Zeal Polytechnic Department of Computer Engineering: Micro Project

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

ZEAL POLYTECHNIC

Institute Code:0988

Department Of Computer
Engineering
Micro Project
Report
On
Prepare specification for Peer to Peer Network
Prepared By
Roll no. Enrollment No. Name
10 2109880380 Madhura Dada Gaikwad
11 2109880525 Aakanksha Bajirao Waje
25 2109880374 Shravani Dattaram Gaikar
27 2109880481 Divya Dyneshwar Raut
33 2109880531 Chaitanya Umesh Yewale

Under the Guidance of


Prof. Mrs.Snehal kokil

Submitted To
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
Certificate

This is to certify that Ms. Madhura Dada Gaikwad Roll No. 10 of 4th
Semester of Diploma in computer Engineering of Institute Zeal
Polytechnic (0988 ) has completed the Micro-Project work satisfactorily in
course Computer Engineering for the academic year 2022 to 2023 as
prescribed in the curriculum.

Place: Pune Enrollment No: 2109880380

Date: …………… Exam. Seat No: ……………

Subject Teacher Head of the Department Principal


MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
Certificate

This is to certify that Ms. Aakanksha Bajirao Waje Roll No. 11 of 4th
Semester of Diploma in Computer Engineering of Institute Zeal
Polytechnic (0988 ) has completed the Micro-Project work satisfactorily in
course Computer Engineering for the academic year 2022 to 2023 as
prescribed in the curriculum.

Place: Pune Enrollment No: 2109880525

Date: …………… Exam. Seat No: ……………

Subject Teacher Head of the Department Principal


MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
Certificate

This is to certify that Ms. Shravani Dattaram Gaikar Roll No. 25 of


4th Semester of Diploma in computer Engineering of Institute Zeal
Polytechnic (0988 ) has completed the Micro-Project work satisfactorily in
course Computer Engineering for the academic year 2022 to 2023 as
prescribed in the curriculum.

Place: Pune Enrollment No: 2109880374

Date: …………… Exam. Seat No: ……………

Subject Teacher Head of the Department Principal


MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
Certificate

This is to certify that Ms. Divya Dyaneshwar Raut Roll No. 27 of 4th
Semester of Diploma in Computer Engineering of Institute Zeal
Polytechnic (0988 ) has completed the Micro-Project work satisfactorily in
course Computer Engineering for the academic year 2022 to 2023 as
prescribed in the curriculum.

Place: Pune Enrollment No: 2109880481

Date: …………… Exam. Seat No: ……………

Subject Teacher Head of the Department Principal


MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
Certificate

This is to certify that Ms. Chaitanya Umesh Yewale Roll No. 33 of 4th
Semester of Diploma in Computer Engineering of Institute Zeal
Polytechnic (0988 ) has completed the Micro-Project work satisfactorily in
course Computer Engineering for the academic year 2022 to 2023 as
prescribed in the curriculum.

Place: Pune Enrollment No: 2109880531

Date: …………… Exam. Seat No: ……………

Subject Teacher Head of the Department Principal


MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION

Certificate

This is to certify that following student

Roll no. Enrollment No. Name

10 2109880380 Madhura Dada Gaikwad


11 2109880525 Aakanksha Bajirao Waje
25 2109880374 Shravani Dattaram Gaikar
27 2109980481 Divya Dyneshwar Raut
33 2109880531 Chaitanya Umesh Yewale

of 4th Semester of Diploma in Computer Engineering of


Institude Zeal Polytechnic (0988) are completed the Micro Project
work satisfactorily in course Data communication and computer
network ( 22414) for the academic year 2022 – 2023 as prescribed in
the curriculum.

Place: Pune
Date: ……………

Subject Teacher Head of the Department Principal


Sr.No Topic Page No

1 Introduction 2

2 Aim of the Micro-Project 2

3 P2P History 2

4 Purposed of P2P 2

5 Proposed Methodology 2

6 Resources Required 2

7 Rationale 3

8 Course Out Comes 3

9 Actual Methodology Followed 3

10 Outcomes of the Micro-Project 3

11 History of Computer Network 4

12 Configure Peer to Peer network 5

13 How To Setup A Peer-To-Peer Network 6

14 Actual Resources Used 9

15 Applications of this Micro-Project 9

16 Conclusion 9

1
Annexure – I

PART A – Micro Project Proposal

Specification for Peer to Peer Network

1. Introduction
In peer-to-peer networking, the term “peer” represents a single computer or device linked with
other systems via the internet. The short form of peer-to-peer networking is P2P, where no need for
a central system (server) is required. P2P enables the connected system to share any data or files on
any other device using the network. In P2P, every system can act as a server and a client, depending
on the role. Fig. 1 clearly illustrates the difference between server-based networking and peer-to-
peer based networking.

2. Aim of the Micro-Project


This Micro-Project aims :
1. The aim of this course is to help the student to affined following industry identified competency
through various teaching learning experience.
2. Develop Peer to Peer network connection.

3. History of P2P Network

USENET, which was founded in 1979, seems to be the predecessor to P2P networks. It was a
platform that required messages/news to be posted, read, and shared by clients. Like current
online communities, this was a network structure. USENET replicated all the servers placed
on the network with the same communication. Likewise, all the services open to them are
spread and used through P2P networks.

The next major trend in P2P development was when Napster was brought into existence in
1999. Napster was a program for file sharing that was utilized to share and stream music
through individuals. It was typically copyrighted and therefore unlawful to download the music
posted on Napster. That did not deter individuals from having it. While Napster was the one
who brought P2P into the spotlight, because of all the material that was inappropriately spread
on it, Napster eventually suffered and was closed by the authorities. Nowadays, P2P, both
lawfully and illegally, becomes among the most common applications for exchanging data
online.

2
4 . Purpose of P2P:

Peer to peer is an efficient approach for transferring data using the internet. It has various applications
that include,

1. P2P networking allows the transfer of data security. Protection protocols are active and
move the data without any interruption.
2. It is easy to control various applications and precious data using P2P networking.
3. Strict monitoring is carried out, focusing the entire network consecutively to keep the
environment malware free.
4. To set up the network, invest in a high-quality P2P application that is highly robust to
virtual attacks.

5. Proposed Methodology
1. Focused on the selection of an appropriate topic for the micro-project.
2. Select the topic i.e. To Prepare a report on specification peer-to-peer network
3. study on our topic.
4. Gather all information based on the topic of the micro project.
5. Analysis and study of our topic in detail. |
6. Following all the above methodologies we successfully completed our microproject

6. Resources Required

S. No. Name of Resource/material Specifications Qty Remarks

1 Computer 8GB RAM 500 GB 1


SSD

2 Software MS Word 1

3 Internet W3 School 1

**************

3
Annexure – II

PART B – Micro-Project Report

7. Rationale

The primary goal of peer-to-peer networks is to share resources and help computers and devices work
collaboratively, provide specific services, or execute specific tasks. As mentioned earlier, P2P is used
to share all kinds of computing resources such as processing power, network bandwidth, or disk
storage space.

8. Course Outcomes Addressed

• Specification for peer-to-peer network

9. Actual Methodology Followed

1. Focused on the selection of an appropriate topic for the micro-project.


2. Select the topic i.e. To Prepare a report on peer-to-peer connection.
3. Brief study on our topic.
4. Gather all information based on the topic of the micro project.
5. Analysis and study of our topic in detail.
6. Following all the above methodologies we successfully completed our microproject.

10. Outcomes of the Micro-Project

Computer Network :-

Computer networking refers to interconnected computing devices that can exchange data and share
resources with each other. These networked devices use a system of rules, called communications protocols,
to transmit information over physical or wireless technologies

How does a computer network work?

Nodes and links are the basic building blocks in computer networking. A network node may be data
communication equipment (DCE) such as a modem, hub or, switch, or data terminal equipment (DTE) such
as two or more computers and printers. A link refers to the transmission media connecting two nodes.
Links may be physical, like cable wires or optical fibers, or free space used by wireless networks.

In a working computer network, nodes follow a set of rules or protocols that define how to send and receive
electronic data via the links. The computer network architecture defines the design of these physical and
logical components. It provides the specifications for the network’s physical components, functional
organization, protocols, and procedure

3
11 .History of Computer Network :

In the late 1950s, early networks of computers included the U.S. military radar system Semi-Automatic
Ground Environment (SAGE).

• In 1959, Christopher Strachey filed a patent application for application for time-
sharing and John McCarthy initiated the first project to implement time-sharing of user programs
at MIT. Stratchey passed the concept on to J. C. R. Licklider at a UNESCO-sponsored conference
on Information Processing in Paris that year McCarthy was instrumental in the creation of three
of the earliest time-sharing systems (Compatible Time-Sharing System in 1961, BBN Time-
Sharing System in 1962, and Dartmouth Time Sharing System in 1963).

• In 1959, Anatolii Ivanovich Kitov proposed to the Central Committee of the Communist Party of
the Soviet Union a detailed plan for the re-organization of the control of the Soviet armed forces
and of the Soviet economy on the basis of a network of computing centers, the
• to the Central Committee of the Communist Party of the Soviet Union a detailed plan for the re-
organization of the control of the Soviet armed forces and of the Soviet economy on the basis of
a network of computing centers, the OGAS.

• In 1959, the MOSFET (MOS transistor) was invented by transistor) was invented by Mohamed
Atalla Atalla and Dawon Kahng at Bell Labs.

Requirements of network:

• Network interfaces
• Repeaters and hubs
• Bridges
• Switches
• Routers
• Modems
• Firewalls

Peer-to-Peer Networks:

A peer-to-peer (P2P) network is type of decentralized and distributed network architecture in


whichindividual nodes in the network i.e. computer (called "peers") act as both suppliers and consumers
of resources. It differs from client-server networking, where certain devices have responsibility for
providing or"serving" data and other devices consume or otherwise act as "clients" of those servers.
Computers in a peer to peer network run the same networking protocols and software. peer networks are
also often situated physically near to each other typically in homes, small businesses or schools. Peer-to-
peer networks are generally simpler, but they usually do not offer the same performanceunder heavy
loads.

4
Concept structure :

12 .Configure Peer to Peer network : -

Let two computers to be connected in peer to peer network. Connect two computers Using UTP cables
that are configured to cross arrangement into the port LAN card on computer A and computer B.

Let following are configuration details for both computers

Configuration Computer A Computer B

IP address 192.168.10.100 192.168.10.110


Subnet mask 255.255.255.0 255.255.255.0
Computer Name Prl-01 Prl-02
Workgroup PRL-LAB PRL-LAB

For computer A and Computer B open control panel > Network and Internet > Network and Sharing center>
Change adapter settings.

5
13. How To Setup A Peer-To-Peer Network

1. On your desktop, right-click on the This PC to reveal the context menu and
select Properties. This should open a control panel window.
2. Locate and click on Change Settings in the window that opens. This will open a System
Properties
3. Under the Computer Name tab, click on the Change button.

4. Click on the radio button next to how you wish to connect to the P2P network.
If the network you wish to connect to has a domain, enter the name next to the Domain radio
button.
If you wish to connect through a local Workgroup, enter the name of the Workgroup after
selecting the radio button for the same.

6
5. Click on OK. You will see a prompt for restarting your PC.
6. Restart your PC.
7. After your PC has rebooted, open File Explorer. You can use the keyboard shortcut Win + E.
8. From the left quick access menu, click on Network.
9. You should see the other computers on your Network in the top row. If you do not see your
computers, you will instead be presented with a yellow bar saying Network computers are not visible.
Click on this bar to change the settings.
10. Select Turn on network discovery and file sharing.
11. Refresh the explorer by pressing F5, or from the right-click context menu.

. How To Access Files On Another PC Using Peer To Peer


Connection?
You can also access the files present on another PC on your network. To do this, you need to allow access
to the file that you wish to share.

1. To share a file, open the folder of the file in File Explorer.


2. Right-click on the file that you wish to share to reveal the context menu.
3. Hover over ‘Give access to’ to reveal additional settings. Select Homegroup (view and
edit).

7
Advantages :

• High bandwidth – A peer-to-peer network provides you with high bandwidth, so there is no
need for central servers to provision resources. This makes it possible to provide information to
a huge number of users at the same time without affecting the performance of the network.
• Low cost – Due to the fact that there is no central server in a peer-to-peer network, each peer is
responsible for storing and sending the requested information. There are no fees charged by the
server that is hosting the application.
• High security – A peer-to-peer network has no single point of failure. If one node goes offline
or becomes unavailable, the network is still able to function.
• Decentralization – In a client-server architecture, the company that owns the server controls its
users. It can monitor user activity and delete information. That is not the case when it comes to
peer-to-peer networks, which let users control their own data.

Disadvantages:

• Scalability – Scalability is an issue that affects peer-to-peer networks. It is not an issue with
client-server networks, though. Why is that the case? It is difficult to add new peers to the
network and maintain great performance levels at the same time.
There are several ways to solve this problem, including upgrading the hardware. However, it
tends to be more expensive than using a client-server architecture.
• Security concerns – Peer-to-peer networks, such as file-sharing applications, are places where
you can easily get infected with malware. Caution is advised.

14. Actual Resources Used:

S. No. Name of Resource/material Specifications Qty Remarks

1 Computer 4GB RAM 500 GB 1


SSD

2 Software MS Word 1

3 Internet W3 School 1

8
15. Applications of this Micro-Project

.1. Can be used to gain knowledge about peer-to-peer connection.


2. Can be used for getting information about setting up peer-to-peer connection.
3. Can be used to learn advantages and drawbacks of peer-to-peer connection..

16. Conclusion
Peer to peer networks can help individuals and businesses save a lot of money. Most people have
access to online systems like this that are free. That means one installation allows for every other
terminal to have access to authorized software, files, and more. There can be indirect benefits that
involve finances when this structure is used in an unethical manner, like downloading a movie to watch
instead of paying for it.

That’s why the primary advantage of a P2P system is its speed and efficiency. When this technology is
used on a large scale, then it is easier for users to participate in illegal activities, such as
thedownloading of copyright-protected materials. Personal risks also exist, especially if a virus gets
introduced to the system unknowingly.

9
WEEKLY PROGRESS REPORT OF MICRO PROJECT

SR.N SIGN OF
WEEK ACTIVITY PERFORMED DATE
O. GUIDE

1 1st Discussion and finalization of topic

2 2nd Preparation and submission of Abstract

3 3rd Literature Review

4 4th Collection of Data

5 5th Collection of Data

6 6th Discussion and outline of Content

7 7th Formulation of Content

Editing and proof Reading of


8 8th
Content

9 9th Compilation of Report And Presentation

10 10th Seminar

11 11th Viva voce

12 12th Final submission of Micro Project

10
Evaluation Sheet for the Micro Project

Academic Year: 2022-2023


Name of the Faculty: prof.Mrs.Snehal kokil
Course: Data communication and Computer Network
Course code: 22413 Semester: 4
Title of the project: Specification of Peer To peer connection
Cos addressed by Micro Project:
A: Formulate grammatically correct sentences.
B: Summarize comprehension passages.
C: Use relevant words as per context.
D: Deliver prepared speeches to express ideas, thoughts and emotions.

Major learning outcomes achieved by students by doing the project


(a) Practical outcome:Configure Peer to Peer Network with atleast three hosts.

(b) Unit outcomes in Cognitive domain:


1)Describe role of given component in the process of data communication.
2)Explain the process of data communication using the given mode.
3)Classify computer Network on specified parameter.
4) Select networks architecture for the given situation with Justification.

(c) Outcomes in Affective domain:


1)Followed practical effort
2)Team work

Comments/suggestions about team work /leadership/inter-personal communication (if any)


……………………………………………………………………………………………………………

Marks out of 6
for Marks out of 4for
performance performance in oral/
in group presentation
Roll No Student Name Total out of 10
activity (D5 Col.9)
(D5 Col.8)
10
Madhura Gaikwad

11 Aakanksha Waje
25 Sharvani Gaikar

27 Divya Raut

33 Chaitanya Yewale

(Signature of the faculty)


11
12

You might also like