This document provides an overview of the network system at Ahsanullah University of Science & Technology (AUST) in Bangladesh. It describes the types of networks, topologies, hardware, and media used. The university uses both wired and wireless networks to connect computers. The wired network uses UTP and fiber optic cables in a star topology. Routers, switches, and servers connect the departments and buildings. The wireless network provides internet access across campus. In total, the network system at AUST effectively connects computers to share resources while managing bandwidth usage.
A computer network connects a group of computers. Networks can be classified in several ways including by scale, connection method, functional relationship, topology, protocols used, and more. Common network types include personal area networks (PANs), local area networks (LANs), campus area networks (CANs), metropolitan area networks (MANs), and wide area networks (WANs). Larger global networks include global area networks (GANs) and internetworks like the Internet.
Cn 04,32,36-Cn all chapters1- computer networks- gtuJay Patel
This document discusses computer network protocols and layered architectures. It explains that networks are designed with layered protocols to handle complexity. There are typically 5 layers, with each layer building on the one below it. Layers communicate with their peer layers on other nodes using protocols. Data passes through each layer, with each layer adding header information. This allows for standard interfaces between layers and symmetry of functions across nodes. The layered approach reduces design complexity and guides network implementation.
This document provides information about computer networks and telecommunications. It discusses terminals, telecommunications software, communication processors, communication media, network topologies, protocols, network architectures, and internet protocols. Terminals include video display terminals and other end user workstations. Telecommunications software functions include access control, transmission control, network control, error control, and security. Common network topologies include star, ring, bus, and tree configurations. Popular internet protocols are TCP/IP, FTP, HTTP, Telnet, Gopher, and WAIS. The document also covers internet addressing, domains, email addresses, URLs, and web directories.
The document provides information about Arjun, Rahul, Sheeba, and Tushar's internship experience at ONGC, including examining the servers and network devices at the ONGC server room in Telbhawan. It describes ONGC as India's largest oil and gas exploration company. It also discusses different networking topics like modems, FDDI, Ethernet, network topologies, network interface cards, and types of networks like LAN, WAN, MAN, and wireless networks.
Learn Advanced Networking Course At PSK Technologies It Company Nagpur Download free syllabus :-https://www.pskitservices.com/free-internship-company-in-nagpur/
The document discusses various topics related to computer networks and the internet. It defines a network as a collection of interconnected computers and devices that allow sharing of resources. It describes the basic components of a network like computers, network interface cards, cables, and technical knowledge. It also summarizes different types of networks including LAN, MAN and WAN and factors to consider when choosing a network. The document then defines the internet and summarizes how it works, common internet services, and how people use the internet. It also discusses internet connections, internet service providers, URLs and common types of internet connections.
This document provides an overview of computer networks and distributed systems. It defines a computer network as a set of devices connected by communication links that allow the exchange of information. A distributed system is a collection of independent computers that appear as a single system to users. The goals of networking are discussed as performance, reliability, security, resource sharing, cost reduction, and enabling communication. Peer-to-peer and client-server are presented as the main approaches for communication within a network. Finally, common network hardware such as nodes, network interface cards, hubs, switches, repeaters, and routers are defined.
This document provides information about network topologies and media access methods. It begins by defining a network topology as the physical layout of computers on a network. The four primary network topologies are then described as star, bus, ring, and mesh. Communication methods for bus, ring, and star topologies are explained. Hybrid topologies that combine elements of different primary topologies are also introduced. The document concludes by discussing two common media access methods: CSMA/CD and CSMA/CA.
A computer network connects a group of computers. Networks can be classified in several ways including by scale, connection method, functional relationship, topology, protocols used, and more. Common network types include personal area networks (PANs), local area networks (LANs), campus area networks (CANs), metropolitan area networks (MANs), and wide area networks (WANs). Larger global networks include global area networks (GANs) and internetworks like the Internet.
Cn 04,32,36-Cn all chapters1- computer networks- gtuJay Patel
This document discusses computer network protocols and layered architectures. It explains that networks are designed with layered protocols to handle complexity. There are typically 5 layers, with each layer building on the one below it. Layers communicate with their peer layers on other nodes using protocols. Data passes through each layer, with each layer adding header information. This allows for standard interfaces between layers and symmetry of functions across nodes. The layered approach reduces design complexity and guides network implementation.
This document provides information about computer networks and telecommunications. It discusses terminals, telecommunications software, communication processors, communication media, network topologies, protocols, network architectures, and internet protocols. Terminals include video display terminals and other end user workstations. Telecommunications software functions include access control, transmission control, network control, error control, and security. Common network topologies include star, ring, bus, and tree configurations. Popular internet protocols are TCP/IP, FTP, HTTP, Telnet, Gopher, and WAIS. The document also covers internet addressing, domains, email addresses, URLs, and web directories.
The document provides information about Arjun, Rahul, Sheeba, and Tushar's internship experience at ONGC, including examining the servers and network devices at the ONGC server room in Telbhawan. It describes ONGC as India's largest oil and gas exploration company. It also discusses different networking topics like modems, FDDI, Ethernet, network topologies, network interface cards, and types of networks like LAN, WAN, MAN, and wireless networks.
Learn Advanced Networking Course At PSK Technologies It Company Nagpur Download free syllabus :-https://www.pskitservices.com/free-internship-company-in-nagpur/
The document discusses various topics related to computer networks and the internet. It defines a network as a collection of interconnected computers and devices that allow sharing of resources. It describes the basic components of a network like computers, network interface cards, cables, and technical knowledge. It also summarizes different types of networks including LAN, MAN and WAN and factors to consider when choosing a network. The document then defines the internet and summarizes how it works, common internet services, and how people use the internet. It also discusses internet connections, internet service providers, URLs and common types of internet connections.
This document provides an overview of computer networks and distributed systems. It defines a computer network as a set of devices connected by communication links that allow the exchange of information. A distributed system is a collection of independent computers that appear as a single system to users. The goals of networking are discussed as performance, reliability, security, resource sharing, cost reduction, and enabling communication. Peer-to-peer and client-server are presented as the main approaches for communication within a network. Finally, common network hardware such as nodes, network interface cards, hubs, switches, repeaters, and routers are defined.
This document provides information about network topologies and media access methods. It begins by defining a network topology as the physical layout of computers on a network. The four primary network topologies are then described as star, bus, ring, and mesh. Communication methods for bus, ring, and star topologies are explained. Hybrid topologies that combine elements of different primary topologies are also introduced. The document concludes by discussing two common media access methods: CSMA/CD and CSMA/CA.
This document discusses different types of network topologies, including physical topologies like ring, bus, star, mesh, tree, and hybrid, as well as logical topologies. For each physical topology, the key advantages and disadvantages are outlined. A ring topology forms a circular data path between devices, while a bus topology uses a single backbone cable. A star topology connects all devices to a central hub. A mesh topology interconnects all devices, providing redundancy. A tree topology arranges devices hierarchically like branches. A hybrid topology combines benefits of different topologies but with increased complexity.
A local area network (LAN) uses wired connections to connect devices within a limited geographic area like a building or campus. Ethernet became the dominant wired LAN technology using carrier sense multiple access with collision detection (CSMA/CD) to regulate shared access to the transmission medium. Ethernet has evolved from 10 Mbps to 100 Mbps to 1 Gbps standards to meet increasing bandwidth demands. Key components of wired LANs include network adapters, cabling, connectors, switches/hubs, and software protocols. Other historical wired LAN technologies like Token Ring and Token Bus used token passing for medium access but have been largely replaced by Ethernet.
Computer networks - CBSE New Syllabus (083) Class - XIIDeepak Singh
The document provides information on various computer networking concepts. It defines Internet of Things (IoT) and discusses the differences between public and private clouds. It also describes wired and wireless networks, the roles of clients and servers, and common networking hardware like NICs, switches, routers and access points. The document further explains networking protocols and standards such as IP versions, DNS, URLs, modulation techniques, and communication protocols like HTTP, FTP, SMTP and more.
Wireless network (cellular network architecture and http.)Abdullah Moin
Cellular architecture is constituted of the following − A network of cells each with a base station. A packet-switched network for communication between the base stations and mobile switching centres. The public switched telephone networks to connect subscribers to the wider telephony network.
In all cellular systems, land area is divided into a number of cells each with its radio service. In AMPS the area is large which in digital services, the area is much smaller. Conventionally cells are hexagonal in shape. Each cell uses a frequency range that is not used by its adjacent cells. However, frequencies may be reused in non-adjacent cells.
Data Communication
Networks & Internet
Protocols & Standards
Layered Tasks
Internet Model
OSI Model
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
Circuit switching and Telephone Network
Signals
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
This document provides an overview of basic networking concepts including protocols, protocol layers, network interconnection, and the Internet. It describes how networks are defined and addressed. The key protocol layers of OSI and TCP/IP models are examined including physical, data link, network, transport, and application layers. Common network types, topologies, and connectivity options are also summarized.
This document discusses various types of network hardware and software components. It describes network interface cards (NICs), hubs, switches, bridges, routers, gateways, and modems. NICs connect devices to the network, while hubs and switches connect multiple devices but switches have more intelligence. Bridges and routers connect different network segments, with routers having more advanced routing abilities. Gateways connect networks with different protocols. Modems convert digital and analog signals to connect networks to the internet.
Chapter 8 the role of networking in manufacturingN. A. Sutisna
This document discusses data communication and networking in manufacturing systems. It covers local area network concepts like topologies, protocols, and addressing. The most common high-level network topologies for manufacturing are bus structures and star networks. Bus networks offer flexibility in cable utilization but contention is an issue. Ring and star networks are also discussed along with techniques for resolving contention like CSMA/CD and token passing.
A computer network is a collection of connected computing devices that communicate and share resources. Connections between devices are usually made with physical wires or cables, but some use wireless radio waves or infrared signals. A network allows for resource and information sharing between connected devices, as well as communication applications like email, messaging, video conferencing, and more. The major types of networks include local-area networks (LANs) connecting devices in a small area, wide-area networks (WANs) connecting LANs over large distances like the Internet, and metropolitan-area networks (MANs) connecting infrastructure in cities.
This document provides an overview of important networking concepts. It discusses data communication components and various transmission mediums including Ethernet, Fast Ethernet, Gigabit Ethernet, LocalTalk, Token Ring, FDDI, ATM, and wireless technologies. It also describes common network hardware such as hubs, switches, bridges, repeaters, routers, and NICs. Finally, it covers common network media including twisted pair, coaxial, fiber optic, and wireless and discusses specifications for Ethernet and optical fiber.
Network devices such as repeaters, bridges, switches and routers are used to connect and expand networks. Repeaters regenerate signals to expand small networks, while bridges and switches can understand node addresses to segment networks. Routers interconnect different networks and determine optimal routes using network layer addresses and routing protocols. Remote access devices like modems and ADSL modems allow computers to connect to networks over telephone lines by modulating digital signals into analog for transmission.
A network consists of a collection of computers, printers and other compatible equipment/ hardware
that is connected together so that they can communicate with each other.
This document provides an overview of computer networks. It discusses network diagrams, classifications of networks by range including LAN, WAN, PAN and MAN. Common network topologies such as bus, star, ring and mesh are described. The OSI and TCP/IP models are explained. Common network devices, switching technologies, and transmission media are defined. Signal types including analog and digital are also summarized.
Bob Metcalfe designed the first Ethernet network at Xerox PARC in 1973 to connect computers and printers. Ethernet uses CSMA/CD (Carrier Sense Multiple Access with Collision Detection) where devices share a cable and can detect if two devices transmit at the same time causing a collision. The standard has since expanded and faster versions include Fast Ethernet that operates at 100 Mbps and Gigabit Ethernet at 1 Gbps. Switched Ethernet uses switches to connect devices and avoids collisions by routing traffic through separate ports or an onboard backplane when devices on the same switch need to communicate.
This document is a project report on computer networking prepared by Surender Singh for his summer training. It provides an introduction to networking and covers topics such as network types (LAN and WAN), network models (OSI model), networking cables, devices, IP addressing, routing, firewalls, wireless networks, and ISDN. The report defines what a computer network is, outlines the requirements and benefits of networking, and describes different network components and concepts at a high level.
Full video explained in Hindi
Check youtube channel -
The Avi Security
basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions. basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
This document provides information about planning and designing internet infrastructure. It defines internet infrastructure as the collection of hardware and software that enables internet operations, including transmission lines, routing equipment, DNS, email servers, databases, and other critical components. The key components of internet infrastructure are data centers, networks, computer equipment, storage services, and server applications. Common transmission media for internet infrastructure are coaxial cable, twisted pair cable, and fiber optic cable.
The document discusses basics of computer networks. It defines data communication and its key characteristics like delivery, accuracy and timeliness. The basic components of a communication model are identified as the message, protocol, sender, receiver and transmission medium. Different data types like text, numbers, images, audio and video are represented as bit patterns for transmission. Types of networks like personal area network, local area network, wide area network, campus area network and metropolitan area network are classified based on their geographical span, interconnectivity, administration and architecture.
The document provides an overview of networking concepts across different layers of the networking model. It discusses that a network includes interconnected devices like computers, servers, routers and wireless devices. The network core consists of routers that route data between hosts using protocols like IP. Modern data networks are packet switched, where data is divided into packets that are transmitted independently.
The document discusses computer network protocols and types of computer networks. It defines protocols as communication rules that specify how devices interconnect and exchange information. It describes several important protocols including TCP/IP, HTTP, SMTP, FTP and IP. It then explains the three main types of computer networks - the Internet, intranets and extranets - and provides details on their usage and differences.
ARPANET was the first wide-area packet switching network developed in the late 1960s under the US Advanced Research Projects Agency (ARPA). It served as the basis for today's internet and initially linked computers located at Pentagon-funded research institutions over telephone lines. A computer network connects computers together to allow for sharing of resources like files, printers or internet access. There are several types of computer networks including local area networks (LANs), personal area networks (PANs), metropolitan area networks (MANs), and wide area networks (WANs). Key components of computer networks include hardware like network interface cards (NICs), cables, routers, switches and software.
This document presents a LAN design project report for an organization with 70 users. It proposes a network with wired and wireless connectivity using Ethernet cables, switches, a router and access points. A central data server would be installed with antivirus software and connected to the network along with a DHCP server for dynamic IP address allocation. The network diagram and configurations are presented, along with the hardware, software and design guidelines required to implement the LAN.
This document discusses different types of network topologies, including physical topologies like ring, bus, star, mesh, tree, and hybrid, as well as logical topologies. For each physical topology, the key advantages and disadvantages are outlined. A ring topology forms a circular data path between devices, while a bus topology uses a single backbone cable. A star topology connects all devices to a central hub. A mesh topology interconnects all devices, providing redundancy. A tree topology arranges devices hierarchically like branches. A hybrid topology combines benefits of different topologies but with increased complexity.
A local area network (LAN) uses wired connections to connect devices within a limited geographic area like a building or campus. Ethernet became the dominant wired LAN technology using carrier sense multiple access with collision detection (CSMA/CD) to regulate shared access to the transmission medium. Ethernet has evolved from 10 Mbps to 100 Mbps to 1 Gbps standards to meet increasing bandwidth demands. Key components of wired LANs include network adapters, cabling, connectors, switches/hubs, and software protocols. Other historical wired LAN technologies like Token Ring and Token Bus used token passing for medium access but have been largely replaced by Ethernet.
Computer networks - CBSE New Syllabus (083) Class - XIIDeepak Singh
The document provides information on various computer networking concepts. It defines Internet of Things (IoT) and discusses the differences between public and private clouds. It also describes wired and wireless networks, the roles of clients and servers, and common networking hardware like NICs, switches, routers and access points. The document further explains networking protocols and standards such as IP versions, DNS, URLs, modulation techniques, and communication protocols like HTTP, FTP, SMTP and more.
Wireless network (cellular network architecture and http.)Abdullah Moin
Cellular architecture is constituted of the following − A network of cells each with a base station. A packet-switched network for communication between the base stations and mobile switching centres. The public switched telephone networks to connect subscribers to the wider telephony network.
In all cellular systems, land area is divided into a number of cells each with its radio service. In AMPS the area is large which in digital services, the area is much smaller. Conventionally cells are hexagonal in shape. Each cell uses a frequency range that is not used by its adjacent cells. However, frequencies may be reused in non-adjacent cells.
Data Communication
Networks & Internet
Protocols & Standards
Layered Tasks
Internet Model
OSI Model
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
Circuit switching and Telephone Network
Signals
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
This document provides an overview of basic networking concepts including protocols, protocol layers, network interconnection, and the Internet. It describes how networks are defined and addressed. The key protocol layers of OSI and TCP/IP models are examined including physical, data link, network, transport, and application layers. Common network types, topologies, and connectivity options are also summarized.
This document discusses various types of network hardware and software components. It describes network interface cards (NICs), hubs, switches, bridges, routers, gateways, and modems. NICs connect devices to the network, while hubs and switches connect multiple devices but switches have more intelligence. Bridges and routers connect different network segments, with routers having more advanced routing abilities. Gateways connect networks with different protocols. Modems convert digital and analog signals to connect networks to the internet.
Chapter 8 the role of networking in manufacturingN. A. Sutisna
This document discusses data communication and networking in manufacturing systems. It covers local area network concepts like topologies, protocols, and addressing. The most common high-level network topologies for manufacturing are bus structures and star networks. Bus networks offer flexibility in cable utilization but contention is an issue. Ring and star networks are also discussed along with techniques for resolving contention like CSMA/CD and token passing.
A computer network is a collection of connected computing devices that communicate and share resources. Connections between devices are usually made with physical wires or cables, but some use wireless radio waves or infrared signals. A network allows for resource and information sharing between connected devices, as well as communication applications like email, messaging, video conferencing, and more. The major types of networks include local-area networks (LANs) connecting devices in a small area, wide-area networks (WANs) connecting LANs over large distances like the Internet, and metropolitan-area networks (MANs) connecting infrastructure in cities.
This document provides an overview of important networking concepts. It discusses data communication components and various transmission mediums including Ethernet, Fast Ethernet, Gigabit Ethernet, LocalTalk, Token Ring, FDDI, ATM, and wireless technologies. It also describes common network hardware such as hubs, switches, bridges, repeaters, routers, and NICs. Finally, it covers common network media including twisted pair, coaxial, fiber optic, and wireless and discusses specifications for Ethernet and optical fiber.
Network devices such as repeaters, bridges, switches and routers are used to connect and expand networks. Repeaters regenerate signals to expand small networks, while bridges and switches can understand node addresses to segment networks. Routers interconnect different networks and determine optimal routes using network layer addresses and routing protocols. Remote access devices like modems and ADSL modems allow computers to connect to networks over telephone lines by modulating digital signals into analog for transmission.
A network consists of a collection of computers, printers and other compatible equipment/ hardware
that is connected together so that they can communicate with each other.
This document provides an overview of computer networks. It discusses network diagrams, classifications of networks by range including LAN, WAN, PAN and MAN. Common network topologies such as bus, star, ring and mesh are described. The OSI and TCP/IP models are explained. Common network devices, switching technologies, and transmission media are defined. Signal types including analog and digital are also summarized.
Bob Metcalfe designed the first Ethernet network at Xerox PARC in 1973 to connect computers and printers. Ethernet uses CSMA/CD (Carrier Sense Multiple Access with Collision Detection) where devices share a cable and can detect if two devices transmit at the same time causing a collision. The standard has since expanded and faster versions include Fast Ethernet that operates at 100 Mbps and Gigabit Ethernet at 1 Gbps. Switched Ethernet uses switches to connect devices and avoids collisions by routing traffic through separate ports or an onboard backplane when devices on the same switch need to communicate.
This document is a project report on computer networking prepared by Surender Singh for his summer training. It provides an introduction to networking and covers topics such as network types (LAN and WAN), network models (OSI model), networking cables, devices, IP addressing, routing, firewalls, wireless networks, and ISDN. The report defines what a computer network is, outlines the requirements and benefits of networking, and describes different network components and concepts at a high level.
Full video explained in Hindi
Check youtube channel -
The Avi Security
basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions. basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
This document provides information about planning and designing internet infrastructure. It defines internet infrastructure as the collection of hardware and software that enables internet operations, including transmission lines, routing equipment, DNS, email servers, databases, and other critical components. The key components of internet infrastructure are data centers, networks, computer equipment, storage services, and server applications. Common transmission media for internet infrastructure are coaxial cable, twisted pair cable, and fiber optic cable.
The document discusses basics of computer networks. It defines data communication and its key characteristics like delivery, accuracy and timeliness. The basic components of a communication model are identified as the message, protocol, sender, receiver and transmission medium. Different data types like text, numbers, images, audio and video are represented as bit patterns for transmission. Types of networks like personal area network, local area network, wide area network, campus area network and metropolitan area network are classified based on their geographical span, interconnectivity, administration and architecture.
The document provides an overview of networking concepts across different layers of the networking model. It discusses that a network includes interconnected devices like computers, servers, routers and wireless devices. The network core consists of routers that route data between hosts using protocols like IP. Modern data networks are packet switched, where data is divided into packets that are transmitted independently.
The document discusses computer network protocols and types of computer networks. It defines protocols as communication rules that specify how devices interconnect and exchange information. It describes several important protocols including TCP/IP, HTTP, SMTP, FTP and IP. It then explains the three main types of computer networks - the Internet, intranets and extranets - and provides details on their usage and differences.
ARPANET was the first wide-area packet switching network developed in the late 1960s under the US Advanced Research Projects Agency (ARPA). It served as the basis for today's internet and initially linked computers located at Pentagon-funded research institutions over telephone lines. A computer network connects computers together to allow for sharing of resources like files, printers or internet access. There are several types of computer networks including local area networks (LANs), personal area networks (PANs), metropolitan area networks (MANs), and wide area networks (WANs). Key components of computer networks include hardware like network interface cards (NICs), cables, routers, switches and software.
This document presents a LAN design project report for an organization with 70 users. It proposes a network with wired and wireless connectivity using Ethernet cables, switches, a router and access points. A central data server would be installed with antivirus software and connected to the network along with a DHCP server for dynamic IP address allocation. The network diagram and configurations are presented, along with the hardware, software and design guidelines required to implement the LAN.
The document provides information about basic local area networks (LANs). It defines LANs and wireless LANs, and describes their key characteristics such as topology and protocols. The document also discusses various network hardware including hubs, switches, bridges, routers, and network interface cards. It covers different types of network media like twisted pair, coaxial, fiber optic, and wireless. Finally, the document presents sample LAN implementations for home and business configurations.
Here are some key advantages and disadvantages of network virtualization:
Advantages:
- Increased flexibility and agility. Virtual networks can be quickly created and configured on demand. This allows for rapid provisioning of test/development environments and easier configuration changes.
- Improved resource utilization. Virtualization allows multiple virtual networks to utilize the same physical networking hardware, improving overall utilization of switches, routers, and other devices.
- Simplified management. Virtual networks can be centrally managed as logical entities rather than individual physical devices, reducing management overhead.
- Enhanced availability. Virtual networks and workloads can be live migrated in case of hardware failures to ensure continuity of operations.
Disadvantages:
- Performance
This document defines various computer networking terms and discusses different types of computer networks. It describes personal area networks (PANs), local area networks (LANs), and campus area networks (CAN). For LANs, it distinguishes between client/server networks and peer-to-peer networks. It also discusses different network topologies like bus, star, and ring topologies. Finally, it provides examples of shared hardware components on a network like printers, disk drives, and modems.
Basic networking in power point by suprabhaSuprabha Sahoo
Computer networking allows for the sharing of data and resources between connected computers. The main purpose is sharing information, hardware, software, and administration. Connected devices include network interface cards, cables, hubs/switches, routers, and network software. Common network topologies are peer-to-peer and client-server. Common network types include local area networks within an office and metropolitan area networks within a city.
The document discusses key concepts of networking including the three basic elements required: network hardware, software, and protocols. It describes common network types like LAN, WAN, and MAN and compares peer-to-peer and server-based networks. The OSI reference model and TCP/IP model are explained along with common network devices, cabling, and IP addressing schemes.
A LAN is a network confined within a limited geographic area that connects computers. LANs can connect as few as three computers but often link hundreds used by thousands of people. Standard networking protocols and media have resulted in widespread use of LANs in businesses and schools. Common LAN technologies include Ethernet, phone lines, and wireless. Ethernet uses coaxial or twisted pair cabling and a hub to connect computers, while phone lines use existing telephone wiring. Wireless networks use radio signals and no cabling.
The document discusses various topics related to networking infrastructure and protocols:
1. It describes the components of a structured cabling system and benefits of an extended star topology used for cabling.
2. It explains several key protocols used at different layers of the OSI model including SMTP, ARP, FTP, and SSL and their functions.
3. It discusses wireless networking components like wireless routers/modems and adapters and how Wi-Fi works based on IEEE 802.11 standards at the physical and data link layers.
4. It covers Wi-Fi standards, advantages and disadvantages of wireless networking, and factors to consider for wired vs wireless implementation in a LAN.
A local area network (LAN) connects devices within a small geographic area like a home or office building. Devices on a LAN share network resources through a common communication line or wireless link. Basic networking hardware like hubs, switches, bridges and routers help connect devices on a LAN and manage traffic. Wired LANs commonly use twisted pair or fiber optic cable, while wireless LANs transmit over radio frequencies. The document provides examples of home and business LAN configurations using these basic networking concepts and components.
The document discusses the history and development of the Internet. It began in 1969 as the ARPANET, a network created by the US government to connect universities and research labs. No single organization owns the Internet, which uses TCP/IP protocols and packet switching to connect networks worldwide. Local area networks (LANs) connect computers within the same building, while wide area networks (WANs) connect LANs across greater distances. The document also covers network topologies, types, layers of the OSI model, and common Internet services like email and search engines.
A local area network (LAN) connects devices within a small geographic area like a home or office building. Devices share network resources through a common communication line or wireless link. Basic LAN hardware includes hubs, switches, bridges, and routers to connect devices and manage traffic. Common wired media are twisted pair, coaxial, and fiber optic cables while wireless uses radio frequencies. An example home LAN uses a wireless router to share an internet connection among devices. A typical business LAN connects multiple floors or buildings with switches, routers, and fiber optic backbone.
A local area network (LAN) connects devices within a small geographic area like a home or office building. Devices share network resources through a common communication line or wireless link. Basic LAN hardware includes hubs, switches, bridges, and routers to connect devices and manage traffic. Common wired media are twisted pair, coaxial, and fiber optic cables. Wireless LANs use radio waves to transmit over short distances without cables. Example LAN implementations show how these components connect devices in home and business settings.
This document discusses the key components of a local area network (LAN). It describes common network topologies like star, ring, bus and mesh. It also covers different types of network classifications based on transmission technologies and architecture. The main hardware components of a LAN discussed include network interface cards, hubs, switches, cables and connectors, routers and modems. Important software components mentioned are network operating systems and protocol suites.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
Computer networks allow two or more computers to connect and communicate electronically for sharing resources and data. The key goals of networking include resource sharing, high performance, reliability, inter-process communication, security, and flexible access to files from any computer on the network. Computer networks have hardware components like network interface cards, servers, clients, and transmission media, as well as software including network operating systems and protocols. Cables that connect the hardware include twisted pair, coaxial, and fiber-optic cables.
Networking connects computing devices together to share data. It allows devices to communicate through a mix of hardware like cables and wireless equipment, and software like communication protocols. Networks can be categorized based on their geographic reach - local area networks (LANs) span a small area like a home or office, while wide area networks (WANs) connect across cities, states or globally. The largest public WAN is the Internet. Networks also use common protocols like TCP/IP to define the language devices use to communicate. While wired networks were traditionally used, wireless networking has become more popular for new installations.
Course Code: CS-301
Course Title: Introduction to Computing.
Degree: BS (SE, CS, BIO)
Contents of this chapter:
Basic information about computer networks, types of computer networks. Other contents include:
1. List four major benefits of connecting computers to form a network.
2. Define the terms LAN, WAN, and MAN.
3. List the three types of networks.
4. Name the three physical topologies used to build networks.
Similar to Network system on Ahsanullah University of Science & Technology (20)
This document discusses the key elements of a computer system and provides classifications of different types of computers and software. It can be summarized as:
1. The six primary elements that make up a computer system are hardware, software, people, procedures, data, and connectivity. Hardware includes physical components like keyboards and monitors, while software includes operating systems, applications, and utilities.
2. There are six types of personal computers: desktops, workstations, notebooks, tablets, handhelds, and smartphones. Software is classified as either system software, which operates hardware and provides platforms for applications, or application software, which helps users perform tasks.
3. A computer's generation is defined by its technology - first
The document provides an overview of multinational financial management. It discusses the goal of maximizing shareholder wealth for multinational corporations (MNCs) and the conflicts against this goal, such as agency problems between managers and shareholders. It also describes theories justifying international business, such as comparative advantage, and common methods for conducting international business, such as exporting, licensing, and foreign direct investment. Finally, it addresses how management structure and technology impact agency costs and the flows of cash for MNCs.
This document discusses international flows of funds and balance of payments. It explains that the balance of payments records all transactions between domestic and foreign entities over a period of time. It is made up of a current account, capital account, and financial account. The current account covers trade in goods and services as well as income flows. A country's balance of payments can be influenced by economic factors like exchange rates, inflation, national income, and government policies. It also discusses how trade imbalances can be corrected and describes several international organizations that facilitate global capital flows and trade.
1) The document discusses various exchange rate systems such as fixed rates, floating rates, managed floats, and pegged rates. It also discusses currency boards and the exposure of pegged currencies.
2) It describes the European single currency, including participating countries, its impact on monetary policy and business, and its status.
3) The document outlines how governments can directly and indirectly intervene in currency markets and discusses intervention as a policy tool to influence economic outcomes. It also discusses how central bank intervention can affect the value of multinational corporations.
The document discusses exchange rate determination and factors that influence exchange rates. It explains how exchange rates are measured in terms of currency appreciation and depreciation. The equilibrium exchange rate is determined by the demand and supply of currencies. Key factors that affect exchange rates are discussed, including relative inflation rates, interest rates, income levels, and government controls. Commercial banks sometimes speculate on anticipated exchange rate movements by taking positions in currencies they forecast will appreciate or depreciate.
This document discusses various currency derivatives including forward contracts, futures contracts, and options contracts. Forward contracts allow companies to lock in an exchange rate for a currency transaction occurring at a future date. Currency futures contracts are standardized exchange-traded contracts that allow hedging or speculation on anticipated exchange rate movements. Currency options provide the right but not the obligation to buy or sell a currency at a predetermined exchange rate, and are used by companies and speculators. These derivatives allow risk related to currency fluctuations to be transferred or mitigated.
This document provides an overview of key concepts from several finance chapters. It includes definitions of finance, the three major financial decisions of investment, financing, and asset management. It also discusses why wealth maximization rather than profit maximization should be the main goal of a firm. Key concepts like agency problem, how it is solved, corporate social responsibility, risk and return, types of risk, and attitudes toward risk are summarized. The document is a study guide providing questions and answers on these topics from various textbook chapters.
Internship Report on Financial Analysis of Delta Life Insurance Company Ltd.Manas Saha
The document provides an overview of Delta Life Insurance Company Ltd., including its history, vision, goals, products and services. Some key points:
- Delta Life was established in 1986 as one of the first private life insurance companies in Bangladesh. It introduced innovative microinsurance products to serve low-income customers.
- The company's vision is to be the premier life insurance company in Bangladesh and serve customers with respect by providing the best solutions.
- Its goals include maximizing value for policyholders and shareholders. Core values focus on trust, understanding, respect, excellence and teamwork.
- Products include ordinary life insurance, Gono Grameen Bima (microinsurance), group life insurance, and health
The document discusses the Essential Commodities Act of 1957 in Bangladesh. It defines key terms like "essential commodity" and outlines the government's powers to control production, supply, distribution and prices of essential commodities. These powers include issuing orders to regulate or prohibit certain activities and requiring licenses. Contravention of government orders can result in imprisonment, fines and property forfeiture. The document provides details on offenses, penalties, presumption of orders and protection of actions taken under the Act.
Marine Insurance of Pioneer insurance company ltd.Manas Saha
The document provides an overview of insurance in Bangladesh, including:
1) A brief history of insurance in Bangladesh from before independence to the present day, including the nationalization of companies and establishment of private insurers.
2) Details on key insurance legislation and regulations in Bangladesh, including allowing private insurers to operate.
3) An overview of Pioneer Insurance Company, including its founding, leadership, financial details, branches, investments, premium income, claims payments, and types of insurance offered.
Network system on Ahsanullah University of Science & TechnologyManas Saha
This document describes the network infrastructure of Metronate Bangladesh Ltd. It details the connections established in June-July 2008 and December 2010. It provides information on the types of connections used including fiber, UTP, switches and wireless routers. It also lists the various departments in the organization and number of computers connected for each department.
There are several methods of business communication described. Employee bulletins are used to quickly inform employees of important news and allow them to start work promptly. Booklets for new employees provide information about company history, rules, and expectations to help them understand their role. Annual reports share the previous year's achievements, finances, and performance with employees and others. Wall newspapers publish employee talents and company updates monthly or yearly. Payroll envelopes include salary details and any adjustments. Job descriptions outline responsibilities, tasks, and expectations. Memorandums provide additional instructions to employees. Complaint boxes allow anonymous employee feedback to address issues.
Marketing involves creating value for customers and managing relationships to benefit the organization. It includes developing products customers want, pricing correctly, availability, and promotion. Effective marketing not only increases sales but builds a recognized brand that can be more valuable if the company is sold. Companies that focus on marketing will be more attractive to potential investors by creating brand awareness, commanding premium prices, generating happy customers and referrals, establishing replicable marketing systems, ensuring repeat revenue, and cultivating brand ambassador employees. Marketing is crucial for businesses to succeed by getting the word out, increasing sales, building reputation, and fostering healthy competition.
Factors influencing company marketing strategyManas Saha
There are several factors that influence a company's marketing strategy, including:
1) Demographic, technological, political, and cultural environments which shape consumer behavior and preferences.
2) Marketing intermediaries like agents and retailers that help connect producers and consumers.
3) Publics like customers, investors, and media that have associations with the company.
4) Competitors in the same industry offering similar products or services which can impact pricing.
Chapter 5: major media of written communicationManas Saha
The document summarizes three major forms of written communication - letters, memorandums, and reports. It provides details on the structure and format of letters, including personal, applied, and different types of applied letters. It also discusses the key parts and structure of memorandums. Finally, it defines reports as organized statements presenting facts from an investigation along with opinions and recommendations, and outlines the typical format of a business report.
The document describes different types and methods of communication. There are three main types of communication classified by method: written, oral, and nonverbal. Written communication involves symbols and can include letters, emails, reports etc. Oral communication uses spoken words like conversations and presentations. Nonverbal communication conveys messages through actions, gestures, facial expressions without words. Communication is also classified by flow of information as upward, downward, horizontal, and vertical depending on direction. Additionally, communication differs in terms of audience as internal within an organization or external to outside groups. Various written communication methods are also outlined such as memos, job descriptions, and complaint boxes.
There are several types of communication. Written communication avoids distortion of meaning and provides a permanent record, but oral communication allows for easy response and motivation. Non-verbal communication uses symbolic methods like gestures. Communication can also be classified by its method (visual, audiovisual), flow of information (downward, upward, horizontal), relationship to the organization (formal, informal), and function (organizational, routine, specialized, promotional). Overall, the types of communication provide different benefits depending on the situation and goals.
Chapter 3: Barriers in the communication process Manas Saha
There are several barriers that can interfere with effective communication in an organization. These include barriers due to organizational structure like excessive layers in the hierarchy, lack of discipline, and poor executive-subordinate relations. Individual barriers include personal conflicts, biases in perception, favoritism, insincerity, and fear. Language and semantic barriers occur when ambiguous words are used or local dialects are not understood. Status and position differences can also create barriers through suspicious attitudes, flattery to gain favor, or only partial listening. Other barriers are lack of proper planning, poorly expressed messages, work pressures leaving little time to communicate, making wrong assumptions, and intentionally providing fraudulent information.
Status, Potential and Constraints in e-business application in BangladeshManas Saha
The document discusses the status, potential, and constraints of e-business applications in Bangladesh. It provides definitions of e-business and outlines some of the key technologies used, including EDI, email, the world wide web, and online shopping. It notes that while e-business adoption is still limited in Bangladesh due to infrastructure and economic constraints, sectors like banking and RMG have started to embrace e-business. The key constraints to further e-business growth are lack of infrastructure, technical skills, and cyber laws, as well as low incomes and slow internet services.
Part 2 Deep Dive: Navigating the 2024 Slowdownjeffkluth1
Introduction
The global retail industry has weathered numerous storms, with the financial crisis of 2008 serving as a poignant reminder of the sector's resilience and adaptability. However, as we navigate the complex landscape of 2024, retailers face a unique set of challenges that demand innovative strategies and a fundamental shift in mindset. This white paper contrasts the impact of the 2008 recession on the retail sector with the current headwinds retailers are grappling with, while offering a comprehensive roadmap for success in this new paradigm.
How to Implement a Real Estate CRM SoftwareSalesTown
To implement a CRM for real estate, set clear goals, choose a CRM with key real estate features, and customize it to your needs. Migrate your data, train your team, and use automation to save time. Monitor performance, ensure data security, and use the CRM to enhance marketing. Regularly check its effectiveness to improve your business.
Understanding User Needs and Satisfying ThemAggregage
https://www.productmanagementtoday.com/frs/26903918/understanding-user-needs-and-satisfying-them
We know we want to create products which our customers find to be valuable. Whether we label it as customer-centric or product-led depends on how long we've been doing product management. There are three challenges we face when doing this. The obvious challenge is figuring out what our users need; the non-obvious challenges are in creating a shared understanding of those needs and in sensing if what we're doing is meeting those needs.
In this webinar, we won't focus on the research methods for discovering user-needs. We will focus on synthesis of the needs we discover, communication and alignment tools, and how we operationalize addressing those needs.
Industry expert Scott Sehlhorst will:
• Introduce a taxonomy for user goals with real world examples
• Present the Onion Diagram, a tool for contextualizing task-level goals
• Illustrate how customer journey maps capture activity-level and task-level goals
• Demonstrate the best approach to selection and prioritization of user-goals to address
• Highlight the crucial benchmarks, observable changes, in ensuring fulfillment of customer needs
Storytelling is an incredibly valuable tool to share data and information. To get the most impact from stories there are a number of key ingredients. These are based on science and human nature. Using these elements in a story you can deliver information impactfully, ensure action and drive change.
[To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
This presentation is a curated compilation of PowerPoint diagrams and templates designed to illustrate 20 different digital transformation frameworks and models. These frameworks are based on recent industry trends and best practices, ensuring that the content remains relevant and up-to-date.
Key highlights include Microsoft's Digital Transformation Framework, which focuses on driving innovation and efficiency, and McKinsey's Ten Guiding Principles, which provide strategic insights for successful digital transformation. Additionally, Forrester's framework emphasizes enhancing customer experiences and modernizing IT infrastructure, while IDC's MaturityScape helps assess and develop organizational digital maturity. MIT's framework explores cutting-edge strategies for achieving digital success.
These materials are perfect for enhancing your business or classroom presentations, offering visual aids to supplement your insights. Please note that while comprehensive, these slides are intended as supplementary resources and may not be complete for standalone instructional purposes.
Frameworks/Models included:
Microsoft’s Digital Transformation Framework
McKinsey’s Ten Guiding Principles of Digital Transformation
Forrester’s Digital Transformation Framework
IDC’s Digital Transformation MaturityScape
MIT’s Digital Transformation Framework
Gartner’s Digital Transformation Framework
Accenture’s Digital Strategy & Enterprise Frameworks
Deloitte’s Digital Industrial Transformation Framework
Capgemini’s Digital Transformation Framework
PwC’s Digital Transformation Framework
Cisco’s Digital Transformation Framework
Cognizant’s Digital Transformation Framework
DXC Technology’s Digital Transformation Framework
The BCG Strategy Palette
McKinsey’s Digital Transformation Framework
Digital Transformation Compass
Four Levels of Digital Maturity
Design Thinking Framework
Business Model Canvas
Customer Journey Map
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf46adnanshahzad
How to Start Up a Company: A Step-by-Step Guide Starting a company is an exciting adventure that combines creativity, strategy, and hard work. It can seem overwhelming at first, but with the right guidance, anyone can transform a great idea into a successful business. Let's dive into how to start up a company, from the initial spark of an idea to securing funding and launching your startup.
Introduction
Have you ever dreamed of turning your innovative idea into a thriving business? Starting a company involves numerous steps and decisions, but don't worry—we're here to help. Whether you're exploring how to start a startup company or wondering how to start up a small business, this guide will walk you through the process, step by step.
Discover timeless style with the 2022 Vintage Roman Numerals Men's Ring. Crafted from premium stainless steel, this 6mm wide ring embodies elegance and durability. Perfect as a gift, it seamlessly blends classic Roman numeral detailing with modern sophistication, making it an ideal accessory for any occasion.
https://rb.gy/usj1a2
IMPACT Silver is a pure silver zinc producer with over $260 million in revenue since 2008 and a large 100% owned 210km Mexico land package - 2024 catalysts includes new 14% grade zinc Plomosas mine and 20,000m of fully funded exploration drilling.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.AnnySerafinaLove
This letter, written by Kellen Harkins, Course Director at Full Sail University, commends Anny Love's exemplary performance in the Video Sharing Platforms class. It highlights her dedication, willingness to challenge herself, and exceptional skills in production, editing, and marketing across various video platforms like YouTube, TikTok, and Instagram.
At Techbox Square, in Singapore, we're not just creative web designers and developers, we're the driving force behind your brand identity. Contact us today.
Digital Marketing with a Focus on Sustainabilitysssourabhsharma
Digital Marketing best practices including influencer marketing, content creators, and omnichannel marketing for Sustainable Brands at the Sustainable Cosmetics Summit 2024 in New York
Company Valuation webinar series - Tuesday, 4 June 2024FelixPerez547899
This session provided an update as to the latest valuation data in the UK and then delved into a discussion on the upcoming election and the impacts on valuation. We finished, as always with a Q&A
Best practices for project execution and deliveryCLIVE MINCHIN
A select set of project management best practices to keep your project on-track, on-cost and aligned to scope. Many firms have don't have the necessary skills, diligence, methods and oversight of their projects; this leads to slippage, higher costs and longer timeframes. Often firms have a history of projects that simply failed to move the needle. These best practices will help your firm avoid these pitfalls but they require fortitude to apply.
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...my Pandit
Explore the fascinating world of the Gemini Zodiac Sign. Discover the unique personality traits, key dates, and horoscope insights of Gemini individuals. Learn how their sociable, communicative nature and boundless curiosity make them the dynamic explorers of the zodiac. Dive into the duality of the Gemini sign and understand their intellectual and adventurous spirit.
The Genesis of BriansClub.cm Famous Dark WEb PlatformSabaaSudozai
BriansClub.cm, a famous platform on the dark web, has become one of the most infamous carding marketplaces, specializing in the sale of stolen credit card data.
The Genesis of BriansClub.cm Famous Dark WEb Platform
Network system on Ahsanullah University of Science & Technology
1. AHSANULLAH UNIVERSITY OF SCIENCE & TECHNOLOGY
2012
Introduction to Computer in Business
(Course: 215)
Assignment on: Network System: A case study
on Ahsanullah University of Science &
Technology
School of Business
1 4 1 - 1 4 2 L O V E R O A D , T E J G A O N I N D U S T R I A L A R E A , D H A K A 1 2 0 8
2. INTRODUCTION
NETWORK:
A Network is a set of technologies including hardware, software & media that can be used to
connect computers together. It enables them to communicate, exchange information & share
resources in real time. Network open up new ways to communicate, such as e-mail & instant
messaging (IM).
By allowing users to share expensive hardware resources such as printer, network reduce the cost
of running an organization.
TYPES OF NETWORKS:
Network can be classified in two ways:
1. Common types of Network: It includes:
Local Area Network (LAN)
Wide Area Network (WAN)
3
3. 2. Hybrid Network: It includes:
Campus Area Network (CAM)
Metropolitan Area Network (MAN)
Home Area Network (HAM)
Network Topology:
The logical Layout of the cables & devices that connect the nodes of the network is called
Topology. The kind of topology or combinations of topologies to use depends on:
a. The type of computers & cabling in place
b. The distance between computers
c. The speed at which the data must travel around the
network
d. The cost of setting up the network
The Types of Network Topology:
Different types of topologies are as follows:
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Bus Topology: Network use one cable, all the nodes & peripheral devices are connected in a
series to that cable.
Star Topology: All the nodes are connected to a hub or switch & communicate through it.
Ring Topology: Connects the network’s nodes in a circular chain, with each node connected to
the next. The last node connects to the first completing the ring.
Mesh Topology: A cable runs from every computer to every other computer.
4
4. Networking History in Ahsanullah university of Science & Technology
(AUST):
At AUST there is internet & Wi-Fi connection. The Internet Connection was connected in June-
July, 2008. The Internet Service Provider (ISP) is Metronate Bangladesh Ltd. The Wi-Fi
connection was connected in December, 2010. It is connected by Banglalion. The band width
speed of the Internet is normally 100 kbps.
Department wise Networking System in AUST:
There are 7 departments. All the departments have total 10 computer labs which are connected
to a router through star topology. Most of the PC is connected to the Internet. They are connected
Through Local Area Network (LAN). The basic connecting system is as below:
Figure: Internal Networking System in a Lab
The features of the computer labs of AUST are as follows:
School of Business Department:
There are total 40 PCs.
They are connected through Local Area Network
(LAN)
Operating System: Windows XP
Service Pac -2
Software: Microsoft Office 2007, SPSS, Turbo –C
for using C++
1 piece Pentium 4 & the rest are XP
Monitor: Samsung
Server Switch
Blue Cable/
Internet Cable
PC
5. 5
Department of Textile Technology:
There are total 31 PCs
Operating System: Windows XP
Link+ Internet
Printer Connected
1 PC has Core-1,rest of the PCs have Dual Core
Software: Programming, Graphics, Textile related
software
Speed: 60-100 kbps
Department of Electrical & electronic Engineering:
Having 3 Computer Lab
Total 38 PCs, 10 have Internet connection, all are
running
Speed: 60-100 kbps
Monitor: Model-CRT
O.S: Windows XP
Service Pac- 2,3, license key & without license key
Core 2, Dual Core
Software: C++, Met lab, Or cad, Micro-wild, Silos,
DHCH-2
Department of Computer Science & Engineering:
Windows XP
Having Internet connection
Linux
Software: S- 27
Besides the core network & Internet Service System of the university are also maintained under
the guidance of the department, & the major servers are located at the “University Server
Room”.
Department of Civil Engineering:
Having Computer Aided Design & Drafting Lab
Monitor: 26 are IBM, rest are ACO
O.S: Windows XP
6. Having 34 PCs, all have internet connection
4 PC have Dual Core, 26 have Pentium -4
6
Software: Auto-cad, E- tabs, Microsoft 2007
6 PCs have Service Pac- 2, rest have Service Pac -3
Speed: 10-20 kbps
Ram: 4 PC have 2 GB, 25 have 512 GB, 1 has 1GB
Hard-disk: 26 PC have 80 GB, 8 PC have 300 GB
Department of Architecture:
Having 1 Computer Lab, 30 PCs
O.S: Windows XP, Microsoft 2007
4 PCs have internet connection
Software: Auto-cad, Sketch-up
4 PCs have Core 2
Network Media:
Network media refers to the means used to link a network’s node together.
Types of Network Media: Network media is of two kinds:
1. Wire-Based Media
a. Twisted pair cable
b. Coaxial cable
c. Fiber optic cable
2. Wireless Media
a. Radio signal
At AUST there is both the wire-based & wire-less network media. They basically use “UTP cable” &
“Fiber optic cable”.
7. 7
UTP Cable: UTP is Unshielded Twisted Pair loom. It can flow data in a distance of 100 meters
authentically. If the distance is more than 100 meters then intermediary devices can be used. Maximum 3
intermediary devices can be in this regard. The market value of UTP cable is TK.30-35 per meter.
Image: UTP Cable
Fiber Optic Cable: The inner part of this cable is of glass-core. There is gel which protects the inner part
& helps to avoid hard-crack. It is expensive. The market value of Fiber Optic Cable is Tk. 200-250 per
meter.
8. Image: Fiber Optic Cable
8
Network Hardware: All data moves between PCs, it needs to be channeled properly to
reach its final destination. To make this possible, the proper hardware must be attached to &
between all PCs.
Types of network Hardware:
1. Network Interface Cards (NICs): Hardware
components to control the flow of data.
2. Network linking Devices: Interconnect at least two
computers. It includes Hubs, Bridges, and Switches & Routers.
3. Cabling Equipment: It is designed to work with a
certain kind of network topology & each one has certain standard feature. It includes
Ethernet, fast Ethernet, Gigabit Ethernet, and Token Ring.
Switch
Definition:A network switch is a small hardware device that joins multiple computers
together within one local area network (LAN). Technically, network switches operate at layer
two (Data Link Layer) of the OSI model.
Network switches appear nearly identical to network hubs, but a switch generally contains more
intelligence (and a slightly higher price tag) than a hub. Unlike hubs, network switches are
capable of inspecting data packets as they are received, determining the source and destination
device of each packet, and forwarding them appropriately. By delivering messages only to the
9. connected device intended, a network switch conserves network bandwidth and offers generally
better performance than a hub.
Image: Switch (Front Side) Image: Switch (Back Side)
9
Image: Connected Switch
Router
Definition:Routers are physical devices that join multiple wired or wireless networks
together. Technically, a wired or wireless router is a Layer 3 gateway, meaning that the
wired/wireless router connects networks (as gateways do), and that the router operates at the
network layer of the OSI model.
10. Home networkers often use an Internet Protocol (IP) wired or wireless router, IP being the most
common OSI network layer protocol. An IP router such as a DSL or cable modem broadband
router joins the home's local area network (LAN) to the wide-area network (WAN) of the
Internet.
By maintaining configuration information in a piece of storage called the routing table, wired or
wireless routers also have the ability to filter traffic, either incoming or outgoing, based on the IP
addresses of senders and receivers. Some routers allow the home networker to update the routing
table from a Web browser interface. Broadband routers combine the functions of a router with
those of a network switch and a firewall in a single unit.
10
Image: Router (Front Side) Image: Router (Back Side)
Node
Definition: A node is any device connected to a computer network. Nodes can be computers,
personal digital assistants (PDAs), cell phones, or various other network appliances. On an IP
network, a node is any device with an IP address.
11. Total Networking System in AUST:
In AUST there are two types of connectivity, wire-based connectivity & wire-less connectivity.
In wire-based connectivity the Server is connected through “Fiber Optic Cable” to the Router.
“The Router” is a Networking device. It is used to connect two or more than PCs. There are
many ports in a Router. One port is connected to the “Mail Server” & another one is connected
to the “Proxy Server”.
Proxy Server:
All the PCs of the University are connected to the Proxy Server. This Proxy Server is configured
in a way that it can do multiple works.
It works as Proxy server/ Squid Server
It works as Dynamic Host Configuration Protocol (DHCP) Server
It works as Bandwidth Controller (Squint)
It works as MRTG, Bandwidth usage
11
The Proxy Server is Linux Based Server. This Proxy Server can allocate net facility for a specific
time in different Laboratories. The speed of the Switch is 100 mbps in LAN Bandwidth. If
anybody searches for any websites which was searched before on that day then the proxy server
would provide it from its cash-memory. In case of downloading huge page it would be faster.
The DHCP is in configured in AUST Server. There are so many PCs in AUST. Every PC has a
unique IP address. To get unique IP address “Obtained IP Address Automatically” must be
selected. Then every PC would be identified uniquely. There would be no conflict, no
overlapping.
The Bandwidth Controller supplies 4 mbps. It controls how much mbps would get each
department. It can assign bandwidth. In this case Linux –Based Package Software is used. It can
be monitored from the server that which PC gets how much mbps.
The MRGT is updated in every 5 minutes. It shows graphically that if they get the required mbps
that is 4 mbps. It can be shown on day basis or monthly basis.
Mail Server:
The Mail Server is used by the teachers or employees of the University. They use this Server by logging
in mail.aust.edu. They have unique IP address through which they can send/transfer mail.
Networking:
The Proxy Server is connected to a Switch through the “UTP Cable”. There is a limitation to transfer data
through UTP Cable. It can transfer data to a maximum distance of 100 meters without any loss. If the
distance is more than 100 meters then data missing is occurred.
12. As a result, when the distance is more than 100 meters they use “Fiber Optic Cable” to transfer data. In
AUST Building there is 4 Blocks (Block A, Block B, Block C & Block D). These Block have a distance
more than 100 meters. So, there is 4 Manageable “Fiber Switch”. Each Fiber Switch is situated in the
middle position of the building. As for example in level 3, EEE department there is a Fiber Switch in the
central position. The Fiber Switch is connected by Fiber Optic Cable as the distance is above 100 meters.
All the PCs of Block A is connected to the Fiber Switch of Block A & so on.
The Server is used to distribute proper internet service to all the students & if there is any need to control
anything.
The AUST has Caspersky Anti-virus Server. The Server based Anti-virus is used in different computer
labs.
AUST’s Server is hosted in USA. The main server is there. From here, they can up-load, customize etc.
12
Wi-Fi Network:
In AUST there is Wi-Fi connection. It is completely detached from wire connectivity. The connectivity is
received by Banglalion Outdoor Unit. It is, as described before, connected to the Proxy Server, then
Switch, then wire-less Router. It can be monitored by proxy server also. The Wi-Fi network is connected
in Ground Floor & level-1.
15. The Network System in AUST can be shown in flow-chart:
UTP Cable
Fiber Cable UTP Cable Fiber Cable
Fiber Cable Fiber Cable
UTP Cable
Figure: Network System
15
ISP
Router
Mail
Server
Proxy
Server
Manageable Fiber+
UTP Switch
Manageable Fiber
Switch
Fiber Switch
(Block-C)
Fiber Switch
(Block-D)
Fiber Switch
(Block-A)
Fiber Switch
(Block-B)
PC 1 PC 2
Switch/ hub
Kaspersky Anti-
virus Server
16. The Wi-Fi Zone of AUST is shown in the following flow-chart:
UTP Cable
Figure: Wi-Fi Network
16
Banglalion
Outdoor Unit
Proxy
Server
Switch
Wireless
Router
Wireless
Router
Wireless
Router
Wireless
Router
PC PC PC PC
17. CONCLUSION
From this survey & assignment we can see how a Network System is connected in an
Organization. I have learnt how it works, also learnt the structure of the Network System. In the
Network System the most common factor is to connect the switches/routers/devices in a proper
way with a cost-effective media. The UTP Cable plays the most important role in this regard. As
it is less expensive than Fiber Optic Cable. A proper Network System can go along run in
management of an organization.
17
18. REFERENCE
Introduction to Computer by Norton
Computer Labs of AUST
Lab Assistants of AUST
System Engineer of AUST
Different Books/websites
www.about.com
www.buzz.off.com
www.dictionary.com
Images from AUST Computer Lab, Server Room &websites
www.answer.com
Thank You