Modern Communication Systems Balzzz
-
Upload
balaji-arun -
Category
Documents
-
view
223 -
download
0
Transcript of Modern Communication Systems Balzzz
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 1/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 1
Modern Communication Systems CT042-3.5-3
INDIVIDUAL ASSIGNMENT REPORT
Name : Arunachalam BalajiStudent ID : TP019324
Intake : UC3F1101TE
Due Date : 20 MAY 2011
Lecturer : Mr.Vinoth Kumar
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 2/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 2
Contents
1.0 Introduction ................................ ................................ ................................ ...................... 3 2.0 Objectives of the study ................................ ................................ ................................ ..... 4 3.0 Concepts of Computer Networking ................................ ................................ ................... 5 4.0
IP Address (Internet Protocol Address) ................................ .............................. 20
5.0 MAC Adressing................................ ................................ ................................ .............. 22 6.0 Network Configuration ................................ ................................ ................................ ... 22 7.0 Remote Login Operation in the Networks ................................ ................................ ....... 24 7.0 File sharing Application In The Networks ................................ ................................ ...... 31 8.0 Data transfer between the networks using ................................ ................................ ....... 33 CISCO¶s PACKET TRACER software. ................................ ................................ ............... 34 9.0 Discussion ................................ ................................ ................................ ...................... 35 10.0 Conclusion ................................ ................................ ................................ ................... 35 11.0 Refrence ................................ ................................ ......... Error! Bookmark not defined.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 3/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 3
1.0 Introduction
In the universe of computers, networking is the process of connecting two or more computing
devices together for the objective of sharing data. A computer network is a system of
interconnected computers and peripheral devices. Computer networks are built with a mixture
of computer hardware as well as computer software.For example, it may connect computers,
printers, scanners, cameras and even shared software.
Computer networks are built to serve variety of needs such as facilitating
communications,sharing hardware,sharing files, data, and information as well as sharing
software. In an environment where networking is implemented, every system on a network
has access and use hardware resources on the network, such as printing a document on a
shared network printer.Besides that, an authorized user even has access to the data and
information stored on other computers on the network remotely. Moreover, Users connected
to a network may run application programs on remote computers
Networks are mainly classified in to two major types which is client/server networks and
peer-to-peer networks. A client/server network contains a dedicated machine which is often
called the server to share the files, printers, and applications. Whereas, a peer-to-peer network
no server is needed, each computer in the network is called a peer and computers in the peer-
to-peer network has equal responsibilities and capabilities to use the resources available on
the network.A PC can access files located on another PC and can also provide files to other
PCs.
Besides that, networks also categorized according to the network topology such as bus, star,
ring, and hybrid topology. It might be also classified according to the means of connection
method, for instance Transmission Control Protocol/Internet Protocol (TCP/IP) or Ethernet.
We can also refer any network according to the media its connected such as coaxial, twisted-
pair or fiber-optic cables.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 4/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 4
2.0 Objectives of the study
2.1 Main objective
The main objective of the assignment is to configuretwo local area computer networks with
each network consisting a minimum of two computers and to allocate static addresses for the
computers in the network.
2.2 Specific Objectives
The wired data transfer has to be performed between the networks in the Laboratory with the
expectation to show the following outcomes.
Remote login operation between the clients in the networks.
File sharing application between the clients in the networks.
Configure two local area computer networks using CISCO¶s PACKET TRACER
software
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 5/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 5
3.0 Concepts of Computer Networking
3.1 Types of Networks
There are several categories used in classifying networks. The network categories used are thescale of the network, type of connection of the network, network architecture, and finally the
topology of the network. The discussion below will clearly explain the types of network and
their details.
Computer Networks can be classified according to the range or scale of its networks. There
are many ranges of network currently present in the networking practice such as Local area
network(LAN), Metropolitan area network(MAN), Wide area network(WAN), Personal area
network (PAN) , Campus area network (CAN) , Global area networks (GAN) , Virtual private
network (VPN). Among these, the main and mandatory category will be the LAN, MAN and
WAN. So we will be focusing further explanations on these mandatory network categories.
3.1.1 Local Area Network
A Local Area Network or shortly known as (LAN) is a network that is confined to a relatively
small geographical area. It is generally limited to a geographic area such as anoffice, lab,
school, university or within a building. Commonly in most of the LAN networks, cables are
used to connect the network interface cards in each computer. In a typical LAN configured
network, one computer is assigned as the file server. It is responsible for storing all of the
software that controls the network and the software applications that can be shared by the othe
systems connected to the network. Computers which are connected to the file server are often
called workstations. The workstations are normally less powerful than the file server, and they
may contain their own personal additional software on their hard disk.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 6/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 6
3.1.2 Metropolitan Area Network
A Metropolitan area network, in abbrevation (MAN) is a large computer network that usually
spans a city or a large campus. MAN networks connects two or more local area networks or
campus area networks together but does not extend beyond the boundaries of the confinedcity. MANs provide Internet connectivity for LANs in a metropolitan region, and connect
them to wider area networks like the Internet. A MAN is made from switches or routers
connected to one another with high-speed links like fibre optic cables. MANs are the ones
which connect LANs together within a city.
3.1.3 Wide Area Network
Wide Area Networks, which commonly known as (WANs) are the networks which connects
larger geographic areas, such as connectivity between the states or even across the world.
Internet is said to be the largest WAN in the world.Satellite uplinks and dedicated
transoceanic cables are used to connect this type of network.A WAN often uses transmission
provisions provided by common carriers, such as internet service providers and telephone
operators. The speed and connectivity available on a WAN varies depending on the cost of
the connections. WANs operate using connecting devices such as routers, which can route and
choose the most appropriate path for a particular data to take to reach a network node.
3.2 Network Architecture
There is currently two major type of network architectures present in the networking practice
which is the client/server network and peer-to-peer network. Both the architectures serves
diffrent needs and both has its own advantages as well as its disadvantages. The type of
network architecture required depends on the nature of work and needs of the network. The
following sections, will dicuss in deep about the network architecture.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 7/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 7
3.2.1 Client / Server Network
The client/server type of computer network is a distributed network style or structure that
divides the assigned tasks between the providers of a resource , called servers, and service
requesters, called clients. A server is a computer that shares information and resources with
other computers on a network. A client is a computer which requests services or files from a
server computer.In this type of network, shared files and applications are stored in the server
but network users which are referred as the clients can still store files on their individual
PCs.In this structure of networking, the client sends the server a request for data, and the
server will process the request and produce the most appropriate result and send them back to
the client as the response. A system which is acting as a server for another system, might be
client for other server, a very good example will be email servers.
http://westwood.wikispaces.com/file/view/Client_Server_Network.gif/36709739/Client_Server_Netwo
rk.gif
Fig 1 : Client/Server Network Architecture
The above image is the example of client/server based network, several clients are
connected to a hub and respectively hub is connected to file and print server. All the
request for sharing files and resources among the clients, must go through the server.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 8/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 8
3.2.2 Peer to Peer Networking (P2P)
A peer-to-peer (P2P) network is established when two or more PCs are connected and
share resources withoutgoing through a separate machine called server . It is a network
with all the nodes acting as both servers and clients and with peer-to-peer network, no
server is needed. A PC can access files located on another PC and can also provide
files to other PCs without any restrictions. All computers in the peer-to-peer network
has equal responsibilities and capabilities to use the resources available on the
network. Each computer in the network is called as peer.This type of network is very
cost effective but it only supports lesser number of computers across the network and
security level is also not as strong as client/server and each peer it self is responsible
for its own security.
Fig 2 : Peer to Peer Network
http://t2.gstatic.com/images?q=tbn:ANd9GcTRuDtG0lae-5s36rWHLfnyalCNBWC58t2NmrtA-
uNsfdVoffCp
The above image shows the example of peer to peer network, whereby 4 peers are
connected to a hub for sharing files and resources among the network which is the
internet and printer.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 9/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 9
3.2.3 Advantages of a Client/Server Network
Provide User logon accounts and passwords for user of the network
Access to multiple shared resources can be centrally granted to a single user or groups
of users
Problems on the network can be tracked, diagnosed and often fixed from one location
Optimized for faster processing time to handle many requests from clients
Larger disk space means it is more scalable and more clients can be added as
necessary
3.2.4Advantages of P2P Networks
Simple to configure (Most home networks are P2P)
Typically less expensive to setup and maintain than other types of networks.
3.2.5Disadvantages of P2P Networks
o Not very flexible: as P2P networks grow, adding or changing significant elements of
the network can be difficult
o Not very secure: data and other resources shared by network uses can be easily
discovered and used by unauthorized users
o Resource Sharing is not practical: each user is responsible for configuring Shared
documents and preventing access to other files since resource sharing is not controlled
by a central computer or authority
.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 10/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 10
3.3 Network Topology
The word topology refers to the shape of a network, or the network's connected layout. How
different nodes in a network are configured to each other and how they communicate each
otheris determined by the network's topology. This network topology shape does not
necessarily needed to correspond to the actual physical layout or structure of the devices
across the network.The following is the common network topologies, which are being
practiced in networking:
3.3.1 Bus Topology
In this type of structure, all devices in the network are connected to a central cable, called the
bus or backbone. Each system is connected to the single bus cable through a connector. A
terminator is needed at each end of the bus cable to prevent the signal from bouncing back
and forth across the bus cable. A signal from the source travels in both directions to all
systems connected on the bus cable until it finds the respective MAC address or IP address on
the network that is the appropriate recipient. If the machine address does not match the
appropriate address for the data, the machine ignores the data. Vice versa, if the data does
match with the machine address, the data is accepted. Since the bus topology consists of only
one wire, it is rather inexpensive to implement when compared to others.Bus topology
networks work very well with a limited number of devices. If more than the limited number of
systems is added to a network bus, issues such as performance issues might rise. Besides that,
if the backbone cable fails, the entire network is unusable and becomes defective.
http://www.lahitech.com/images/lin_bus.gif
Fig 3 : Bus Topology
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 11/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 11
3.3.2 Ring Topology
A ring network is a network topology where by each node configured to exactly two other
nodes, thus creating a single continuous pathway for signals through each connected node.
Data travels from one node to another node, with each node along the way handling all the
packet. In a ring network, every device has exactly two neighbors for communication
purposes. All messages travel through a ring in the same direction either clockwise or
counterclockwise. A failure in any cable or device breaks the loop and can take down the
entire network.
http://www.edrawsoft.com/images/network/Ring-Topology.png
Fig 4 : Ring Topology
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 12/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 12
3.3.2 Star Topology
A star topology is one of the most common network setups, which can be seen in all the
places. Each of the devices and computers on a network connect to a central hub. In a Star
Network the plus point is when there is a failure in cable then only one computer might get
affected and not the whole network.A major disadvantage of this network topology is that if
the central hub fails, all computers connected to that hub would be defective.The Star
Network Topology practically requires more cable to be networked than the other topologies.
A common cable that is used in Star Network is the unshielded twisted pair cable and RJ45
Ethernet cables.
http://fcit.usf.edu/network/chap5/pics/star.gif
Fig 5 : Star Topology
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 13/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 13
3.3.4 Tree Topology
Tree Topology is a combination of the bus topology and the Star Topology. In its basic form,
only hub devices connect directly to the tree bus and each hub functions as the "root" of a tree
of devices. The tree like structure permits to have many servers on the same network and it
enables to branch out the network in many ways. This feature is very helpful for universities
and schools so that each of the departments and faculties can identify the relevant systems in
their own network and yet connect to the main major network.A Tree network topology suits
best when the network is widely spread and divided into multiple branches. The disadvantage
is, it might not suit the small networks.
http://www.free-computer-tips.info/wp-content/uploads/2010/08/tree-topology.gif
Fig 6 : Tree Topology
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 14/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 14
3.3.5 Mesh Topology
Mesh Topology, has a network structure where by each of the systems and network devices
are interconnected with each other, permitting for maximumtransmissions to be distributed
even if one of the connections is defective. Unlike each of the previous topologies, messages
sent on a mesh network can take any of several possible paths from source to destination.This
topology is not generally used for most computer networks as it is complicated and
expensive.This topology is commonly used in the wireless networks area.
A mesh network in which every device connects to every other is called a full mesh. As
shown in the illustration below, partial mesh networks also exist in which some devicesconnect only indirectly to others.
http://eta305.files.wordpress.com/2007/08/topology_mesh.gif?w=538
Fig 7 : Mesh Topology
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 15/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 15
3. 4Networking Hardware Components
3.4.1 Network Interface Cards
A network card, network adapter or NIC (network interface card) is a piece of computer
hardware designed to allow computers to communicate over a computer network. It provides
physical access to a networking medium and often provides a low-level addressing system
through the use of MAC addresses. It allows users to connect to each other either by using
cables or wireless .The NIC provides the transfer of data in megabytes.
Fig 8 : NIC
http://1.bp.blogspot.com/_qwhTePppZsw/TB7puex3teI/AAAAAAAAANY/35CD_mtcq3Q/s320/nic.jpg
3.4.2 Repeaters
A repeater is an electronic device that receives a signal and retransmits it at a
higher power level, or to the other side of an obstruction, so that the signal can
cover longer distances without degradation. In most twisted pair Ethernet
configurations, repeaters are required for cable runs longer than 100 meters away
from the computer.
Fig 9: Repeater
http://www.synchrotech.com/product-1394/img/firewire-hubs-repeaters_01.jpg
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 16/37
Moder ommu i tion Syst ems
Balaji Arunachalam (TP Page 16
3.4.3 Hubs
A hub cont ins multi l por ts. When a packet arr i es at one por t it is copied to all the
por ts of the hub for transmission. When the packets are copied, the destination address
in the frame does not change to a broadcast address. It does this in a rough manner whereby it simply copies the data to all of the Nodes connected to the hub.
htt ¡ //www £ t ¤ ¥ l ¤ ¦ §
£
§
¨ © /i© ¤
£ / hub.g if
Fi 10: Hub
3.4.4 B i s
A network br idge connects multi ple network segments at the data link layer, layer 2 of
the OSI model. Br idges do not copy traff ic to all por ts, as hubs do, but learn which
MAC addresses are reachable through specif ic por ts. Once the br idge associates a por t
and an address, it will send traff ic for that address only to that por t. Br idges do send
broadcasts to all por ts except the one on which the broadcast was recei ed.
Br idges learn the association of por ts and addresses by examining the source address
of frames that it sees on var ious por ts. Once a frame arr ives through a por t, its source
address is stored and the br idge assumes that MAC address is associated with that
por t. The f irst time that a previously unknown destination address is seen, the br idge
will forward the frame to all por ts other than the one on which the frame arr ived.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 17/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 17
Bridges come in three basic types:
1. Local bridges: Directly connect local area networks (LANs)
2. Remote bridges: Can be used to create a wide area network (WAN) link
between LANs. Remote bridges, where the connecting link is slower than theend networks, largely have been replaced by routers.
3. Wireless bridges: Can be used to join LANs or connect remote stations to
LANs.
http://t1.gstatic.com/images?q=tbn:ANd9GcRg-8QSMe0m5TJlbepHwY-4C431cufZ7rjNGWH-
rgqCb0dB7qeQCA
Fig 11 : Network Bridge
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 18/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 18
3.4.5 Switches
A switch is a device that performs switching. Specifically, it forwards and filters OSI
layer 2 datagrams between ports based on the MAC addresses in the packets. This is
distinct from a hub in that it only forwards the datagrams to the ports involved in thecommunications rather than all ports connected. A switch is not capable of routing
traffic based on IP address which is of layer 3 and which is necessary for
communicating between network segments or within a large or complex LAN. A
switch normally has numerous ports, with the intention being that most or all of the
network is connected directly to the switch, or another switch that is in turn connected
to a switch.
http://www.btpnkedah.edu.my/pkghosba/images/stories/sppicts/switch.jpeg
Fig 12 : Switch
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 19/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 19
3.4.6 Routers
Routers are networking devices that forward data packets between networks using
headers and forwarding tables to determine the best path to forward the packets.
Routers work at the network layer of the TCP/IP model or layer 3 of the OSI model.Routers also provide interconnectivity between like and unlike media.This is
accomplished by examining the Header of a data packet, and making a decision on the
next hop to which it should be sent. They use pre-configured static routes, status of
their hardware interfaces, and routing protocols to select the best route between any
two subnets. A router is connected to at least two networks, commonly two LANs or
WANs or a LAN and its ISP's network. Some DSL and cable modems, for house use,
have been integrated with routers to allow multiple home/office computers to access
the Internet through the same connection. Many of these new devices also consist of
wireless access points to allow wireless enabled devices to connect to the network
without the need for cabled connections.
http://codinghorror.typepad.com/.a/6a0120a85dcdae970b0120a86dac17970b-pi
Fig 13: Router
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 20/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 20
4.0 IP Address (Internet Protocol Address)
Internet Protocol Address, shortly known as(IP Address) is an unique address that computing
devices use to identify itself and communicate with other devices in the Internet Protocol
network. An IP Address is a 32-bit number that identifies a computer on the Internet. Every
web site on the internet is found not by its domain name but by its IP address.
A typical IP address looks like this:
216.27.61.137
To make it easier for us humans to remember, IP addresses are normally expressed in decimal
format as a "dotted decimal number" like the one above. But computers communicate in
binary form.
Look at the same IP address in binary:
11011000.00011011.00111101.10001001
The four numbers in an IP address are called octets, because they each have eight positions
when viewed in binary form. If you add all the positions together, you get 32, which is why IP
addresses are considered 32-bit numbers. Since each of the eight positions can have two
different states (1 or 0) the total number of possible combinations per octet is 28
or 256. So
each octet can contain any value between 0 and 255.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 21/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 21
4.1 Types of IP Address
STATIC IP ADDRESS
A static IP address is fixed, much like a telephone number. If your ISP gives you a static
address, you will always use the same address. Servers usually have static addresses, so they
can always be found at the same location.
As static IP never changes in the internet environment, a specific PC can be accessed and
controlled and maintained from any place.
DYNAMIC IP ADDRESS
IP address that is assigned automatically by the system to a device, account or user when it is
connected to the network
The main advantage of dynamically assigning IP addresses is that it allows them to be reused,
thereby greatly increasing the total number of computers and other devices that can use the
Internet or other network. Another advantage is enhanced security for individual users
because their IP address is different every time they log into the network
4.1.2IP version 4
Currently used by most network devices. However, with more and more computers accessing
the internet, IPv4 addresses are running out quickly. Just like in a city, addresses have to be
created for new neighborhoods but, if your neighborhood gets too large, you will have to
come up with an entire new pool of addresses. IPv4 is limited to 4,294,967,296 addresses.
4.1.3IP version 5
This is an experimental protocol for UNIX based systems. In keeping with standard UNIX
release conventions, all odd-numbered versions are considered experimental. It was never
intended to be used by the general public.
4.1.4IP version 6
The replacement for the aging IPv4. The estimated number of unique addresses for IPv6 is
340,282,366,920,938,463,463,374,607,431,768,211,456 or 2^128.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 22/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 22
5.0 MAC Adressing
The MAC address is a unique value associated with a network adapter. MAC addresses are
also known as hardware addresses or physical addresses. They uniquely identify an adapter on
a LAN.
MAC addresses are 12-digit hexadecimal numbers which are 48 bits in length.
By convention, MAC addresses are usually written in one of the following two formats:
MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SS
6.0 Network Configuration
6.1 Wireless Network
A wireless network or Wireless Local Area Network (WLAN) serves the same purpose as a
wired one which is to link a group of computers. Because wireless doesn't require costly
wiring, the main benefit is that it's generally easier, faster and cheaper to set up. Wireless
networks operate using radio frequency (RF) technology, a frequency within the
electromagnetic spectrum associated with radio wave propagation. When an RF current is
supplied to an antenna, an electromagnetic field is created that then is able to propagate
through space.
The cornerstone of a wireless network is a device known as an access point (AP). Since
wireless networks are usually connected to wired ones, an access point also often serves as a
link to the resources available on the a wired network, such as an Internet connection. In order
to connect to an access point and join a wireless network, computers must be equipped with
wireless network adapters.
All of the Wi-Fi variants use the same 2.4 GHz radio frequency, and as a result are designed
to be compatible with each other, so you can usually use devices based on the different
standards within the same wireless network. The catch is that doing so often requires special
configuration to accommodate the earlier devices, which in turn can reduce the overall
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 23/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 23
performance of the network. In an ideal scenario you'll want all your wireless devices, the
access point and all wireless-capable computers, to be using the same technology standard
and to be from the same vendor whenever possible.
Wireless network hardware supports several standard encryption schemes, but the most
common are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and Wi-Fi
Protected Access 2 (WPA2). WEP is the oldest and least secure method and should be
avoided.
6.2 Wired Network
Wired networks provide users with plenty of security and the ability to move lots of data veryquickly. Wired networks are typically faster than wireless networks, and they can be very
affordable. There are three basic systems people use to set up wired networks. An Ethernet
system uses either a twisted copper-pair or coaxial-based transport system. The most
commonly used cable for Ethernet is a category 5 unshielded twisted pair (UTP) cable -- it's
useful for businesses who want to connect several devices together, such as computers and
printers, but it's bulky and expensive, making it less practical for home use. A phone line, on
the other hand, simply uses existing phone wiring found in most homes, and can provide fast
services such as DSL. Finally, broadband systems provide cable Internet and use the sametype of coaxial cable that gives us cable television.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 24/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 24
7.0 Remote Login Operation in the Networks
Below are the conditions and the step to do remote log in operations :
1. Microsoft Windows XP Professional or any higher version of Windows must be installed
on the computer containing the files and programs that you want to access from a remote
computer. The computer must also be part of a corporate network in which Remote
Desktop connections are permitted. This computer is known as the host .
2. The remote computer must be running Windows 95 or later. This computer must also have
the Remote Desktop Connection client software installed. The remote computer is knownas the client .
3. Both computers must be pinged across the network to do remote log in.
To set up the Remote Desktop, start with the host computer
1. Verify that the user has signed in as the administrator.
2. Click Start, click Control Panel, and then click Performance and Maintenance.
3. Click System.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 25/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 25
4. Click the Remote tab, select the Allow users to connect remotely to this computer check
box, and then click OK.
Next, make sure Windows Firewall set up to allow exceptions.
1
.
In the Control Panel, click Security Center.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 26/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 26
2
.
Under Manage security settings for, click Windows Firewall.
3
.
Make sure they Don't allow exceptions check box is not selected.
4
.
Click the Exceptions tab, and verify that the Remote Desktop check box is selected.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 27/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 27
5
.
Click OK, and then close the Windows Security Center window.
The host computer is now set up to allow remote access.
The next session shows the real remote desktop operation carried out in the lab with the
classmates. File sharing and remote log in operation were carried out during this
session.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 28/37
Modern Communication Syst ems
Balaji Arunachalam (TP 19324) Page 28
Before star ting f ile shar ing, all the host computers were pinged. The above snapshot shows,
the pinging of all host computers and data packets sending and receiving.
1
.
On your home computer, click Star t, point to All Programs, and then point to Accessor ies.
2
.
In the Accessor ies menu, point to Communications, and then click R emote Desk top
Connection.
3 In the Computer box, type the computer name of your host computer,
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 29/37
Modern Communication Syst ems
Balaji Arunachalam (TP 19324) Page 29
.
4
.
Click Connect.
5
.
When the Log On to Windows dialog box appears, type your user name, password, and
then click OK.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 30/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 30
This the snapshot of the Remote Desktop window and we can see the desktop settings,
files, and programs that are on the host computer. The host computer remains locked, and
nobody can access it without a password. In addition, no one will be able to see the work
you are doing remotely.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 31/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 31
To end your Remote Desktop session:
1. Click Start, and then click Log Off at the bottom of the Start menu.
2. When prompted, click Log Off.
8.0 File sharing Application In The Networks
The below are the screen shots, whereby the file sharing across the network is took place.
This is the snapshot of connecting to the UCTI network in order to share files.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 32/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 32
This is the snapshot showing the connected PC¶s in the UCTI network, from here we can
choose any PC where we wish to share the file.
This snapshot shows, sharing the selected folder in the selected network.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 33/37
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 34/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 34
9.0 Data transfer between the networks using
CISCOs PACKET TRACER software.
The above snapshot is took from the cisco pack tracer software. It is used to configure two
LAN networks, its a prototype of how real LAN¶s are configured. First three host PC¶s are
connected under the same LAN using a switch. They are pinged and ensured they are under
same network address. For the LAN on the right side, the network gateway is 222.22.22.1 and
since its class C IP address, the last octet is for the host adress so the three host PC¶s are with
the IP address 222.22.22.2 , 222.22.22.3 and 222.22.22.4. Since they are pinged, they can
share files. The right side LAN has the gateway address of 201.21.21.1 and the respective host
PC¶s have the address of4 201.21.21.2, 201.21.21.3 and 201.21.21.4. The router is situated
between the two LAN. The overall is the WAN connection which consists of 2 LAN. All the
same devices are connected with cross over cable and and the diffrent devices like router and
switch all connected with straight through cable. The two routers are configured and the two
LAN branches are connected. The router routes the data packet from the branch 1 to the
branch 2. The green light shows that there is no failure, and all are working properly.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 35/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 35
10.0 Discussion
In this assignment, we have practically carried out the file sharing and remote log in
operations across the network in the lab, there were some issues while carrying out this
experiment, there were some issues in pinging the host computers but with guidance from the
lecturer, the issue was solved. This assignment also required simulation of cisco packet tracer,
whereby, i have simulated two LAN networks, while carrying out the simulation the data
packets did not show succesful results, the green light did not blink. After correcting the
errors in the router configuration; the issue was solved and the data packet was sent
succesfully with the indication of green lights. Besides that, a deep study of all the network
classifications, network topologies, hardwares used in networking and other networking
operatins were gained at the end of the assignment.
11.0 Conclusion
At the end of this assignment, i have a gained a brief and deep knowledge of networking
concepts. This assignement gave me a full view of the overall networking concepts such as
network architecturs, classifications of network, devices used in networking. In addition, i
gained a good practical knowledge on sharing files and remote log in operations across the
network. Last but not least, all the objectives of this assignment was achieved and all the
required works were completed successfully.
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 36/37
Modern Communication Systems
Balaji Arunachalam (TP019324) Page 36
ReferenceOnline Resources
1) Florida Center for Instructional Technology College of Education, University of South
Florida (2009) Network Topology [online]
Available from : http://fcit.usf.edu/network/chap5/chap5.htm
[Accessed on 5 May 2011]
2) Network Bridge(n.d.) [online]
Available from :http://en.wikipedia.org/wiki/Bridging_(networking)
[Accessed on 7 May 2011]
3) Client/Server Network (n.d)[online]
Available from : http://compnetworking.about.com/od/basicnetworkingfaqs/a/client-
server.htm
[Accessed on 8 May 2011]
4) Types of IP Adress(2009.) [online]
Available from
:http://compnetworking.about.com/od/workingwithipaddresses/l/aa042400c.htm
[Accessed on 7 May 2011]
8/6/2019 Modern Communication Systems Balzzz
http://slidepdf.com/reader/full/modern-communication-systems-balzzz 37/37
Modern Communication Systems