DCC Final 3
DCC Final 3
ON
DIPLOMA IN
COMPUTER ENGINEERING
SUBMITTED TO
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION,
MUMBAI
SUBMITTED BY
DCC(22414) Page 1
SAMARTH POLYTECHNIC, BELHE
ACKNOWLEDGMENT
This project is done as a semester project, as a part course titled " Peer-
to-Peer Network Connection”
I am really thankful to our course the Principal Prof. Kapile A.S. and
the HOD Prof. Nawale S. K. Samarth Polytechnic, Belhe- for his invaluable
guidance and assistance, without which the accomplishment of the task
would have never been possible.
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
…………….
CERTIFICATE
As additional and additional computers are connected to a network and share their
resources, the network becomes a additional powerful tool, as a result of staff
employing a network with additional data and additional capability are able to
accomplish more through those another computers or extra resources. The real power
of networking computers becomes apparent if you envision your own network
growing then connecting it with alternative distinct networks, sanctioning
communication and resource sharing across each networks. That is, one network will
be connected to a different network and become additional powerful tool attributable
to the bigger resources
copyright : respected owner
In the late 1950s, early networks of computers included the U.S. military radar
system Semi-Automatic Ground Environment (SAGE).
for time-sharing and John McCarthy initiated the first project to implement
Paris that year McCarthy was instrumental in the creation of three of the
Requirements of network:
o Network interfaces
Repeaters and hubs
o
Bridges
o
Switches
o
Routers
o
Modems
o
o Firewalls
• Peer-to-Peer Networks:
Most operating systems (the software that runs the basic computer functionality)
come withpeer-to-peer networking capability built in. The only other cost involved
with setting up a peer-to-peer network comes into play if a computer does not have a
network interface card, or NIC (the device that physically connects your computer to
your network’s cabling), already installed.
Here are some key characteristics and aspects of peer-to-peer network connections:
1. Decentralization: In P2P networks, there is no central server or authority that
controls communication. Each device is considered equal, and they can
communicate with one another without relying on a central point.
File Sharing: Peer-to-peer networks are commonly associated with file sharing.
Users can share files directly between their devices without the need for an
intermediary server. Examples of P2P file-sharing protocols include BitTorrent.
2. Resource Sharing: Beyond file sharing, P2P networks can be used for sharing
3.
Collaboration: P2P networks facilitate collaboration among devices. For
to the network contributes resources and can also benefit from the resources
provided by others. This can result in increased overall capacity and efficiency.
5.
be suitable for all types of applications. The choice between a peer -to-peer and a
networkor application.
Client-Based Networks:
Client-based networks are a further refinement to the concept of a serverbasednetwork that
relieves the heavy burden on the network’s capacity resultingfrom frequent server-performed
transactions. A client-based networktakes better advantage of the server’s powerful
processors and of theincreasingly powerful computers used in typical workstations. A
clientbased network utilizes a client workstation’s power in processing somefunctions
locally while requesting additional processing from a serverwhenever it is needed for
increased speed.
Client-based network servers process requests from clients and returnjust the results, rather
than sending the original resource to the client to beprocessed and returned after
computations are complete. Client-based networks,therefore, take advantage of the powerful
processing capabilities ofboth the client and the server, This type of arrangementmay
include application servers (where entire computer programs areshared from the server) and
communications servers.
Mesh topology:
A network setup wherever every laptop and network device is interconnected with each
other, permitting most transmissions to be distributed even though one in every of the
connections go down. it's a topology usually used for wireless networks. Below could be a
visual example of an easy laptop setup on a network employing a topology.
Mesh topology is a type of network topology in which each device (node) is connected to
every other device in the network. In a mesh network, the devices are interconnected, and
there is redundancy in the connections, which means that if one path fails, there are
alternative paths for data to reach its destination. Mesh topology can be categorized into two
main types: full mesh and partial mesh.
• Manages high amounts of traffic, as a result of multiple devices will transmit knowledge at
the same time.
• The likelihood of redundant connections is high, that adds to the high prices and potential
for reduced potency.
Fault Tolerance:
• Isolation of Failures: Since each node has multiple connections, the failure of
a single link or node does not necessarily disrupt the entire network. Failures are
isolated, and communication can continue through alternative paths.
Scalability:
• Ease of Expansion: Mesh networks are easily scalable. New nodes can be
added without affecting the overall structure, and they can connect to existing nodes to
create additional communication paths.
High Performance:
Security:
Flexibility:
Self-Healing:
• The likelihood of redundant connections is high, that adds to the high prices and potential
for reduced potency.
Bus Topology:
• Single Point of Failure: The central bus or backbone is a single point of
failure. If the main cable fails, the entire network may go down.
Star Topology:
• Dependency on Central Hub: The entire network depends on the central hub.
If the hub fails, the connected devices lose connectivity.
Ring Topology:
• Single Point of Failure: If one node or connection in the ring fails, it can
disrupt the entire network.
Mesh Topology:
• High Cost: The implementation of mesh topology can be expensive due to the
numerous cables and connections required.
Tree Topology:
• Dependency on Root Node: The network is dependent on the root node. If the
root node fails, the entire branch of the network connected to it may become
inaccessible.
• Limited Scalability: Expanding the network beyond the initial design may
require additional planning and management.
Hybrid Topology:
Point-to-Point Topology:
• Reference:
https://chat.openai.com/ https://www.msbtemicroproject.tech/
https://en.m.wikipedia.org/wiki/Main_Page
https://chromewebstore.google.com/
Book – Data communication and Computer networks