Individual AssignmentHardware Software System and Network PT1182214 INDIVIDUAL ASSIGNMENT PANIPAT CE00382-2-HSSN-2 HARDWARE SOFTWARE SYSTEMS AND NETWORKS 2 PT1182214 HAND OUT DATE: 10 th February 2014 HAND IN DATE: 7 th April 2014 WEIGHTAGE: 30% INSTRUCTION TO CANDIDATES: 1. The students are advised to underpin their answers with the use of references. 2. Late submission will be awarded Zero (0) unless EC are upheld. 3. Cases of Plagiarism will be penalized. 4. The assignment should be submitted in both hardcopy and softcopy: Page 1
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Individual Assignment Hardware Software System and Network PT1182214
INDIVIDUAL ASSIGNMENT
PANIPAT
CE00382-2-HSSN-2
HARDWARE SOFTWARE SYSTEMS AND NETWORKS 2
PT1182214
HAND OUT DATE: 10th February 2014
HAND IN DATE: 7th April 2014
WEIGHTAGE: 30%
INSTRUCTION TO CANDIDATES:
1. The students are advised to underpin their answers with the use of references.
2. Late submission will be awarded Zero (0) unless EC are upheld.3. Cases of Plagiarism will be penalized.4. The assignment should be submitted in both hardcopy and softcopy:
a. The hardcopy of the assignment should be bound in appropriate style
b. The softcopy of the written assignment and source code where appropriate should be on a CD in an envelope/CD cover and attached to the hardcopy.
Page 1
Individual Assignment Hardware Software System and Network PT1182214
Module Code and Name : CE00382-2 Hardware, Software, Systems and Networks II
Lecturer : Pardeep Kumar
Submission Requirement : Hardcopy and Softcopy
Hand Out Date : 10th February 2014
Hand In Date : 7th April 2014
Assignment Learning Outcomes
No Learning Outcomes1. Explain the operation of current LAN & WAN standards, and explain and apply TCP/IP
and associated protocols and applications.
Assignment Overview
ICT Resources India Public Limited Company has hired you as a network consultant. This company is the only supplier of business equipment and office supplies in North India. The lack of competition has caused the owners not to make major investments into the business. A nationally recognized competitor recently opened for business with plans to put ICT Resources out of business. In response to this, the owners of ICT Resources have decided to reinvest substantial sum of money in the company.
ICT Resources locally own a 3 storey building and currently have already grown to a level where they now have resources of 30 staff and this figure is still growing. They have developed and spread their business to 3 strategic locations throughout North India with more upcoming offices in other locations planned for 2015. These new offices will incorporate the retail concept coupled with local sales offices.
ICT Resources decide to set up office with approximately 35 to 40 employees. The goal is to determine the type of network topology they will need within the office. Consider the types of computer and number of printers, audio devices, microphones, LCD projectors, and multifunction peripherals are needed. Before they invest money in the local area network, the owner wants to know more about networks and internet connection.
As the network consultant, write a brief report about the advantages and disadvantages of having a network. What type of network is best suited for the company a peer-to-peer network or a client/server network? What transmission media should the company use? Why? What types of problems should be expect with a network? Use internet, book or any other related material as reference to answer the owner’s requirement.
You are strongly encouraged to produce your own design, diagrams and/or figures in support of the area of research. However, if the information is extracted from external sources, please ensure that proper referencing is provided.
Page 2
Individual Assignment Hardware Software System and Network PT1182214
Guidelines for the Report
Document your research findings in a professional and systematic manner, in the form of a computerized report. Your report should not exceed 3500 words. Your documentation should include the following:
1. Assessment criteria (please include the table provided below in your assignment after your cover page)
2. Table of contents 3. Gantt chart 4. Introduction 5. Description of the network/ protocol/device/technology6. IP address classification of organization 7. Core components of the protocol/device/technology and how it works8. Strengths of the protocol/device/technology 9. Weaknesses of the protocol/device/technology 10. Relationship between the selected protocol/device/technology and network
management.11. Conclusion (your personal input and should not be referenced from any source)12. References (use Harvard referencing) 13. Appendix (please include documentation of your final product)
Assessment Criteria
Research and Investigation 20 %Documentation 15 %Presentation 15 %Critical Analysis 20 %Citation and Referencing 10 %Product 20 % TOTAL 100 %
Page 3
Individual Assignment Hardware Software System and Network PT1182214
Marking Criteria
Distinction (70% +) Thorough and in-depth research and investigation supported by evidence. Excellent level of knowledge and understanding reflected in discussion. Contents of documentation well organized and presented in a professional manner. Discussion has good flow. Confident and able to address most questions posed during presentation. Good analysis of research area conducted. Referenced materials well cited and references documented. Effective and fully functional final product to support area of research.
Credit (60 – 69%) Minor gaps in research and investigation conducted. Good level of knowledge and understanding reflected in discussion. Documentation Contents of documentation organized and presented in a professional manner with some minor issues. Sometimes lacking confidence but able to address most questions posed during presentation. Some analysis of research area conducted. Citation and references are available in documentation but with minor issue. Final product has some relationship to the area of research and/or most features of the final product functional with some minor issues.
Pass (40 – 59%) Major gaps in research and investigation conducted. Satisfactory level of knowledge and understanding reflected in discussion. Contents of documentation disorganized and/or not presented in a professional manner. Lacks confidence and unable to address most questions posed during presentation. Minimal analysis of research area conducted. Citation and references are available in documentation but with major issues. Most areas of final product not related to the research and functionality of the product is limited.
Fail (0 – 39%) Demonstrate poor understanding of the problem. No linkage between research and investigation. Poor analysis of research area or analysis is absent. Citation and references are not available in documentation. Final product not related to the area of research or final product not documented.
Page 4
Individual Assignment Hardware Software System and Network PT1182214
Hardware and Software System and Networks II
CE00382-2
Individual Assignment-6th Semester
Network Proposal for ICT Resources India Public Limited Company
HAND IN DATE: - 10th FEBRUARY, 2014
HAND OUT DATE: - 7th APRIL, 2014
SUBMITTED BY: - SUBMITTED TO:-
Aakash Bathla (PT1182214) Mr. Pardeep Kumar
Computing (Level-2) (SUPERVISOR)
Page 5
Individual Assignment Hardware Software System and Network PT1182214
CERTIFICATION
This is to certify that Mr. Aakash Bathla of 6th semester Pursuing B.E (Hons.) Degree from A.P.I.I.T SD INDIA has successfully completed the individual project in Hardware, Software, System and Networks module under the guidance of Lecturer Mr. Pradeep Kumar within the stipulated Time Period.
Aakash Bathla Module Lecturer(Mr. Pradeep Kumar)
PT1182214 _____________________________
Page 6
Individual Assignment Hardware Software System and Network PT1182214
Acknowledgement
First of all I would like to present my sincere gratitude to APIIT granting me such valuable opportunity to making this assignment.
Second of all I would like to thanks my Module Lecturer Mr. Pradeep Kumar for giving me this opportunity to work on this assignment and without those valuable support this assignment would not have been a success.
I would also like to thanks lab supervisors who gave me a helping hand wherever necessary.
Last but not the least I am obliged to thanks my friend colleagues who provided me support and help wherever required.
Thank You
Aakash Bathla
PT1182214
Page 7
Individual Assignment Hardware Software System and Network PT1182214
Abstract:
Major Part of the world is in the hands of technology. Like the telephone and the television, the network and data communication has performs an important role in restructuring our daily lives. Most people can hardly remember a time where the network and data communication was not available.
The Internet is not just a network; It is a whole community in and out of itself. It is a revolution that change d our society, our lives and our entire world. What other thing can we invariably say has completely connected everyone in the world.
I had to choose the best network design because the system has to be accurate and the management expects to see a great difference after the implementation.
The main aim of assignment is to suggest a effective and efficient network for ICT resources India Public Limited Company, Which is one of the supplier of business equipment and office supplies of its kind in North India. This network proposal includes the details about the network that is suitable for the ICT and the advantage and disadvantage of it. It also includes the network topologies, Transmission media, Protocols, Network Devices, Architecture Technologies, Possible Problems and the future enhancements in the network of ICT.
Page 8
Individual Assignment Hardware Software System and Network PT1182214
Table of Content
Page 9
Individual Assignment Hardware Software System and Network PT1182214
Gantt Chart
Introduction
Page 10
Individual Assignment Hardware Software System and Network PT1182214
Preface:
ICT Resources India Public Limited Company has hired me as a network consultant. The company is only
supplier of business equipment and office supplies of in North India.
The major purpose was to develop a computer LAN and WAN network for ICT Resources India where the
company consisting of three story building and four other strategic locations.
The lack of competition has caused the owners not to make major investments into the
business. A nationally recognized competitor recently opened for business with plans to put
ICT Resources out of business. In response to this, the owners of ICT Resources have
decided to reinvest substantial sum of money in the company.
After completing network design I came upon a fully functional computer network for ICT Resources. As
far as I concerns, this system will be error free and will be a big support for the development of the ICT
Resources India.
I have properly planned an efficient network that will bring a wide range of Advantages to
your company
Objectives:
To provide an efficient and effective network for ICT Network.
Identify the advantages and disadvantages of Networks.
Understanding the type transmission media.
Understanding different type of topology
Identify and provide suitable network topology and transmission media for ICT resources.
Identify and propose of LAN and WAN network connections.
Analyzing the layout of the ICT
Page 11
Individual Assignment Hardware Software System and Network PT1182214
ICT Resources locally own a 3 storey building and currently have already grown to a level where they now have resources of 30 staff and this figure is still growing. They have developed and spread their business to 3 strategic locations throughout North India with more upcoming offices in other locations planned for 2015. These new offices will incorporate the retail concept coupled with local sales offices.
ICT Resources decide to set up office with approximately 35 to 40 employees. The goal is to determine the type of network topology they will need within the office. Consider the types of computer and number of printers, audio devices, microphones, LCD projectors, and multifunction peripherals are needed. Before they invest money in the local area network, the owner wants to know more about networks and internet connection.
Assumptions:
Now there is no internet facility for all the employees in ICT expect the location head.
In the main office there are 3 departments, production departments, account departments and administrative departments.
Presently there is no local network inside the office.
The number of employees in each departments is as, 5 in accounts, 5 in administrator, 18 in production and 2 as network administrators.
Each employee has each computer and computer have sound device and microphone.
Each department consist of one printer, production department consist of LCD projectors and one security cameras.
Proposed System:
Page 12
Individual Assignment Hardware Software System and Network PT1182214
This is the proposed network diagram for the ICT Resources India. It is a 3 story building with three main departments divide among the floors as they are described in figure(1,2 and 3).
This diagram shows how all these departments are connected to the LAN Through backbone and for connecting to 4 other location I have used VPN network which will act as WAN.
As I above said these local area networks established in 4 different geographical areas, are connected together through a private network path and is considered to be as a Single local area network because of the VPN. This virtual path is not accessible by any other unauthorized clients and users and will only be valid for the users that belong to a particular domain. Here two fixed IP’s will be assigned for the two ends of the VPN tunnel and all the data transfer will be done through those IP’s. Also router at both ends will perform IP’s filtering mechanisms to prevent unauthorized access to the network.
Page 13
Individual Assignment Hardware Software System and Network PT1182214
Page 14
Individual Assignment Hardware Software System and Network PT1182214
Second Floor (Server Room and Director Room)
The server room is located in the top floor and this is the place where the backbone initiates. Fiber optic cables are used for connecting switches to router the server room and an administrator computer is reserved for IP configurations. Optical fiber has been used transmission medium because of the higher data transmission rate.
Page 15
Individual Assignment Hardware Software System and Network PT1182214
Ground Floor (Advertisement Department)
Except the server room there are other sections located in the Ground floor. Here they are Finance Admin, Cashier, Attendance count and Reception. Following network diagram shows how the first floor is architected in the network.
First Floor (Sales and Department)
Page 16
Individual Assignment Hardware Software System and Network PT1182214
Above is the network diagram designed for the First floor for the company? As assumed Firstfloor is consist of the sales and development department. I have assigned 15 computers for the First floor and all are connected to a switch via star topology which connects to the mainrouter. Also there is a printer (All in one) connected to switch to enable all the computers to use them..
Page 17
Individual Assignment Hardware Software System and Network PT1182214
Description of Network
What is a network?
A computer networks is simply two or more systems connected together so they can
change information.
A network uses a combination of hardware and software to send data from one location to another.
Networks consist of the computers, wiring, and other devices, such as hubs, switches and routers that
make up the network infrastructure. Some devices, such as network interface cards, serve as the
computer’s connection to the network. Devices such as switches and routers provide traffic- control
strategies for the network. All sorts of different technologies can actually be employed to move data
from one place to another, including wires, radio waves, and even microwave technology.
[All networks, whether big or small, are typically created so that users on the network can share
resources and communicate. The list that follows breaks down some of the reasons for networking
computers:
File sharing: Networking computers makes it very easy for the users on the network to share
application files
Hardware sharing: Users can share devices such as printers, CD-ROM drives, and hard drives.
Page 18
Individual Assignment Hardware Software System and Network PT1182214
Program sharing: Applications such as spreadsheets and word processors can be run over the
network.
User communication: Network allows users to take advantage of communication media such as
electronic mail, newsgroups, and video conferencing.]
Internet is also used for the communication. Internet is a global network connecting millions
of computers or we can say that internet is the networks of network. More than 100 countries are
linked into exchanges of data, news and opinions.
Network Advantage
Information Sharing: The main advantage of network is information sharing. A large number of
users belonging to same area or same organization but spread over at different places can
communicate and share useful files, software and information at right times via network of computers.
Speed: Sharing and transferring of data occurring in a network is rapid. So we can send the data of
larger size like high resolution photographs over the network.
Flexible Access: Computer network allows accessing the file in a flexible manner.
Security: Network is also allows establishing security by ensuring that the network users may only
have access to certain files and applications. Sensitive files and data in the network are password
protected to avoid the illegal coping of data.
Work Group Computing: Work group software such as Microsoft back office allows concurrent
access of files and data.
Centralized Software Management: Files can be stored on a central computer (the file server)
allowing data to be shared throughout the entire network
Cost: Individual license copy of many software may be costly. Shared programs on the network
allows easy up gradation of file server rather than the individual work stations.
Resource sharing: Network allows to share the resources like printer, scanner, fax machines
modems.
Back up Facility: Files can be backed up more easily when they are all on a central File server rather
than when they are scattered across a number of independent workstations.
Page 19
Individual Assignment Hardware Software System and Network PT1182214
Network Disadvantage
Loss of data and resources: Network failure and device failure will shut the entire network it causes
loss data. Network faults cause loss of resources. If the network stops operating then it may not be
possible to access to various computers.
Difficult to manage: Network set up is very costly because of hardware and software. Network set up
take a lot of time to complete. The larger the network becomes difficult to manage.
Location of resources: Resources could not be located too far from users. If resources are too far it
take to much time to share the resources like printer .it will negatively affect the access flexibility.
Storage space and Bandwidth: Users may use too much bandwidth - for example when listening to
music files or watching video clips - preventing others from using the network facilities
properly .Usage of larger storage may cause problems on the network.
Categories of Network
LAN (Local Area Network)
WAN(Wide Area Network)
MAN( Metropolitan Area Network)
LAN (Local Area Network): Local area networks are designed to allow resources to be shared
between personal computers or workstations. The resources to be shared can include
hardware, software or data .The best example of LAN is found in business organizations. One
of the computers may be given a large capacity disc which acts as a server to clients.
Software’s are installed into central server and is used by the whole network group .The most
common LAN topologies are bus, ring, and star. Currently LAN size is limited to few
kilometers. Generally, LAN is using one type of transmission medium.
In my project I have designed a LAN network to connect the entire building by using star
topology for ICT Resources India private limited
Page 20
Individual Assignment Hardware Software System and Network PT1182214
.
WAN (Wide Area Network): Wide area network provides long distance transmission of
data ,image audios and video information over large geographic aera.WAN can be simple
like dial up lines connect to the individual pc and internet .It can be complex also like
backbones that connect the internet. We normally refers two types WAN switched WAN
connects to the end systems and the point to point WAN connects home computer to an
internet service provider.
In this Project I have designed a WAN connection by adding LAN of this company and 3
other Location.
Page 21
Individual Assignment Hardware Software System and Network PT1182214
MAN (Metropolitan Area Network):
A metropolitan area network is a network with a size between a LAN and a WAN. It
normally covers the area inside a town or a city .A best example of a MAN is the part of
telephone network that can provide a high-speed DSL line to the customer .MAN provides
high speed connectivity, normally to the internet. It provides the internet connectivity for
LAN in a metropolitan network.
VPN (Virtual Private Network)
A virtual private network (VPN) is a network that uses a public telecommunication
infrastructure, such as the Internet, to provide remote offices or individual users with secure
access to their organization's network. A virtual private network can be contrasted with an
expensive system of owned or leased lines that can only be used by one organization. The
goal of a VPN is to provide the organization with the same capabilities, but at a much lower
cost.
Page 22
Individual Assignment Hardware Software System and Network PT1182214
Advantages:
Cost saving: eliminating the need for expensive long-distance leased lines. VPN reduces
long - distance telephone charge .It offers offloading of support cost
Flexibility and Reliability: VPN is improving the reliability of data services of company.
Better Performance: Owing to the fact that more high capacity data service options can be
used, the bandwidth and efficiency of the network generally increases after a VPN solution is
installed.
Improved Security: The use of encryption protocols and authentication helps secure the data
that is traveling over the VPN channel.
Disadvantages of VPN
VPNs require an in-depth understanding of public network security issues and proper
deployment of precautions.
The availability and performance of an organization's wide-area VPN (over the Internet in
particular) depends on factors largely outside of their control.
Page 23
Individual Assignment Hardware Software System and Network PT1182214
Network Topology
Network topology refers to the Structure or design of the connected devices. Network
topologies can be physical or logical. Physical Topology means the physical design of a
network including the devices, location and cable installation. Logical Topology refers to the
fact that how data actually transfers in a network as opposed to its design.
Mesh topology
In mesh topology every device has a dedicated point to point connection with every other
device. The term dedicated means that link carries traffic only between the two devices it
connects. In mesh topology needs n(n-1)/2 duplex mode links ,n is the no of nodes.
Advantage Disadvantage
Use of large no of links reduces
network traffic.
A mesh topology is robust in
nature .if one link becomes unusable
it does not disable the entire system.
It offers privacy and security
Use of large number of cables makes
the network very much expensive
Interconnection of devices leads to
difficulty in installation and
reconfiguration of devices.
Hardware required to connect each
link can make it more expensive to
implement.
Page 24
Individual Assignment Hardware Software System and Network PT1182214
Star topology
In a star topology each device has a dedicated point to point connection with only device
usually known as a hub. In a star topology devices are not directly linked to one another.
Unlike mesh topology it does not allow direct traffic between the devices. The controller act
as an exchange between the two devices.
Advantage Disadvantage
A network star is very easy to manage
because of its simplicity in
functionality.
Easy to install and reconfigure it,
each device needs only one link and
one input-output port.
Robust it nature, failure of one system
doesn’t affect the whole network
Dependency of all topology on a
single point called hub. If the hub
goes down then the whole system will
be dead.
The cost of the hub make the network
more expensive.
Page 25
Individual Assignment Hardware Software System and Network PT1182214
Bus topology
A bus uses multipoint connection instead of point to point-to-point connection. Tap in a bus
topology one cable acts as a backbone and nodes are connected in a bus topology through
drop lines tap. A drop line is a connection running between the device and the main cable.
Advantage Disadvantage
A Bus topology is easier to install.
Less expensive than star and mesh
because less cables are required,
Less redundancy of cables
Difficulty in reconnection and fault
isolation
Signal reflection at the taps can count
degradation and quality
breaks in the bus cable stops all
transmission.
Page 26
Individual Assignment Hardware Software System and Network PT1182214
Ring topology
In a ring topology each device has a dedicated point to point link with one two device on
either side of each. Signal is passed along the ring in one direction from one device to another
device until it reaches a destination. Each device in a ring topology uses a repeater.
Advantage Disadvantage
A ring is relatively easy to install and
It uses unidirectional traffic. A break
in the reconfigure it, ring can stop all
transmissions.
In a ring topology each device linked
only its intermediate neighbors. For
addition and removal we need to
change only two connections.
One malfunctioning workstation can
throw away the entire network. .
It is slower than an Ethernet network.
Page 27
Individual Assignment Hardware Software System and Network PT1182214
Tree topology
A tree is a variation of star topology. Nodes in a tree are linked to standard controller known
as hub which directly controls the traffic of the network. However not every device are
directly connected to the central hub. Majority of the devices are connected to the secondary
hub.
Advantage Disadvantage
It provides point to point connectivity
with the primary and the secondary
hub.
It provides an easy exchange
If the back bone line breaks the entire
segment will go down.
Topologies play an important role in the network design. A best network can be design if you
have the good knowledge of these topologies. A miss configured network can result in a
waste of time and energy. So the basic understanding of the network topologies and network
devices is a must to build a good network.
Different types of Network Topologies available are but here I have mainly described only
star topology and fiber optic that is going to use in our network
Page 28
Individual Assignment Hardware Software System and Network PT1182214
Topology used and reasons for the choice:
Mainly I have used Star topology in designing the network for the ICT Resources INDIA.
Also this is the most popular topology for the cabling.
Star Topology: In a Star topology every node is connected to a central controller which may
be a hub or a switch and there is communication between the nodes through the controller.
This is widest used technology in its simplest form; a star network consists of one central
switch, hub or computer.
Here I have considered all the advantages.
Performance of this particular topology, some of them are as follows.
Easy to install and wire.
No disruptions to the network when connecting or removing devices.
Easy to detect faults and to remove parts.
The cost is comparatively less. Most reliable because a cable failure does not affect
other users. Controller to each terminal. And the performance is not as greatly affected. The star topology minimizes the chance of network failure by connecting the
entire computer to a central hub or switch.
Page 29
Individual Assignment Hardware Software System and Network PT1182214
JUSTIFICATION FOR THE STAR TOPOLOGY
Compared to Star Topology, Ring topology has the following disadvantages.
The ring topology’s dependent on one cable so the reliability is very low compared to
the star topology. (If that one cable fails all the other workstations Will also goes fail.
Compared to the star topology if any case of cable failure the ring topology will work
in other workstation..
Unlike in star topology, with the ring we have to switch on all the computers in Order
to work on computer. So it’s very inefficient.
Compared to Star Topology, Bus topology has the following disadvantages.
Like the ring, bus topology is also not reliable because if the main cable (Backbone)
fails; a number of computers beyond the failure will be affected.
Because of the heavy network traffic in the Bus due to more users, the Performance
will slow down.
The number of cable length and the number of stations has to be limited. In the Bus
it’s needed to have termination at the end of the cable to stop Reflected signals. So it
will result an extra cost.
Therefore we have to say that the bus topology is also inefficient in this network.
Compared to Star Topology, Mesh topology has the following disadvantages.
In order to implement the mesh topology, we have to spend a lot of money. Than what
is spent for the Star topology.
Each and every computer should be connected with each other that require a lot of
cables. That makes results of lots of money.
I have to say that star topology is better than the mesh topology for this network.
Compared to Star Topology, Tree topology has the following disadvantages.
Overall length of every segment is limited by the type of cabling we do.
If the backbone line breaks, the entire segment goes down.
More difficult to configure and implement wire than other topologies.
Page 30
Individual Assignment Hardware Software System and Network PT1182214
Network Architecture
Network Architecture, is the logical and structural layout of the network consisting of
transmission equipment, software and communication protocols and infrastructure (wired or
wireless) transmission of data and connectivity between components.
Peer to Peer Network
Peer-to –peer network is a type of network in which each workstation has equivalent
capabilities and responsibilities. Peer-to-peer networks are generally simpler, but they usually
do not offer the same performance under heavy loads. In peer to peer network there is no
dedicate server. Thus each computer in such a network is part server and part client
Client Server Architecture
In client server architecture, a business’s computer network will have a server computer,
which function as the “backbone” of the organization, and a group of client computers, which
are commonly called workstations. By using the server we can improve efficiency of client
server architecture. Most of the cases the server part of client server having large capacity of
storage and also provides high functionality. Client part in the client server architecture are
smaller computer having individual responsibilities.
Page 31
Individual Assignment Hardware Software System and Network PT1182214
Architecture Advantages Disadvantages
Client Server Centralized Resources Centralized storage of
data. Easier to find and
backup the data and the files
Efficient Client Server
Multiple users can use hardware and software
Security Central Server
Machine can secure all other workstations.
Scalability Easy to upgrade
resources
If the server goes
down, it takes part or
the whole network
with it.
It is more expensive
to install.
Needs to be
maintained by staff
with high IT skills.
Peer to Peer Reduced Cost(The
cost involved in such a
network are hardware,
cabling and maintenance)
Well tested Simplicity
Connected Using
simple and straight
forward cabling.
Only suitable for
small no. of
computers.
No centralized
System.
Lack of security.
Page 32
Individual Assignment Hardware Software System and Network PT1182214
Architecture Used and Reason for choice:
Network Architecture is versatile and flexible in today¶s fast-changing IT landscape .Types
of architecture that is available for use.
Client-Server Architecture.
Peer-to-Peer Architecture.
The network architecture after finding fact and figures that I have selected for the ICT
Resources India and the result is Client-Server Architecture.
Client Server Architecture:
Client/server architecture describes the relationship b/w two computer programs in which, the
client means one program, makes a service request from another program server, the server,
which fulfills the request.
Concerning this organization network will be a server computer, which will functions as the
"heart" of the organization. In a client-server environment files are stored on a centralized,
high speed file server PC that is made available to client PCs.
It includes two types of model that is given below has been used in this project-
2-tier of architecture:
3-tier of architecture:
More detail about this model takes a look to appendix.
Advantages of Client-Server Architecture:
Centralization - access, resources, and data security are controlled through the server.
Scalability - any element can be upgraded when needed. Without affecting network.
Flexibility - new technology can be easily integrated into the system.
Interoperability- all components (clients, network, and servers) work together.
Accessibility-Server can be accessed remotely and across multiple platforms.
Ease of application development
Lower total costs than mainframe legacy systems.
User Friendly-familiar point and click interface.
Page 33
Individual Assignment Hardware Software System and Network PT1182214
Why not peer to peer
It is limited in extensibility, tends to overburden user workstations by having them
play the role of server to other users, and is largely unsecured.
A peer-to-peer architecture is used there where are a limited number of users which
can be a maximum of 10 while in this network there are more than 40 employees. So
it is not suitable to use this architecture.
Typically unable to provide system-wide services since the typical workstation will
run a standard desktop operating system incapable of hosting any major service.
Peer-2-Peer architecture is concerned when security is not of a major issue. But in this
case security has to be taken care off.
In peer to peer architecture there is absence of central administration which can
sometimes prove to be fatal.
Non-existence of centralized data forces users to take backup of the data themselves.
Page 34
Individual Assignment Hardware Software System and Network PT1182214
Transmission Media:
Transmission media is anything that carry signal from source to destination. Best example
transmission media is air. It can be metallic cables or fiber optics cable. In telecommunication
transmission media is divided in to two broad categories guided media and the unguided
media. Guided media provides connection from source to destination by using twisted pain
cables , coaxial cables , and fiber optic cables. Unguided media
Twisted Pair Cable
Twisted pair cable consist two conductors having an insulation coating .One of the wire used
to carry signal to the receiver, and the other is used only as a ground reference. The receiver
uses the difference between the two. There is a chance to inference and cross talk it results in
the creation of unwanted signal. Effect of the unwanted signals change according to the
arrangement of wires like wires are parallel .If both wires situated at different location then
the noise or crosstalk will be more, this results in a difference at the receiver. By twisting the
pairs, we can maintain .Twisting makes it possible that both wires are equally affected by
external influences .Two types of twisted pair cables are available. Unshielded twisted pair
and shielded twisted pair cables.
Page 35
Individual Assignment Hardware Software System and Network PT1182214
Coaxial Cable:
Unlike twisted pair cables, coaxial cable carries signal having higher frequency. Coaxial
cable has a central core conductor of solid or standard wire enclosed in a insulating sheath
which is, in turn, encased in an outer conductor of metal foil braid or a combination of the
two. The outer metallic wrapping serves both as a shield against noise and as the second
conductor, which completes the circuit. Coaxial cables are widely used in analog telephone
networks.
Fiber Optic Cable:
A fiber optic cable transmits signal in the form of light .These cables are made by glass or
plastics. Signal in the fiber optics transmits on the basis of total internal reflection. Fiber
optics use reflection to guide light through a channel. A glass or a plastic core is surrounded
by a cladding of less dense glass or plastic. The difference in density of two materials must be
such that a beam of light moving through the core is reflected off the cladding instead of
being refracted to it. Fiber optics is often found in back bone networks.
Page 36
Individual Assignment Hardware Software System and Network PT1182214
Ease of installation Easy to install UTP: very easy;
often preinstalled
STP: moderately
easy
Difficult to install
Flexibility Fairly Flexible UTP: Most Flexible
STP: Less Flexible
than UTP
Less flexible than
coaxial cable
Special Features Electronic Support
Components are less
expensive than
twisted- pair cable.
UTP: Same as
Telephone wire;
often preinstalled in
buildings.
STP: Supports higher
transmission rates
than UTP
Supports voice, data,
video
Transmission rates 4-100mbps UTP: 4-100 mbps
STP: 16-500mbps
100mbps or
more(>1gbps)
Unguided Media:
Unguided media is mostly used for distance transmission over the air (ex. Wireless, satellite).
Page 37
Individual Assignment Hardware Software System and Network PT1182214
Transmission Media used and Reason for choice:
Network Cabling
Cable is the medium through which data usually moves from one network to another.
Understanding the characteristics of different types of cable is necessary for the development
of a successful network. In cabling of network I have used UTP-5 to connect client to each
other to switches and other cabling and fiber optic has been also used to connect as backbone.
The following sections discuss the types of cables used in networks and other related topics.
Twisted Pair Cable:
A twisted pair cable consists of two insulated wires which are twisted around each other to
form the twisted pair. Each pair of cable would consist of a wire used for the +ve data signal
and a wire for the ±ve data signal.
Types of Twisted Pair Cable are given below.
Unshielded Twisted Pair (UTP):
The cable has four pairs of wires inside the jacket. Each pair is twisted with a different
number of twists per inch to help eliminate interference from adjacent pairs and other
electrical devices.
Page 38
Individual Assignment Hardware Software System and Network PT1182214
Categories of unshielded twisted pair cable:
Category Use
Catrgory1 Less than 1Mbps
Catrgory2 4Mbps
Catrgory3 10Mbps
Catrgory4 10Mbps
Catrgory5 10 Mbps. Ethernet
Catrgory5e 1000 Mbps. Gigabit Ethernet
Catrgory6 1000 Mbps. Gigabit Ethernet
I have used UTP Category 5 cables as the main connecting media between switches and
client computers. CAT 5 cables support a bandwidth of 100Mbps. According to the needs of
the company, the data transmission rate of UTP cables is more than enough. Because of the
above mentioned factors.
Advantages of UTP cables:
Unshielded Twisted-Pair (UTP) Structured Premise Cabling permits many
communication protocols to reside in the same wire bundle. Examples include voice,
data, and CCTV video and control.
A good UTP system gives better interference rejection than coaxial.
UTP is less expensive than dedicated coaxial or fiber optic.
UTP is physically smaller than coaxial and many other cable types.
UTP is a very easy media to install and reconfigure.
UTP is extremely easy to terminate.
Page 39
Individual Assignment Hardware Software System and Network PT1182214
Unshielded Twisted Pair connector:
The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a
plastic connector that looks like a large telephone-style connector. A slot allows the RJ-45 to
be inserted only one way. I have used RJ-45 connector to connect the both ends of UTP-5
cable.
Shielded Twisted Pair (STP):
A disadvantage of STP is that it is susceptible to radio and electrical frequency interference.
The extra shielding can make the cables quite bulky. The shielding is quite bulky and can
make installation difficult. The term is often abbreviated to STP.
Coaxial cable: Coaxial cable has a single copper conductor at its center. A plastic layer
provides insulation between the center conductor and a braided metal shield. The metal shield
helps to block any outside interference from fluorescent lights, motors, and other computers.
Page 40
Individual Assignment Hardware Software System and Network PT1182214
Disadvantages:
coaxial cabling is difficult to install,
Does not bend easily and is difficult to install.
Cost is much more than UTP cable.
Fiber Optic cable:
Fiber optic cabling consists of a center glass core surrounded by many layers of protective
materials. It transmits light rather than electronic signals eliminating the problem of electrical
interference.
Advantages:
Ability to transmit signals over much longer distances.
Capability to carry information at vastly greater speeds.
This capacity brings communication possibilities to include services such as video
conferencing.
Disadvantages:
The cost of fiber optic cabling is very high.
It is more difficult to install and modify.
Despite of this figures, I have used Optical fiber to construct the backbone of network.
This choice was made because the data transmission rate of optical fiber is very large
and also by considering with the other network cables, optical fiber has a very less
percentage of data loss. But because of the high prize of optical fiber, I had to limit it
only to the backbone of the network.
Page 41
Individual Assignment Hardware Software System and Network PT1182214
DISCRIPTION OF DEVICES
ROUTER:Routers are small physical devices that join multiple networks together. Technically, a router is a Layer 3 gateway device, meaning that it connects two or more networks and that the router operates at the network layer of the OSI model.
Routers used in networks perform the following functions:
1. Restrict broadcast to the LAN
2. Act as the default gateway.
3. Move data between networks.
4. Learn and advertise loop free path
BREEDGE:A network bridge, also known as a layer 2 switch, is a hardware device used to create a connection between two separate computer networks or to divide one network into two. Both networks usually use the same protocol; Ethernet is an example of a protocol. Network devices include, but are not limited to, Personal Computers (PCs), printers, routers, switches and hubs. Devices connected to a network via an Ethernet adapter card have what is known as a Media Access Control (MAC) address, also called a physical or hardware address. It is this address that uniquely identifies a device to a bridge that can then determine to which the network device is connected. The principal function of a network bridge is to forward data based on the MAC address of the sending and receiving devices. This operation helps to eliminate what are known as collision domains.
SWITCH:A network switch is a small hardware device that joins multiple computers together within one local Area Network(LAN).Technically, network switches operate at layer two (Data Link Layer) of the OSI model. Switch forwards data only to the port that connects to the destination device. It does this by learning the MAC address of the devices attached to it, and then by matching the destination MAC address in the data it receives.
-
Page 42
Individual Assignment Hardware Software System and Network PT1182214
HUB:Hubs are used in networks that use twisted-pair cabling to connect devices. Hubs can also be joined together to create larger networks. Hubs are simple devices that direct data packets to all devices connected to the hub, regardless of whether the data package is destined for the device. This makes them inefficient devices and can create a performance bottleneck on busy networks.
-
WIRELESS ACCESS POINT:Wireless access points (APs) are a transmitter and receiver (transceiver) device used to create a wireless LAN (WLAN). APs are typically a separate network device with a built-in antenna, transmitter, and adapter. APs use the wireless infrastructure network mode to provide a connection point between WLANs and a wired Ethernet LAN. APs also typically have several ports allowing a way to expand the network to support additional clients.
MODEM:A modem, short for modulator/demodulator, is a device that converts the digital signals generated by a computer into analog signals that can travel over conventional phone lines. The modem at the receiving end converts the signal back into a format the computer can understand. Modems can be used as a means to connect to an ISP or as a mechanism for dialing up to a LAN.
FIRE WALLA firewall is a networking device, either hardware or software based, that controls access to your organization’s network. This controlled access is designed to protect data and resources from an outside threat. To do this, firewalls are typically placed at entry/exit points of a network—for example,
Placing a firewall between an internal network and the Internet. Once there, it can control access in and out of that point.
Page 43
Individual Assignment Hardware Software System and Network PT1182214
Network Devices Used:Switches: Switch is an intelligent network layer device. It provides dedicated
connection and bandwidth between clients on a LAN. It gives any device on the
network the full bandwidth instead of sharing the available bandwidth. Each port of a
switch will not forward a broadcast packet to some device on the other port. Switch
operates in both half duplex and full duplex modes. The full duplex mode is preferred
in your network..
Router: A router translates information from one network to another; when the
packets are received by the router, it routes it to the appropriate node in a network.
Routers select the shortest path to route a message, based on the destination
addressing.
Network Interface Cards: The (NIC) provides the physical connection between the
network and the computer workstation. Most NICs are internal, with the card fitting
into an expansion slot inside the computer.
Network Interface cards are a main factor in concerning the speed and performance of
a network.
Page 44
Individual Assignment Hardware Software System and Network PT1182214
Network CableTo connect together different devices to make up a network, you need cables.
Cables are still used in most networks, rather than using only wireless, because they can carry much more data per second, and are more secure (less open to hacking).
FirewallA firewall is a device, or a piece of software that is placed between your computer and the rest of the network (where the hackers are!)
If you wish to protect your whole LAN from hackers out on the Internet, you would place a firewall between the LAN and the Internet connection.
Page 45
Individual Assignment Hardware Software System and Network PT1182214
Description of protocols:Protocol: A protocol is a set of rules that governs the communications between
computers on a network. In order for two computers to talk to each other, they must
be speaking the same language. Many different types of network protocols and
standards are required to ensure that your computer (no matter which operating
system, network card, or application you are using) can communicate with another
computer located on the next desk or half-way around the world. The OSI Reference
Model defines seven layers of networking protocols.
Ethernet (Physical/Data Link Layers) IP/IPX (Network Layer) TCP/SPX (Transport Layer) HTTP, FTP, Telnet, SMTP, and DNS(combined Session/Presentation/Application
Layers)
Page 46
Individual Assignment Hardware Software System and Network PT1182214
Ethernet (Physical/Data Link Layers)
The physical layer of the network focuses on hardware elements, such as cables, repeaters, and network interface cards. By far the most common protocol used at the physical layer is Ethernet. For example, an Ethernet network (such as 10BaseT or 100BaseTX) specifies the type of cables that can be used; the optimal topology (star vs. bus, etc.), the maximum length of cables, etc. (See the Cabling section for more information on Ethernet standards related to the physical layer).
The data link layer of the network addresses the way that data packets are sent from one node to another. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network
IP and IPX (Network Layer)
The network layer is in charge of routing network messages (data) from one computer to another. The common protocols at this layer are IP (which is paired with TCP at the transport layer for Internet network) and IPX (which is paired with SPX at the transport layer for some older Macintosh, Linus, UNIX, Novell and Windows networks). Because of the growth in Internet-based networks, IP/TCP are becoming the leading protocols for most networks.
Every network device (such as network interface cards and printers) have a physical address called a MAC (Media Access Control) address. When you purchase a network card, the MAC address is fixed and cannot be changed. Networks using the IP and IPX protocols assign logical addresses (which are made up of the MAC address and the network address) to the devices on the network, This can all become quite complex -- suffice it to say that the network layer takes care of assigning the correct addresses (via IP or IPX) and then uses routers to send the data packets to other networks.
Page 47
Individual Assignment Hardware Software System and Network PT1182214
TCP and SPX (Transport Layer)
The transport layer is concerned with efficient and reliable transportation of the data packets from one network to another. In most cases, a document, e-mail message or other piece of information is not sent as one unit. Instead, it is broken into small data packets, each with header information that identifies its correct sequence and document.
When the data packets are sent over a network, they may or may not take the same route -- it doesn't matter. At the receiving end, the data packets are re-assembled into the proper order. After all packets are received, a message goes back to the originating network. If a packet does not arrive, a message to "re-send" is sent back to the originating network.
TCP, paired with IP, is by far the most popular protocol at the transport level. If the IPX protocol is used at the network layer (on networks such as Novell or Microsoft), then it is paired with SPX at the transport layer.
HTTP, FTP, SMTP and DNS (Session/Presentation/Application Layers)
Several protocols overlap the session, presentation, and application layers of networks. There protocols listed below are a few of the more well-known:
DNS - Domain Name System - translates network address (such as IP addresses) into terms understood by humans (such as Domain Names) and vice-versa
DHCP - Dynamic Host Configuration Protocol - can automatically assign Internet addresses to computers and users
FTP - File Transfer Protocol - a protocol that is used to transfer and manipulate files on the Internet
HTTP – Hyper Text Transfer Protocol - An Internet-based protocol for sending and receiving web pages.
IMAP - Internet Message Access Protocol - A protocol for e-mail messages on the Internet
IRC - Internet Relay Chat - a protocol used for Internet chat and other communications
POP3 - Post Office protocol Version 3 - a protocol used by e-mail clients to retrieve messages from remote servers
SMTP - Simple Mail Transfer Protocol - A protocol for e-mail messages on the Internet
.
Page 48
Individual Assignment Hardware Software System and Network PT1182214
TCP/IP protocol
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered and error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer.
Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP.
Individual Assignment Hardware Software System and Network PT1182214
Network Protocols Used for ICT India public limitedTCP/IP Protocol or Internet ProtocolTCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication
language or protocol of the Internet. It can also be used as a communications protocol
in a private network (either an intranet or an extranet). Main functions of TCP/IP
protocol are described below.
Addressing/Multiplexing:
The main function of TCP protocol is multiplexing the data received
from various process .This help to send the data on the network layer.
Connection establishment, management and termination: TCP provides set of
procedures that devices follow to negotiate and establish TCP connection over
which data can travel.
Data handling and packaging: TCP defines a mechanism by which
applications are able to send data from it to higher levels
Routing / Indirect Delivery
When source and final destination are situated so far away means both
are not attached directly. In these case datagram can send indirectly
Fragmentation and Reassembly
However, the maximum frame size of each physical/data-link network
using IP may be different. For this reason, IP includes the ability to
fragment IP datagram’s into pieces so they can each be carried on the
local network.
TCP/IP is better because it is pear to pear networking we have to go through
Several protocols in OSI model there are many others for TCP/IP to e better.
Page 50
Individual Assignment Hardware Software System and Network PT1182214
Description of Network Technologies:
WAN Technologies:
A Wide Area Network ( WAN) is a computer network covering multiple distance areas, which may spread across the entire world. WANs often connect multiple smaller networks, such as local area networks (LANs) or metro area networks (MANs). The world's most popular WAN is the Internet. Some segments of the Internet are also WANs in themselves. The key difference between WAN and LAN technologies is scalability. C WAN must be able to grow as needed to cover multiple cities, even countries and continents.
A set of switches and routers are interconnected to form a Wide Area Network. The switches can be connected in different topologies such as full mesh and half mesh. A wide area network may be privately owned or rented from a service provider, but the term usually connotes the inclusion of public (shared user) networks.
Both packet switching and circuit switching technologies are used in the WAN. Packet switching allows users to share common carrier resources so that the carrier can make more efficient use of its infrastructure. In a packet switching setup, networks have connections into the carrier's network, and many customers share the carrier's network. The carrier can then create virtual circuits between customers' sites by which packets of data are delivered from one to the other through the network.
Circuit Switching allows data connections to be established when needed and then terminated when communication is complete. This works like a normal telephone line works for voice communication. Integrated Services Digital Network (ISDN) is a good example of circuit switching. When a router has data for a remote site, the switched circuit is initiated with the circuit number of the remote network.
Number of WAN TECHNOLOGIES is discussed below:
1) VPN(Virtual Private Network)
2) ATM
3) Frame Relay
4) SONET/SDH
5) X.25
6) PPP
Page 51
Individual Assignment Hardware Software System and Network PT1182214
Virtual private network (VPN) is a technology widely used in a public switched network
(PSTN) to provide private and secured WAN for an organization. VPN uses encryption and
other techniques to make it appear that the organization has a dedicated network, while
making use of the shared infrastructure of the WAN.
WAN technologies generally function at the lower three layers of the OSI reference model:
the physical layer, the data link layer, and the network layer. Key technologies often found in
WANs include SONET, Frame Relay, X.25, ATM and PPP.
ATM: A dedicated-connection switching technology that organizes digital data into
53-byte cell units. Individually, a cell is processed asynchronously relative to other
related cells and is queued before being multiplexed over the transmission path.
Speeds on ATM networks can reach 10 Gbps.
Frame Relay: (FR). A high-speed packet-switched data communications service,
similar to X.25. Frame relay is widely used for LAN-to-LAN interconnect services,
and is well suited to the bursty demands of LAN environments.
SONET/SDH: Synchronous Optical Network is an international standard for high
speed communication over fiber-optic networks. The SONET establishes Optical
Carrier (OC) levels from 51.8 Mbps to 10 Gbps (OC-192) or even higher.
Synchronous Digital Hierarchy (SDH) is a European equivalent of SONET.
X.25: The X.25 protocol allows computers on different public networks to
communicate through an intermediary computer at the network layer level.
PPP: A point-to-point link provides a single, pre-established WAN communications
path from the customer premises through a carrier network, such as a telephone
company, to a remote network. Point-to-point lines are usually leased from a carrier
and thus are often called leased lines. For a point-to-point line, the carrier allocates
pairs of wire and facility hardware to your line only.
Page 52
Individual Assignment Hardware Software System and Network PT1182214
WAN TECHNOLOGY USED for ICT Public Limited IS VPN:A virtual private network (VPN) is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. A virtual private network can be contrasted with a system of owned or leased lines that can only be used by one company. The main purpose of a VPN is to give the company the same capabilities as private leased lines at much lower cost by using the shared public infrastructure. Phone companies have provided private shared resources for voice messages for over a decade. A virtual private network makes it possible to have the same protected sharing of public resources for data. Companies today are looking at using a private virtual network for both extranets and wide-area intranets. The privacy afforded by these legacy VPNs was only that the communications provider assured the customer that no one else would use the same circuit. This allowed customers to have their own IP addressing and their own security policies. A leased circuit ran through one or more communications switches, any of which could be compromised by someone wanting to observe the network traffic. The VPN customer trusted the VPN provider to maintain the integrity of the circuits and to use the best available business practices to avoid snooping of the network traffic. Thus, these are called trusted VPNs.
SECURE VPN TECHNOLOGY
IPsec with encryption in either tunnel and transport modes. The security associations can be set up either manually or using IKE with either certificates or preshared secrets. IPsec is described in many RFCs, including 2401, 2406, 2407, 2408, and 2409 (for IKEv1), and 4301, 4303, 4306, 4307, and 4308 (for IKEv2).
Page 53
Individual Assignment Hardware Software System and Network PT1182214
IPsec inside of L2TP (as described in RFC 3193) has significant deployment for client-server remote access secure VPNs.
SSL 3.0 or TLS with encryption. TLS is described in RFC 4346. An excellent book on SSL 3.0 and TLS is "SSL and TLS: Designing and Building Secure Systems" by Eric Rescorla (ISBN 0201615983).
These technologies (other than SSL 3.0) are standardized in the IETF, and each has many vendors who have shown their products to interoperate well in the field.
TRUSTED VPN TECHNOLOGY
ATM circuits Frame relay circuits Transport of layer 2 frames over MPLS, as described in draft-ietf-l2vpn-vpls-
bgp and other related Internet Drafts.
Advantages
Data is very secure within the VPN "tunnel" it would be impossible for the data to be tampered with in transit.
You can have access to all your work files and software without having to physically move them.
You have access to all the online services the same as if you were on the campus.
Page 54
Individual Assignment Hardware Software System and Network PT1182214
IP address classification of organization:
An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation. The Class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the node address. There are five different class addresses class A (begin with 0xxx, or 1 to 126 decimal), class B(10xx, or 128 to 191 decimal),class c(10xx, or 128 to 191 decimal),class D(1110, or 224 to 239 decimal), Class E(1111, or 240 to 254 decimal). ICT will get a privet address form ISP and the all devices inside will use public IP address. The IP range, subnet mask, and network address for each network of ICT is as below. All network address is given below
Class A addresses
Class A addresses are used for very large networks. The first octet of a Class A address is used to identify the Network and the three remaining octets are used to identify the host in that particular network. ( network.host.host.host )
For Class A, IP address must have a value between 0.X.X.X to 127.X.X.X
Class B addresses
Class B addresses are used for medium-sized networks. The first two octets of a Class B address is used to identify the Network and the remaining two octets are used to identify the host in that particular network. ( network.network.host.host )
For Class B, IP address must have a value between 128.X.X.X to 191.X.X.X
Class C addresses
Class C addresses are commonly used for small to mid-size businesses. The first three octets of a Class C address is used to identify the Network and the remaining one octet is used to identify the host in that particular network. ( network.network.networkt.host )
For Class C, IP address must have a value between 192.X.X.X to 223.X.X.X
Class D addresses
Class D addresses are known as multicast addresses. Multicasting is a technique to send packets from one device to many devices, without packet duplication. You cannot assign these IP addresses to your devices.
For Class D, IP address must have a value between 223.X.X.X to 239.X.X.X
Page 55
Individual Assignment Hardware Software System and Network PT1182214
Class E addresses
Class E is mainly used for experimental purposes only and is kept preserved for future requirements. One cannot assign these IP addresses.
For Class E, IP address must have a value between 240.X.X.X to 255.X.X.X
ICT Resources India Public Limited Company is having small number of computers therefore we are going to use Class C IP Address for laying out network in the company. As the maximum number of computers are in office (40), to reduce IP address wastage we are required to do sub-netting
Highest no of pc is 40, hence will fulfill our requirement. For this we will transfer three bits from the host part to the network part and the subnet mask for new Network will be 255.255.255.224.
Ground Floor Network Address 192.168.1.1Subnet Mask 255.255.255.254Starting IP Address 192.168.1.2Last IP Address 192.168.1.11
First Floor Network Address 192.168.1.12 Subnet Mask 255.255.255.254Starting IP address 192.168.1.12Last IP Address 192.168.1.30
Second Floor Network Address 192.168.1.31Subnet Mask 255.255.255.254Starting IP address 192.168.1.31Last IP Address 192.168.1.40