Acn Microproject
Acn Microproject
PROJECT REPORT
ON
SUBMITED BY,
Kundan Kanchan Mhatre (2211450042)
Mr. Sagar Surekar
SUBMITED TO
Maharashtra State Board of Technical Education
&
Department of Computer
Engineering
BHARTIYA EDUCATION/SOCIAL CHARITABLE TRUSTS
SHETH SHREE OTARMAL SHESHMAL PARMAR COLLEGE OF
DIPLOMAENGINEERING AT/POST: - NAGOTAHNE
(VELSHET)-402106, TAL:-ROHA, DIST:-RAIGAD (M.S.) INDIA
This is to certify that the project on Study of Storage Area Network submitted
by Kundan mhatre to the S.S.O.S.P. Collegeof Diploma Engineering, Nagothane,
and (second year department of Computer
engineering for the year (2023-24) in partial fulfillment for the Diploma in
Engineering, is his own work carried out under my guidance and is worthy of
examination.
I further certify that this work has not been submitted to any other college for
the purpose of degree or diploma.
DATE: - Place:-Nagothone
It is with profoundly sense of gratitude that we acknowledge from our guide Mr.
Sagar Surekar he has been guide in the true sense of word a guide who satisfaction
from our word & progress.
We are highly obliged Mr. Sagar Surekar of Department for aberrance & good co-
operation given to us fur bringing this project to almost standard.
We are grateful to our principal Mr. P.P. Jain for proceeding acknowledgement to us in
the connection of this project concluding. We appreciate the assistance of all staff that
helps us in for their sincere& obliging help to make our project successfully.
PREFACE
Consistent with the level of presentation every effort has been made to ensure that the
material included in the report is state of art and in the current expectation of the direct of
future development.
This report has covered as much as it could and especially all the important points
about our project. The Information in this report is accurate and great care has been taken
about the face and figures mentioned in this report.
All the information that could be brought before you have been provided in this
report. The synopsis has been a joint effort of all members of our group and I am thank fullto
them for their co-operation.
.
Part A
Micro-Project Proposal
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
Bus Topology:
Bus topology is a network type in which every computer and network device is connected to a
single cable. It is bi-directional. It is a multi-point connection and a non-robust topology
because if the backbone fails the topology crashes. In Bus Topology, various MAC (Media
Access Control) protocols are followed by LAN ethernet connections like TDMA, Pure Aloha,
CDMA, Slotted Aloha, etc
Bus Topology
Star Topology:
In star topology, all the devices are connected to a single hub through a cable. This hub is the
central node and all other nodes are connected to the central node. The hub can be passive in
nature i.e., not an intelligent hub such as broadcasting devices, at the same time the hub can be
intelligent known as an active hub. Active hubs have repeaters in them. Coaxial cables or RJ-
45 cables are used to connect the computers. In Star Topology, many popular Ethernet LAN
protocols are used as CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.
Ring Topology :
A number of repeaters are used for Ring topology with a large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then
the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data
loss repeaters are used in the network.
The data flows in one direction, i.e.., it is unidirectional, but it can be made bidirectional
by having 2 connections between each Network Node, it is called Dual Ring Topology.
In-Ring Topology, the Token Ring Passing protocol is used by the workstations to
transmit the data.
Ring Topology
Mesh Topology
In a mesh topology, every device is connected to another device via a particular channel.
In Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration Protocols),
DHCP (Dynamic Host Configuration Protocol), etc.
Mesh topology
Tree Topology :
This topology is the variation of the Star topology. This topology has a hierarchical flow
of data. In Tree Topology, protocols like DHCP and SAC (Standard Automatic
Configuration ) are used.
Tree topology
Hybrid Topology :
This topological technology is the combination of all the various types of topologies we have
studied above. It is used when the nodes are free to take any form. It means these can be
individuals such as Ring or Star topology or can be a combination of various types of
topologies seen above. Each individual topology uses the protocol that has been discussed
earlier.
Hybrid topology
IPV6 :
IPv6 or Internet Protocol Version 6 is a network layer protocol that allows
communication to take place over the network. IPv6 was designed by Internet Engineering
Task Force (IETF) in December 1998 with the purpose of superseding the IPv4 due to the
global exponentially growing internet users.
Multicast addresses : It represents a group of IP devices and can only be used as the
destination of a datagram.
Advantages of IPv6
o Reliability
o Faster Speeds: IPv6 supports multicast rather than broadcast in IPv4.This
feature allows bandwidth-intensive packet flows (like multimedia
streams) to be sent to multiple destinations all at once.
o Stronger Security: IPSecurity, which provides confidentiality, and data
integrity, is embedded into IPv6.
o Routing efficiency
o Most importantly it’s the final solution for growing nodes in Global-
network.
Proposed Methodology :
This microproject is to form a IPV6 static network of 10 pcs using switch and link. For
this practical we will use a network simulator which is Cisco Packet Tracer.
These are some steps to complete the project :
Step1: Open Cisco Packet Tracer . Step2:
Take 1 switch from the toolbar. Step3:
Take 10 PCs from the toolbar .
Step 4 : take copper straight throughs and connect all PCs with switch.
Step 5 : Now click on the PC and open desktop tab> then go to IP configuration. Step6:
now click on static and give the ipv6 address to the system.
Step 7 : Repeat step 5,6,7 until all pcs are configured.
Step 8 : Now take a PDU, click and source and then destination, to verify the
network is established successfully or not .
Or
Use ping command on command prompt.
Modern computer networks are easy to explore. So, even if you are a kid or a person new
to technology, you'll find it easy to connect.
The main aim of a computer network is to enable sharing of resources among its users.
You can use resources such as printers, scanners and photocopy machines that can be
shared across multiple users. This resource sharing is important for big companies as they
can use one single common network for connecting with their employees.
3. Connectivity
4. Security
Computer networks provide security through authorization. Authorization is done via user
id and password. So, it ensures that when we log in, we are only able to do it when there is
a perfect match between our details and the details stored in the database.
Organizations have an abundance of data that needs to be stored. For that purpose, they
are required to store them in a central server. A central server is a remote server that is
accessible to each and every employee. So, if in case one loses the data, others have it.
Disadvantages :
1. Lack of robustness
Computer networks rely on the main server called the central server. If the central server
malfunctions or there is an issue in the central server, then the entire network would stop
functioning. So, this is a major disadvantage due to dependency on a single server.
As computers in a network are interconnected, there is a high probability that if one of the
computers is affected by the virus, others too can get affected. This spread can actually
damage the entire system. Also, if the central server gets corrupted, then it's quite
dangerous as the network depends on the central server.
3. Independence issues
4. Lack of productivity
Since a network has a lot of advantages and applications, it is certain that it results in
simultaneous use of many services that cause distraction. Thus, due to employees focusing
on a myriad of tasks, productivity issues are quite common.
5. Health issues
1. Resource Sharing
2. Information Sharing
Using a Computer network, we can share Information over the network, and it provides
Search capabilities such as WWW. Over the network, a single information can be shared
among the many users over the internet.
3. Communication
Computer networks allow us to access the Remote Database of the various applications by
the end-users. Some applications are Reservation for Hotels, Airplane Booking, Home
Banking, Automated Newspaper, Automated Library etc.
Course outcome
1. Describe processes and technologies for identifying, analysing, and
mitigating securityrisks in storage infrastructure.
Conclusion:
References:
1. https://www.google.com
2. www.geeksforgeeks.com
3. www.tutorialspoint.com
4. https://www.techtarget.com