Cne Project GRP 05
Cne Project GRP 05
CERTIFICATE
This is to certify that,
1.0 Rationale
To utilize the potential of Information and communication technology fully, all workplaces
contain computers, and they are invariably interconnected. Apart from at home and in the
office, computer networks are present in all domains of work. This demands increased need
of skilled man power and well trained work force to create and maintain computer
networks. This course introduce basic concept of networks, network classification, network
topologies, network devices, Network communication models, concept of TCP/IP
protocols, IP addressing t help the students to setup computer network and apply current
Computer Network technology to maintain it..
1.0 Rationale
To utilize the potential of Information and communication technology fully, all workplaces
contain computers, and they are invariably interconnected. Apart from at home and in the office,
computer networks are present in all domains of work. This demands increased need of skilled
man power and well trained work force to create and maintain computer networks. This course
introduce basic concept of networks, network classification, network topologies, network
devices, Network communication models, concept of TCP/IP protocols, IP addressing t help the
students to setup computer network and apply current Computer Network technology to maintain
it.
A wireless network refers to a computer network that makes use of Radio Frequency (RF)
connections between nodes in the network. Wireless networks are a popular solution for homes,
businesses, and telecommunications networks.
It is common for people to wonder “what is a wireless network” because while they exist nearly
everywhere people live and work, how they work is often a mystery. Similarly, people often
assume that all wireless is Wi-Fi, and many would be surprised to discover that the two are not
synonymous. Both use RF, but there are many different types of wireless networks across a
range of technologies (Bluetooth, ZigBee, LTE, 5G),
while Wi-Fi is specific to the wireless protocol defined by the Institute of Electrical and
Electronic Engineers (IEEE) in the 802.11 specification and it’s amendments.
A Wi-Fi based wireless network sends signals using radio waves (cellular phones and radios also
transmit over radio waves, but at different frequencies and modulation).
In a typical Wi-Fi network, the AP (Access Point) will advertise the specific network that it
offers connectivity to. This is called a Service Set Identifier (SSID) and it is what users see
when they look at the list of available networks on their phone or laptops. The AP advertises
this by way of transmissions called beacons. The beacon can be thought of as an announcement
saying “Hello, I have a network here, if it’s the network you’re looking for, you can join”.
A client device receives the beacon transmitted by the AP and converts the RF signal into digital
data, then that data is passed along to the device for interpretation. If the user wants to connect
to the network, it can send messages to the AP trying to join and (when security is enabled)
providing the proper credentials to prove they have the right to join. These processes are known
as Association & Authentication. If either of these fail, the device will not successfully join the
network and will be unable to further communicate with the AP.
Assuming all goes well, we come to the part that is the end user’s ultimate goal: passing data.
Data from the client (or from the AP to the client) is converted from digital data into an RF
modulated signal and transmitted over the air. When received, this is de-modulated, converted
back to digital data, and then forwarded along to its destination (often the internet or a resource
on the larger internal network).
Wi-Fi communication is only approved to transmit on specific frequencies, in most parts of the
world these are the 2.4 GHz and 5 GHz frequency bands, although many countries are now
adding 6GHz frequencies as well. However that does not mean that there are not other
technologies that can operate in these bands. In the 2.4GHz band in particular there are many
products.
Components of wireless network
Clients: What we tend to think of as the end user devices are typically called 'clients'. As the
reach of WiFi has expanded, a variety of devices may be using WiFi to connect the network,
including phones, tablets, laptops, desktops, and more. This gives users the ability to move
about the area without sacrificing their bridge to the network. In some instances, mobility
within an office, warehouse, or other work area is necessary. For example, if employees have
to use scanners to register packages due to be shipped, a wireless network provides the
flexibility they need to freely move about the warehouse.
Access Point (AP): An access point (AP) consists of a Wi-Fi that is advertising a network
name (known as a Service Set Identifier, or SSID). Users who connect to this network will
typically find their traffic bridged to a local-area network (LAN) wired network (like Ethernet)
for communication to the larger network or even the internet.
Types of Wireless Network Connections:
A PAN may be wireless or carried over wired interfaces such as USB. A wireless personal area
network (WPAN) is a PAN carried over a low-powered, short-distance wireless
network technology such as IrDA, Wireless USB, Bluetooth, NearLink or Zigbee. The reach of
a WPAN varies from a few centimeters to a few meters. WPANs specifically tailored for low-
power operation of the sensors are sometimes also called low-power personal area
network (LPPAN) to better distinguish them from low-power wide-area network (LPWAN).
Advantages of PAN:
Cost-effective: A PAN network requires no expensive installation or cable connection
between devices, making it more cost-effective than conventional networks.
Simplicity: This form of network does not need a complex setup in order to be used
effectively. Moreover, it is simple to maintain, since there are no cables, servers, or
routers involved. If an issue happens on the network, it is simple to resolve. It requires
less technical skills for usage.
Data Protection: A personal area network is often more secure than other networks
since the connecting endpoints have obtained authorization from the authorized user
prior to exchanging data.
Stability and Dependability: The network is more stable and dependable than
networks with a larger reach because it is not dependent on servers and functions
within a limited range.
Adaptability: PAN is reasonably adaptable and offers great network efficiency for
short ranges.
Insufficient network coverage region or range: This sort of network can send data
within a range of around 10 meters. The network also has a restricted number of linked
devices.
Interference with radio signals: Data carried over a personal area network is
susceptible to lose because it may interfere with radio frequencies in the vicinity.
Health Problems: Since PAN networks are wireless, they emit hazardous radiation
such as microwave signals. These signals can have detrimental health effects on
humans and animals alike. Examples include cerebral injury and heart-related issues.
Infrared Transmissions: Due to the fact that PAN uses infrared signals, it can only
travel in a direct line. This is evident when using a television remote. A TV remote
will only operate when it is facing the television; otherwise, it will not function.
Security Issues: There are a few security issues on the pan network that are not
present on other networks. It related PAN security concerns primarily to the distance
between devices. In computer networking, network security is of utmost importance.
A local-area network is a computer network that exists at a single site, such as an office
building. It can be used to connect a variety of components, such as computers, printers, and
data storage devices. LANs consist of components like switches, access points, routers,
firewalls, and Ethernet cables to tie it all together. Wi-Fi is the most commonly known
wireless LAN.
LAN due to their small size are considerably faster, their speed can range anywhere from 100
to 100Mbps. It is very easy to design and troubleshoot.
Working of LAN:
Most LANs connect to the Internet at a central point: a router. Home LANs often use a single
router, while LANs in larger spaces may additionally use network switches for more efficient
packet delivery. LANs almost always use Ethernet, WiFi, or both in order to connect devices
within the network.
Centralized server
The centralized server is possibly the most crucial component in a LAN environment,
particularly for enterprise implementations. Enterprises may purchase or lease servers from
vendors like IBM, Cisco, HPE, etc.
Network switches
A network switch is an essential component of a local area network. It governs how data packets
and network resources are allocated between the devices connected to the centralized server.
Wi-Fi router
A Wi-Fi router is now a staple component of local area networks as wireless LAN
implementations aren’t possible without it. The router is connected to your modem so that it can
receive network signals, and it converts it into wireless signals that your mobile end-user
devices can process.
Modem
A modem is an indispensable component for a local area network as this is what converts the
analog signals transmitted via wires and cables into a digital format. Traditional modems are
standalone devices where you can plug in the incoming uplink on one end and the outgoing
cable on the other8. Firewall appliance (optional)
A firewall protects end-user devices and servers from network-related security attacks by
restricting specific kinds of traffic.
Advantages of LAN:
o Simple and relatively inexpensive: The primary benefit of a local area network is that this
is quick and easy to set up and reasonably priced when contrasted to other alternatives;
consequently, if an organization intends to build a network at a minimal price and with
flexibility, a local area network is the ultimate answer.
o The association involving client and server: All information from connected PCs may be
maintained on a single server. If a machine (Client) demands information, the client may
effortlessly log in and retrieve the information from the system. Films and albums, for
instance, can be maintained on the server and retrieved by any approved user.
o Accessing of software programs: On the LAN, software programs may also be shared.
You can incorporate a single licensed program that can be used by any device on a
network. It is pricey to buy a license for each device on a network, consequently sharing
software is simple and straightforward, and cost-effective.
o Data protection: It is more safe and secure to keep information on the server. And if
you wish to update or eliminate any data, you may do so rapidly on a single server
computer, and other devices will be able to obtain the new information. You may very
well grant or deny access to particular users, guaranteeing that only approved users have
accessibility to the network’s data.
Disadvantages of LAN :
o The information security issue that arises: Unapproved users can retrieve data if the
server equipment is not programmed correctly and there is a technical glitch. As a
consequence, the server’s privacy policy and procedures must be effectively managed.
o Long-distance major limitation: Local area networks are often devised within a building
or apartment complex and cannot be stretched to a bigger area.
o All devices may be disproportionately affected if the server fails: If a file on the server
gets heavily damaged or a hard disc crashes, all of the linked PCs will have extreme
difficulty operating correctly.
o Data Sharing via Outside Sources: Another drawback of LAN is that it is difficult and
time-consuming to send files from outside the network since transportable media such as
pen drives and CDs cannot be conveniently performed on all devices on the network.
Specification:
Large companies, for example, may use a MAN if they have a spacious campus and need to
manage key components, such as HVAC and electrical systems. The data transmission speed
is low as compared to LAN because extension of network.
Working of MAN:
MANs typically combine the networks of multiple organizations, instead of being managed by a
single organization. Most MANs use fiber optic cables to form connections between LANs.
Often a MAN will run on "dark fiber" — formerly unused fiber optic cables that are able to carry
traffic.
Components of MAN:
Hardware Components:
The hardware components of a Local Area Network (LAN) include:
o Devices: LANs connect various devices such as computers, laptops, servers, printers,
switches, routers, network-attached storage (NAS) devices, and other network-enabled
devices. These devices are interconnected to facilitate communication and resource
sharing within the LAN.
o Network Interface Cards (NICs): Each device connected to the LAN requires a
Network Interface Card or network adapter. A NIC is responsible for establishing a
physical connection to the LAN. It allows the device to send and receive data packets over
the network.
o Cables and Connectors: LANs use cables and connectors to establish wired connections
between devices. Ethernet cables, such as Cat5e or Cat6, are commonly used. These
cables provide the physical medium through which data is transmitted between devices
within the LAN.
Software Components:
The software components of a Local Area Network (LAN) include:
o Network Operating System (NOS): A LAN may have a dedicated network operating
system installed on servers or specialized network devices. The NOS provides the
foundation for managing and controlling the network. It allows administrators to
configure network settings, manage user accounts, allocate resources, and provide
network services such as file sharing, printing, and email.
o Network Protocols: LANs rely on network protocols to govern how data is transmitted,
addressed, and managed within the network. Common LAN protocols include Ethernet
for wired connections and Wi-Fi for wireless connections. TCP/IP (Transmission Control
Protocol/Internet Protocol) is the fundamental protocol suite used in LANs, providing the
rules and standards for data transmission and addressing.
The Users:
The users component of a Local Area Network (LAN) refers to the individuals or entities who
utilize the network to access resources, communicate, and collaborate within the LAN
environment. Here are some key aspects of the users component:
o Network Users: These are the individuals or groups of people who connect their
devices to the LAN. Network users can include employees within an organization,
students in an educational institution, or residents in a residential community. Each user
typically has a device, such as a computer or a laptop, to access the LAN.
Security: MAN provides more security as compared to WAN and it is easy to implement.
Distance occupies: MAN is occupied more distance as compared to LAN i.e. It is wider than
LAN.
Less expensive: MAN implementation cost is less than WAN because MAN requires fewer
resources as compared to WAN. It saves implementation costs.
High speed: Man has a high speed of data transfer because MAN often uses fiber
optics cables that are capable of offering speeds up to 1000Mbps.
Centralized management: MANs can be centrally managed, making it easier to monitor and
control network traffic.
Scalability: MANs can be easily scaled up or down to meet changing business needs
Disadvantages of MAN:
Security: It is difficult to secure the system from hackers because of the large area. This is
mainly due to safety issues.
Wire required: more cables are required to connect MAN from one place to another. MAN
requires fiber optics cables which are quite expensive
.
Technical assistance: Here, skilled technicians and administrators are required. This
can overall increase the installation cost.
Difficult to manage: MAN consumes a large area then there is difficult to manage a large
network, Here is a chance of attacking hackers on the network. Data can be secured but it
needs experienced staff and security tools.
Specifications of MAN:
Transmission
850 nm 1270 nm to 1355 nm
wavelength
Switched (full
MAC protocol duplex) Switched (full duplex)
4. WAN (WIDE AREA NETWORK)
A wide-area network covers a very large area, like an entire city, state, or country. In fact,
the internet is a WAN. Like the internet, a WAN can contain smaller networks, including
LANs or MANs. Cellular services are the most commonly known wireless WANs.
The data transmission speed of these network is slow as compared to LAN and MAN. The
example of these network is internet.
Working of WAN:
A wide-area network (WAN) is the technology that connects your offices, data centers,
cloud applications, and cloud storage together. It is called a wide-area network because it
spans beyond a single building or large campus to include multiple locations spread across
a specific geographic area, or even the world.
Components of WAN:
1. End devices
End devices are computing systems that are being connected through wide area network
technology. These can range from user-facing interfaces like mobile devices, PCs, and
industry-specific workstations to servers, data centers, and mainframes
6.Connecting media
The connecting media carries data packets in a WAN mesh architecture to and from
different LAN components. There is a wide variety of media to choose from when setting
up your WAN, including traditional MPLS lines, fiber optic cables, the cellular (3G, 4G, or
5G) spectrum, and satellite connectivity
Greater Geographic Coverage – Unlike Local Area Networks (LANs), which are
limited to a small area like an office or building, WANs can span across cities,
states, and even countries. This allows businesses and individuals to communicate
with each other over long distances without having to rely on traditional methods
like snail mail or phone calls
Enhanced Data Security – WANs often use advanced security protocols to protect
data as it travels across multiple networks. This means that sensitive information
like personal details or financial transactions can be transmitted safely without the
risk of unauthorized access.
Increased Flexibility – WANs are designed to be scalable and adaptable, which
means they can easily accommodate changes in traffic and bandwidth demands.
This is especially useful for businesses that experience fluctuations in traffic
throughout the day, as WANs can adjust to meet their needs.
Improved Collaboration – With WANs, teams can work together on projects from
different locations without having to be physically present in the same place. This
means that businesses can save on travel costs and increase productivity by
allowing employees to work from anywhere with an internet connection.
Better Access to Resources – WANs can provide access to resources that may not
be available locally, such as cloud-based software or online storage solutions. This
means that businesses and individuals can benefit from the latest technologies
without having to invest in expensive infrastructure.
Disadvantages of Wide Area Network (WAN):
Specifications of WAN:
Asynchronous communications
i5/OS asynchronous communications support allows an iSeries application program to
exchange data with a remote system or device using either an asynchronous (start-stop)
line or an X.25 line.
Frame relay is a protocol that defines how frames are routed through a fast-
packet network based on the address field in the frame.
Synchronous Data Link Control networks
You can connect thermostats, phones, computers, cameras, and light fixtures. You can
also link TVs and speakers. Health enthusiasts use this technology to pair fitness devices.
Doctors also use it to get information from connected devices such as pacemakers.
Wireless communication are used to making calls, connecting devices, Accessing the
Internet, Enhance Security, For Locating and Tracking and many more.
Teacher Evaluation Sheet
5 Quality of Prototype/Model
6 Report Preparation
(B) Individual Presentation / Viva (Convert above total marks out of 4 Marks)
7 Presentation
8 Defense
(A) Process and Product Assessment (B) Individual Presentation / Viva Total Marks
(6 Marks) (4 marks) (10 Marks)
………………………………………………………………………………………………………………………
…………………….
5 Quality of Prototype/Model
6 Report Preparation
(B) Individual Presentation / Viva (Convert above total marks out of 4 Marks)
7 Presentation
8 Defense
(A) Process and Product Assessment (B) Individual Presentation / Viva Total Marks
(6 Marks) (4 marks) (10 Marks)
5 Quality of Prototype/Model
6 Report Preparation
(B) Individual Presentation / Viva (Convert above total marks out of 4 Marks)
7 Presentation
8 Defense
(A) Process and Product Assessment (B) Individual Presentation / Viva Total Marks
(6 Marks) (4 marks) (10 Marks)
………………………………………………………………………………………………………………………
…………………….
Name & Designation of the Teacher: Mr. Meet Chudasama (Lecturer-0563)
Dated Signature: ………………………..