Sie sind auf Seite 1von 81

Declaration

We hereby declare that our project report on


Configuring Data Network having Switches,
Routers and Servers for an organization. Is an
authentic and original work done by us. We have
undertaken this project as a part of our course
curriculum

for

the

degree

of

Bachelor

of

Commerce (C.A.) from St. Aloysius Autonomous


College, Jabalpur (M.P.).

NEERAJ SINGH GURJAR


HENERY BERNARD BASTIAN
SRISHTY DAS
RONNIE KOCHAR

AAKANCHHA SHARMA

Certificate

It is certified that this Project Report


whose guide MR. D. C. Sonkhla has been
prepared under my guidance by NEERAJ SINGH
GURJAR,

HENERY

BERNARD

BASTIAN,

SRISHTY DAS, RONNIE KOCHAR, AAKANCHHA


SHARMA

of

class

B.COM.

VIth

Sem.,

St.

Aloysius College, Jabalpur. After taking their


training at B.R.B.R.A.I.T.T.

Signature:

Name

of

guide:

About the Institution


I
did
my
training
and
Project
from
B.R.B.R.A.I.T.T. (Bharat Ratna Bhim Rao
Ambedkar Institute of Telecom Training ISO
9001:2008 Certified Institute.) It is a Premiere
National Level Telecommunication Training
Center of B.S.N.L. (Bharat Sanchar Nigam Ltd.
The knowledge and teaching skills the center
has, proves itself that you are actually learning
in a national level institute. It has Asias 3 rd
largest lab and with it they are fully equipped
with things we have never imagined. From the
teaching skills to the equipments to the
Computer Lab we were blessed to study in an
institute like that. Also, BRBRAITT is one of the
premier institutes of BSNL, imparting training in
various fields like latest technologies in field of
telecommunications,
computer
networking,
accounting, management, providing competency
and skills to meet the ever-changing needs of
esteemed customers.

Mission :- To Deliver Quality Training to the


best of participants satisfaction. To Deliver
Excellence through Training.
Quality Policy : "The management, the faculty
and

the

staff

of

BRBRAITT

affirm

their

commitment to impart quality training to all its


values customers and to ensure to optimally
utilize the resources of the institute. For this,
every faculty and individual of BRBRAITT will
abide

by

Management

the

ISO

System'

9001:2008
standards

'Quality
and

will

demonstrate its compliance in all areas of


activities."

A simple en-route to our institute

A brief History of B.R.B.R.A.I.T.T.


History of the Institute Telecom Training Centre
which has been renamed as Bharat Ratna Bhim
Rao Ambedkar Institute of Telecom Training

(B.R.B.R.A.I.T.T.) from 30th May, 1992 had its


origin at Calcutta where it initially started
functioning in the 1920's.
During the Second World War, it
was however, decided to locate it at Jabalpur
where it commenced activities from 22nd April
1942. In the beginning the Training Centre was
set up in the Telecom Factory compound at
Wright Town, Jabalpur. Since this did not provide
adequate space for conducting the training
activities effectively, the TTC was shifted to a
new building at Ridge Road, Jabalpur and the
training activities started functioning in its new
campus from 1956. Since then, BRBRAITT has
made a continued effort to cater to the training
needs
of
the
Indian
Telecommunication
Department, other allied organisations and
foreign participants. The Training Centre has a
campus of 35 acres with administrative building
of 11,792 square metres in area. It has also got
207 staff quarters and four hostels with a
capacity to accommodate about 400 trainees.
The Training Centre was renamed as "Bharat
Ratna Bhimrao Ambedkar Institute of Telecom
Training "; on 30th May 1992.

Organization Chart of BRBRAITT Jabalpur

Facilities of B.R.B.R.A.I.T.T.
Bharat Ratna Bhim Rao Ambedkar Institute of
Telecom Training, Jabalpur, located in the center
of India, is a self-contained campus full of life
and amenities. It is spread over a lush green
landscape of over
building

acres of land. Besides main

complex

administrative

which

offices,

class

houses

the

rooms

and

laboratories, there are elaborate facilities like


hostel

for

trainees,

residential

complex,

shopping center, bank and post office etc.


Training
BRBRAITT has excellent facilities for training.
The

lecture

rooms

at

the

BRBRAITT

are

equipped with modern teaching aids. Emphasis


is given on simulation of conditions existing in
the work environment. Hands-on training on
systems

is

encouraged.

CBT

available for self-paced learning.


Laboratories

packages

are

BRBRAITT has well equipped laboratories/model


exchanges for Training in switching systems.
The facilities include laboratories equipped with
C-DoT, OCB, Alcatel GSM MSC, ZTE CDMA
MSC, MPLS-VPN, Multiplay Broadband, DWDM,
SDH, VDL etc.
Library
BRBRAITT is equipped with well organized
library containing 32189 books and 236
technical
journals
on
telecommunication,
computer, management and others. Library is
also having internet facility.
Sports & Leisure
BRBRAITT is equipped with a variety of In-door
and Out-door sports activities like: Table Tennis
Badminton (In-door court)
Lawn Tennis
Cricket
Gymnasium
Hostel
Complex
There are Four well furnished hostels providing
residential facilities to around 300 participants:

Vikram Bhavan, Jagdish


Bhavan, Raman Bhavan.

Bhavan,

Bhatnagar

Wi-Fi/Wireline Internet Connectivity is available


in all the hostels, Seminar Hall and Conference
Hall of BRBRAITT.

Project Description
About the Project
The

project

is

on

configuration

of

data

networking using routers, switches and servers


in an organization. In this project we, being a
group of five members have moduled this project
into five major points. An organization having
five networks with LAN connectivity. In one
network we have two PCs. The PCs are
connected to a switch then to a router and then
to another network. In this organization we need
two PCs in each network that is we required ten
PCs and two switches and two routers.

Switch

A network switch is a small hardware device


that joins multiple computers together within
one

local

area

network

(LAN).

Technically,

network switches operate at layer two (Data


Link Layer) of the OSI model.
Network switches appear nearly identical to
network hubs, but a switch generally contains
more intelligence (and a slightly higher price
tag) than a hub. Unlike hubs, network switches
are capable of inspecting data packets as they
are

received,

destination

determining

device

of

the

each

source

and

packet,

and

forwarding them appropriately. By delivering

messages only to the connected device intended,


a network switch conserves Network

Bandwidth

and

offers

generally

better

performance than a hub. Network switches


support either 10/100 Mbps Fast Ethernet or
Gigabit

Ethernet

(10/100/1000)

standards.

Different models of network switches support


differing numbers of connected devices. Most
consumer-grade network switches provide either
four or eight connections for Ethernet devices.
Switches can be connected to each other, a socalled

daisy

chaining

method

to

add

progressively larger number of devices to a LAN.


Now , use the cable that you have
prepared for connecting devices with network
switch. Using twisted pair cable connects the
Computer systems with each other with the help
of Switch. For connecting , insert one end of the
cable i:e insert RJ45 connector in the port of
LAN card of computer system. Now insert other
end of the cable i:e RJ45 connector in the port of
Network Switch. Now repeat the process with
other computer systems. Now computer systems

are connected with each other with the help of


Switch and LAN is created. Now repeat the
process again to prepare another LAN.

Routers

A router is a device that forwards data


packets across computer networks. Routers
perform the data "traffic directing" functions on

the Internet. A router is a microprocessorcontrolled device that is connected to two or


more data lines from different networks. When a
data packet comes in on one of the lines, the
router reads the address information in the
packet to determine its ultimate destination.
Then, using information in its routing table, it
directs the packet to the next network on its
journey. A data packet is typically passed from
router to router through the networks of the
Internet until it gets to its destination computer.
Routers also perform other tasks such as
translating the data transmission protocol of the
packet to the appropriate protocol of the next

network,

and

preventing

unauthorized

access to a network by the use of a firewall.


Now, use the cable that you have prepared
for connecting Switches with Router. Using
twisted pair cable connects the Switches with
each other with the help of Router. In simple
words, connect the two LANs using twisted pair
cable and router. For connecting, insert one end
of the cable i:e insert RJ45 connector in the port
of Switch. Now insert other end of the cable i:e
RJ45 connector in the port of Router. Now one
LAN is connected with Router to complete the
process repeat the step again and connect the
other LAN. Now, two LANs are connected with
each other with the help of Switch and Router.

Servers

In computing, the term server is used to


refer to one of the following:

A computer program running as a service, to


serve the needs or requests of other programs
(referred to in this context as "clients") which

may or may not be running on the same


computer.

A physical computer dedicated to running


one or more such services, to serve the needs of
programs running on other computers on the
same network.

A software/hardware system (i.e. a software


service running on a dedicated computer) such
as a database server, file server, mail server, or
print server.

Servers provide essential services across a


network.
In computer networking, a server is a
program that operates as a socket listener. The
term server is also often generalized to describe
a host that is deployed to execute one or more
such programs.
A server computer is a computer, or series
of computers, that link other computers or
electronic devices together. They often provide

essential services across a network, either to


private users inside a large organization or to
public users via the internet. For example, when
you enter a query in a search engine, the query
is sent from your computer over the internet to
the servers that store all the relevant web pages.
The results are sent back by the server to your
computer.
Many servers have dedicated functionality
such as web servers, print servers, and database
servers. Servers such as IIS, HFS, APACHE are
mainly used for data sharing.

The system is connected with a twisted pair


cable of a category 6. First is to set up a system
and connect all of them with network cable. For
which IPv6 cable has been used.
Like earlier cables, Category 6 cable
contains four twisted wire pairs. Although it is
sometimes made with 23 AWG wire, the increase
in performance with Cat 6 comes mainly from
better insulation; 22 to 24 AWG copper is
allowed if the ANSI/TIA-568-B.2-1 performance
specifications are met. Cat 6 patch cables are
normally
terminated
in
8P8C
modular
connectors. Attenuation, NEXT (near end
crosstalk), and PSNEXT (power sum NEXT) in
Cat 6 cable and connectors are all significantly
lower than Cat 5 or Cat 5e, which also uses 24
AWG wire. The heavier insulation in some Cat 6
cables makes them too thick to attach to 8P8C
connectors without a special modular piece,
resulting in a technically out-of-compliance
assembly. Connectors use either T568A or T568B
pin assignments; the choice is arbitrary provided
both ends of a cable are the same. If Cat 6 rated
patch cables, jacks, and connectors are not used
with Cat 6 wiring, overall performance is
degraded to that of the cable or connector.
Because the conductor sizes are generally the
same, Cat 6 jacks may also be used with Cat 5e
cable.

In June 2002 TIA approved specification for


Cat 6 doubling Cat 5 bandwidth to 250 MHz. Cat
6 is backward compatible with lower Category
grades and supports the same Ethernet
standards as Cat 5e. A Cat 6 whitepaper is
available from TIA. Currently there are no
Ethernet standards that take advantage of Cat 6.
ANSI/TIA854 is working on 1000Base-TX. When
complete this standard will use two pair in each
direction as opposed to all four for 1000Base-T
over Cat 5e. This is expected to reduce the cost
of
Gigabit

Ethernet

implementations.

1000Base-TX will only operate over Cat6.


Bandwidth precedes data rates just as
highways come before traffic. Doubling the
bandwidth is like adding twice the number of
lanes on a highway. The trends of the past and
the predictions for the future indicate that data
rates have been doubling every 18 months.
Current applications running at 1 Gb/s are really
pushing the limits of category 5e cabling. As
streaming media applications such as video and
multi-media become commonplace, the demands
for faster data rates will increase and spawn
new applications that will benefit from the
higher bandwidth offered by category 6. This is

exactly what happened in the early 90s when


the higher bandwidth of category 5 cabling
compared to category 3 caused most LAN
applications to choose the better media to allow
simpler, cost effective, higher speed LAN
applications, such as 100BASE-TX. Note:
Bandwidth is defined as the highest frequency
up to which positive power sum ACR
(Attenuation to Crosstalk Ratio) is greater than
zero.
The general difference between category
5e and category 6 is in the transmission
performance, and extension of the available
bandwidth from 100 MHz for category 5e to 200
MHz for category 6. This includes better
insertion loss, near end crosstalk (NEXT), return
loss, and equal level far end crosstalk (ELFEXT).
These improvements provide a higher signal-tonoise ratio, allowing higher reliability for current
applications and higher data rates for future
applications.
Analyst predictions and independent polls
indicate that 80 to 90 percent of all new
installations will be cabled with category 6. The
fact that category 6 link and channel
requirements are

backward compatible to category 5e makes


it very easy for customers to choose category 6
and supersede category 5e in their networks.
Applications that worked over category 5e will
work over category 6. Because of its improved
transmission

performance

and

superior

immunity from external noise, systems operating


over category 6 cabling will have fewer errors
vs. category 5e for current applications. This
means

fewer

re-transmissions

of

lost

or

corrupted data packets under certain conditions,


which

translates

into

higher

reliability

for

category 6 networks compared to category 5e


networks. From a future proofing perspective, it
is always better to install the best cabling
available. This is because it is so difficult to
replace cabling inside walls, in ducts under
floors and other difficult places to access. The
rationale is that cabling will last at least 10
years and will support at least four to five
generations of equipment during that time. If
future equipment running at much higher data

rates requires better cabling, it will be very


expensive to pull out category 5e cabling at a
later time to install category 6 cabling.

across the Internet. When you request an


HTML page or send e-mail, the Internet Protocol
part of TCP/IP includes your IP address in the
message (actually, in each of the packets if more
than one is required) and sends it to the IP
address that is obtained by looking up the
domain name in the Uniform Resource Locator
you requested or in the e-mail address you're
sending a note to. At the other end, the recipient
can see the IP address of the Web page
requestor or the e-mail sender and can respond
by sending another message using the IP
address it received.
An IP address has two parts: the identifier of a
particular network on the Internet and an
identifier of the particular device (which can be
a server or a workstation) within that network.
On the Internet itself - that is, between the
router that move packets from one point to

another along the route - only the network part


of the address is looked at.
The Network Part of the IP Address
The Internet is really the interconnection of
many individual networks (it's sometimes
referred to as an internetwork). So the Internet
Protocol (IP) is basically the set of rules for one
network communicating with any other (or
occasionally, for broadcast messages, all other
networks). Each network must know its own
address on the Internet and that of any other
networks with which it communicates. To be
part of the Internet, an organization needs an
Internet network number, which it can request
from the Network Information Center (NIC).
This unique network number is included in any
packet sent out of the network onto the Internet

The Local or Host Part of the IP Address


In addition to the network address or number,
information is needed about which specific
machine or host in a network is sending or
receiving a message. So the IP address needs
both the unique network number and a host
number (which is unique within the network).
(The host number is sometimes called a local or
machine address). Part of the local address can
identify a subnetwork or subnet address, which
makes it easier for a network that is divided into
several physical subnetworks to handle many
devices.
IP Address Classes and Their Formats
Since networks vary in size, there are four
different address formats or classes to consider
when applying to NIC for a network number:
Class A addresses are for large networks
with many devices.
Class B addresses are for medium-sized
networks.
Class C addresses are for small networks
(fewer than 256 devices).
Class D addresses are multicast addresses.
The first few bits of each IP address indicate
which of the address class formats it is using.
The address structures look like this:

Class A
0

Network
(8 bits)

Local address (24 bits)

around the Class C network address limitation


by using the Classless Inter-Domain Routing
(CIDR) scheme for address notation.
Relationship of the IP Address to the
Physical Address
The machine or physical address used within an
organization's local area networks may be
different than the Internet's IP address. The
most typical example is the 48-bit Ethernet
address. TCP/IP includes a facility called the
Address Resolution Protocol (ARP) that lets the
administrator create a table that maps IP
addresses to physical addresses. The table is
known as the ARP cache.
Static versus Dynamic IP Addresses
The discussion above assumes that IP addresses
are assigned on a static basis. In fact, many IP
addresses are assigned dynamically from a pool.
Many corporate networks and online services
economize on the number of IP addresses they
use by sharing a pool of IP addresses among a
large number of users. If you're an America
Online user, for example, your IP address will
vary from one logon session to the next because
AOL is assigning it to you from a pool that is
much smaller than AOL's base of subscribers.

And for the subnetting part it could be


explained with the help of following example
We have been allocated a 130.16.0.0 IP address
for our network.
We wish to subnet this into 13 subnets and allow
for the expansion in the near future. ?

Devise an IP subnet plan, giving the network,


first host, last host and broadcast IP addresses
for each subnet. Also specify the subnet mask
you would use.
Calculate required number of bits to borrow
for subnetting.
130 is a class B address so we can borrow from
2 to 14 bits
4 bits borrowed give us (24-2 ) = 14 subnets (not
much room for expansion)
5 bits borrowed give us (25-2 ) = 30 subnets
(plenty room for expansion)
So we choose to borrow 5 bits for the host part
of the class B address.
This leaves 11 bits for hosts = 211-2 hosts = 2046
hosts per subnet (all 0s and all 1s cannot be
used)
(In this question, the number of host required
per subnet have not been specified (but they
may be)!
Calculate the subnet mask
Subnet mask has all 1s in the network+subnet
part of the address.
Hence 11111111 11111111 11111000
00000000
= 255.255.248.0

Calculate all subnet network addresses


(in the 5 bits we have borrowed we count up
sequentially from 00001 to 11110 (all 0s and all
1s cannot be used)
NB All 0s in the host part refer to the subnet
itself.
1st subnet

= 130.16.00001 000.00000000

130.16.8.0
2nd subnet

= 130.16.00010 000.00000000

= 130.16.16.0
3rd subnet = 130.16.00011 000.00000000

130.16.24.0
4th subnet

= 130.16.00100 000.00000000

130.16.32.0
5th subnet

= 130.16.00101 000.00000000

130.16.40.0
6th subnet

= 130.16.00110 000.00000000

130.16.48.0
7th subnet

= 130.16.00111 000.00000000

130.16.56.0

8th subnet

= 130.16.01000 000.00000000

130.16.64.0
9th subnet

= 130.16.01001 000.00000000

130.16.72.0
10th subnet = 130.16.01010 000.00000000

130.16.80.0
11th subnet = 130.16.01011 000.00000000

130.16.88.0
12th subnet = 130.16.01100 000.00000000

130.16.96.0
13th subnet = 130.16.01101 000.00000000

130.16.104.0
14th subnet = 130.16.01110 000.00000000

130.16.112.0
15th subnet = 130.16.01111 000.00000000

130.16.120.0
16th subnet = 130.16.10000 000.00000000
130.16.128.0

17th subnet

= 130.16.10001 000.00000000

= 130.16.136.0
18th subnet

= 130.16.10010 000.00000000

= 130.16.144.0
19th subnet

= 130.16.10011 000.00000000

= 130.16.152.0
20th subnet
= 130.16.10100 000.00000000
= 130.16.160.0
21th subnet
= 130.16.10101 000.00000000
= 130.16.168.0
22th subnet
= 130.16.10110 000.00000000
= 130.16.176.0
23th subnet
= 130.16.10111 000.00000000
= 130.16.184.0
24th subnet
= 130.16.11000 000.00000000
= 130.16.192.0
25th subnet
= 130.16.11001 000.00000000
= 130.16.200.0
26th subnet = 130.16.11010 000.00000000
130.16.208.0

27th subnet = 130.16.11011 000.00000000


130.16.216.0

28th subnet = 130.16.11100 000.00000000


130.16.224.0

29th subnet = 130.16.11101 000.00000000


130.16.232.0

30th subnet = 130.16.11110 000.00000000


130.16.240.0

Calculate all address of the first host, last


host and broadcast on each subnet.
First host is 1 in the host ID field (11 bits) =
000 00000001
Last host is 1 less than all 1s in the host ID
field (11 bits) = 111 11111110
Broadcast is all 1s in the host ID field (11
bits) = 111 11111111
1st subnet
130.16.8.0

=130.16.00001 000.00000000 =

First Host =130.16.00001 000.00000001 =


130.16.8.1
Last Host =130.16.00001 111.11111110 =
130.16.15.254
Broadcast =130.16.00001 111.11111111 =
130.16.15.255

2nd subnet
=130.16.00010
000.00000000 = 130.16.16.0
First Host =130.16.00010 000.00000001 =
130.16.16.1
Last Host =130.16.00010 111.11111110 =
130.16.23.254
Broadcast =130.16.00010 111.11111111 =
130.16.23.255

3rd subnet
130.16.24.0

=130.16.00011 000.00000000 =

First Host =130.16.00011 000.00000001 =


130.16.24.1
Last Host =130.16.00011 111.11111110 =
130.16.31.254
Broadcast =130.16.00011 111.11111111 =
130.16.31.255

4th subnet
130.16.32.0

=130.16.00100 000.00000000 =

First Host =130.16.00100 000.00000001 =


130.16.32.1
Last Host =130.16.00100 111.11111110 =
130.16.39.254

Broadcast =130.16.00100 111.11111111 =


130.16.39.255

5th subnet
130.16.40.0

=130.16.00101 000.00000000 =

First Host =130.16.00101 000.00000001 =


130.16.40.1
Last Host =130.16.00101 111.11111110 =
130.16.47.254
Broadcast =130.16.00101 111.11111111 =
130.16.47.255

6th subnet
130.16.48.0

=130.16.00110 000.00000000 =

First Host =130.16.00110 000.00000001 =


130.16.48.1
Last Host =130.16.00110 111.11111110 =
130.16.55.254
Broadcast =130.16.00110 111.11111111 =
130.16.55.255
7th subnet
130.16.56.0

=130.16.00111 000.00000000 =

First Host =130.16.00111 000.00000001 =


130.16.56.1

Last Host =130.16.00111 111.11111110 =


130.16.63.254
Broadcast =130.16.00111 111.11111111 =
130.16.63.255

8th subnet
130.16.64.0

=130.16.01000 000.00000000 =

First Host =130.16.01000 000.00000001 =


130.16.64.1
Last Host
130.16.71254

=130.16.01000 111.11111110 =

Broadcast =130.16.01000 111.11111111 =


130.16.71.255

9th subnet
130.16.72.0

=130.16.01001 000.00000000 =

First Host =130.16.01001 000.00000001 =


130.16.72.1
Last Host =130.16.01001 111.11111110 =
130.16.79.254
Broadcast =130.16.01001 111.11111111 =
130.16.79.255

10th subnet
130.16.80.0

=130.16.01010 000.00000000 =

First Host =130.16.01010 000.00000001 =


130.16.80.1
Last Host =130.16.01010 111.11111110 =
130.16.87.254
Broadcast =130.16.01010 111.11111111 =
130.16.87.255

11th subnet
130.16.88.0

=130.16.01011 000.00000000 =

First Host =130.16.01011 000.00000001 =


130.16.88.1
Last Host =130.16.01011 111.11111110 =
130.16.95.254
Broadcast =130.16.01011 111.11111111 =
130.16.95.255

12th subnet
130.16.96.0

=130.16.01100 000.00000000 =

First Host =130.16.01100 000.00000001 =


130.16.96.1
Last Host =130.16.01100 111.11111110 =
130.16.103.254

Broadcast =130.16.01100 111.11111111 =


130.16.103.255

13th subnet
130.16.104.0

=130.16.01101 000.00000000 =

First Host =130.16.01101 000.00000001 =


130.16.104.1
Last Host =130.16.01101 111.11111110 =
130.16.111.254
Broadcast =130.16.01101 111.11111111 =
130.16.111.255
14th subnet
130.16.112.0

=130.16.01110 000.00000000 =

First Host =130.16.01110 000.00000001 =


130.16.112.1
Last Host =130.16.01110 111.11111110 =
130.16.119.254
Broadcast =130.16.01110 111.11111111 =
130.16.119.255

15th subnet
130.16.120.0

=130.16.01111 000.00000000 =

First Host =130.16.01111 000.00000001 =


130.16.120.1

Last Host =130.16.01111 111.11111110 =


130.16.127.254
Broadcast =130.16.01111 111.11111111 =
130.16.127.255

16th subnet
130.16.128.0

=130.16.10000 000.00000000 =

First Host =130.16.10000 000.00000001 =


130.16.128.1
Last Host =130.16.10000 111.11111110 =
130.16.135.254
Broadcast =130.16.10000 111.11111111 =
130.16.135.255
17th subnet
=130.16.10001
000.00000000 = 130.16.136.0
First Host =130.16.10001 000.00000001 =
130.16.136.1
Last Host =130.16.10001 111.11111110 =
130.16.143.254
Broadcast =130.16.10001 111.11111111 =
130.16.143.255

18th subnet
=130.16.10010
000.00000000 = 130.16.144.0

First Host =130.16.10010 000.00000001 =


130.16.144.1
Last Host =130.16.10010 111.11111110 =
130.16.151.254
Broadcast =130.16.10010 111.11111111 =
130.16.151.255

19th subnet
=130.16.10011
000.00000000 = 130.16.152.0
First Host =130.16.10011 000.00000001 =
130.16.152.1
Last Host =130.16.10011 111.11111110 =
130.16.159.254
Broadcast =130.16.10011 111.11111111 =
130.16.159.255

20th subnet
=130.16.10100
000.00000000 = 130.16.160.0
First Host =130.16.10100 000.00000001 =
130.16.160.1
Last Host =130.16.10100 111.11111110 =
130.16.167.254
Broadcast =130.16.10100 111.11111111 =
130.16.167.255

21th subnet
=130.16.10101
000.00000000 = 130.16.168.0
First Host =130.16.10101 000.00000001 =
130.16.168.1
Last Host =130.16.10101 111.11111110 =
130.16.175.254
Broadcast =130.16.10101 111.11111111 =
130.16.175.255

22th subnet
=130.16.10110
000.00000000 = 130.16.176.0
First Host =130.16.10110 000.00000001 =
130.16.176.1
Last Host =130.16.10110 111.11111110 =
130.16.183.254
Broadcast =130.16.10110 111.11111111 =
130.16.183.255

23th subnet
=130.16.10111
000.00000000 = 130.16.184.0

First Host =130.16.10111 000.00000001 =


130.16.184.1
Last Host =130.16.10111 111.11111110 =
130.16.191.254
Broadcast =130.16.10111 111.11111111 =
130.16.191.255
24th subnet
=130.16.11000
000.00000000 = 130.16.192.0
First Host =130.16.11000 000.00000001 =
130.16.192.1
Last Host =130.16.11000 111.11111110 =
130.16.199.254
Broadcast =130.16.11000 111.11111111 =
130.16.199.255

25th subnet
=130.16.11001
000.00000000 = 130.16.200.0
First Host =130.16.11001 000.00000001 =
130.16.200.1
Last Host =130.16.11001 111.11111110 =
130.16.207.254
Broadcast =130.16.11001 111.11111111 =
130.16.207.255

26th subnet
130.16.208.0

=130.16.11010 000.00000000 =

First Host =130.16.11010 000.00000001 =


130.16.208.1
Last Host =130.16.11010 111.11111110 =
130.16.215.254
Broadcast =130.16.11010 111.11111111 =
130.16.215.255
27th subnet
130.16.216.0

=130.16.11011 000.00000000 =

First Host =130.16.11011 000.00000001 =


130.16.216.1
Last Host =130.16.11011 111.11111110 =
130.16.223.254
Broadcast =130.16.11011 111.11111111 =
130.16.223.255

28th subnet
130.16.224.0

=130.16.11100 000.00000000 =

First Host =130.16.11100 000.00000001 =


130.16.224.1
Last Host =130.16.11100 111.11111110 =
130.16.231.254

Broadcast =130.16.11100 111.11111111 =


130.16.231.255

29th subnet
130.16.232.0

=130.16.11101 000.00000000 =

First Host =130.16.11101 000.00000001 =


130.16.232.1
Last Host =130.16.11101 111.11111110 =
130.16.239.254
Broadcast =130.16.11101 111.11111111 =
130.16.239.255

30th subnet
130.16.240.0

=130.16.11110 000.00000000 =

First Host =130.16.11110 000.00000001 =


130.16.240.1
Last Host =130.16.11110 111.11111110 =
130.16.247.254
Broadcast =130.16.11110 111.11111111 =
130.16.247.255
Now, to insert IP address in every system similar
properties are used. Which are as following:
About HFS

HTTP File Server, otherwise known as


HFS, is a free web server specifically designed
for publishing and sharing files. The complete
feature set differs from other web servers; it
lacks some common features, like CGI, but
includes, for example, counting file downloads. It
is even advised against using it as an ordinary
web server.[2] Its foremost feature is its extreme
ease of use even for ordinary home users; just
launch one file and you're all set, no
configuration or installation.
HFS is a small HTTP file server, aimed at
mostly sharing files for download. The official
documentation describes HFS as:

HFS (Http File Server) is file sharing


software which allows you to send and receive
files. You can limit this sharing to just a few
friends, or be open to the whole world. HFS is
different from classic file sharing because there
is no network. HFS is a web server which uses
web technology to be more compatible with
today's Internet. Since it is actually a web
server, your friends can download files as if they
were downloading from a website using a web
browser, such as Internet Explorer or Firefox.
Your users don't have to install any new

software. HFS lets you share your files. Most


web servers are used to publish a website, but
HFS is not designed to do that. You are,
however, free to use it in any way you wish, - but
at your own risk.

Sharing files with HTTP File Server


Internet

connects

people.

mean

literally

connects people not like in some social talk-toperson-half-globe-distant

way.

Person

can

connect directly to person B and they can do


something (depending on what software they are
using) over that connection.
Sharing files is actually what Internet is. When
you

are

reading

my

blog

your

browser

downloads files. When you rip music track from


CD and mail it to friend he is downloading file
(may be bit less legal than reading my blog). :)

Trick is for downloading files software is need.


Browser

is

software

that

obviously

every

Internet user has. If you want to share file with


nothing except browser needed to download it
you should consider setting up personal server.
HTTP File Server (HFS) is application for
making files available for download.
1.Download and run HFS. Single executable,
no need to install.
2.Drop file or folder you want to share into it.
3.Now anyone can visit your PC and see that
shared stuff by entering your IP address in
their browser.
I am using HFS for a long time and its easiest
way for file collaboration ever. You dont have to
make people use some special client software,
you are simply giving them link and you are
done. :)
HFS is freeware and can be set to portable in
settings (Menu > Save options > To file).

To share files, we have another software also


and an easy way to share files to other domains.
That could be done with the help of Domain
Name Server (DNS).
The Domain Name System (DNS) servers
distribute the job of mapping domain names to
IP addresses among servers allocated to each
domain.
Each second-level domain must have at least one
domain

name

server

responsible

for

maintenance of information about that domain


and all subsidiary domains, and response to
queries

about

computers

on

those
the

domains

Internet.

from
For

other

example,

management of domain name information and


queries for the LivingInternet.com domain is
handled by a specific DNS server that takes care
of

the

load

required.

This

distributed

architecture was designed to enable the Internet


to grow, where as the number of domains grew,

the number of DNS servers can grow to keep


pace with the load.
A Windows domain is a logical group of
computers running versions of the Microsoft
Windows operating system that share a central
directory
(known
Windows

database.
as

Active

2000,

This

central

Directory

Active

database

starting

Directory

with

Domain

Services in Windows Server 2008 and Server


2008 R2, also referred to as NT Directory
Services on Windows NT operating systems, or
NTDS) contains the user accounts and security
information for the resources in that domain.
Each person who uses computers within a
domain receives his or her own unique account,
or user name. This account can then be assigned
access to resources within the domain.
In a domain, the directory resides on computers
that are configured as "domain controllers." A
domain controller is a server that manages all
security-related

aspects

between

user

and

domain interactions, centralizing security and


administration. A Windows Server domain is
generally

suited

for

businesses

and/or

organizations when more than 10 PCs are in use.


Windows Workgroups, by contrast, is the other
model for grouping computers running Windows
in a networking environment which ships with
Windows. Workgroup computers are considered
to be 'standalone' - i.e. there is no formal
membership or authentication process formed
by the workgroup. A workgroup does not have
servers and clients, and as such, it represents
the Peer-to-Peer (or Client-to-Client) networking
paradigm,
architecture

rather

than

constituted

the
by

centralized
Server-Client.

Workgroups are considered difficult to manage


beyond a dozen clients, and lack single sign on,
scalability,
functionality,

resilience/disaster
and

many

security

recovery
features.

Windows Workgroups are more suitable for


small or home-office networks.

A domain does not refer to a single location or


specific type of network configuration. The
computers in a domain can share physical
proximity on a small LAN or they can be located
in different parts of the world. As long as they
can communicate, their physical position is
irrelevant.
Computers inside an Active Directory domain
can

be

assigned

into

organizational

units

according to location, organizational structure,


or other factors. In the original Windows Server
Domain system (shipped with Windows NT 3.x/4)
machines could only be viewed in two states
from the administration tools, 1) computers
detected (on the network), and 2) computers
that actually belonged to the domain. Active
Directory makes it easier for administrators to
manage

and

deploy

network

changes

and

policies (see Group Policy) to all of the machines


connected to the domain.

Computers can connect to a domain easily via


LAN, or via WAN using a VPN connection. Users
of a domain are able to use enhanced security
for their VPN connection due to the support for a
certification authority which is gained when a
domain is added to a network, and as a result
smart cards and digital certificates can be used
to

confirm

identities

information.
Domain Controller
E-mail

Print
AAAAAA
LinkedIn
Facebook
Twitter

and

protect

stored

Share This
Primary domain controller (PDC) and backup
domain controller (BDC) are roles that can be
assigned to a server in a network of computers
that use the Windows NT operating system.
Windows NT uses the idea of a domain to
manage access to a set of network resources
(applications, printers, and so forth) for a group
of users. The user need only to log in to the
domain to gain access to the resources, which
may be located on a number of different servers
in
Today, everyone who registers a second-level
domain name must at the same time designate
two DNS servers to manage queries and return
the current IP address for addresses in that
domain. The primary domain name server is
always

consulted

first,

and

the

secondary

domain name server is queried if the primary


doesn't

answer,

providing

backup

and

important support to overall Internet reliability.

The application that underlies almost all DNS


server software on the Internet is a free open
source software program called BIND, currently
maintained by the Internet Systems Consortium.
When your computer was added to the Internet,
one of the initial setup tasks was to specify a
default domain name server, usually maintained
by your local Internet Service Provider, and
almost certainly a variant of the BIND server
software.
When your computer tries to access a domain
like "www.livinginternet.com", the domain name
system works like this:
Your computer asks your default DNS server
if

it

knows

the

IP

address

for

www.livinginternet.com. If the DNS server


has been asked that question recently, then
it will have the answer stored in its local
cache, and can answer immediately.
Otherwise, your DNS server queries the
central zone files for the address of the

primary

domain

name

server

for

livinginternet.com, and is answered with


something like "ns1.livinginternet.com".
Your

DNS

server

will

ask

the

livinginternet.com DNS server for the IP


address of www.livinginternet.com, which
will then look up the answer and send it
back.
Your DNS server will store the IP address
returned in its local cache, and make the
address available to your computer.
Your

computer

then

contacts

www.livinginternet.com with the standard


Internet routing protocols by using the
returned IP address.
The IP address assigned to a computer may
change frequently because of physical moves or
network reconfigurations. The major advantage
of the network of DNS servers is that domain
names stay the same even when IP addresses

change, and so the domain name servers can


transparently take care of the mapping.
Security. There is a range of good security
practices built in to the design of the DNS,
although versions of the BIND server software
itself

have

periodically

been

found

to

be

vulnerable, often through buffer overrun attacks.


If you run DNS server software, you should
always make sure it is up-to-date with the latest
version and patches. DNS server vulnerabilities
typically affect the systems running the servers,
which is generally Internet Service Providers,
and so are not a direct threat to the home user
unless you are running one at home.
A major extension to security of the DNS was
introduced in 1997 with the DNS Security
(DNSSEC) standard described in RFC 2065,
updated in 1999 with RFC 2535, which provided
DNS servers with secure data integrity and
system authentication through the use of public
key cryptography digital signatures.

Resources. The following references provide


additional information about DNS servers:
NSLOOKUP -- provides reports on domain
name servers.
BIND

--

application,

the

standard

maintained

by

DNS
the

server
Internet

Software Consortium.
One of the greatest features of Windows Server
2003 is its ability to be a Domain Controller
(DC). It has ability to store user names and
passwords on a central computer (the Domain
Controller)

or

computers

(several

Domain

Controllers).

Creating a domain
You create a domain by creating the first domain
controller for a domain. To do this, install Active
Directory on a member server running Windows
Server 2003 by using the Active Directory
Installation

Wizard.

The

wizard

uses

the

information that you provide to create the


domain controller and create the domain within
the

existing

domain

structure

of

your

organization. Depending on the existing domain


structure, the new domain could be the first
domain in a new forest, the first domain in a new
domain tree, or a child domain of an existing
domain tree. For more information, see creating
a new forest, creating a new domain tree, and
creating a new child domain.
A

domain

Directory

controller
service

to

provides

the

Active

network

users

and

computers, stores directory data, and manages


user and domain interactions, including user
logon processes, authentication, and directory
searches. Every domain must contain at least
one domain controller. For more information, see
Domain controllers.
After you create the first domain controller for a
domain,

you

can

create

additional

domain

controllers in an existing domain for fault


tolerance and high availability of the directory.

For more information, see creating additional


domain controllers.
Planning for multiple domains
Some reasons to create more than one domain
are:

Different password requirements between


departments or divisions

Massive numbers of objects

Decentralized network administration

More control of replication


Although using a single domain for an entire
network

has

several

advantages,

to

meet

additional scalability, security, or replication


requirements you may consider creating one or
more

domains

for

your

organization.

Understanding how directory data is replicated


between domain controllers will help you plan
the

number

organization.

of
For

domains
more

needed

by

information

replication, see how replication works.

your
about

Removing a domain
In order to remove a domain, you must first
remove Active Directory from the entire domain
controllers associated with that domain. Once
Active Directory has been removed from the last
domain controller the domain will be removed
from the forest and all of the information in that
domain will be deleted. A domain can only be
removed from the forest if it has no child
domains. If this is the last domain in the forest,
removing this domain will also delete the forest.
For more information about how to remove a
domain, see to remove a domain.
Caution
Removing a domain will result in the permanent
loss of any data contained in that domain. This
includes all user, group, and computer accounts.
Before removing Active Directory from a domain
controller,

you

should

first

remove

any

application directory partitions from that domain


controller. For more information, see Application

directory partitions and to create or delete an


application directory partition.

Bibliography
http://www.brbraitt.bsnl.co.in/mainsite/mainsite_
index.asp
http://www.brbraitt.bsnl.co.in/mainsite/About_us/
History.asp
http://www.brbraitt.bsnl.co.in/mainsite/About_us/
organisation_chart.asp
http://en.wikipedia.org/wiki/IP_address
http://computer.howstuffworks.com/internet/basi
cs/question549.htm
http://computer.howstuffworks.com/internet/basi
cs/question5491.htm
http://www.datacottage.com/nch/basics.htm
http://www.dslreports.com/faq/5010.
http://en.wikipedia.org/wiki/Category_6_cable

http://www.dslreports.com/faq/5010.
http://www.broadbandutopia.com/caandcaco.htm
l
http://www.rejetto.com/hfs/?f=dl
http://en.wikipedia.org/wiki/HTTP_File_Server

Acknowledgement
It is with reverence that we express our
gratitude to our guide, honorable Mr. D.C.
Sonkhla and Prof. Ankit Dubey for his precious
guidance and help in this major project work.
The credit for the successful completion of this
project goes to their keen interest, timing,
guidance and valuable suggestion otherwise our
Endeavour would have been futile.
We own regard to Mrs. Sibby Samuel (Head
of

Computer

Science

Department)

for

her

persistent encouragement and blessing, which


work bestowed upon us.
We also own our sincere thanks to honorable
Principal Fr. Davis George for his kind support
which he rendered us in the envisagement of the
great success of our major project.
NEERAJ SINGH GURJAR
HENERY BERNARD BASTIAN
SRISHTY DAS
RONNIE KOCHAR

AAKANCHHA SHARMA
B.COM (6TH Sem.)

(Department of Computer Science and


Application)
Certificate
This is to certify that NEERAJ SINGH
GURJAR, HENERY BERNARD BASTIAN, SRISHTY
DAS, RONNIE KOCHAR,. AAKANCHHA SHARMA We
are student of B.Com 6th sem of St. Aloysius
college Jabalpur (m.p) has been completed the
project of hardware networking.
We are submitting the project in the partial
fulfillment for the bachelor of commerce from St.

Aloysius College Jabalpur (m.p) for session 20102011.


The Project Report is up to the started
in respect of both its we wish all the
success.
Date: 13th may 2011

Dr. Fr.
Davis George

Place: Jabalpur

Principal
St.

Aloysius College,
Jabalpur
(M.P)

INDEX

ACKNOWLEDGEMENT
CERTIFICATE
CERTIFICATE OF GUIDE
DECLARATION
ABOUT THE INSTITUTION
PROJECT DESCRIPTION
CABLING
IP ADDRESSING
HFS SERVER
CONFIGURATION OF HFS
DOMAIN NAME SERVER(DNS)
BIBLIOGRAPHY

How to configure the domain server in windows


2003

STEP1: First of all click Start menu then open


Programs then open Administrators tools then
configure your server Wizard will open.

STEP2: Then click Next.

STEP3: Then click on typical configuration for a


first Server and then click next.

STEP 4: Then give the Active directory Domain


name.

STEP5: Then give the NetBIOS Domain name it


is used for connecting Domain to other client
which is using other operating system.

STEP6: IF there is any other domain then click


yes and give the IP address of that Domain
otherwise click no.

STEP 7: Then click yes to install active


directory and DNS Server.

STEP 8:
Processing
Installation Wizard.

of

Active

Directory

STEP 9: Now the Domain Server has been


configured.

Das könnte Ihnen auch gefallen