Government Polytechnic, Jalna Computer Engineering Department
Government Polytechnic, Jalna Computer Engineering Department
Government Polytechnic, Jalna Computer Engineering Department
ANNEXURE-II
Evaluation Sheet for the Micro Project (*****)
---------------------------------------------------------------------------------------
Academic Year: 2020-2021 Course: CO Semester: Fourth
----------------------------------------------------------------------------------------------------
B.
C.
B.
C.
Comments /Suggestion about Term work /leadership /Interpersonal Communication (if any)
Marks Evolution:
1
Staff Remark:
Roll Enrollment Name Of Seat Number Marks Out of 6 Marks Out Total
No No Students for performance of 6 for Out Of
in group activity performance 10
(D5.Col 8) in group
activity D5.
Col
2
Government Polytechnic, Jalna
Computer Engineering Department
Micro project on
Group Members
Sr.No Roll No Enrollment No Seat No Name Of the Students
1. 10 191200211 -- Jaya S. Bhutekar
2. 21 191200236 -- Komal Nagre
3. 43 191200207 -- Priyanka Hiwale
4. 45 191200227 -- Mayuri Parmeshwari
Guide H.O.D
Mr.B.S.Pawar Mr.P.B.Agrawal
3
Undertaking
I declare that the work presented in this project titled “classify network
connecting devices with their specification”, Submitted to the computer
engineering department. Bareilly for the award of “Diploma in Computer
Engineering Department” is my original work. I have not plagiarized or
submitted the same work for the award of any other diploma.
Date:
Place:
4
CERTIFICATE
Certified that the work contained in the project titled “classify network
connecting devices with their specification”
1. Jaya S. Bhutekar
2. Priyanka Hiwale
3. Komal Nagre
4. Mayuri Parmeshwari
Has been carried out under my supervision and that this work has not been
submitted elsewhere for diploma.
Prof: Mr.B.S.Pawar
Computer Engineering Department
Government Polytechnic, Jalna
5
INTRODUCTION:
here are different types of electronic devices are used in networking which
are known as network devices or network equipment. In a computer
network, network devices are mainly used for transmitting and receiving
the data quickly and securely in between computers, fax machines,
printers, etc. These devices may be intra network or internetwork.
There are some devices are installed on the device such as RJ45
connector otherwise NIC card, whereas some devices are part of the
network namely switch, router, etc.
6
Types of Network Devices
Network Hub
Network Switch
Modem
Network Router
Bridge
Repeater
Gateway
Access Poin
Hub
7
from a host to a network hub, then the data can transmit to all the connected
ports. Similarly, all the ports identify the data path which leads to
inefficiencies & wastage. Because of this working, a network hub cannot be
so safe and secure.
In addition, copying the data packets on all the ports will make the hub
slower which leads to the utilize of the network switch.
network-hub
Network hubs are classified into two types like active hub & passive hub.
A hub can be used with both digital and analog data, provided its settings
have been configured to prepare for the formatting of the incoming data.
For example, if the incoming data is in digital format, the hub must pass it
8
on as packets; however, if the incoming data is analog, then the hub
passes it on in signal form.
Switch
Similar to a hub, this is also working at the layer in the LAN and a switch is
more clever compare with a hub. As the hub is used for data transferring,
whereas a switch is used for filtering & forwarding the data.
So this is the more clever technique to deal with the data packets.
network-switch
9
Whenever a data packet is obtained from the interfaces in the switch, then
the data packet can be filtered & transmits to the interface of the proposed
receiver. Due to this reason,
A switch can work at either the Data Link layer or the Network layer of the
OSI model. A multilayer switch is one that can operate at both layers,
which means that it can operate as both a switch and a router. A multilayer
switch is a high-performance device that supports the same routing
protocols as routers.
10
to a halt. Switch port security is important so be sure to secure switches:
Disable all unused ports and use DHCP snooping, ARP inspection and
MAC address filtering.
Router
router-in-network-device
Routers are intelligent devices, and they store information about the
networks they’re connected to. Most routers can be configured to operate
11
as packet-filtering firewalls and use access control lists (ACLs). Routers, in
conjunction with a channel service unit/data service unit (CSU/DSU), are
also used to translate from LAN framing to WAN framing. This is needed
because LANs and WANs use different network protocols. Such routers are
known as border routers. They serve as the outside connection of a LAN to
a WAN, and they operate at the border of your network.
Router are also used to divide internal networks into two or more
subnetworks. Routers can also be connected internally to other routers,
creating zones that operate independently. Routers establish
communication by maintaining tables about
Routers are your first line of defense, and they must be configured to pass
only traffic that is authorized by network administrators. The routes
themselves can be configured as static or dynamic.
If they are static, they can only be configured manually and stay that way
until changed. If they are dynamic, they learn of other routers around
them and use information about those routers to build their routing
tables.
12
computers, with separate input and output network interfaces for each
connected network. Because routers and gateways are the backbone of
large computer networks like the internet, they have special features that
give them the flexibility and the ability to cope with varying network
addressing schemes and frame sizes through segmentation of big packets
into smaller sizes that fit the new network components.
Each router interface has its own Address Resolution Protocol (ARP)
module, its own LAN address (network card address) and its own Internet
Protocol (IP) address. The router, with the help of a routing table, has
knowledge of routes a packet could take from its source to its destination.
The routing table, like in the bridge and switch, grows dynamically. Upon
receipt of a packet, the router removes the packet headers and trailers and
analyzes the IP header by determining the source and destination
addresses and data type, and noting the arrival time. It also updates the
router table with new addresses not already in the table. The IP header
and arrival time information is entered in the routing table. Routers
normally work at the Network layer of the OSI model.
Bridge
13
bridge-in-network-
Devices
These are also used for connecting two physical local area networks to a
larger logical local area network. In the OSI model, bridges work at the data
link & physical layers to divide
the networks from larger to smaller by controlling the data flow between the
two. In recent years, bridges are replaced by switches to provide more
functionality.
14
Bridges work only at the Physical and Data Link layers of the OSI model.
Bridges are used to divide larger networks into smaller sections by sitting
between two physical network segments and managing the flow of data
between the two.
Bridges are like hubs in many respects, including the fact that they
connect LAN components with identical protocols. However, bridges filter
incoming data packets, known as frames, for addresses before they are
forwarded. As it filters the data packets, the bridge makes no
modifications to the format or content of the incoming data. The bridge
filters and forwards frames on the network with the help of a dynamic
bridge table.
The bridge table, which is initially empty, maintains the LAN addresses for
each computer in the LAN and the addresses of each bridge interface that
connects the LAN to other LANs. Bridges, like hubs, can be either simple or
multiple port.
Bridges have mostly fallen out of favor in recent years and have been
replaced by switches, which offer more functionality. In fact, switches are
sometimes referred to as “multiport bridges” because of how they
operate.
Gateway
Generally, a gateway performs at the session & transport layers in the OSI
model. Gateways offer conversion between networking technologies like
OSI (Open System Interconnection) & TCP/IP. Because of this, these are
connected to two or many autonomous networks, where each network has
its own domain name service, routing algorithm, topology, protocols, and
procedures of network administration & policies.
15
gateway-device
Gateways normally work at the Transport and Session layers of the OSI
model. At the Transport layer and above, there are numerous protocols
and standards from different vendors; gateways are used to deal with
them. Gateways provide translation between networking technologies
such as Open System Interconnection (OSI) and Transmission Control
Protocol/Internet Protocol (TCP/IP).
Gateways perform all of the functions of routers and more. In fact, a router
with added translation functionality is a gateway. The function that does
the translation between different network technologies is called a protocol
converter.
16
Modem
A modem is the most important network device and it is used daily in our
life. If we notice the internet connection to homes was given with the help
of a wire. then wire carries internet data from one place to another.
But, every computer gives digital or binary data in the form of zeros & ones.
modem
Repeater
The operating of a repeater can be done at the physical layer. The main
function of this device is to reproduce the signal on a similar network before
the signal gets weak otherwise damaged.
The significant point to be noted regarding these devices is that they do not
strengthen the signal. Whenever the signal gets weak, then they reproduce
it at the actual strength. A repeater is a two-port device.
18
A repeater is an electronic device that amplifies the signal it receives. You
can think of repeater as a device which receives a signal and retransmits it
at a higher level or higher power so that the signal can cover longer
distances, more than 100 meters for standard LAN cables. Repeaters work
on the Physical layer.
Access Point
While an access point (AP) can technically involve either a wired or wireless
connection, it commonly means a wireless device. An AP works at the
second OSI layer, the Data Link layer, and it can operate either as a bridge
connecting a standard wired network to wireless devices or as a router
passing data transmissions from one access point to another.
19
antenna, transmitter and adapter. APs use the wireless infrastructure
network mode to provide a connection point between WLANs and a wired
Ethernet LAN. They also have several ports, giving you a way to expand
the network to support additional clients.
Depending on the size of the network, one or more APs might be required
to provide full coverage. Additional APs are used to allow access to more
wireless clients and to expand the range of the wireless network. Each AP
is limited by its transmission range — the distance a client can be from an
AP and still obtain a usable signal and data process speed.
APs might also provide many ports that can be used to increase the
network’s size, firewall capabilities and Dynamic Host Configuration
Protocol (DHCP) service. Therefore, we get APs that are a switch, DHCP
server, router and firewall.
To connect to a wireless AP, you need a service set identifier (SSID) name.
802.11 wireless networks use the SSID to identify all systems belonging to
20
the same network, and client stations must be configured with the SSID to
be authenticated to the AP. The AP might broadcast the SSID, allowing all
wireless clients in the area to see the AP’s SSID. However, for security
reasons, APs can be configured not to broadcast the SSID, which means
that an administrator needs to give client systems the SSID instead of
allowing it to be discovered automatically.
Access points can be fat or thin. Fat APs, sometimes still referred to as
autonomous APs, need to be manually configured with network and
security settings; then they are essentially left alone to serve clients until
they can no longer function. Thin APs allow remote configuration using a
controller. Since thin clients do not need to be manually configured, they
can be easily reconfigured and monitored. Access points can also be
controller-based or stand-alone.
21
Conclusion
22