Preview only show first 10 pages with watermark. For full document please download

Aim 1– To Study Diff Types Of Networks. Lan

   EMBED


Share

Transcript

Aim 1– To study diff types of networks. LAN - Local Area Network A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet. In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring. WAN - Wide Area Network As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth. A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address. A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity over the longer distances. Metropolitan Area Network It is a network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. A MAN is typically owned an operated by a single entity such as a government body or large corporation. Aim 2- To study diff types topologies used in networking. Topology Topology means how the computers/ nodes are physically connected to each other. Bus topology • Uses a trunk or backbone to which all of the computers on the network connect. • Systems connect to this backbone using T connectors or taps. • Coaxial cablings ( 10Base-2, 10Base5) were popular options years ago. Bus Topology characteristics -Does not use any specialized network to troubleshoot equipment. -A break in the cable will prevent all systems from accessing the network. -Require less cable -Network disruption when computers are added or removed -Cheap and easy to implement Ring Topology • Logical ring – Meaning that data travels in circular fashion from one computer to another on the network. – Typically FDDI, SONET or Token Ring technology are used to implement a ring – Ring networks are most commonly wired in a star configuration • Token Ring has multi-station access unit (MSAU),equivalent to hub or switch. MSAU performs the token circulation internally. Ring Topology characteristics -A single break in the cable can disrupt the entire network. -Ring networks are moderately easy to install -Expansion to the network can cause network disruption -Cable faults are easily located, making troubleshooting easier Star Topology • All computers/devices connect to a central device called hub or switch. • Each device requires a single cable • point-to-point connection between the device and hub. • Most widely implemented • Hub is the single point of failure Star Topology characteristics -More difficult -Easy to troubleshoot and isolate to implement problems -A central connecting device allows for a single point of failure -Cable failure affects only a single user -Easily expanded without disruption Requires more cable to the network Mesh Topology • Each computer connects to every other. • High level of redundancy. • Rarely used. – Wiring is very complicated – Cabling cost is high – Troubleshooting a failed cable is tricky – A variation hybrid mesh – create point to point connection between specific network devices, often seen in WAN implementation. Mesh Topology characteristics -Complicated -The network can be expanded implementation without disruption to current uses -Requires more cable than the other -LAN topologies Provides redundant paths between devices Aim 3: To study various types of guided transmission media in detail. Transmission Media Communication of data propagation and processing of signals is called transmission. Signals travel from transmitter to receiver via a path. This path is called medium. Medium can be guided or unguided. Twisted-Pair Copper Wire The least-expensive and most commonly-used transmission medium is twisted-pair copper wire. For over one-hundred years it has been used by telephone networks. In fact, more than 99% of the wired connections from the telephone handset to the local telephone switch use twisted-pair copper wire. Most of us have seen twisted pair in our homes and work environments. Twisted pair consists of two insulated copper wires, each about 1 mm thick, arranged in a regular spiral pattern:. The wires are twisted together to reduce the electrical interference from similar pairs close by. Typically, a number of pairs are bundled together in a cable by wrapping the pairs in a protective shield. A wire pair constitutes a single communication link. Unshielded twisted pair (UTP) It is commonly used for computer networks within a building, that is, for local area networks (LANs). Data rates for LANs using twisted pair today range from 10 Mbps to 100 Mbps. The data rates that can be achieved depend on the thickness of the wire and the distance between transmitter and receiver. Two types of UTP are common in LANs: category 3 and category 5. Category 3 corresponds to voice-grade twisted pair, commonly found in office buildings.Office buildings are often prewired with two or more parallel pairs of category 3 twisted pair; one pair is used for telephone communication, and the additional pairs can be used for additional telephone lines or for LAN networking. 10 Mbps Ethernet, one of the most prevalent LAN types, can use category 3 UTP. Category 5, with its more twists per centimeter and Teflon insulation, can handle higher bit rates. 100 Mbps Ethernet running on category 5 UTP has become very popular in recent years. In recent years, category 5 UTP has become common for preinstallation in new office buildings. When fiber-optic technology emerged in the 1980s, many people disparaged twisted-pair because of its relatively low bit rates. Some people even felt that fiber optic technology would completely replace twisted pair. But twisted pair did not give up so easily. Modern twisted-pair technology, such as category 5 UTP, can achieve data rates of 100 Mbps for distances up to a few hundred meters. Even higher rates are possible over shorter distances. In the end, twisted-pair has emerged as the dominant solution for high-speed LAN networking. Twisted-pair is also commonly used for residential Internet access. We saw that dial-up modem technology enables access at rates of up to 56 Kbps over twisted pair. We also saw that ISDN is available in many communities, providing access rates of about 128 Kbps over twisted pair. We also saw that ADSL (Asymmetric Digital Subscriber Loop) technology has enabled residential users to access the Web at rates in excess of 6 Mbps over twisted pair. Coaxial-Cable Like twisted pair, coaxial cable consists of two copper conductors, but the two conductors are concentric rather than parallel. With this construction and a special insulation and shielding, coaxial cable can have higher bit rates than twisted pair. Coaxial cable comes in two varieties: baseband coaxial cable and broadband coaxial cable. Baseband coaxial cable, also called 50ohm cable, is about a centimeter thick, lightweight, and easy to bend. It is commonly used in LANs; in fact, the computer you use at work or at school is probably connected to a LAN with either baseband coaxial cable or with UTP. Take a look at the the connection to your computer's interface card. If you see a telephone-like jack and some wire that resembles telephone wire, you are using UTP; if you see a T-connector and a cable running out of both sides of the Tconnector, you are using baseband coaxial cable. The terminology "baseband" comes from the fact that the stream of bits is dumped directly into the cable, without shifting the signal to a different frequency band. 10 Mbps Ethernets can use either UTP or baseband coaxial cable. It is a little more expensive to use UTP for 10 Mbps Ethernet, as UTP requires an additional networking device, called a hub. Broadband coaxial cable, also called 75-ohm cable, is quite a bit thicker, heavier, and stiffer than the baseband variety. It was once commonly used in LANs and can still be found in some older installations. For LANs, baseband cable is now preferable, since it is less expensive, easier to physically handle, and does not require attachment cables. Broadband cable, however, is quite common in cable television systems. With broadband coaxial cable, the transmitter shifts the digital signal to a specific frequency band, and the resulting analog signal is sent from the transmitter to one or more receivers. Both baseband and broadband coaxial cable can be used as a guided shared medium. Specifically, a number of end systems can be connected directly to the cable, and all the end systems receive whatever any one of the computers transmits. Fiber Optics An optical fiber is a thin, flexible medium that conducts pulses of light, with each pulse representing a bit. A single optical fiber can support tremendous bit rates, up to tens or even hundreds of gigabits per second. They are immune to electromagnetic interference, have very low signal attenuation up to 100 kilometers, and are very hard to tap. These characteristics have made fiber optics the preferred long-haul guided transmission media, particularly for overseas links. Many of the long-distance telephone networks in the United States and elsewhere now use fiber optics exclusively. Fiber optics is also prevalent in the backbone of the Internet. However, the high cost of optical devices -- such as transmitters, receivers, and switches – has hindered their deployment for short-haul transport, such as in a LAN or into the home in a residential access network. AT&T Labs provides an excellent site on fiber optics, including several nice animations. Aim 4: To study various types of connectors used in computer networks. Connectors used in Computer Networks – A connector is best known for providing the physical link between two components. The use of a connector might be a connector linking a cable and a network interface card or NIC card, a connector linking a transceiver and a cable or even a connector linking two cable segments. There are various types of connectors used for different transmission media such as – 1. RJ – 45 A registered jack (RJ) is a standardized physical network interface — both jack construction and wiring pattern — for connecting telecommunications or data equipment to a service provided by a local exchange carrier or long distance carrier. The physical connectors that registered jacks use are mainly of the modular connector and 50-pin miniature ribbon connector types. RJ45 is a registered jack standard for a modular connector using 8 conductors, which specifies the physical male and female connectors as well as the pin assignments of the wires in a telephone cable. The "RJ45" physical connector is standardized as the IEC 60603-7 8P8C modular connector with different "categories" of performance, with all eight conductors present but 8P8C is commonly known as RJ45. The physical dimensions of the connectors are specified in ANSI/TIA-1096-A and ISO-8877 standards. 2. BNC The BNC connector (Bayonet Neill–Concelman) is a common type of RF connector used for coaxial cable. It is used with radio, television, and other radio-frequency electronic equipment, test instruments, video signals, and was once a popular computer network connector. BNC connectors are made to match the characteristic impedance of cable at either 50 ohms or 75 ohms. It is usually applied for frequencies below 3 GHz and voltages below 500 Volts. The BNC connector is used for signal connections such as: 1. analog and serial digital interface video signals 2. amateur radio antennas 3. aviation electronics (avionics) 4. test equipment. 3. SC Connector SC stands for Subscriber Connector- a general purpose push/pull style Connector developed by NTT. SC has an advantage in keyed duplexibility to support send/receive channels. SC Connectors are frequently used for newer Network applications. The SC is a snap-in connector that is widely used in singlemode systems for its performance. The SC connector is also available in a Duplex configuration. They offer low cost, simplicity, and durability. SC connectors provide for accurate alignment via their ceramic ferrules. The square, snap-in connector latches with a simple pushpull motion and is keyed. They feature a 2.5mm Ferrule and molded housing for protection. Typical matched SC connectors are rated for 1000 mating cycles and have an Insertion Loss of 0.25 dB. 4. ST Connector ST stands for Straight Tip - a quick release bayonet style Connector developed by AT&T. STs were predominant in the late 80s and early 90s. ST Connectors are among the most commonly used Fiber optic connectors in networking applications. They are cylindrical with twist lock coupling, 2.5mm keyed ferrule. ST Connectors are used both short distance applications and long line systems. The ST connector has a bayonet mount and a long cylindrical Ferrule to hold the fiber. Because they are spring-loaded, you have to make sure they are seated properly. They are easily inserted and removed due to their design. If you experience high Light loss, try reconnecting. ST connectors come in two versions: ST and ST-II. These are keyed and springloaded. They are push-in and twist types. They are rated for 500 mating cycles. The typical Insertion Loss for matched ST connectors is 0.25 dB. 5. MT-RJ Connector MT-RJ stands for Mechanical Transfer Registered Jack. MT-RJ is a fiber-optic Cable Connector that is very popular for small form factor devices due to its small size. Housing two fibers and mating together with locating pins on the plug, the MT-RJ comes from the MT connector, which can contain up to 12 fibers. The MT-RJ is one of the newly emerging small form factor connectors that are becoming more common in the networking industry. The MT-RJ utilizes two fibers and integrates them into a single design that looks similar to a RJ45 connector. Alignment is completed through the use of two pins that mate with the connector. Transceiver jacks found on NICs and equipment typically have the pins built into them. The MT-RJ is commonly used for networking applications. Its size is slightly smaller than a standard phone jack and just as easy to connect and disconnect. It's half the size of the SC Connector it was designed to replace. The MT-RJ connector is a small form-factor Fiber optic connector which resembles the RJ-45 connector used in Ethernet networks. Compared to single-fiber terminations such as SC, the MT-RJ Connector offers lower Termination cost and greater density for both electronics and cable management hardware. The MT-RJ Connector is significantly lower in cost and smaller in size than the SC Duplex interface. The small MT-RJ Interface can be spaced the same as copper, effectively doubling the number of fiber ports. The net effect is a Drop in the overall price per fiber Port making fiber-to-thedesktop solutions more competitive with copper Aim 5: To study diff. types of protocols in tcp/ip suit TCP/IP Protocol Suite The TCP/IP model is a descriptive framework for computer network protocols created in the 1970s by DARPA, an agency of the United States Department of Defense. The name derives from the two most important protocols of the networking protocol suite, the Transmission Control Protocol (TCP) and the Internet Protocol (IP). The model evolved from the operational principles of the ARPANET, which was an early wide area network and a predecessor of the Internet. The TCP/IP model is formalized in the Internet protocol suite and is sometimes called the Internet model or the DoD model. The TCP/IP model describes a set of general design guidelines and implementations of specific networking protocols to enable computers to communicate over a network. TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. Protocols exist for a variety of different types of communication services between computers. TCP/IP has four abstraction layers as defined in RFC 1122, The TCP/IP model and related protocols are maintained by the Internet Engineering Task Force (IETF). User Datagram Protocol The User Datagram Protocol is very simple. The PDU used by UDP is called a datagram. Datagrams are considered unreliable,in that there is no guarantee datagrams will be received in the correct order, if at all. If reliability of the information transmitted is needed, UDP should not be used.While UDP is unreliable, the lack of error checking and correction make UDP fast and effic -ient for many less data intensive or timesensitive applications, such as the Domain Name Service (DNS), the Simple Network Management Protocol (SNMP), the Dynamic Host Configuration Protocol (DHCP) and the Routing InformationProtocol (RIP). UDP is also well suited for streaming video. Transmission Control Protocol In the TCP/IP protocol suite, TCP is the intermediate layer between IP below it, and an application above it. Using TCP, applications on networked hosts can establish reliable connections to one another. The protocol guarantees in-order delivery of data from the sender to the receiver. Both tcp and udp works on port no.from range.0-32768. TCP connections have three phases: 1. Connection establishment 2. Data transfer 3. Connection termination • File Transfer Protocol (FTP)— It works on port no.21. Provides a mechanism for moving data files between systems. The FTP client and server programs, as well as most Web browsers, contain an implementation of the FTP protocol. • HyperText Transfer Protocol (HTTP)— It works on port no. 80.Protocol used to move Web pages across an internet connection. The HTTP protocol is built into Web browsers and Web servers. • Interactive Mail Access Protocol (IMAP)— It works on port no. 143.Provides clients access to e-mail messages and mailboxes over a network. It is incorporated into e-mail applications. • Post Office Protocol (POP)— It works on port no. 110.Allows clients to read and remove e-mail residing on a remote server. It is incorporated into e-mail applications. • Remote Login (Rlogin)— Provides network remote login capability. • Simple Mail Transfer Protocol (SMTP)— It works on port no. 25.Used to deliver email from one system to another. It is incorporated into email applications. • Secure Shell (SSH)—Provides remote access to computers while providing encryption of the data. • Telnet— It works on port no. 23.Provides network terminal, or remote login capability. The Internet Protocol (IP) It is a data-oriented protocol used for communicating data across a network. It is a best effort protocol; it does not guarantee delivery. It also makes no guarantee as to the correctness of the data it transports. Transmission using IP may result in duplicated packets and/or packets out-of-order. All of these contingencies are addressed by an upper layer protocol (For example, TCP) for applications that require reliable delivery. Address Resolution Protocol The Address Resolution Protocol is a method for translating between Internet layer and network layer address. The ARP module in a computer or router maintains a translation table of logical to physical mappings it is aware of, called the ARP cache. If there is not a translation for the address in the table, it will make an ARP broadcast. RARP (Reverse Address Resolution Protocol) It is a protocol by which a physical machine in a local area network can request to learn its IP address from a gateway server's Address Resolution Protocol (ARP) table or cache. A network administrator creates a table in a local area network's gateway router that maps the physical machine (or Media Access Control - MAC address) addresses to corresponding Internet Protocol addresses. When a new machine is set up, its RARP client program requests from the RARP server on the router to be sent its IP address. Assuming that an entry has been set up in the router table, the RARP server will return the IP address to the machine which can store it for future use. A reverse address resolution protocol (RARP) is used for diskless computers to determine their IP address using the network. Internet Control Message Protocol (ICMP) It works on port no. 113. The Internet Control Message Protocol (ICMP) is a helper protocol that supports IP with facility for: – Error reporting – Simple queries • ICMP messages are encapsulated as IP datagrams Internet Group Management Protocol (IGMP) It works on port no.119. It work on It is a communications protocol used by hosts and adjacent routers on IP networks to establish multicast group memberships .IGMP is an integral part of the IP multicast specification. It is analogous to ICMP for unicast connections. IGMP can be used for online streaming video and gaming, and allows more efficient use of resources when supporting these types of applications. IGMP is used on IPv4 networks. Multicast management on IPv6 networks is handled by Multicast Listener Discovery (MLD) which uses ICMPv6 messaging contrary to IGMP's bare IP encapsulation. The Point-to-Point Protocol (PPP)It is commonly used to establish a direct physical connection between two nodes. It can connect hosts using serial cable, phone lines, cellular phones, radio links, or fiber optic cables. Most dial-up internet service providers use PPP for customer access to the Internet Various Protocols with respective Port Numbers. Sno. Protocol Port number 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. TCPMUX FTP Data Transfer FTP Control Telnet SMTP IMP DHCP Server DHCP Client HTTP POP2 POP3 IRC NNTP NTP IMAP SGMP (Simple Gateway Monitoring Protocol) SNMP IRC IMAP v3 1 20 21 23 25 51 67 68 80 109 110 113 119 123 143 153 161 194 220 20. 21. 22. HTTPS RIP DNS 443 520 953 Aim 6 :Discuss the working of E-Mail . E-Mail Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the same time, in common with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver and store messages. Neither the users nor their computers are required to be online simultaneously; they need connect only briefly, typically to an email server, for as long as it takes to send or receive messages. An email message consists of three components, the message envelope, the message header, and the message body. The message header contains control information, including, minimally, an originator's email address and one or more recipient addresses. Usually descriptive information is also added, such as a subject header field and a message submission date/time stamp. Originally a text-only (7-bit ASCII and others) communications medium, email was extended to carry multimedia content attachments, a process standardized in RFC 2045 through 2049. Collectively, these RFCs have come to be called Multipurpose Internet Mail Extensions (MIME). Electronic mail predates the inception of the Internet, and was in fact a crucial tool in creating it, but the history of modern, global Internet email services reaches back to the early ARPANET. E-Mail Working Consider Alice composes a message using her mail user agent (MUA). She enters the email address of her correspondent, and hits the "send" button. Her MUA formats the message in email format and uses the Submission Protocol (a profile of the Simple Mail Transfer Protocol (SMTP), see RFC 6409) to send the message to the local mail submission agent (MSA), in this case smtp.a.org, run by Alice's internet service provider (ISP). The MSA looks at the destination address provided in the SMTP protocol (not from the message header), in this case [email protected]. An Internet email address is a string of the form localpart@exampledomain. The part before the @ sign is the local part of the address, often the username of the recipient, and the part after the @ sign is a domain name or a fully qualified domain name. The MSA resolves a domain name to determine the fully qualified domain name of the mail exchange server in the Domain Name System (DNS). The DNS server for the b.org domain, ns.b.org, responds with any MX records listing the mail exchange servers for that domain, in this case mx.b.org, a message transfer agent (MTA) server run by Bob's ISP. smtp.a.org sends the message to mx.b.org using SMTP. This server may need to forward the message to other MTAs before the message reaches the final message delivery agent (MDA). The MDA delivers it to the mailbox of the user bob. Bob presses the "get mail" button in his MUA, which picks up the message using either the Post Office Protocol (POP3) or the Internet Message Access Protocol (IMAP4). That sequence of events applies to the majority of email users. However, there are many alternative possibilities and complications to the email system: Alice or Bob may use a client connected to a corporate email system, such as IBM Lotus Notes or Microsoft Exchange. These systems often have their own internal email format and their clients typically communicate with the email server using a vendor-specific, proprietary protocol. The server sends or receives email via the Internet through the product's Internet mail gateway which also does any necessary reformatting. If Alice and Bob work for the same company, the entire transaction may happen completely within a single corporate email system. Alice may not have a MUA on her computer but instead may connect to a webmail service. Alice's computer may run its own MTA, so avoiding the transfer at step 1. Bob may pick up his email in many ways, for example logging into mx.b.org and reading it directly, or by using a webmail service. Domains usually have several mail exchange servers so that they can continue to accept mail when the main mail exchange server is not available. Email messages are not secure if email encryption is not used correctly. Many MTAs used to accept messages for any recipient on the Internet and do their best to deliver them. Such MTAs are called open mail relays. This was very important in the early days of the Internet when network connections were unreliable. If an MTA couldn't reach the destination, it could at least deliver it to a relay closer to the destination. The relay stood a better chance of delivering the message at a later time. However, this mechanism proved to be exploitable by people sending unsolicited bulk email and as a consequence very few modern MTAs are open mail relays, and many MTAs don't accept messages from open mail relays because such messages are very likely to be spam. Your e-mail client allows you to add attachments to e-mail messages you send, and also lets you save attachments from messages that you receive. Attachments might include word processing documents, spreadsheets, sound files, snapshots and pieces of software. Usually, an attachment is not text (if it were, you would simply include it in the body of the message). Since e-mail messages can contain only text information, and attachments are not text, there is a problem that needs to be solved. The recipient would then save the uuencoded portion of the message to a file and run uudecode on it to translate it back to binary. The word "reports" in the first line tells uudecode what to name the output file. Modern e-mail clients are doing exactly the same thing, but they run uuencode and uudecode for you automatically. If you look at a raw e-mail file that contains attachments, you'll find that the attachment is represented in the same uuencoded text format shown above! Considering its tremendous impact on society, having forever changed the way we communicate, today's e-mail system is one of the simplest things ever devised! There are parts of the system, like the routing rules in sendmail, that get complicated, but the basic system is incredibly straightforward. The next time you send an email, you'll know exactly how it's getting to its destination! The Real E-mail System For the vast majority of people right now, the real e-mail system consists of two different servers running on a server machine. One is called the SMTP Server, where SMTP stands for Simple Mail Transfer Protocol. The SMTP server handles outgoing mail. The other is a POP3 Server, where POP stands for Post Office Protocol. The POP3 server handles incoming mail. A typical e-mail server looks like this: The SMTP server listens on well-known port number 25, while POP3 listens on port 110mail Clients. You have probably already received several e-mail messages today. To look at them, you use some sort of e-mail client. Many people use well-known stand-alone clients like Microsoft Outlook, Outlook Express, Eudora or Pegasus. People who subscribe to free e-mail services like Hotmail or Yahoo use an e-mail client that appears in a Web page. If you are an AOL customer, you use AOL's e-mail reader. No matter which type of client you are using, it generally does four things: ·· It shows you a list of all of the messages in your mailbox by displaying the message headers. The header shows you who sent the mail, the subject of the mail and may also show the time and date of the message and the message size. It lets you select a message header and read the body of the e-mail message. It lets you create new messages and send them. You type in the e-mail address of the recipient and the subject for the message, and then type the body of the message. Most e-mail clients also let you add attachments to messages you send and save the attachments from messages you receive. Sophisticated e-mail clients may have all sorts of bells and whistles, but at the core, this is all that an e-mail client does. Aim 7 : To study brief introduction of packet tracer. Packet Tracer Packet Tracer is a Cisco router simulator that can be utilized in training and education, but also in research for simple computer network simulations. The tool is created by Cisco Systems and provided for free distribution to faculty, students, and alumni who are or have participated in the Cisco Networking Academy. The purpose of Packet Tracer is to offer students and teachers a tool to learn the principles of networking as well as develop Cisco technology specific skills Packet Tracer features The current version of Packet Tracer supports an array of simulated Application Layer protocols, as well as basic routing with RIP, OSPF, and EIGRP, to the extent required by the current CCNA curriculum. While Packet Tracer aims to provide a realistic simulation of functional networks, the application itself utilizes only a small number of features found within the actual hardware running a current Cisco IOS version. Thus, Packet Tracer is unsuitable for modeling production networks. With the introduction of version 5.3, several new features were added, including BGP. BGP is not part of the CCNA curriculum, but part of the CCNP curriculum. Use in education Packet Tracer is commonly used by Cisco Networking Academy students working towards Cisco Certified Network Associate (CCNA) certification. Due to functional limitations, it is intended by Cisco to be used only as a learning aid, not a replacement for Cisco routers and switches Aim 8 : To create a point to point topology using cisco packet tracer. Steps to follow: 1.Select two computets and drag them on the editor. 2.Use a copper cable and connect them 3.Assign diff ip to both of them 4.Select a msg and send it to pc1 from pc0. Aim 9 : To create a star topology using cisco packet tracer. Steps to follow: 1.Select four computets and a hub, drag them on the editor. 2.Use a copper cable and connect them 3.Assign diff ip to all of them except hub. 4.Select a msg and send it to pc1 from pc0. Aim 10 : To create a mesh topology using cisco packet tracer. Steps to follow: 1.Select four computets and four swithes, drag them on the editor. 2.Use a copper cable and connect them 3.Assign diff ip to all of them except swithes. 4.Select a msg and send it to pc1 from pc0. Aim 11 : To create a bus topology using cisco packet tracer. Steps to follow: 1.Select a server, five computers and five swithes, drag them on the editor. 2.Use a copper cable and connect them 3.Assign diff ip to all of them except swithes. 4.Select a msg and send it to sever from pc4. 5.Result successful as shown in fig . Aim 12: To create a ring topology using cisco packet tracer. Steps to follow: 1.Select six computers and six swithes, drag them on the editor. 2.Use a copper cable and connect them 3.Assign diff ip to all of them except swithes. 4.Select a msg and send it to pc2 from pc5. 5.Result successful as shown in fig . Aim 13 : To create a tree topology using cisco packet tracer. Steps to follow: 1.Select seven computers and five hubs, drag them on the editor. 2.Use a copper cable and connect them 3.Assign diff ip to all of them except hubs. 4.Select a msg and send it to pc2 from pc0. 5.Result successful as shown in fig . Aim 14: Difference between yahoo mail and Gmail (Google mail): YAHOO MAIL GOOGLE MAIL 1Yahoo started its web mail services under the name Yahoo mail on October 8, 1997, with Linux at the server end. 1 Google entered the Webmail segment on April 1, 2004 under the name Gmail. 2 Yahoo moves onto another page for attachments. 2Gmail lets you add attachments more conveniently from the same screen where you are composing an email, 3 it is not so in gmail 3 In Yahoo, you may require to add boxes for more than five attachments 4 Yahoo sticks onto its independent Instant Messenger for chatting. 5 inYahoo Mail; you can opt to save a contact to your list or not. 6 , Yahoo Mail treats every conversation unique. 4 Gmail offers the chat module integrated to the email module. 5 Gmail automatically stores all email addresses to which you sent and receive emails to your contact list. 6 The webmail is arranged in a conversation model in Gmail as in an Instant Messenger. Every time you reply to someone, it will be added as a conversation to the primary email. 7 it is less vulnerable to spams 7 Yahoo Mail is more vulnerable to Spam emails 8 in Yahoo mail, a user has to upgrade to a paid version in order to gain these services. 8 With Gmail, the user gets email forwarding and POP access for free 9 Gmail is less cluttered 9 YAHOO is more cluttered 10 Yahoo later created the Ajax version in 2004. 11 Yahoo has IM as well, it is not nearly as accessible as the one found within Gmail. 10 While Gmail remains as the first webmail to employ Ajax Programming technique for its search oriented interface 11 it allows you to send instant messages to your contacts that are online quickly and easily. 12 Gmail’s IM is not separate from its e-mail service. 12 Yahoo’s IM is separate from its e-mail service. 13 it allows you to label folders, keeps all your 13 it allows better folder creation and organization. Yahoo mail allows you to label and organize your folders how you like making the mail system . 14 Yahoo mail only allows attachments up to 10mb on its free version, 15 it is considered less professional. 16 Yahoo is better for mobile users. 17 For IMAP lovers, Yahoo’s implementation is much better. 18 An Yahoo id is just for Yahoo. No other services are linked to it. folders in approximately the same area, making organization with a large amount of folders difficult. 14 Gmail allows for a bigger attachment size.Upto 20 mb in its free version. 15 one of the more important aspects of Gmail is the fact that it is considered the more “professional” of the e-mail services. 16 Gmail, an issue for mobile users. 17 Gmail gets weird on IMAP and is a devourer of bandwidth. 18 when you make a gmailaccount, you can’t just make Gmail. You have other services like youtube, blogger, picasa, and other services linked to it. 19 Gmail is more user friendly. 19 Yahoo is less user friendly. 20 Yahoo mail users need to type email addresses each time a user needed to send an email. 21 when emails are either deleted or moved to a new folder in Yahoo mail the screen must be given time to refresh. 20 Gmail “remembers” previously used email addresses so that the address must only be keyed in for the initial email. 21 Google utilized a coding language called Ajax which allows Gmail users to delete mail, archive mail, and otherwise move it to any other folder without wasting a few seconds each time waiting for the screen to refresh.