0% found this document useful (0 votes)
3 views

Seminar Sem 2

This seminar report titled 'Computer Network' submitted by Nikeeta Singh at Mewar University covers the fundamentals of computer networking, including types of networks, network topologies, protocols, and security measures. It emphasizes the importance of networking in facilitating communication and data exchange in various applications. The report concludes that a solid understanding of networking concepts is essential for professionals in the technology field.

Uploaded by

nikeetasingh670
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Seminar Sem 2

This seminar report titled 'Computer Network' submitted by Nikeeta Singh at Mewar University covers the fundamentals of computer networking, including types of networks, network topologies, protocols, and security measures. It emphasizes the importance of networking in facilitating communication and data exchange in various applications. The report concludes that a solid understanding of networking concepts is essential for professionals in the technology field.

Uploaded by

nikeetasingh670
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

COMPUTER NETWORK

A Seminar Report
Submitted to
Mewar University, Chittorgarh
Towards the partial fulfillment of
The degree of
Master of Computer Applications
In
Computer Application

Session: - 2023-24

Submitted To: Submitted By:


Mr. B. L. Pal Nikeeta Singh
HOD MUR2301077
249900010025

Guided By:
Ajay Singh Dhabariya
Mewar University Chittorgarh (Raj.)

Department of Computer Application


Faculty of Computer Science & System Studies
Mewar University
Chittorgarh (Raj.)
CERTIFICATE

This is to certify that Nikeeta Singh has successfully completed the Seminar report titled
"Computer Network" under the guidance of Ajay Singh Dhabariya at Mewar University in
partial fulfilment of the requirements for MCA.

Submitted by:
Nikeeta Singh
MUR2301077
Department of Computer Application
Mewar University
Acknowledgement
Gratitude is the most exquisite form of courtesy. Life without thankfulness is devoid of love and
passion. Hope without thankfulness is lacking in one perception. Faith without thankfulness lacks
strength and fortitude. The beatitude, bliss and euphoria that accompany the successful completion
of any task would not be complete without the expression of appreciation of simple virtues to the
people who made it possible. So, with reverence, veneration honor, I acknowledge all those whose
guidance and encouragement have made successful in winding up this. I am grateful to Mr. B.L
Pal (HOD of CSE dept., Mewar University) and Mr. Ajay Singh Dhabariya (Assistant Professor,
Mewar University) for their guidance, inspiration and constructive suggestions that helped me in
the preparation of this project. Moral, intellectual and very frequently required support from all
the faculty members is also hereby acknowledged.

Submitted by:
Nikeeta Singh
MUR2301077
Department of Computer Application
Mewar University
Abstract
This work aims to design and develop the Computer Network using its feature. This service is
helpful to extract any information over network. We can fetch any files, data or content using the
computer network facility.

Index Terms – Computer Network

• Network Topology
• Types of Computer Network
• Network Protocols
• Wired & Wireless network
• Hardware systems
TABLE OF CONTENTS

Certificate…………………………………………………………………………………. i
Acknowledgement……………………………………………………………...………… ii
Abstract…………………………………………………………………………………... iii
Table of Contents……………………………………………………………………….... iv

Chapter 1: Introduction to Computer Network

Chapter 2: Purpose of Networking

Chapter 3: Types of Networks by Area

Chapter 4: LAN, MAN, WAN explained

Chapter 5: Network Topologies

Chapter 6: Network Protocols

Chapter 7: IP Addressing

Chapter 8: OSI Model

Chapter 9: Client - Server vs Peer to Peer

Chapter 10: Wireless & Wired Networks

Chapter 11: Network Security Basics

Chapter 12: Common Networking Issues

Chapter 13: Emerging Network Technologies

Chapter 14: Conclusion


Chapter 1
Introduction To Computer Network

A computer network is a system of interconnected computing devices that share data,


resources, and information. These devices communicate using common protocols and
technologies, such as wired connections (like Ethernet cables) or wireless methods (like Wi-Fi).

A computer network is a collection of interconnected devices that share resources and


information.

These devices can include computers, servers, printers, and other hardware. Networks allow for
the efficient exchange of data, enabling various applications such as email, file sharing, and
internet browsing.

Basic Terminologies of Computer Networks


Network: A network is a collection of computers and devices that are connected together to
enable communication and data exchange.

Nodes: Nodes are devices that are connected to a network. These can include computers,
Servers, Printers, Routers, Switches, and other devices.

Protocol: A protocol is a set of rules and standards that govern how data is transmitted over a
network. Examples of protocols include TCP/IP, HTTP, and FTP.
Chapter 2
Types of Enterprise Computer Networks

LAN: A Local Area Network (LAN) is a network that covers a small area, such as an office or a
home. LANs are typically used to connect computers and other devices within a building or a
campus.

WAN: A Wide Area Network (WAN) is a network that covers a large geographic area, such as a
city, country, or even the entire world. WANs are used to connect LANs together and are
typically used for long-distance communication.

Cloud Networks:

Cloud Networks can be visualized with a Wide Area Network (WAN) as they can be hosted on
public or private cloud service providers and cloud networks are available if there is a demand.
Cloud Networks consist of Virtual Routers, Firewalls, etc.

These are just a few basic concepts of computer networking. Networking is a vast and complex
field, and there are many more concepts and technologies involved in building and maintaining
networks. Now we are going to discuss some more concepts on Computer Networking.

Open system: A system that is connected to the network and is ready for communication.

Closed system: A system that is not connected to the network and can’t be communicated with.
Chapter 3
Purpose of Networking

The primary purpose of networking is to build and maintain professional and personal
connections to advance career goals, gain insights, and foster mutually beneficial relationships.

Networking involves creating relationships with individuals who can offer career advice,
opportunities, or referrals.

Job Opportunities:

Networking can lead to unadvertised job openings or internships.

Professional Connections:

Building relationships with industry professionals can provide valuable insights and mentorship.

Career Advice:

Networking can help you gain valuable advice from experienced professionals.

Building Reputation:

Networking can help you establish yourself as a reliable and knowledgeable professional,
attracting more opportunities.
Chapter 4
Network Topology
The Network Topology is the layout arrangement of the different devices in a network. Some
types of network topologies are:

Bus Topology:

In bus topology all devices are connected to a single central cable called a bus. Data is sent
along this cable and all devices share the same connection. Simple and cheap to set up but if
the main cable fails the whole network goes down.

Star Topology:

In star topology all devices are connected to a central node called hub or switch. The hub
controls the flow of data between devices. If one device fails the rest of the network is
unaffected. But, if the central hub fails the whole network stops working.

Ring Topology:

In ring topology devices are connected in a circular loop with each device connected to two
others. Data travels in one direction (or sometimes both) passing through each device until it
reaches its destination. A failure in one device can affect the whole network.

Mesh Topology:

In mesh topology every device is connected to every other device in the network. It provides
multiple paths for data so if one path fails another can take over.

Tree Topology:

Tree topology is the combination of star and bus topology. Tree topology is good for organizing
large networks and allows for easy expansion.

Hybrid Topology:

Hybrid topology is the combination of two or more different topologies (like star and mesh). It is
flexible and can be customized based on the network’s specific needs.
Chapter 5
Network Devices

An interconnection of multiple devices, also known as hosts, that are connected using multiple
paths for the purpose of sending/receiving data or media.

Computer networks can also include multiple devices/mediums which help in the
communication between two different devices; these are known as Network devices and
include things such as routers, switches, hubs, and bridges.
Chapter 6
Network Protocols

A protocol is a set of rules or algorithms which define the way how two entities can
communicate across the network and there exists a different protocol defined at each layer of
the OSI model. A few such protocols are TCP, IP, UDP, ARP, DHCP, FTP, and so on.

Transmission Control Protocol/Internet Protocol (TCP/IP):

TCP/IP is the foundational protocol suite of the internet, enabling reliable communication. TCP
Ensures data is delivered reliably and in order and IP routes data packets to their destination
based on IP addresses.

Hypertext Transfer Protocol (HTTP) and HTTPS:

HTTP and HTTPS protocols used for transmitting web pages. In HTTP communication is
unsecured and in HTTPS secured communication using SSL/TLS encryption.

Simple Mail Transfer Protocol (SMTP):

SMTP protocol used to send email. SMTP protocol works with other protocols like POP3 and
IMAP for email retrieval.

File Transfer Protocol (FTP):

FTP protocol used for transferring files between computers. Includes commands for uploading,
downloading, and managing files on a remote server.

Dynamic Host Configuration Protocol (DHCP):

DHCP protocol automatically assigns IP addresses to devices on a network. Reduces manual


configuration and IP address conflicts.

Domain Name System (DNS):

DNS Translates human-friendly domain names into IP addresses. Ensures seamless navigation
on the internet.
Chapter 7
OSI Model

OSI stands for Open Systems Interconnection. It is a reference model that specifies standards for
communications protocols and also the functionalities of each layer. The OSI has been
developed by the International Organization For Standardization and it is 7 layer architecture.
Each layer of OSI has different functions and each layer has to follow different protocols. The 7
layers are as follows:

Physical Layer

Data link Layer

Network Layer

Transport Layer

Session Layer

Presentation Layer

Application Layer
Chapter 8
Types of Computer Network Architecture

Computer Network falls under these broad Categories:

Client-Server Architecture: Client-Server Architecture is a type of Computer Network


Architecture in which Nodes can be Servers or Clients. Here, the server node can manage the
Client Node Behaviour.

Peer-to-Peer Architecture: In P2P (Peer-to-Peer) Architecture, there is not any concept of a


Central Server. Each device is free for working as either client or server.
Chapter 9
Network Security
Ensuring the security of a network is crucial to protect data and resources from unauthorized
access and attacks. Key aspects of network security include:

Firewalls:

Devices or software that monitor and control incoming and outgoing network traffic based on
security rules.

Encryption:

The process of encoding data to prevent unauthorized access. Commonly used in VPNs, HTTPS,
and secure email.

Intrusion Detection Systems (IDS):

Tools that monitor network traffic for suspicious activity and potential threats.

Access Control:

Mechanisms that restrict access to network resources based on user identity and role.

Regular Updates and Patching:

Keeping software and hardware up to date to protect against vulnerabilities.


Conclusion

Understanding the basics of computer networking is essential in today’s interconnected world.


Networks enable the seamless exchange of information, support countless applications, and
underpin the functionality of the internet.

From different types of networks and their components to protocols and security measures, a
solid grasp of these concepts is foundational for anyone working in or with technology. As
technology evolves, so too will the complexity and capabilities of computer networks, making
continuous learning and adaptation crucial.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy