Teacher Evaluation Sheet Name of Student: Rohan Subhash Gadakh Enrollment No. 2000790176 Name of Program - Computer Technology Semester – 4th Course Title: - Data Communication & Computer Network Code: - 22413 Title of the Micro–Project: - Peer to Peer Network Connection Evaluation as per Suggested Rubric for Assessment of Micro-Project: Sr. No. 1 2 3 4 5 6 7 8 9 Poor (Marks 1-3) Characteristic to be assessed Average (Marks 4-5) Good (Marks 6 - 8) Excellent (Marks 9 – 10) Relevance to the Course Literature Survey / Information Collection Project Proposal Completion of the Target as per project proposal Analysis of data and representation Quality of Prototype / Model Report Preparation Presentation Defense Micro – Project Evaluation Sheet Process Assessment Name of Student Part A – project Proposal (2 marks) Project Methodology (2 marks) Product Assessment Part B – Project Report Individual / Working Presentation / Model Viva (4 marks) (2 marks) Total Marks 10 Comments / Suggestions about teamwork / leadership / inter – personal communication (if any) :---------------------------------------------------------------------------------------------------------------Any Other Comment: --------------------------------------------------------------------------------------------------------------- Name and designation of the faculty Member – Prof. P.G. Aher Signature --------------1 Proposal 1. Aims/Benefits of the Micro-Project The aim of this course is to help the student to affined following industry identified competency through various teaching learning experience. Develop peer to peer network connection. 2. Course Outcome Addressed Develop a Peer-To-Peer Network Connection. 3.0 Proposed Methodology In this project we have installed peer to peer network connection. 2 1. Action Plan Sr. No. Activity Details 1 Getting the overview of the project Rohan Gadakh. Gaurav Wagh. 2 Gathering the Information Mayur Gavali. Gaurav Wagh. 3 Making of the Proposal Rohan Gadakh. Mayur Gavali. 4 Making of Report Rohan Gadakh. Gaurav Wagh. Starting Date Finishing Date Name of Team Members 2. Recourses used Sr. No. Name of Resources Specification Quantity 1 Computer System Intel i5 6600k, 4GB Ram 1 2 OS System Window 10 1 3. Name of Team Members Sr. No Name of Students Enrollment No. Roll No. 1 Rohan Subhash Gadakh 2000790176 15 2 Gaurav Suresh Wagh 2100790415 65 3 Mayur Dattu Gavali 2000790177 16 3 Peer to Peer Network Installation What is compute Network? A computer network consists of 2 or additional computing devices that are connected so as to share the elements of your network (it’s resources) and also the data you store there, the foremost basic network (which consists of just two connected computers) will expand and become additional usable when extra computers be part of and add their resources to those being shared. The first pc, yours, is usually spoken as your native PC. It is additional seemingly to be used as a location wherever you are doing work, a digital computer than as a storage or dominant location, a server. As additional and additional computers are connected to a network and share their resources, the network becomes an additional powerful tool, as a result of staff employing a network with additional data and additional capability are able to accomplish more through those other computers or extra resources. The real power of networking computers becomes apparent if you envision your own network growing then connecting it with alternative distinct networks, sanctioning communication and resource sharing across each network. That is, one network will be connected to a different network and becomes additional powerful tool attributable to the bigger resources. 4 History of Computer Network. In the late 1950s, early networks of computers included the U.S. military radar system Semi-Automatic Ground Environment (SAGE). In 1959, Christopher Strachey filed a patent application for application for time-sharing and John McCarthy initiated the first project to implement time-sharing of user programs at MIT. Stratchey passed the concept on to J. C. R. Licklider at a UNESCO-sponsored conference on Information Processing in Paris that year McCarthy was instrumental in the creation of three of the earliest time-sharing systems (Compatible Time-Sharing System in 1961, BBN Time-Sharing System in 1962 and Dartmouth Time Sharing System in 1963). In 1959, Anatolii Ivanovich Kitov proposed to the Central Committee of the Communist Party of the Soviet Union a detailed plan for the re-organisation of the control of the Soviet armed forces and of the Soviet economy on the basis of a network of computing centres, the to the Central Committee of the Communist Party of the Soviet Union a detailed plan for the re-organisation of the control of the Soviet armed forces and of the Soviet economy on the basis of a network of computing centres, the OGAS. In 1959, the MOSFET (MOS transistor) was invented by transistor) was invented by Mohamed Atalla Atalla and Dawon Kahng at Bell Labs 5 Requirements of Network: Network interfaces Repeaters and hubs Bridges Switches Routers Modems Firewalls 6 Peer-to-Peer Networks: A peer is considered an equal. All computers on a peer-to-peer network can be considered equals, that is to say, no one computer is in charge of the network’s operation. Each computer controls its own information and is capable of functioning as either a client or a server depending on which is needed at the time. Peer-to-peer networks are popular as home networks and for use in small companies because they are inexpensive and easy to install. Most operating systems (the software that runs the basic computer functionality) come with peer-to-peer networking capability built in. The only other cost involved with setting up a peer-topeer network comes into play if a computer does not have a network interface card, or NIC (the device that physically connects your computer to your network’s cabling), already installed. 7 Client Based Networks: Client-based networks are a further refinement to the concept of a serverbased network that relieves the heavy burden on the network’s capacity resulting from frequent server-performed transactions. A client-based network takes better advantage of the server’s powerful processors and of the increasingly powerful computers used in typical workstations. A client based-network utilizes a client workstation’s power in processing some functions locally while requesting additional processing from a server whenever it is needed for increased speed. Client-based network servers process requests from clients and return just the results, rather than sending the original resource to the client to be processed and returned after computations are complete. Client-based networks, therefore, take advantage of the powerful processing capabilities of both the client and the server, this type of arrangement may include application servers (where entire computer programs are shared from the server) and communications servers. 8 Topology used for peer-to-peer network connection Mesh topology: A network setup wherever every laptop and network device is interconnected with each other, permitting most transmissions to be distributed even though one in every of the connections go down. it's a topology usually used for wireless networks. Below could be a visual example of an easy laptop setup on a network employing a topology. Advantages of a topology • Manages high amounts of traffic, as a result of multiple devices will transmit knowledge at the same time. • A failure of 1 device doesn't cause an occasion within the network or transmission of knowledge. • Adding further devices doesn't disrupt knowledge transmission between alternative devices. Disadvantages of a network topology • The price to implement is beyond alternative network topologies, creating it a less fascinating choice. • Building and maintaining the topology is troublesome and time overwhelming. • The likelihood of redundant connections is high, that adds to the high prices and potential for reduced potency. 9 Steps to install Peer-to-Peer Network setup: Step 1: Navigate to the desktop Step 2: Create your folder 10 Step 3: Navigate to the folder and open the properties Step 4: Choose who you want to share with 11 Step 5: Sharing the folder Step 6: Permission 12 Step 7: Open control panel Step 8: Network and Sharing 13 Step 9: Advanced sharing Step 10: Choose home and Work 14 Step 11: Select all options Step 12: Go into network 15 Step 13: Find the device 16