computer networks full report
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar topics
Active In SP
**

Posts: 559
Joined: Mar 2010
#1
17-03-2010, 11:59 AM



.ppt   Introduction to Computer Networks.ppt (Size: 639.5 KB / Downloads: 205)

Introduction to Computer Networks
Internet Structure
Autonomous Systems (AS)

Internet is not a single network!

The Internet is a collection of networks, each controlled by different administrations

An autonomous system (AS) is a network under a single administrative control
AS Numbers (ASNs)
Implications

ASs want to choose own local routing algorithm
AS takes care of getting packets to/from their own hosts
Intradomain routing: RIP, OSPF, etc

ASs want to choose own non-local routing policy
Interdomain routing must accommodate this
BGP is the current interdomain routing protocol
BGP: Border Gateway Protocol
Example
Intra-Domain
Inter-Domain
Inter-Domain Routing
Global connectivity is at stake
Inevitably leads to one single protocol that everyone must speak
Unlike many choices in intra-domain routing
What are the requirements?
Scalability
Flexibility in choosing routes
If you were to choose, link state based or distance vector based?

BGP is sort of a hybrid: Path vector protocol
Border Gateway Protocol Part I: E-BGP
Purpose of E-BGP
Part II: I-BGP, Carrying Info within an AS
I-BGP
Join I-BGP with IGP to Create Forwarding Table
Multiple Routing Processes on a Single Router
Routing between ISPs
Routing protocol (BGP) contains reachability information (no metrics)
Not about optimizing anything
All about policy (business and politics)
Why?
Metrics optimize for a particular criteria
AT&Tâ„¢s idea of a good route is not the same as UUnetâ„¢s
Scale
What a BGP speaker announces or not announces to a peer determines what routes may get used by whom
Nontransit vs. Transit ASes
Selective Transit
Customers and Providers
Customers Donâ„¢t Always Need BGP
Customer-Provider Hierarchy
The Peering Relationship
Peering Provides Shortcuts
BGP: Path Vector Protocol
Distance vector algorithm with extra information
For each route, store the complete path (ASs)
No extra computation, just extra storage

Advantages:
can make policy choices based on set of ASs in path
can easily avoid loops
BGP Operations (Simplified)
Four Types of BGP Messages
Open : Establish a peering session.
Keep Alive : Handshake at regular intervals.
Notification : Shuts down a peering session.
Update : Announcing new routes or withdrawing previously announced routes.
Attributes are Used to Select Best Routes
Example: Multiple AS Paths
Shorter Doesnâ„¢t Always Mean Shorter
Implementing Customer/Provider and Peer/Peer relationships
What you announce determines what route can be used by whom

Enforce transit relationships
Outbound route filtering
Enforce order of route preference
provider < peer < customer


Import Routes

Export Routes
How Can Routes be Colored? BGP Communities!
Example AS Graph
BGP Issues
BGP designed for policy not performance

Susceptible to router misconfiguration
Blackholes: announce a route you cannot reach

Incompatible policies
Solutions to limit the set of allowable policies
More Issues
Scaling the I-BGP mesh
Confederations
Route Reflectors
BGP Table Growth
140K prefixes and growing
Address aggregation (CIDR)
Address allocation
AS number allocation and use
Dynamics of BGP
Inherent vs. accidental oscillation
Rate limiting and route flap dampening
Lots and lots of redundant info
Slow convergence time
please read topicideashow-to-computer-networks-full-report for computer networks full seminar and presentation report
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#2
02-04-2011, 03:10 PM


.docx   TYPES OF COMPUTER NETWORKS.docx (Size: 23.67 KB / Downloads: 85)
TYPES OF COMPUTER NETWORKS:
A computer networks is a communication system connecting two or more computers that work together to exchange information & share resources. A network may consist of microcomputers or it may integrate microcomputers or other devices with large computer. Networks can be controlled by all nodes co-ordinarily & supply all resource. These networks differ in geographical size. There are three important types of networks.
1. Local Area Network
2. Metropolitan Area Network
3. Wide Are Network
1. Local Area Network:
A computer is connected to other computer with cables and other means & make communication possible between them is called network. The network, which connects one or more computers within a limited distance of one another perhaps within the same building or within the same office premises, is known as Local Area Network. This requires special software NetWare, LAN Cards (Ethernet Card), cables and connectors etc required for connecting computers included in it. Many organisations need multi-user environment, which allows sharing of data as well as expensive resources like printers and storage. Following figures shows the multi-user system, which includes LAN. A local Area Network is a system of interlinked personal computer, sharing common resources, like disks, printers etc. These networks are widely used now days.
LAN used for following purposes
1) Data processing: Data entry transaction processing (Banking system0, File transfer, Inquiry/response.
2) Office Automation: Document/word processing, Electronic mail, Intelligent copying.
3) Factory Automation: CAD/CAM, Inventory control/order entry/shipping, Monitor and control of factory floor equipment
4) Process control
5) Fire & Security: Sensor alarms. Cameras and monitors.
6) Telephones, Teleconferencing.
Metropolitan Area Network: (MAN) These networks are used as links between office buildings in a city. Cellular phone systems expand flexibility of Manes by allowing links to car phones and portable computers.
WIDE AREA NETWROK: (WAN) Wide area Network is a countrywide and worldwide network. Among other kinds of channels, they use microwave relays and satellites to reach users over long distances – for e.g. from Los-angels to Paris. The widest of all WANs is the Internet, which spans the entire globe. The primary difference between a LAN, MAN and WAN is geographical range. Each may have various combinations of hardware, such as microcomputers, minicomputers, mainframe computers and various peripheral devices.
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#3
28-01-2012, 11:45 AM

computer networks full report


.ppt   lecture1.ppt (Size: 303.5 KB / Downloads: 65)
LAN, MAN & WAN



Network in small geographical Area (Room, Building or a Campus) is called LAN (Local Area Network)


Network in a City is call MAN (Metropolitan Area Network)


Network spread geographically (Country or across Globe) is called WAN (Wide Area Network)


Network Topology

The network topology defines the way in which computers, printers, and other devices are connected. A network topology describes the layout of the wire and devices as well as the paths used by data transmissions.


Bus Topology

Commonly referred to as a linear bus, all the devices on a bus topology are connected by one single cable


Ring Topology

.A frame travels around the ring, stopping at each node. If a node wants to transmit data, it adds the data as well as the destination address to the frame.
.The frame then continues around the ring until it finds the destination node, which takes the data out of the frame.
Single ring – All the devices on the network share a single cable
Dual ring – The dual ring topology allows data to be sent in both directions.

Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#4
08-02-2012, 01:16 PM

computer networks


.pdf   A4_report-2010-g1.pdf (Size: 1.19 MB / Downloads: 38)

UDP transmission is different from TCP transmission in that:
1.UDP transmission is unidirectional; information is sent only from the source to the destination, and the absence of feedback from the receiver prevents the sender from knowing whether the transmitted segments arrived successfully in order. In other words, retransmission is not supported.
2.UDP does not provide any means of reliability or congestion control. There’s no concept of acknowledgement and retransmission timer. What arrives is simply what the receiver gets.


Explanation for Simulator.run()

The only thing changed in the simulator.run() function is the addition of the UDP sender and receiver functions.
•An additional array is created to store the UDP segments.
•When the TCP Sender is called, the UDP sender is called next.
•When the router is called, the UDP segments along with the TCP segments are sent to the function.
•Lastly, when the TCP Receiver is called, the UDP receiver is called next.

Explanation for UDPSender.send()

The UDPSenderclass has two variables, RTTand sendMode.
•RTTkeeps track of the number of iterations.
•sendModeis 1 when the UDP Sender is sending packets and is 0 when the UDP Sender is not sending packets (off mode).The UDP Sender has two options:
•If sendModeis 1 then it initializes the array of UDP segments to the number of packets selected by the user.
•If sendModeis 0 then it increases the RTT by 1.In order to identify whether or not sendModeis 1 or 0, we use a modulus of two times sendModeduration.

Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#5
31-03-2012, 10:43 AM

to get information about the topic "computer networking" full report ppt and related topic refer the link bellow

topicideashow-to-computer-networking-full-report?pid=45781

topicideashow-to-computer-networking-full-report

topicideashow-to-introduction-to-computer-networking

topicideashow-to-computer-networks-full-report--9000
Reply
seminar ideas
Super Moderator
******

Posts: 10,003
Joined: Apr 2012
#6
13-08-2012, 02:39 PM

Computer Networks



.ppt   Computer Networks.ppt (Size: 549.5 KB / Downloads: 37)

Critical Features of TCP



Increase rate until packet loss
What’s the problem?
Use loss as indication of congestion
What’s the problem?
AIMD mechanism oscillates around proper rate
What’s the problem?
Relies on AIMD behavior of end hosts
What’s the problem?
Slow start to probe for initial rate
What’s the problem?



Why Bad for Short Lived Flows?


Typical Web transfer ~ 10 KB
That translates into ~ 10 packets
That is a Web transfer is typically finished before slow-start is finished probing for bandwidth

Moreover, a small number of packet loss among 10 packets can be blow up the overall transfer time by a large amount
Potentially timeout, retransmit, etc
Transfer time is small, so any delay is very significant



Smoothing Transmission Rate


TCP has saw tooth behavior, not smooth

If we can calculate the average rate, then we can just transmit smoothly at the average rate


TCP Model


Derive an expression for the steady state throughput as a function of
RTT
Loss probability

Assumptions
Each packet dropped with iid probability p

Methodology: analyze “average” cycle in steady state
How many packets are transmitted per cycle?
What is the duration of a cycle?


Traditional Role of Router


Routers are in middle of action

Main job is routing and forwarding

But traditional routers are very passive in terms of congestion control
FIFO
Drop-tail





Reply
seminar tips
Super Moderator
******

Posts: 8,857
Joined: Oct 2012
#7
17-01-2013, 09:43 AM

to get information about the topic "computer networks" full report ppt and related topic refer the link bellow

topicideashow-to-computer-networking-full-report

topicideashow-to-computer-networks-full-report--9000

topicideashow-to-fiber-optics-based-computer-network-full-report

topicideashow-to-network-security-full-report

topicideashow-to-introduction-to-computer-networks-ppt--73383

topicideashow-to-computer-networks-interview-questions
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  web spoofing full report computer science technology 13 9,012 20-05-2016, 11:59 AM
Last Post: Dhanabhagya
  Computer Memory Based on the Protein Bacteriorhodopsin seminar projects crazy 16 9,050 06-09-2015, 04:54 PM
Last Post: Larbaski
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,272 16-07-2015, 09:21 PM
Last Post: Guest
  essay about computer in tamil jaseelati 0 333 26-02-2015, 04:30 PM
Last Post: jaseelati
  seminar topics for computer networking with ppt jaseelati 0 295 18-02-2015, 02:37 PM
Last Post: jaseelati
  assembling and disassembling of computer ppt jaseelati 0 281 17-02-2015, 02:51 PM
Last Post: jaseelati
  computer oriented numerical methods ppt jaseelati 0 249 13-02-2015, 01:15 PM
Last Post: jaseelati
  basic computer knowledge pdf in marathi jaseelati 0 318 11-02-2015, 01:21 PM
Last Post: jaseelati
  basic computer knowledge pdf in marathi jaseelati 0 268 07-02-2015, 02:23 PM
Last Post: jaseelati
  advantages and disadvantages of computer in tamil language jaseelati 0 395 05-02-2015, 04:51 PM
Last Post: jaseelati