Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)

Tags: computer, networking, full, report, computer networking, computer networking ppt, computer networking pdf, computer networks, computer networks pdf, computer networks tanenbaum, computer networks notes, computer networks ppt, computer networks interview questions, computer networking basics, computer networking tutorials, computer networks tanenbaum pdf,
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer networking full report
Post: #1

Assignment Categories

Assignment : 2.
LanExplorer & ETHEREAL software.
Problem Statement :
Study any protocol analyzer software (eg. LAN Explorer) to learn and use its important features, Study of network monitoring software like ETHREAL software. Assignment to examine TCP/IP and non-TCP/IP protocols (IPX/SPX) and capture them using protocol analyzer Software.
LANExplorer Study
What is LANExplorer
Where to get LANExplorer
Requirement (e.g.OS,LAN,etc.).
Key Features.
Network Analysis(Packet Capture,Protocol Decode,Capture Triggers.).
Network Monitoring.
Traffic Matrix.
Additional Features.(e.g. Send packet,Display filter.).

Where to get
Web Sites :
1. http://www.sunrisetelecomlansoftware/lanexplorer.shtml
2. http://www.sunrisetelecomlansoftware/LanExplorer.pdf
3. http://www.freedownloadscenterBest/lanexplorer-3_5.html
4. http://www.networkworlddetails/41.html
5. http://www.softlookupdisplay.asp

Traffic Monitoring

Launching Traffic Matrix Table

Launching Graphical Trace Route

Launching Traffic Matrix Chart

Launching Host Table

Launching Host Chart

Starting and Stopping Packet Capture

Packet Capture window
What is Ethereal
Intended purposes.
Platforms Ethereal runs on.
Where to get Ethereal
A brief history of Ethereal.
User Interface.
How to start Ethereal with command line parameters
How to colorize the packet list
How to control protocol dissection
How to use the various preference settings

Building and Installing Ethereal
Obtain a binary package for your operating system, or
Obtain the source and build Ethereal for your operating system.
The following are the general steps you would use:
1. Download the relevant package for your needs, e.g. source or binary distribution.
2. Build the source into a binary, if you have downloaded the source.This may involve building and/or installing other necessary packages.
3. Install the binaries into their final destinations.

Installing Ethereal under Windows
Download the Ethereal installer from:
and execute it.
Components :
Install the necessary components for ethereal.

ETHEREAL User Interface
How the Ethereal user interface works
How to capture packets in Ethereal
How to view packets in Ethereal
How to filter packets in Ethereal

The Main window

The "File" menu

The "Edit" menu

The "View" menu

The "Go" menu

The "Capture" menu

The "Analyze" menu

The "Statistics" menu

The "Packet List" pane

The "Capture Options" dialog box

While a Capture is running ...

Ethereal with a TCP packet selected for viewing

Assignment : 3.
Windows 2003 server.

Problem Statement :
Assignment to learn and understand Windows 2003 server and its associated domain operations, to configure RAS and DHCP, to add users and computers to a domain

Windows 2003 Server
Windows 2003 Basics.
Active Directory.
Domain Controller.
Associated Domain Operations.
What is RAS and DHCP
Configuring RAS and DHCP.
Adding users to a domain.
Adding computers to a domain.

Configuring DHCP :

Configuring DHCP :

Adding users to Active Directory

Adding users to Active Directory

Adding a computer to Active Directory
Assignment : 4
Linux/Novel Netware configurations and commands.

Problem Statement:
Assignment to learn and understand Linux and/or Novel Netware Network configurations and commands

Linux configurations and commands.
Introduction to Linux .
Features of Linux.
Various types of Linux Commands.
Vi Editor.
Account Creation, Modification & Deletion.
Telnet Service.
Modes of Server ,Services.
NIC Configuration.
Mail Agents.
Web Server Configuration.
FTP Service.
Proxy Server Configuration.
Network File Sharing.

Assignment : 5
Installation of IIS/PWS/Apache server

Problem Statement :

Installation and configuration of IIS/PWS/Apache server. Study and use various facilities/commands and features.
Prerequsites for implementation
Live Demonstration of installation.
Requirement for installing the servers.
Creating Virtual directories using PWS,IIS,Apache.
Assignment : 6
Echo Server

Problem Statement :
Write a program in C/C++ to implement an ECHO server, using Socket programming with both TCP and UDP protocols.
Prerequisites for implementation
Echo Server.
TCP Basics.
UDP Basics.
Various functions available in C/C++ for Socket programming

Assignment : 7.
Quote of the Day Server using VB Winsock Control .
Problem Statement :
Implement a Quote of the Day Server using VB and WinSock Control. Also develop a client application where the user will select TCP or UDP Option, Provide the name of the Server and the Port Number. When the user clicks a button Get the Quote, the client will receive the quote from the server.
Prerequisites for implementation :
Client Server Model.
Winsock Control in VB(i.e. properties, methods & events.)
Possible Uses.
Selecting the protocol.
Setting the Protocol.
TCP Connection Basics.
UDP Basics.
Logic to develop the given application.
Expected Output

Assignment : 8
Internet Update program using Internet Transfer Control.

Problem Statement :
Write an Internet Update program using Internet Transfer Control provided in Visual Basic that will update the files on a local machine for which newer versions of these files are available on the server. Provide facility for the user to determine which files to be updated and which are not.
Prerequisites for implementation :
Internet Transfer Control in VB.
Possible Uses.
Basic Operation.
Setting Different properties of the control (Using Proxy Server,etc.)
Setting FTP Server.
Synchronous and asynchronous transmission.
Diff. Between OpenURL & Execute Methods.
Expected Output

Assignment :9
Email Application.

Problem Statement :

Develop a simple application using MAPI and TAPI.
Prerequisites for implementation :
MAPI Control in VB.
Possible Uses.
MAPI- complient email System (e.g. Microsoft Exchange , Outlook Express).
MAPISession control.
Setting different properties of MAPISession Control.
The MAPIMessages control.
Using various properties & methods to manage messages.
Prerequisites for implementation :
HTML Basics.
Writing HTML Document( format ).
Basics Tags & their syntax.
Examples using various tags.
Stress on the tags essential for developing given application.
Browser Support.
Displaying HTML Pages in the Browser
e.g. Internet Explorer, Netscape Navigator,etc.

Assignment :11
PHP Script.
Problem Statement :
Write a PHP Script that computes total cost of the ordered items from assignment 4, after adding sales tax. The script will show exactly what items have been ordered.
Prerequisites for implementation :
PHP Basics.
PHP installation/ compatibility.
A PHP File.
PHP Syntax.
PHP browser support.
Using different servers to run PHP.
Displaying PHP in browser.

Assignment : 12
XML DTD & XML Schema.
Problem Statement :
Create a DTD for a catalog of cars, where each car has the child elements and two or three child elements have their own child elements, each of these elements are required and has the possible values Yes or No. Create an XML document with instances of the car elements defined in the DTD and process this document using the DTD and produce a display of raw XML document. Create an XML schema and CSS style sheet for the above-mentioned XML document. Create an XSLT style sheet for one car element of the XML document and use it to create a display of that element.
Prerequisites for implementation :
XML Basics.
XML Syntax.
How XML Works.
XML Elements.
XML Attributes.
XML Validation.
Editors for XML(e.g. Stylus Studio).
XML Browser Support.
Viewing XML Files.
XML Schema.
Displaying XML with CSS.
Displaying XML with XSLT.
XML Parser.

Assignment : 8.
Client side Scripting.
Problem Statement:
Develop a simple Web based application. Use client-side and server-side scripting.

Prerequisites for implementation :
VBScript & JavaScript Basics.
Possible Uses.
Using these scripts in various web applications.

Assignment : 13
Problem Statement :

Write an application that should read a SQL query from the user based on some database in say MySQL, call a PHP script to process the query and display the results.
Prerequisites for implementation :
MySQL Syntax.
Running MySQL.
Commands for creating,modifying, deleting Databases, tables, records, etc.
Database Connectivity using PHP.
Mini Project
Students should work in a group to develop an Interactive Database-driven Web based application using ASP, VB and Backend Database and use Software Engineering Principals to develop the project and should deliver necessary documents such as SRS, Design details, User Interface, neatly documented code etc.

Attached File(s)
.ppt  Computer Network .ppt (Size: 3.99 MB / Downloads: 385)
Post: #2

.ppt  Basics_Of_Networking_and_routing.ppt (Size: 2.04 MB / Downloads: 261)
Basics Of Networking

Created by waheed

What is a Computer Network?
A network is a collection of computers, printers, routers, switches, and other devices that are able to communicate with each other over some transmission media.

Types of Networks

There are two basic types of networks currently in existence:
A Local Area Network (LAN)
A Wide Area Network (WAN)
Post: #3

Basics of Networking

Networking began its infancy in the mid -1960’s.
by the US Department of Defence (DoD).
The original intention of networking was being
developed to withstand a nuclear war.
Telephone networks were to vulnerable and would
terminate all conversations should a nuclear war

You wake up at 3 a.m. to go to the bathroom and
stop and check your e-mail on the way back to bed.


ARPA (Advanced Research Projects Agency)
was created in response with the launching of the Sputnik in 1957.
ARPA decided that a DoD network should be packet-
switched networked consisting of a subnet and
host computers.
Experimental network research was awarded to
UCLA, UCSB, SRI and Univ. of Utha in 1969. These
areas were because they all had a large number
of ARPA contracts.

For more information about this article,please follow the link:
Post: #4

.ppt  Lecture 01.ppt (Size: 266 KB / Downloads: 327)
computer networking full report


Understand the state-of-the-art in network protocols, architectures and applications
Understand how networking research is done
Teach the typical constraints and thought process for networked systems
How is class different from undergraduate networking (15-441)
Training network programmers vs. training network researchers
Post: #5
Thanks a lot guys for these ppts. Smile
Post: #6
please send me seminar report of network analyzer ethereal
Post: #7

.docx  project report final.docx (Size: 2.01 MB / Downloads: 161)
This assignment has been done with the help of network simulator 2. Using this simulator, we have analyzed in detail TCP and UDP flows.
NS2 was installed using the ubuntu software.
Using this software, we made both the trace files and the NAM file for the different specifications of transport layer protocols i.e. TCP and UDP and corresponding application layer protocols given for them.
When the simulation is run, the trace file gives a lot of information about the simulation results i.e., using it; we can plot the graph which gives the relationship between different parameters.
With the help of NAM file, we can practically see the flow of packets between different nodes. Along with it, we can also see the packet loss.
Using this simulator, we tried to make different protocols and analyzed the changes occurring in them by changing the transport layer protocol and the application layer protocol.
 NS (network simulator) is basically used to design network protocols which may be wired and wireless.
 NS provides substantial support for simulation of TCP, routing and multicast protocols.
 Different network protocols can be compared with one another.
 Nam can be used to see the packet movement, queue build-up and packet loss directly. It is used to visualize the animation of the flow.
 It has two type of files:
• NAM file:
We can see animations of the network protocol designed using this NAM file.
A snapshot of a NAM file is as under:
NAM interface
Node manipulation
Link manipulation
Topology layout
Protocol state
This file contains the code established for the network protocol. With the help of this file, we can get all the information about the specifications of network which may include
 Nodes involved( sources and destinations)
 Position of several nodes
 Bandwidths
 No of bytes during flow
 Window size
 Time for flow
 Throughput
 Type of transport and application layer protocol
Basically, with the trace file, we can come to know all what is happening in our network protocol.
With the help of this trace file, we can plot a graph which can be used to see the relationship between different parameters like the type of transport protocol e.t.c.
Some of the steps which can be used while designing the protocol are:
 Create simulator
 Create an event scheduler
 Turn the tracing on
 Create network topology
 setup packet loss, link dynamics e.t.c
 setup routing agents
 Create connections(transport) between nodes
 Create traffic
 Start simulation
It draws a graph on an X display given data read from data files or from some input.
Following specifications define the assignment.
 The delays have been mentioned on the figure.
 FLOW1: N1-N5
 FLOW2: N2-N6
 For the TCP transport layer protocol, we have FTP application layer protocol while, for the UDP transport layer protocol, we have CBR application layer protocol.
 For the given questions, we have different TCP flavors i.e. TCP reno and TCP tahoe.
 Queue size is specified to be 10 for all questions.
 For all the questions, we have to calculate the average throughput i.e. the throughput during whole time interval.

Read about TCP Reno, TCP Tahoe and TCP SACK. Provide a comparison of the three TCP flavors, preferably in a table format. Finally provide a short analysis/result on which of the three is better. Your analysis must be precise not exceeding 15-20 lines.

It is a reliable connection oriented protocol. It ensures reliability of packet transference due to acknowledgements. Reliability is ensured by starting a timer whenever a packet is sent. If the acknowledgement is received within the time then its fine else wise, there is packet loss.
Post: #8
Presented By
Brian Bogue

.ppt  networking.ppt (Size: 2.73 MB / Downloads: 203)
Computer Networking
Internet Service Provider [ISP] Satellite, Wireless, Cable and Dial-up
Direcway Satellite is our ISP with a connection speed of 850K down and 35K up.
Wireless Network Allows us to share our internet connection and files to multiple sites. Sending a signal just under ½ mile.
Hardware Required Location, Location, Location
Height and a clear line of sight is most important for speed.
Switch with 4-8 ports [may need a router]
Outdoor CAT 5 cable, RJ45 connectors and crimper tool.
Access Point {use power-over-ethernet; from experience}
UPS [battery backup – keep out power problems]
Hardware Required II Location, Location, Location
Antennae at each location
Hardwire to remote location computer.
Be Patient and Secure your Network!!
Keep on trying and asking questions.
Make sure you turn on the security for your wireless network.
A firewall must be on all computers running on the network.
Post: #9

.pptx  Basil computers.pptx (Size: 1.01 MB / Downloads: 77)
Networking refers to creating networks.
A network is a group of devices linked to each other.
Computers are widely used to communicate by connecting them together.
This process is called computer networking.
A collection of computers connected to one and another is called a computer network.
Advantages of Computer Networking:
It allows different computers to communicate with one another.
It makes sharing of data and resources much easier.
It saves time and money.
Terminology of Networks
The main computer from which all the other computers share information is known as the Server. The server serves all the nodes that are connected in the network.
A computer terminal attached to a network that shares information is a called a Node. It I also known as a Workstation.
Network Interface Unit (NIU):
It is a device used for connecting the server and the workstations. It helps in the communication between the server and the nodes.
Types of Networks
Based on the number of computers attached and the area in which they are spread out, networks can be divided into three types :
Local Area Network (LAN),
Metropolitan Area Network (MAN),
Wide Area Network (WAN).
Local Area Network (LAN)
A small group of computers connected in a localized area is called a Local Area Network (LAN).
It connects computers and devices in a limited geographical area such as home, school, computer laboratory or office building.
The defining characteristics of LAN, include their usually higher data-transfer rates, smaller geographical area, and lack of a need for leased telecommunication lines.
Different computers in this type of network are connected together by physical media like wires, cables, etc. LANs are usually installed by small organizations like schools, offices, hospitals etc.
Metropolitan Area Network (MAN)
A metropolitan area network (MAN) is a computer network that usually spans a city or a large campus.
A MAN usually interconnects a number of local area networks using a high-capacity backbone technology, such as fiber-optical links.
The technology used in MAN is similar to that of LAN but it covers a larger area as compared to LAN. A simple example of a Metropolitan Area Network is a Cable TV Network.
Wide Area Network (WAN)
The networks spread across cities and countries are known as Wide Area Networks. A wide area network (WAN) is a computer network that covers a broad area.
The computers are separated by large distances in different cities, states, countries and continents and are connected to each other through cables and even wireless communication channels. The internet which is spread throughout a world is an example of a Wide Area Network (WAN).
Components of a Computer Network
The main components essential for the successful operationing of a computer network can be divided into two main types.
These are :
Hardware Components

Hardware components in a computer network include :
computer systems (server or clients),
shared resources, like printers, scanners, etc,
physical media that connects them.
The various computers on a network are either named as servers or clients. Different computers that access shared resources on the network are called Clients. Servers are the computers that receive requests from network users (clients) and make the shared resources available to them.
Software Components
The software components required to run a computer network are of two types. These are :
Network Software
The protocols specify the rules, procedures and conventions for communication and data transfer over the network. An example of a protocol is TCP/IP. TCP stands for Transmission Control Protocol and IP stands for Internet Protocol.
Network software is the software that performs various network related functions such as data routing and error detection etc.
Topology of Networks
In a Local Area Network (LAN) environment, the nodes can be interconnected in different ways. The pattern of interconnection of nodes using cables in a network is called Network Topology.
There are three basic topologies :
Bus Topology,
Star Topology,
Ring Topology.
Bus Topology
In a Bus network, also known as Linear network, all the computers and peripheral devices are connected to one single cable called the Bus.
In this type of network, computers can be easily added or removed from the network. The failure of a single node does not affect the performance of the rest of the network.
Star Topology
In a Star Network the server is placed at the center to which all the other nodes are connected. In this type of topology, it is easy to add or remove nodes.
A star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages.
The star topology reduces the chance of network failure by connecting all of the systems to a central node.
Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network.
Ring Topology
In a Ring Topology the nodes are connected in a circular chain in which each node is connected to the next. The last node is connected to the first node.
It is difficult to add or remove nodes in this type of a structure. If any one node fails, the whole of the network goes down.
A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring.
Data travels from node to node, with each node along the way handling every packet.
Because a ring topology provides only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link.
A node failure or cable break might isolate every node attached to the ring.
Communication Channels
All networks need to be linked to each other. Media or channels refer to the wires, cables or any other means by which data travels from the source to the destination.
The most commonly used media are :
Twisted Pair Cable,
Coaxial Cable,
Fiber Optic Cable,
Wireless Links.
Twisted Pair Cable
Twisted Pair Cable normally consists of strands of copper wire, insulated with plastic sheet and then twisted around each other.
This is the most commonly used media.
It is easy to install, has low weight and is flexible.
It is not capable of carrying data over long distances.
In video applications that send information across multiple parallel signal wires, twisted pair cabling can introduce signaling delays known as skew which results in subtle color defects and ghosting due to the image components not aligning correctly when recombined in the display device.
Coaxial Cable
Coaxial Cable consists of a solid wire core surrounded by a wire mesh with an insulator in between.
It is commonly used in the Cable TV networks.
A coaxial Cable can carry more data than twisted pair wire and is less susceptible to interference. It is more expensive as compared to twisted pair wire.
Coaxial cable is used as a transmission line for radio frequency signals, in applications such as feed lines connecting radio transmitters and receivers with their antennas, computer network (Internet) connections, and distributing cable television signals.
One advantage of coax over other types of radio transmission line is that in an ideal coaxial cable the electromagnetic field carrying the signal exists only in the space between the inner and outer conductors.
Optical Fiber Cable
An Optical Fiber Cable is a thin strand of glass that transmits pulsating beams of light.
Fiber Optic Cables have a complete immunity to noise.
They are also very fragile, so they needed to be handled very carefully.
An Optical Fiber is a flexible, transparent fiber made of very pure glass not much bigger than a human hair that acts as a waveguide to transmit light between the two ends of the fiber.
The field of applied science and engineering concerned with the design and application of optical fibers is known as fiber optics.
Optical fibers are widely used in fiber-optic communications, which permits transmission over longer distances and at higher bandwidths than other forms of communication.
Fiber Optics are used instead of metal wires because signals travel along them with less loss and are also immune to electromagnetic interference. Optical fiber typically consists of a transparent core surrounded by a transparent cladding material with a lower index of refraction. Light is kept in the core by total internal reflection.
Wireless Links
Wireless communications rely on radio signals for transmitting data. Wireless communication is becoming increasingly popular. The advantage of wireless communication is the flexibility that it offers in terms of the network layout. There are four common applications of wireless communication in the field of computer networking. These are :
Office LAN can use radio signals to transmit data between nodes.
Cellular telephone equipment can be used along with a modem to connect computer systems so that business people can stay in touch with their offices.
Local Area Networks can be connected using microwave transmission within the metropolitan area.
Satellites and microwaves are used to connect WANs covering large distances.
Post: #10

.ppt  computer networks.ppt (Size: 382 KB / Downloads: 76)
Computer Networks
Computer network connects two or more computers.
The computers can be geographically located anywhere.
Network in small geographical Area (Room, Building or a Campus) is called LAN (Local Area Network)
Network in a City is call MAN (Metropolitan Area Network)
Network spread geographically (Country or across Globe) is called WAN (Wide Area Network)
Applications of Networks
Resource Sharing
Hardware (computing resources, disks, printers)
Software (application software)
Information Sharing
Easy accessibility from anywhere (files, databases)
Search Capability (WWW)
Message broadcast
Remote computing
Distributed processing (GRID Computing)
Network Topology
The network topology defines the way in which computers, printers, and other devices are connected. A network topology describes the layout of the wire and devices as well as the paths used by data transmissions.
Bus Topology
Commonly referred to as a linear bus, all the devices on a bus topology are connected by one single cable.
Star & Tree Topology
The star topology is the most commonly used architecture in Ethernet LANs.
Larger networks use the extended star topology also called tree topology. When used with network devices that filter frames or packets, like bridges, switches, and routers, this topology significantly reduces the traffic on the wires by sending packets only to the wires of the destination host.
Ring Topology
A frame travels around the ring, stopping at each node. If a node wants to transmit data, it adds the data as well as the destination address to the frame.
The frame then continues around the ring until it finds the destination node, which takes the data out of the frame.
Single ring – All the devices on the network share a single cable
Dual ring – The dual ring topology allows data to be sent in both directions.
Mesh Topology
The mesh topology connects all devices (nodes) to each other for redundancy and fault tolerance.
It is used in WANs to interconnect LANs and for mission critical networks like those used by banks and financial institutions.
Implementing the mesh topology is expensive and difficult.
Network Components
Physical Media
Interconnecting Devices
Networking Software
Networking Media
Networking media can be defined simply as the means by which signals (data) are sent from one computer to another (either by cable or wireless means).
Networking Devices
HUB, Switches, Routers, Wireless Access Points, Modems etc.
Computers: Clients and Servers
In a client/server network arrangement, network services are located in a dedicated computer whose only function is to respond to the requests of clients.
The server contains the file, print, application, security, and other services in a central computer that is continuously available to respond to client requests.
Networking Protocol: TCP/IP
Searchable Data (Web Sites)
News Groups
Internet Telephony (VoIP)
Video Conferencing
Chat Groups
Instant Messengers
Internet Radio
Post: #11

.doc  computer netwrk project.doc (Size: 42.44 KB / Downloads: 61)
What is networking?

 A network is a collection of computers and devices connected to each other. The network allows computers to communicate with each other and share resources and information.
 In other words networking can be defined as inter-connection of two or more computers for sharing the resources(hardware and software)and provide security on them.
 Networks are built with a combination of computer hardware and computer software.
Types of computer networks :-
 All networks are made up of basic hardware building blocks to interconnect network nodes, such as Network Interface Cards (NICs), Bridges, Hubs, Switches, and Routers.
 In addition, some method of connecting these building blocks is required, usually in the form of galvanic cable .
 Less common are microwave links or optical cable (“optical fibre"). An Ethernet card may also be required.
Some of the basic components required for interconnecting the network nodes:
 A network card, network adapter or NIC (network interface card) is a piece of computer hardware designed to allow computers to communicate over a computer network.
 It provides physical access to a networking medium and often provides a low-level addressing system through the use of MAC addresses.
 A repeater is an electronic device that receives a signal and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation.
 In most twisted pair Ethernet configurations, repeaters are required for cable runs longer than 100 meters.
 A hub contains multiple ports.
 When a packet arrives at one port, it is copied unmodified to all ports of the hub for transmission.
 The destination address in the frame is not changed to a broadcast address.
 Routers are networking devices that forward data packets between networks using headers and forwarding tables to determine the best path to forward the packets.
 Routers work at the network layer .
Post: #12
to get information about the topic "computer networking" full report ppt and related topic refer the link bellow
Post: #13
to get information about the topic "Computer Networking" full report ppt and related topic refer the link bellow
Post: #14

.doc  1COMPUTER NETWORKING.doc (Size: 1.35 MB / Downloads: 45)


Definition :-

A network is a system that transmits any combination of voice, video and/or data between users. A network can be defined by its geographical dimensions and by which the user’s PC access it.
A network consists of a:
• The network operating system (Windows NT/2000TM/Xp) on the user’s PC (client) and server.
• The cables connecting all network devices (user’s PC, server, peripherals, etc.).
• All supporting network components (hubs, routers and switches, etc.).


These are privately owned networks within a single building or campus of up to a few a kilometers in size.
LAN’s are distinguished from other networks by three characteristics:
1) Their size.
2) Their transmission technology.
3) Their topology.
LAN’s are restricted in size, which means that the worst-case transmission time is bounded and known in advance.
LAN’s often use a transmission technology consisting of a single cable to which all the machines are attached.
LANs run at speeds of 10 to 100 Mbps, have low delays, and make very few errors.


It is a Computer network that spans a relatively large geographical area, often a country or continent. Typically a WAN consists of two or more Local Area Network.
Computers connected to WAN are often connected through public networks such as telephone systems. They can also be connected through leased lines or satellites. The largest WAN in existence is Internet.
WANs run at speed of maximum 2 to 10 Mbps.


Layering Concepts and Benefits

Many benefits can be gained from the process of breaking up the functions or tasks of networking into smaller chunks, called layers, and defining standard interfaces between these layers. The layers break a large, complex set of concepts and protocols into smaller pieces, making it easier to talk about, to implement with hardware and software, and to troubleshoot.
The following list summarizes the benefits of layered protocol Specifications:
Humans can more easily discuss and learn about the many details of a protocol specification.
Standardized interfaces among layers facilitate modular engineering.

A better environment for interoperability is created. One vendor can write software that implements higher layers—for example, a Web browser—and another can write software that implements the lower layers—for example, Microsoft’s built-in TCP/IP software in its operating systems.
Reduced complexity allows easier program changes and faster product evolution.
One layer uses the services of the layer immediately below it. Therefore, remembering what each layer does is easier. (For example, the network layer needs to deliver data from end to end. To do this, it uses data links to forward data to the next successive device along that end-to-end path.)


The OSI model describes how information makes its way from application programs through a network medium to another application program in other computer. It divides one big problem in to seven smaller problems . Each problem is addressed by one of the seven layers of the OSI model.


Networking devices do various kind of jobs like transferring the data to signals, providing connectivity to different network devices, transferring the data in form of packets or frames form one device to other. These are the central connections for all the network equipments and handles a data type known as frame or packet. Actually frames/ packet contain data and the destination address of where it is going. When a frame is received, it is amplified and then transmitted on to port of destination PC. But different networking components do this job in diff form at diff layers.


A Network Interface Card (NIC) is a circuit board that plugs into both clients and servers and controls the exchange of data between them (A specific software “driver” must be installed depending on the make of the NIC. A physical transmission medium, such as twisted pair or coaxial cable interconnects all network interface cards to network hubs or switches. Ethernet and Token Ring are common network interface cards. Today’s cards supports 10baseT and 100baseT with automatic recognition.


When the need for interconnecting more then 2 devices together then a device known as hub comes to picture. Basically hub is a layer one device. i.e. it operates on the physical layer of the OSI model. It is designed to do broadcasting i.e when it gets any frame it broadcasts it to every port irrespective that whether it is destined for that port or not. Hub has no way of distinguishing which port a frame should be sent. Broadcasting results in lot of traffic on the network which lead to poor network response. If two PC simultaneously transmit there data packets and both are connected to a HUB, then collision will occur, so we can say, it creates a single collision domain. On the other hand all PCs connected to a hub will get a same message so a single broadcast domain will be created.
A 100/1000 Mbps hub must share its bandwidth with each and every one of its ports. So when only one PC is broadcasting, it will have access to the max available bandwidth. If, however, multiple PC’s are broadcasting, then that bandwidth will need to be divided between all of these systems, which will degrade the performance. They are usually Half-Duplex in nature.


Hubs are capable of joining more than two PC but having some demerits like if two PC would want to communicate at a time then there would be a collision and the both PC would have to send the data once again. This shortcoming of Hub is overcame by Switches. Switches are intelligent devices which work on the Layer2 of the OSI model. Basically a switch keeps a record of MAC addresses of all the devices connected to it. Using this information, it builds a MAC address table. So when a frame is received, it knows exactly which port to send it to, which increases the network response time.

Basic Working Principle of Switch.

1. At the time of initializing the switch the MAC address table is yet to be built up. When a frame is send by some of the PC, it recognises the source MAC address and update the MAC address table.
2. If the destination is available in the MAC table then forward to the corresponding PC.
3. If the destination MAC address is not present in the table then forwards in all the port available expect the incoming one. The designated PC will respond for the data and it will send the acknowledge for the data received. This acknowledged data will be examined by the switch and the MAC address table would be up dated accordingly.
Post: #15
computer network

.docx  network.docx (Size: 189.63 KB / Downloads: 16)

A computer network, often simply referred to as a network, is a collection of computers and other hardware components interconnected by communication channels that allow sharing of resources and information.[1] Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
Networks may be classified according to a wide variety of characteristics, such as the medium used to transport the data, communications protocol used, scale, topology, and organizational scope.
Communications protocols define the rules and data formats for exchanging information in a computer network, and provide the basis for network programming. Well-known communications protocols include Ethernet, a hardware and link layer standard that is ubiquitous in local area networks, and the Internet protocol suite, which defines a set of protocols for internetworking, i.e. for data communication between multiple networks, as well as host-to-host data transfer, and application-specific data transmission formats.
Computer networking is sometimes considered a sub-discipline of electrical engineering, telecommunications, computer science, information technology or computer engineering, since it relies upon the theoretical and practical application of these disciplines.

Communication media

Computer networks can be classified according to the hardware and associated software technology that is used to interconnect the individual devices in the network, such as electrical cable (HomePNA, power line communication,, optical fiber, and radio waves (wireless LAN). In the OSI model, these are located at levels 1 and 2.
A well-known family of communication media is collectively known as Ethernet. It is defined by IEEE 802 and utilizes various standards and media that enable communication between devices. Wireless LAN technology is designed to connect devices without wiring. These devices use radio waves or infrared signals as a transmission medium.

Wireless technologies

• Terrestrial microwave – Terrestrial microwave communication uses Earth-based transmitters and receivers resembling satellite dishes. Terrestrial microwaves are in the low-gigahertz range, which limits all communications to line-of-sight. Relay stations are spaced approximately 48 km (30 mi) apart.
• Communications satellites – The satellites communicate via microwave radio waves, which are not deflected by the Earth's atmosphere. The satellites are stationed in space, typically in geosynchronous orbit 35,400 km (22,000 mi) above the equator. These Earth-orbiting systems are capable of receiving and relaying voice, data, and TV signals.
• Cellular and PCS systems use several radio communications technologies. The systems divide the region covered into multiple geographic areas. Each area has a low-power transmitter or radio relay antenna device to relay calls from one area to the next area.
• Radio and spread spectrum technologies – Wireless local area network use a high-frequency radio technology similar to digital cellular and a low-frequency radio technology. Wireless LANs use spread spectrum technology to enable communication between multiple devices in a limited area. IEEE 802.11 defines a common flavor of open-standards wireless radio-wave technology.


Main article: Ethernet

Ethernet is a family of connectionless protocols used in LANs, described by a set of standards together called IEEE 802 published by the Institute of Electrical and Electronics Engineers. It has a flat addressing scheme and is mostly situated at levels 1 and 2 of the OSI model. For home users today, the most well-known member of this protocol family is IEEE 802.11, otherwise known as Wireless LAN (WLAN). However, the complete protocol suite deals with a multitude of networking aspects not only for home use, but especially when the technology is deployed to support a diverse range of business needs. MAC bridging (IEEE 802.1D) deals with the routing of Ethernet packets using a Spanning Tree Protocol, IEEE 802.1Q describes VLANs, and IEEE 802.1X defines a port-based Network Access Control protocol, which forms the basis for the authentication mechanisms used in VLANs, but it is also found in WLANs – it is what the home user sees when the user has to enter a "wireless access key".

Storage area network

A storage area network (SAN) is a dedicated network that provides access to consolidated, block level data storage. SANs are primarily used to make storage devices, such as disk arrays, tape libraries, and optical jukeboxes, accessible to servers so that the devices appear like locally attached devices to the operating system. A SAN typically has its own network of storage devices that are generally not accessible through the local area network by other devices. The cost and complexity of SANs dropped in the early 2000s to levels allowing wider adoption across both enterprise and small to medium sized business environments.

Campus area network

A campus area network (CAN) is a computer network made up of an interconnection of LANs within a limited geographical area. The networking equipment (switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc.) are almost entirely owned (by the campus tenant / owner: an enterprise, university, government etc.).
In the case of a university campus-based campus network, the network is likely to link a variety of campus buildings including, for example, academic colleges or departments, the university library, and student residence halls.

Backbone network

A backbone network is part of a computer network infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks. A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. Normally, the backbone's capacity is greater than that of the networks connected to it.
A large corporation which has many locations may have a backbone network that ties all of these locations together, for example, if a server cluster needs to be accessed by different departments of a company which are located at different geographical locations. The equipment which ties these departments together constitute the network backbone. Network performance management including network congestion are critical parameters taken into account when designing a network backbone.
A specific case of a backbone network is the Internet backbone, which is the set of wide-area network connections and core routers that interconnect all networks connected to the Internet

Marked Categories : report on computer netowrkin, computer network report, full project report in networking in pdf file, project report on networking in computer, computer network report pdf, project work on computer networking, seminar report on computer network, download report on computer networking, computer networks document download, computer networking, computer networks tanenbaum ppt downaeds, latest seminar reports on computer networks, how to write a report on the operations of a computer network, android network computer project report, full projects on networking, computer network, project report on computer networking, computer networks optical fiber seminar pdf,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  hydroforming full report project report tiger 5 25,145,995 Yesterday 01:37 AM
Last Post: Guest
  nrega project report er diagram Guest 1 0 18-01-2018 03:31 PM
Last Post: dhanabhagya
  COST EFFECTIVENESS OF MINERAL WOOL INSULATION Vs PERLITE INSULATION full report project report tiger 2 11,755,305 18-01-2018 11:53 AM
Last Post: dhanabhagya
  Solar pond technology full report seminar girl 2 782 18-01-2018 10:08 AM
Last Post: dhanabhagya
  suggestion for informative report of public deposits invited by company Guest 1 0 18-01-2018 10:06 AM
Last Post: dhanabhagya
  Ultrasonic Trapping In Capillaries For Trace-Amount Bi (Download Full Seminar Report) Computer Science Clay 2 6,418,002 17-01-2018 11:59 AM
Last Post: dhanabhagya
  fuel from plastic waste full report seminar presentation 25 97,080,499 17-01-2018 10:40 AM
Last Post: dhanabhagya
  Mini project report on SHADOW ALARM project girl 5 11,060 17-01-2018 03:50 AM
Last Post: SharonJer
  nanorobotics full report project topics 24 75,820,765 16-01-2018 05:50 PM
Last Post: Guest
  siwes report on science laboratory technology pdf Guest 1 0 15-01-2018 01:58 PM
Last Post: dhanabhagya
This Page May Contain What is computer networking full report And Latest Information/News About computer networking full report,If Not ...Use Search to get more info about computer networking full report Or Ask Here