Modern Communication Systems Balzzz

37
Modern Communication Systems Balaji Arunachalam (TP019324) Page 1 Modern Communication Systems  CT042-3.5-3 INDIVIDUAL ASSIGNMENT REPORT  Name : Arunachalam Balaji Student ID : TP019324 Intake : UC3F1101TE Due Date : 20 MAY 2011 Lecturer : Mr.Vinoth Kumar 

Transcript of Modern Communication Systems Balzzz

Page 1: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 1/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 1

Modern Communication Systems CT042-3.5-3

INDIVIDUAL ASSIGNMENT REPORT

  Name : Arunachalam BalajiStudent ID : TP019324

Intake : UC3F1101TE

Due Date : 20 MAY 2011

Lecturer : Mr.Vinoth Kumar 

Page 2: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 2/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 2

Contents

1.0 Introduction ................................ ................................ ................................ ...................... 3 2.0 Objectives of the study ................................ ................................ ................................ ..... 4 3.0 Concepts of Computer Networking ................................ ................................ ................... 5 4.0

 IP Address (Internet Protocol Address) ................................ .............................. 20

 5.0 MAC Adressing................................ ................................ ................................ .............. 22 6.0 Network Configuration ................................ ................................ ................................ ... 22 7.0 Remote Login Operation in the Networks ................................ ................................ ....... 24 7.0 File sharing Application In The Networks ................................ ................................ ...... 31 8.0 Data transfer between the networks using ................................ ................................ ....... 33 CISCO¶s PACKET TRACER software. ................................ ................................ ............... 34 9.0 Discussion ................................ ................................ ................................ ...................... 35 10.0 Conclusion ................................ ................................ ................................ ................... 35 11.0 Refrence ................................ ................................ ......... Error! Bookmark not defined.  

Page 3: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 3/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 3

1.0 Introduction

In the universe of computers, networking is the process of connecting two or more computing

devices together for the objective of sharing data. A computer network is a system of 

interconnected computers and peripheral devices. Computer networks are built with a mixture

of computer hardware as well as computer software.For example, it may connect computers,

 printers, scanners, cameras and even shared software.

Computer networks are built to serve variety of needs such as facilitating

communications,sharing hardware,sharing files, data, and information as well as sharing

software. In an environment where networking is implemented, every system on a network 

has access and use hardware resources on the network, such as printing a document on a

shared network printer.Besides that, an authorized user even has access to the data and

information stored on other computers on the network remotely. Moreover, Users connected

to a network may run application programs on remote computers

  Networks are mainly classified in to two major types which is client/server networks and

 peer-to-peer networks. A client/server network contains a dedicated machine which is often

called the server to share the files, printers, and applications. Whereas, a peer-to-peer network 

no server is needed, each computer in the network is called a peer and computers in the peer-

to-peer network has equal responsibilities and capabilities to use the resources available on

the network.A PC can access files located on another PC and can also provide files to other 

PCs.

Besides that, networks also categorized according to the network topology such as bus, star,

ring, and hybrid topology. It might be also classified according to the means of connection

method, for instance Transmission Control Protocol/Internet Protocol (TCP/IP) or Ethernet.

We can also refer any network according to the media its connected such as coaxial, twisted-

 pair or fiber-optic cables.

Page 4: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 4/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 4

2.0 Objectives of the study

2.1 Main objective

The main objective of the assignment is to configuretwo local area computer networks with

each network consisting a minimum of two computers and to allocate static addresses for the

computers in the network.

2.2 Specific Objectives

The wired data transfer has to be performed between the networks in the Laboratory with the

expectation to show the following outcomes.

  Remote login operation between the clients in the networks.

  File sharing application between the clients in the networks.

  Configure two local area computer networks using CISCO¶s PACKET TRACER 

software

Page 5: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 5/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 5

3.0 Concepts of Computer Networking

3.1 Types of Networks

There are several categories used in classifying networks. The network categories used are thescale of the network, type of connection of the network, network architecture, and finally the

topology of the network. The discussion below will clearly explain the types of network and

their details.

Computer Networks can be classified according to the range or scale of its networks. There

are many ranges of network currently present in the networking practice such as Local area

network(LAN), Metropolitan area network(MAN), Wide area network(WAN), Personal area

network (PAN) , Campus area network (CAN) , Global area networks (GAN) , Virtual private

network (VPN). Among these, the main and mandatory category will be the LAN, MAN and

WAN. So we will be focusing further explanations on these mandatory network categories.

3.1.1  Local Area Network 

A Local Area Network or shortly known as (LAN) is a network that is confined to a relatively

small geographical area. It is generally limited to a geographic area such as anoffice, lab,

school, university or within a building. Commonly in most of the LAN networks, cables are

used to connect the network interface cards in each computer. In a typical LAN configured

network, one computer is assigned as the file server. It is responsible for storing all of the

software that controls the network and the software applications that can be shared by the othe

systems connected to the network. Computers which are connected to the file server are often

called workstations. The workstations are normally less powerful than the file server, and they

may contain their own personal additional software on their hard disk.

Page 6: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 6/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 6

3.1.2  Metropolitan Area Network 

A Metropolitan area network, in abbrevation (MAN) is a large computer network that usually

spans a city or a large campus. MAN networks connects two or more local area networks or 

campus area networks together but does not extend beyond the boundaries of the confinedcity. MANs provide Internet connectivity for LANs in a metropolitan region, and connect

them to wider area networks like the Internet. A MAN is made from switches or routers

connected to one another with high-speed links like fibre optic cables. MANs are the ones

which connect LANs together within a city.

3.1.3  Wide Area Network 

Wide Area Networks, which commonly known as (WANs) are the networks which connects

larger geographic areas, such as connectivity between the states or even across the world.

Internet is said to be the largest WAN in the world.Satellite uplinks and dedicated

transoceanic cables are used to connect this type of network.A WAN often uses transmission

  provisions provided by common carriers, such as internet service providers and telephone

operators. The speed and connectivity available on a WAN varies depending on the cost of 

the connections. WANs operate using connecting devices such as routers, which can route and

choose the most appropriate path for a particular data to take to reach a network node.

3.2 Network Architecture

There is currently two major type of network architectures present in the networking practice

which is the client/server network and peer-to-peer network. Both the architectures serves

diffrent needs and both has its own advantages as well as its disadvantages. The type of 

network architecture required depends on the nature of work and needs of the network. The

following sections, will dicuss in deep about the network architecture.

Page 7: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 7/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 7

3.2.1  Client / Server Network 

The client/server type of computer network is a distributed network style or structure that

divides the assigned tasks between the providers of a resource , called servers, and service

requesters, called clients. A server is a computer that shares information and resources with

other computers on a network. A client is a computer which requests services or files from a

server computer.In this type of network, shared files and applications are stored in the server 

 but network users which are referred as the clients can still store files on their individual

PCs.In this structure of networking, the client sends the server a request for data, and the

server will process the request and produce the most appropriate result and send them back to

the client as the response. A system which is acting as a server for another system, might be

client for other server, a very good example will be email servers.

http://westwood.wikispaces.com/file/view/Client_Server_Network.gif/36709739/Client_Server_Netwo

rk.gif 

Fig 1 : Client/Server Network Architecture

The above image is the example of client/server based network, several clients are

connected to a hub and respectively hub is connected to file and print server. All the

request for sharing files and resources among the clients, must go through the server.

Page 8: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 8/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 8

3.2.2  Peer to Peer Networking (P2P)

A peer-to-peer (P2P) network is established when two or more PCs are connected and

share resources withoutgoing through a separate machine called server . It is a network 

with all the nodes acting as both servers and clients and with peer-to-peer network, no

server is needed. A PC can access files located on another PC and can also provide

files to other PCs without any restrictions. All computers in the peer-to-peer network 

has equal responsibilities and capabilities to use the resources available on the

network. Each computer in the network is called as peer.This type of network is very

cost effective but it only supports lesser number of computers across the network and

security level is also not as strong as client/server and each peer it self is responsible

for its own security.

Fig 2 : Peer to Peer Network 

http://t2.gstatic.com/images?q=tbn:ANd9GcTRuDtG0lae-5s36rWHLfnyalCNBWC58t2NmrtA-

uNsfdVoffCp 

The above image shows the example of peer to peer network, whereby 4 peers are

connected to a hub for sharing files and resources among the network which is the

internet and printer.

Page 9: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 9/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 9

3.2.3  Advantages of a Client/Server Network 

  Provide User logon accounts and passwords for user of the network 

  Access to multiple shared resources can be centrally granted to a single user or groups

of users

  Problems on the network can be tracked, diagnosed and often fixed from one location

  Optimized for faster processing time to handle many requests from clients

  Larger disk space means it is more scalable and more clients can be added as

necessary

3.2.4Advantages of P2P Networks

  Simple to configure (Most home networks are P2P)

 Typically less expensive to setup and maintain than other types of networks.

3.2.5Disadvantages of P2P Networks

o  Not very flexible: as P2P networks grow, adding or changing significant elements of 

the network can be difficult

o  Not very secure: data and other resources shared by network uses can be easily

discovered and used by unauthorized users

o  Resource Sharing is not practical: each user is responsible for configuring Shared

documents and preventing access to other files since resource sharing is not controlled

 by a central computer or authority

.

Page 10: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 10/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 10

3.3  Network Topology

The word topology refers to the shape of a network, or the network's connected layout. How

different nodes in a network are configured to each other and how they communicate each

otheris determined by the network's topology. This network topology shape does not

necessarily needed to correspond to the actual physical layout or structure of the devices

across the network.The following is the common network topologies, which are being

 practiced in networking:

3.3.1  Bus Topology

In this type of structure, all devices in the network are connected to a central cable, called the

  bus or backbone. Each system is connected to the single bus cable through a connector. A

terminator is needed at each end of the bus cable to prevent the signal from bouncing back 

and forth across the bus cable. A signal from the source travels in both directions to all

systems connected on the bus cable until it finds the respective MAC address or IP address on

the network that is the appropriate recipient. If the machine address does not match the

appropriate address for the data, the machine ignores the data. Vice versa, if the data does

match with the machine address, the data is accepted. Since the bus topology consists of only

one wire, it is rather inexpensive to implement when compared to others.Bus topology

networks work very well with a limited number of devices. If more than the limited number of 

systems is added to a network bus, issues such as performance issues might rise. Besides that,

if the backbone cable fails, the entire network is unusable and becomes defective.

http://www.lahitech.com/images/lin_bus.gif 

Fig 3 : Bus Topology

Page 11: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 11/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 11

3.3.2 Ring Topology

A ring network is a network topology where by each node configured to exactly two other 

nodes, thus creating a single continuous pathway for signals through each connected node.

Data travels from one node to another node, with each node along the way handling all the

  packet. In a ring network, every device has exactly two neighbors for communication

  purposes. All messages travel through a ring in the same direction either clockwise or 

counterclockwise. A failure in any cable or device breaks the loop and can take down the

entire network.

http://www.edrawsoft.com/images/network/Ring-Topology.png 

Fig 4 : Ring Topology

Page 12: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 12/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 12

3.3.2  Star Topology

A star topology is one of the most common network setups, which can be seen in all the

 places. Each of the devices and computers on a network connect to a central hub. In a Star 

 Network the plus point is when there is a failure in cable then only one computer might get

affected and not the whole network.A major disadvantage of this network topology is that if 

the central hub fails, all computers connected to that hub would be defective.The Star 

 Network Topology practically requires more cable to be networked than the other topologies.

A common cable that is used in Star Network is the unshielded twisted pair cable and RJ45

Ethernet cables.

http://fcit.usf.edu/network/chap5/pics/star.gif  

Fig 5 : Star Topology

Page 13: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 13/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 13

3.3.4 Tree Topology

Tree Topology is a combination of the bus topology and the Star Topology. In its basic form,

only hub devices connect directly to the tree bus and each hub functions as the "root" of a tree

of devices. The tree like structure permits to have many servers on the same network and it

enables to branch out the network in many ways. This feature is very helpful for universities

and schools so that each of the departments and faculties can identify the relevant systems in

their own network and yet connect to the main major network.A Tree network topology suits

 best when the network is widely spread and divided into multiple branches. The disadvantage

is, it might not suit the small networks.

http://www.free-computer-tips.info/wp-content/uploads/2010/08/tree-topology.gif 

Fig 6 : Tree Topology

Page 14: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 14/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 14

3.3.5 Mesh Topology

Mesh Topology, has a network structure where by each of the systems and network devices

are interconnected with each other, permitting for maximumtransmissions to be distributed

even if one of the connections is defective. Unlike each of the previous topologies, messages

sent on a mesh network can take any of several possible paths from source to destination.This

topology is not generally used for most computer networks as it is complicated and

expensive.This topology is commonly used in the wireless networks area.

A mesh network in which every device connects to every other is called a full mesh. As

shown in the illustration below, partial mesh networks also exist in which some devicesconnect only indirectly to others.

http://eta305.files.wordpress.com/2007/08/topology_mesh.gif?w=538 

Fig 7 : Mesh Topology

Page 15: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 15/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 15

3. 4Networking Hardware Components

3.4.1  Network Interface Cards

A network card, network adapter or NIC (network interface card) is a piece of computer 

hardware designed to allow computers to communicate over a computer network. It provides

 physical access to a networking medium and often provides a low-level addressing system

through the use of MAC addresses. It allows users to connect to each other either by using

cables or wireless .The NIC provides the transfer of data in megabytes.

Fig 8 : NIC

http://1.bp.blogspot.com/_qwhTePppZsw/TB7puex3teI/AAAAAAAAANY/35CD_mtcq3Q/s320/nic.jpg  

3.4.2  Repeaters

A repeater is an electronic device that receives a signal and retransmits it at a

higher power level, or to the other side of an obstruction, so that the signal can

cover longer distances without degradation. In most twisted pair Ethernet

configurations, repeaters are required for cable runs longer than 100 meters away

from the computer.

Fig 9: Repeater 

http://www.synchrotech.com/product-1394/img/firewire-hubs-repeaters_01.jpg 

Page 16: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 16/37

Moder ommu i tion Syst ems 

Balaji Arunachalam (TP   Page 16

3.4.3  Hubs

A hub cont ins multi l por ts. When a packet arr i es at one por t  it is copied to all the

 por ts of the hub for transmission. When the packets are copied, the destination address

in the frame does not change to a broadcast address. It does this in a rough manner whereby it simply copies the data to all of the Nodes connected to the hub.

htt  ¡  //www £  t ¤ ¥  l ¤ ¦ § 

£ 

§ 

¨ ©  /i© ¤  

 

£  / hub.g if 

Fi 10: Hub

3.4.4  B i s

A network br idge connects multi ple network segments at the data link layer, layer 2 of 

the OSI model. Br idges do not copy traff ic to all por ts, as hubs do, but  learn which

MAC addresses are reachable through specif ic por ts. Once the br idge associates a por t 

and an address, it will send traff ic for  that address only to that por t. Br idges do send

 broadcasts to all por ts except the one on which the broadcast was recei ed.

Br idges learn the association of por ts and addresses by examining the source address

of frames that it sees on var ious por ts. Once a frame arr ives through a por t, its source

address is stored and the br idge assumes that  MAC address is associated with that 

 por t. The f irst time that a previously unknown destination address is seen, the br idge

will forward the frame to all por ts other than the one on which the frame arr ived.

Page 17: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 17/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 17

Bridges come in three basic types:

1.  Local bridges: Directly connect local area networks (LANs)

2.  Remote bridges: Can be used to create a wide area network (WAN) link 

 between LANs. Remote bridges, where the connecting link is slower than theend networks, largely have been replaced by routers.

3.  Wireless bridges: Can be used to join LANs or connect remote stations to

LANs.

http://t1.gstatic.com/images?q=tbn:ANd9GcRg-8QSMe0m5TJlbepHwY-4C431cufZ7rjNGWH-

rgqCb0dB7qeQCA 

Fig 11 : Network Bridge

Page 18: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 18/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 18

3.4.5  Switches

A switch is a device that performs switching. Specifically, it forwards and filters OSI

layer 2 datagrams between ports based on the MAC addresses in the packets. This is

distinct from a hub in that it only forwards the datagrams to the ports involved in thecommunications rather than all ports connected. A switch is not capable of routing

traffic based on IP address which is of layer 3 and which is necessary for 

communicating between network segments or within a large or complex LAN. A

switch normally has numerous ports, with the intention being that most or all of the

network is connected directly to the switch, or another switch that is in turn connected

to a switch.

http://www.btpnkedah.edu.my/pkghosba/images/stories/sppicts/switch.jpeg  

Fig 12 : Switch

Page 19: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 19/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 19

3.4.6  Routers

Routers are networking devices that forward data packets between networks using

headers and forwarding tables to determine the best path to forward the packets.

Routers work at the network layer of the TCP/IP model or layer 3 of the OSI model.Routers also provide interconnectivity between like and unlike media.This is

accomplished by examining the Header of a data packet, and making a decision on the

next hop to which it should be sent. They use pre-configured static routes, status of 

their hardware interfaces, and routing protocols to select the best route between any

two subnets. A router is connected to at least two networks, commonly two LANs or 

WANs or a LAN and its ISP's network. Some DSL and cable modems, for house use,

have been integrated with routers to allow multiple home/office computers to access

the Internet through the same connection. Many of these new devices also consist of 

wireless access points to allow wireless enabled devices to connect to the network 

without the need for cabled connections.

http://codinghorror.typepad.com/.a/6a0120a85dcdae970b0120a86dac17970b-pi 

Fig 13: Router

Page 20: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 20/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 20

4.0 IP Address (Internet Protocol Address)

Internet Protocol Address, shortly known as(IP Address) is an unique address that computing

devices use to identify itself and communicate with other devices in the Internet Protocol

network. An IP Address is a 32-bit number that identifies a computer on the Internet. Every

web site on the internet is found not by its domain name but by its IP address.

A typical IP address looks like this:

216.27.61.137

To make it easier for us humans to remember, IP addresses are normally expressed in decimal

format as a "dotted decimal number" like the one above. But computers communicate in

 binary form.

Look at the same IP address in binary:

11011000.00011011.00111101.10001001

The four numbers in an IP address are called octets, because they each have eight positions

when viewed in binary form. If you add all the positions together, you get 32, which is why IP

addresses are considered 32-bit numbers. Since each of the eight positions can have two

different states (1 or 0) the total number of possible combinations per octet is 28

or 256. So

each octet can contain any value between 0 and 255.

Page 21: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 21/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 21

4.1 Types of IP Address 

STATIC IP ADDRESS

A static IP address is fixed, much like a telephone number. If your ISP gives you a static

address, you will always use the same address. Servers usually have static addresses, so they

can always be found at the same location.

As static IP never changes in the internet environment, a specific PC can be accessed and

controlled and maintained from any place.

DYNAMIC IP ADDRESS

IP address that is assigned automatically by the system to a device, account or user when it is

connected to the network  

The main advantage of dynamically assigning IP addresses is that it allows them to be reused,

thereby greatly increasing the total number of computers and other devices that can use the

Internet or other network. Another advantage is enhanced security for individual users

 because their IP address is different every time they log into the network 

4.1.2IP version 4

Currently used by most network devices. However, with more and more computers accessing

the internet, IPv4 addresses are running out quickly. Just like in a city, addresses have to be

created for new neighborhoods but, if your neighborhood gets too large, you will have to

come up with an entire new pool of addresses. IPv4 is limited to 4,294,967,296 addresses.

4.1.3IP version 5

This is an experimental protocol for UNIX based systems. In keeping with standard UNIX

release conventions, all odd-numbered versions are considered experimental. It was never 

intended to be used by the general public.

4.1.4IP version 6

The replacement for the aging IPv4. The estimated number of unique addresses for IPv6 is

340,282,366,920,938,463,463,374,607,431,768,211,456 or 2^128.

Page 22: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 22/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 22

5.0 MAC Adressing

The MAC address is a unique value associated with a network adapter. MAC addresses are

also known as hardware addresses or physical addresses. They uniquely identify an adapter on

a LAN.

MAC addresses are 12-digit hexadecimal numbers which are 48 bits in length.

By convention, MAC addresses are usually written in one of the following two formats:

MM:MM:MM:SS:SS:SS

MM-MM-MM-SS-SS-SS

6.0 Network Configuration

6.1 Wireless Network 

A wireless network or Wireless Local Area Network (WLAN) serves the same purpose as a

wired one which is to link a group of computers. Because wireless doesn't require costly

wiring, the main benefit is that it's generally easier, faster and cheaper to set up. Wireless

networks operate using radio frequency (RF) technology, a frequency within the

electromagnetic spectrum associated with radio wave propagation. When an RF current is

supplied to an antenna, an electromagnetic field is created that then is able to propagate

through space.

The cornerstone of a wireless network is a device known as an access point (AP). Since

wireless networks are usually connected to wired ones, an access point also often serves as a

link to the resources available on the a wired network, such as an Internet connection. In order 

to connect to an access point and join a wireless network, computers must be equipped with

wireless network adapters.

All of the Wi-Fi variants use the same 2.4 GHz radio frequency, and as a result are designed

to be compatible with each other, so you can usually use devices based on the different

standards within the same wireless network. The catch is that doing so often requires special

configuration to accommodate the earlier devices, which in turn can reduce the overall

Page 23: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 23/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 23

  performance of the network. In an ideal scenario you'll want all your wireless devices, the

access point and all wireless-capable computers, to be using the same technology standard

and to be from the same vendor whenever possible.

Wireless network hardware supports several standard encryption schemes, but the most

common are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and Wi-Fi

Protected Access 2 (WPA2). WEP is the oldest and least secure method and should be

avoided.

6.2 Wired Network  

Wired networks provide users with plenty of security and the ability to move lots of data veryquickly. Wired networks are typically faster than wireless networks, and they can be very

affordable. There are three basic systems people use to set up wired networks. An Ethernet

system uses either a twisted copper-pair or coaxial-based transport system. The most

commonly used cable for Ethernet is a category 5 unshielded twisted pair (UTP) cable -- it's

useful for businesses who want to connect several devices together, such as computers and

 printers, but it's bulky and expensive, making it less practical for home use. A phone line, on

the other hand, simply uses existing phone wiring found in most homes, and can provide fast

services such as DSL. Finally, broadband systems provide cable Internet and use the sametype of coaxial cable that gives us cable television.

Page 24: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 24/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 24

7.0 Remote Login Operation in the Networks

Below are the conditions and the step to do remote log in operations :

1. Microsoft Windows XP Professional or any higher version of Windows must be installed

on the computer containing the files and programs that you want to access from a remote

computer. The computer must also be part of a corporate network in which Remote

Desktop connections are permitted. This computer is known as the host .

2. The remote computer must be running Windows 95 or later. This computer must also have

the Remote Desktop Connection client software installed. The remote computer is knownas the client .

3. Both computers must be pinged across the network to do remote log in.

To set up the Remote Desktop, start with the host computer 

1. Verify that the user has signed in as the administrator.

2. Click Start, click Control Panel, and then click Performance and Maintenance.

3. Click System.

Page 25: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 25/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 25

4. Click the Remote tab, select the Allow users to connect remotely to this computer check 

 box, and then click OK.

 Next, make sure Windows Firewall set up to allow exceptions.

1

.

In the Control Panel, click Security Center.

Page 26: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 26/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 26

2

.

Under Manage security settings for, click Windows Firewall.

3

.

Make sure they Don't allow exceptions check box is not selected.

4

.

Click the Exceptions tab, and verify that the Remote Desktop check box is selected.

Page 27: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 27/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 27

5

.

Click OK, and then close the Windows Security Center window.

The host computer is now set up to allow remote access.

  The next session shows the real remote desktop operation carried out in the lab with the

classmates. File sharing and remote log in operation were carried out during this

session.

Page 28: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 28/37

Modern Communication Syst ems 

Balaji Arunachalam (TP 19324) Page 28

Before star ting f ile shar ing, all the host computers were pinged. The above snapshot shows,

the pinging of all host computers and data packets sending and receiving.

 1

.

On your home computer, click Star t, point to All Programs, and then point to Accessor ies.

2

.

In the Accessor ies menu, point to Communications, and then click R emote Desk top

Connection.

3 In the Computer box, type the computer name of your host computer,

Page 29: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 29/37

Modern Communication Syst ems 

Balaji Arunachalam (TP 19324) Page 29

.

4

.

Click Connect.

5

.

When the Log On to Windows dialog box appears, type your user name, password, and

then click OK.

Page 30: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 30/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 30

This the snapshot of the Remote Desktop window and we can see the desktop settings,

files, and programs that are on the host computer. The host computer remains locked, and

nobody can access it without a password. In addition, no one will be able to see the work 

you are doing remotely.

Page 31: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 31/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 31

To end your Remote Desktop session:

1. Click Start, and then click Log Off at the bottom of the Start menu.

2. When prompted, click Log Off.

8.0 File sharing Application In The Networks

The below are the screen shots, whereby the file sharing across the network is took place.

This is the snapshot of connecting to the UCTI network in order to share files.

Page 32: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 32/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 32

This is the snapshot showing the connected PC¶s in the UCTI network, from here we can

choose any PC where we wish to share the file.

This snapshot shows, sharing the selected folder in the selected network.

Page 33: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 33/37

Page 34: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 34/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 34

9.0 Data transfer between the networks using

CISCOs PACKET TRACER software. 

The above snapshot is took from the cisco pack tracer software. It is used to configure two

LAN networks, its a prototype of how real LAN¶s are configured. First three host PC¶s are

connected under the same LAN using a switch. They are pinged and ensured they are under 

same network address. For the LAN on the right side, the network gateway is 222.22.22.1 and

since its class C IP address, the last octet is for the host adress so the three host PC¶s are with

the IP address 222.22.22.2 , 222.22.22.3 and 222.22.22.4. Since they are pinged, they can

share files. The right side LAN has the gateway address of 201.21.21.1 and the respective host

PC¶s have the address of4 201.21.21.2, 201.21.21.3 and 201.21.21.4. The router is situated

 between the two LAN. The overall is the WAN connection which consists of 2 LAN. All the

same devices are connected with cross over cable and and the diffrent devices like router and

switch all connected with straight through cable. The two routers are configured and the two

LAN branches are connected. The router routes the data packet from the branch 1 to the

 branch 2. The green light shows that there is no failure, and all are working properly.

Page 35: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 35/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 35

10.0 Discussion

In this assignment, we have practically carried out the file sharing and remote log in

operations across the network in the lab, there were some issues while carrying out this

experiment, there were some issues in pinging the host computers but with guidance from the

lecturer, the issue was solved. This assignment also required simulation of cisco packet tracer,

whereby, i have simulated two LAN networks, while carrying out the simulation the data

  packets did not show succesful results, the green light did not blink. After correcting the

errors in the router configuration; the issue was solved and the data packet was sent

succesfully with the indication of green lights. Besides that, a deep study of all the network 

classifications, network topologies, hardwares used in networking and other networking

operatins were gained at the end of the assignment.

11.0 Conclusion

At the end of this assignment, i have a gained a brief and deep knowledge of networking

concepts. This assignement gave me a full view of the overall networking concepts such as

network architecturs, classifications of network, devices used in networking. In addition, i

gained a good practical knowledge on sharing files and remote log in operations across the

network. Last but not least, all the objectives of this assignment was achieved and all the

required works were completed successfully.

Page 36: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 36/37

Modern Communication Systems

Balaji Arunachalam (TP019324) Page 36

ReferenceOnline Resources

1)  Florida Center for Instructional Technology College of Education, University of South

Florida (2009) Network Topology [online]

Available from : http://fcit.usf.edu/network/chap5/chap5.htm 

[Accessed on 5 May 2011]

2)   Network Bridge(n.d.) [online]

Available from :http://en.wikipedia.org/wiki/Bridging_(networking)

[Accessed on 7 May 2011]

3)  Client/Server Network (n.d)[online]

Available from : http://compnetworking.about.com/od/basicnetworkingfaqs/a/client-

server.htm 

[Accessed on 8 May 2011]

4)  Types of IP Adress(2009.) [online]

Available from

:http://compnetworking.about.com/od/workingwithipaddresses/l/aa042400c.htm 

[Accessed on 7 May 2011]

Page 37: Modern Communication Systems Balzzz

8/6/2019 Modern Communication Systems Balzzz

http://slidepdf.com/reader/full/modern-communication-systems-balzzz 37/37

Modern Communication Systems