Lan Project Report of Vissj Polytechnic
Lan Project Report of Vissj Polytechnic
N IN COMPUTER LABOROTARY
CHAPTER-1
1.1 INTRODUCTION
This chapter introduces the general overview of local area network (LAN). It is
a computer network that spans a relatively small area. A LAN consists of computers
& peripheral devices that share a common communication media. A LAN is confined
to a single room, building or group of buildings & typically located within a distinct
geographic area. However, one LAN can be connected to other LAN’s over any
distance via telephone lines. LAN can share resources (data, program, equipment)
with each other which typically share files, printers, scanners and other devices.
What is a LAN?
Local area network (LAN) is used for Information Interchange between devices of
network users. LAN is a high-speed data network that covers a relatively small
geographic area. It typically connects workstations, personal computers, printers,
servers, and other devices. LANs offer computer users many advantages, including
shared access to devices and applications, file exchange between connected users, and
communication between users via electronic mail and other applications. LAN is
secure because there is no outside connection with the local area network. Thus the
data which is shared is safe on the local area network and cannot be accessed outside.
LAN due to their small size are considerably faster, their speed can range anywhere
from 100 to 1000Mbps or up to 10Gbps.
LAN protocols function at the lowest two layers of the OSI reference model that is
between the physical layer and the data link layer. Figure 1.2 illustrates how several
popular LAN protocols map to the OSI reference model.
LAN data transmissions fall into three classifications: unicast, multicast, and
broadcast. In each type of transmission, a single packet is sent to one or more nodes.
In a unicast transmission, a single packet is sent from the source to destination
on a network. First, the source node addresses the packet by using the address of the
destination node. The package is then sent onto the network, and finally, the network
passes the packet to its destination.
A multicast transmission consists of a single data packet that is copied and sent to a
specific subset of nodes on the network. First, the source node addresses the packet by
using a multicast address. The packet is then sent into the network, which makes
copies of the packet and sends a copy to each node that is part of the multicast
address.
NETWORK
1. Peer-to-peer LANs:
It is a network of computers in which each machine sends and receives data files and
process data using those files. The absence of a dedicated file server lowers hardware
and maintenance cost. Performance is slower, especially if the network has many
nodes. Since each computer has the same potential to access and process data, these
types networks are called peer-to-peer network.
All the machines on a peer-to-peer LAN are equal. Peer-to-peer LANs do not
require any one machine to be a dedicated, high-performance server; service by a
peer-to- peer LAN is often cheaper for this reason. Peer-to-peer LANs work well
when only a small number of machines are connected to it. But as the size of the LAN
grows, peer-to-peer services can become quite disorganized, and because each
machine on the LAN must be powerful enough to serve all of its peers, the cost
increases. For larger LANs, the dedicated client-server LAN architecture becomes
more cost effective.
2. Client-server LANs:
Client – Server network is a computing or processing environment in which the
hardware, software and data resource of two or more computers are combined to solve
a problem. It involves multiple clients, connecting to at least one central server. Most
data and applications are installed on the server. Servers often have private user
directories as well as multiple public directories. When clients need access to these
resources, they access them from the server. Client-server networks tend to have
faster access speeds, Because of the large number of clients they are designed and
support. The clients are allowed to function as workstations without sharing any
resources. It is easier to upgrade software applications and files because they are held
on single computer. System-wide services can be provided through the server
software. The clients share the software and data resources (data, program,
equipment). These resources are placed at computers called servers.
A client-server LAN consists of one or more server machines. The LAN
server machines are usually big and fast because they must serve many users, while
the client machines need only be fast enough for one person to use at a time. Security
is enhanced on a client server network because the security is handled by the server.
Shared printers are either attached directly to a server, or to a print server (a
specialized computer attached to the network), or to a personal computer on network
that acts as a print server.
1. BUS TOPOLOGY:
It is alternatively referred as Line topology. A bus topology consists of a single cable
with the terminator at each end. All present nodes or network devices are connected to
the single cable which acts as the backbone of the entire network. The bus topology
carries the transmitted data along the cable. As the data reaches each node, the node
checks the destination address (MAC/IP address). One of the nodes transmits the
data from one end to the other in a single direction. When the data reaches extreme
end, the terminator removes the data from the line.
Advantages: it works well when you have a small network. It’s the easiest network
topology for connecting computers or peripherals in a linear fashion. Easy to connect
& remove devices in a network without affecting any other device.
Dis-Advantages: Additional devices slow the network speed. If a main cable is
damaged, the network fails. Proper termination is required to prevent bouncing of
signals.
2. RING TOPOLOGY:
It is a network configuration in which device connection creates a circular data path.
In ring topology, packets of data travel from one device to the next until they reach
destination. Most of ring topologies allow packets to travel only in one direction,
called a unidirectional ring network.
3. TREE TOPOLOGY:
Advantages: It is easy to find the fault. Other nodes in a network don’t get affected if
one of their nodes gets damaged. Computer can be added by simply adding a hub in a
network topology so this topology is flexible. It reduces traffic too.
Dis-Advantages: Wiring the network is difficult. If the backbone of the entire
network breaks both part of the network may not communicate to each other but a
part of the network continues to communicate alone.
4. MESH TOPOLOGY:
A network setup where each computer and network device is interconnected with one
another, allowing for most transmissions to be distributed even if one of the
connections go down. It is a topology commonly used for wireless networks. Below is
a visual example of a simple computer setup on a network using a mesh topology.
5. HYBRID TOPOLOGY:
A Hybrid topology is a type of network topology that uses two or more differing
network topologies. These topologies can include a mix of bus topology, mesh
topology, ring topology, mesh topology, star topology, and tree topology.
The choice to use a hybrid topology over a standard topology depends on the need of
a business, school, or the users. The two most commonly used types of hybrid
topologies are the fallowing.
6. STAR TOPOLOGY:
MERITS:
Fault indication is easy. A defective node can easily be isolated from the network
by removing its connection at the center.
DEMERITS:
Because each node is directly connected to the center, star topology necessities a
large quantity of cable.
System reliability is dependent on central server. Failure of the hub results in total
breakdown of the network.
CHAPTER-2
TRANSMISSION MEDIA
Transmission channel:
2.1 CABLES
It is a physical signal conductor like, twisted pair or fiber optic that is used to
connect two or more devices on the network.
STP cabling is twisted pair cabling with additional shielding to reduce crosstalk
and other forms of electromagnetic interference (EMI).
The outer insulating jacket contains an inner braided copper mesh to shield the
pairs of twisted cables, which themselves are wrapped in foil.
STP cabling is more expensive and it has an impedance of 150 ohms, has a
maximum length of 90 meters, and is used primarily in networking environments
with a high amount of EMI due to motors, air conditioners, power lines, or other
noisy electrical components.
2. COAXIAL CABLE
Coaxial cable is a type of copper cable specially built with a metal shield and
other components engineered to block signal interference.
Coaxial or coax cable is made of two conductors, which share the same axis
due to which they have been named as “co” and “ax” coax.
The copper wire enclosed in a plastic insulation is the main conductor of the
coax cable while the wire mesh acts as the second conductor.
The wire mesh also acts as a shield. It gives the protection against EMI and
surrounds the insulating material.
A tough plastic sheath protects the cable.
It uses light signal instead of electrical signals and comprises of glass core,
which is surround by a glass layer known as cladding.
Cladding is used to reflect the signals back into the waveguide by multiple
internal reflections.
Covering the cladding with a tough plastic sheath, it provides additional
corrosion protection for the copper sheath.
CHAPTER-3
CRIMPING
RJ45 plugs feature eight (8) pins to which the wire strands of a cable interface
electrically. Each plug has eight locations (positions), spaced about 1mm apart.
Individual wires are inserted using special cable crimping tools. The industry calls
this type of connector 8P8C (Eight position, Eight contact). Cables can transmit
information along their length. To actually get that information where it needs to go,
you need to make the right connections to an RJ45 connector.
Inside the Ethernet cable, there are 8 color coded wires. These wires are twisted
into 4 pairs of wires, each pair has a common color theme. One wire in the pair being
a solid or primarily solid colored wire and the other being a primarily white wire with
a colored stripe.
Fig: 3.3 (b) Untwist and straighten of the wires in the cable
Inside the cable you see a bunch of smaller wires twisted together.
Separate the twisted wires and straighten them out so they’re easier to sort into right
order.
Cutoff the small plastic wire separator or core so it’s out of the way.
Don’t cutoff or remove any of the wires, because you won’t be able to crimp them
into the connector.
3. Arrange the wires into the right order.
Fig: 3.3 (c) arranging the wires into the right order
Note that wires labeled Orange/white or Brown/white indicate the small wires that
have 2 colors.
4. Cut the wires into an even line ½ inch (13mm) from sheathing.
Hold the wire with your thumb and index finger to keep them in order.
Then use the cutting section of the crimping tool to cut them into an even line.
The wires must be in an even line to be crimped into the RJ-45 connector properly.
If you cut them in an uneven line, move further down the wires and cut them again.
Fig: 3.3 (e) Inserting the wire into the RJ-45 connector
Hold the RJ-45 connector so the clip is on the underside and the small metal pins are
facing up. Insert the cable into the connector so that each of the small wires fits into
the small grooves in the connector.
The sheathing of the cable should fit just inside of the connector.
If any of the small wires bend or don’t fit into a groove correctly, take the cable out
and straighten the wires with your fingers before crimping.
The wires must be inserted in the correct order and each wire must fit into a groove
before you crimp the connector.
6. Stick the connector into the crimping part of the tool and squeeze twice
Fig: 3.3 (f) stickking the connector into the crimping part of the tool and squeeze twice
Insert the connector in the crimping section of the tool until it can’t fit any
further. Squeeze the handles to crimp the connector and secure the wires. Release the
handles, then squeeze the tool again to make sure all of the pins are pushed down.
The crimping tool pushes small pins in the grooves down on to the wires to hold
and connect them to the RJ-45 connector.
7. Remove the cable from the tool and check that all of the pins are down.
Take the connector out of the tool and look at the pins to see that they
are all pushed down in an even line. Lightly tug at the connector to make sure it is
attached to the cable.
If any of the pins are not pushed down, put the wire back into the crimping tool
and crimp it again.
CHAPTER-4
NETWORK INTERFACE CARD
A computer’s network card works by taking the data given to it CPU and
sending it to a destination. It translates the data via cables. A NIC provides a
computer with a dedicated, full time connection to a network by implementing the
physical layer circuitry necessary for communicating with a data link layer standard,
such as Ethernet or Wi-Fi. Each card represents a device and can prepare, transmit
and control the flow of data on network. The NIC uses the OSI model to send the
signals at the physical layer transmit data packets at the network layer and operate as
an interface at the TCP/IP layer.
Speed: -All NICs have a speed rating in terms of Mbps that suggest the general
performance of the card when implemented in a computer network. The average
Ethernet NICs are offered in 10 Mbps, 100 Mbps, 1000 Mbps and 1-Gbps.
Driver: -This is the required software that passes data between the computers
operating system (OS) and the NIC.
MAC Address: -These are assigned to NICs that is used to deliver Ethernet
packets to the computer.
Connectivity LED: -Most NICs have an LED indicator integrated into the
connector to notify the user of when the network is connected and data is being
transmitted.
4.2 SWITCH
FUNCTION
The network switch, packet switch (or just switch) plays an integral part in
most local area networks or LANs. Small Office, Home Office (SOHO) applications
typically use a single switch.
Follow the steps below to prepare the system for installation of your network interface
hardware.
1. At the HP-UX prompt, execute the command:
2. Wait for the system to respond with a message indicating that the system has
been halted.
3. Observe antistatic precautions by following the guidelines as described in the
installation instructions in the hardware manual or the Antistatic Precautions Note.
4. Install your network interface card by referring to your hardware installation
and service manual.
5. Power up the system to complete the process. The network interface card will
run a self-test automatically. Any error messages will appear on the terminal
display or system console.
6. Proceed, "Configuring LAN/9000 Using SAM."
CHAPTER-5
IP ADDRESS
The IP address acts as a locator for one IP device to find another and interact
with it. It is not intended. However, to act as an identifier that always uniquely
identifies a particular device. In current practice, an IP address is not always a unique
identifier, due to technologies such as dynamic assignment and network address
translation.
Setting up a static IP is usually simple processes are the steps you should
follow:
1. Click on the Start Button and then choose Run. The Run window should open.
2. Type command in the Run box and click OK. A new black window should
open up with a prompt.
3. At the prompt, type IP config/all and click Enter. You should now see lots of
information related to your IP. Some of this information you will need later either
print the screen or copy down the info for the following fields; IP address, Default
Gateway, Subnet Mask and Name Servers (Name Servers are also called DNS
Servers). Once all the information has been copied or printed, exit this window.
4. Click Start and then Control Panel, then select Network Connections. Once the
Network Connections window opens, you should see your network connection
labeled. Many networks and computers have more than one network connection.
Choose the network connection that you use to connect to the internet. Once this
network connection is selected, right click and choose properties.
Hint: If you are having difficulties finding the network connection that is used to
connect to the internet, one way to make your search easier is to disable one
connection at a time and then test using your browser if your internet still works. If
your internet no longer works, then the network connection you disabled is the one
that you use to connect to the internet.
5. In the Properties window, select the General tab and then click on Internet
Protocol (TCP/IP). Once this is selected click on the Properties button.
6. On this screen, choose the following radio button: Use the Following IP
Address and then you will fill in the following information regarding:
o IP Address
o Subnet Mask
o Default Gateway
There will also be two radio buttons. Choose the radio Button: Use the Following
DNS Server Address. There are two more fields to fill in, they are:
IMPORTANT:
Make sure that ONLY the "Internet Protocol (TCP/IP)" is checked. DO NOT
check any other network type unless you are sure what you are doing. Please note that
enabling "File and printer sharing for Microsoft Networks" is extremely
dangerous. If you have to enable this feature to make disks/printers on your PC to be
available to other computers (like others at home or at your office) you should also
install a firewall program to limit access to your PC. We recommend Zone Alarm
which is a free utility for non-profit use.
Click the "Use the following IP address" option and fill in the form with the
parameters provided to you during Loj-Net registration. All the IP numbers shown in
the following screenshot are examples. You should fill-in the IP addresses that start
with "139.179....”
Fill in the IP Addresses for the Primary and Secondary DNS Servers too.
Microsoft operating systems in the same workgroup may allow each other access to
their files, printers, or Internet connection. Members of different workgroups on the
same local area network segment and TCP/IP network can only access resources in
workgroups to which they are joined.
Windows XP:
Go to Control Panel > System > and click the Computer Name Tab:
If you are happy with the Workgroup name then just click "Cancel".
If you want to change it then click "Change" and you will get the following
dialog:
The Computer Name must be different for each PC on the network; the Workgroup
should be the same for each PC on the network.
Make sure the Computer Name is different to any other PC’s on the network. Click
the “Workgroup” radio button and enter an appropriate workgroup name in the text
box then press "OK".
CHAPTER-6
NETMEETING
Definition:
NetMeeting is a software application for audio and video conferencing.
NetMeeting offers sharing of desktop video, audio, chat and file transfer functionality.
Providing long-distance Web site design assistance has become easier, since the
discovery of Microsoft NetMeeting. This program allows people to connect to each
other’s computers, view the other person's desktop remotely, and even take control of
the desktop for the demonstration of programs.
On your task bar, click "Start," and then "Run." Type "conf" into the window, and
click "OK."
Fig 6.1
The next window informs you about the capabilities of NetMeeting. Click "Next."
In the following window, enter information about yourself. The First Name, Last
Name, and E-Mail Address fields are required. You may enter any location or
comments, if you choose.
Fig 6.2
The next Window allows you to log onto a directory server. It is strongly
recommended that you do not do so. Leave these check boxes blank.
Fig 6.3
Set your network speed on the next window. I don't recommend using this
program for a dial-up modem. Most people would do well to select "Local Area
Network." If you know that your Internet access is provided by cable, DSL, or ISDN,
select the appropriate radio button.
Fig 6.4
Unless you intend to use NetMeeting frequently (and most of us won't), do not
choose to put a shortcut on your desktop or Quick Launch bar. You may have to
uncheck these choices.
Fig 6.5
Next you will be asked to tune your audio settings. It is generally more
convenient to use the telephone, so the thing to do here is to simply click through the
next few screens until a Window tells you "You have tuned your audio settings."
Fig 6.6
When you click "Finish" on the final window, NetMeeting will launch.
Fig 6.7
To commence a NetMeeting, you need only enter the IP address of the other
meeting participant and hit enter. If you need to give someone your IP address, you
can view this under "Help," "About Windows Net meeting."
To share your applications or desktop, just click the Share icon on the lower-left
corner. Select your application and click the "Share" button.
Fig 6.8
- Click the Remote tab
- Tick the Allow users to connect remotely to your computer check box [See pic
below]
Fig 6.9
- Click OK
Note:
You must be logged on as an Administrator or be a member of the Administrators
group to enable Remote Desktop.
1. To allow other users to connect to your computer:
In the Remote tab, click the Select Remote Users button [See pic below]
Fig 6.10
Windows XP:
Fig 6.11
In the Log On to Windows dialog box, type your user name, password, and
domain (if required), and then click OK. The Remote Desktop window will open
and you will see the desktop settings, files, and programs that are on a remote
computer.
Now you can use Universal Document Converter on a remote computer the same way
You use it on local computer! In the list of users on the Remote Desktop Users
dialog box.
These instructions assume that you have already successfully connected to the
guest net and registered your machine as shown here.
The examples shown use the names and paths for the printer in the Knoll. The
machine name in the knoll is cm-guestnet-1 and the printer name is np. In the trailer, the
machine is cm-guestnet-2 and the printer is np2.
First, open My Computer from the start menu. You'll see the following window.
On the left side, under Other Places choose Control Panel.
Fig 6.13
Fig 6.15
Choose connect to this printer and fill in the path to the printer.
In the knoll, the path is \\cm-guestnet-1\np and in trailer, it's \\cm-guestnet-2\np2.
Fig 6.16
Fig 6.17
Fig 6.18
Fig 6.19
Fig 6.20
Fig 6.21
CHAPTER 7
7.1 CONCLUSION
In conclusion, a network is two or more computers connected together using a
telecommunication system for the purpose of communicating and sharing
resources.
In this project we have successfully installed local area network in our lab. Local
Area Network allows students to access the internet using Local Area Network.
By this project, we got more information about LAN cable, switch and other LAN
equipments. Finally, we are satisfied with our project.
7.2 REFERENCE
Reference books:
Communication Electronics- Louis E Frensel, 3rd Edition.
Communication an computers network- K. Shashidhar
VISSJ GOVERNMENT POLYTECHNIC Page 52
IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY
E- Resources:
https://www.techopedia.com
Etworking.techtarget.com
www.webopedia.com
https://ecomputernotes.com
m.wikihow.com