Internship Report Ii
Internship Report Ii
Message switching sends a message in its entirety from the source node,
traveling from switch to switch until it reaches its destination node.
- Ports: A port identifies a specific connection between network devices.
Each port is identified by a number. If you think of an IP address as comparable
to the address of a hotel, then ports are the suites or room numbers within that
hotel. Computers use port numbers to determine which application, service, or
process should receive specific messages.
- Network cable types: The most common network cable types are
Ethernet twisted pair, coaxial, and fiber optic. The choice of cable type depends
on the size of the network, the arrangement of network elements, and the
physical distance between devices.
IV. Network topology
- Star topology: in this topology, all devices in network connect directly
with a central device, usually a switch or hub. This is a popular structure in
LANs because it is easy to install and manage.
- Ring topology: in this topology, devices are connected in a loop, in
which signal is transmitted through the network nodes in a device-to-device
direction until it reaches the originating device again.
- Mesh topology: in this topology, each device is connected directly with
every other device. It makes a strong and reliable network, because if one link
fails, information can still be relayed through other lines.
- Hierarchical topology: This is a hierarchical topology in which the
network is divided into layer, for the example core layer, distribution layer and
access layer. Each layer has its own responsibility and connect to other layers in
the network. This structure is often used in large and complex networks.
V. Application of network
- Share resources and information: Network allow user to share
resource like printer, data and application between devices.
- Retrieve information remotely easily
- Convenient interpersonal communication: Network provide means of
communication such as email, instant messaging, and video calls to contact and
exchange information with others.
- Increase reliability and information security
VI. Comparison between Internet and Network
Internet Network
Global Network Network structure
Connect billions of devices and Connect devices in a specific network
computer
Use generic communication protocol Use specific network protocols
Viewed as a network system Viewed as a more limited network
structure
Allows access to services on the Allows sharing of resources and
network information within the network
Open up a word of connectivity and Create a local communication
communication environment
Link local networks into a global Connect devices in the same local
network network
Use unique IP address Use IP address within a specific
network
Managed by organizations and Managed by network administrator
agencies within the organization
B. OSI MODEL
OSI (open systems interconnection) is a conceptual model created by the
International Organization for Standardization that provides a common basis for
the coordination of standards development for the purpose of systems
interconnection. In OSI model, the communication between systems are split
into seven different layers: Physical, Data link, Network, Transport, Session,
Presentation and Application.
I. Application layer
This layer is the most users interact with and will recognize. The application
layer provides network services to the end-user. The services are protocols that
work with the data. The client is using one of these protocol may be HTTP
(Hypertext Transfer Protocol) that is used with web browsers such as Google
Chrome, Firefox, Microsoft Edge,…. Some other protocols like FTP (File
Transfer Protocol), POP (Post office Protocol), SMTP (Simple Mail Transfer
Protocol). All the interactive applications provide a set of services that allow
application layer to supply data to and receive data from the presentation layer.
II. Presentation layer
The presentation layer performs the uncomplicated task of syntax
processing or converting data from one format to another. For example,
consider you are ordering something from an online store. These transactions
are typically handled in a secure transmission which means that the data passing
between the “store” or the Website Application will transmit encrypted data to
the Presentation layer that will need to be decrypted and processed. This layer
handles translating the data from the top layer, which is presented in application
format, to network format and vice versa. After the Presentation layer processes
the data from one format to another, the information is then passed to the
Session layer or the Application layer depending on whether the data is
transmitting or receiving.
III. Session layer
At the Session layer, the construction, direction and conclusion of
connections between devices occur. This layer support multiple types of
connections as well as being responsible for authentication and reconnection if a
network interruption should occur. After the session is established, the data then
passes to or from the Transport layer.
IV. Transport layer
This layer is responsible for the transmission of data across network
connections. This layer coordinates how much data to send, how fast, where it
goes, and these sorts of things. Of the most widely known protocols for internet
applications, these services may be provided by Transmission Control Protocol
(TCP). Other protocols may provide additional capabilities including error
recovery, data flow and retransmission. Once the Transport layer has completed
its function, the data is then passed to or from the Network layer.
V. Network layer
- Network layer handles the routing of the data. After the data arrives at
this layer, each frame of data is examined to conclude if the data has reached its
ultimate target. The layer sends data to the correct destination on outgoing
transmissions and receives incoming transmission as well.
- IP is the commonly known network layer for the Internet. This layer
also manages the mapping between logical addresses and physical addresses,
for IP addresses, this is accomplished through Address Resolution Protocol
(ARP). The data is then passed to the next required layer which is the Data
layer.
VI. Data layer
Data layer is considered the most complex of the layers. This layer is
often divided into sublayers called Media Access Control (MAC) and Logical
Link Control (LLC). The layer sets up links across the physical network. When
this layer receives data from the Physical layer, it checks for transmission errors
and then packages the bits into data frames. From there, this layer manages the
physical addressing methods for the MAC or LLC layers. At the Data layer, the
data passes to or from the final layer in the OSI model which is the Physical
layer.
VII. Physical layer
The physical layer is responsible for the physical cable or wireless
connection between network nodes. It defines the connector, the electrical cable
or wireless technology connecting the devices, and is responsible for
transmission of the raw data, which is simply a series of 0s and 1s, while taking
care of bit rate control.
C. WIFI
Wi-Fi is a family of wireless network protocols based on the IEEE
802.11 family of standards, which are commonly used for local area
networking of devices and Internet access, allowing nearby digital devices to
exchange data by radio waves. These are the most widely used computer
networks, used globally in home and small office networks to link devices and
to provide Internet access with wireless routers and wireless access points in
public places such as coffee shops, hotels, libraries, and airports to provide
visitors.
Version and generations