0% found this document useful (0 votes)
16 views24 pages

NEW3

Uploaded by

srushtishinde392
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views24 pages

NEW3

Uploaded by

srushtishinde392
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

INDEX

Sr. No. Content Page No.

ANNEXURE-I

1.0 Aims/Benefits of the Micro-Project 5

2.0 Course Outcomes Addressed 5

3.0 Proposed Methodology 5

4.0 Resources Required 5

5.0 Action Plan 6

ANNEXURE-II

1.0 Rationale 7-9

2.0 Aims/Benefits of the Micro-Project 10

3.0 Course Outcomes Achieved 10

4.0 Actual Methodology Followed/Program Code 11-13

5.0 Outputs of the Micro-Projects 14

6.0 Actual Resources Used 15

7.0 Skill Developed / Learning outcomes of this Micro-Project 15

1
ANNEXURE-I

1.0 Aims/Benefits of the micro project


Explain protocol and types of protocol.
Benefit Taken from this micro-project is understanding the concept of protocol and the
types of protocol

2.0 Course outcome addressed.

 Analyze the functioning of data communication and computer network.


 Configure various networking devices.

3.0 Proposed methodology

1. Focused on the selection of an appropriate topic for the micro-project.


2. Select the topic i.e. Explain it in brief .
3. Brief study on our topic.
4. Gather all information based on the topic of the micro project.
5. Analysis and study of our topic in detail.
6. Following all the above methodologies we successfully completed our microproject.

4.0 Resources used

Sr. Name of resource


Specifications Quantity
no. material

1 Computer System 16 GB RAM, Windows 10 OS 1

2 textbook/manual DCC (Data communication and computer 1


network) 22414
2
5.0 Action Plan

3
ANNEXURE-II

1.0 Brief Introduction/Rationale

Protocol
Protocol, in computer science, a set of rules or procedures for transmitting data between electronic
devices, such as computers. In order for computers to exchange information, there must be a
preexisting agreement as to how the information will be structured and how each side will send
and receive it. Without a protocol, a transmitting computer, for example, could be sending its data
in 8-bit packets while the receiving computer might expect the data in 16-bit packets. Protocols are
established by international or industrywide organizations. Perhaps the most important computer
protocol is OSI (Open Systems Interconnection), a set of guidelines for implementing networking
communications between computers. Among the most important sets of Internet protocols
are TCP/IP (Transmission Control Protocol/Internet Protocol), HTTPS (Secure HyperText
Transmission Protocol), SMTP (Simple Mail Transfer Protocol), and DNS (Domain Name
System).

Overview of Protocol

In Order to make communication successful between devices, some rules and procedures should
be agreed upon at the sending and receiving ends of the system. Such rules and procedures are
called as Protocols. Different types of protocols are used for different types of communication.

4
In above diagrams Protocols are shown as set of rules. Such that Communication between
Sender and Receiver is not possible without Protocol. Therefore protocol is must important in
data communication in computer network.

Key Elements of Protocol

Key Elements of Protocol

1. Syntax: Syntax basically represents the format of the data means in which order data is
presented. It also indicates how to read the data. It simply means the way to represent
data. For Example, let us suppose a data packet has 16 bits, in which the first 4 bits are
the sender’s address, the last 4 bits are the receiver’s address and the rest is the message.
So, this is a syntax to represent data bits.

2. Semantics: Semantics basically refers to the meaning of each section mentioned in


syntax. It includes control information for coordination and error handling. It also
specifies which file defines which action.

3. Timing: Timing simply means when the data is to be sent and how fast the data can be
sent. For Example, if the Sender sends the data at 100 MBPS and the receiver receives it
at 1 MBPS, then the data gets overflowed at the receiver end.

Functions of Protocol

 Establishment of Connection: There are two ways of data transfer, Connectionless or


Connection-Oriented. Basically, services acquired by protocols are Connection-Oriented
Services. It also helps during the transfer of large volumes of data.

5
 Encapsulation: A protocol describes how the data is encapsulated in packets. It is basically
the process of distribution of one protocol to other.

 Data Transfer Management: It is simply the management of the flow of data to provide
sequencing and matching.

 Segmentation and Reassembly: Segmentation is the process of breaking data into smaller
blocks and adding some extra information for peer use and Reassembly means when the
upper-level protocol combines to get actual data when we remove control information sent
by the sender.

 Error Control: Error Control is simply the loss of data or sometimes damage in data upon
transmission in data. It is implemented in two ways
 Error Detection
 Retransmission of Data

 Flow Control: The process of controlling the flow of data to limit the rate of data sent by
transmitting frame. Techniques used for this method are stop and wait, etc. It is used to
basically control the problems like data loss, data overloading, etc.

 Multiplexing / Demultiplexing: Multiplexing is a technique generally used in the context of


Addressing. It is basically of two types:
 Upward Multiplexing
 Downward Multiplexing

 Addressing: Addressing is used during communication by defining addresses. The concept


of Addressing is complex and includes addressing levels and addressing scope.

Advantages of Internet Protocol

1. Connectivity – Internet Protocol enables devices to communicate with each other across
the world. This means that people from different parts of the world can share information
and work together seamlessly.

2. Scalability – Internet Protocol is designed to handle a large number of devices and


networks. This means that as the number of devices and networks on the Internet grows,
Internet Protocol can easily accommodate them.

3. Flexibility – Internet Protocol is a flexible protocol that allows for the creation of
customized networks. This means that organizations can create their own private networks
and control who has access to them.

6
4. Reliability – Internet Protocol is a reliable protocol that ensures that data is transmitted
accurately and efficiently. It also includes features that allow for the detection and
correction of errors in data transmission.

5. Security – Internet Protocol includes features that enable secure transmission of data
across networks. These features include encryption, which ensures that data cannot be read
by unauthorized parties.

Disadvantages of Internet Protocol

1. Security risks – Internet Protocol is vulnerable to attacks such as hacking, phishing, and
denial of service, which can result in data breaches, loss of personal information, and
financial losses.

2. Dependence on connectivity – Internet Protocol relies heavily on network connectivity,


and any disruptions in the network can result in communication and connectivity issues,
rendering it unusable.

3. Limited scalability – Internet Protocol has limitations in the number of devices it can
connect, and as the number of devices increases, the IP addresses may run out, resulting in
connectivity issues.
4. Lack of privacy – Internet Protocol does not provide complete privacy and anonymity.
Your data is transmitted in packets that can be intercepted, traced, and monitored by
unauthorized entities, which can compromise your privacy.

5. Technical complexity – Internet Protocol requires specialized knowledge and expertise to


set up and maintain, making it challenging for people with limited technical knowledge to
use and understand.

Types of Network Protocols

Some of the types of Network protocols:

Transmission Control Protocol (TCP)

TCP is a foundational protocol that operates at the transport layer of the OSI model. It guarantees
the reliable and ordered delivery of data packets between devices. TCP is widely used for
applications that require accurate and error-free data transfer, such as web browsing, email, file
transfer, and remote access. TCP is one of the basic standards that define the rules of the internet
7
and is included within the standards defined by the Internet Engineering Task Force (IETF). It is
one of the most commonly used protocols within digital network communications and ensures
end-to-end data delivery. TCP organizes data so that it can be transmitted between a server and a
client. It guarantees the integrity of the data being communicated over a network. Before it
transmits data, TCP establishes a connection between a source and its destination, which it ensures
remains live until communication begins. It then breaks large amounts of data into smaller packets,
while ensuring data integrity is in place throughout the process.

Working of Transmission Control Protocol (TCP)/IP

The TCP/IP model is the default method of data communication on the Internet. It was developed
by the United States Department of Defense to enable the accurate and correct transmission of data
between devices. It breaks messages into packets to avoid having to resend the entire message in
case it encounters a problem during transmission. Packets are automatically reassembled once they
reach their destination. Every packet can take a different route between the source and the
destination computer, depending on whether the original route used becomes congested or
unavailable.

TCP/IP divides communication tasks into layers that keep the process standardized, without
hardware and software providers doing the management themselves. The data packets must pass
through four layers before they are received by the destination device, then TCP/IP goes through
the layers in reverse order to put the message back into its original format.

As a connection based protocol, the TCP establishes and maintains a connection between
applications or devices until they finish exchanging data. It determines how the original message
should be broken into packets, numbers and reassembles the packets, and sends them on to other
devices on the network, such as routers, security gateways, and switches, then on to their
destination. TCP also sends and receives packets from the network layer, handles the transmission
of any dropped packets, manages flow control, and ensures all packets reach their destination.

A good example of how this works in practice is when an email is sent using SMTP from an email
server. To start the process, the TCP layer in the server divides the message into packets, numbers
them, and forwards them to the IP layer, which then transports each packet to the destination email
server. When packets arrive, they are handed back to the TCP layer to be reassembled into the
original message format and handed back to the email server, which delivers the message to a
user’s email inbox.

TCP/IP uses a three-way handshake to establish a connection between a device and a server, which
ensures multiple TCP socket connections can be transferred in both directions concurrently. Both
the device and server must synchronize and acknowledge packets before communication begins,
then they can negotiate, separate, and transfer TCP socket connections.

8
Following are the five layers of the TCP/IP model:

The advantages of TCP/IP protocol

 It is an industry–standard model that can be effectively deployed in practical networking


problems.
 It is interoperable, i.e., it allows cross-platform communications among heterogeneous
networks.
 It is an open protocol suite. It is not owned by any particular institute and so can be used by
any individual or organization.
 It is a scalable, client-server architecture. This allows networks to be added without
disrupting the current services.
 It assigns an IP address to each computer on the network, thus making each device to be
identifiable over the network. It assigns each site a domain name. It provides name and
address resolution services.

The disadvantages of TCP/IP protocol

 It is not generic in nature. So, it fails to represent any protocol stack other than the TCP/IP
suite. For example, it cannot describe the Bluetooth connection.
 It does not clearly separate the concepts of services, interfaces, and protocols. So, it is not
suitable to describe new technologies in new networks.
 It does not distinguish between the data link and the physical layers, which has very
different functionalities. The data link layer should concern with the transmission of
frames. On the other hand, the physical layer should lay down the physical characteristics
of transmission. A proper model should segregate the two layers.
 It was originally designed and implemented for wide area networks. It is not optimized for
small networks like LAN (local area network) and PAN (personal area network).
9
2. Hypertext Transfer Protocol (HTTP)

HTTP is a protocol used for transferring web pages and other resources on the World Wide Web.
It operates at the application layer and defines how browsers and web servers communicate.
HTTPS, a secure version of HTTP, incorporates encryption to protect data integrity and user
privacy.

HTTP is a protocol for fetching resources such as HTML documents. It is the foundation of any
data exchange on the Web and it is a client-server protocol, which means requests are initiated by
the recipient, usually the Web browser. A complete document is reconstructed from the different
sub-documents fetched, for instance, text, layout description, images, videos, scripts, and more.

Clients and servers communicate by exchanging individual messages (as opposed to a stream of
data). The messages sent by the client, usually a Web browser, are called requests and the
messages sent by the server as an answer are called responses.

Designed in the early 1990s, HTTP is an extensible protocol which has evolved over time. It is an
application layer protocol that is sent over TCP, or over a TLS-encrypted TCP connection, though
any reliable transport protocol could theoretically be used. Due to its extensibility, it is used to not
only fetch hypertext documents, but also images and videos or to post content to servers, like with

10
HTML form results. HTTP can also be used to fetch parts of documents to update Web pages on
demand.

Working of HTTP

HTTP works entirely through HTTP messages. There are two types of HTTP messages:

 Request: These are messages sent by the client to the server to trigger an action
 Response: These are messages sent by the server to the client in response to the request
message

We can see that exchanging these messages in a request/response cycle enables data exchange
between a client and server.

Figure 2 below illustrates the outline of a typical HTTP message. It's divided into three fields: start
line, headers, and body. However, keep in mind that the request and response messages have a few
key differences in the content that go into each of these fields that will be discussed in their
respective sections.

11
Figure 2: A typical HTTP message

HTTP request messages

Figure 3 depicts the structure of a typical HTTP request message and the data it contains in its
fields.

Figure 3: An HTTP request message

Start line

As shown in Figure 3, the start line for the request messages contains the following:
HTTP method
The HTTP method is a command that tells the server what type of request the client is making.

There are multiple methods, namely the following:

 GET
 POST
 PUT
 PATCH
 DELETE

Request target

The request target, which is most often a URL, contains the location of the resource
corresponding to the request message. For example, the request-target in a GET message would
include the URL for a file the client wants from the server.

12
HTTP response messages don't contain a request-target as they already contain the client's
requested resource.

Advantages of HTTP

1. Addressing

HTTP uses advanced scheme of addressing. It assigns IP address with recognizable names so that
it can be identified easily in the World Wide Web. Compared to the standard procedure of IP
address with a series of numbers, using this the public can easily engage with the internet.

2. Flexibility

Whenever there are additional capabilities needed by an application, HTTP has the capability to
download extensions or plugins and display the relevant data. These can include Flash players and
Acrobat reader.

3. Security

In HTTP each files is downloaded from an independent connection and then gets closed. Due to
this no more than one single element of a webpage gets transferred. Therefore, the chance of
interception during transmission is minimized here.

4. Latency

Only when the connection is established, the handshaking process will take place in HTTP. Hence,
there will be no handshaking procedure following a request. This significantly reduces latency in
the connection.

5. Accessibility

When the page is loaded for the first time, all of the HTTP pages gets stored inside the internet
caches known as the page cache. Therefore, once the page is visited again, the content is loaded
quickly.

Disadvantages of HTTP

1. Data Integrity

Since there are no any encryption methods used in HTTP, there are chances of someone altering
the content. That is the reason why HTTP is considered to be an insecure method prone to data
integrity.
13
2. Data Privacy

Privacy is another problem faced in a HTTP connection. If any hacker manages to intercept the
request they can view all the content present in the web page. Besides that they can also gather
confidential informations such as the username and the password.

3. Server Availability

Even if HTTP receives all the data that it needs, clients does not take measures to close the
connection. Therefore, during this time period, server will not be present.

4. Administrative Overhead

For transmitting a web page, a HTTP needs to create multiple connections. This causes
administrative overhead in the connection.

5. IOT Device Support

HTTP uses more number of system resources which leads to more power consumption. Since IoT
device today contain wireless sensor networks, it is not suitable to use HTTP.

4. File Transfer Protocol (FTP)

The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer
of computer files from a server to a client on a computer network. FTP is built on a client–server
model architecture using separate control and data connections between the client and the server.
FTP users may authenticate themselves with a plain-text sign-in protocol, normally in the form of
a username and password, but can connect anonymously if the server is configured to allow it. For
secure transmission that protects the username and password, and encrypts the content, FTP is
often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).
The first FTP client applications were command-line programs developed before operating
systems had graphical user interfaces, and are still shipped with most Windows, Unix,
and Linux operating systems. Many dedicated FTP clients and automation utilities have since been
developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated
into productivity applications such as HTML editors and file managers.
An FTP client used to be commonly integrated in web browsers, where file servers are browsed
with the URI prefix " ftp: // ". In 2021, FTP support was dropped by Google Chrome and Firefox.

Working of FTP protocol

14
FTP may run in active or passive mode, which determines how the data connection is established.
(This sense of "mode" is different from that of the MODE command in the FTP protocol.)

 In active mode, the client starts listening for incoming data connections from the server on port
M. It sends the FTP command PORT M to inform the server on which port it is listening. The
server then initiates a data channel to the client from its port 20, the FTP server data port.
 In situations where the client is behind a firewall and unable to accept incoming TCP
connections, passive mode may be used. In this mode, the client uses the control connection to
send a PASV command to the server and then receives a server IP address and server port
number from the server which the client then uses to open a data connection from an arbitrary
client port to the server IP address and server port number received.

Both modes were updated in September 1998 to support IPv6. Further changes were introduced to
the passive mode at that time, updating it to extended passive mode.
The server responds over the control connection with three-digit status codes in ASCII with an
optional text message. For example, "200" (or "200 OK") means that the last command was
successful. The numbers represent the code for the response and the optional text represents a
human-readable explanation or request (e.g. <Need account for storing file>).An ongoing transfer
of file data over the data connection can be aborted using an interrupt message sent over the
control connection.
FTP needs two ports (one for sending and one for receiving) because it was originally designed to
operate on top of Network Control Protocol (NCP), which was a simplex protocol that utilized
two port addresses, establishing two connections, for two-way communications. An odd and an
even port were reserved for each application layer application or protocol. The standardization of
TCP and UDP reduced the need for the use of two simplex ports for each application down to one
duplex port, but the FTP protocol was never altered to only use one port, and continued using two
for backwards compatibility.

Advantages of FTP protocol

15
1. FTP is Capable of Large File Transfers

For many companies, your file transfer needs go beyond sending a single Microsoft Word
document at a time. You might need to send hundreds of gigabytes of data all at once. FTP
easily facilitates those large transfers, and you benefit from an increased rate of file transfers,
as well.

2. Your Workflow is improved

Using FTP allows you to transfer multiple directories at one time. If you regularly transfer
files, you know how advantageous this feature can be. Instead of sending single files or even
single directories at a time, you can send numerous directories all at once. You’re able to
continue working while transfers are completed, and you can conduct these transfers faster.

3. Transfers can be resumed

If your file transfer is interrupted, you don’t have to worry about losing progress. With FTP,
you can resume an interrupted file transfer if your connection is lost. Pick up where you left
off without restarting the transfer from the beginning.

4. Transfers can be scheduled

Are you tired of interrupting your workday to transfer a large amount of data? Maybe you
don’t have time to sit and wait as these transfers take place. With top FTP solutions, you can
schedule transfers for times with minimal impact to your workflow, like overnight or on the
weekend. Your productivity isn’t impacted, and these transfers are automated for your
convenience.

5. Recover lost data

Top FTP providers make sure that data is never lost, even when unexpected events happen.
With disaster recovery, your files are regularly and automatically backed up, so if there’s a
flood, fire, or power outage, you don’t have to worry about losing data.

Disadvantages of FTP protocol

1. FTP Lacks Security

FTP is inherently a non-secure way to transfer data. When a file is sent using this protocol, the
data, username, and password are all shared in plain text, which means a hacker can access this
information with little to no effort. For data to be secure, you need to use an upgraded version
of FTP like FTPS or SFTP.

16
2. Not All Vendors Are Created Equal

To solve the problem of security vulnerabilities, businesses turn to hosted FTP


solutions managed by vendors. Unfortunately, not all vendors stand up to the test of needed
security, making it a challenge to choose the right one. Each competitor offers their own set of
features, and many lack the features you actually need like access controls, security, usability,
pricing options, etc.

3. Encryption isn’t a given

While you can find a vendor that offers data encryption, there are many who fall short. FTP
alone doesn’t provide any encryption, which is why transferred data is so easy to intercept.
And, when you’re looking for a FTP provider, you’ll notice that encryption isn’t always
offered or enforced. For businesses using sensitive data like card payment data or ePHI
(electronic protected health information), encryption isn’t just nice to have for your FTP
solution – it’s essential.

4. Compliance is an Issue

You should also be concerned with compliance when using FTP to send files. FTP on its own
or using a FTP vendor with inadequate security could leave your business at risk of
noncompliance fines. If compliance regulations like HIPAA, ITAR, PCI-DSS, SOX, or
GLBA apply to your company, you might struggle to find an FTP solution that helps you stay
compliant. A lack of encryption plays a big role in noncompliance and its imperative you find
a solution that meets your compliance needs.

5. It’s Difficult to Monitor Activity

Before you partner with an FTP vendor, you need to think about reporting requirements for
your company. With many FTP solutions, you’ll face an inability to track or inconsistency in
tracking what has been uploaded on the remote system. So, if files are mishandled or a data
breach occurs, you may struggle to track the source of the problem. Numerous FTP options
lack the access controls needed to ensure your employees align with file sharing best practices.

4. Simple Mail Transfer Protocol (SMTP)

SMTP is a protocol for sending and receiving email. It enables the transfer of email messages from
a client to a server or between servers. SMTP is essential for email communication, ensuring that
messages are delivered reliably and in the correct format.

17
SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving email.
SMTP is used most commonly by email clients, including Gmail, Outlook, Apple Mail and Yahoo
Mail.

SMTP can send and receive email, but email clients typically use a program with SMTP for
sending email. Because SMTP is limited in its ability to queue messages at the receiving end, it's
usually used with either Post Office Protocol 3 (POP3) or Internet Message Access Protocol
(IMAP), which lets the user save messages in a server mailbox and download them periodically
from a server. SMTP is typically limited to and relied on to send messages from a sender to a
recipient.

Working of SMTP

An SMTP session begins when the client opens a Transmission Control Protocol connection (TCP
connection, sometimes called TCP/IP) to the SMTP server. The server responds with an opening
message, expressed with code 250. This process is often called an SMTP handshake.

The client then sends a HELO command (EHLO for ESMTP) and identifies itself. It often follows
up the command with the domain name or IP address. In non-technical words, the client says,
“Hello, my name is John the Client, I’m sending an email from gmail.com, and my IP is
192.0.2.0”. The server will respond with code 250 again.

18
After that, the email transfer stage will begin. Email contents will be transferred step-by-step with
MAIL FROM ([email protected]), RCPT TO ([email protected]), and DATA (‘Hey, how have
you been?’) commands. If the server accepts the transaction, the client will transfer email headers.
It’s necessary to use an end-of-line indicator (period ‘.’) once everything has been transmitted.

Types of SMTP

Originating SMTP:
Is the first system that interacts with the internet as it introduces mail.

Delivery SMTP:
Is the system that receives emails from the internet and delivers them to the recipients.
Relay SMTP:
Relays emails between SMTP servers or MTAs (more on transfer agent meaning below) without
modifying the message in any way.
Gateway SMTP:
Or SMTP gateway also transfers emails between different servers but, unlike SMTP relay, it’s
allowed to transform the message if needed. SMTP gateways are usually firewalls that rewrite
addresses or intermediary SMTP servers.

19
The server will respond with code 250 if the transaction is successful. The client will initiate the
termination of the SMTP connection with the QUIT command, and the server will close the
transmission channel with code 221.
This is, of course, a simplified example without an SMTP relay, forwarding, gateways, or error
codes. For more information on these, please refer to RFC 5321.

Advantages of SMTP

 It is not necessary to have an online connection:

Because the whole process is carried out from the email interface available on the
computer. However, at the moment of sending said emails, it is essential to have
Internet access. In general, what it avoids is to work with the messaging editor of the
email marketing software.

 It is possible to have statistics:

Statistics are essential to assess how good a job is being done when carrying out
email marketing campaigns, and with SMTP email there are none. However, when
linked to the Mailrelay software, you will be able to obtain interesting data to
20
advance in this important marketing task. You will be able to observe values such as
click-through rate and open rate.

 Synchronization with the CRM used is allowed:

This is a great advantage for very large companies that need to have an email system
connected to the CRM. Managing the configuration of the email system on each
computer can be very tedious, but with the link to the Mailrelay SMTP system it can
be done on all computers at once and be active at all the access points you want.

Disadvantages of SMTP

 Professional editing:

Specialized email marketing software, such as Mailrelay, has a very powerful email
editor that can be used by dragging and dropping to obtain a professional design. If
you do not work from your online account, you will not be able to enjoy this benefit.

 It is not secure:

Although it works with a multistep protocol to activate, the SMTP is easy to hack
and make fraudulent mailings that do not correspond to the values and objectives
pursued by our business. The worst thing is that they will have access to the complete
list of our business subscribers because the system was previously enabled.

 Limitations:

The number of emails that can be sent by hosting are generally more limited than the
large number offered by a good email marketing software, as is the case of Mailrelay.
Only in its free account, it supports up to 80 thousand emails available to send per
month, which is more than enough for any business.

5.0 Actual Resources used

Sr. Name of resource


Specifications Quantity
no. material

1 Computer System 16 GB RAM, Windows 10 OS 1

2 textbook/manual DCC (Data communication and computer 1

21
network) 22414

6.0 Skill Developed

1. Teamwork

2. Communication skills

3. Creativity.

4. Critical thinking skills.

5. Able to get all information about Light propert

22
ANNEXURE II
Evaluation Sheet for the Micro Project
Academic Year : 2023-24

Name of Faculty: Prof. Vyavahare R.R

Course: DCC Course Code: 22314 Semester: 4th

Title of the Project: Client Server Network Model

COs addressed by the Micro Project:

A: Analyze the functioning of data communication and computer network.


B:Configure various networking devices.
Major learning outcomes achieved by students by doing the Project:
(a)Practical outcomes:
1.Analyze the functioning of data communication and computer network.
2.Configure various networking devices.
(b)Unit outcomes in Cognitive domain:
2a. Analyze the functioning of data communication and computer network.
2b.Configure various networking devices.
Comments/Suggestion about team work/leadership/inter-personal communication (if any)

Marks out of 6 for Marks out of 4 for


performance in performance in oral/ Total
Sr.
Student Name presentation (D5 out of
No. group activity (D5
Col.9) 10
Col. 8)
1 GHUNGARDE RUTUJA S.
2 JADHAV PAYAL B.
3 KARLE NITA S.
4 SHAIKH SIMRAN N.

23
(Name & Signature of Faculty)

Prof. Vyavahare R.R

24

You might also like