DCC Report Final
DCC Report Final
Certificate
This is to certify that Mr. Sayyed Abdul Mannan Roll No.
220447 of fourth semester of Diploma in Computer
Engineering of institute M.H. Saboo Siddik Polytechnic
(Code:0002) has completed microproject satisfactorily in
the subject: DCC (22414) for the academic year 2023-24 as
prescribed in the curriculum.
SEAL OF
INSTITUTE
MAHARASHTRA STATE
BOARD OF TECHNICAL EDUCATION
Certificate
This is to certify that Mr. Shaikh Tauheed Abdul Hameed
Roll No.220457 of fourth semester of Diploma in Computer
Engineering of institute M.H. Saboo Siddik Polytechnic
(Code:0002) has completed microproject satisfactorily in
the subject: DCC (22414) for the academic year 2023-24 as
prescribed in the curriculum.
SEAL OF
INSTITUTE
MAHARASHTRA STATE
BOARD OF TECHNICAL EDUCATION
Certificate
This is to certify that Mr. Yadav Deepak Ramdarash
Roll No. 220463 of fourth semester of Diploma in Computer
Engineering of institute M.H Saboo Siddik Polytechnic
(Code:0002) has completed microproject satisfactorily in
the subject: DCC (22414) for the academic year 2023-24 as
prescribed in the curriculum.
SEAL OF
INSTITUTE
MAHARASHTRA STATE
BOARD OF TECHNICAL EDUCATION
Certificate
This is to certify that Mr. Chowdhry Mohd Mujahid Shabbir
Ahmed Roll No. 230481 of fourth semester of Diploma in
Computer Engineering of institute M.H. Saboo Siddik
Polytechnic (Code:0002) has completed microproject
satisfactorily in the subject: DCC (22414) for the academic
year 2023-24 as prescribed in the curriculum.
SEAL OF
INSTITUTE
Acknowledgment
We wish to express our profound gratitude to our guide Mr. Mohammad Ali Sir
who guided us endlessly in the framing and completion of the micro project. He
guided us on all the main points in that micro project. We are indebted to his/her
constant encouragement, cooperation, and help. It was his/her enthusiastic
support that helped us in overcoming various obstacles in the micro-project.
We are also thankful to our Principal, HOD, faculty members and classmates of
Computer Engineering department for extending their support and motivation in
the completion of this micro-project.
I. Aims/Benefits of microproject
During the preparation of this microproject, our primary objective was to gain insights
into the diverse array of networking devices and their ubiquitous presence in our
everyday lives. This endeavour not only facilitated our understanding of these devices
but also enabled us to classify them based on their functionalities and distinguish
between their respective uses. Furthermore, we encountered practical scenarios where
the selection of appropriate network devices became imperative, providing us with
valuable hands-on experience in real-world applications.
3 Preparation of abstract
4 Literature review
V. Resources required
Name of
Sr. no. Specifications Qty Remarks
resources
Learning resources and
1. Online 5 sites
various websites
Microsoft word, Tools with
2. Desktop 1 for each
internet facility.
Names of Team Members with Roll Nos.
Approved by:
Sign of Faculty:
Name of faculty: Prof. Mohammad Ali
Annexure-II
Microproject Report
Title of Micro-Project: Network Switching Techniques
I. Rationale
A data communication and computer networks has been growing with rapid
technological progress. Computer communication through networking becomes
essential part of our life. By considering importance of networking in day today life, it
is essential for students to know the basic concept of networks like network
classification, network topologies. Network devices. This course deal with the
important concepts and techniques related to data communication and enable students
to have an insight in to technology involved to make the network communication
possible.
DATA COMMUNICATION
Certainly! Data communication refers to the exchange of data between
devices or systems through a transmission medium such as wires, cables, optical
fibres, or wireless channels. This exchange can occur over short distances (such
as within a computer or between nearby devices) or over long distances (such as
between computers in different geographical locations).
4. Protocols: Protocols are rules and conventions that govern how data is
formatted, transmitted, received, and interpreted during communication.
Examples include TCP/IP (Transmission Control Protocol/Internet Protocol),
HTTP (Hypertext Transfer Protocol), and Ethernet.
COMPUTER NETWORKS
Computer networks refer to interconnected systems of computers and
other devices that can communicate and share resources with each other. These
networks can vary in size, complexity, and purpose, ranging from small local area
networks (LANs) within a single building to vast global networks like the internet.
Here are some key aspects of computer networks:
1. Types of Networks:
- Local Area Network (LAN): A LAN covers a small geographical area, typically
within a single building or campus. It allows devices such as computers, printers,
and servers to communicate and share resources.
- Wide Area Network (WAN): WANs span larger geographical areas, often
connecting multiple LANs across cities, countries, or continents. The internet is
the largest example of a WAN.
- Metropolitan Area Network (MAN): MANs cover an intermediate
geographical area, such as a city or metropolitan area, and typically connect
multiple LANs and other networks.
- Wireless Networks: Wireless networks use radio waves or infrared signals to
transmit data instead of physical cables. Examples include Wi-Fi networks and
cellular networks.
2. Network Topologies:
- Bus Topology: In a bus topology, all devices are connected to a single
communication line (bus). Data transmitted by one device is received by all other
devices on the bus.
- Star Topology: In a star topology, each device is connected directly to a central
hub or switch. Data transmitted between devices passes through the hub.
- Ring Topology: In a ring topology, each device is connected to exactly two other
devices, forming a closed loop. Data circulates around the ring until it reaches its
destination.
- Mesh Topology: In a mesh topology, every device is connected to every other
device in the network. This provides redundancy and multiple paths for data to
travel.
3. Networking Devices:
- Router: A router connects multiple networks together and forwards data
packets between them. It operates at the network layer (Layer 3) of the OSI model.
- Switch: A switch connects devices within a single network and forwards data
packets directly to the intended recipient based on the MAC address. It operates
at the data link layer (Layer 2) of the OSI model.
- Hub: A hub is a basic networking device that connects multiple devices in a
network, but it simply broadcasts data to all connected devices without any
intelligence.
- Modem: A modem modulates and demodulates digital data to enable
communication over analog communication channels such as telephone lines or
cable systems.
4. Network Protocols:
- TCP/IP: Transmission Control Protocol/Internet Protocol is the fundamental
protocol suite used for communication on the internet and many private networks.
- HTTP/HTTPS: Hypertext Transfer Protocol and its secure version are used
for transferring web pages and other data on the World Wide Web.
- FTP: File Transfer Protocol is used for transferring files between computers
on a network.
- SMTP/POP3/IMAP: Simple Mail Transfer Protocol, Post Office Protocol, and
Internet Message Access Protocol are used for sending and receiving emails.
5. Network Security
6. Network Services:
- Domain Name System (DNS): DNS translates domain names (e.g.,
www.example.com) into IP addresses that computers can understand.
- Dynamic Host Configuration Protocol (DHCP): DHCP automatically assigns
IP addresses and other network configuration parameters to devices on a network.
WHAT IS SWITCHING?
In computer networking, Switching is the process of transferring data packets
from one device to another in a network, or from one network to another,
using specific devices called switches. A computer user experiences switching
all the time for example, accessing the Internet from your computer device,
whenever a user requests a webpage to open, the request is processed through
switching of data packets only.
Switching takes place at the Data Link layer of the OSI Model. This means
that after the generation of data packets in the Physical Layer, switching is
the immediate next process in data communication. In this article, we shall
discuss different processes involved in switching, what kind of hardware is
used in switching, etc.
1. Data Link Layer Operation: The Data Link layer in the OSI model is
responsible for framing data packets, error detection, and flow control
between directly connected devices. Switching occurs at this layer,
which sits above the Physical Layer (dealing with raw transmission of
bits) and below the Network Layer (where routing decisions are made).
2. Packet Transfer Mechanism: Switches utilize packet switching, a
method where data is transmitted in discrete units or packets. These
packets contain both data and control information, including source
and destination addresses. The switch's role is to examine the
destination address of each packet and forward it to the appropriate
outgoing port.
3. Forwarding Decision Process: Upon receiving a packet, the switch
inspects the destination MAC (Media Access Control) address in the
packet header. It then consults its forwarding table, also known as a
MAC address table or content addressable memory (CAM) table, to
determine the egress port for the packet.
4. Forwarding Table Management: The forwarding table maintains
mappings between MAC addresses and the corresponding switch ports.
These mappings are learned dynamically through a process called MAC
address learning. When a packet arrives at a port, the switch records
the source MAC address along with the ingress port in its forwarding
table.
5. Hardware Implementation: Switches are specialized hardware devices
designed to handle switching operations efficiently. They feature
multiple ports (e.g., Ethernet ports) to connect devices and ASICs
(Application-Specific Integrated Circuits) optimized for packet
switching. ASICs enable switches to process packets at wire speed,
ensuring high throughput and low latency.
Types of Switching Methods:
A switch decides the port through which a data packet shall pass with the
help of its destination MAC(Media Access Control) Address. A switch does this
effectively by maintaining a switching table, (also known as forwarding table).
PROCESS OF SWITCHING
The switching process involves the following steps:
Frame Reception:
o When a device connected to one of the switch's ports sends data, the
switch receives the data frame or packet on that port.
o The switch examines the incoming frame, which includes both the
data payload and header information. The header contains various
fields, including the source and destination MAC addresses.
SWITCHING TECHNIQUES
o In large networks, multiple paths from sender to receiver exist,
necessitating the selection of the optimal route for data transmission.
Switching techniques facilitate one-to-one communication by efficiently
connecting systems within the network.
o These techniques analyse network conditions and device configurations
to determine the most suitable path for data transfer. By directing data
packets along the most efficient route, switching techniques enhance
network performance and reduce latency.
o This ensures that communication between systems is reliable and
timely, even in complex network environments. Overall, switching
techniques play a crucial role in optimizing data transmission and
maintaining seamless connectivity across interconnected systems.
o Circuit establishment
o Data transfer
o Circuit Disconnect
o Crossbar Switch
o Multistage Switch
Crossbar Switch
The Crossbar switch is a switch that has n input lines and n output lines. The
crossbar switch has n2 intersection points known as crosspoints.
Multistage Switch
o Once the dedicated path is established, the only delay occurs in the
speed of data transmission.
o It takes a long time to establish a connection approx. 10 seconds during
which no data can be transmitted.
o It is more expensive than other switching techniques as a dedicated
path is required for each connection.
o It is inefficient to use because once the path is established and no data
is transferred, then the capacity of the path is wasted.
o In this case, the connection is dedicated therefore no other data can be
transferred even if the channel is free
MESSAGE SWITCHING
o Message Switching is a switching technique in which a message is
transferred as a complete unit and routed through intermediate nodes
at which it is stored and forwarded.
o In Message Switching technique, there is no establishment of a
dedicated path between the sender and receiver.
o The destination address is appended to the message. Message
Switching provides a dynamic routing as the message is routed through
the intermediate nodes based on the information available in the
message.
o Message switches are programmed in such a way so that they can
provide the most efficient routes.
o Each and every node stores the entire message and then forward it to
the next node. This type of network is known as store and forward
network.
o Message switching treats each message as an independent entity.
PACKET SWITCHING
o The packet switching is a switching technique in which the message is
sent in one go, but it is divided into smaller pieces, and they are sent
individually.
o The message splits into smaller pieces known as packets and packets
are given a unique number to identify their order at the receiving end.
o Every packet contains some information in its headers such as source
address, destination address and sequence number.
o Packets will travel across the network, taking the shortest path as
possible.
o All the packets are reassembled at the receiving end in correct order.
o If any packet is missing or corrupted, then the message will be sent to
resend the message.
o If the correct order of the packets is reached, then the acknowledgment
message will be sent.
Approaches Of Packet Switching:
There are two approaches to Packet Switching:
o In the above diagram, A and B are the sender and receiver respectively.
1 and 2 are the nodes.
o Call request and call accept packets are used to establish a connection
between the sender and receiver.
o When a route is established, data will be transferred.
o After transmission of data, an acknowledgment signal is sent by the
receiver that the message has been received.
o If the user wants to terminate the connection, a clear signal is sent for
the termination.
DIFFERENCES B/W DATAGRAM APPROACH AND
VIRTUAL CIRCUIT APPROACH
Node takes routing decisions to Node does not take any routing decision.
forward the packets.
Congestion cannot occur as all the Congestion can occur when the node is busy,
packets travel in different directions. and it does not allow other packets to pass
through.
Name of student: Sayyed Abdul Mannan Abdul Salam Enrolment No: 2200020319
Name of programme: Computer Engineering Semester: 4th
Course title: Data Communication and Computer Networks Code: 22414
Title of microproject: Network Switching Techniques
Course outcomes achieved:
a) Analyse the functioning of data communication and computer network.
b) Select relevant transmission media and switching techniques as per need.
Name of student: Chowdhry Mohd Mujahid Shabbir Ahmed Enrolment no: 23150360351
Name of programme: Computer Engineering Semester: 4th
Course title: Data Communication and Computer Networks Code: 22414
Title of microproject: Network Switching Devices
Course outcomes achieved:
a) Analyse the functioning of data communication and computer network.
b) Select relevant transmission media and switching techniques as per need.