Bca 6 Sem (Project) Computer Network
Bca 6 Sem (Project) Computer Network
This is to certify that the project work entitled "Cyber Security " is the comprehensive work done by
Anoubam Meera Devi , bearing Roll No. BCA 21245 at Mangolngabi College, Ningthoukhong under the
guidance and supervision of Laishram Somorjit singh, Faculty, Mangolnganbi College,
Ningthoukhong,Bishnupur, 795126. for the partial fulfilment of the requirements for the award of Bachelor of
Computer Application (BCA) 6th Semester
Examination under Manipur University in the academic session November 2023 to May 2024.
This project is the bonafide work carried out by him. It has neither been published in any journal or not
submitted in any academic institution before. This project is truly authentic and original.
2
ACKNOWLEDGEMENT
I have taken efforts in this project. However, it would not have been possible without the kind
support and help of many individuals and the institute. I would like to extend my sincere thanks to all
of them.
My thanks and appreciations also go to my friends in developing the project and people who have
willingly helped me out with their abilities.
4
Computer Networking
LAN (Local area network)- A local area network (LAN) is a collection of devices
connected together in one physical location, such as a building, office, or home. A LAN
can be small or large, ranging from a home network with one user to an enterprise network
with thousands of users and devices in an office or school
WAN (Wide area network)- In its simplest form, a wide-area network (WAN) is a
collection of local-area networks (LANs) or other networks that communicate with one
another. A WAN is essentially a network of networks, with the Internet the world's largest
WAN.
Wi-Fi (Wireless Fidelity) - Wi-Fi is a family of wireless network protocols, which are
commonly used for local area networking of devices and Internet access, allowing nearby
digital devices to exchange data by radio waves. These are the most widely used
computer networks in the world, used globally in home and small office networks to
link desktop and laptop computers, tablet computers, smartphones, smart TVs, printers,
and smart speakers together and to a wireless router to connect them to the Internet, and
in wireless access points in public places like coffee shops, hotels, libraries and airports
to provide the public Internet access for mobile devices.
Switching
In large networks, there can be multiple paths from sender to receiver. The
switching technique will decide the best route for data transmission. Switching technique
is used to connect the systems for making one-to-one communication.
Circuit Switching -
Packet Switching -
o The packet switching is a switching technique in which the message is sent in one
go, but it is divided into smaller pieces, and they are sent individually.
o The message splits into smaller pieces known as packets and packets are given
a unique number to identify their order at the receiving end.
o Every packet contains some information in its headers such as source address,
destination address and sequence number.
o Packets will travel across the network, taking the shortest path as possible.
o All the packets are reassembled at the receiving end in correct order.
o If any packet is missing or corrupted, then the message will be sent to resend the
message.
o If the correct order of the packets is reached, then the acknowledgment message
will be sent.
Components involved in Computer Network
Hosts − Hosts are said to be situated at ultimate end of the network, i.e. a host is
a source of information and another host will be the destination. Information flows
end to end between hosts. A host can be a user’s PC, an internet Server, a
database server etc.
Media − If wired, then it can be copper cable, fiber optic cable, and coaxial cable.If
wireless, it can be free-to-air radio frequency or some special wireless band.
Wireless frequencies can be used to interconnect remote sites too.
Physical Layer (Layer-1) − This layer deals with hardware technology and actual
communication mechanism such as signaling, voltage, cable type and length, etc.
Data Link Layer (Layer-2) − This layer takes the raw transmission data (signal,
pulses etc.) from the Physical Layer and makes Data Frames, and sends that to
the upper layer and vice versa. This layer also checks any transmission errors
and sorts it out accordingly.
Network Layer (Layer-3) − This layer helps to uniquely identify hosts beyond the
subnets and defines the path which the packets will follow or be routed to reach
the destination.
Transport Layer (Layer-4) − This layer provides end to end data delivery among
hosts. This layer takes data from the above layer and breaks it into smaller units
called Segments and then gives it to the Network layer for transmission.
Session Layer (Layer-5) − This layer provides session management capabilities
between hosts. For example, if some host needs a password verification for
access and if credentials are provided then for that session password verification
does not happen again. This layer can assist in synchronization, dialog control
and critical operation management (e.g., an online bank transaction).
Presentation Layer (Layer-6) − This layer helps to understand data
representation in one form on a host to other host in their native representation.
Data from the sender is converted to on-the-wire data (general standard format)
and at the receiver’s end it is converted to the native representation of the
receiver.
Application Layer (Layer-7) − This is where the user application sits that needs
to transfer data between or among hosts. For example − HTTP, file transfer
application (FTP) and electronic mail etc.
TCP / IP
A majority of the internet uses a protocol suite called the Internet Protocol Suite also
known as the TCP/IP protocol suite. This suite is a combination of protocols which
encompasses a number of different protocols for different purpose and need. Because
the two major protocols in this suites are TCP (Transmission Control Protocol) and IP
(Internet Protocol), this is commonly termed as TCP/IP Protocol suite. This protocol suite
has its own reference model which it follows over the internet. In contrast with the OSI
model, this model of protocols contains less layers.
This model is indifferent to the actual hardware implementation, i.e. the physical
layer of OSI Model. This is why this model can be implemented on almost all underlying
technologies. Transport and Internet layers correspond to the same peer layers. All three
top layers of OSI Model are compressed together in single Application layer of TCP/IP
Model.
OSI model provides a clear distinction TCP/IP doesn't have any clear distinguishing
between interfaces, services, and protocols. points between services, interfaces, and
protocols.
OSI refers to Open Systems Interconnection. TCP refers to Transmission Control Protocol.
OSI uses the network layer to define routing TCP/IP uses only the Internet layer.
standards and protocols.
In the OSI model, the transport layer is only A layer of the TCP/IP model is both
connection-oriented. connection-oriented and connectionless.
In the OSI model, the data link layer and In TCP, physical and data link are both
physical are separate layers. combined as a single host-to-network layer.
Session and presentation layers are a part of There is no session and presentation layer in
the OSI model. the TCP model.
It is defined after the advent of the Internet. It is defined before the advent of the internet.
IP Address
A Private IP address is the address your network router assigns to your device.
Each device within the same network is assigned a unique private IP address (sometimes
called a private network address) — this is how devices on the same internal network talk
to each other.
IP Addressing
Class A Address
The first bit of the first octet is always set to 0 (zero). Thus the first octet ranges
from 1 – 127, i.e.
Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The IP range
127.x.x.x is reserved for loopback IP addresses.IP 0.0.0.0 is is a non-routable meta-
address used to designate an invalid, unknown, or non applicable target.
The default subnet mask for Class A IP address is 255.0.0.0 which implies that Class A
addressing can have 126 networks (27-2) and 16777214 hosts (224-2).
Class A IP address format is thus:
0NNNNNNN .HHHHHHHH.HHHHHHHH.HHHHHHHH
Class B Address
An IP address which belongs to class B has the first two bits in the first octet set to 10,
i.e.
Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet mask for
Class B is 255.255.x.x.
Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses.
Class B IP address format is:
10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH
Class C Address
The first octet of Class C IP address has its first 3 bits set to 110, that is −
Class C IP addresses range from 192.0.0.x to 223.255.255.x. The default subnet mask
for Class C is 255.255.255.x.
Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses.
Class C IP address format is:
110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
Class D Address
Very first four bits of the first octet in Class D IP addresses are set to 1110, giving a
range of −
Class E Address
This IP Class is reserved for experimental purposes only for R&D or Study. IP addresses
in this class ranges from 240.0.0.0 to 255.255.255.254. Like Class D, this class too is
not equipped with any subnet mask.
Subnet Mask
The 32-bit IP address contains information about the host and its network. It is
very necessary to distinguish both. For this, routers use Subnet Mask, which is as long
as the size of the network address in the IP address. Subnet Mask is also 32 bits long.
If the IP address in binary is ANDed with its Subnet Mask, the result yields the Network
address. For example, say the IP Address is 192.168.1.152 and the Subnet Mask is
255.255.255.0 then −
This way the Subnet Mask helps extract the Network ID and the Host from an IP Address.
It can be identified now that 192.168.1.0 is the Network number and 192.168.1.152 is
the host on that network.
Drawback - Currently, the population of the world is 7.6 billion. Every user is having more
than one device connected with the internet, and private companies also rely on the
internet. As we know that IPv4 produces 4 billion addresses, which are not enough for
each device connected to the internet on a planet. Although the various techniques were
invented, such as variable- length mask, network address translation, port address
translation, classes, inter-domain translation, to conserve the bandwidth of IP address
and slow down the depletion of an IP address. In these techniques, public IP is converted
into a private IP due to which the user having public IP can also use the internet. But still,
this was not so efficient, so it gave rise to the development of the next generation of IP
addresses, i.e., IPv6.
IPv6 Address -
The address format of IPv4
The above diagram shows the address format of IPv4 and IPv6. An IPv4 is a 32-
bit decimal address. It contains 4 octets or fields separated by 'dot', and each field is 8-
bit in size. The number that each field contains should be in the range of 0-255. Whereas
an IPv6 is a 128-bit hexadecimal address. It contains 8 fields separated by a colon, and
each field is 16-bit in size.
Different types of Ports
Parallel Port - In computing, a parallel port was a type of interface found on computers
for connecting peripherals. The name refers to the way the data is sent; parallel ports
send multiple bits of data at once, as opposed to serial communication, in which bits are
sent one at a time
Ethernet Port -An Ethernet port (also called a jack or socket) is an opening on
computer network equipment that Ethernet cables plug into. Their purpose is to connect
wired network hardware in an Ethernet LAN, metropolitan area network (MAN), or wide
area network (WAN).
USB Port -A USB port is a standard cable connection interface for personal computers
and consumer electronics devices. USB stands for Universal Serial Bus, an industry
standard for short-distance digital data communications. USB ports allow USB devices
to be connected to each other with and transfer digital data over USB cables
Wireless Modem- A wireless modem is a modem that bypasses the telephone system and
connects directly to a wireless network, through which it can directly access the Internet
connectivity provided by an Internet service provider (ISP).
Cables
CAT Cables - A variety of different cables are available for Ethernet and other
telecommunications and networking applications. These network cables that are described by
their different categories, e.g. Cat 5 cables, Cat-6 cables, etc., which are often recognized by the
TIA (telecommunications Industries Association) and they are summarized below:
MODEM
Types of Modem
Dial-up Modem: Dial-up modems transmits analog signal via telephone lines.
Functions of Modem
Data Compression: To decrease the amount of time when it try to send data and for
cutting down on the percentages of errors in the all flowing of signals, then modem
required the data compression mechanism. So, this data compression method helps to
reduce the size of signals, which are required for sending data.
Error Correction: In the error correction techniques, all devices monitor all information
while receiving is undamaged. It splits all information into small units that is called the
“Frames“. In this process, it tags all frames along with checksums, but it is done before
sending information. Checksum is a special technique that helps to check redundancy in
the presented data in the computer. If, this information matches with checksums then
device grabs the verified information. That is sent by error-correcting modem. But, if it
gets to fail in matching with checksum then information is moved back.
Flow Control: Each modem has different speed of sending signals. so, it can generate
issues during to receive signals if any one device’s speed down of them. So, in the flow
control technique, slower one signals the faster one to pause, by sending a ‘character’.
If, slow device will try to send character to faster modem, then this character would be a
signal to the faster modem for Pausing the information transfer until the slow modem gets
caught up.
Modem Standards
V.21 Modem
V.22 Modem
The modem modulation rate is 600 bauds, with each baud representing two data bits.This
modem modulation scheme supports a "fallback" rate of 600 BPS.
V.27 Modem
The modulation rate is 1600 bauds, with each baud representing three data bits.
The second and third releases of the V.27 Recommendation (V.27bis and V.27ter,
respectively) added the ability to fallback to a 2400 BPS rate using V.26, Alternative "A"
modulation. Also, the start-up/training times are reduced in the V.27bis Recommendation.
V.29 Modem
This modulation scheme was first standardized by the CCITT in 1976. It uses a form of
Quadrature Amplitude Modulation (QAM), which transports data in groups of four bits
("quadbits"). V.29 modulation is capable of transporting synchronous data at rates up to9600
BPS. It operates full-duplex on a 4-Wire leased line or half-duplex on a 2-Wire, switched,
voice line.
The V.29 modulation rate is 2400 bauds, with each baud representing four data bits.
V.32 Modem
First defined in 1984 by the CCITT, V.32 defines a modem that can support 9600 BPS
asynchronous or synchronous data. Operation is full-duplex over a 2-Wire, switched,
voice circuit. The modulation used may be Quadrature Amplitude Modulation (QAM), or
QAM with Trellis coding. Trellis coding is actually a Forward Error Correcting (FEC)
scheme.
V.34 Modem
The modulation rate (baud or "symbol" rate) can vary. The carrier frequency can vary.
The V.34 Recommendation also describes a "line probing" process that allows the
modem to automatically setup optimally for any type of line connection. The training time
has been reduced, but the modem will recover automatically from most line disturbances.
Modem & Routers - Modems and routers are fundamentally different devices. modems
transform one type of data signal into a different type (one that is appropriate for devices
within a local area network), whereas routers distribute the data received from the
modem to smartphones, laptops, and other end devices in the network.
Routers also create and maintain local area networks, allowing multiple devices
to communicate and share data with each other. A LAN can exist regardless of the
availability of Internet access.
Modems, on the other hand, cannot create LANs, nor can they directly communicate
with multiple devices. However, they are necessary in providing accessto the Internet.