCP connection over

which data can travel.

Data handling and packaging: TCP defines a mechanism by which

applications are able to send data from it to higher levels

Routing / Indirect Delivery

When source and final destination are situated so far away means both

are not attached directly. In these case datagram can send indirectly

Fragmentation and Reassembly

However, the maximum frame size of each physical/data-link network

using IP may be different. For this reason, IP includes the ability to

fragment IP datagram’s into pieces so they can each be carried on the

local network.

TCP/IP is better because it is pear to pear networking we have to go through

Several protocols in OSI model there are many others for TCP/IP to e better.

Page 50

Page 51: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Description of Network Technologies:

WAN Technologies:

A Wide Area Network ( WAN) is a computer network covering multiple distance areas, which may spread across the entire world. WANs often connect multiple smaller networks, such as local area networks (LANs) or metro area networks (MANs). The world's most popular WAN is the Internet. Some segments of the Internet are also WANs in themselves. The key difference between WAN and LAN technologies is scalability. C WAN must be able to grow as needed to cover multiple cities, even countries and continents.

A set of switches and routers are interconnected to form a Wide Area Network. The switches can be connected in different topologies such as full mesh and half mesh. A wide area network may be privately owned or rented from a service provider, but the term usually connotes the inclusion of public (shared user) networks.

Both packet switching and circuit switching technologies are used in the WAN. Packet switching allows users to share common carrier resources so that the carrier can make more efficient use of its infrastructure. In a packet switching setup, networks have connections into the carrier's network, and many customers share the carrier's network. The carrier can then create virtual circuits between customers' sites by which packets of data are delivered from one to the other through the network.

Circuit Switching allows data connections to be established when needed and then terminated when communication is complete. This works like a normal telephone line works for voice communication. Integrated Services Digital Network (ISDN) is a good example of circuit switching. When a router has data for a remote site, the switched circuit is initiated with the circuit number of the remote network.

Number of WAN TECHNOLOGIES is discussed below:

1) VPN(Virtual Private Network)

2) ATM

3) Frame Relay

4) SONET/SDH

5) X.25

6) PPP

Page 51

Page 52: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Virtual private network (VPN) is a technology widely used in a public switched network

(PSTN) to provide private and secured WAN for an organization. VPN uses encryption and

other techniques to make it appear that the organization has a dedicated network, while

making use of the shared infrastructure of the WAN.

WAN technologies generally function at the lower three layers of the OSI reference model:

the physical layer, the data link layer, and the network layer. Key technologies often found in

WANs include SONET, Frame Relay, X.25, ATM and PPP.

ATM: A dedicated-connection switching technology that organizes digital data into

53-byte cell units. Individually, a cell is processed asynchronously relative to other

related cells and is queued before being multiplexed over the transmission path.

Speeds on ATM networks can reach 10 Gbps.

Frame Relay: (FR). A high-speed packet-switched data communications service,

similar to X.25. Frame relay is widely used for LAN-to-LAN interconnect services,

and is well suited to the bursty demands of LAN environments.

SONET/SDH: Synchronous Optical Network is an international standard for high

speed communication over fiber-optic networks. The SONET establishes Optical

Carrier (OC) levels from 51.8 Mbps to 10 Gbps (OC-192) or even higher.

Synchronous Digital Hierarchy (SDH) is a European equivalent of SONET.

X.25: The X.25 protocol allows computers on different public networks to

communicate through an intermediary computer at the network layer level.

PPP: A point-to-point link provides a single, pre-established WAN communications

path from the customer premises through a carrier network, such as a telephone

company, to a remote network. Point-to-point lines are usually leased from a carrier

and thus are often called leased lines. For a point-to-point line, the carrier allocates

pairs of wire and facility hardware to your line only.

Page 52

Page 53: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

WAN TECHNOLOGY USED for ICT Public Limited IS VPN:A virtual private network (VPN) is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. A virtual private network can be contrasted with a system of owned or leased lines that can only be used by one company. The main purpose of a VPN is to give the company the same capabilities as private leased lines at much lower cost by using the shared public infrastructure. Phone companies have provided private shared resources for voice messages for over a decade. A virtual private network makes it possible to have the same protected sharing of public resources for data. Companies today are looking at using a private virtual network for both extranets and wide-area intranets. The privacy afforded by these legacy VPNs was only that the communications provider assured the customer that no one else would use the same circuit. This allowed customers to have their own IP addressing and their own security policies. A leased circuit ran through one or more communications switches, any of which could be compromised by someone wanting to observe the network traffic. The VPN customer trusted the VPN provider to maintain the integrity of the circuits and to use the best available business practices to avoid snooping of the network traffic. Thus, these are called trusted VPNs.

SECURE VPN TECHNOLOGY

IPsec with encryption in either tunnel and transport modes. The security associations can be set up either manually or using IKE with either certificates or preshared secrets. IPsec is described in many RFCs, including 2401, 2406, 2407, 2408, and 2409 (for IKEv1), and 4301, 4303, 4306, 4307, and 4308 (for IKEv2).

Page 53

Page 54: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

IPsec inside of L2TP (as described in RFC 3193) has significant deployment for client-server remote access secure VPNs.

SSL 3.0 or TLS with encryption. TLS is described in RFC 4346. An excellent book on SSL 3.0 and TLS is "SSL and TLS: Designing and Building Secure Systems" by Eric Rescorla (ISBN 0201615983).

These technologies (other than SSL 3.0) are standardized in the IETF, and each has many vendors who have shown their products to interoperate well in the field.

TRUSTED VPN TECHNOLOGY

ATM circuits Frame relay circuits Transport of layer 2 frames over MPLS, as described in draft-ietf-l2vpn-vpls-

bgp and other related Internet Drafts.

Advantages

Data is very secure within the VPN "tunnel" it would be impossible for the data to be tampered with in transit.

You can have access to all your work files and software without having to physically move them.

You have access to all the online services the same as if you were on the campus.

Page 54

Page 55: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

IP address classification of organization:

An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation. The Class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the node address. There are five different class addresses class A (begin with 0xxx, or 1 to 126 decimal), class B(10xx, or 128 to 191 decimal),class c(10xx, or 128 to 191 decimal),class D(1110, or 224 to 239 decimal), Class E(1111, or 240 to 254 decimal). ICT will get a privet address form ISP and the all devices inside will use public IP address. The IP range, subnet mask, and network address for each network of ICT is as below. All network address is given below

Class A addresses

Class A addresses are used for very large networks. The first octet of a Class A address is used to identify the Network and the three remaining octets are used to identify the host in that particular network. ( network.host.host.host )

For Class A, IP address must have a value between 0.X.X.X to 127.X.X.X

Class B addresses

Class B addresses are used for medium-sized networks. The first two octets of a Class B address is used to identify the Network and the remaining two octets are used to identify the host in that particular network. ( network.network.host.host )

For Class B, IP address must have a value between 128.X.X.X to 191.X.X.X

Class C addresses

Class C addresses are commonly used for small to mid-size businesses. The first three octets of a Class C address is used to identify the Network and the remaining one octet is used to identify the host in that particular network. ( network.network.networkt.host )

For Class C, IP address must have a value between 192.X.X.X to 223.X.X.X

Class D addresses

Class D addresses are known as multicast addresses. Multicasting is a technique to send packets from one device to many devices, without packet duplication. You cannot assign these IP addresses to your devices.

For Class D, IP address must have a value between 223.X.X.X to 239.X.X.X

Page 55

Page 56: Individual Assignment

Individual Assignment Hardware Software System and Network PT1182214

Class E addresses

Class E is mainly used for experimental purposes only and is kept preserved for future requirements. One cannot assign these IP addresses.

For Class E, IP address must have a value between 240.X.X.X to 255.X.X.X

ICT Resources India Public Limited Company is having small number of computers therefore we are going to use Class C IP Address for laying out network in the company. As the maximum number of computers are in office (40), to reduce IP address wastage we are required to do sub-netting

Highest no of pc is 40, hence will fulfill our requirement. For this we will transfer three bits from the host part to the network part and the subnet mask for new Network will be 255.255.255.224.

Ground Floor Network Address 192.168.1.1Subnet Mask 255.255.255.254Starting IP Address 192.168.1.2Last IP Address 192.168.1.11

First Floor Network Address 192.168.1.12 Subnet Mask 255.255.255.254Starting IP address 192.168.1.12Last IP Address 192.168.1.30

Second Floor Network Address 192.168.1.31Subnet Mask 255.255.255.254Starting IP address 192.168.1.31Last IP Address 192.168.1.40

Page 56