Ami Micro Project Format

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 18

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

JAYAWANTRAO SAWANT POLYTECHNIC


DEPARTMENT OF COMPUTER ENGINEERING

MICRO PROJECT
Academic year: 2022-23

Network Adapter

………………………………………………

Program: CO Program
code:CO1I
Course: Workshop Practice Course code:
22005
MAHARASHTRA STATE
BOARD OF TECHNICAL EDUCATION
Certificate
This is to certify that Mr. /Ms.
………………………………………………………………………….
Roll No. ……... of ……. Semester of Diploma in
…………………………………………........
…………………………of Institute, JS POLYTECHNIC (Code: 0711) has
completed the Micro Project satisfactorily in Subject –Applied Mathematics
(22224) for the academic year 2021.- 2022 as prescribed in the curriculum.

Place: ……………………. Enrollment No:


……………………………………..
Date: ……………………… Exam. Seat No:
…………………………………….

Subject Teacher Head of the Department


Principal

Group Details:

Sr.No Name of group Roll No Enrollment Seat No


members No

akhilesh 22
gawade
atharva 5
gite
vaidehi
chaudhari
aadiraj
barawkar

Name Of Guide: Mrs. S.P.Sabat


INDEX

SR. CONTENT PAGE NO.


NO.

Network Adapter 1

Techopedia Explains Network Adapter 2

3 Adapters, Modems and Routers

8
9

❖ PROJECT ABSTRACT
CONTENT

Network Adapter

What Does Network Adapter Mean?


A network adapter is the component of a computer’s internal hardware
that is used for communicating over a network with another computer. It
enables a computer to connect with another computer, server or any
networking device over an local area network (LAN) connection. A
network adapter can be used over a wired or wireless network.

A network adapter is usually the only component within a computer for


interfacing or connecting with a network. Typically, it is built on a printed
circuit board with jumpers that connect it with the computer’s
motherboard.
A network adapter for wired networks has an RJ-45 port that uses twisted
or untwisted pair cable for network connectivity. Wireless adapters
connect with the network through a built-in or externally connected
antenna. Both network adapters support popular LAN protocols,
including TCP/IP.

Techopedia Explains Network Adapter

Some of the terminologies around network adapters can be confusing. It has


also historically been referred to as a Network Interface Card (NIC), especially
when it operated as an expansion plugged into a particular workstation. It may
also be referred to as a network interface controller or a network card. All of
these types of devices connect a computer to a network, which is the
fundamental definition of the network adapter in general.

Network adapters have many form factors – they can be a USB dongle or an
ethernet jack into an RJ-45 port. They can also be an antenna using standards
based on 802.11.
Network administrators and others can evaluate network adapters according to
their design and speed. For example, there are full-duplex and half-duplex
network adapters, as well as various designs rated by speeds from megabytes
per second to gigabytes per second, or, for cutting-edge technologies,
magnitudes of order greater than the gigabyte (tera – peta – zeta – etc.)

Adapters, Modems and Routers


Another way to think about the network adapter is to contrast its role in the network
to other devices that end users sometimes confuse with the network adapter itself.
One is the modem, which typically operates as a bridge to the greater Internet. The
modem (short for a modulation/demodulation device) was developed as a way to
port data onto the emerging Internet through telephone lines and other
infrastructure. It’s the gateway for the LAN, not a connecting piece within the LAN
itself.
By contrast, the network adapter does not connect the computer directly to the
Internet, but to a local area network, or more specifically, to other parts of a local
area network. Some of these external network adapters popular for mobile laptop
computers will look around for available networks to connect to, but typically,
password security often applies. In any case, although they may connect to LANs,
they’re typically connecting to a router, not directly to a modem.
Another distinct piece of hardware in the LAN is the router. Typically, as was just
mentioned, the network adapter connects to the router, which manages LAN traffic.
Again, this can be done through an ethernet cable, or wirelessly.
Technology has largely moved from the external network adapters to internal
wireless network adapters, many of which are built directly into the motherboard of
the device. A smartphone, for instance, would never have an external network
adapter the way that early personal computers did, where users plugged a USB
dongle or network card into a particular port on the laptop or desktop computer. In
those cases, it was often necessary to

How does a VPN work?


A VPN hides your IP address by letting the network redirect it through a specially
configured remote server run by a VPN host. This means that if you surf online with a
VPN, the VPN server becomes the source of your data. This means your Internet Service
Provider (ISP) and other third parties cannot see which websites you visit or what data
you send and receive online. A VPN works like a filter that turns all your data into
"gibberish". Even if someone were to get their hands on your data, it would be useless.

What are the benefits of a VPN connection?


A VPN connection disguises your data traffic online and protects it from external access.
Unencrypted data can be viewed by anyone who has network access and wants to see it.
With a VPN, hackers and cyber criminals can’t decipher this data.

Secure encryption: To read the data, you need an encryption key . Without one, it would
take millions of years for a computer to decipher the code in the event of a brute force
attack . With the help of a VPN, your online activities are hidden even on public
networks.

Disguising your whereabouts : VPN servers essentially act as your proxies on the
internet. Because the demographic location data comes from a server in another
country, your actual location cannot be determined. In addition, most VPN services do
not store logs of your activities. Some providers, on the other hand, record your
behavior, but do not pass this information on to third parties. This means that any
potential record of your user behavior remains permanently hidden.

Access to regional content: Regional web content is not always accessible from
everywhere. Services and websites often contain content that can only be accessed from
certain parts of the world. Standard connections use local servers in the country to
determine your location. This means that you cannot access content at home while
traveling, and you cannot access international content from home. With VPN location
spoofing , you can switch to a server to another country and effectively “change” your
location.

Secure data transfer: If you work remotely, you may need to access important files on
your company’s network. For security reasons, this kind of information requires a
secure connection. To gain access to the network, a VPN connection is often required.
VPN services connect to private servers and use encryption methods to reduce the risk
of data leakage.

CONCLUSION
WEEKLY PROGRESS REPORT

MICRO PROJECT

SR.NO. WEEK ACTIVITY PERFORMED SIGN OF GUIDE


DATE

1 1st Discussion and finalization of


topic
2 2nd Preparation and submission
of Abstract

3 3rd Literature Review

4 4th Collection of Data

5 5th Collection of Data

6 6th Discussion and outline of


Content

7 7th Formulation of Content

8 8th Editing and proof Reading of

Content

9 9th Compilation of Report And


Presentation

10 10th Seminar

11 11th Viva voce

12 12th Final submission of Micro


Project
Sign of the student Sign
of the faculty

SEMINAR PRINTOUTS
REFERENCE:https://www.youtube.com/watch?v=_wQTRMBAvzg

https://www.youtube.com/watch?v=m9evUZtkEAc

https://www.youtube.com/watch?v=YtxLexm-9pI

SOURCES USED

https://www.pcmag.com/encyclopedia/term/network-adapter

https://en.wikipedia.org/wiki/Network_address

https://www.versatek.com/networking

https://www.avast.com/c-what-is-a-vpn#:~:text=A%20VPN%20masks%20your%20IP,as
%20you%20navigate%20the%20web.

https://cybersecurity.att.com/blogs/security-essentials/explain-how-vpn-works

https://www.sciencedirect.com/topics/computer-science/network-adapter

https://www.techtarget.com/searchnetworking/definition/virtual-network-adapter
ANEEXURE II
Evaluation Sheet for the Micro Project
Academic Year: 2022-23 Name of the Faculty:
Ms.V.A. Rajgiri
Course: Workshop Practice Course code: 22005
Semester: I
Title of the project:
Cos addressed by Micro Project:
A: Apply the concepts of algebra to solve engineering related problems.
B: Utilize basic concepts of trigonometry to solve elementary engineering problems.
C: Solve basic engineering problems under given conditions of straight lines.
D: Solve the problems based on measurement of regular closed figures and regular solids.
E: Use basic concepts of statistics to solve engineering related problems.

Major learning outcomes achieved by students by doing the project


.
(a) Unit outcomes in Cognitive domain:
1)
(b)Outcomes in Affective domain:
1) Function as team member
2) Follow Ethics
Comments/suggestions about team work /leadership/inter-personal communication
(if any)
………………………………………………………………………………………………
………………
Marks out of 6 Marks out of
for 4for
performance in performance in
Roll No Student Name group activity oral/ Total out of 10
(D5 Col.8) presentation

(D5 Col.9)

(Signature of Faculty)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy