0% found this document useful (0 votes)
52 views9 pages

Internship Report Ii

Uploaded by

anh.nh28032003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views9 pages

Internship Report Ii

Uploaded by

anh.nh28032003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

INTERNSHIP REPORT II

LEARN ABOUT WIFI, NETWORKING,


SEVEN LAYER OSI
Full name: Nguyễn Hải Anh
A. NETWORKING
I. What is networking?
- Networking is a collection of computer devices, network devices,
peripheral devices, servers or other devices connected to share data and
exchange files with each other.
- You can build a computer network by using hardware (routers, switches,
access points, and cables) and software (operating system or business
applications).
II. Computer network types
- LAN (local area network): connects computers over a relatively short
distance. For example, a Lan may connect all the computers in an office
building, school or hospital. Lans are privately owned and managed.
- WLAN (wireless local area network): is like a Lan but connections
between devices on the network are made wirelessly.
- WAN (wide area network): connects computers over a wide area, such
as from region to region or continent to continent. The Internet is largest WAN.
- MAN (metropolitan area network): are typically lager than LANS but
smaller than WANs. Cities and government entities own and manage MANs.
- PAN (personal area network): serves one person. For example, if you
have an Iphone and a Mac, it’s likely you’ve set up a PAN that shares and syncs
content – text messages, emails, photos, etc, …
- SAN (storage area network): A SAN is a specialized network that
provides access to block-level storage—shared network or cloud storage. To the
user, it looks, and works like a storage drive that’s physically attached to a
computer.
- CAN (campus area network): A CAN is also known as a corporate
area network. A CAN is larger than a LAN but smaller than a WAN. CANs
serve sites such as colleges, universities, and business campuses.
- VPN (virtual private network): A VPN is a secure, point-to-point
connection between two network end points. A VPN establishes an encrypted
channel that keeps a user’s identity and access credentials, as well as any data
transferred, inaccessible to hackers.
III. Important terms and concepts
- IP Address: An IP address is a unique number assigned to every device
connected to a network that uses the Internet Protocol for communication.
Each IP address identifies the device’s host network and the location of the
device on the host network. When one device sends data to another, the data
includes a ‘header’ that includes the IP address of the sending device and the
IP address of the destination device.
- Nodes: A node is a connection point inside a network that can receive,
send, create, or store data. Each node requires you to provide some form of
identification to receive access, like an IP address. A few examples of nodes
include computers, printers, modems, bridges, and switches. A node is
essentially any network device that can recognize, process, and transmit
information to any other network node.
- Routers: is a physical or virtual device that sends information that is
contained in data packets between networks. Routers analyses data within the
packets or determine the best way for the information to reach its ultimate
destination.
- Switches: A switch is a device that connects other devices and manages
node-to-node communication within a network, ensuring that data packets reach
their ultimate destination. While a router sends information between networks, a
switch sends information between nodes in a single network. When discussing
computer networks, ‘switching’ refers to how data is transferred between
devices in a network. The three main types of switching are as follows:
 Circuit switching, which establishes a dedicated communication path
between nodes in a network. This dedicated path assures the full
bandwidth is available during the transmission, meaning that no other
traffic can travel along that path.

 Packet switching involves breaking down data into independent


components that are called packets, which because of their small size,
make fewer demands on the network. The packets travel through the
network to their end destination.

 Message switching sends a message in its entirety from the source node,
traveling from switch to switch until it reaches its destination node.
- Ports: A port identifies a specific connection between network devices.
Each port is identified by a number. If you think of an IP address as comparable
to the address of a hotel, then ports are the suites or room numbers within that
hotel. Computers use port numbers to determine which application, service, or
process should receive specific messages.
- Network cable types: The most common network cable types are
Ethernet twisted pair, coaxial, and fiber optic. The choice of cable type depends
on the size of the network, the arrangement of network elements, and the
physical distance between devices.
IV. Network topology
- Star topology: in this topology, all devices in network connect directly
with a central device, usually a switch or hub. This is a popular structure in
LANs because it is easy to install and manage.
- Ring topology: in this topology, devices are connected in a loop, in
which signal is transmitted through the network nodes in a device-to-device
direction until it reaches the originating device again.
- Mesh topology: in this topology, each device is connected directly with
every other device. It makes a strong and reliable network, because if one link
fails, information can still be relayed through other lines.
- Hierarchical topology: This is a hierarchical topology in which the
network is divided into layer, for the example core layer, distribution layer and
access layer. Each layer has its own responsibility and connect to other layers in
the network. This structure is often used in large and complex networks.
V. Application of network
- Share resources and information: Network allow user to share
resource like printer, data and application between devices.
- Retrieve information remotely easily
- Convenient interpersonal communication: Network provide means of
communication such as email, instant messaging, and video calls to contact and
exchange information with others.
- Increase reliability and information security
VI. Comparison between Internet and Network
Internet Network
Global Network Network structure
Connect billions of devices and Connect devices in a specific network
computer
Use generic communication protocol Use specific network protocols
Viewed as a network system Viewed as a more limited network
structure
Allows access to services on the Allows sharing of resources and
network information within the network
Open up a word of connectivity and Create a local communication
communication environment
Link local networks into a global Connect devices in the same local
network network
Use unique IP address Use IP address within a specific
network
Managed by organizations and Managed by network administrator
agencies within the organization

B. OSI MODEL
OSI (open systems interconnection) is a conceptual model created by the
International Organization for Standardization that provides a common basis for
the coordination of standards development for the purpose of systems
interconnection. In OSI model, the communication between systems are split
into seven different layers: Physical, Data link, Network, Transport, Session,
Presentation and Application.

I. Application layer
This layer is the most users interact with and will recognize. The application
layer provides network services to the end-user. The services are protocols that
work with the data. The client is using one of these protocol may be HTTP
(Hypertext Transfer Protocol) that is used with web browsers such as Google
Chrome, Firefox, Microsoft Edge,…. Some other protocols like FTP (File
Transfer Protocol), POP (Post office Protocol), SMTP (Simple Mail Transfer
Protocol). All the interactive applications provide a set of services that allow
application layer to supply data to and receive data from the presentation layer.
II. Presentation layer
The presentation layer performs the uncomplicated task of syntax
processing or converting data from one format to another. For example,
consider you are ordering something from an online store. These transactions
are typically handled in a secure transmission which means that the data passing
between the “store” or the Website Application will transmit encrypted data to
the Presentation layer that will need to be decrypted and processed. This layer
handles translating the data from the top layer, which is presented in application
format, to network format and vice versa. After the Presentation layer processes
the data from one format to another, the information is then passed to the
Session layer or the Application layer depending on whether the data is
transmitting or receiving.
III. Session layer
At the Session layer, the construction, direction and conclusion of
connections between devices occur. This layer support multiple types of
connections as well as being responsible for authentication and reconnection if a
network interruption should occur. After the session is established, the data then
passes to or from the Transport layer.
IV. Transport layer
This layer is responsible for the transmission of data across network
connections. This layer coordinates how much data to send, how fast, where it
goes, and these sorts of things. Of the most widely known protocols for internet
applications, these services may be provided by Transmission Control Protocol
(TCP). Other protocols may provide additional capabilities including error
recovery, data flow and retransmission. Once the Transport layer has completed
its function, the data is then passed to or from the Network layer.
V. Network layer
- Network layer handles the routing of the data. After the data arrives at
this layer, each frame of data is examined to conclude if the data has reached its
ultimate target. The layer sends data to the correct destination on outgoing
transmissions and receives incoming transmission as well.
- IP is the commonly known network layer for the Internet. This layer
also manages the mapping between logical addresses and physical addresses,
for IP addresses, this is accomplished through Address Resolution Protocol
(ARP). The data is then passed to the next required layer which is the Data
layer.
VI. Data layer
Data layer is considered the most complex of the layers. This layer is
often divided into sublayers called Media Access Control (MAC) and Logical
Link Control (LLC). The layer sets up links across the physical network. When
this layer receives data from the Physical layer, it checks for transmission errors
and then packages the bits into data frames. From there, this layer manages the
physical addressing methods for the MAC or LLC layers. At the Data layer, the
data passes to or from the final layer in the OSI model which is the Physical
layer.
VII. Physical layer
The physical layer is responsible for the physical cable or wireless
connection between network nodes. It defines the connector, the electrical cable
or wireless technology connecting the devices, and is responsible for
transmission of the raw data, which is simply a series of 0s and 1s, while taking
care of bit rate control.
C. WIFI
Wi-Fi is a family of wireless network protocols based on the IEEE
802.11 family of standards, which are commonly used for local area
networking of devices and Internet access, allowing nearby digital devices to
exchange data by radio waves. These are the most widely used computer
networks, used globally in home and small office networks to link devices and
to provide Internet access with wireless routers and wireless access points in
public places such as coffee shops, hotels, libraries, and airports to provide
visitors.
Version and generations

Generations IEEE Adopted Maximum Radio


standard link rate frequency
(Mbit/s) (GHz)
Wifi 8 802.11bn 2028 100000 2.4, 5, 6 ,7,
42.5, 71
Wifi 7 802.11be 2024 1376-46,120 2.4, 5, 6
Wifi 6E 802.11ax 2020 574-9608 6
Wifi 6 2019 2.4, 5
Wifi 5 802.11ac 2014 433-6933 5
Wifi 4 802.11n 2008 72-600 2.4, 5
Wifi 3 802.11g 2003 6-54 2.4
Wifi 2 802.11a 1999 5
Wifi 1 802.11b 1999 1 -11 2,4
Wifi 0 802.11 1997 1-2 2.4
Multiple access point
An Extended Service Set may be formed by deploying multiple access points
that are configured with the same SSID and security settings. Wi-Fi client
devices typically connect to the access point that can provide the strongest
signal within that service set.
Increasing the number of Wi-Fi access points for a network
provides redundancy, better range, support for fast roaming, and increased
overall network-capacity by using more channels or by defining smaller cells.
Except for the smallest implementations (such as home or small office
networks), Wi-Fi implementations have moved toward "thin" access points,
with more of the network intelligence housed in a centralized network
appliance, relegating individual access points to the role of "dumb" transceivers.
Outdoor applications may use mesh topologies.
Hardware
Access point
An AirPort Wi-Fi adapter, supporting 802.11g, from an Apple MacBook
A wireless access point (WAP) connects a group of wireless devices to an
adjacent wired LAN. An access point resembles a network hub,
relaying data between connected wireless devices in addition to a (usually)
single connected wired device, most often an Ethernet hub or switch, allowing
wireless devices to communicate with other wired devices.
Wireless adapter
Wireless adapters allow devices to connect to a wireless network. These
adapters connect to devices using various external or internal interconnects such
as PCI, miniPCI, USB, ExpressCard, Cardbus, and PC Card. As of 2010, most
newer laptop computers come equipped with built-in internal adapters.
Router
Wireless routers integrate a Wireless Access Point, Ethernet switch, and internal
router firmware application that provides IP routing, NAT, and DNS forwarding
through an integrated WAN-interface. A wireless router allows wired and
wireless Ethernet LAN devices to connect to a (usually) single WAN device
such as a cable modem, DSL modem, or optical modem. A wireless router
allows all three devices, mainly the access point and router, to be configured
through one central utility. This utility is usually an integrated web server that is
accessible to wired and wireless LAN clients and often optionally to WAN
clients. This utility may also be an application that is run on a computer, as is
the case with as Apple's AirPort, which is managed with the AirPort
Utility on macOS and iOS.[127]
Bridge
Wireless network bridges can act to connect two networks to form a single
network at the data-link layer over Wi-Fi. The main standard is the wireless
distribution system (WDS).
Wireless bridging can connect a wired network to a wireless network. A bridge
differs from an access point: an access point typically connects wireless devices
to one wired network. Two wireless bridge devices may be used to connect two
wired networks over a wireless link, useful in situations where a wired
connection may be unavailable, such as between two separate homes or for
devices that have no wireless networking capability (but have wired networking
capability), such as consumer entertainment devices; alternatively, a wireless
bridge can be used to enable a device that supports a wired connection to
operate at a wireless networking standard that is faster than supported by the
wireless network connectivity feature (external dongle or inbuilt) supported by
the device (e.g., enabling Wireless-N speeds (up to the maximum supported
speed on the wired Ethernet port on both the bridge and connected devices
including the wireless access point) for a device that only supports Wireless-G).
A dual-band wireless bridge can also be used to enable 5 GHz wireless network
operation on a device that only supports 2.4 GHz wireless and has a wired
Ethernet port.
Repeater
Wireless range-extenders or wireless repeaters can extend the range of an
existing wireless network. Strategically placed range-extenders can elongate a
signal area or allow for the signal area to reach around barriers such as those
pertaining in L-shaped corridors. Wireless devices connected through repeaters
suffer from an increased latency for each hop, and there may be a reduction in
the maximum available data throughput. Besides, the effect of additional users
using a network employing wireless range-extenders is to consume the available
bandwidth faster than would be the case whereby a single user migrates around
a network employing extenders. For this reason, wireless range-extenders work
best in networks supporting low traffic throughput requirements, such as for
cases whereby a single user with a Wi-Fi-equipped tablet migrates around the
combined extended and non-extended portions of the total connected network.
Also, a wireless device connected to any of the repeaters in the chain has data
throughput limited by the "weakest link" in the chain between the connection
origin and connection end. Networks using wireless extenders are more prone to
degradation from interference from neighbouring access points that border
portions of the extended network and that happen to occupy the same channel as
the extended network.
Embedded systems
The security standard, Wi-Fi Protected Setup, allows embedded devices with a
limited graphical user interface to connect to the Internet with ease. Wi-Fi
Protected Setup has 2 configurations: The Push Button configuration and the
PIN configuration. These embedded devices are also called The Internet of
things and are low-power, battery-operated embedded systems. Several Wi-Fi
manufacturers design chips and modules for embedded Wi-Fi, such as
GainSpan.
D. Try with my Wi-Fi access point.
I can change name, channel and bandwidth of my Wi-Fi.

You might also like