CASE STUDY ON COMPUTER NETWORKING

Description
CASE STUDY ON COMPUTER NETWORKING

CASE STUDY
COMPUTER NETWORKS

Submitted to:

Prof. Vandana Kadam
Submitted by : A040 SONAL . SHETH. A041 SONAM . SINGH. A042 BHUSHAN. TAMBE. A043 DEVAYANI. TELANGE. THE K.E.T’s V.G.VA E CO!!EGE O" ARTS # SC$ENCE AND COMMERCE. M$THAGAR ROAD MU!UND % E & ' ()) )*+.

CONTENTS :
+,. $-t.odu/tio0,. Co--e/ti-1 de2i/es 3,. Commu-i/4tio- /54--e6 (,. D4t4 T.4-smissio7,. To8o6o19 :,. !i-e /o-;i1u.4tio<,. T.4-smissio- mode *,. Se.2e. =,. S>it/5i-1 met5od +),. C4te1o.9 o; t5e -et>o.? ++,. Se/u.it9 +0,. Net>o.? !49out

$NTRODUCT$ON :
Given is the synopsis for the case study of a networking system in one of the KOTAK MAHIND A!s "ranch in dom"iva#i$
P64/e : Kotak Mahindra %ank & Dom"iva#i 'w( D4te O; Visit : )* august & )**+ $

Kotak Mahindra %ank is one of the "est organi,ation where we can study a"out networking and c#ear our concepts$ -e se#ected this particu#ar network& so that the impact of networking on a corporate wor#d can "e studied c#ose#y$ Mr $.rasad Mehta& a network engineer& actua##y he#ped us to c#ear our a## /ueries and concepts of networking$ In this case study& we have main#y focused on the concepts of techno#ogica# deve#opment in networking fie#d& a#ong with the network design$ -e were rea##y interested to 0 12$ To know how network operates3

)2$ -hat types of techno#ogy is avai#a"#e3 42$ How does information f#ow3 52$ -ho is sharing the data and what kind of data is "eing shared 3 etc6 7o fina##y& -e have studied and tried to put forward the concepts of networks& in a simp#est form$ -e have descri"ed the theory of every component in Kotak Mahindra %ank& to make the concepts c#ear and easy$

@AS$C CONCEPTS : ? Kotak Mahindra %ank has in a## 45 centers in
Mum"ai$ Its main "ranch 'head office( is in -ada#a$

? The center has )* computers& named from A to T
and have mu#tip#e #aser printers which are shared "y a## the computers$ These are ca##ed as nodes& i$e$ #inking devices$ It a#so has a TM7 'Token Machine 7ystem($

CONNECT$NG DEV$CES :

? 8onnecting devices used are switches and routers$
7witches are used "ecause a hu" has on#y 9 ports and if a system wants to connect more than 9 devices to a hu"& a hu" "ecomes inefficient $7o a switch is used to connect a num"er of devices& which is then connected to one of the port of a hu"& so that the rest of the ports of the hu" remain free$

THEORY :
? S>it/5es : They are hardware and:or software
devices capa"#e of creating temporary connections "etween two or more devices #inked to a switch & "ut not to each other$

? Route.s : It is an interconnecting device$ outers
are more comp#icated$ They have access to network #ayer addresses and contain software that ena"#es them to determine which of severa# possi"#e paths "etween those addresses is the "est for a particu#ar transmission$ Thus& routers re#ay packets among mu#tip#e interconnected networks$ outers operate in physica# data #ink and network #ayers of the O7I mode#$

COMMUN$CAT$ON CHANNE! :

? The devices are connected to a switch using cat;<
=T. 'unshie#ded twisted pair( straight 8u;ca"#e$ The end connectors used for the cat;< ca"#es are ca##ed >;5< 'regu#ated >acks 5<( connector$

THEORY : ? The medium defines the speed at which data can
trave# through a connection$

? C4tA7 U-s5ie6ded t>isted 84i. /4b6e : It is a
ca"#e "e#onging to category <$ It supports upto 1* mega"it:sec$ These cat;< ca"#es are capa"#e of carrying data effective#y at a"out 9*;+* m $ Main advantages of =T. are its cost and ease of use $ =T. is cheap & f#e?i"#e and easy to insta##$

? RBA(7 : It is a snap;in p#ug #ike connector with 9
conductors$ The connector is attached to the ca"#e and the @ack is the device that the connector p#ugs into$ Thus& one end of cat;< ca"#e is inserted in >;5< s#ot of computer and other end is terminated on Athernet port of a switch$

DATA TRANSM$SS$ON : ? The transmission of "inary data across a #ink is
accomp#ished in seria# mode$

THEORY

0

? Se.i46 D4t4 T.4-smissio- : In seria# data
transmission one "it fo##ows another & so we need on#y one communication channe# rather than Bn! to transmit data "etween two communicating devices$

? The advantage of seria# data transmission is that
with on#y one communication channe#& seria# transmission reduces the cost of transmission over para##e# "y rough#y a factor of Bn!$

? In seria# mode& one "it is sent with each c#ock
pu#se$

TOPO!OGY :
? In this centre& a star topo#ogy is used$ %ecause& it
is #ess e?pensive& re/uires #ess ca"e#ing and easy to insta## and reconfigure$

THEORY : ? The term topo#ogy refers to the way a network is
#aid out& either physica##y or #ogica##y$

? Two or more devices connect to a #inkC two or
more #inks form a topo#ogy$

? Topo#ogy of an network is the geometric
representation of the re#ationship of a## the #inks and #inking devices to each other$

? There are four "asic topo#ogies possi"#e$
12$ Mesh )2$ 7tar 42$ %us 52$ ing

? These four topo#ogies descri"e how the devices
in a network are interconnected rather than their physica# arrangement$

? STAR TOPO!OGY : In a star topo#ogy&
each device has a dedicated point to point #ink on#y to a centra# contro##er & usua##y ca##ed a Bhu"!$

? The devices are not direct#y #inked to each
other$

? A star topo#ogy does not a##ow direct traffic
"etween devices$

? The contro##er acts as an e?change$ If one
device wants to send data to another& it sends the data to the contro##er& which then re#ays the data to the other connected device$

DADI8A A

DADI8A %

HU@
DADI8A 8 DADI8A D

? A star topo#ogy is #ess e?pensive$ In a star
topo#ogy& each device needs on#y one #ink and one I:O port to connect it to any num"er of other devices$ This factor makes it easy to insta## and reconfigure$

? Other advantage is ro"ustness$ If one #ink fai#s&
on#y that #ink is affected$ A## other #inks remain active$ 7o& as #ong as& a hu" is working & it can "e used to monitor #ink pro"#ems and detect

defective #inks$ 7o& it #eads to easy fau#t identification and fau#t iso#ation$

!$NE CON"$GURAT$ON :
? Eor communication& point to point #ine
configurations is used$

THEORY : ? !i-e /o-;i1u.4tio- : It refers to the way two
or more communication devices attach to a #ink$ A #ink is the physica# communication pathway that transfers data from one device to another$

? Poi-t To Poi-t Co-;i1u.4tio- : It provides
a dedicated #ink "etween two devices$ The entire capacity of the channe# is reserved for transmission "etween those two devices$

? Most point to point #ine configuration use an
actua# #ength of wire or ca"#e to connect the two ends& "ut other options& such as microwave or sate##ite #inks are a#so possi"#e$

TRANSM$SS$ON MODE :
? The transmission mode used is fu##;dup#e?$ THEORY : ? T.4-smissio- mode : The term is used to define
the direction of signa# f#ow "etween two #inked devices$

? "u66Adu86eC mode : In dup#e? mode& "oth stations
can transmit and receive simu#taneous#y$

? In fu## dup#e? mode& signa#s going in either
direction share the capacity of the #ink$ This sharing can occur in two ways : either the #ink must contain two physica##y separate transmission paths& one for sending and another for receiving & or the capacity of the channe# is divided "etween signa#s trave#ing in opposite directions$

SERVER :
? The main server is in -ada#a$ It stores the
data"ase of a## connecting devices$ -hen we make and changes in a fi#e stored in a particu#ar device& connected to a server & same changes are made to the fi#e which is stored on the server$ The app#ication insta##ed in every connecting device& can "e accessed direct#y from the server as we##$

THEORY : ? 7erver is a computer or a device with high storage
capacity& that stores a## data& entered on the various devices& connected to the server$

? A server is rea##y important data storage system
and a#so it is very sensitive$ Thus& it is kept in a separate room ca##ed Bserver room!$

SW$TCH$NG METHOD :
? It uses packet switching method$ THEORY :

? In a packet F switched network& data are transmitted
in discrete units of potentia##y varia"#e #ength "#ocks ca##ed Bpackets!$

? The ma?imum #ength of the packet is esta"#ished "y
the network$ Gonger transmissions are "roken up into mu#tip#e packets$ Aach packet contains not on#y data "ut a#so a header with contro# information$

? The packets are sent over the network node to node$
At each node& the packet is stored "rief#y then routed according to the information$

CATEGORY O" THE NETWORK :
? Goca# area network 'GAN( used & a##ows to share
different resources #ike #aser printer "etween computers$

THEORY : ? A #oca# area network is usua##y private#y owned and
#inks the devices in a sing#e office& "ui#ding or campus$ GAN si,e is #imited to a few ki#ometers$

? GAN are designed to a##ow resources to "e shared
"etween persona# computers or workstations$ The

resources to "e shared can inc#ude a hardware or a software$

? GAN!s are distinguished from other types of
networks "y their transmission media& si,e and topo#ogy$ A given GAN may use on#y one type of transmission medium$

? Traditiona##y& GAN!s have data in the 5 to 1H M"ps
range$

$P ADDRESS :
? A## the "ranches of Kotak Mahindra use B*! ' ,ero (
series I. address & specified "y Kotak Mahindra!s head "ranch$ It comes under c#ass A$

SECUR$TY : ? Network security issues inc#ude protecting data from
unauthori,ed access and viruses$

? U-4ut5o.iDed 4//ess : Eor a network to "e usefu#
& sensitive data must "e protected from unauthori,ed access$ .rotection can "e accomp#ished at a num"er of #eve#s$ At the #owest #eve# are user identification codes and passwords$ Avery device has its own network address& "y which anyone can connect to the

device and access the data$ %ut if a user identification code and password are not known then we can connect to that device "ut cannot access the data$

? At a higher #eve#& are encryption techni/ues$ In these
mechanisms& data are systematica##y a#tered in such a way that if they are intercepted "y an unauthori,ed user& it wi## not "e accessi"#e$

? V$RUSES : %ecause a network is accessi"#e from
many points it can "e prone to computer viruses$ A virus is an i##icit#y introduced code that damages the system$ A good network is protected from viruses "y hardware and software designed specia##y for that purpose$

NETWORK !AYOUT :
? Avery centre of Kotak Mahindra sends its data to the
main "ranch for updating$

? A## computers& from A to T& are attached to a switch
with the he#p pf a cat;< ca"#e and >;5< connector$ One end of the cat;< ca"#e is inserted in >;5< s#ot of computer and other end is terminated on Athernet port of a switch$

? The switch is then connected to a hu"$ One port of
hu" has a connection with a #aser printer& which is shared "y a## the computers& A#so& a hu" has a connection with a TMs ' Token Machine 7ystem (& so that TM7 can register the token of a customer on the computer& direct#y$ Other ports of a hu" remain free$

? H=% is then connected to a router& which route the
packets from one network to the other& so that it gets to the fina# destination$

? 7ince& the data cannot "e sent direct#y through a
network& it has to convert into digita# form& in short& it has to "e modu#ated& so that it can trave# through a network easi#y and safe#y$ Eor this& a modem is connected to a router& which modu#ates and transfers the data through #ease #ines$

? To setup the internet connection& various service
providers such as 7iffy "road"and& e#iance & etc are used$

? -hen a connection is esta"#ished& data f#ows through
the #ease #ines and is received "y the modem at the receiver!s side i$e$ at the main centre$ Modem then demodu#ates the data and sends it to the router connected to it$

? outers then route this data to the main server and
data gets stored on the server$

? If the device at the receiver!s side wants to rep#y to
the data to one of the device& the entire process is reversed$

? In this way data can "e received and accessed "y any
Kotak Mahindra "ranch$

CONC!US$ON : This is how networking takes p#ace in
Kotak Mahindra!s "ranch$



doc_642108874.pdf
 

Attachments

Back
Top