IT Project Work


PROJECT WORK
OF
Adarsha Information Technology College
Biratnagar-9, Morang
2070












 








This project work is presented under the
Program of ANNEX
Of
Council for Technical Education and Vocational Training
For
Junior Computer Technician














 









Presented by:
Krishna Mohan Rajbanshi
Kanchan Tajpuriya
Sushil Shah
Pradip Karki
Bipin Mehta

Adarsha Information Technology College
Biratnagar-9









Table of Content


Introduction
Networking
Networks link from two to thousands of PCs together, enabling them to share files and resources. In addition, a network can centralize the management of a huge base of PCs, providing one location for coordinated security, backup, upgrades, and control. Networking now is so essential to regular PC operations that it is built into new operating systems and serves both in the home and office. [/block]

By themselves, PCs might never have usurped the role of the mainframe or other large computer systems. Big systems would hold an important business advantage: they are able to link all the workers at a facility. Because the mainframe holds the data (as well as all the computing power) in one centralized location, its storage is easily shared. All workers can have access to the same information and can even work together on projects, communicating with one another through the central computer.
The network provides connectivity that gives the entire web of PCs collective power far beyond that of the mainframe. Anywhere two or more PCs are present, the features and facilities added by a network can make using PCs easier, more accommodating, and more powerful.
Nearly every aspect of networking has spawned its own literature covered by dozens of books. This single chapter cannot hope to discuss all aspects of network technology. Consequently, we'll restrict ourselves to a practical approach. From a foundation of basic terminology and concepts, we'll work our way to wiring together a small office or home network and setting up the necessary software. In the end, you won't be an expert, but you will have a working network that you can use for exchanging files, sharing printers, and making backups.

Architecture
The biggest issue in building a network is getting everything to work with everything else—in other words, basic compatibility. By its very nature, a network embraces a more diverse array of species than Noah escorted into his ark. Besides different brands of PCs, networks have to have some provisions to accommodate printers, modems, CD ROM players; fax systems, computers, and workstations that follow their own standards; access to mainframes and remote data bases; cellular systems; and whatever else anyone might want to plug in. Although some of these devices might naturally communicate, other combinations turn cacophony into chaos. Not only are there enough differences in the hardware interfaces to keep you

Stripping and soldering cables until the next technology comes home, you need to translate command sets, data formats, and even character codes.
Layers
In 1984, the International Standards Organization laid out a blueprint to bring order to the nonsense of networking by publishing the Open Systems Interconnection Reference Model. The approach was much like that used for PC intercompatibility: layering. Just as a PC has a software layer (the operating system) and a firmware layer (the BIOS) to link your application software to your underlying hardware (the PC), the ISO built a network compatibility system from seven layers ranging from the connecting wire to software applications. These layers define functions and protocols that enable the wide variety of network hardware and software to work together. The standard was adopted worldwide, including in the United States and by major organizations such as IBM.
Physical
The first layer of the OSI Reference Model is the Physical layer, which defines the basic hardware of the network, which is the cable that conducts the flow of information between the devices linked by the network. This layer defines not only the type of wire (for example, coaxial cable or twisted pair wire) but the possible lengths and connections of the wire, the signals on the wire, and the interfaces of the cabling system. This is the level at which the device that connects a PC to the network (the network host adapter) is defined.
Data Link
Layer 2 in a network is called the Data Link layer. It defines how information gains access to the wiring system. The Data Link layer defines the basic protocol used in the local network. This is the method used for deciding which PC can send a message over the cable at any given time, the form of the messages, and the transmission method of those messages.


Network
Layer 3 in the OSI Reference Model is the Network layer, which defines how the network moves information from one device to another. This layer corresponds to the hardware interface function BIOS of an individual PC, because it provides a common software interface that hides differences in underlying hardware. Software

Of higher layers can run on any lower layer hardware because of the compatibility this layer affords. Protocols that enable the exchange of packets between different networks operate at this level.
Transport
Layer 4 is for the control of data movement across the network. This Transport layer defines how messages are handled, particularly how the network reacts to packets that become lost or other errors that may occur.
Session
Layer 5 of the OSI Reference Model defines the interaction between applications and hardware much as a PC BIOS provides function calls for programs. By using functions defined at this Session layer, programmers can create software that will operate on any of a wide variety of hardware. In other words, the Session layer provides the interface for applications and the network. Among PCs, the most common of these application interfaces is IBM's Network Basic Input/output System or NetBIOS.
Presentation
Layer 6, the Presentation layer, provides the file interface between network devices and the PC software. This layer defines the code and format conversions that must take place so that applications running under a PC operating system, such as DOS, OS/2 or Macintosh System 7, can understand files stored under the network's native format.
Application
Layer 7 is the part of the network that you deal with personally. This Application layer includes the basic services you expect from any network including the capability to deal with files, send messages to other network users through the mail system, and to control print jobs.
Practical Systems
Although the seven layers of the OSI may be useful to engineers designing network systems, they don't have any particular relevance when you're setting up a small network in your office or even home. Instead, you face four practical levels when configuring your network using network or operating system software. Under Windows 95, these levels include the adapter, protocol, service, and client software, as shown in Figure 1.1, the Windows 95 Select Network Component Type menu.


Text Box:




In this model, the network has four components: the client, the adapter, the protocol, and the service. Each has a distinct role to play in making the connection between PCs.
Adapter
Is the foundation of the physical layer of the network, translating the bus signals of your PC into a form that can skitter through the network wiring. The adapter determines the form and speed of the physical side of the network.
From the practical perspective, the network adapter is generally the part of the network that you must buy. You plug the network adapter into your PC to provide a port for plugging into the network wire.
Protocol
The protocol is the music of the packets, the lyric that controls the harmony of the data traffic through the network wiring. The protocol dictates not only the logical form of the packet—the arrangement of address, control information, and data among its bytes—but also the rules on how the network deals with the packets. The protocol determines how a packet gets where it is going, what happens when it doesn't, and how to recover when an error appears in the data as it crosses the network.
Support for the most popular and a useful protocol for small networks is included with today's operating systems. It takes the form of drivers you install to implement a particular networking system. Windows 95, for example, includes several.
Service
The service of the network is the work the packets perform. The services are often several and always useful. Network services include exchanging files between disk drives (or making a drive far away on the network appear to be local to any or every PC in the network. It can be the sharing of a printer resource so that all PCs

Have access to a centralized printer, or electronic mail passed from a centralized post office to individual machines.
Most networking software includes the more useful services as part of the basic package. Windows 95 includes file and printer sharing as its primary service. The basic operating system also includes e-mail support.
Client
To the network, the client is not you but where the operating system of your PC and the network come together. It's the software that brings you the network resources so that you can take advantage of the services.
Topologies
The topology of a network is the lay of the cables across the land. Most networks involve cables, lots of them, with at least one leading to every PC. Like the proverbial can of worms, they can crawl off in every direction and create chaos.
If PCs are to talk to one another, however, somehow the cables must come together so that signals can move from one PC to another. If network cables were ordinary wires, you might splice them together with the same abandon as making spaghetti, and the results might have a similar aesthetic.
Designers have developed several topologies for PC networks. Most can be reduced to one of three basic layouts: linear, ring, and star. The names describe how the cables run throughout an installation.
Linear
The network with linear cabling has a single backbone, one main cable that runs from one end of the system to the other. Along the way, PCs tap into this backbone to send and receive signals. The PCs link to the backbone with a single cable through which they both send and receive. In effect, the network backbone functions as a data bus, and this configuration is often called a bus topology. Figure 1.2 illustrates a simple network bus.




In the typical installation, a wire leads from the PC to the backbone, and a T-connector links the two. The network backbone has a definite beginning and end. In most cases, these ends are terminated with a resistor matching the characteristic impedance of the cable in the background. That is, a 61 ohm network cable will have
A 61 ohm termination at either end. These terminations prevent signals from reflecting from the ends of the cable, helping assure signal integrity.

Ring
The ring topology looks like a linear network that's biting its own tail. The backbone is a continuous loop, a ring, with no end. But the ring is not a single, continuous wire. Instead it is made of short segments daisy chained from one PC to the next, the last connected, in turn, to the first. Each PC thus has two connections. One wire connects a PC to the PC before it in the ring, and a second wire leads to the next PC in the ring. Signals must traverse through one PC to get to the next, and the signals typically are listened to and analyzed along the way.
Star
Both linear and ring topologies sprawl all over creation. The star topology shines a ray of light into tangled installations. Just as rays blast out from the core of a star, in the star topology connecting cables emanate from a centralized location called a hub, and each cable links a single PC into the network. A popular image for star topology is an old-fashioned wagon wheel—the network hub is the hub, the cables are the spokes, and the PCs are ignored in the analogy. Try visualizing them as clumps of mud clinging to the rim (which, depending on your particular network situation, may be an apt metaphor). If you can't, Figure 1.3 illustrates a simple star configuration of a network.






Hierarchies         
Topology describes only one physical aspect of a network. The connections between the various PCs in a network also can fit one of two logical hierarchies. The alternatives form a class system among PCs. Some networks treat all PCs the same;

Others elevate particular computers to a special, more important role. Although the network serves the same role in either case, these two hierarchical systems enforce a few differences in how the network is used.
Client-Server
Before PC networks, mainframe computers extended their power to individual desks through terminal connections. By necessity, these mainframe systems put all the computer power in one central location that served the needs of everyone using the system. There simply wasn't any other computer power in the system.
Most modern servers are designed to be fault-tolerant. That is, they will continue to run without interruption despite a fault, such as the failure of a hardware subsystem. Most servers also use the most powerful available microprocessors, not from need but because the price difference is tiny once the additional ruggedness and storage are factored in—and because most managers think that the single most important PC in a network should be the most powerful.
Peer-to-Peer
The client-server is a royalist system, particularly if you view a nation's leader as a servant of the people rather than a profiteer. The opposite is the true democracy in which every PC is equal. PCs share files and other resources (such as printers) among one another. They share equally, each as the peer of the others, so this scheme is called peer-to-peer networking.

Standards
A network is a collection of ideas, of hardware and software. The software comprises both the programs that make it work and the protocols that let everything work together. The hardware involves the network adapters, the wires, hubs, concentrators, routers, and even more exotic fauna. Getting it all to work together requires standardization.


Ethernet
The progenitor of all of today's networks was the Ethernet system originally developed in the 1970s at the Xerox Corporation's Palo Alto Research Center for linking its Alto workstations to laser printers. The invention of Ethernet is usually credited to Robert Metcalf, who later went on to found 3Com Corporation, an early major supplier of PC networking hardware and software. During its first years,

Ethernet was proprietary to Xerox, a technology without a purpose, in a world in which the PC had not yet been invented.
Token Ring
Another way to handle packets across a network is a concept called token passing. In this scheme, the token is a coded electronic signal used to control network access. IBM originated the most popular form of this protocol, which after further development, was sanctioned by the IEEE as its 802.5 standard. Because this standard requires a ring topology, it is commonly called Token Ring networking. Although once thought the most formidable competitor to Ethernet, it is now chiefly used only in large corporations. Other networking systems such as FDDI (see the "FDDI" section that follows) use a similar token passing protocol.
The original Token Ring specification called for operation at 4 MHz A revision to the standard allows for operation at 16 MHz The specification originally required the use of a special four-wire shield twisted pair cabling, but current standards enable several types of cabling, including unshielded twisted pair wires.
Asynchronous Transfer Mode
One of the darling technologies of new networking, Asynchronous Transfer Mode or ATM is fundamentally different from other networking systems. It is a switched technology rather than a shared bus. Instead of broadcasting down a wire, a sending PC sets up a requested path to the destination specifying various attributes of the connection, including its speed. The switch need not be physical. In fact, ATM is independent of the underlying physical wiring and works with almost any physical network architecture from twisted pair to fiber optical. Its performance depends on the underlying physical implementation, but its switched design assures the full bandwidth of the medium for the duration of each connection.
ATM is part of a network. By itself it does not make a network. Because of its high speed potential and versatility, it is becoming popular in large businesses where it neatly sandwiches between other network standards.


FDDI
Although many publications use the acronym FDDI to refer to any network using optical fibers as the transmission medium, it actually refers to an international networking standard sanctioned by the American National Standards Institute and the International Standards Organization. The initials stand for Fiber Distributed Data Interface. The standard is based on a dual counter rotating fiber optic ring topology operating with a 100 MHz data rate. The FDDI standard permits the connection of up

To a maximum of PCs or other nodes with a distance up to 2 to 3 kilometers between PCs and an entire spread up to 100 kilometers.
AppleTalk
Apple Computer developed its own networking scheme for its Macintosh computers. Called AppleTalk, the network is built around an Apple-developed hardware implementation that Apple called Local Talk. In operation, local Talk is similar to Ethernet in that it uses probabilistic access with Carrier Sensing, Multiple Access technology. Instead of after the fact collision detection, however, Local Talk uses collision avoidance. Originally designed for shielded twisted pair cable, many Local Talk networks use unshielded twisted pair telephone wiring. The Local Talk system is slow, however, with a communication speed of 230.4 KHz (that's about one quarter megahertz).
Arc net
Another token passing network system, Arc net, pre-dates IEEE 802.5 Token Ring. Arc net was developed in 1977 by Data point Corporation. In an Arc net system, each PC is assigned an eight-bit address from 1 to 255. The token is passed from one PC to the next in numerical order. Each PC codes the token signal with the value of the next address in the network, the network automatically configuring itself so that only active address numbers are used.
Zero-Slot LANs
When you need to connect only a few PCs and you don't care about speed, you have an alternative in several proprietary systems that are lumped together as Zero-Slot LANs. These earn their name from their capability to give you a network connection without requiring you to fill an expansion slot in your PC with a network host adapter. Instead of a host adapter, most Zero-Slot LANs use a port already built into most PCs, the serial port.


Cabling
One of the biggest problems faced by network system designers is keeping radiation and interference under control. All wires act as antenna, sending and receiving signals. As frequencies increase and wire lengths increase, the radiation increases. The pressure is on network designers to increase both the speed (with higher frequencies) and reach of networks (with longer cables) to keep up with the increasing demands of industry.


Figure 1.4 shows the construction of a typical coaxial cable.


The primary alternative is twisted pair wiring, which earns its name from being made of two identical insulated conducting wires that are twisted around one another in a loose double-helix. The most common form of twisted pair wiring lacks the shield of coaxial cable and is often denoted by the acronym UTP, which stands unshielded twisted pair. Figure 1.5 shows the construction of a typical twisted-pair cable.


Most UTP wiring is installed in the form of multi-pair cables with up to several hundred pairs inside a single plastic sheath. The most common varieties have 4 to 25 twisted pairs in a single cable. . The same type of wiring also corresponds to IBM's Type 3 cabling specification for Token Ring networking.







Table 1.6. Unshielded Twisted Pair Color Code.

Pair Number
Color Code
Pair Number
Color Code
1
White/Blue
16
Yellow/Blue
2
White/Orange
17
Yellow/Orange
3
White/Green
18
Yellow/Green
4
White/Brown
19
Yellow/Brown
5
White/Slate
20
Yellow/Slate
6
Red/Blue
21
Violet/Blue
7
Red/Orange
22
Violet/Orange
8
Red/Green
23
Violet/Green
9
Red/Brown
24
Violet/Brown
10
Red/Slate
25
Violet/Slate




11
Black/Blue


12
Black/Orange


13
Black/Green


14
Black/Brown


15
Black/Slate


Key: First color is the body of the wire, second color the stripes. The mate of the wire pair has the color scheme (body/stripe) reversed.




Linking the transceiver and the PC is another special cable called the Attached Unit Interface cable. The AUI cable can be up to 50 meters (164 feet) long. Under the IEEE 802.3 specification, you can connect up to 100 transceivers to a single 10 Base-5 backbone.
10 Base-5
Under the IEEE 802.3 specification, wiring for 10 Base-5 networks uses thick coaxial cable with a characteristic impedance of 50 ohms. The standard permits the bus to be up to 500 meters (1,640 feet) long with a 50 ohm terminating resistor at each end. The AUI cable can be up to 50 meters (164 feet) long. Under the IEEE 802.3 specification, you can connect up to 100 transceivers to a single 10 Base-5 backbone.

10Base-2mo
In the IEEE 802.3 scheme of things, 10 Base-2 is called thin wire or thin net. It uses a double shielded 50 ohm coaxial cable that's similar to but not identical with R G-58/U, another 50 ohm cable that's used for a variety of applications including Citizens' Band radio. Under the IEEE specification, the 10 Base-2 bus cable should not exceed a length of 185 meters (about 600 feet) but some host adapter manufacturers allow runs of up to 300 meters (about 1,000 feet). You can connect up to 30 transceivers to a single 10 Base-2 backbone.
10 Base-T
Because of its star topology, 10 Base-T networks use point to point wiring. Each network cable stretches from one point (a PC or other node) to another at the hub. The hub has a wiring jack for each network node; each PC host adapter has a single connector. Figure 1.7 shows the correct wiring for a hub to workstation 10 Base-T cable.



Patching between hubs may require crossover cables that link pins 1 to 3 and 2 to 6.
Setup
Certainly everyone doesn't have the need for a network. If you have only one PC, you have nothing to connect. If you have more than one PC, you probably would like to link them together, but you may be afraid of the work involved. You can meet all of those requirements with the networking that's built into Windows 95.
Preparation
The first step in installing any network is planning—deciding on exactly what you want to accomplish, then figuring out how to do it. Under Windows you'll also need a name for your workgroup—another chance to demonstrate your imagination or lack of same.
Host Adapters
The hardware for putting together a peer to peer 10 Base-T network comprises three parts—the network/host adapters in each PC, a hub, and the wire that links them

Together. You'll need one 10 Base-T network adapter for every PC you want to add to the network. Some network adapters allow for optional boot ROMs, which allow PCs to boot up using a remote disk drive, but this feature is more applicable to client-server rather than peer to peer networks.
Wiring
The twisted pair cabling for 10 Base-T has a few of its own requirements. The most important is that it must be truly twisted to properly minimize noise and interference. Ordinary modular telephone cables are inappropriate for 10 Base-T because these cables are flat and lack the needed twists.
Hubs
You'll need at least one hub for your network. A hub is simply a box with circuitry inside and a bunch of jacks for RJ-45 plugs on the back. The circuitry inside links the 10 Base-T cables together. Hubs are distinguished by the number of features they offer. But most of those features are designed to make the network administrator's job easier and are unnecessary in a small (say five or fewer PCs) peer to peer network. For such smaller systems, the minimal hub will be all you need.
Cable Installation
Once you've set a location for each PC and the hub, you can configure the wiring. You need run only one cable from each PC node to the hub.
How you run the wiring and what wire to use is another matter entirely. The easiest route is to strew about ready-made cables. Otherwise you'll need a special tool to crimp modular connectors on the cables.
Configuration
Once the wiring is in place, prepare the network adapter for each peer. Typically, a network adapter requires an interrupt and base address from your system resources. If you have a Plug-and-Play network adapter, Windows will recognize it when you install it inside your PC, automatically assigning resources. From the first screen, click on Add, and you'll see a menu like the one shown in Figure 1.8?

 


Select Adapter and click the Add button. Windows will then let you choose a manufacturer and model of network adapter to install. Select the board you've chosen or a suitable emulation, as shown in Figure 1.9.







Once you've selected an adapter, click OK. Windows will immediately swing into action and install all the drivers required not only by the host adapter but also all the services and protocols you'll need to get your network working.
When Windows finishes with this part of the installation, you'll see a revised Network sheet listing everything that the operating system has installed, as shown in Figure 1.10.










If Windows doesn't prompt you for the names you've decided to use for your network and node, select the Identification tab and enter the names.
The next step finally assigns resource values to your network host adapter. Highlight the host adapter and click on the Properties button. Windows will reply with a screen like that shown in Figure 1.11.



























On this screen, Windows will suggest the setting to use for your network host adapter's resources. You can choose alternate values to resolve conflicts or to suit the settings you prefer. Once you've finished, click OK. Click OK on the next screen, and Windows will tell you to reboot your system.
Enabling Sharing
Before you can begin thinking about setting up your network software for resource sharing, you must have a working network. Installing the network hardware is only the first step. You must then configure your network workstations and servers to use the hardware you've installed.
You'll see a screen that tells you about all the network components that Windows has installed for you, which will look something like Figure 1.12.






If your network is operating, you don't have to worry about all the obscure entries on this screen. For your purposes, its only important aspect is the File and Printer Sharing button about two-thirds the way down the screen. Clicking on it will open a small window giving you the choice of whether to share system resources, as shown in Figure 1.13.






Your choices are twofold, sharing files and sharing printers. In most cases, you'll want to share files as well to put the machine to work as a server.
Once you've made your choices, clicking on OK will take you back to the previous screen, the Network folder. Click on OK again to exit back to Control Panel.

To enable sharing for a disk drive, be it a hard disk, floppy, or CD drive, highlight the drive's icon in My Computer window. Then choose Sharing from the File menu. You'll see a display like that shown in Figure 1.14.



















Once you've enabled a disk for sharing, its icon will appear in the Network Neighborhood of all the PCs that have access to it on the network.
Once you select the Sharing tab, you'll see a screen like that shown in Figure 1.15.





























When this tab initially pops up, it will default to Not Shared, and the lower part of the screen will be grayed out. Selecting Sharing will activate your other choices. You must give the printer a name by which PCs in the network will refer to it. You can optionally supply a comment so you can remember what you've done. This tab also provides for password protection for printer access. If you want to restrict printer access, you can enter a password here; otherwise, printer access won't be limited.
When you're finished with your entries, click on OK, and you're done. Your printer can now be shared with other workstations attached to your network.
Resource Sharing
After you've enabled sharing from the system that is to act as your file and print server, you must individually connect each PC to it through Windows 95. Although shared drives automatically appear under Windows, if you want to use them as drive letters through a DOS box, you will have to map them to the workstation. To share a printer, you must install the network printer exactly as you would install a local printer.


If you've not previously installed a printer in the workstation, you'll see a screen like that shown in Figure 1.16.

















Double click on Add Printer from the Printers folder. This will activate the Add Printer Wizard, which will step you through the installation process.
When the Add Printer Wizard starts, your first choice will be whether to install a local or networked printer, as shown in Figure 23.16. The wizard defaults to installing a local printer, so you'll want to select Network printer. Then click on the Next button.


]





In order to install a printer, you have to tell the Wizard which printer to use. The Wizard identifies a printer by its assigned name, and it prompts you to type in the name of the printer to install, as shown in Figure 1.18.














This screen also gives you the choice of routing the print commands from your DOS programs to the networked printer. If you're going to use DOS at all, you'll want to use one printer for all your output needs. To do so, select the Yes button.



The Wizard will respond by listing the shared printers attached to that server, as shown in Figure 1.19. You only need to click on the printer that you want.















The Wizard is not done with you yet. If you've told it to route your DOS print jobs to print through the network, the Wizard will want you to decide whether you want to capture a printer port. You'll be staring at a screen like that shown in Figure 1.20.







Because most DOS applications send their output directly to a printer port, you'll need to enable capture to allow them to print. When you click on the Capture Printer Port button, the Wizard will ask which port to capture with a screen like that shown in Figure 1.21.



You'll have to install all your DOS applications to use the port you choose for printing. The Wizard's default choice, LPT1, is a good one. After you make your choice, click on OK to finish the networked printer installation.
The Wizard takes care of all the details for you, automatically copying to your local PC the driver files necessary for your applications and printer. Your networked printer will then act as if it were locally connected to your PC—only you'll have to walk farther to fill the paper tray.


Reference
1)     Winn L. Rosch Hardware Bible, Premier Edition by Winn L. Rosch.







































Comments

  1. The best games in casino - DrmCD
    포항 출장안마 best-games-in-casino 구미 출장마사지 › best-games-in-casino In 대구광역 출장마사지 the heart of the Lake Tahoe are the two most popular casinos in the state. 용인 출장안마 Best casino is Red 창원 출장마사지 Rock Casino,

    ReplyDelete
  2. It looks like I'm currently unable to access the blog post at that link due to a website error (possibly on the hosting side). However, if you can provide a brief summary of the content or paste some of the text from the blog post, I’d be happy to help you write a relevant and thoughtful comment.

    best regards
    best free virus protection australia

    ReplyDelete

Post a Comment

Popular posts from this blog

Project Work on Web & Graphics titled WWW (World Wide Web)