You are on page 1of 39

Networking Assignment

1|Page
Contents
Introduction.................................................................................................................................................4
LO1 Examine networking principles and their protocols.............................................................................5
P1 Discuss the benefits and constraints of different network types and standards................................5
P2 Explain the impact of network topology, communication and bandwidth requirements................10
LO 2 Explanation of networking devices and operations...........................................................................15
P3 Discuss the operating principles of networking devices and server types........................................15
P4 Discuss the inter-dependence of workstation hardware with relevant networking software..........22
LO3: Design efficient networked systems..................................................................................................23
P5 With the aid of diagram, design a networked system to meet a given specification to include.......23
P6 Test and evaluate the design to meet the requirements and analyse user feedback including.......25
LO4: Implement test and diagnose networked systems............................................................................29
P7 Implement the designed network system based on your prepared specification............................29
P8 Document and analyse test results against expected results...........................................................30
P9 Investigate the network ability for growth (Scalability) and the addition of communication devices.
...............................................................................................................................................................34
Conclusion.................................................................................................................................................35
References.................................................................................................................................................36

2|Page
List of Figures

Figure 1: Personal Area Network.................................................................................................................5


Figure 2: Local Area Network......................................................................................................................6
Figure 3: Metropolitan Area Network.........................................................................................................7
Figure 4: Wide Area Network......................................................................................................................8
Figure 5: Bus topology...............................................................................................................................10
Figure 6: Ring topology..............................................................................................................................11
Figure 7: Star topology..............................................................................................................................11
Figure 8: Mesh topology............................................................................................................................12
Figure 9: Tree topology..............................................................................................................................13
Figure 10: Firewall Operation Principle.....................................................................................................15
Figure 11: Router Operation Principle.......................................................................................................16
Figure 12: Network Hub Operation Principle.............................................................................................16
Figure 13: Network Switch Operation Principle.........................................................................................17
Figure 14: Modem Operation Principle.....................................................................................................17
Figure 15: Bridge Operation Principle........................................................................................................17
Figure 16: Repeater Operation Principle...................................................................................................18
Figure 17: L2 and L3 Switch Operation Principle.......................................................................................19
Figure 18: Web Server...............................................................................................................................20
Figure 19: File Server.................................................................................................................................20
Figure 20: DNS Server................................................................................................................................21
Figure 21: E-Mail Server............................................................................................................................21
Figure 22 Network Design........................................................................................................................23
Figure 23 Network Diagram......................................................................................................................29

3|Page
Introduction
The traditional LAN technology is an important network system that is used in many places. It
provides to the users a number of advantages while being cheaper in cost as compared to the
other networking systems. Infocollege.edu, a private college with more than 3000 students and 3
branches in UK requires a network to be built with the head office in Central London while the
branches in other cities. The assignment deals with the study of the basic networking concepts
and thereafter implementation of the network design and network system for the given college.
The college is having some particular requirements for each department about the devices to be
used in there and the accessibility requirements of that particular department.

4|Page
LO1 Examine networking principles and their protocols

P1 Discuss the benefits and constraints of different network types and


standards.
There are a wide range of types of networks to be chosen from for implementing any network
system. As per the website Study.com (n.d.), the various types of network systems available on
the basis of their sizes are:

1. Personal Area Network: PAN includes the devices that are in the vicinity of an individual
only. This type of network systems includes telephones, a computer or a group of computers,
peripheral devices, etc.

Figure 1: Personal Area Network

(Source: 2013 Guccioutlet, 2017)

The benefits of PAN are that it is a portable system due to which the individual is having the
flexibility of being able to use the network according to the requirements. It allows a secured
transmission of files between the devices and the individual is able to easily get the hands-on

5|Page
to the network system. PAN is subjected to some constraints such as having a design
challenge and inherent limitations of the technologies like ZigBee and Bluetooth. Further,
this network system is also subjected to distance problems. If wireless PAN is used, it may
display some security vulnerabilities such as spoofing, snooping, service denial, etc. or might
even create some problems when two WPANs are in close proximity and are connected to
the same wireless channel by creating a collision between the two (Sadiku, et. al., 2017).
2. Local Area Network: LAN is a network that spreads up to a short distance of some meters
and supports few devices that are connected with the network. This network is used to
communicate generally within a building.

Figure 2: Local Area Network

(Source: MBASkool, n.d.)

LAN offers an advantage of providing a high speed and is not too costly. But, it lacks in the
way that the network requires administrative time and the cables may get tampered or the file
server may fail (Thakor and Joshi, 2017).
3. Metropolitan Area Network: MAN is the system that is larger than the LAN but is smaller
than the WAN (Wide Area Network). This type of network system typically covers an entire
city.

6|Page
Figure 3: Metropolitan Area Network

(Source: Certiology, n.d.)

The benefits of using MAN are that it is used to connect a number of LAN systems together
to make up a bigger system covering the entire locality/city. The constraints offered in the
implementation of MAN are that it offers the feasibility of application only if the computer
or terminal can compete. The data rate observed in MAN is slower than that observed in
LAN and the cost is higher than the LAN (Snatpedia, 2017).
4. Wide Area Network: WAN is the network system covering a wide geographical area, cities,
states, countries and even continents.

7|Page
Figure 4: Wide Area Network

(Source: Flaschberger, 2015)

The advantages offered by Wide Area Network are that the network simplifies the server
management. It centralizes the IT infrastructure by providing significant economies of scale
by a central pool of IT resources allowing the whole company to use it. WAN also increases
the bandwidth of the network by the use of the lease lines. It boosts the efficiency as well as
boosts the productivity of the communication. The constraints applicable on the Wide Area
Network are the high costs of set up of the network due to the connection with the far-flung
remote areas. The security breaches in the Wide Area Networks is also a matter of concern
for the users due to security breaches such as the thievery of the information, unauthorized
access to the data or the damage to the files contained in the database. The major issue is in
the maintenance of the MAN as it should be up and operate for 24 hours a day as it may incur
heavy amount loss when it is having a down-time (Wood, 2016).

As per Networking (2017), some of the IEEE networking standards that are the most used are
given below:

1. IEEE 802.1 (Internetworking)

8|Page
2. IEEE 802.2 (Logical link control)
3. IEEE 802.3 (Ethernet)
4. IEEE 802.4 (Token bus)
5. IEEE 802.5 (Token ring)
6. IEEE 802.6 (MAN)
7. IEEE 802.7 (Broadband technology)
8. IEEE 802.8 (Fibre-optic technology)
9. IEEE 802.9 (Voice and data integration)
10. IEEE 802.10 (Network Security)
11. IEEE 802.11 (Wireless networking)
12. IEEE 802.12 (Demand priority networking)

The advantages of the networking standards is that the standards provide a level of quality to the
designs that has been implemented for the given network specifications. The standards allow the
exchange of information between the various participant organisations to maintain an easy
communication process and to work effectively in collaboration with each other. The standard, if
followed, minimises the risk for the companies as they have the standard equipment which
would work with other makers as well. The technology if standardized could save the
development money as the re-invent costs would be reduced to a minimum or to none. The
standards are also having some constraints such as the committees might take years to agree
upon the standards. The technologies may also get outdated very rapidly; hence there is a need to
keep the standards updated with the relevant revisions. The standards may also be imposed due
to a dominant company setting up them, which may not be the best solution to the problem at
hand (Teach-ICT, n.d.).

9|Page
P2 Explain the impact of network topology, communication and bandwidth
requirements.
According to Pandya (2013), some of the common types of network topologies available to be
put into the network systems are:

1. Bus topology: It contains a single network cable that runs through the campus or the building
and is having all the nodes linked with this line. In this topology, failure of one node might
result in the information transmission getting faulty in other nodes as well.

Figure 5: Bus topology

(Source: Computer Hope, 2017)

The advantages of this is that it is reliable in very small networks and requires the least
amount of cable to connect all the nodes together and is less expensive. The constraints with
this are that the data transmission might get sloppy due to the heavy network traffic due to
the computers interrupting each other. Also, each of the connection that is present on the bus
topology reduces the electrical signal flowing through the cable.
2. Ring topology: In this topology, the network cable passes through all the devices connecting
them in a circle and the information flows in the ring from one node to the next.

10 | P a g e
Figure 6: Ring topology

(Source: Computer Hope, 2017)

The advantage of this topology is that a high performance of the network may be obtained
and the networks are easily extendable. The topology is subjected to some constraints as well
such as the expensive and difficulty in the installation. Also, the failure in one computer may
lead to the breaking of the ring and would affect the whole network.
3. Star topology: This topology contains a central hub from where the other systems are
connected. The nodes communicate across the network by passing the data through the hub.

Figure 7: Star topology

11 | P a g e
(Source: Computer Hope, 2017)

The advantages of this topology are that it is more reliable and the fault in the network is
easier to identify. The constraints associated with this topology are that the failure of the hub
may disrupt the functioning of the entire network system. It is also quite expensive to install
as it requires more cable for its set-up.
4. Mesh topology: It contains the devices interconnected with each other such that every device
has connection to every other device.

Figure 8: Mesh topology

(Source: Computer Hope, 2017)

The advantages of the Mesh topology are that the point-to-point linking makes the fault
isolation easier in this topology. The privacy between the two systems is also maintained as
the messages travel along the dedicated path between the two systems. The constraints to
which this topology is subjected to include the high amount of cabling required for the setup
and the large number of input/output ports required for the cable setup.
5. Tree topology: It consists of a tree-shaped connection where only one route exists between
two other nodes of the network.

12 | P a g e
Figure 9: Tree topology

(Source: Computer Learning Centre, n.d.)

The advantages of this network topology are that there is an easy installation and
configuration of the network and there are a number of hubs in the chain which allow more
and more devices to be connected with the central hub. This is also less expensive than the
mesh topology. The topology also has some constraints such as the system getting hauled
down due to failure in the central hub and also the requirement of more cabling as each node
is connected with the central hub.

Communication in a network topology is an important aspect of any networking infrastructure.


The common types of communication used in the network systems are the connection-less and
connection-oriented. The connection-less method involves no connection between the sender and
the receiver of the file. It makes use of the various data packets containing useful information
that are sent to the desired destination by the sender. The connection-oriented method involves
the connection between the sender and the receiver to maintain the flow of the data transfer
between them. The communication has a direct impact on the network system as it then identifies
the configurations of the network devices so as to use the proper peripherals making the proper
connection between the devices to facilitate the flow of information between the devices. The
communication protocol in the organisation needs to be standardized so as to minimize any
issues in the system’s compatibility with the communication protocols.

13 | P a g e
The bandwidth is the maximum rate which denotes the transmission of the data across the
network. It is a very important parameter to determine the performance of the network system.
The higher band-width allows us to use it for better user experience, faster downloads, etc. The
users have the bandwidth requirements as per their daily usage of the data and so it becomes
imperative for the supplier to provide an adequate bandwidth to the network so as to fulfil the
requirements of the users connected to the network (Mazzarese, 2016).

14 | P a g e
LO 2 Explanation of networking devices and operations

P3 Discuss the operating principles of networking devices and server types.


The communication in the network is based on the protocols that are provides in the network and
that communication is possible due to the network protocols that are available in the network.
The main operating principles that are used in the Info College LAN solution are as follows:

 Firewall: It act as a barrier in between two different networks in which one is trusted
network and another is untrusted network. It controls the different access of resource with
the help of a very positive control model. If any resource or traffic disturbs the firewall
policy then the access between two networks stops (Rouse, 2016).

Figure 10: Firewall Operation Principle

 Router: A router is a smart device in the network which is basically designed to receive
the packets that are coming from another network. It also converts the particular interface
of packets to send them to a different network. They also related the proper
communication in between the two in-house networks (Hope, 2017).

15 | P a g e
Figure 11: Router Operation Principle

 Network Hub: This is device which is used to connect the multiple network hosts with
particular network. This device is also used for the data transfer. The currency that is
used by network hub is packet that helps sending network to provide their relevant
information to receiver network. The mechanism that is used in the network hub is not
much secured so this is not much preferred in networking.

Figure 12: Network Hub Operation Principle

 Network Switch: The operating principle of the network switch is similar to the network
hub but it is more trusted and intelligent than network hub. This filter the data before
sending it into the network but on the other hand network hub transfer the data without
filtering. For the given purpose a particular memory is maintained by network switch that
is known as Content Addressable Memory (CAM) which has its own memory and
configuration to filter the data.

16 | P a g e
Figure 13: Network Switch Operation Principle

 Modem: It stands for Modulator and Demodulator. The main operating principle of
modem is to modulate and demodulate the different type of signals in between the
analogue signals and digital signals. It is used in our daily life, modem make the internet
connection wireless. The wireless communication used in modem is used to transfer the
data to outside world.

Figure 14: Modem Operation Principle

 Bridge: The main operating principle of the bridge is to connect the two different sub-
networks of the same network which helps the network to transfer their in-house packets
into the same network.

Figure 15: Bridge Operation Principle

17 | P a g e
 Repeater: This is a signal amplifying device which is received by it. In other words, we
can say that a repeater is a device which receives a packet of data or signal and transfers
it on high frequency and power.

Figure 16: Repeater Operation Principle

 L2 Switch: This is the most needed part of the LAN system inside any organization. The
main operating principle of L2 switch is one and multiple broadcast domain. As it help
the network switch to filter the data and configure the upcoming data according to the
configured policy.

 L3 Switch: There is not much difference in between the L2 and L3 switch. The operating
principle of this switch is similar to the router but it cannot serve much functionality like
router due to hardware configuration (Shekhar, 2016).

18 | P a g e
Figure 17: L2 and L3 Switch Operation Principle

Server: This is the device that provides a different type of service on the set of particular
program (Buzzle, 2017). The different types of serves that are used in Info College LAN solution
are as given below:

 WEB Server: This is the server that uses HTTP to provide different files and packets to
the user and creates their requests that are forwarded by the computer connection of
HTTP. To identify the web server, the user can detect the XML document. In any case, if
any of the servers send the XML file to the other server then it is a web server. The basic
example of the web server in our daily life is HTTP when an internet server responds to
the request of HTTP to send the different content and its services (Varma, 2016).

19 | P a g e
Figure 18: Web Server

 File Server: According to its name, file server provide the access of the files to the user
which are available on the network. In the network of any organization it acts as a central
storage of the file in which any of the user or admin of the network can access the file
from any remote location. These types of servers are generally found in an enterprise
network where different users are available on different location. This server can be
arranged in many ways like in the home network this server allows all devices accessible
on LAN, in the business network it allows all client to log in before accessing the server
(Techterms, n.d.).

Figure 19: File Server

20 | P a g e
 DNS Server: This server is equivalent to a phone book. The DNS servers mainly
maintain the domain name directory and convert them into the IP address. This is very
important for any network and server because the user needs to remember the IP address
and with the help of this server, the task becomes so easy. It gathers all information from
and domain form internet and stores them into the center house which is known as the
central registry. Several ISP and host companies get in contact with the central registry to
get proper information of DNS (Networksolutions, 2017).

Figure 20: DNS Server

 E-Mail Server: This is the virtual post office for the network. The main working of the
mail server is to send the mail to the particular network or on the internet. It receives the
emails from the client and delivers to the different client with the help of internet. The
proper representation of the communication in between the client computers and internet
is provided in the below figure (Samlogic, 2017).

Figure 21: E-Mail Server

21 | P a g e
P4 Discuss the inter-dependence of workstation hardware with relevant
networking software.
The different mediums that are used by the network hardware to inter-dependence with their
network are as follow:

Network Interface Card: This device is used to combine computer in a particular network i.e.
LAN. The communication in between the networked computer is done with the help of particular
packets and NIC acts as a translator to mutually send and receive the data on local area network.
The device that is used for inter-dependence communication in between the two computers is
Ethernet cable. An ethernet cable runs from every NIC to a central hub for LAN communication.
The interconnection of hub acts a transmission level for the packets to send them among
computers on the network (UKEssays, 2015).

M2 is achieved in this part as we select four different types of servers for Info college LAN
solution and the further designing of the network is done with the help of these servers.

22 | P a g e
LO3: Design efficient networked systems

P5 With the aid of diagram, design a networked system to meet a given


specification to include

Figure 22 Network Design

Above network designed is designed using Hybrid Topology. All the requirements of the
infocollege.edu were found to be fulfilled with the Hybrid topology. It makes it easy to connect
the device to the network. The key benefits of the Hybrid topology to the infocollege.edu is
scalability, this topology helps a network to scale as per the demand and provide troubleshooting
to rectify the issue in the network. Hybrid topology supports both the wired and wireless
connectivity, and this will help the infocollge.edu to provide better and efficient service.

Advantages of Hybrid Topology

 Provide reliable network


 Support both wired and wireless network
 Support scalability

23 | P a g e
Disadvantages of Hybrid Topology

 Expensive
 Difficult to manage

24 | P a g e
P6 Test and evaluate the design to meet the requirements and analyse user
feedback including

The infocollege.edu network is designed based on the following requirement:

# Department Workstation Printer Server


1 HR and Finance 9 1
2 Academics 5 1
3 Library 18 1
4 LAB 20 1
5 Lectures Rooms 6
6 Server 4

The network of the infocollege.edu should be designed to provide support to the above
specifications. As the designed network has to be scalable in nature a private IP address will be
used to implement the infrastructure design to meet the above-mentioned network specification.

The following components are to be used in the network to meet the user requirement:

# Number
Switch 6
Router 1
Firewall 1
DNS Server 1
File Server 1
Web Server 1
Mail Server 1

25 | P a g e
User Feedback

1 Uninterrupted Service
The network can run without any interruptions. The designed network will be able to
provide uninterrupted service to the infocollege.edu due to its network design. All the
four servers will be accessible through the LAN network.
2 Network scalability
Current network has been designed using a private IP address and due to which it has
sufficient amount of space to support the future demands of the college. This designed
network will be able to sustain the present demand of the college.
3 Network devices
All the device designed in the network are as per the requirement of the college. Switches
are designed to provide LAN connectivity to the different departments of the college. All
the traffic to the department will be filtered by the Cisco 5505 ASA firewall and it will
help the network from any unauthorized access or attack.
4 Network Maintenance
Every network needs a maintenance in order to continue to provide the desired operation
to the college. The network is designed in such a way that it won’t interrupt the service of
the other department when one department is going under the maintenance.
5 Network Security
To validate the network security of the designed network various test cases will be used
to validate the security to the implemented infrastructure.

Device description and justification

The following components are to be used in the network to meet the user requirement:

# Manufacture Model Number


Switch CISCO 2960-24TT 6
Router CISCO 1941 1
Firewall CISCO 5505 ASA 1

The above devices are to be used in the network to meet the requirement of the infocollege.edu
network. CISCO 2960-24TT Switches are to be used in the network as they help the network to
scale to meet the growing connection demand of the network. This switch has the potential to

26 | P a g e
provide the desired scalability to the network. Six switches will be used at each department to
provide the required amount of IP space for the device connection. CISCO 1941 router is
designed in the network to provide the essential as well as required services to the college. This
router not only meets the present requirement of the network but also provide a space to the
future demand of the network. As the college network is vulnerable to attacks, 5505 ASA is
designed in the network, this security feature of the network will help to filter out the
unauthorized access to the network.

Maintenance schedule

The network infrastructure is the most crucial component for every organization. And therefore,
it requires constant and periodical monitoring and maintenance to keep the network stable and
keep the operation uninterrupted. The administrator usually relies on the regular monitoring of
the network performance. The following maintenance schedule is proposed for the
infocollge.edu network infrastructure.

S. No. Task Details Schedule


1. Network Updating the network components Weekly
configuration configuration is to be updated to provide
new and secure features to the network.
2. Network File Access list should be updated as per the Daily
Access requirement of the network to provide
access to a file on demand.
3. Network device All the network components are to be Weekly
updates updated to their latest firmware version to
keep them secure from vulnerabilities.
4. Software All the authentication passwords and access Monthly
Application list should be checked and update.
Permission
5. Cable All the cables are to be surveyed if any Weekly
connections cable is found to be loose or damage it will
be replaced immediately.
6. Monitoring A general monitoring is to be done to Monthly
analyse the network utilization and
resources.

27 | P a g e
7. Backup Regular and timely backup of the server Weekly
resources and the file will help the network
at the time of disaster. This backup will help
to recover the network to the stable state.

Test Plan

Network testing is essential to validate the implementation of the designed network. A specific
test plan is needed to check whether the desired user requirements are met or not. This test plan
will provide a needed confirmation of the implementation of the network. The following test
plans are proposed for the infocollege.edu network infrastructure:

 IP allocation test
 Default gateway connection test using ping command
 Connectivity test using Tracert
 Domain Name Server address resolution test
 Web server test
 File transfer protocol service test
 Internet connectivity test

The above test plan will help to establish the implementation of the network. Above mentioned
test plan helps to test the bandwidth as well as the communication of the network. Bandwidth is
important of the network otherwise it won’t be able to sustain the demand and communication
test help to ensure that all the devices and components are able to transfer information to each
other.

28 | P a g e
LO4: Implement test and diagnose networked systems

P7 Implement the designed network system based on your prepared


specification
The following diagram represents the network implementation of the infocolllege.edu college
network.

Figure 23 Network Diagram

IP Addressing

Departments IP Address
Academics 192.168.5.16/29

29 | P a g e
Lab 192.168.5.32/27
Library 192.168.5.64/27
Lecture Rooms 192.168.5.96/28
HR and Finance 192.168.5.0/28

P8 Document and analyse test results against expected results


The following test cases scenario are prepared to test the network implementation

1. Ipconfig Test

2. Default Gateway IP Test

30 | P a g e
31 | P a g e
3. IP reachability Test with Ping Command

4. IP reachability Test with Tracert Command

32 | P a g e
5. Extended Ping Test

6. Domain Name Server resolution Test

33 | P a g e
7. HTTP service test

8. Internet Connection Test

9. File Server Testing

34 | P a g e
P9 Investigate the network ability for growth (Scalability) and the addition of
communication devices.
The current network of the infocollege.edu supports scalability and also flexible to support future
additions of the communication devices. The current network of the infocollege.edu support 58
workstations and 4 printers to meet the requirements of the college. All the departments can only
be accessed within their network to protect unauthorized access to their network. Only DNS, E-
mail, Web and File server can be accessed by all the departments, this is due to the fact that these
services are common in nature. Thus, it is required by all departments. These servers have the
capacity to support the current strength of more than 3000 students and since the implemented
solution provides a LAN solution to the college requirement, it has the potential to scale. Current
network is implemented using 4 switches and if more devices are to be connected it has the
potential to support the future communication devices.

Cisco 2960-24FTT switches are used and these switches are scalable and reliable and provide a
passage to meet the future demand of the infocollege.edu. CISCO 5505 ASA is implemented in
this network to provide the desired security cover to the network, this is also important for the
network scalability as an unreliable network cannot become scalable and it is prone to attack like
DDoS which consume all the server and network resources. CISCO 5505 ASA implementation
provide a security framework for the scalability of the network.

Present network has 4 printers, which are implemented in each department. Present network
infrastructure can support different communication devices to connect to the network.
Communication devices can be connected to the network. These communications not only help
to scale the network but also provide a passage to provide more services to the infocollege.edu.

CISCO 1941 router is used in the network which also helps network to connect more devices to
the existing network. CISCO 1941 router is configured to support gigabit Ethernet through which
multiple devices can be connected to the network.

35 | P a g e
Conclusion
The above report discusses the implementation of a university network using the specifications
provided in the assignment brief. The network is made for the university along with its branches
situated in the other cities. The various departments have been taken considerations of in the
assignment. These specifications are implemented using the network design phase, and thereafter
the testing is done to check up with the requirements mentioned for the particular departments of
the organization. The assignment discusses the Local Area Network as mentioned to be used in
the assignment, but since the university is having the branches in other cities, using a
Metropolitan Area Network could be a better choice.

36 | P a g e
References
2013 Guccioutlet, 2017. Understanding and Function of PAN (Personal Area Network) on
Computer Network. 2013 Guccioutlet. [online] Available at:
http://www.2013guccioutlet.net/understanding-and-function-of-pan-personal-area-network/

Buzzle, 2017. A List of the Different Types of Servers You Must Know About. [online] Buzzle.
Available at: https://www.buzzle.com/articles/different-types-of-servers.html [Accessed 9 Nov.
2017].

Certiology, n.d. Different Types of Networks. Certiology. [online] Available at:


http://www.certiology.com/computing/computer-networking/types-of-networks.html

Computer Hope, 2017. Bus Topology. Computer Hope. [online] Available at:
https://www.computerhope.com/jargon/b/bustopol.htm

Computer Hope, 2017. Mesh Topology. Computer Hope. [online] Available at:
https://www.computerhope.com/jargon/m/mesh.htm

Computer Hope, 2017. Ring Topology. Computer Hope. [online] Available at:
https://www.computerhope.com/jargon/r/ringtopo.htm

Computer Hope, 2017. Star Topology. Computer Hope. [online] Available at:
https://www.computerhope.com/jargon/s/startopo.htm

Computer Learning Centre, n.d. Computer Network: Tree Network Topology. Computer
Learning Centre. [online] Available at:
http://computerlearningcentre.blogspot.in/2014/07/computer-network-tree-network-
topology.html

Flaschberger, D., 2017. Revisiting your Wide Area Network. LinkedIn. [online] Available at:
https://www.linkedin.com/pulse/revisiting-your-wide-area-network-dan-flaschberger/

Hope, C., 2017. What is a Router?. [online] Computerhope. Available at:


https://www.computerhope.com/jargon/r/router.htm [Accessed 9 Nov. 2017].

37 | P a g e
Mazzarese, D., 2016. Impact of increased bandwidth on the fibre network. Cabling Installation
and Maintenance. [online] Available at: http://www.cablinginstall.com/articles/print/volume-
24/issue-7/features/data-center/impact-of-increased-bandwidth-on-the-fiber-network.html

MBASkool, n.d. Local Area Network (LAN). MBASkool. [online] Available at:
http://www.mbaskool.com/business-concepts/it-and-systems/13281-local-area-network-lan.html

Networking, 2017. IEEE 802 Standards. Networking. [Android Application] Available at:
https://play.google.com/store/apps/details?
id=com.saiuniversalbookstore.networkingbasics&hl=en

Networksolutions, 2017. What Is A Domain Name Server DNS And How Does It Work |
Network Solutions. [online] Networksolutions. Available at:
http://www.networksolutions.com/support/what-is-a-domain-name-server-dns-and-how-does-it-
work/ [Accessed 9 Nov. 2017].

Pandya, K., 2013. Network Structure or Topology. International Journal of Advance Research
in Computer Science and Management Studies. [online] Available at:
http://www.ijarcsms.com/docs/paper/volume1/issue2/v1i2-0006.pdf

Rouse, M., 2016. What is firewall? - Definition from WhatIs.com. [online] SearchSecurity.


Available at: http://searchsecurity.techtarget.com/definition/firewall [Accessed 9 Nov. 2017].

Sadiku, M. N. O., Tembely, M. and Musa, S. M., 2017. Understanding Personal Area Networks.
International Journal of Advanced Research in Computer Science and Software Engineering.
[online] Available at: https://ijarcsse.com/docs/papers/Volume_7/5_May2017/SV7I5-0207.pdf

Samlogic, n.d. What is a Mail Server and How Does it Work? (Article). [online] Samlogic.
Available at: http://www.samlogic.net/articles/mail-server.htm [Accessed 9 Nov. 2017].

Shekhar, A., 2016. Different Networking Devices And Hardware Types — Hub, Switch, Router,
Modem, Bridge, Repeater. [online] Fossbytes. Available at: https://fossbytes.com/networking-
devices-and-hardware-types/ [Accessed 9 Nov. 2017].

Snatpedia, 2017. Types of Computer Network. Snatpedia. [online] Available at:


https://snatpedia.com/Types-of-network.html

38 | P a g e
Study.com, n.d. Types of Networks: LAN, WAN, WLAN, MAN, SAN, PAN, EPN & VPN.
Study.com. [online] Available at: http://study.com/academy/lesson/types-of-networks-lan-wan-
wlan-man-san-pan-epn-vpn.html

Teach-ICT, n.d. Pros and Cons of standards. Teach-ICT. [online] Available at: http://www.teach-
ict.com/as_a2_ict_new/ocr/A2_G063/333_networks_coms/standards/miniweb/pg5.htm

Techterms, n.d. File Server Definition. [online] Techterms. Available at:


https://techterms.com/definition/file_server [Accessed 9 Nov. 2017].

Thakor, J. B. and Joshi, N. C., 2017. Computer Networks. International Journal of Science and
Research (IJSR). ISSN (Online): 2319-7064, pp. 2767-2769. [online] Available at:
https://www.ijsr.net/archive/v6i5/ART20173127.pdf

UKEssays, 2015. Exploring Networking Principles Components Computer Science Essay.


[online] UKEssays. Available at: https://www.ukessays.com/essays/computer-science/exploring-
networking-principles-components-computer-science-essay.php [Accessed 9 Nov. 2017].

Varma, A., 2016. What is Web Server and Different Types of Web Servers?. [online]
FastWebHost India - Web Hosting Blog. Available at: https://www.fastwebhost.in/blog/what-is-
web-servers-different-types-of-web-servers/ [Accessed 9 Nov. 2017].

Wood, B., 2016. The Advantages and Disadvantages of WANs. Purple. [online] Available at:
https://purple.ai/advantages-disadvantages-wans/

39 | P a g e

You might also like