0% found this document useful (0 votes)
26 views29 pages

DCC Final 3

This is DCC micro project
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views29 pages

DCC Final 3

This is DCC micro project
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

A Project Report

ON

Peer-to-Peer Network Connection


SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD
OF

DIPLOMA IN

COMPUTER ENGINEERING

SUBMITTED TO
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION,
MUMBAI

SUBMITTED BY

Name of Student : Roll Number:


Bhalerao Atharva Baburao 29
Sakure Omkar Govind 11

GUIDED BY: (Prof. Thorat S. K. )

DCC(22414) Page 1
SAMARTH POLYTECHNIC, BELHE

ACKNOWLEDGMENT

This project is done as a semester project, as a part course titled " Peer-
to-Peer Network Connection”

I am really thankful to our course the Principal Prof. Kapile A.S. and
the HOD Prof. Nawale S. K. Samarth Polytechnic, Belhe- for his invaluable
guidance and assistance, without which the accomplishment of the task
would have never been possible.

I also thanks Prof. Thorat S. K. Madam for giving this opportunity to


explore into the real world and realize the interrelation without which a
Project can never progress. In this present project I have chosen the topic-
“Peer-to-Peer Network Connection ”

I am also thankful to parents, friend and all staff of Computer


Engineering department, for providing us relevant information and
necessary clarifications, and great support.

All Group Members.


1. Bhalerao Atharva Baburao
2. Sakure Omkar Govind
ANEXURE II
Evaluation Sheet for Micro Project
Academic Year :- 2023-24 Name of Faculty: Prof Nawale Sir Computer engineering
Course Code: 22414 Semester:-4
Title of Project: Peer-to-Peer Network Connection
Cos addressed by the Micro Project

1. Bhalerao Atharva Baburao


2. Sakure Omkar Govind

Major Learning Outcomes achieved by students by doing the project>


a) Practical Outcomes………………………………………………………………………………………...
………………………………………………………………………………………………………………………..
b) Unit Outcomes in Cognitive
domain……………………………………………………………………
……………………………………………………………………………………………………………………….
c) Outcomes in Affective Domain……………………………………………………………………….
……………………………………………………………………………………………………………………….

Comments/suggestions about team work/leadership/inter-personal communication


(if any)

……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
…………….

Marks Out Marks Out of Total Out


of 6 for 4 for of 10
Roll Student Name Performance Performance
No in group in oral
activity (D5 presentation
Col.8) (D5 Col.9)
57 Bhalerao Atharva Baburao

58 Sakure Omkar Govind


Prof. Thorat S. K.

SAMARTH POLYTECHNIC, BELHE

CERTIFICATE

This is to certify that the project report entitled


Banking Application in Java
Was successfully completed by Student of fourth semester Diploma in
Computer engineering.

ALL STUDENTS NAME

1. Bhalerao Atharva Baburao


2. Sakure Omkar Govind
in partial fulfilment of the requirements for the award of the Diploma in
Computer engineering and submitted to the Department of Computer of
Samarth Polytechnic, Belhe work carried out during a period for the
academic year 2022-23 as per curriculum.

Prof. Thorat S. K. Prof. Nawale S. K. Prof. Kapile A. S.


(Subject Teacher) (H.O.D) (Principal)

o What is computer Network?


A computer network consists of 2 or additional computing devices that are connected
so as to share the elements of your network
(its resources) and also the data you store there, the foremost basic network (which
consists of just two connected computers) will expand and become additional usable
when extra computers be part of and add their resources to those being shared. The
first pc, yours, is usually spoken as your native pc. It is additional seemingly to be
used as a location wherever you are doing work, a digital computer, than as a storage
or dominant location, a server.
A computer network is a set of interconnected computers and other devices that are
able to communicate with each other. These interconnected devices can share
resources, such as files and printers, and can communicate through various means,
including wired and wireless connections. The primary purpose of a computer
network is to facilitate the exchange of information and resources among the
connected devices.
Key components of a computer network include:
1. Nodes: These are the devices connected to the network, such as
computers, servers, routers, switches, and other devices capable of sending or
receiving data.
2. Links: These are the communication channels that connect the nodes in
a network. Links can be wired, such as Ethernet cables or fiber optics, or
wireless, using technologies like Wi-Fi or Bluetooth.
3. Topology: The arrangement of nodes and links in a network is referred
to as its topology. Common topologies include bus, star, ring, mesh, and hybrid
configurations.
4. Protocols: Networks rely on communication protocols, which are sets of
rules that dictate how data is transmitted and received. Common network
protocols include TCP/IP (Transmission Control Protocol/Internet Protocol),
HTTP (Hypertext Transfer Protocol), and others.

5. Infrastructure: This includes the physical and software components that


enable network communication, such as routers, switches, access points, and
network cables.
Computer networks can be classified based on their size and geographical scope into
Local Area Networks (LANs), Wide Area Networks (WANs), and Metropolitan Area
Networks (MANs). The internet is a global example of a vast network connecting
millions of devices worldwide.
The benefits of computer networks include resource sharing, communication, and
collaboration, as well as improved efficiency and productivity. They are integral to
modern computing and play a crucial role in various aspects of our daily lives, from
accessing the internet to sharing files within a local office network.

As additional and additional computers are connected to a network and share their
resources, the network becomes a additional powerful tool, as a result of staff
employing a network with additional data and additional capability are able to
accomplish more through those another computers or extra resources. The real power
of networking computers becomes apparent if you envision your own network
growing then connecting it with alternative distinct networks, sanctioning
communication and resource sharing across each networks. That is, one network will
be connected to a different network and become additional powerful tool attributable
to the bigger resources
copyright : respected owner

o History of Computer Network:

In the late 1950s, early networks of computers included the U.S. military radar
system Semi-Automatic Ground Environment (SAGE).

• In 1959, Christopher Strachey filed a patent application for application

for time-sharing and John McCarthy initiated the first project to implement

time-sharing of user programs at MIT. Stratch passed the concept on to J. C. R.

Licklider at a UNESCO-sponsored conference on Information Processing in

Paris that year McCarthy was instrumental in the creation of three of the

earliest time-sharing systems

(Compatible Time-Sharing System in

1961, BBN Time-Sharing System in 1962,

and Dartmouth Time Sharing System in 1963).


• In 1959, Anatolii Ivanovich Kitov proposed to the Central Committee of
the Communist Party of the Soviet Union a detailed plan for the re-organisation
of the control of the Soviet armed forces and of the Soviet economy on the
basis of a network of computing centres, the

• to the Central Committee of the Communist Party of the Soviet Union a


detailed plan for the re-organisation of the control of the Soviet armed forces
and of the Soviet economy on the basis of a network of computing centres, the
OGAS.

• In 1959, the MOSFET (MOS transistor) was invented by transistor) was


invented by Mohamed Atalla Atalla and Dawon Kahng at Bell Labs


Requirements of network:

o Network interfaces
Repeaters and hubs
o
Bridges
o
Switches
o
Routers
o
Modems
o
o Firewalls

• Peer-to-Peer Networks:

A peer is considered an equal. All computers on a peer-to-peer network can be


considered equals, That is to say,no one computer is in chargeof the network’s
operation. Each computer controls its own information and is capable of functioning
as either a client or a server depending on which is needed at the time .Peer-to-peer
networks are popular as home networks and for use in small companies because they
are inexpensive and easy to install.

Most operating systems (the software that runs the basic computer functionality)
come withpeer-to-peer networking capability built in. The only other cost involved
with setting up a peer-to-peer network comes into play if a computer does not have a
network interface card, or NIC (the device that physically connects your computer to
your network’s cabling), already installed.

Peer-to-peer (P2P) network connections refer to a type of network architecture where


devices (or peers) communicate directly with each other without the need for a central
server. In a peer-to-peer network, each device has equal status and can act both as a
client and a server. This is in contrast to client-server networks, where a central server
manages and coordinates communication between clients.

Here are some key characteristics and aspects of peer-to-peer network connections:
1. Decentralization: In P2P networks, there is no central server or authority that
controls communication. Each device is considered equal, and they can
communicate with one another without relying on a central point.

File Sharing: Peer-to-peer networks are commonly associated with file sharing.

Users can share files directly between their devices without the need for an
intermediary server. Examples of P2P file-sharing protocols include BitTorrent.

2. Resource Sharing: Beyond file sharing, P2P networks can be used for sharing

various resources, such as processing power, storage, or bandwidth. This can be


particularly useful for distributed computing applications.

3.
Collaboration: P2P networks facilitate collaboration among devices. For

example, in a P2P application, each device may contribute a portion of its


resources to perform a task collaboratively.
4.
Scalability: Peer-to-peer networks can be scalable because each device added

to the network contributes resources and can also benefit from the resources
provided by others. This can result in increased overall capacity and efficiency.
5.

6. Examples: Besides file sharing applications like BitTorrent, other examples


of
P2P networks include some messaging applications (where users can

communicate directly), collaborative platforms, and certain blockchain


networks.

7. Security Considerations: P2P networks may face unique security challenges,


such as the need to ensure the integrity and authenticity of data exchanged

between peers. Ensuring secure and private communication in a decentralized


environment is a key concern.

Challenges: P2P networks may face challenges related to reliability, as they

rely on the availability and cooperation of individual peers. Ensuring proper


coordination and resource management can be complex.
8.
It's important to note that while P2P networks have certain advantages, they may not

be suitable for all types of applications. The choice between a peer -to-peer and a

client-server architecture depends on the specific requirements and goals of the

networkor application.

Fig: Peer to peer network connection

 Client-Based Networks:
Client-based networks are a further refinement to the concept of a serverbasednetwork that
relieves the heavy burden on the network’s capacity resultingfrom frequent server-performed
transactions. A client-based networktakes better advantage of the server’s powerful
processors and of theincreasingly powerful computers used in typical workstations. A
clientbased network utilizes a client workstation’s power in processing somefunctions
locally while requesting additional processing from a serverwhenever it is needed for
increased speed.

Client-based network servers process requests from clients and returnjust the results, rather
than sending the original resource to the client to beprocessed and returned after
computations are complete. Client-based networks,therefore, take advantage of the powerful
processing capabilities ofboth the client and the server, This type of arrangementmay
include application servers (where entire computer programs areshared from the server) and
communications servers.

Client-based network connections refer to a network architecture where devices, called


clients, interact with a central server to request and receive services. This is in contrast to
peer-to-peer networks, where devices communicate directly with each other without a
central server. In client-server architecture, the server plays a central role in managing
resources, services, and communication.

Here are key aspects of client-based network connections:

1. Client Role: Clients are devices or applications that request services or


resources from a central server. Clients can be computers, smartphones, or any device
capable of connecting to a network.

2. Server Role: The server is a centralized system responsible for providing


services, managing resources, and responding to client requests. It acts as a central
point of control and coordination.
3. Communication Model: Communication in client-based networks typically
follows a request-response model. Clients initiate requests, and servers respond by
providing the requested information, processing tasks, or delivering services.

4. Resource Management: Servers in client-based networks manage and


distribute resources. These resources can include files, applications, databases, and
more. Clients depend on servers for access to these resources.

5. Scalability: Scalability in client-server networks often involves increasing the


capacity of the central server to handle a growing number of client requests. This can
be achieved by upgrading server hardware or deploying multiple servers to distribute
the load.

6. Examples: Many common networked applications follow a client-server


model. Examples include web browsing (where the browser is the client and web
servers provide web pages), email (with email clients connecting to email servers),
and online gaming (where game clients connect to game servers).

7. Security Considerations: Security measures in client-based networks often


focus on securing the central server, as it is a critical point of control.

Encryption, authentication, and access control mechanisms are commonly


implemented to protect data and ensure authorized access.

8. Centralized Control: The centralized nature of client-server architecture


provides a clear hierarchy of control. This can simplify management, updates, and
maintenance tasks, as changes can be implemented centrally.

9. Reliability: Client-server architectures can be designed to be highly reliable,


with redundant servers and backup systems in place to ensure continuous service
availability.
Client-server architectures are widely used in various domains due to their structured and
controlled nature. However, they may face challenges such as potential bottlenecks at the
central server and increased complexity in managing the overall system. The choice between
peer-to-peer and client-server architectures depends on the specific requirements of the
application or network.

Fig: Client Server Network Connection

 Topology used for peer to peer network connection

Mesh topology:

A network setup wherever every laptop and network device is interconnected with each
other, permitting most transmissions to be distributed even though one in every of the
connections go down. it's a topology usually used for wireless networks. Below could be a
visual example of an easy laptop setup on a network employing a topology.

Mesh topology is a type of network topology in which each device (node) is connected to
every other device in the network. In a mesh network, the devices are interconnected, and
there is redundancy in the connections, which means that if one path fails, there are
alternative paths for data to reach its destination. Mesh topology can be categorized into two
main types: full mesh and partial mesh.

Advantages of Mesh topology

• Manages high amounts of traffic, as a result of multiple devices will transmit knowledge at
the same time.

• A failure of 1 device doesn't cause an occasion within the network

• The price to implement is beyond alternative network topologies, creating it a less


fascinating choice.

• Building and maintaining the topology is troublesome and time overwhelming.

• The likelihood of redundant connections is high, that adds to the high prices and potential
for reduced potency.

Redundancy and Reliability:

• Multiple Paths: Mesh topology provides multiple communication paths


between nodes. If one link or node fails, there are alternative paths available, ensuring
continuous connectivity.

• High Reliability: The redundancy in connections enhances the reliability of the


network. Even if a link or node experiences a failure, the network remains operational.

Fault Tolerance:
• Isolation of Failures: Since each node has multiple connections, the failure of
a single link or node does not necessarily disrupt the entire network. Failures are
isolated, and communication can continue through alternative paths.

Scalability:

• Ease of Expansion: Mesh networks are easily scalable. New nodes can be
added without affecting the overall structure, and they can connect to existing nodes to
create additional communication paths.

High Performance:

• Parallel Communication: Mesh topology allows for parallel communication


between nodes. Multiple nodes can transmit or receive data simultaneously, leading to
high-performance capabilities.

Security:

• Enhanced Security: The decentralized nature of mesh topology can enhance


security. Unauthorized access to the entire network is more challenging, as an intruder
would need to compromise multiple nodes to gain significant control.

Flexibility:

• Adaptability: Mesh networks are flexible and adaptable. Changes in the


network, such as adding or removing nodes, can be implemented without affecting the
overall structure.

Self-Healing:

• Automatic Rerouting: In the event of a link or node failure, mesh networks


can automatically reroute traffic through alternative paths, making them selfhealing.
Distributed Processing:

• Distributed Control: Control and processing capabilities are distributed across


the network. This can lead to efficient load distribution and improved overall network
performance.

Applications in Critical Systems:

• Military and Industrial Systems: Mesh topology is often used in critical


systems, such as military communications and industrial control systems, where
reliability and fault tolerance are paramount.

Wireless Mesh Networks:

• Self-Organizing Wireless Networks: In wireless mesh networks, nodes


communicate wirelessly, creating a self-organizing system with improved coverage
and flexibility.

Disadvantages of a network topology

• The price to implement is beyond alternative network topologies, creating it a less


fascinating choice.

• Building and maintaining the topology is troublesome and time overwhelming.

• The likelihood of redundant connections is high, that adds to the high prices and potential
for reduced potency.

Bus Topology:
• Single Point of Failure: The central bus or backbone is a single point of
failure. If the main cable fails, the entire network may go down.

• Limited Scalability: As the number of devices increases, the efficiency of the


network can decrease.

Star Topology:

• Dependency on Central Hub: The entire network depends on the central hub.
If the hub fails, the connected devices lose connectivity.

• Limited Scalability: Expanding the network may require additional cabling


and ports on the central hub.

Ring Topology:

• Single Point of Failure: If one node or connection in the ring fails, it can
disrupt the entire network.

• Limited Scalability: Adding or removing nodes can be challenging without


disrupting the entire network.

Mesh Topology:

• High Cost: The implementation of mesh topology can be expensive due to the
numerous cables and connections required.

• Complexity: Configuring and managing a mesh network can be complex,


especially as the number of nodes increases.

Tree Topology:
• Dependency on Root Node: The network is dependent on the root node. If the
root node fails, the entire branch of the network connected to it may become
inaccessible.

• Limited Scalability: Expanding the network beyond the initial design may
require additional planning and management.

Hybrid Topology:

• Complexity: Combining different topologies introduces complexity in design,


implementation, and maintenance.

• Cost: Depending on the types of topologies used, a hybrid network can be


expensive to set up and manage.

Wireless Mesh Topology:

• Interference: Wireless mesh networks can be susceptible to interference from


other electronic devices or physical obstacles.

• Bandwidth Limitations: The available bandwidth may be shared among


multiple nodes, potentially leading to reduced performance.

Point-to-Point Topology:

• Limited Connectivity: Each device is connected directly to only one other


device, limiting overall connectivity.

• Scalability Challenges: Scaling the network may involve complex


restructuring and additional point-to-point connections.
Steps to install peer to peer network setup:

Step 1: Navigate to the Desktop

Step 2: Create Your Folder


Step 3: Navigate to the Folder and Open the Properties

Step 4: Choose Who You Want to Share With.

Step 5: Sharing the Folder


Step 6: Permissions
Step 7: Open Control Panel

Step 8: Network and Sharing

Step 9: Advanced Sharing


Step 10: Choose Home and Work / Public
Step 11: Select All Options

Step 12: Go Into Network


Step 13: Find the Device

Step 14: Find the Folder That Was Shared


o Advantages :
The main advantage of a peer-to-peer network is that it’s easier to line up and use than a
network with a fervent server. Peer-to-peer networks have faith in the restricted network
server options that square measure designed into Windows, like the flexibility to share files
and printers. Recent versions of Windows, as well as Windows seven, Vista, and Windows
XP, embrace wizards that mechanically assemble a basic network for you so you don’t have
to be compelled to manually assemble any network settings. Another advantage of peer-to-
peer networks is that they'll be more cost-effective than server-based networks. Here square
measure a number of the explanations that peer-to-peer networks square measure
inexpensive:
• Peer-to-peer networks don’t need you to use a fervent server pc. Any pc on the
network will perform as each a network server and a user’s digital computer. (However,
you'll assemble a pc as a fervent server if you would like to. Doing therefore leads to higher
performance however negates the price good thing about not having a fervent server pc.)
• Peer-to-peer networks square measure easier to line up and use, which implies that you
just will pay less time determining a way to build the network work and keep it operating.
• You should contemplate the price of the server software itself. Windows Server will
value the maximum amount as $200 per user. and therefore the total value will increase as
your network grows, though the price per user drops. For a peer-to-peer
Windows server, you get Windows once. You don’t pay any further charges supported the
amount of users on your network.
Drawbacks:
Yes, peer-to-peer networks square measure easier to put in and manage than domain-based
networks, however they are doing have their drawbacks: Because peer-to-peer networks
square measure supported computers running shopper versions of
Windows, they’re subject to the inherent limitations of these Windows versions. shopper
versions of Windows square measure designed primarily to be associate degree package for a
single-user microcomputer instead of to operate as a part of a network. These versions can’t
manage a file or printer server as with efficiency as a true network package. If you don’t
came upon a fanatical network server, somebody (hopefully, not you) could have to be
compelled to abide the inconvenience of sharing his or her laptop with the network. With
Windows Server, the server computers square measure dedicated to network use in order that
nobody has got to place up with this inconvenience. Although a peer-to-peer network could
have a lower value per laptop for smaller networks, the price distinction between peer-to-
peer networks and Windows Server is a smaller amount vital in larger networks (say, 10 or a
lot of clients).
• Conclusion:
In this project we learn about installation of peer to peer network with client server
architecture. In this project we install setup of peer to peer network step by step. All
computers on a peer-to-peer network can be considered equals, That is to say no one
computer is in charge of the network’s operation. Client-based networks are a further
refinement to the concept of a server based network that relieves the heavy burden on the
network’s capacity resulting from frequent server-performed transactions.

• Reference:
https://chat.openai.com/ https://www.msbtemicroproject.tech/
https://en.m.wikipedia.org/wiki/Main_Page
https://chromewebstore.google.com/
Book – Data communication and Computer networks

You might also like