Thursday, September 10, 2009

group19_angels:http proxy server

Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages. Squid has extensive access controls and makes a great server accelerator. It runs on most available operating systems, including Windows and is licensed under the GNU GPL.

Squid optimises the data flow between client and server to improve performance and caches frequently-used content to save bandwidth. Squid can also route content requests to servers in a wide variety of ways to build cache server hierarchies which optimise network throughput.

Group3_AMAK: Network protocol analysis

In last week's post we had covered the different types of protocols and a brief insight into what is network protocol analysis. Also covered was the various network protocol analyzers or packet sniffers commonly used. This week we will be learning more on network protocol analysis. In the typical network architecture, a layered approach is used to design network protocols and communications. The most popular network architecture reference model is called the OSI model. The protocols at one layer should communicate with protocols at the same layer. Each of the seven layers of the protocol stack have specific protocols through which they communicate. The key function of a protocol analyzer is to decode the protocol at each layer. Network protocol analyzers or packet sniffers are used to analyze the network protocols. These capture the data passing through your dial-up connection or network Ethernet card, analyze this data and then represents it in an easily readable form. Analyzers defragment and reassemble network packets into streams which now become the readable form.

The packet analyzers consist of a flexible system of fully configurable filters can be used to discard all network traffic except the specific traffic patterns you wish to analyze. Like for example we can filter the FTP protocol and allow TCP/IP protocols. Protocol Analyzers can be used both for legitimate network management or for stealing information off a network. Network operations and maintenance personnel use Protocol Analyzer to monitor network traffic, analyze packets, watch network resource utilization, conduct forensic analysis of network security breaches and troubleshoot network problems. Unauthorized protocol analyzers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite weapon of hackers as they can reassemble the data transmitted in a network back in readable form hence information exchanged on the network can easily be viewed and hence pose a threat.

group17_the spark:introduction to FTP

INTRODUCTION ABOUT FTP(File Transfer Protocol).
FILE TRANSFER.
Transferring files from one system to another system is one of the biggest tasks in the networking environment.the large volume of data transfer in the internet today is due to the file transfer and the protocol that is responsible for this task of file transferring is File Transfer Protocol.

File transfer protocol is the standard mechanism provided by TCP\IP for copying and transferring the file from one host to another which seems to be simple and straightforward. FTP differs from other client server applications since it establishes 2 connections between hosts.
That is one connection for data transfer and other for control information.This separation of data and commands makes ftp more efficient.Control connection uses very simple rules for communications where only one command or data is transferred at a time.in data connection since it need to transfer different data types uses a bit complex procedure.
FTP uses two well known TCP ports:
PORT 21 is used for the control connection.
PORT 20 is used for data connection.

COMMUNICATION OVER CONTROL CONNECTION.
FTP uses same approach as SMPT to communicate by using 7 bit ASCII character which is very simple .Each command or response is only one short line and hence need not worry about the file format and file structure.

COMMUNICATION OVER DATA CONNECTION.
File transfer occurs over data connection under control of some set of commands which is sent over control connection.
File transfer in FTP means one of the three things i.e.
  Retrieving the file -command used is RETR .
Storing a file-command used is STOR.
Listing of files or directories-command used is LIST .
The client has to define type of file ,data structure and transmission mode.
  • File type includes ASCII FILE,EBCDIC file,IMAGE file.
  • Data structure includes file structure,record structure and page structure.
  • Transmission mode includes stream mode,block mode and compressed mode.

group17_the spark:http proxy server.

PROXY SERVER
A proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service.
Proxy servers have two main purposes:
Improve Performance: Proxy servers can improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. Consider the case where both user X and user Y access the World Wide Web through a proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime later, user Y requests the same page. Instead of forwarding the request to the Web server where Page 1 resides, which can be a time-consuming operation, the proxy server simply returns the Page 1 that it already fetched for user X,hence this is a much faster operation. Real proxy servers support hundreds or thousands of users. The major online services such as America Online, MSN and Yahoo, for example, employ an array of proxy servers.
Filter Requests: Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites.it may also commmunicate to daemon based or ICAP based anti virus software to provide security against virus and other malware by scanning incoming content in real time before it enters the network.
The HYPERTEXT TRANSFER PROTOCOL is used mainly to access data on the world wide web . the protocol tranfers datd in the form of plain text, hypertext , audio, video and so on. It is called the hypertext transfer protocol because it is used in an envirornment where there are rapid jumps from one document to another.During the HTTP connection,the IP address of the client machine is necessarily transmitted in order to get the information back. This allows a server to identify the source of the web request.
HTTP proxy servers interprets web access.
HTTP is a proxy server which acts as an middleman between your web browser and an end server.Instead of directly connecting to web page it connects to the proxy which forwards the request to end server. They support many programms browsers, download managers. They can be united into a chain and in a chain can be mixed with other types of proxy servers like SOCKS and CGI.

group17_the spark:understanding of computer networks

Computer network is a collection of several autonomous computers interconnected by a single technology .
  • Computer networks use a well defined mutually agreed set of rules and conventions known as protocols.
  • They interact with one another who are authenticated and authorized.
  • They allow source sharing preferabally in a predictable and controllable manner.
NEED OF COMPUTER NETWORKS:
Resource sharing and communication are the two principle reasons of building and using computer networks.
Some of the most popular applications include email, web browser, digital libraries, video -on-demand, file transfer, video or audio conferencing, e-commerce, etc.
Computers in a network are interconnected through a transmission media through which the data can be shared.
Transmission media are classified into wire based and wireless media.
  • Wired media includes fiber optic cables, twisted pair cable, coaxial cable etc
  • wireless media includes bluetooth, infrared, terrestrial microwaves, communication satellites, cellular and pcs systems, wireless LANs etc
There are two main types of computer networking which includes client-server and peer to peer.
  • In client-server computing, computer plays a major role known as server where the files, data in the form of web pages, documents, data base and resources are placed and the computers in this network are called clients and they receive data from the server.
eg: personal area network(PAN)
  • In peer-peer networks, all the computers play the same role and no computer acts as a centralised server.
eg: local area network(LAN), wide area network(WAN)

Wednesday, September 9, 2009

group15_krazzy4:first weekly report on REMOTE LOGIN

In this post we are actually going to see how things work in remote login. For this consider two parties i> A host computer and

ii>A remote user.

The host computer is the computer that is to be accessed by a user who is remote to that system. When we relate to our prvious example the host computer is the computer that is placed in the cluster lab and 'X' is the remote user.

For remote login to work successfully three major components are required viz : A common software(eg team viewer),an internet connection and a secure desktop sharing network. The common software consists of two distinct programs which are :

1)The desktop sharing client that runs on the host computer and

2)A viewer program that allows the remote user to view the contents of the host.

The scheme works when both the host and the remote user are connected to the net and both use the same desktop sharing software. We have tried doing this using the Team Viewer software on the windows vista operating software. Through this software the host computer was able to hand over it's keyboard and mouse controls to the remote user. In order to do this the software must be run on the host computer first where it generates a partner id and password. In order for the remote user to access the host computer, it has to request the host computer for the partner id and the password. Thus we were able to control the host computer through a common software when both the host and the remote systems were connected to the internet.

Group18_Awesome4some: HTTP/FTP Proxy servers (introduction)

Proxy servers:


A proxy server is a server (a machine or a program) which is present between the user (client side) and the Internet. When a person requests for a particular web page, the request is passed on directly to the server and the requested page is located, retrieved and sent back to the requested computer. This is done by locating the surfer’s IP address, and then transferring back to the same IP address which had requested the web page. But with the introduction of proxy servers the request is intercepted by it and the request does not reach the real server. The proxy server acts as a regular server by saving caches of all previously downloaded websites. When a request sent to server is intercepted by the proxy server, it checks in its cache. If the page is found then it is sent back to the Ip which raised the request. If it is not found then, the proxy uses its own IP address and raises a request to the real server and then sends it to the requested terminal. This is useful in terms of retaining anonymity, to speed up the process of webpage retrieval and to filter requests. There are many types of Proxy servers like transparent proxy, anonymous proxy, distorting proxy, high anonymity proxy.



Http proxy server:
Hypertext Transfer Protocol (HTTP) is an application-level protocol used for retrieving inter-linked resources led to the establishment of the World Wide Web. HTTP is a request/response standard of a client (end user) and a server (web site). The client making an HTTP request—using a web browser, etc—is referred to as the user agent. The responding server—which stores or creates resources such as HTML files and images—is called the origin server.



HTTP proxy server is a proxy, allowing working on the Internet with HTTP and (not always) FTP protocols. It (as well as other proxy servers) can carry out caching of information downloaded from the Internet. HTTP proxy servers are the most prominently used.



Ftp Proxy server:
File Transfer Protocol (FTP) is a standard network protocol used to exchange and manipulate files over an Internet. FTP is also built on a client-server architecture and utilizes separate control and data connections between the client and server applications. FTP is also often used as an application component to automatically transfer files for program internal functions and can be used with user-based password authentication or with anonymous user access.
Ftp proxy is an application level gateway for FTP. It sits between a client and a server forwarding command and data streams supporting a subset of the file transfer protocol as described in RFC 959. Beside this basic function which makes the program useful on firewall or masqueraders it offers fixing the FTP server (e.g. for connections into a protected LAN) and proxy authentication.

Group11_dnaa:Protocol Stack and Addressing


International Standards Organization (ISO) developed OSI model as a first step towards international standardization of the protocols used in the various layers. The model is known as the ISO OSI Reference Model because it is related with connecting open system i.e. systems that are open for communication with other systems.

The OSI model includes seven layers:

A layer is a collection of conceptually similar functions that provide services to the layer above it and receives service from the layer below it. On each layer an instance provides services to the instances at the layer above and requests service from the layer below. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of the path. Conceptually two instances at one layer are connected by a horizontal protocol connection on that layer.

Different layers of ISO OSI model are as follows:

1) Physical Layer describes the physical & electrical properties of the communications media.
e.g., voltage levels, data rates, max distances.

2) Data Link layer describes the logical organization of data bits transmitted on a particular
medium.
e.g., frame sequencing, error notification

3) Network Layer describes how a series of exchanges over various data links can deliver data across a network.

e.g., addressing and routing

4) Transport Layer describes the quality and nature of data delivery
e.g., how retransmissions are used to ensure delivery

5) Session layer describes the organization of large data sequences & manages
communication session.
e.g., coordinates requests/responses

6) Presentation Layer describes the form of data being transferred & ensures that it will be
readable by receiver.
e.g., floating point formats, data compression, encryption

7) Application Layer describes how applications will communicate
e.g., HTTP, FTP, Telnet, SMTP


Physical layer:

The physical layer defines the hardware implementation, mechanical, electrical and procedural interfaces and the physical communication channel which lies below the physical layer. At this layer information is placed on the physical medium. The Physical Layer will tell one device how to transmit to the medium, and another device how to receive from it. It is related with delivering raw bits over a communication channel. The design issues have to do with making sure that when one side sends a 1 bit, it is received as a 1 bit by the other side but not as a 0 bit. The physical layer performs services requested by the Data Link Layer.

The major functions and services performed by the Physical Layer:

  1. Definition of Hardware Specifications: The details of operation of cables, connectors wireless radio transceivers, network interface cards and other hardware devices are generally a function of the physical layer.
  2. Physical topology: establishment and termination of a connection to a communications media. It defines how devices are connected to devices to media. Devices can be connected by using mesh topology, star topology, ring topology or bus topology.
  3. Participation in the process whereby the communication resources are effectively shared among multiple users.
  4. Representation of bits: Conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. To be transmitted bits must be encoded into signals electrical or optical.
  5. Encoding and Signaling: The physical layer data consists of a stream of bits with no interpretation thus it is responsible for various encoding and signaling functions that transform the data from bits that reside within a computer or other device into signals that can be sent over the network.
  6. Date transmission rate: The transmission rate the no of bits sent each second is also defined by the physical layer.
  7. Transmission mode: The physical layer also defines the direction of transmission between two devices:simplex,half dupolex,full duplex.

Group1_Charisma:First weekly report of the project network protocol analysis

Our objective in the previous week was to understand the basics of network protocol analysis, know more about the tools used and thier working,and we have accomplished the same.We have learnt that network protocol analysis is a process of decoding packets of information encapsulated by the protocol.This can be done using a network protocol analyser which can also be used to build protocols.In the typical network architecture, a layered approach is used to design network protocols and communications. The most popular network architecture reference model is called the OSI model. The protocols at one layer should communicate with protocols at the same layer.The regular computer communication class was of great help in making us understand these concepts better and get a vivid picture of how protocol stack works. The key function of a protocol analyzer is to decode the protocol at each layer. Protocol information of multiple layers may be used by protocol analyzer to identify possible problems in the network communication, which is called Expert Analysis.
With this background we learnt about the usage of the protocol analyser tool wireshark.These are some of the commands whose syntaxes and functions were understood by us:-
capinfos - Prints information about capture files
dumpcap - Dump network traffic
editcap - Edit and/or translate the format of capture files
idl2wrs - CORBA IDL to Wireshark Plugin Generator
mergecap - Merges two or more capture files into one
rawshark - Dump and analyze raw libpcap data
text2pcap - Generate a capture file from an ASCII hexdump of packets
tshark - Dump and analyze network traffic
wireshark-filter - Wireshark filter syntax and reference
wireshark - Interactively dump and analyze network traffic
We look forward to learn more about wireshark by next week.

group9_dead lock:Transmission control protocol


TCP is one of the main protocols in TCP/IP networks. TCP/IP was developed in the 1970s and adopted as the protocol standard for ARPANET (the predecessor to the Internet) in 1983.Whereas the IP protocol deals only with packets. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.It is a popular network debugging tool used to intercept and display packets transmitted or received on a network.TCPdump is one of those tools that network and systems administrators alike reach for whenever they need to take a look at the actual network packets. The TCP/IP suite provides two transport methods and also ensures that data arrive intact and complete. It is used for everything that must arrive in perfect form.

The TCP transport layer 4 sends packets to IP network layer 3, which adds its own header and delivers a "datagram" to a data link layer 2 protocol such as Ethernet, ATM or SONET. Datagram is the unit of data or packet, transmitted in a TCP/IP network. Each datagram contains source and destination addresses and data.

group14_indigo:this week report of remote login

For using the TELNET command for remote login the syntax is:

-->telnet host name

After connecting with the remote host, you will be prompted for your login id and your password just as if you were logging on via a terminal on that system.


For using the RLOGIN command for remote login the syntax is:

-->rlogin hostname

This command provides an advantage over the telnet command that is here in this command you can specify a username on the command line, ahttp://www.blogger.com/post-create.g?blogID=1013281640107267804nd can set it up so that when you rlogin to a host you will not be prompted for a password. Rlogin assumes you wish to login to an account with the same name as the account you are presently logged in as. If you wish to change this, use the -l option.

Rlogin: Remote Login in UNIX systems

rlogin (remote login) is a UNIX command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer. Once logged in to the host, the user can do anything that the host has given permission for, such as read, edit, or delete files.

Each remote machine may have a file named /etc/hosts.equiv containing a list of trusted hostnames with which it shares usernames. Users with the same username on both the local and remote machine may rlogin from the machines listed in the remote machine's /etc/hosts.equiv file without supplying a password. Individual users may set up a similar private equivalence list with the file .rhosts in their home directories. Each line in this file contains two names: a host- name and a username separated by a space. An entry in a remote user's .rhosts file permits the user named username who is logged into hostname to log in to the remote machine as the remote user without supplying a password. If the name of the local host is not found in the /etc/hosts.equiv file on the remote machine, and the local username and hostname are not found in the remote user's .rhosts file, then the remote machine will prompt for a password. Hostnames listed in /etc/hosts.equiv and .rhosts files must be the official hostnames listed in the hosts database; nicknames may not be used in either of these files. For security reasons, the .rhosts file must be owned by either the remote user or by root.

The remote terminal type is the same as your local terminal type (as given in your environment TERM variable). The terminal or window size is also copied to the remote system if the server supports the option, and changes in size are reflected as well. All echoing takes place at the remote site, so that (except for delays) the remote login is transparent. Flow control using and and flushing of input and output on interrupts are handled properly.

A secure version of rlogin (slogin) was combined with two other UNIX utility, ssh and scp, in the Secure Shell suite, an interface and protocol created to replace the earlier utilities.




group13_Avani:description of protocol stack



Brief description of layers of the OSI model

7. Application layer:
  • it is the top layer of the OSI model.
  • it is responsible for providing services to the user.
  • provides a set of interfaces for sending and receiving applications to gain access to and use network services.
6. Presentation layer
  • it converts the data into a generic format for network transmission for outgoing messages and for incoming messages, it converts the data from the generic network format to a format that the receiving application can understand.
  • it is also responsible for certain protocol conversions, data encryption/decryption or data compression and decompression.
5. Session layer
  • it manages user sessions and dialogues.
  • controls establishment and termination of logic links between users.
  • reports upper layer errors.
  • it is also responsible for security and access control to session information(via session participant identification).
4. Transport layer
  • it is responsible for the delivery of a message from one procees to another.
  • manages the data flow between parties by segmenting long data streams into smaller data chunks.
  • reaasembles chunks into their original sequence at the receiving end.
  • provides acknowledgements for successful transmissions and requests resends for packets which arrive with errors.
3. Network layer
  • it determines how data is transferred between network devices.
  • routes packets according to unique network device addresses.
  • provides flow and congestion control to prevent network resource depletion.
2. Data link layer
  • handles special data frames(packets) between the network layer and physical layer.
  • at the receiving end, it packs the raw data from the physical layer into data frames for delivery to the network layer.
  • at the sending end this layer handles conversion of data into raw formats that can be handled by the physical layer.
1. Physical layer
  • it is the bottom layer of the OSI model.
  • converts bits into electronic signals for outgoing messages and converts electronic signals into bits for incoming messages.
  • it manages the interface between the network medium(coax, twisted pair etc) and computer.



Group20_dynamic networks:htp/ftp proxy servers


Now let us be familiar with certain terms used now and then,HTTP and FTP.Computer Networking involves communicating between the computers.So when we request a web-page a computer 'talks' to a web server through a web browser.They speak a language known as HTTP which stands forHyper Text Transfer Protocol.
For ex:
The browser says:
GET /http/1.0
Host:www.cricketnews.com

The server replies:
http/1.0 200 OK
Content-Type: text/html
{
the body of the page
}
Here we can see how the browser is communicating to the server. First the browser request's(GET /http/1.0) indicating that the browser wants to see the home page of the site and it is using 1.0HTTP protocol.The second line indicates the website of the requested page.In the first line of the server's reply (http/1.0 200 OK),indicates the server is also speaking version 1.0 and the request sent was successful and in the second line it is showing the content or type of data it is.

FTP refers to File Transfer Protocol which is an older protocol for moving files back and forth over the networks i.e actually file transfering and also its not a secured way of choice for senstive data.

Project Schedule


Date

Group A project

Group B project

Sept 9

Group 5, Group 6, Group 7

-

Sept 16

Group 11, Group 12, Group 16

-

Sept 23

Group 13, Group 14, Group 15

-

Sept 30

Group 17, Group 18

Group 19

Oct 7

Group 20, Group 9

Group 5

Oct 14

Group 19, Group 8

Group 17

Oct 21

Group 10, Group 1

Group 3

Oct 28

Group 2, Group 4

Group 13

Nov 4

Group 3

Group 11, Group 18

Nov 11

-

Group 15, Group 6, Group 10

Nov 18

-

Group 20, Group 9, Group 1

Nov 25

-

Group 14, Group 4, Group 8

Dec 2

-

Group 12, Group 7

Dec 9

-

Group 2, Group 16





Group16_QuadMasters:Remote Login

Remote login requires three basic components:

1. Software download

2. Internet connection

3. Secure desktop sharing network


For remote login to work, both the host computer and all remote users have to download and install the same desktop sharing software. Desktop sharing software typically includes two distinct programs:

1. The desktop sharing client that runs on the host computer

2. A viewer program that allows the remote user to view the contents of the host computer's desktop in a resizable window

Group8_Vintageboys:TCPdump

As said previously, tcp dump is an analyser tool which displays the packets which flow in a network or an interface in a computer or a server(which analyses the packets which the server is using) and displays them.
It allows us to view entire ethernet frame or other link layer and if required print the frame header. By default, tcp dump prints the packets at the IP layer.
TCPdump generally helps in solving a variety of problems and analysts say that the number of server based problems that could be solved by using TCPdump is limitless since it prints detailed information about network traffic, helps in debug denial and during service attacks. If a network is flooded and all other attempts to determine the source or destination of the traffic fail, tcpdump will show you the source address, destination address, and type of traffic involved.

Thursday, September 3, 2009

MKN_Folks...SOS Need Ur help!

Yup! This is "ejjactly" how I felt when I saw your neat little blogs, children, on our CN Blog Site! Why, that mammoth look of frustration? The sheer volume of the number of blogs to read and evaluate! 
Thought that the hyperlinks to your blogs will fit in one page, neatly on the left hand side. Each of us faculties need read only a max of 5 blogs of groups we are handling. By the way, saw the blogs on 5 B's Home Page (http://netbrainz.blogspot.com/) ? 
Pretty neat...Has a lot of YouTube Videos on some good sensible "fundas" on Networking :-)
Well, to say the least, I think Iam waaaaaaaay too short-sighted as well as did not foresee the avalance of information you folks would collect and post! Maybe under-estimated the energy and enthusiasm inherent in your present chronological age, dear students! I ADMIT :-) 


Therefore, this blog. I need help, ideas to make it more manageable. Could someone volunteer to help me? I will give admin rights to your gmail id, so you could implement your ideas of helping me. Its SOS considering the amount of blogs that will be logged every lab! Do email me mydhili.nair@gmail.com  with any of your ideas, okies? Looking forward to your co-operation, folks!:-)

---Mydhili



 

Tuesday, September 1, 2009

Group12_chaarMusafirs:how does internet works?

The Internet is a global network of computers that connects millions of people and uses the Internet Protocol Suite (TCP/IP) standard rules for data representation, signaling, authentication, and error detection. Each computer connected to the Internet must have a unique address. Internet addresses are in the form nnn.nnn.nnn.nnn where nnn must be a number from 0 - 255. This address is known as an IP address. Once a laptop or computers is connected to any routers or servers then IP addresses is automatically assigned to them. If we want to access the web server then we take the help of DNS(domain name service)server. If we type www.google.com then it connects to the Google DNS server and match the IP address of searched item and display the searched items on the page.

Group12_ChaarMusafirs : Protocol Stack and addressing

Our project will describe the several protocols in details, and put forth comparisons (for eg. With the OSI reference model) Our goal is to analyze data from a live network or from a capture file on disk, and examine details of the packets transmitted and the protocols used. Our program of choice for the network analysis is Wireshark(formerly ethereal) and N map. We plan to host dummy networks, and transfer files, download torrents, P2P programs and host game servers which will be then be monitored by these tools. Also, our project will delve into the details of how Ipv4, Ipv6 addresses are assigned over the network, how the Address Resolution Protocol (ARP) is used for finding a host's link layer (hardware) address/MAC address. and how through DHCP (Dynamic Host Configuration Protocol) lets a network administrator supervise and distribute IP addresses from a central point, with respect to local networks/Routers (we will use Linkysys WRT54AG router for testing) and even the Internet as a whole.

Linksys WRT45ABG


Nmap:

group06_Bandwidth Brothers : Transmission Media

Transmission media is the state which propagates energy waves. The state may be solid,liquid or gas. Our team will stress more on transmission media in networking as it is will be more useful for our subject. In our talk we would like to show visually the media type categories if possible and talk about it. The three main media type categories according to us are copper cable ( like coaxial cable), wireless ( such as microwaves used in LAN,infrared) and finally fibre optics (most expensive among the three). According to us none of them can be considered “the best” cause each has different use in different situation. So according to the need or situation we have to choose the best media. Also suppose if one fails we must have another to back upon, cause if events such as earthquake occurs if one media fails to work the other must be ready to use.We will be focussing mainly on the five traditionally used transmission media and explain everything related to it in detail. We would also rate the performance of they types of transmission media after thorough analysis. We would also like to download applications of transmission media and give a small demonstration. The basic understanding of transmission media will provide a good base for students studying computer communication. So to make everyone understand the basics of transmission media would be our team’s main aim. The five main transmission media which we will be focussing is twisted pair(used for voice applications), coaxial cable, microwave, satellite and finally fibre.