0% found this document useful (0 votes)
93 views25 pages

Cne Project GRP 05

A wireless network allows devices to connect to a local area network (LAN) without being physically connected with cables. It uses radio waves to enable wireless communication between nodes in the network. The key components are an access point that broadcasts the network's name and allows devices to connect securely, and wireless clients like laptops and phones that can receive the broadcast and connect to access the network and broader internet. When a client wants to connect, it goes through an authentication process with the access point using security credentials if enabled. Once associated, data is transmitted between the devices using radio frequencies in common bands like 2.4GHz or 5GHz. Wireless networks offer mobility and flexibility compared to wired networks.

Uploaded by

bhaskarpagare247
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views25 pages

Cne Project GRP 05

A wireless network allows devices to connect to a local area network (LAN) without being physically connected with cables. It uses radio waves to enable wireless communication between nodes in the network. The key components are an access point that broadcasts the network's name and allows devices to connect securely, and wireless clients like laptops and phones that can receive the broadcast and connect to access the network and broader internet. When a client wants to connect, it goes through an authentication process with the access point using security credentials if enabled. Once associated, data is transmitted between the devices using radio frequencies in common bands like 2.4GHz or 5GHz. Wireless networks offer mobility and flexibility compared to wired networks.

Uploaded by

bhaskarpagare247
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Micro Project report on

STUDY ON WIRELESS NETWORK

Academic Year: 2023-2024 Code: 0563

Program: Information Technology Semester: Fourth


Course: Computer Network Course Code: 22417
Group no: 05

Maharashtra State Board of Technical Education, Mumbai


(Autonomous)(ISO-9001-2008) (ISO/IEC 27001:20013)
Maharashtra State Board of Technical Education,
Mumbai

CERTIFICATE
This is to certify that,

Roll No Student Name Seat No Enroll No.

13 GAUTAMI PAGARE 2205630199

14 VIDISHA CHAUHAN 2205630200

15 KOMAL KAMBLE 2205630201

Of Fourth Semester of Diploma in Information Technology of Institute


Pravin Patil College of Diploma Engineering and Technology, Bhayandar(E)
(Code: 0563) has completed the Micro Project satisfactorily in subject :
Computer Network (CNE-22417) for the academic year 2023–2024 as
prescribed in the curriculum.

Place: Bhayandar (E)


Date:

Mr. Meet Chudasama Mr. Nilesh Vispute Mrs. R.B Patil


Subject Teacher Head of Department Principal
PART A

1.0 Rationale
To utilize the potential of Information and communication technology fully, all workplaces
contain computers, and they are invariably interconnected. Apart from at home and in the
office, computer networks are present in all domains of work. This demands increased need
of skilled man power and well trained work force to create and maintain computer
networks. This course introduce basic concept of networks, network classification, network
topologies, network devices, Network communication models, concept of TCP/IP
protocols, IP addressing t help the students to setup computer network and apply current
Computer Network technology to maintain it..

2.0 Literature Review


Computer networks are social media sites, understanding, people and companies that are
automatically connected. The growth in communications systems has led to a decrease in the
de-emphasis on packaged cohesion in work and in the group network, as well as to the
inaccurately fragmented and insufficiently woven network communities. The Web extends
people's social resources and increases contact with the outside world and friends who live
nearby, far and beyond. The "social networks" and "computer networks “often co-work,
connect individuals to "social networks" and take care of individual people who use the
computer systems to communicate with themselves in an encrypted scenario. "Computer
networks" often work together.

3.0 Proposed Methodology


Creating a report in Computer Network on “Study on wireless network”.

4.0 Action Plan

S.No Details of Activity Planned Planned Name of


Start Date Finish Responsible
Date Members

1 Gathering Information Gautami Pagare


2 Understand the logic Vidisha Chauhan
3 Importing required module in Komal Kamble
application
4 Implementation the logic Komal Kamble
5 Applying condition Gautami Pagare
6 Solving the errors Vidisha Chauhan
7 Getting the correct output Gautami Pagare &
Vidisha Chauhan
8 Creating the report Komal Kamble

5.0 Resources Required


Sr.No Name of Resource Specification Qty Remarks
1 Microsoft Word 2016 1 Available
PART B

1.0 Rationale
To utilize the potential of Information and communication technology fully, all workplaces
contain computers, and they are invariably interconnected. Apart from at home and in the office,
computer networks are present in all domains of work. This demands increased need of skilled
man power and well trained work force to create and maintain computer networks. This course
introduce basic concept of networks, network classification, network topologies, network
devices, Network communication models, concept of TCP/IP protocols, IP addressing t help the
students to setup computer network and apply current Computer Network technology to maintain
it.

2.0 Course Outcomes Integrated

a) Use basic concepts of networking for setting-up computer networks.


b) Setup a computer network for specific requirements.
c) Configure basic network services.
d) Configure the different TCP/IP services.
e) Implement subnetting for improved network address management.

3.0 Literature Review


Computer networks are social media sites, understanding, people and companies that are
automatically connected. The growth in communications systems has led to a decrease in the de-
emphasis on packaged cohesion in work and in the group network, as well as to the inaccurately
fragmented and insufficiently woven network communities. The Web extends people's social
resources and increases contact with the outside world and friends who live nearby, far and
beyond. The "social networks" and "computer networks “often co-work, connect individuals to
"social networks" and take care of individual people who use the computer systems to
communicate with themselves in an encrypted scenario. "Computer networks" often work
together.
.
4.0 Actual Procedure Followed

a) Firstly, we need to gather all information related to Android Application On Mobile


Unit Converter Application
b) Installing the Android Studio.
c) Creating a new activity
d) Implementing GUI in Android.
e) Run the program of the Android Application on Unit Converter Application.

5.0 Actual Resources Used

Sr.No Name of Resource Specification Qty Remarks


1 Microsoft Word 2016 1 Available
6.0 Content of project

What Is A Wireless Network?

A wireless network refers to a computer network that makes use of Radio Frequency (RF)
connections between nodes in the network. Wireless networks are a popular solution for homes,
businesses, and telecommunications networks.

It is common for people to wonder “what is a wireless network” because while they exist nearly
everywhere people live and work, how they work is often a mystery. Similarly, people often
assume that all wireless is Wi-Fi, and many would be surprised to discover that the two are not
synonymous. Both use RF, but there are many different types of wireless networks across a
range of technologies (Bluetooth, ZigBee, LTE, 5G),
while Wi-Fi is specific to the wireless protocol defined by the Institute of Electrical and
Electronic Engineers (IEEE) in the 802.11 specification and it’s amendments.

How does the wireless network work?

A Wi-Fi based wireless network sends signals using radio waves (cellular phones and radios also
transmit over radio waves, but at different frequencies and modulation).

In a typical Wi-Fi network, the AP (Access Point) will advertise the specific network that it
offers connectivity to. This is called a Service Set Identifier (SSID) and it is what users see
when they look at the list of available networks on their phone or laptops. The AP advertises
this by way of transmissions called beacons. The beacon can be thought of as an announcement
saying “Hello, I have a network here, if it’s the network you’re looking for, you can join”.

A client device receives the beacon transmitted by the AP and converts the RF signal into digital
data, then that data is passed along to the device for interpretation. If the user wants to connect
to the network, it can send messages to the AP trying to join and (when security is enabled)
providing the proper credentials to prove they have the right to join. These processes are known
as Association & Authentication. If either of these fail, the device will not successfully join the
network and will be unable to further communicate with the AP.

Assuming all goes well, we come to the part that is the end user’s ultimate goal: passing data.
Data from the client (or from the AP to the client) is converted from digital data into an RF
modulated signal and transmitted over the air. When received, this is de-modulated, converted
back to digital data, and then forwarded along to its destination (often the internet or a resource
on the larger internal network).

Wi-Fi communication is only approved to transmit on specific frequencies, in most parts of the
world these are the 2.4 GHz and 5 GHz frequency bands, although many countries are now
adding 6GHz frequencies as well. However that does not mean that there are not other
technologies that can operate in these bands. In the 2.4GHz band in particular there are many
products.
Components of wireless network

Several components make up a wireless network's topology:

Clients: What we tend to think of as the end user devices are typically called 'clients'. As the
reach of WiFi has expanded, a variety of devices may be using WiFi to connect the network,
including phones, tablets, laptops, desktops, and more. This gives users the ability to move
about the area without sacrificing their bridge to the network. In some instances, mobility
within an office, warehouse, or other work area is necessary. For example, if employees have
to use scanners to register packages due to be shipped, a wireless network provides the
flexibility they need to freely move about the warehouse.

Access Point (AP): An access point (AP) consists of a Wi-Fi that is advertising a network
name (known as a Service Set Identifier, or SSID). Users who connect to this network will
typically find their traffic bridged to a local-area network (LAN) wired network (like Ethernet)
for communication to the larger network or even the internet.
Types of Wireless Network Connections:

1. PAN (PERSONAL AREA NETWORK)


A personal-area network consists of a network centralized around the devices of a single
person in a single location. A PAN could have computers, phones, video game consoles, or
other peripheral devices. They are common inside homes and small office buildings.
Bluetooth is the most commonly known wireless PAN.

Working of PAN network:

A PAN may be wireless or carried over wired interfaces such as USB. A wireless personal area
network (WPAN) is a PAN carried over a low-powered, short-distance wireless
network technology such as IrDA, Wireless USB, Bluetooth, NearLink or Zigbee. The reach of
a WPAN varies from a few centimeters to a few meters. WPANs specifically tailored for low-
power operation of the sensors are sometimes also called low-power personal area
network (LPPAN) to better distinguish them from low-power wide-area network (LPWAN).
Advantages of PAN:
 Cost-effective: A PAN network requires no expensive installation or cable connection
between devices, making it more cost-effective than conventional networks.

 Simplicity: This form of network does not need a complex setup in order to be used
effectively. Moreover, it is simple to maintain, since there are no cables, servers, or
routers involved. If an issue happens on the network, it is simple to resolve. It requires
less technical skills for usage.

 Data Protection: A personal area network is often more secure than other networks
since the connecting endpoints have obtained authorization from the authorized user
prior to exchanging data.

 Less Storage Space: A PAN employs Bluetooth or other technologies to immediately


transfer data across connected devices, enabling the storage to be shared while
occupying minimum space.

 Stability and Dependability: The network is more stable and dependable than
networks with a larger reach because it is not dependent on servers and functions
within a limited range. 

 Concurrent Multiple Connections: In a local area network, a device may


concurrently connect to numerous other devices. For instance, a smartphone may
simultaneously connect to many tablets and mobile phones. 

 Adaptability: PAN is reasonably adaptable and offers great network efficiency for
short ranges.

 Maintainability: It requires neither regular installation nor maintenance

 Portability: It is portable with ease.


Disadvantages of PAN:
 Restricted to relatively modest data transfer rates: Because technologies like
Bluetooth cannot transport large volumes of data across several devices at rapid rates,
PANs are often slower than WAN, LAN, and MAN networks.

 Insufficient network coverage region or range: This sort of network can send data
within a range of around 10 meters. The network also has a restricted number of linked
devices.

 Interference with radio signals: Data carried over a personal area network is
susceptible to lose because it may interfere with radio frequencies in the vicinity. 

 Incompatibility: Devices are incompatible with one another.

 Cost: Embedded WPAN devices are rather pricey.

 No Broadcasting: The PAN network is not a type of broadcasting technology. It


implies that we cannot transmit identical data to thousands of devices using a network.
For instance, it will be challenging for us to send a message to all the devices
connected to the pan network.

 Health Problems: Since PAN networks are wireless, they emit hazardous radiation
such as microwave signals. These signals can have detrimental health effects on
humans and animals alike. Examples include cerebral injury and heart-related issues. 

 Infrared Transmissions: Due to the fact that PAN uses infrared signals, it can only
travel in a direct line. This is evident when using a television remote. A TV remote
will only operate when it is facing the television; otherwise, it will not function. 

 Security Issues: There are a few security issues on the pan network that are not
present on other networks. It related PAN security concerns primarily to the distance
between devices. In computer networking, network security is of utmost importance.

The security of the network depends on the distance between devices, so it is


challenging to send data from one device to another in a pan network when the
distance between devices is minimal.
2. LAN (LOCAL AREA NETWORK)

A local-area network is a computer network that exists at a single site, such as an office
building. It can be used to connect a variety of components, such as computers, printers, and
data storage devices. LANs consist of components like switches, access points, routers,
firewalls, and Ethernet cables to tie it all together. Wi-Fi is the most commonly known
wireless LAN.

LAN due to their small size are considerably faster, their speed can range anywhere from 100
to 100Mbps. It is very easy to design and troubleshoot.

Working of LAN:
Most LANs connect to the Internet at a central point: a router. Home LANs often use a single
router, while LANs in larger spaces may additionally use network switches for more efficient
packet delivery. LANs almost always use Ethernet, WiFi, or both in order to connect devices
within the network.

Components Necessary for LAN network:


 Public internet
The public internet is what’s being accessed through the LAN. Typically, the centralized server
receives data packets from the public internet and access requests from the client devices

 Wired end-user devices


An average LAN environment will have a mix of both wired and wireless devices. Remember
that we are talking about end-user devices here, such as laptops, desktops, smart televisions,
smart monitors, collaboration hardware, meeting room systems, and the like..

 Mobile end-user devices


Mobile end-user devices refer to devices that you connect using Wi-Fi instead of an ethernet
cable. Keep in mind that the same device can double up as both a wired or mobile variant.

 Centralized server
The centralized server is possibly the most crucial component in a LAN environment,
particularly for enterprise implementations. Enterprises may purchase or lease servers from
vendors like IBM, Cisco, HPE, etc.
 Network switches
A network switch is an essential component of a local area network. It governs how data packets
and network resources are allocated between the devices connected to the centralized server.

 Wi-Fi router
A Wi-Fi router is now a staple component of local area networks as wireless LAN
implementations aren’t possible without it. The router is connected to your modem so that it can
receive network signals, and it converts it into wireless signals that your mobile end-user
devices can process.

 Modem
A modem is an indispensable component for a local area network as this is what converts the
analog signals transmitted via wires and cables into a digital format. Traditional modems are
standalone devices where you can plug in the incoming uplink on one end and the outgoing
cable on the other8. Firewall appliance (optional)
A firewall protects end-user devices and servers from network-related security attacks by
restricting specific kinds of traffic.

Advantages of LAN:
o Simple and relatively inexpensive: The primary benefit of a local area network is that this
is quick and easy to set up and reasonably priced when contrasted to other alternatives;
consequently, if an organization intends to build a network at a minimal price and with
flexibility, a local area network is the ultimate answer.

o Collaboration of Resources: Expensive components such as printers and scanners cannot


be linked to every desktop since it will indeed be very burdensome for the company, but
thanks to local area networks, a corporation only clearly need one printer and scanner, and
everybody can link to that printer and scanner and sends instruction from their machines,
leading in meaningful cost savings for the corporation.

o The association involving client and server: All information from connected PCs may be
maintained on a single server. If a machine (Client) demands information, the client may
effortlessly log in and retrieve the information from the system. Films and albums, for
instance, can be maintained on the server and retrieved by any approved user.
o Accessing of software programs: On the LAN, software programs may also be shared.
You can incorporate a single licensed program that can be used by any device on a
network. It is pricey to buy a license for each device on a network, consequently sharing
software is simple and straightforward, and cost-effective.

o Data protection: It is more safe and secure to keep information on the server. And if
you wish to update or eliminate any data, you may do so rapidly on a single server
computer, and other devices will be able to obtain the new information. You may very
well grant or deny access to particular users, guaranteeing that only approved users have
accessibility to the network’s data.

o Fast communication: LAN-connected systems or devices communicate directly at very


high rates of speed, based on the LAN model and ethernet cabling installed. The most
prevalent enabled speeds are 10 Mbps, 100 Mbps, and 1000 Mbps. Technologies of
gigabit ethernet are quickly developing. Once the technology becomes more
sophisticated and large-scale production has commenced, lower-cost variants will be
accessible to the public.

Disadvantages of LAN :
o The information security issue that arises: Unapproved users can retrieve data if the
server equipment is not programmed correctly and there is a technical glitch. As a
consequence, the server’s privacy policy and procedures must be effectively managed.

o Long-distance major limitation: Local area networks are often devised within a building
or apartment complex and cannot be stretched to a bigger area.

o All devices may be disproportionately affected if the server fails: If a file on the server
gets heavily damaged or a hard disc crashes, all of the linked PCs will have extreme
difficulty operating correctly.

o Installing a LAN is difficult and expensive: It is expensive to establish a LAN since


specialized software is essential to install a server. Additionally, communication hardware
such as hubs, switches, routers, and cables are expensive to buy. A large office’s LAN must
be administered and troubleshot by a professional operator.

o Data Sharing via Outside Sources: Another drawback of LAN is that it is difficult and
time-consuming to send files from outside the network since transportable media such as
pen drives and CDs cannot be conveniently performed on all devices on the network.
Specification:

LAN Specification Description


10Mbps Ethernet using UTP Cats 3, 4, or 5 cabling. 100
10BaseT
meter limit.
100Mbps Fast Ethernet using UTP Cat 5 cabling. 100
100BaseTX
meter limit.
100Mbps Fast Ethernet using two strands of multimode
100BaseFX
fiber optic cable per link. 400 meter limit.
100Mbps Fiber Distributed Data Interface token
FDDI passing LAN using either single mode or multimode
fiber optic cabling. 100 kilometer limit.
100Mbps Copper Distributed Data Interface token
CDDI
passing LAN using copper wiring. 100 meter limit.
622Mbps Asynchronous Transfer Mode over fiber
ATM
optic cabling
1000BaseFX 1Gbps Gigabit Ethernet over fiber optic cabling.
100Mbps Fast Ethernet and Token Ring using UTP
100VG-AnyLAN Cats 3, 4, or 5 cabling. Can be run over any existing
10BaseT networks.
10Mbps Ethernet using Thinnet coaxial cable. 185 meter
10Base2
limit.
10Mbps Ethernet using Thicknet coaxial cable. 500
10Base5
meter limit.
100Mbps Fast Ethernet using four pairs of UTP Cats 3, 4,
100BaseT4
or 5 cabling. 100 meter limit.
10Mbps Ethernet using fiber optic cabling. 2 kilometer
10BaseFB
limit.
10Mbps Ethernet using fiber optic cabling, used as a
10BaseFL LAN backbone, not to connect to hosts directly. 2
kilometer limit.
10Mbps Ethernet using fiber optic cabling, used to
10BaseFP link computers into a star topology without using
repeaters. 500 meter limit.
10Mbps Fast Ethernet using broadband coaxial cable. 3.6
10Broad36
kilometer limit.
3. MAN (METROPOLITAN AREA NETWORK)
A metropolitan-area network is a computer network that spans across a city, small
geographical area, or business or college campus. One feature that differentiates a MAN from
a LAN is its size. A LAN usually consists of a solitary building or area. A MAN can cover
several square miles, depending on the needs of the organization.

Large companies, for example, may use a MAN if they have a spacious campus and need to
manage key components, such as HVAC and electrical systems. The data transmission speed
is low as compared to LAN because extension of network.

Working of MAN:
MANs typically combine the networks of multiple organizations, instead of being managed by a
single organization. Most MANs use fiber optic cables to form connections between LANs.
Often a MAN will run on "dark fiber" — formerly unused fiber optic cables that are able to carry
traffic.

Components of MAN:

Hardware Components:
The hardware components of a Local Area Network (LAN) include:

o Devices: LANs connect various devices such as computers, laptops, servers, printers,
switches, routers, network-attached storage (NAS) devices, and other network-enabled
devices. These devices are interconnected to facilitate communication and resource
sharing within the LAN.

o Network Interface Cards (NICs): Each device connected to the LAN requires a
Network Interface Card or network adapter. A NIC is responsible for establishing a
physical connection to the LAN. It allows the device to send and receive data packets over
the network.
o Cables and Connectors: LANs use cables and connectors to establish wired connections
between devices. Ethernet cables, such as Cat5e or Cat6, are commonly used. These
cables provide the physical medium through which data is transmitted between devices
within the LAN.

Software Components:
The software components of a Local Area Network (LAN) include:

o Network Operating System (NOS): A LAN may have a dedicated network operating
system installed on servers or specialized network devices. The NOS provides the
foundation for managing and controlling the network. It allows administrators to
configure network settings, manage user accounts, allocate resources, and provide
network services such as file sharing, printing, and email.

o Network Protocols: LANs rely on network protocols to govern how data is transmitted,
addressed, and managed within the network. Common LAN protocols include Ethernet
for wired connections and Wi-Fi for wireless connections. TCP/IP (Transmission Control
Protocol/Internet Protocol) is the fundamental protocol suite used in LANs, providing the
rules and standards for data transmission and addressing.

o Network Management Software: LANs often employ network management software to


monitor, control, and troubleshoot network performance and configurations. This
software lets network administrators view network activity, track device status, manage
network security, and analyze network traffic. It facilitates network monitoring,
performance optimization, and configuration management.

The Users:
The users component of a Local Area Network (LAN) refers to the individuals or entities who
utilize the network to access resources, communicate, and collaborate within the LAN
environment. Here are some key aspects of the users component:

o Network Users: These are the individuals or groups of people who connect their
devices to the LAN. Network users can include employees within an organization,
students in an educational institution, or residents in a residential community. Each user
typically has a device, such as a computer or a laptop, to access the LAN.

o Network Administrator: The network administrator oversees the LAN’s operations,


configurations, and maintenance. This individual or team is typically knowledgeable
about network technologies and has the expertise to manage and troubleshoot network-
related issues. The network administrator’s tasks can include:
Advantages of MAN:

 Security: MAN provides more security as compared to WAN and it is easy to implement.

 Distance occupies: MAN is occupied more distance as compared to LAN i.e. It is wider than
LAN.

 Less expensive: MAN implementation cost is less than WAN because MAN requires fewer
resources as compared to WAN. It saves implementation costs.

 High speed: Man has a high speed of data transfer because MAN often uses fiber
optics cables that are capable of offering speeds up to 1000Mbps.

 Centralized management: MANs can be centrally managed, making it easier to monitor and
control network traffic.

 Cost-effective: Compared to WANs, MANs are more cost-effective to implement


and maintain.

 Scalability: MANs can be easily scaled up or down to meet changing business needs

 Improved communication: MANs can improve communication within organizations by


allowing for faster and more efficient sharing of data and resources.

Disadvantages of MAN:

 Security: It is difficult to secure the system from hackers because of the large area. This is
mainly due to safety issues.

 Wire required: more cables are required to connect MAN from one place to another. MAN
requires fiber optics cables which are quite expensive

.
 Technical assistance: Here, skilled technicians and administrators are required. This
can overall increase the installation cost.

 Difficult to manage: MAN consumes a large area then there is difficult to manage a large
network, Here is a chance of attacking hackers on the network. Data can be secured but it
needs experienced staff and security tools.
Specifications of MAN:

Empty Cell 10GBASE-S 10GBASE-LX4

Data rate 10 Gb/s 4×10 Gb/s

Transmission
850 nm 1270 nm to 1355 nm
wavelength

Transmission 62.5 μm MMF 10 μm SMF or 50 μm,


medium pair 62.5 μm MMF pair

Switched (full
MAC protocol duplex) Switched (full duplex)
4. WAN (WIDE AREA NETWORK)
A wide-area network covers a very large area, like an entire city, state, or country. In fact,
the internet is a WAN. Like the internet, a WAN can contain smaller networks, including
LANs or MANs. Cellular services are the most commonly known wireless WANs.

The data transmission speed of these network is slow as compared to LAN and MAN. The
example of these network is internet.

Working of WAN:

A wide-area network (WAN) is the technology that connects your offices, data centers,
cloud applications, and cloud storage together. It is called a wide-area network because it
spans beyond a single building or large campus to include multiple locations spread across
a specific geographic area, or even the world.

Components of WAN:

1. End devices
End devices are computing systems that are being connected through wide area network
technology. These can range from user-facing interfaces like mobile devices, PCs, and
industry-specific workstations to servers, data centers, and mainframes

2. Customer premises equipment (CPE)


While most of the networking infrastructure used in WAN is owned by the carrier or
service provider, CPE is owned by the enterprise and sits in your local environment.

3. Access points and routers


While access points and routers technically fall under CPE (as they are located within the
LAN environment), they deserve special mention as indispensable architectural
components of WAN. a router is your core LAN hub and manages data flow to and from
your end devices.
4. Network switches
Network switches (also part of your CPE) sit between your access points and routers and
the end devices to which they are connected. They forward data packets coming through
the external network and regulate how they are distributed across your various end devices.

5. Local area network (LAN)


LAN is a key architectural component of a wide area network. All the components we
discussed so far (end devices, CPE, access points, routers, and network switches) are part
of your local area network environment.

6.Connecting media
The connecting media carries data packets in a WAN mesh architecture to and from
different LAN components. There is a wide variety of media to choose from when setting
up your WAN, including traditional MPLS lines, fiber optic cables, the cellular (3G, 4G, or
5G) spectrum, and satellite connectivity

7.Metropolitan area network (MAN)


A metropolitan area network or MAN is an optional component of WAN architecture.
Instead of directly connecting two or more LAN environments, you can choose to connect
LANs within a relatively small radius using a MAN. Multiple MANs, then, are interlinked
to form a wide area network .

8.Unified management portal


A unified WAN management portal is becoming increasingly commonplace in enterprise
WAN implementations. This is because WAN can be difficult to orchestrate and manage,
with each LAN hub responsible for network management for its own location

Advantages of Wide Area Network (WAN):

 Greater Geographic Coverage – Unlike Local Area Networks (LANs), which are
limited to a small area like an office or building, WANs can span across cities,
states, and even countries. This allows businesses and individuals to communicate
with each other over long distances without having to rely on traditional methods
like snail mail or phone calls
 Enhanced Data Security – WANs often use advanced security protocols to protect
data as it travels across multiple networks. This means that sensitive information
like personal details or financial transactions can be transmitted safely without the
risk of unauthorized access.
 Increased Flexibility – WANs are designed to be scalable and adaptable, which
means they can easily accommodate changes in traffic and bandwidth demands.
This is especially useful for businesses that experience fluctuations in traffic
throughout the day, as WANs can adjust to meet their needs.
 Improved Collaboration – With WANs, teams can work together on projects from
different locations without having to be physically present in the same place. This
means that businesses can save on travel costs and increase productivity by
allowing employees to work from anywhere with an internet connection.
 Better Access to Resources – WANs can provide access to resources that may not
be available locally, such as cloud-based software or online storage solutions. This
means that businesses and individuals can benefit from the latest technologies
without having to invest in expensive infrastructure.
Disadvantages of Wide Area Network (WAN):

 Slower Speeds – One of the main disadvantages of WAN is that it is slower


compared to Local Area Network (LAN). Since WAN covers a larger area, it takes
more time to transmit data from one point to another, and this can cause a delay in
communication.
 Security Risks – WAN is more vulnerable to security risks, such as hacking,
viruses, and malware. Since WAN connects devices and computers over a larger
area, it can be harder to secure every point of connection, and this can lead to
security breaches.
 Higher Costs – Setting up and maintaining WAN can be expensive. WAN requires
specialized hardware, software, and network devices to operate, and this can result
in higher costs for businesses and organizations that rely on WAN for their
operations.
 Dependency on Service Providers – WAN is often provided by third-party service
providers, and this can create dependency issues. If the service provider
experiences any issues or disruptions, it can affect the operation of WAN, and this
can cause disruptions to businesses and organizations.
 Distance Limitations – WAN is limited by distance. The farther the connection,
the slower the data transfer speed, and this can affect the quality of communication.
Additionally, WAN is subject to natural barriers such as mountains, oceans, and
deserts, which can make it difficult or impossible to establish connections in certain
areas.

Specifications of WAN:
 Asynchronous communications
i5/OS asynchronous communications support allows an iSeries application program to
exchange data with a remote system or device using either an asynchronous (start-stop)
line or an X.25 line.

 Binary synchronous communications


Binary synchronous communications (BSC) is a data communications line protocol that
uses a standard set of transmission control characters and control character sequences
to send binary-coded data over a communications line.
Frame relay networks

 Frame relay is a protocol that defines how frames are routed through a fast-
packet network based on the address field in the frame.
Synchronous Data Link Control networks

 Synchronous Data Link Control (SDLC) - is a protocol that is used for


transferring synchronous, code-transparent, serial-by-bit information over a
communications line.
 X.25 networks
X.25 is a Telecommunications Standardization Sector (ITU-T) recommendation that
defines the physical level (physical layer), link level (data link layer), and packet level
(network layer) of the open systems interconnection (OSI) reference model.
 X.21 networks
In data communications, a specification of the International Telegraph and Telephone
Consultative Committee (CCITT) defines the connection of a data terminal equipment
to an X.21 (public data) network.

7.0 Skill Developed/learning out of this Micro-project


Learned what is

• What is wireless network?


• How does the wireless network work?
• Components of wireless network

• Types of wireless network

8.0 Application of this Micro-project

You can connect thermostats, phones, computers, cameras, and light fixtures. You can
also link TVs and speakers. Health enthusiasts use this technology to pair fitness devices.
Doctors also use it to get information from connected devices such as pacemakers.
Wireless communication are used to making calls, connecting devices, Accessing the
Internet, Enhance Security, For Locating and Tracking and many more.
Teacher Evaluation Sheet

Name of Student: Gautami Pagare Enrollment No: 2205630199


Name of Program: INFORMATION TECHNOLOGY Semester: Fourth
Course Title: Computer Network Code: 22417
Title of the Micro Project: Study on wireless network
Course Outcomes Achieved:
a) Use basic concepts of networking for setting-up computer networks.
b) Setup a computer network for specific requirements.
c) Configure basic network services.
d) Configure the different TCP/IP services.
e) Implement subnetting for improved network address management.

Evaluation as per Suggested Rubric for Assessment of Micro-Project

Sr. Characteristic to be Assessed Poor Average Good Excellent Sub


No (Marks1-3) (Marks4-5) (Marks 6- (Marks 9- Total
8) 10)
(A) Process and Product Assessment (Covert above total marks out of 6 Marks)
1 Relevance to the course
Literature Survey/ Information
2 Collection
Completion of the Target as per
3 project proposal
Analysis of Data and
4 Representation

5 Quality of Prototype/Model

6 Report Preparation

(B) Individual Presentation / Viva (Convert above total marks out of 4 Marks)
7 Presentation
8 Defense

Micro-Project Evaluation Sheet

(A) Process and Product Assessment (B) Individual Presentation / Viva Total Marks
(6 Marks) (4 marks) (10 Marks)

Comments / Suggestions about teamwork / leadership / interpersonal communication:

………………………………………………………………………………………………………………………
…………………….

Name & Designation of the Teacher: Mr. Meet Chudasama (Lecturer-0563)


Dated Signature: ………………………..
Teacher Evaluation Sheet
Name of Student: Vidisha Chauhan Enrollment No: 2205630200
Name of Program: INFORMATION TECHNOLOGY Semester: Fourth
Course Title: Computer Network Code: 22417
Title of the Micro Project: Study on wireless network
Course Outcomes Achieved:
a) Use basic concepts of networking for setting-up computer networks.
b) Setup a computer network for specific requirements.
c) Configure basic network services.
d) Configure the different TCP/IP services.
e) Implement subnetting for improved network address management.

Evaluation as per Suggested Rubric for Assessment of Micro-Project

Sr. Characteristic to be Assessed Poor Average Good Excellent Sub


No (Marks1-3) (Marks4-5) (Marks 6- (Marks 9- Total
8) 10)
(A) Process and Product Assessment (Covert above total marks out of 6 Marks)
1 Relevance to the course
Literature Survey/ Information
2 Collection
Completion of the Target as per
3 project proposal
Analysis of Data and
4 Representation

5 Quality of Prototype/Model

6 Report Preparation

(B) Individual Presentation / Viva (Convert above total marks out of 4 Marks)
7 Presentation
8 Defense

Micro-Project Evaluation Sheet

(A) Process and Product Assessment (B) Individual Presentation / Viva Total Marks
(6 Marks) (4 marks) (10 Marks)

Comments / Suggestions about teamwork / leadership / interpersonal communication:

Name & Designation of the Teacher: Mr. Meet Chudasama (Lecturer-0563)


Dated Signature: ………………………..
Teacher Evaluation Sheet

Name of Student: Komal Kamble Enrollment No: 2205630201


Name of Program: INFORMATION TECHNOLOGY Semester: Fourth
Course Title: Computer Network Code: 22417
Title of the Micro Project: Study on wireless network
Course Outcomes Achieved:
a) Use basic concepts of networking for setting-up computer networks.
b) Setup a computer network for specific requirements.
c) Configure basic network services.
d) Configure the different TCP/IP services.
e) Implement subnetting for improved network address management.

Evaluation as per Suggested Rubric for Assessment of Micro-Project

Sr. Characteristic to be Assessed Poor Average Good Excellent Sub


No (Marks1-3) (Marks4-5) (Marks 6- (Marks 9- Total
8) 10)
(A) Process and Product Assessment (Covert above total marks out of 6 Marks)
1 Relevance to the course
Literature Survey/ Information
2 Collection
Completion of the Target as per
3 project proposal
Analysis of Data and
4 Representation

5 Quality of Prototype/Model

6 Report Preparation

(B) Individual Presentation / Viva (Convert above total marks out of 4 Marks)
7 Presentation
8 Defense

Micro-Project Evaluation Sheet

(A) Process and Product Assessment (B) Individual Presentation / Viva Total Marks
(6 Marks) (4 marks) (10 Marks)

Comments / Suggestions about teamwork / leadership / interpersonal communication:

………………………………………………………………………………………………………………………
…………………….
Name & Designation of the Teacher: Mr. Meet Chudasama (Lecturer-0563)
Dated Signature: ………………………..

You might also like