Ashutosh Tripathi Training File
Ashutosh Tripathi Training File
Ashutosh Tripathi Training File
I greatly appreciate the guidance and academic support of my mentors whose contribution in
suggestions and encouragements helped me complete my training tasks in a convincing
manner in all respects. I am awfully thankful to them for their painstaking efforts in arranging
experimentation and open discussions on several networking topics that enabled this duration
of training a memorable opportunity ushered on to me for learning and sharing newer
dimensions to my thinking process in networking technologies as a wonderful opportunity
throughout.
In the end, I would like to thank ALTTC faculty and other staff for arranging needful
exposure to me during my training.
CERTIFICATE
CONTENTS
Page No.
Chapter 1: Introduction to Networking …………………………………………………. 8 - 11
1.1: Intro
1.2: Benefits of Industry Networking
1.2.1: Internet Connection Types
1.3: Components of Computer Network
1.4: Networking Devices
1.5: Why is Networking so Important?
1.6: Advantages & Disadvantages of Networking
Project ………………………………………………………………...………………. 44 - 52
References & Bibliography ……………………………………………………………….. 53
Chapter 1: Introduction to Networking
1.1 Intro:
Networking, also known as computer networking, is the practice of transporting and
exchanging data between nodes over a shared medium in an information system.
An example of networking is sharing and acquiring information between different divisions
of the same company to share information and solve business problems. An example of
networking is linking the entire network of computers to a print server to allow each
workstation to have the ability to print documents.
Computer networks can also include multiple devices/mediums which help in the
communication between two different devices; these are known as Network devices and
include things such as routers, switches, hubs, and bridges.
Two basic network types are local-area networks (LANs) and wide-area networks (WANs).
LANs connect computers and peripheral devices in a limited physical area, such as a business
office, laboratory, or college campus, by means of links (wires, Ethernet cables, fibre optics,
Wi-Fi) that transmit data rapidly.
1.2 Benefits of industry networking
● Strengthen your network business connections.
● Tap into your network for ideas.
● Raise your professional profile.
● Grow your personal brand.
● Get access to job opportunities.
● Exchange best practice knowledge with your network.
● Get career advice and support.
● Build your confidence.
8
● Compatible With Hardware and Software Components.
fig 1.1
9
router inspects the destination address, consults its routing tables to decide the optimal
route and then transfer the packet along this route.
b. Hub: - A Network Hub is one of the most commonly used networking devices can be
easily found on any small networks such as home or office. Hub operates at the
physical layer of OSI model. It is the simplest networking device hence has low cost.
Basically, a hub is a repeater with multiple ports. The function of a hub in networking
is similar to the repeater. It transfers data in the form of binary bits and uses for
broadcasting data.
d. Bridge: - Bridge is termed as a network device which is helpful in filtering the data
load of the traffic by dividing it into segments or packets. They are used to lower the
load of traffic on the LAN and other networks. Bridges are passive devices because
there is no interaction between bridged and the paths of bridging. Bridges operate on
the second layer of the OSI model that is the data link layer.
10
fig 1.2
Networking is the process of making connections and building relationships. These
connections can provide you with advice and contacts, which can help you make informed
career decisions. Networking can even help you find unadvertised jobs/internships.
Networking can take place in a group or one-on-one setting.
● Site (software) licences are likely to be cheaper than buying several standalone
licences.
● Files can easily be shared between users. Network users can communicate
by email and instant messenger.
● Security is good - users cannot see other users' files unlike on stand-alone machines.
● Data is easy to backup as all the data is stored on the file server.
Disadvantages
● Purchasing the network cabling and file servers can be expensive.
11
Chapter 2: Telecommunication
2.1 Intro
Telecommunications are the means of electronic transmission of information over distances.
The information may be in the form of voice telephone calls, data, text, images, or video.
Today, telecommunications are used to organize more or less remote computer systems into
telecommunications networks.
Telecommunication is communication at a distance using electrical signals or
electromagnetic waves. Examples of telecommunications systems are the telephone network,
the radio broadcasting system, computer networks and the Internet.
The range of telecommunications applications is broad and includes telephony and video
conferencing, facsimile, broadcast and interactive television, instant messaging, e-mail,
distributed collaboration, a host of Web- and Internet-based communication, and data
transmission.
2.2What is an IT?
Information technology (IT) is the use of any computers, storage, networking and other
physical devices, infrastructure and processes to create, process, store, secure and exchange
all forms of electronic data.
IT Device means any computing or communications hardware with information storage
capability (e.g., computers, servers, PDAs, cellular telephones, tablets, smart phones, fax
machines, printers, and copiers).
12
What are the basics of IT?
There are four primary elements for information technology as a whole:
● Information security.
● Technical support.
Fig 2.1
13
● Logical-mathematical intelligence. ...
● Linguistic intelligence.
● Spatial Intelligence.
● Musical Intelligence.
● Bodily-kinesthetic Intelligence.
● Intrapersonal Intelligence.
● Interpersonal Intelligence.
● Naturalistic intelligence.
● Air:
Vacuum or air constitutes a good transmission medium for electromagnetic
waves.
Its range is 30-50 metre.
● Copper:
14
Networks use copper media because it is inexpensive, easy to install, and has
low resistance to electrical current. However, copper media is limited by distance and
signal interference. Data is transmitted on copper cables as electrical pulses.
Its range is 5/6 km.
● Co-axial Cable:
Coaxial cable (or coax) carries signals of higher frequency ranges than those
in twisted pair cable. It has a central core conductor of solid or stranded wire (usually
copper) enclosed in an insulating sheath, which is, in turn, encased in an outer
conductor of metal foil, braid, or a combination of the two. The outer conductor is
also enclosed in an insulating sheath, and the whole cable is protected by a plastic
cover.
Its range is 30-60 km.
● Microwave or EM Wave:
It is a line-of-sight transmission i.e., the sending and receiving antennas need
to be properly aligned with each other. The distance covered by the signal is directly
proportional to the height of the antenna. Frequency Range:1GHz – 300GHz. These
are majorly used for mobile phone communication and television distribution.
Its range is 1/3/5/15 kms.
● Satellite:
A communication satellite is an artificial satellite that transmits the signal via
a transponder by creating a channel between the transmitter and the receiver at
different Earth locations.
3 Satellites cover the whole world.
● Optical Fiber Cable:
A fiber optic cable is a network cable that contains strands of glass fibers
inside an insulated casing. They're designed for long-distance, high-performance data
networking, and telecommunications. Compared to wired cables, fiber optic cables
provide higher bandwidth and transmit data over longer distances. Fiber optic cables
support much of the world's internet, cable television, and telephone systems.
There is no limit of distance for Optical Fiber Cable.
3.3 Difference between Wired Media and Wireless Media
Wired Media Wireless Media
The signal energy is contained and guided The signal energy propagates in the
or propagated inside a solid medium. structure of unguided electromagnetic
waves in the air.
It can be used for point-to-point It can be used for radio advertising in all
communication. directions.
15
This capacity can be further increased by In this capacity of transmission cannot be
inserting more cables for transmission. increased beyond the limit.
Examples are twisted pair, Co-axial cable, An example is Radio & Infrared Waves.
and Optical fiber.
16
● The ‘metro’ circles cover very dense population centres in the very largest Indian:
Delhi, Kolkata, and Mumbai.
● The ‘A’, ‘B’, and ‘C’ circles cover various geographic territories of varying
population sizes. ‘A’ circles are the largest in terms of population coverage. ‘C’
circles contain smallest population.
17
district, North 24 Parganas
district, South 24 Parganas
district and Nadia district)
State
Maharashtra & of Maharashtra (excluding
MH A
Goa Mumbai, Navi Mumbai and
Kalyan) and State of Goa
Madhya Pradesh & State of Madhya Pradesh and
MP B
Chhattisgarh State of Chhattisgarh
Mumbai, Navi
Mumbai MU Metro
Mumbai, Thane and Kalyan
State of Arunachal Pradesh,
State of Manipur State
of Meghalaya, State
North East NE C
of Mizoram, State
of Nagaland and State
of Tripura
Odisha OR C State of Odisha
State of Punjab, Union
Territory
Punjab PB B
of Chandigarh and Panchkula
district
Rajasthan RJ B State of Rajasthan
State of Tamil
Tamil Nadu TN A Nadu, Puducherry
district and Karaikal district
UP (East) UE B Eastern Uttar Pradesh
Western Uttar
Pradesh (excluding Ghaziabad
UP (West) UW B district and Gautam Buddh
Nagar district) and State
of Uttarakhand
State of West
Bengal (excluding Kolkata),
West Bengal WB C State of Sikkim and Union
Territory of Andaman and
Nicobar Islands
fig 4.1
20
5.2 Advantages & Disadvantages of SoC
Advantages of SoC:
● Size.
● Flexibility.
● Cost-Efficient.
● High Volume.
● Easy To Use.
● Verified Hardware.
● Adaptable.
● Single Source.
Disadvantages of SoC:
● Higher design and engineering costs when it comes to products of high-capacity
category.
● Lack of flexibility to implement a lot of customizations.
● Board-level systems with separate DSP and CPU often require different toolchains to
support each device.
21
5.4 Purpose of NoC
A NOC or a No Objection Certificate is an essential legal document issued by an
organization, agency or even by individuals stating no objection to the covenants mentioned
in the certificate. This document serves many purposes including immigration, general
litigation and even employment.
Disadvantages of NoC:
● Inability to offer the required latency
● Scalability
● Bandwidth
22
Chapter 6: Typical Call
fig 6.1
23
fig 6.2
6.2 TRUNK CALL INTER CITY
Officially, it’s an older, technical name for the long, inter-city circuits that commonly
used amplification and some form of tone signalling: ‘trunk lines’.
In everyday use, such as ‘trunk dialling’ or ‘trunk calls’, it is another name for ‘long
distance’. A trunk call was the term for long-distance calling which traverses one or more
trunk lines and involving more than one telephone exchange. This is in contrast to making
a local call which involves a single exchange and typically no trunk lines.
As a word, it means ‘the main, core, or central part’, before subsidiary parts diverge. A
tree trunk, not the branches; the trunk of a person’s body, before the arms and legs. Trunk
roads: inter-city highways, not distributor roads.
A trunk is a communications line or link designed to carry multiple signals
simultaneously to provide network access between two points. First, trunks can carry data
from multiple local area networks (LANs) or virtual LANs (VLANs) across a single
interconnect between switches or routers, called a trunk port.
Trunks are also called pre-wires by a few folks (whether they are used for power or
clocks or critical signals). Rather than let the tool or flow do its job which may not be
optimal in all cases, a person may elect to draw a wire (wires) by hand to serve as a guide
and let the tool finish the connections at the end of the trunk. This way, majority of the
route (or power) is "pre-routed" and the connections to this trunk (imagine branches) are
made by the tool.
Thus, a Subscriber can dial a number and connect in the same exchange. But to connect to
another exchange, i.e., another city subscriber has to book “Trunk Call”. The subscriber
dials to Telephone exchange of that particular city and asks them to connect to a
particular number of another exchange(city).
24
fig 6.3
6.2.1 MDF (Main Distribution Frame):
A main distribution frame (MDF) is the primary
hub or demarcation point that interconnects private or public IT and
telecommunication lines coming into a building to an internal network via any
number of intermediate distribution frames (IDFs).
The primary purpose of an MDF or main distribution facility is to connect and
manage the wiring used for telecommunication between a service provider and IDFs.
An example would be a business located across multiple floors of a building may
have an MDF on the first floor that connects to public lines from outside the building.
That MDF then connects those lines to the internal network via an IDF placed on each
individual floor.
The central point of the network is usually the main distribution frame or the MDF.
This is usually in your data center itself, and it's where you're terminating WAN
connections. It's where all of your network connections are terminating.
The MDF usually holds telephone exchange protective devices including heat coils,
and functions as a test point between a line and the exchange equipment.
25
ventilation, room and rack security, and fire and seismic protection . An entire
building or station devoted to this purpose is a data center.
A server room is a necessary attachment for businesses (and some homes) to house
vital technological equipment such as computer networking devices and data storage
servers. They can range in size depending on needs, with some housing as few as ten
computers and others equipping over one hundred.
6.2.3 TRUNK:
A trunk, also known as a Session Initiation Protocol (SIP) trunk, is a high-
capacity communications line that delivers voice calls and data from a client location
to the Internet. Trunks have been around for decades and are used worldwide.
26
through the SIP trunk. SIP allows for long distance calling, video calling, and even
Internet browsing.
Chapter 7: Multiplexing
7.1 Intro
Multiplexing is a technique used to combine and send the multiple data streams over a single
medium. The process of combining the data streams is known as multiplexing and hardware
used for multiplexing is known as a multiplexer.
Phone calls are a good example of multiplexing in telecommunications. That is, more than
one phone call is transmitted over a single medium. Multiplexing techniques include time-
division multiplexing (TDM) and frequency-division multiplexing (FDM).
The purpose of multiplexing is to enable signals to be transmitted more efficiently over a
given communication channel, thereby decreasing transmission costs. A device called a
multiplexer (often shortened to "mux") combines the input signals into one signal.
Multiplexing is achieved by using a device called Multiplexer (MUX) that combines n input
lines to generate a single output line. Multiplexing follows many-to-one, i.e., n input lines
and one output line.
27
● Multiplexing technique is widely used in telecommunications in which several
telephone calls are carried through a single wire.
● Multiplexing originated in telegraphy in the early 1870s and is now widely used in
communication.
● George Owen Squier developed the telephone carrier multiplexing in 1910.
Multiplexing
Synchronous Asynchronous
TDM TDM
fig 7.1
7.1.1 Frequency Division Multiplexing (FDM)
● It is an analog technique.
28
fig7.2
● It is used to utilize the high data rate capability of fibre optic cable.
fig7.3
● In Time Division Multiplexing technique, the total time available in the channel is
distributed among different users. Therefore, each user is allocated with different time
interval known as a Time slot at which data is to be transmitted by the sender.
● A user takes control of the channel for a fixed amount of time.
29
fig7.4
30
1. Amplitude,
2. Frequency, and
3. Phase modulation.
8.1: Comparison
Old /Traditional Network Current Network
31
Telephone line Data Network (ex: NIB-I, NIB-II etc)
ISD+STD+Area code (i.e., Fix Part or same for Network Part of IP address
all subscriber in a particular area)
8.2: Router
● A router is a device that forwards packets between networks.
32
fig8.1
33
An Ethernet media converter is a device designed to interconnect different networking media
such as fiber and coaxial cables to facilitate communication between them. It often comes in
the form of a small box where the two different networking cables can be plugged in.
fig8.2
34
Media converters are completely transparent to the network. There are no MAC or IP
addresses to consider; converters can be placed anywhere in the LAN without concern for
data degradation. "These features make media converters extremely inexpensive and easy to
use.
● Financial advantage
35
Chapter 9: Telephony
36
network protocol RADIUS. A technique for monitoring and controlling user access to
network resources on an IP-based network is authentication, Authorization, and accounting
(AAA). Frequently, AAA is configured as a dedicated server.
● There will be a single point of contact for the users and system authentication for IT
administrators.
Disadvantages: -
● RADIUS server configuration, particularly the initial configuration, can be
challenging and time-consuming.
● It can be challenging to select the best RADIUS server software and deployment
strategy for your company.
● On-site hardware upkeep can be difficult and time-consuming.
● Starting three digits are fixed for “country code”. Country code is either of 1,2 or 3
digits. Here +91 is country code of INDIA. It is also called ISD.
● Next 4 digits are fixed for “area code”. Area code is either of 2,3or4 digits. It is also
fixed in a country for a specific area. Here 120 is the area code and it fixed for
GHAZIABAD and NOIDA.it is also called STD.
● Next two digits decide the “sub area”. Here 27 is the sub area code and 27 in
GHAZIABAD is for RAJ NAGAR.
● Next two digit tells about the “Telephone Exchange”. Here 55 in Raj Nagar is for the
Telephone Exchange of ALTTC.
A telephone exchange can provide 998 no. to consumers starting from 001 to 998. For
example, ALTTC exchange can give no. to its consumer from
+91-120-27-55-001 to +91-120-27-55-998.
Here we can see that two no. are missing one is +91-120-27-55-000 and +91-120-27-55-999.
The missing two no. s are not given two consumers.
1st no +91-120-27-55-000 is used as exchange id. So that if any other telephone exchange
wants to communicate with this exchange, then the other exchange should validate this id to
37
communicate with the exchange. So, for communication with two exchange there is proper
validation of exchange id.
2nd no +91-120-27-55-999 is used as broadcast id. It is used to broadcast messages in large
area or in large people. For example, in past twenty years communication changes so much
but before 20 years in INDIA prime ministers use this to broadcast messages on festivals.
fig 9.1
9.4 IP Address:
An IP address is a unique address that identifies a device on the internet or a local network.
IP stands for "Internet Protocol," which is the set of rules governing the format of data sent
via the internet or local network.
There are 4 types of IP Addresses- Public, Private, Fixed, and Dynamic. Among them, public
and private addresses are derived from their local network location, which should be used
within the network while public IP is used offline.
38
In essence, IP addresses are the identifier that allows information to be sent between devices
on a network: they contain location information and make devices accessible for
communication. The internet needs a way to differentiate between different computers,
routers, and websites.
An IPv4 is a 32-bit decimal address. It contains 4 octets or fields separated by 'dot', and each
field is 8-bit in size. The number that each field contains should be in the range of 0-255.
Whereas an IPv6 is a 128-bit hexadecimal address. It contains 8 fields separated by a colon,
and each field is 16-bit in size. An IPv4 is a 32-bit decimal address. It contains 4 octets or
fields separated by 'dot', and each field is 8-bit in size. The number that each field contains
should be in the range of 0-255. Whereas an IPv6 is a 128-bit hexadecimal address. It
contains 8 fields separated by a colon, and each field is 16-bit in size.
fig 9.2
9.4 Subnet
A separate and identifiable portion of an organization's network, typically arranged on one
floor, building or geographical location. A subnet, or subnetwork, is a network inside a
network. Subnets make networks more efficient. Through subnetting, network traffic can
travel a shorter distance without passing through unnecessary routers to reach its destination.
Subnetting is the strategy used to partition a single physical network into more than one
smaller logical sub-networks (subnets). An IP address includes a network segment and a host
segment.
39
● Class A networks use a default subnet mask of 255.0. 0.0 and have 0-127 as their first
octet. ...
● Class B networks use a default subnet mask of 255.255. 0.0 and have 128-191 as their
first octet. ...
● Class C networks use a default subnet mask of 255.255. 255.0 and have 192-223 as
their first octet.
What is a 24 subnet?
The subnet mask shows what part is which. /24 means that the first 24 bits of the IP address
are part of the Network number (192.168. 0) the last part is part of the host address (1-254).
● The way they select preferred routes, using information about hop costs,
● Other factors such as relay multiplexing and cloud access framework parameters.
The ability of routing protocols to dynamically adjust to changing conditions such as disabled
connections and components and route data around obstructions is what gives the Internet
its fault tolerance and high availability.
40
● Immediate system-to-immediate system (IS-IS).
41
Chapter 10: Software Requirements
42
Disadvantage:
1) It may cause the loops by affecting the STP.
2) It doesn’t support the ether channel regarding the access layer switches.
3) With regard to the Frame relay it is low in command.
10.5 Demonstration
Now we use cisco packet tracer to demonstrate how there is setup of
network between customer end and provider end:
To demonstrate the setup of network between customer end and provider end we different
networking devices.
43
fig10.1
Step 5: Now we take three servers. DHCP servers, DNS Server, WEB Server respectively.
And give them IP 192.168.2.5/24, 192.168.2.10/24, 192.168.2.15/24 respectively.
Step 6: Now we provide IP to Routers. 192.168.1.1 to Customer end router and 192.168.2.1
to Provider end router by writing commands in Command Line Interface.
Step 7: Now we configure Routers for DHCP servers. And also, for DNS Server.
Step 8: Now we provide Ip addresses to all the devices. And Check that there is
communication in PC0 to PC1.
fig10.2
Step 8: Now we open DNS server and add DNS service in configuration for example we add
‘www.facebook.com’ to DNS service and save it.
44
fig10.3
Step 9: Now we open web server in laptop 2 and open ‘www.facebook.com’ in laptop and it
opens but if we search any other server it doesn’t open.
fig10.4
45
fig10.5
Project
Implementation on how to provide telephones or internet to all in an
hospital or hotel.
Step 1: Firstly, we take one router (Router 2811).
46
fig11.1
fig11.2
47
fig11.3
fig11.4
48
fig11.5
49
fig11.6
50
fig11.7
51
fig11.7
52
fig 11.8
53
fig11.9
fig11.10
Step 12: Now both of them get their phone No. respectively:
54
fig11.11
Step 13: Now dial one of the telephone No. you can see that another phone starts ringing:
fig11.12
55
References & Bibliography
● http://www.alttc.bsnl.co.in/
● https://www.youtube.com/
● https://www.geeksforgeeks.org/
● https://www.codingem.com/
● https://www.wikipedia.org/
● https://www.techopedia.com/
● https://www.javatpoint.com/
● https://www.tutorialspoint.com/index.htm
● https://www.google.com/
56